0% found this document useful (0 votes)
89 views8 pages

Research Paper 2018

This document discusses 7 emerging technologies that IT professionals should study: 1) Homomorphic encryption which allows encrypted files to be searched and mined while encrypted; 2) Fog computing which pushes cloud computing to edge devices; 3) Biometrics for more secure authentication than passwords; 4) Battery technologies to improve mobile device battery life; 5) Next generation wireless using new spectrum for increased bandwidth; 6) 3D displays having niche uses in design and medicine; 7) Human-robot collaboration in workplaces with robots assisting humans. The document emphasizes staying aware of new technologies to remain relevant in a changing field.

Uploaded by

Sayali Pusalkar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
89 views8 pages

Research Paper 2018

This document discusses 7 emerging technologies that IT professionals should study: 1) Homomorphic encryption which allows encrypted files to be searched and mined while encrypted; 2) Fog computing which pushes cloud computing to edge devices; 3) Biometrics for more secure authentication than passwords; 4) Battery technologies to improve mobile device battery life; 5) Next generation wireless using new spectrum for increased bandwidth; 6) 3D displays having niche uses in design and medicine; 7) Human-robot collaboration in workplaces with robots assisting humans. The document emphasizes staying aware of new technologies to remain relevant in a changing field.

Uploaded by

Sayali Pusalkar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 8

EMERGING TECHNOLOGIES IN IT

Sayali Pusalkar Rajas Pitale


Research Scholar Research Scholar
TIMSCDR TIMSCDR

[email protected] [email protected]

Staying on top of technology trends is once these technologies came to fruition.


serious business for those of us in the field. As our technologies increase in complexity,
Skill sets come and go at a breakneck pace, it takes more and more time for
and it's important to stay ahead of the technologists to start to comprehend new
curve in an attempt to anticipate the next technologies, let alone learn how to
hot trend to keep oneself relevant in an implement and support them. So it's in our
ever-changing world. Here's a look at best interest to start our education as early
seven trending technologies that IT as possible by first identifying the
professionals should be studying right technology trends likely to shake up the IT
now. Where these technologies lead us, IT landscape in the years ahead.
jobs are certain to follow in order to help
design, implement, and support each one. The proliferation of mobile computing
around the world clearly indicates that a
Our goal for this list was to identify not only focus on future wireless technologies
hardware and software technologies, but would make our list. The same goes for IT's
also ideologies and legislative movements hottest topic of the past few years -- IT
that can dramatically influence how and security. Other technologies, such as
when a particular technology will reach a three-dimensional imagery and robotics,
critical mass in terms of impact on our will advance many areas of our lives that
lives. You'll find that our list contains not have remained stagnant for years.
only technologies that are attempting to
solve problems we see today, but also
ways to move beyond what we have today
and push us into uncharted territories.

Introduction:

To help understand the importance of


studying emerging technologies, simply
look back at the past decade and
contemplate the disruptive technologies
that have revolutionized the way IT
Homomorphic Encryption:
infrastructure works today. Topics such as
The concern that data is insecure is one of
server virtualization, big data, and cloud
the factors keeping the cloud computing
computing were once merely high-level
movement from exploding even further
concepts and ideas. Yet, those of us who
than it already has done. Our current
investigated and learned about these
encryption technologies leave us either to
technologies early on had a dramatic
trust our cloud service provider fully, or to
advantage over our peers in the workplace,
encrypt our data before moving it to the
cloud. While more secure, the problem 3-D Displays:
with the latter option is that encrypted Three-dimensional technologies have been
documents can't be searched until they're much more of a novelty than a
decrypted. This is where homomorphic technological breakthrough in the recent
encryption comes into play. Homomorphic past. This mostly has to do with the fact
encryption is a method whereby encrypted that 3-D displays are difficult to achieve.
files could be categorized, and mined, But the latest 3-D display offerings are
while still remaining in an encrypted state. seriously good. Although many of us still
The concept has been around for years, but struggle to find a purposeful use for 3-D
real strides have been made over the last displays in our own daily lives (they're not
few years which may soon going to help with spreadsheet or database
make homomorphic encryption a reality. work), niche areas such as mechanical
design, engineering, advertising, and
various medical fields can and will find uses
for this type of technology.

