Application Development and Emerging Technologies
Application Development and Emerging Technologies
Serverless computing
a method of providing backend services on an as-used basis.
allows users to write and deploy code without the hassle of worrying about the underlying infrastructure.
Advantages of serverless computing
Lower costs - Serverless computing is generally very cost-effective, as traditional cloud providers of backend
services (server allocation) often result in the user paying for unused space or idle CPU time.
Simplified scalability - Developers using serverless architecture don’t have to worry about policies to scale up
their code. The serverless vendor handles all of the scaling on demand.
Simplified backend code - With FaaS, developers can create simple functions that independently perform a
single purpose, like making an API call.
Quicker turnaround - Serverless architecture can significantly cut time to market. Instead of needing a
complicated deploy process to roll out bug fixes and new features, developers can add and modify code on a
piecemeal basis.
Progressive Web Application – are web apps that use service workers, manifests, and other webplatform features in
combination with progressive enhancement to give users an experience on par with native apps.
Components of PWA
HTTPS - is imperative that the web app must be delivered through a secure protocol (https),in order to be a
progressive web app (PWA). Hence, obtaining an SSL certificate is a prerequisite for progressive web apps
development.
Manifest File - is imperative that the web app must be delivered through a secure protocol (https),in order to be
a progressive web app (PWA). Hence, obtaining an SSL certificate is a prerequisite for progressive web apps
development
Service worker - an intermediary or agent between the browser/application and the server/network, that is
responsible to process network requests i.e. receive browser requests and send it to the server and receive
server response and send it to the browser.
Frameworks of PWA
1. Angular
2. ReactJS
3. Ionic
4. Vue
5. Svelte
Data Intelligence - refers to the practice of using artificial intelligence and machine learning tools to analyze and
transform massive datasets into intelligent data insights, which can then be used to improve services and investments.
- The application of data intelligence tools and techniques can help decision makers develop a better
understanding of collected information with the goal of developing better business processes.
Five (5) Major Components
1. Descriptive Data
2. Prescriptive Data
3. Diagnostic Data
4. Decisive Data
5. Predictive Data
Intelligent Data Analysis (IDA) - is an interdisciplinary study that is concerned with the extraction of useful knowledge
from data, drawing techniques from a variety of fields, such as artificial intelligence, high performance computing,
pattern recognition, and statistics.
Big Data Intelligence - involves the use of Artificial Intelligence and Machine Learning to make big data analytics
actionable and transform big data into insights, and provides engagement capabilities for data scientists, enterprise
analytics strategists, data intelligence warehouse architects, and implementation and development experts.
- Enterprise data intelligence is used in business intelligence operations, analyzing sales, evaluating
inventories, and building customer data intelligence.
Mobile Computing
- refers to the set of IT technologies, products, services and operational strategies and procedures that enable
end users to access computation, information and related resources and capabilities while mobile.
- mobile most commonly refers to access in motion, where the user is not restricted to a given geographic
location.
- mobile may also refer to access in a fixed location via equipment that users can relocate as required but is
stationary while in operation.
Types of Mobile Computing
Mobile infrastructure. Infrastructure refers to the technical pieces that allow devices to communicate. Mobile
infrastructure includes the wireless networks, wireless protocols and data formats.
Mobile hardware. The physical mobile device and supporting hardware that users interact with make up the
mobile hardware. This may include cell phones, laptops, tablets, wearable computers and accompanying
chargers and accessories.
Mobile software. This refers to the applications that run on mobile devices, including mobile operating systems
(OSes) and user-facing applications, such as mobile browsers and e-commerce applications.
Consumer use. Consumers can use mobile devices like laptops, smartphones, wearables and tablets for an array
of activities, including communication, entertainment, banking, bill paying and health and fitness tracking.
Remote work. Employees use laptops or tablets to work and collaborate. Delivery personnel use mobile devices
for logistical and management information, and to verify that deliveries were made to the right place. Field
service technicians use mobile devices for field service management, tracking and support capabilities.
IoT. Consumer and enterprise IoT devices are used to communicate with other devices without human
intervention. For example, self driving cars use sensors, onboard computers and other connected devices to
connect with GPS, weather and other systems to navigate the road safely. Smart sensors are also used in supply
chain management systems to track the progress of goods in transit.
Advantages of Mobile Computing
Portability. Mobile devices are smaller and more portable than traditional computers, making them easy to
carry and use in a range of contexts. They work disconnected from a power source and without a physical
network connection and when disconnected from the network.
Affordability. Over time, mobile devices have become less expensive and easier to obtain. Increasingly, people
opt for smartphones and tablets as their primary means of online connectivity. And it is often cheaper to buy a
smartphone than a desktop PC.
Wireless communications. Mobile devices let users engage in phone, video and various text and instant
messaging applications.
Data. Mobile devices and applications enable companies to collect more consumer data than was possible with
traditional computing. For example, mobile devices can record geolocation of the device and its user.
Limitations of Mobile Computing
Power. Despite increasing battery life, power consumption continues to be an issue, and mobile devices must be
recharged regularly.
