SlideShare a Scribd company logo
INTRODUCING SOME
LATEST
TECHNOLOGIES
The twenty-first century has seen a technological revolution. Several highly commercial and
widely used technologies from the early 2000 have vanished, and in 2001 many last
technologies have emerged, particularly un the fields of computer science and engineering.
There are the top 10 emerging technologies of 2000.
A BLOCKCHAIN
 A blockchain is a distributed ledger with growing lists of records that are securely
linked together via cryptographic hashes. Each block contains a cryptographic
hash of the previous block, a timestamp and transaction data. A block chain ca be
seen as consisting of several layers e.g infrastructure, networking, consesus,
data, applications. It consists of public blockchain, private blockchain, hybrid
blockchain, side chains and consectium blockchain.
METAVERSE TECHNOLOGY
The term metaverse comes from the combination of two terms ‘meta’ meaning beyond and ‘verse’ meaning universe.
Metaverse technology can be defined as a combination of virtual realities existing over the internet. It is a virtual world that
consists of expirience, environment and entities over the internet. Big technologies have replicated the core notion of the
metaverse and offered a more mature 3D environment, which may provide individuals with an immersive digital
experience. It is now booming with more people becoming aware of it.
ARTIFICIAL INTELLIGENCE
 Artificial intelligence (AI) is intelligence exhibited by machines, particularly computer
system. AI technology is widely used throughout industry, government and science. The
growing use of artificial intelligence in the 21st century in influencing a social and
economic shift toward increased automation, data driven decision making. Professional
s in artificial intelligence create a programe machines to do human-like activities, it is
widely used to detect credit card fraud.
EDGE COMPUTING
 Edge computing is a distributed
computing model that computation
and data storage closer to the sources
of data, so that a user is likely to be
physical closer to a server. It might
use vitualization technology to simpley
deploying and managing various
applications on edge services. The
aim is to move the computation away
from data centres towards the edge of
the network, exploiting smart objects,
mobile phones.On the below is a
picture that shows an edge computing.
ROBOTICS
 Robotics is a field that studies and develops robots in order to make life easier. Robotics
is multi-disciplinary field includes computer science, electrical engineering and
machanical engineering. They are used to build cars, do dangerous activities such as
bomb dispersal and perform intricate procedures. This is how the robots looks like.
CYBER SECURITY
 Cyber security is concerned with preventing cyberthreats and attacks on computer
systems and networks, it is also a practice of defending computers, servers, mobile
devices and data from malicious attacks. It is aimed at accessing, changing or
destroying sensitive information, extorting money from users via ransom ware or
interrupting normal business.
DIGITAL IMMUNE SYSTEM
The concept of a digital immune system is a technology trends gaining traction in recent
years. It is a software based security systems, networks, and devices from cyber threats
such as viruses, malware and malicious software. It can be viewed as an analogy to the
human immune system, which helps the body against infection and diseases. It includes
various technologies such as firewalls, vulnerability scanners and intrusion detection.
QUANTUM COMPUTING
 Quantum computing is
an area of computer
science that uses the
principles of quantum
theory. It explains the
behavior of energy and
material on the atomic
and subatomiclevels. It
could contribute greatly
to the fields of security
and finance.
SUSTAINABLE
TECHNOLOGY
 Last but not least in today’s top
trending technologies is sustainable
technology, or “green tech”. As the
name suggests, it refers to
development and use of technology
that minimizes the negative impact on
the environment.
CONCLUSION
 Technology in computer science made
the system of work easy and short.
Above, the list of latest technologies in
computer science is a blessing of
modern science. We can do anything
short time by the use of this
technology.
 Copeland, J. (2004) The essential turing; the ideas that gave birth to the computer age,
England
 www. upgrade.com
 Combs, Veronica (29 October 2021) The metaverse; what is it, Tech Republic
 www. techrepublic. Com
 Farhi, Edward (10 January 2019) IBM Quantum update, Q system one Launch, New
collaborators and Q C center Plans HP C wire
 www.analyticsinsight. net
REFERENCE
INTRODUCING SOME LATEST TECHNOLOGIES IN LESOTHO, MANY LATEST TECHNOLOGIES HAVE EMERGED AND REPLACED THE OLDEST ONES.
INTRODUCING SOME LATEST TECHNOLOGIES IN LESOTHO, MANY LATEST TECHNOLOGIES HAVE EMERGED AND REPLACED THE OLDEST ONES.
INTRODUCING SOME LATEST TECHNOLOGIES IN LESOTHO, MANY LATEST TECHNOLOGIES HAVE EMERGED AND REPLACED THE OLDEST ONES.
INTRODUCING SOME LATEST TECHNOLOGIES IN LESOTHO, MANY LATEST TECHNOLOGIES HAVE EMERGED AND REPLACED THE OLDEST ONES.
INTRODUCING SOME LATEST TECHNOLOGIES IN LESOTHO, MANY LATEST TECHNOLOGIES HAVE EMERGED AND REPLACED THE OLDEST ONES.
INTRODUCING SOME LATEST TECHNOLOGIES IN LESOTHO, MANY LATEST TECHNOLOGIES HAVE EMERGED AND REPLACED THE OLDEST ONES.
INTRODUCING SOME LATEST TECHNOLOGIES IN LESOTHO, MANY LATEST TECHNOLOGIES HAVE EMERGED AND REPLACED THE OLDEST ONES.
INTRODUCING SOME LATEST TECHNOLOGIES IN LESOTHO, MANY LATEST TECHNOLOGIES HAVE EMERGED AND REPLACED THE OLDEST ONES.
INTRODUCING SOME LATEST TECHNOLOGIES IN LESOTHO, MANY LATEST TECHNOLOGIES HAVE EMERGED AND REPLACED THE OLDEST ONES.
INTRODUCING SOME LATEST TECHNOLOGIES IN LESOTHO, MANY LATEST TECHNOLOGIES HAVE EMERGED AND REPLACED THE OLDEST ONES.
INTRODUCING SOME LATEST TECHNOLOGIES IN LESOTHO, MANY LATEST TECHNOLOGIES HAVE EMERGED AND REPLACED THE OLDEST ONES.
INTRODUCING SOME LATEST TECHNOLOGIES IN LESOTHO, MANY LATEST TECHNOLOGIES HAVE EMERGED AND REPLACED THE OLDEST ONES.
INTRODUCING SOME LATEST TECHNOLOGIES IN LESOTHO, MANY LATEST TECHNOLOGIES HAVE EMERGED AND REPLACED THE OLDEST ONES.
INTRODUCING SOME LATEST TECHNOLOGIES IN LESOTHO, MANY LATEST TECHNOLOGIES HAVE EMERGED AND REPLACED THE OLDEST ONES.