Fog Computing:
Where cloud computing can be thought of
as fluffy white clouds way up in the sky, fog
computing surrounds us. Fog computing
takes cloud computing and pushes it out to Biometrics:
the edge device, as opposed to keeping it It's high time that we kill off the use of the
in a data center. The idea is that our end dreaded complex password. The
devices will not talk back to a handful of requirements for this type of
cloud providers, where our applications authentication continue to increase in an
and data live. Instead, fog computing attempt to thwart advancements in
creates a wireless mesh at the edge, where password-cracking technologies. But
point-to-point communication with instead of trying to stay one step ahead,
devices in our geographical proximity are many are dramatically shifting focus to
far more prevalent. By creating a potentially more secure and certainly
heterogeneous mesh that all talks much easier to use biometric
together, a fog approach streamlines, authentication methods. Biometrics clearly
optimizes, and improves availability for do have a way to identify users. The key is
mobile device connectivity. to wrap hardware and software around it
to make it foolproof. And while we're not
quite there yet, many are getting close.
Clearly we'll be seeing and using
biometrics more and more on a daily basis.
spectrum. Depending on how these laws
work out, we may be seeing entirely new
spectrum opening up that could reduce
current bottlenecks and open up a new
world of wireless possibilities.

The technical challenges behind these


targets are manifold. The usage of mm-
wave bands for mobile communication
Battery Technologies: scenarios alone comprises a bunch of
While battery life seems to get marginally critical issues to be solved. It ranges from
better every year, we can't help but feel the propagation phenomena, which differ
that portable power continues to be the completely from the common 2 GHz
No. 1 pain point in mobile technology. situation, to the required cost- and power-
There are some interesting new effective radio transceivers for the
technologies being introduced and re- infrastructure. They need to offer
introduced to help alleviate the problem of sufficient output power to reach
having to tether a device to an outlet reasonable cell coverage and easy
continually. If you think that mobile integration into multi-antenna systems.
technology has exploded already, just wait The high number of base stations and the
until battery life technology gets to the multitude of services to be offered demand
point where we can truly be mobile. for generic elementary hardware
components which can be employed for
various frequency bands and transmission
schemes. Even more desirable are
reconfigurable building blocks that can be
controlled by software and allow flexible
usage, the next step on the path towards
software-defined radio.

Next Generation Wireless


Communication:
Wireless, from both cellular and WiFi
perspectives, is an incredibly hot topic right
now. As more devices become mobile, the
need for increasing amounts of bandwidth
-- and thus, wireless spectrum -- is on the Human-Robot Collaboration in the
rise. With a finite amount of wireless Workplace:
spectrum, we're left with lawmakers
The field of robotics has taken a huge leap
determining how much of that usable
in terms of usefulness over the past few
spectrum will be allocated for wireless data
years. Fully robotic manufacturing, medical
communication. Such is the case with a
procedures, law enforcement, and even
recent bill in the US regarding opening up
restaurants are just a few areas where
additional WiFi space in the 5GHz
robotics can and likely will replace human humans.The robot has to adapt itself to our
labor. And while robotics may seem like a way of expressing desires and orders and
job-reducing area of study, there is great not the contrary. But every day
potential when looking at the IT side of the environments such as homes have much
technology. One major obstacle that will more complex social rules than those
need to be overcome is in the case of implied by factories or even military
human-robotic collaboration. After all, environments. Thus, the robot needs
even the most advanced robotics can't do perceiving and understanding capacities to
all things that humans can do. build dynamic models of its surroundings.
Sophisticated software will need to be It needs to categorize objects, recognize
developed to ensure that humans and and locate humans and further their
robots can communicate and understand emotions. The need for dynamic capacities
each other accurately and efficiently. pushes forward every sub-field of robotics.
Robots are artificial agents with capacities Furthermore, by understanding and
of perception and action in the physical perceiving social cues, robots can enable
world often referred by researchers as collaborative scenarios with humans. For
workspace. Their use has been generalized example, with the rapid rise of personal
in factories but nowadays they tend to be fabrication machines such as desktop 3d
found in the most technologically printers, laser cutters, etc., entering our
advanced societies in such critical domains homes, scenarios may arise where robots
as search and rescue, military battle, mine can collaboratively share control, co-
and bomb detection, scientific exploration, ordinate and achieve tasks
law enforcement, entertainment and together. Industrial robots have already
hospital care. These new domains of been integrated into industrial assembly
applications imply a closer interaction with
lines and are collaboratively working with
the user. The concept of closeness is to be humans. The social impact of such robots
taken in its full meaning, robots and have been studied and has indicated that
humans share the workspace but also workers still treat robots and social
share goals in terms of task achievement. entities, rely on social cues to understand
This close interaction needs new
and work together.
theoretical models, on one hand for the
robotics scientists who work to improve Deep Learning:
the robots utility and on the other hand to Deep learning (also known as deep
evaluate the risks and benefits of this new structured learning or hierarchical
"friend" for our modern society. With the learning) is part of a broader family
advance in AI, the research is focusing on of machine learning methods based
one part towards the safest physical on learning data representations, as
interaction but also on a socially correct opposed to task-specific algorithms.
interaction, dependent on cultural criteria. Learning can be supervised, semi-
The goal is to build an intuitive, and easy supervised or unsupervised. Deep learning
communication with the robot through architectures such as deep neural
speech, gestures, and facial expressions. networks, deep belief
Dautenhahn refers to friendly Human– networks and recurrent neural
robot interaction as "Robotiquette" networks have been applied to fields
defining it as the "social rules for robot including computer vision, speech
behaviour (a ‘robotiquette’) that is recognition, natural language processing,
comfortable and acceptable to audio recognition, social network
filtering, machine MIT, IBM, Oxford University, and the Los
translation, bioinformatics, drug design, Alamos National Laboratory.
medical image analysis , material
inspection and board game programs, The essential elements of quantum
where they have produced results computing originated with Paul Benioff,
comparable to and in some cases superior working at Argonne National Labs, in 1981.
to human experts. Deep learning models He theorized a classical computer
are vaguely inspired by information operating with some quantum mechanical
processing and communication patterns in principles. But it is generally accepted that
biological nervous systems yet have David Deutsch of Oxford University
various differences from the structural and provided the critical impetus for quantum
functional properties of computing research. In 1984, he was at a
biological brains (especially human computation theory conference and began
brains), which make them incompatible to wonder about the possibility of
with neuroscience evidences. designing a computer that was based
exclusively on quantum rules, then
published his breakthrough paper a few
months later. With this, the race began to
exploit his ideas. However, before we
delve into what he started, it is beneficial
to have a look at the background of the
quantum world.

