MODULE 01 EMERGING TECHNOLOGIES
DIGITAL FLUENCY:
Fluency means flow and when we think about being fluent in any context, it refers to being flexible,
accurate, efficient and appropriate.
Digital fluency is the ability to select and use the appropriate digital tools and technologies to
achieve a particular outcome.
Digital fluency is combination of
1. Digital or technical, proficiency: Understand, Select and use the technologies in
technological system.
2. Digital literacy: intellectual competencies which include being able to read, create, evaluate,
make judgements and apply technical skills while doing work.
3. Social competence or dispositional knowledge: the ability to relate to others and
communicate with them effectively.
Digital literacy: means having the skills you need to live, learn, and work in a society where
communication and access to information is increasingly through digital technologies like
internet platforms, social media, and mobile devices. ... Communication is also a key aspect of
digital literacy.
Why we need to be digital fluent
The ability to grasp and understand technological tools and concepts has become a
condition for learning, getting a job, and participating in society. For students, digital fluency is
understanding what type of software program will best help them complete an assignment.
Digital Fluency Vs Digital Literacy
Digital fluency is the ability to create something new with those tools. Digital literacy is an
understanding of how to use the tools.
Digital Fluency aspects:
1. Digital Proficiency (Understand and use of technology)
2. Digital Literacy (Read, Create and use of technical skill with technology)
3. Digital Competence (communication with other)
Digital Fluency Encompasses:
Digital capabilities (Digitally adept and innovative)
Digital Principles (Demonstrating Values when working digitally)
Digital literacies (Understanding of how to use digital content)
Benefit of Digital Fluency:
1. Digital literacy boosts student engagement
2. Digital literacy improves academic performance
3. Digital literacy helps student sand out from in job, developed the creative mind-set and
4. Digital literacy makes your college more competitive
5. Driving digital literacy is easier than you think.
Artificial Intelligence:
The ability of a digital computer or computer-controlled robot to perform tasks commonly associated
with intelligent beings.
Artificial intelligence or AI refers to software technologies that make a robot or
computer act and think like a human.
Artificial intelligence is a theory and development of computer systems that can perform
tasks that normally require human intelligence. Speech recognition, decision-making, visual
perception, for example, are features of human intelligence that artificial intelligence may
possess.
History of AI:
In 1956 John McCarthy coined the term “Artificial Intelligence as the topic of the Dartmouth
Conference.
In 1957 The general Problem Solver (GPS)
In 1958 John McCarthy (MIT) invented the LISP language.
In 1997 Deep blue beats the world chess champion Kasparov.
In 2002 iRobot, founded by reaches at the MIT artificial Intelligence lab.
Four Types of AI
1. Reactive Machines: Reactive machines always respond to identical situations in the exact
same way every time, and they are not able to learn actions or conceive of past or future.
2. Limited Memory : AI learns from the past and builds experiential knowledge by observing
actions or data.
3. Theory of Mind : Machines with theory of mind AI will be able to understand and remember
emotions, then adjust behaviour based on those emotions as they interact with people.
4. Self-Awareness : The most advanced type of artificial intelligence is self-aware AI. When
machines can be aware of their own emotions
Examples of AI
Siri, Alexa and other smart assistants
Self driving cars
Robo advisors
Conversational bots
Email spam filters
Netfix’s recommendations.
AI Technologies Landscape :
Upcoming trends in AI in Healthcare for 2020:
AI along with several other technologies can help healthcare organizations efficiently operate to
deliver better patient care.
Technologies transform Healthcare in 2020 :
1. AI and Machine Learning Offer Better way to Spot Diseases.
2. Robots in Healthcare can Conduct More Varied Tasks
3. Computer and Machine Vision Can Help Give Appropriate Care
4. Wearable Tech has More to Offer than Just Counting Steps
5. 3D Printing helps Doctors Replicate Patient-Specific Organs
6. AI Neural Network can Improve Healthcare Biometrics
AI is Driving the new Industrial Revolution :
Industrial Revolution, is that the infusion of language, automation and trust into AI is
deliberate—not the by-products of trial and error, abuse and remedy. In the AI Revolution,
language, automation and trust serve as guideposts for AI providers and practitioners to follow
as they design, build, procure and deploy the technologies.