More Related Content

Similar to INTRODUCING SOME LATEST TECHNOLOGIES IN LESOTHO, MANY LATEST TECHNOLOGIES HAVE EMERGED AND REPLACED THE OLDEST ONES.

Unraveling the Critical Technology Elements: Navigating the Digital Landscape
Unraveling the Critical Technology Elements: Navigating the Digital LandscapeUnraveling the Critical Technology Elements: Navigating the Digital Landscape
Unraveling the Critical Technology Elements: Navigating the Digital Landscapegreendigital
 
Modern Technology
Modern TechnologyModern Technology
Modern TechnologyMd Saylab
 
The Top 10 Technology Trends Of The 4th Industrial Revolution
The Top 10 Technology Trends Of The 4th Industrial RevolutionThe Top 10 Technology Trends Of The 4th Industrial Revolution
The Top 10 Technology Trends Of The 4th Industrial RevolutionAbaram Network Solutions
 
Internet of Things
Internet of ThingsInternet of Things
Internet of ThingsMphasis
 
Intermediate project by harsha
Intermediate project by harshaIntermediate project by harsha
Intermediate project by harshaHARSHA DURUGOJI
 
Revolutionary Contributions of Oluwakayode Adebusuyi to Information Technology
Revolutionary Contributions of Oluwakayode Adebusuyi to Information TechnologyRevolutionary Contributions of Oluwakayode Adebusuyi to Information Technology
Revolutionary Contributions of Oluwakayode Adebusuyi to Information TechnologyOluwakayodeAdebusuyi
 