Connectivity. While the mobile infrastructure continues to improve, there are areas where signal strength is
poor or nonexistent.
Data security. Mobile computing raises significant data security vulnerabilities because business users,
especially, may have sensitive data on their devices while traveling or working remotely. Companies must
implement security measures and policies to keep corporate data secure.
Dependence. The flip side to the convenience of mobile devices is that consumers may become overly reliant on
them, which can lead to compulsive or unhealthy behaviors such as smartphone addiction.
Distraction. Mobile devices can be distracting and potentially dangerous in a hazardous work environment that
requires the employee's attention, such as a construction site. They pose dangers if used inappropriately while
driving
What is Artificial Intelligence?
Artificial Intelligence is defined as the ability of a digital computer or computer-controlled robot to perform tasks
commonly associated with intelligent beings. AI is also defined as:
An Intelligent Entity Created By humans
Capable of Performing Tasks intelligently without being explicitly instructed.
Capable of thinking and acting rationally and humanely.
Types of Artificial Intelligence
1. Artificial Narrow Intelligence (ANI) - are designed to solve one single problem and would be able to execute a
single task really well. By definition, they have narrow capabilities, like recommending a product for an e-
commerce user or predicting the weather
2. Artificial General Intelligence (AGI) - AGI is still a theoretical concept. It’s defined as AI which has a human-level
of cognitive function, across a wide variety of domains such as language processing, image processing,
computational functioning and reasoning and so on
3. Artificial Super Intelligence (ASI) - system would be able to surpass all human capabilities. This would include
decision making, taking rational decisions, and even includes things like making better art and building
emotional relationships
Blockchain - an approach to interconnecting the components in a system or network so that those components, also
called elements, depend on each other to the least extent practicable.
Cybersecurity as Critical Business Function
- As businesses make bigger leaps towards digital transformation using cloud computing, AI, ML, and other
technologies, cybersecurity is becoming an increasingly critical business function.
- Even if it hasn’t been recognized as a business function, cybersecurity is already an integral business process.
- Therefore, making cybersecurity an operational necessity will position your business strategically and enable you
to mount effective cybersecurity against new and emerging cyber-threats.
- It will also help not just in ensuring the smooth delivery of your products or services to your customers but also
to enhance trust in your brand
Drones
- formally known as unmanned aerial vehicles (UAVs) or unmanned aircraft systems.
- Essentially, a drone is a flying robot that can be remotely controlled or fly autonomously using software-
controlled flight plans in its embedded systems, that work in conjunction with onboard sensors and a global
positioning system (GPS).
Examples of features include:
- various types of cameras with high-performance, zoom and gimbal steady cam and tilt capabilities;
- artificial intelligence (AI) that enables the drone to follow objects;
- augmented reality features that superimpose virtual objects on the drone's camera feed;
- media storage format;
- maximum flight time, which determines how long the drone can remain in the air;
- maximum speeds, including ascent and descent;
- hover accuracy;
- obstacle sensory range;
- altitude hold, which keeps the drone at a fixed altitude; - live video feed; and - flight logs
Internet of things (IoT) - can be described as an extension of the internet and other network connections to different
sensors and devices — or “things” — affording even simple objects, such as lightbulbs, locks, and vents, a higher degree
of computing and analytical capabilities.
Nano Technology
Nanotechnology is science, engineering, and technology conducted at the nanoscale, which is about 1 to 100
nanometers.
- is the use of matter on an atomic, molecular, and supramolecular scale for industrial purposes.
5G Technology
5G is the fifth generation (that’s what the “G” stands for) of wireless technology.
Broadly, the first generation of mobile technology, 1G, was about voice—the ability to use a phone in a car, or
away from home. 2G introduced a short-messaging layer. 3G provided the core network speeds needed to
launch the first smartphones. And 4G LTE, with its high data-transfer rates, gave us access to mobile video with
low buffering and gave rise to many of the connected devices and location services that we rely on and enjoy
today.
What's 5G For?
The first major 5G application is home internet. Both T-Mobile and Verizon are selling home internet services
based on their mid-band and high-band 5G networks.
Remotely piloting robots and drones is another 5G use we're starting to see. Because 5G has lower latency than
4G, remote pilots can control vehicles from a distance without lag, and because 5G has more bandwidth, they
can get reliable multi-camera video feeds from vehicles to see where they're going.
Self-driving cars will interact with smart roads, traffic lights, and other vehicles, and may have to offload some of
their processing power to larger, nearby computers—all of this only works fast enough to prevent collisions if
you're on a low-latency 5G network, not on 4G.
Ethical Technology and Trust
In technology we trust
Artificial intelligence (AI), machine learning, blockchain, digital reality, and other emerging technologies are
integrating into our everyday lives more quickly and deeply than ever.
How can businesses create trust with the technologies their customers, partners, and employees are using?
Encode your company’s values.
Build a strong data foundation.
Harden your defenses.
What’s in a process
Respect stakeholder privacy.
Be transparent.
Respect differing cultural norms.
Empower the people
Deploy the power of all.
Teach them to fish.
Give employees a reason to trust.