Quantum computing:
Quantum computing is the area of study
focused on developing computer
technology based on the principles
of quantum theory, which explains the
nature and behavior of energy and matter
on the quantum (atomic and subatomic) Severless computing:
level. Development of a quantum
With serverless computing, developers
computer, if practical, would mark a leap
rely on cloud-based servers, infrastructure
forward in computing capability far greater
and operating systems. The fact is, even
than that from the abacus to a modern
though it is called serverless, servers are
day supercomputer, with performance
still involved. But, as a fully managed
gains in the billion-fold realm and beyond.
service, the setup, capacity planning and
The quantum computer, following the laws
server management are invisible to you
of quantum physics, would gain enormous
because they are handled by the cloud
processing power through the ability to be
provider. In a traditional environment,
in multiple states, and to perform tasks
developers must provision and configure
using all possible permutations
servers, install operating systems and
simultaneously. Current centers of
continually manage the infrastructure.
research in quantum computing include
With a serverless architecture, you are free
to create, manage and deploy apps that well. Digital Twins which incorporates Big
scale on demand—without worrying about Data, Artificial Intelligence (AI), Machine
infrastructure. Learning (ML) and Internet of Things are
key in Industry 4.0 and are predominantly
Serverless architectures are event-driven, used in the Industrial Internet of Things,
highly scalable and only use resources engineering, and manufacturing business
when a specific function or event occurs. space. The widespread reach and usage of
You only pay for the resources you use or the Internet of Things have made the
the time your code is running. Developers Digital Twins more cost-effective and
use serverless architectures for many accessible for the business world.
purposes including web and mobile apps,
Internet of Things (IoT) back ends, image
manipulation and processing events from
software as a service (Saas)-based
applications.

