0% found this document useful (0 votes)
9 views

Introduction to Computing 2

The document discusses emerging technologies, focusing on artificial intelligence (AI), machine learning, blockchain, augmented reality (AR), virtual reality (VR), big data, and the Internet of Things (IoT). It outlines the types and applications of AI, the fundamentals of blockchain technology, and the significance of big data analytics. Additionally, it addresses the threats associated with IoT and offers recommendations for enhancing IoT security.

Uploaded by

Robert Luzabe
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views

Introduction to Computing 2

The document discusses emerging technologies, focusing on artificial intelligence (AI), machine learning, blockchain, augmented reality (AR), virtual reality (VR), big data, and the Internet of Things (IoT). It outlines the types and applications of AI, the fundamentals of blockchain technology, and the significance of big data analytics. Additionally, it addresses the threats associated with IoT and offers recommendations for enhancing IoT security.

Uploaded by

Robert Luzabe
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 18

EMERGING

TECHNOLOGY
EMERGING
TECHNOLOGY
Emerging technology are new inventions
or new uses for existing technologies that
are rapidly evolving and have the potential
to disrupt industries.
CONTENTS
INTRODUCTION TO AI AND 0
MACHINE LEARNING 1
BASICS OF BLOCKCHAIN,AR 02
AND VR
BIG DATA AND DATA
03
ANALYTICS
ROBOTICS, IOT
THREADS 04
01
INTRODUCTION TO AI
AND MACHINE
LEARNING
INTRODUCTION TO AI
(ARTIFICIAL INTELLIGENCE)
What is artificial intelligence?
Is the science of building machines that can perform
tasks that typically require human intelligence, such
as learning, reasoning, and problem-solving.

TYPES OF AI (ARTIFICIAL
INTELLIGENCE):

Narrow AI
Designed to perform a specific task, like image
recognition, language translation, or playing chess.

General AI
Aims to match human intelligence, with the ability to
reason, learn, and apply knowledge across various
domains.
TYPES OF AI
( ARTIFICIAL INTELLIGENCE )

Superintelligence: Limited Memory:


Significantly surpasses Store data for a short
human intelligence, period, enabling primitive
potentially leading to learning, such as some
significant societal impacts. chatbots.

Reactive Machines: Theory of Mind:


Respond to input without Simulate human emotions
internal state or memory, like and empathy, like
IBM's Deep Blue chess humanoid robots..
computer.
MACHINE LEARNING
Is a type of artificial intelligence that
allows systems to learn and improve
from experience without being
explicitly programmed.

Types of Machine Learning:

Supervised Learning Reinforcement Learning


Trains on labeled data to predict Learns by interacting with an
outcomes accurately, such as environment, receiving feedback
identifying images or predicting through rewards or penalties to
numerical values. refine its strategy for the best
results.

Unsupervised Learning Semi-Supervised Learning


Works with unlabeled data to find Combines a small amount of
hidden patterns or group data, labeled data with a larger set of
useful for clustering and data unlabeled data to improve
exploration. learning accuracy, making it
Deep Learning more efficient than purely
A more advanced type of machine learning that uses big, supervised methods.
complex models called neural networks (like a brain) to solve
tough problems.
02
BASICS OF
BLOCKCHAIN,AR
AND VR
BASICS OF BLOCK
CHAIN
WHAT IS BLOCK CHAIN?
• Blockchain is a digital way to record and store information
about transactions securely across many computers. Each set
of transactions is put into a block, and these blocks are
connected in order, creating a chain—this is why it’s called
"blockchain." Once a block is added, the data in it can’t be
changed unless everyone in the network agrees, making it
very safe and reliable.

KEY HOW BLOCKCHAIN


FEATURES WORKS

Decentralized Immutable Network nodes Blocks linked


(no single control) (tamper-proof) verify through
. transactions cryptography

Consensus Transactions Blockchain


Transparent updated across
(agreement grouped into
(public ledger) nodes
among nodes) blocks
AUGMENTED REALITY
(AR)
KEY
FEATURES
Integration with Real-Time
3D Registration
Real World Interaction
AR supplements the existing AR applications respond to AR aligns virtual objects with
environment rather than user interactions and physical spaces, ensuring
replacing it. environment changes in real they appear in a fixed
time. location as if they were part
of the real world.

AR overlays digital information onto the real world using devices like smartphones, tablets, or smart
glasses.
Digital object placed on the real environment. You bring digital world to real world.
VIRTUAL REALITY
(VR)
Is the use of computer technology to create a simulated environment. Implies a complete immersion experience that
shuts out the physical world. Need VR glasses to see Digital World . You have to go to 3D world from real World.

Immersive Experience

VR transports users into a different world, offering a sense of presence that


makes them feel as though they are physically in that environment.

KEY
FEATURES 360-Degree
Interaction
Users can look and move around in all directions, interacting with objects and
elements as they would in the real world.
03
BIG DATA AND
DATA
ANALYTICS
BIG DATA
AND
DATA ANALYTICS

BIG DATA DATA ANALYTICS

Is the largely unstructured Data Analytics is the process


data which is generating world of examining data sets to
wide. To analysis the data and conclude about the
make it from unstructured to information they contain,
structured big data technology often to identify patterns,
is used. BDT is generally a correlations, trends, and
software that is design to insights..
analysis the ever increasing
exponential data to have
some utility.
04
ROBOTIC,
IOT
THREADS
ROBOTICS AND IOT
THREATS

ROBOTICS
Is a field of engineering that deals with the design, construction,
operation, and application of robots. Robots are programmable machines
that are able to carry out tasks automatically or with human guidance.
Robotics has a wide range of applications, including manufacturing,
medicine, and space exploration.

IOT THREATS
The Internet of Things (loT) is a network of physical devices that are
connected to the internet. loT devices can collect and exchange data,
which can be used to improve efficiency and productivity. However, loT
devices are also vulnerable to cyberattacks.
COMMON IOT
THREADS

MALWARE DENIAL OF SERVICE ATTACK


(DOS)
Malware is malicious software that
DoS attacks are used to overload loT
can infect loT devices and steal data devices and make them unavailable.
or disrupt their operation.

PHISHING
MAN-IN-THE-MIDDLE ATTACK
Phishing attacks are used to trick
people into revealing their personal Man-in-the-middle attacks are used to
information, such as passwords and intercept communication between loT
credit card numbers. devices and steal data.
PROTECTING AIGAINST IOT
THREATS
Protecting Internet of Things (IoT) devices is crucial because they often lack built-in
security and can be vulnerable to cyberattacks.

Key protections to enhance


IoT security

Threats Keep your loT devices updated:


Software updates often include security patches that can protect your devices from attack.

Use strong passwords:


Strong passwords can help to protect your loT devices from unauthorized access.

Be careful about what you connect to the internet:


Only connect trusted devices to the internet.

Use a firewall:
A firewall can help to protect your loT devices from attack.

Monitor your network traffic:


Monitoring your network traffic can help you to identify and stop attacks.
ARTIFICIAL INTELLIGENCE

THANKS

You might also like