The Slide focusses on providing insights on following topics,
* Technology and Ethics
* Digital Privacy
* Accountability and Trust
* Threats and challenges
* Block Chain Technology
* Cloud and Quantum Computing
* Autonomic Computing
* Computer Vision
* Cyber Security
* 3D Printing
2. Table of
Contents
Technology and Ethics
Digital Privacy
Accountability and Trust
Threats and Challenges
Block Chain Technology
Cloud and Quantum Computing
Autonomic Computing
Computer Vision
Cyber Security
3D Printing
3. Technology and Ethics
Context of ethics in technology,
• Pace of technology innovation is benefitting human kind
• Severely empowering people while choking others for the same
Technical Advances / Evolution
• Raise concern like computer security or viruses, Trojans, spam’s that invade the privacy
of people or the fact the technology is promoting consumerism
• Environmental Degradation
• Un-Employment
• Bioethics
4. Digital Privacy
Digital privacy, also known as internet privacy, is the
concept of passing information, data, messages, and
files over the internet without leaking to undesired
individuals Communication privacy +
Information privacy + Individual privacy
5. Threats on Digital Privacy
Phishing Attacks
Cookies Proliferation
Cell Phone GPS Functionality
Unsecured Browsing
6. Practices to Enhance Digital Privacy
Beware of Phishing Attacks
Blocking Cookies
Delete Unsecured Apps From Your Phone
Unsecured Browsing
Use Encrypted Apps for Messaging
Don’t Save Financial Info on Shopping Sites
Use a VPN
Browse in Private Mode
7. Accountability and Trust
Accountability
• Helps build meaningful relationships
• Establish a sense of ownership
• Feel responsible for actions, behaviour, and success
Threats to Accountability
• Unclear Expectations
• Fear of Failure
• Lack of Engagement
8. Threats
- liable with Emerging Technologies
Botnet Attacks
Digital Privacy Breaches
Environmental Degradations – materials
used for 3D Printing, Printing Inks etc.
Security Threats
Bio-Hacking
BYOD – Bring Your Own Devices
9. Challenges with Evolving/Emerging Technologies
IoT
* Implementation, Installation and Configuration
* Security
Automation
* Maintenance and Monitoring
* Managing Network Traffic
AI / ML / Data Science
* Security
* Data Privacy
10. Block Chain
Blockchain is a shared, immutable ledger that facilitates the process of
recording transactions and tracking assets in a business network.
• An asset can be tangible (a house, car, cash, land) or intangible (intellectual
property, patents, copyrights, branding)
Benefits,
• Greater Trust and Security
• Enhanced Efficiency with Distributer Ledger System and Smart Contract
11. Block Chain Applications
• Improving Cryptocurrency security in financial services
• Transforming healthcare outcomes with blockchain
• Increasing trust in retailer-supplier relationships
• Fuelling innovation in oil and gas industry
• Tracing fresh seafood from the moment it’s caught
12. Cloud and Quantum Computing
Quantum computing is a rapidly-emerging technology based on quantum
computing that harnesses the laws of quantum mechanics to solve
problems too complex for classical computers.
Cloud is a model of computing where servers, networks, storage,
development tools, and even applications (apps) are enabled through the
internet.
13. Cloud Computing Characteristics
Internet Access – Anytime-Anywhere Access
Measured Service – Pay as you Go
Shared Resource Pooling – Adopts Multi-Tenancy Model
Rapid Elasticity – Resource Usage flexibly
On-Demand Self Service – No manual set-up and Configuration
14. Autonomic Computing
Autonomic Computing is a self-managing computing model mimics and
patterned over the human body's autonomic nervous system.
Autonomic Computing facilitates building systems that run themselves,
capable of high-level functioning while keeping the system's complexity
invisible to the user.
An Autonomic Computing system would control the functioning of
computer applications and systems without input from the user.
15. Autonomic Computing
Elements fostering autonomic computing systems,
Comprehensive detailed knowledge about the comprising components
Self Configurable
Constant Self Monitoring
Self Healable
Detect Threats and Tackle
Adapt to Changes
Anticipate Demand
Transparent to Users
16. Computer Vision
Computer Vision is a field of artificial intelligence
(AI) that enables computers and systems to derive
meaningful information from digital images,
videos and other visual inputs — and take actions
or make recommendations based on that
information.
Computer Vision enables systems to see, observe
and understand.
18. Cyber Security
A strong cybersecurity strategy has layers of
protection to defend against cyber crime,
including cyber attacks that attempt to
access, change, or destroy data; extort money
from users or the organization; or aim to
disrupt normal business operations.
20. 3D Printing
• 3D printing is any of various processes in
which material is joined or solidified under
computer control to create a three-
dimensional object, with material being added
together (such as liquid molecules or powder
grains being fused together).
• 3D printing is an additive process whereby
layers of material are built up to create a 3D
part.
21. 3D Printing
Advantages:
Cost-effective creation of geometries
Affordable start-up costs
Customizable
Facilitates rapid prototyping
Disadvantages:
Quality of products manufactured
Increased cost for large production
Shortcomings in accuracy
Post-Processing