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVESWIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVEScsandit
 
Internet of Things
Internet of ThingsInternet of Things
Internet of ThingsMphasis
 
An Overview of Internet of Things (IoT): From Literature Survey to Applicatio...
An Overview of Internet of Things (IoT): From Literature Survey to Applicatio...An Overview of Internet of Things (IoT): From Literature Survey to Applicatio...
An Overview of Internet of Things (IoT): From Literature Survey to Applicatio...IRJET Journal
 
Internet of Things
Internet of ThingsInternet of Things
Internet of ThingsMphasis
 
IoT: Ongoing challenges and opportunities in Mobile Technology
IoT: Ongoing challenges and opportunities in Mobile TechnologyIoT: Ongoing challenges and opportunities in Mobile Technology
IoT: Ongoing challenges and opportunities in Mobile TechnologyAI Publications
 
Harbor Research - Designing Security for the Internet of Things & Smart Devices
Harbor Research - Designing Security for the Internet of Things & Smart DevicesHarbor Research - Designing Security for the Internet of Things & Smart Devices
Harbor Research - Designing Security for the Internet of Things & Smart DevicesHarbor Research
 
Case study.pptx
Case study.pptxCase study.pptx
Case study.pptxictctti
 
The Five forces that shape StrategyRivalry among existing co
The Five forces that shape StrategyRivalry among existing coThe Five forces that shape StrategyRivalry among existing co
The Five forces that shape StrategyRivalry among existing cocarmanl5wisc
 
Computer generation presentation by zohaib akram
Computer generation presentation by zohaib akramComputer generation presentation by zohaib akram
Computer generation presentation by zohaib akramhassanIrshad20
 
Trust Modelling for Security of IoT Devices
Trust Modelling for Security of IoT DevicesTrust Modelling for Security of IoT Devices
Trust Modelling for Security of IoT Devicesijtsrd
 

Similar to INTRODUCING SOME LATEST TECHNOLOGIES IN LESOTHO, MANY LATEST TECHNOLOGIES HAVE EMERGED AND REPLACED THE OLDEST ONES. (20)

Unraveling the Critical Technology Elements: Navigating the Digital Landscape
Unraveling the Critical Technology Elements: Navigating the Digital LandscapeUnraveling the Critical Technology Elements: Navigating the Digital Landscape
Unraveling the Critical Technology Elements: Navigating the Digital Landscape
 
Modern Technology
Modern TechnologyModern Technology
Modern Technology
 
The Top 10 Technology Trends Of The 4th Industrial Revolution
The Top 10 Technology Trends Of The 4th Industrial RevolutionThe Top 10 Technology Trends Of The 4th Industrial Revolution
The Top 10 Technology Trends Of The 4th Industrial Revolution
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Intermediate project by harsha
Intermediate project by harshaIntermediate project by harsha
Intermediate project by harsha
 
Revolutionary Contributions of Oluwakayode Adebusuyi to Information Technology
Revolutionary Contributions of Oluwakayode Adebusuyi to Information TechnologyRevolutionary Contributions of Oluwakayode Adebusuyi to Information Technology
Revolutionary Contributions of Oluwakayode Adebusuyi to Information Technology
 
Emerging Technologies 3.0.pdf
Emerging Technologies 3.0.pdfEmerging Technologies 3.0.pdf
Emerging Technologies 3.0.pdf
 
Emerging Technologies 33.0.pdf
Emerging Technologies 33.0.pdfEmerging Technologies 33.0.pdf
Emerging Technologies 33.0.pdf
 
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVESWIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
An Overview of Internet of Things (IoT): From Literature Survey to Applicatio...
An Overview of Internet of Things (IoT): From Literature Survey to Applicatio...An Overview of Internet of Things (IoT): From Literature Survey to Applicatio...
An Overview of Internet of Things (IoT): From Literature Survey to Applicatio...
 