Language : The AI technology known as natural language processing (NLP) uses
computational linguistics to provide parsing and semantic interpretation of human-language
text. Whether the AI system accepts audio and converts it to text or takes text directly from a
chatbot, for example, NLP enables computer systems to learn, analyse and understand human
language with great accuracy, as it understands sentiment, dialects, intonations and more.
Automation : Today, with data being the staple of the modern corporate diet, continually
increasing in volume, the onerous chore involves collecting and sifting that information for use
in analytics and machine learning. Those chores can leave precious little time for doing the
actual work of the data scientist: building models and experiments.
Trust : Trade opportunities made it less necessary for customer and producer to meet face to
face, trust in the quality of the product became paramount. The brand of the company and
product became the bond with the consumer.
Difference between AI, ML and DL:
Machine Learning : The ability to learn without being explicitly programmed. Machine learning is a
subfield of artificial intelligence, which is broadly defined as the capability of a machine to
imitate intelligent human behaviour. Artificial intelligence systems are used to perform complex
tasks in a way that is similar to how humans solve problems.
Types of Machine Learning :
Supervised learning
Unsupervised learning
Reinforcement learning
Supervised learning : It involves using labelled data sets that have inputs and expected
outputs. AI using supervised learning you give it an input and tell it the expected output.
Ex : weather – predicting AI
Unsupervised learning : It is the task of machine learning using data sets with no specified
structure. AI using unsupervised learning you let the AI make logical classification of the data.
Ex: Ecommerce Websites./
Requirement to Create Good Machine Learning systems:
Data preparation capabilities
Algorithms – basic and advance
Automation and iterative process
Scalability
Ensemble modelling. (techniques that create multiple models and then combine them to
produce improved results)
Machine Learning Users:
1. Financial Services
2. Government
3. Health Care
4. Retails
5. Oil and Gas
6. Transportation
Deep Learning : Deep learning is a machine learning technique that teaches computers to do
what comes naturally to humans: learn by example. .. In deep learning, a computer model
learns to perform classification tasks directly from images, text, or sound.
It was inspired by the structure and function of the brain, namely the interconnecting of
many neurons. Artificial Neural Networks (ANNs).
Neural Networks: Neural networks reflect the behaviour of the human brain, allowing computer
programs to recognize patterns and solve common problems in the fields of AI, machine
learning, and deep learning.
Neural networks, also known as artificial neural networks (ANNs) or simulated neural
networks (SNNs), are a subset of machine learning and are at the heart of deep
learning algorithms. Their name and structure are inspired by the human brain, mimicking the
way that biological neurons signal to one another.
Types of neural networks:
Perceptron Neural Network
Convolutional neural networks (CNNs)
Recurrent neural networks (RNNs)
Perceptron Neural Network : The perceptron is the oldest neural network, created by Frank
Rosenblatt in 1958. It has a single neuron and is the simplest form of a neural network:
They are comprised of an input layer, a hidden layer or layers, and an output layer.
While these neural networks are also commonly referred to as MLPs
Convolutional Neural Network : (CNNs) are similar to feedforward networks, but they’re
usually utilized for image recognition, pattern recognition, and/or computer vision.
Recurrent neural networks : (RNNs) are identified by their feedback loops. These learning
algorithms are primarily leveraged when using time-series data to make predictions about future
outcomes, such as stock market predictions or sales forecasting.
Application of Deep Learning :
Business
Oil & Gas Industry
Construction Industry
Financial services industry
Cybersecurity
Social media
Data :
Data is the quantities, characters or symbols on which operations are performed by a computer.