Nanotechnology:
Nanotechnology is defined as the study
and use of structures between 1
nanometer and 100 nanometers in size. To
give you an idea of how small that is,
it would take eight hundred 100
Digital twin technology: nanometer particles side by side to match
Digital Twin Technology is one among the the width of a human hair. While this is the
top 10 strategic technology trends named most common definition of
by Gartner Inc. in 2017. Digital Twin nanotechnology researchers with various
concept represents the convergence of the focuses have slightly different definitions.
physical and the virtual world where every Nanotechnology is a scientific field that
industrial product will get a dynamic digital uses system or component development
representation. Throughout the product techniques to build products on highly
development life cycle, right from the granular levels. Nanotechnology works
design phase to the deployment phase, through different approaches to build
organizations can have a complete digital nano materials or products, including
foot print of their products. These bottom-up, top-down and functional
‘connected digital things’ generate data in system development. In a bottom-up
real time, and this helps businesses in approach, a product is designed as it
better analyze and predict the problems in evolves from its tiniest form factor to
advance or give early warnings, prevent larger product. In a top-down approach, a
downtime, develop new opportunities and large product may be reverse engineered
even plan better products for the future at to develop products scaled according to
lower costs by using simulations. All these nanometer. A functional approach deals
will have a greater impact on delivering a with a complete system and may
better customer experience in business as
incorporate bottom-up and top-down today plays an important part in the overall
approaches. Nanotechnology is use of technology. In addition, although
implemented in many different fields and the importance of these advances might be
applications, such as computing, obvious, true comprehension of a
biotechnology, electronics and chemical particular kind of technology lies in the full
engineering. experience of the machine in question.
Advances made in the technology of the
Internet have continued to dazzle its
spectators, obstructing comprehension of
its origin and initial uses. These
phenomena might be due to the rapid
change of technology, and the pace at
which individuals and businesses are
becoming dependent on them. At any rate,
the technological movement will continue
to evolve, and since it is evident that a
complete understanding of technology is
Conclusion: unnecessary for its utilization, only those
The evolution of information technology who lack access will be left behind.
reached a turning point with the
development of the Internet. Once a References:
government project, the Internet was https://ieeexplore.ieee.org/document/98976
created for military purposes. Through the 8
course of its development, researchers
began finding other uses for the network, https://www.informationweek.com/it-
and use of the technology spread life/7-emerging-technologies-it-should-
worldwide. Access to the Internet today by study-now/d/d-
individuals, businesses, and institutions id/1319197?image_number=7
alike has created a global market for
Internet service and has spurned an https://www.youtube.com/watch?v=0XnE
increase in productivity in the ncVDyc0
technological communication field.
https://www.fbh-berlin.de/publikationen-
Unfortunately, in addition to the patente/frequent/08-next-generation-
educational, commercial, personal, and wireless-communications/topic-next-
governmental uses of the Internet, global generation-wireless-communications
use of the Internet also includes Internet
fraud, transmitting of illegal items, and https://en.wikipedia.org/wiki/Human%E2
certain forms of harassment. %80%93robot_interaction

As we venture farther into the Information https://www.youtube.com/watch?v=Fo_R


Age, the nature of life is evidence that vSmqZF8
future global development will
undoubtedly depend on technological https://www.information-
advances, particularly in communications. management.com/slideshow/12-top-
Understanding the underlying reasons emerging-technologies-that-will-impact-
certain types of technologies are in use organizations
https://whatis.techtarget.com/definition/ https://internetofthingsagenda.techtarget
quantum-computing .com/definition/fog-computing-fogging

https://www.google.co.in/search?q=quan https://www.youtube.com/watch?v=pdm
tum+computing&source=lnms&tbm=isch yYbdLnkI
&sa=X&ved=0ahUKEwj5stuVktveAhVGvI8
KHTwRB9UQ_AUIDygC&biw=1536&bih=7 https://searchsecurity.techtarget.com/def
23 inition/biometrics

https://azure.microsoft.com/en- https://www.techopedia.com/definition/1
in/overview/what-is-serverless- 0239/biometrics
computing/
https://en.wikipedia.org/wiki/Digital_twin
https://www.google.co.in/search?q=serve
rless+computing&source=lnms&tbm=isch https://www.happiestminds.com/insights
&sa=X&ved=0ahUKEwiX1_yPk9veAhUHSY /digital-twins/
8KHQZ2BUgQ_AUIDygC&biw=1536&bih=7
23 https://www.youtube.com/watch?v=RaO
ejcczPas
https://www.google.co.in/search?q=digita
l+twin&oq=digital+twin&aqs=chrome..69i http://iopscience.iop.org/journal/0957-
57j69i60l2j69i61j69i60j69i59.2624j0j9&so 4484
urceid=chrome&ie=UTF-8
http://www.understandingnano.com/intr
https://www.google.co.in/search?q=hom oduction.html
omorphic+encryption&oq=homomorphic+
encryption&aqs=chrome.0.0l6.5420j0j7&s https://www.youtube.com/watch?v=DAO
ourceid=chrome&ie=UTF-8 Fpgocfrg

https://www.youtube.com/watch?v=1_D https://www.techopedia.com/definition/3
5DD7Z6sQ 151/nanotechnology

You might also like