Beekman5 std ppt_17
Beekman5 std ppt_17Beekman5 std ppt_17
Beekman5 std ppt_17
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
IoT: Ongoing challenges and opportunities in Mobile Technology
IoT: Ongoing challenges and opportunities in Mobile TechnologyIoT: Ongoing challenges and opportunities in Mobile Technology
IoT: Ongoing challenges and opportunities in Mobile Technology
 
Harbor Research - Designing Security for the Internet of Things & Smart Devices
Harbor Research - Designing Security for the Internet of Things & Smart DevicesHarbor Research - Designing Security for the Internet of Things & Smart Devices
Harbor Research - Designing Security for the Internet of Things & Smart Devices
 
Case study.pptx
Case study.pptxCase study.pptx
Case study.pptx
 
The Five forces that shape StrategyRivalry among existing co
The Five forces that shape StrategyRivalry among existing coThe Five forces that shape StrategyRivalry among existing co
The Five forces that shape StrategyRivalry among existing co
 
PERVASIVE COMPUTING
PERVASIVE COMPUTINGPERVASIVE COMPUTING
PERVASIVE COMPUTING
 
Computer generation presentation by zohaib akram
Computer generation presentation by zohaib akramComputer generation presentation by zohaib akram
Computer generation presentation by zohaib akram
 
Trust Modelling for Security of IoT Devices
Trust Modelling for Security of IoT DevicesTrust Modelling for Security of IoT Devices
Trust Modelling for Security of IoT Devices
 

Recently uploaded

The architecture of Generative AI for enterprises.pdf
The architecture of Generative AI for enterprises.pdfThe architecture of Generative AI for enterprises.pdf
The architecture of Generative AI for enterprises.pdfalexjohnson7307
 
AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101vincent683379
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
 
Optimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityOptimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityScyllaDB
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaRTTS
 
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya HalderCustom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya HalderCzechDreamin
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaCzechDreamin
 
Enterprise Security Monitoring, And Log Management.
Enterprise Security Monitoring, And Log Management.Enterprise Security Monitoring, And Log Management.
Enterprise Security Monitoring, And Log Management.Boni Yeamin
 
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...CzechDreamin
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIES VE
 
PLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsPLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsStefano
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyJohn Staveley
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...CzechDreamin
 
UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1DianaGray10
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2DianaGray10
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxJennifer Lim
 
What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024Stephanie Beckett
 
Motion for AI: Creating Empathy in Technology
Motion for AI: Creating Empathy in TechnologyMotion for AI: Creating Empathy in Technology
Motion for AI: Creating Empathy in TechnologyUXDXConf
 
In-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsIn-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsExpeed Software
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
 

Recently uploaded (20)

The architecture of Generative AI for enterprises.pdf
The architecture of Generative AI for enterprises.pdfThe architecture of Generative AI for enterprises.pdf
The architecture of Generative AI for enterprises.pdf
 
AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Optimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityOptimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through Observability
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya HalderCustom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara Laskowska
 
Enterprise Security Monitoring, And Log Management.
Enterprise Security Monitoring, And Log Management.Enterprise Security Monitoring, And Log Management.
Enterprise Security Monitoring, And Log Management.
 
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and Planning
 
PLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsPLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. Startups
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John Staveley
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
 
UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
 
What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024
 
Motion for AI: Creating Empathy in Technology
Motion for AI: Creating Empathy in TechnologyMotion for AI: Creating Empathy in Technology
Motion for AI: Creating Empathy in Technology
 
In-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsIn-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT Professionals
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 

INTRODUCING SOME LATEST TECHNOLOGIES IN LESOTHO, MANY LATEST TECHNOLOGIES HAVE EMERGED AND REPLACED THE OLDEST ONES.

  • 1. INTRODUCING SOME LATEST TECHNOLOGIES The twenty-first century has seen a technological revolution. Several highly commercial and widely used technologies from the early 2000 have vanished, and in 2001 many last technologies have emerged, particularly un the fields of computer science and engineering. There are the top 10 emerging technologies of 2000.
  • 2. A BLOCKCHAIN  A blockchain is a distributed ledger with growing lists of records that are securely linked together via cryptographic hashes. Each block contains a cryptographic hash of the previous block, a timestamp and transaction data. A block chain ca be seen as consisting of several layers e.g infrastructure, networking, consesus, data, applications. It consists of public blockchain, private blockchain, hybrid blockchain, side chains and consectium blockchain.
  • 3. METAVERSE TECHNOLOGY The term metaverse comes from the combination of two terms ‘meta’ meaning beyond and ‘verse’ meaning universe. Metaverse technology can be defined as a combination of virtual realities existing over the internet. It is a virtual world that consists of expirience, environment and entities over the internet. Big technologies have replicated the core notion of the metaverse and offered a more mature 3D environment, which may provide individuals with an immersive digital experience. It is now booming with more people becoming aware of it.
  • 4. ARTIFICIAL INTELLIGENCE  Artificial intelligence (AI) is intelligence exhibited by machines, particularly computer system. AI technology is widely used throughout industry, government and science. The growing use of artificial intelligence in the 21st century in influencing a social and economic shift toward increased automation, data driven decision making. Professional s in artificial intelligence create a programe machines to do human-like activities, it is widely used to detect credit card fraud.
  • 5. EDGE COMPUTING  Edge computing is a distributed computing model that computation and data storage closer to the sources of data, so that a user is likely to be physical closer to a server. It might use vitualization technology to simpley deploying and managing various applications on edge services. The aim is to move the computation away from data centres towards the edge of the network, exploiting smart objects, mobile phones.On the below is a picture that shows an edge computing.
  • 6. ROBOTICS  Robotics is a field that studies and develops robots in order to make life easier. Robotics is multi-disciplinary field includes computer science, electrical engineering and machanical engineering. They are used to build cars, do dangerous activities such as bomb dispersal and perform intricate procedures. This is how the robots looks like.
  • 7. CYBER SECURITY  Cyber security is concerned with preventing cyberthreats and attacks on computer systems and networks, it is also a practice of defending computers, servers, mobile devices and data from malicious attacks. It is aimed at accessing, changing or destroying sensitive information, extorting money from users via ransom ware or interrupting normal business.
  • 8. DIGITAL IMMUNE SYSTEM The concept of a digital immune system is a technology trends gaining traction in recent years. It is a software based security systems, networks, and devices from cyber threats such as viruses, malware and malicious software. It can be viewed as an analogy to the human immune system, which helps the body against infection and diseases. It includes various technologies such as firewalls, vulnerability scanners and intrusion detection.
  • 9. QUANTUM COMPUTING  Quantum computing is an area of computer science that uses the principles of quantum theory. It explains the behavior of energy and material on the atomic and subatomiclevels. It could contribute greatly to the fields of security and finance.
  • 10. SUSTAINABLE TECHNOLOGY  Last but not least in today’s top trending technologies is sustainable technology, or “green tech”. As the name suggests, it refers to development and use of technology that minimizes the negative impact on the environment.
  • 11. CONCLUSION  Technology in computer science made the system of work easy and short. Above, the list of latest technologies in computer science is a blessing of modern science. We can do anything short time by the use of this technology.
  • 12.  Copeland, J. (2004) The essential turing; the ideas that gave birth to the computer age, England  www. upgrade.com  Combs, Veronica (29 October 2021) The metaverse; what is it, Tech Republic  www. techrepublic. Com  Farhi, Edward (10 January 2019) IBM Quantum update, Q system one Launch, New collaborators and Q C center Plans HP C wire  www.analyticsinsight. net REFERENCE

Editor's Notes

  1. According to Copeland ed(2004) The essential turing, the ideas that gave birth to the computer age. Oxford, England and VOA News (25 October 2003) UN Announces Advisory Body on Artificial Intelligence. Artificial Intelligence (AI) is intelligence exhibited by machines , particularly computer systems. AI technology is widely used throughout industry, government and science. The growing use of artificial intelligence in the 21st century in influencing a social and economic shift towards increased automation , data driven decision making.
  2. BLOCK CHAIN It is a distributed ledger with growing lists of records
  3. LATEST TECHNOLOGIES