Big Data: It is a data with so large size and complexity that none of traditional data
management tools can store it or process it efficiently. Big data is also a data but with huge
size.
Types Of Big Data
Following are the types of Big Data:
1. Structured
2. Unstructured
3. Semi-structured
Structured:
Any data that can be stored, accessed and processed in the form of fixed format is termed as a
‘structured’ data.
Examples Of Structured Data
An ‘Employee’ table in a database is an example of Structured Data
Employee_ID Employee_Name Gender Department Salary_In_lacs
2365 Rajesh Kulkarni Male Finance 650000
3398 Pratibha Joshi Female Admin 650000
7465 Shushil Roy Male Admin 500000
Unstructured
Any data with unknown form or the structure is classified as unstructured data. In addition to the
size being huge, un-structured data poses multiple challenges in terms of its processing for
deriving value out of it. A typical example of unstructured data is a heterogeneous data source
containing a combination of simple text files, images, videos etc.
Examples Of Un-structured Data
The output returned by ‘Google Search
Semi-structured:
Data can contain both the forms of data. We can see semi-structured data as a structured in
form but it is actually not defined with e.g. a table definition in relational DBMS. Example of
semi-structured data is a data represented in an XML file.
Examples Of Semi-structured Data
Personal data stored in an XML file-
DBMS :
A Database Management System (DBMS) is software designed to store, retrieve, define, and
manage data in a database.
Types in DBMS :
Object oriented
Relational
Distributed
Hierarchical
Network
And others
RDBMS: RDBMS expanded as Relational Database Management System is a type of database
that stores data in a well-organized composite arrangement, comprising of rows and columns,
which makes it effortless for the processing of data such as fetching, viewing, updating, deleting
and manipulating the contents of the tables.
MySQL : It and open source relational database management system (RDBMS) with a client –
server model. RDBMS software service used to create and manage databases based on a
relational model.
MongoDB : It is an open-source database that uses a document-oriented database model and
a non-structured query language.
IOT (Internet of Things): IOT refers to a system of interrelated, internet-connected objects that
are able to collect and transfer data over a wireless network without human intervention.
IOT Architecture :
The three main layers of IoT architecture:
IoT Device Layer – which is nothing but the client layer
IoT Gateway Layer – that is server-side operators
IoT Platform Layer – to connect the operator and client
Coming back to the 4 Stage IoT architecture which are:
STAGE 1: Sensors and actuators
STAGE 2: Internet gateways and Data Acquisition Systems
STAGE 3: Edge IT Data Processing
STAGE 4: Data center and cloud
Sensors and actuators : This process goes even further for Actuators. They can decide and
take actions based on the information they gather automatically. Example: Switching on a light
when someone enters the room, or temperature regulation, etc.
Internet gateways and Data Acquisition Systems : Data acquisition is the process of
sampling signals that measure real world physical conditions and converting the resulting samples
into digital numeric values that can be manipulated by a computer. Internet gateways work with
Wi-Fi, wired LANs and perform further processing.
Edge IT Data Processing: Edge computing (or IoT edge processing) refers to taking action
on data as near to the source as possible rather than in a central, remote data center, to
reduce latency and bandwidth use.
Data center and cloud : A data center traditionally refers to server hardware on your
premises to store and access data through your local network.
IIOT (Industrial Internet of Things) : The industrial internet of things (IIoT) refers to the
extension and use of the internet of things (IoT) in industrial sectors and applications.
The technology makes it possible to collect data for use in Business Intelligence (BI) and
for Artificial Intelligence (AI).
Cloud : The cloud refers to software and services that run on the Internet, instead of locally on
your computer. ... Some examples of cloud services include Google Drive, Apple iCloud, Netflix,
Yahoo Mail, Dropbox and Microsoft OneDrive.
Models of Cloud Computing :
Infrastructure as a service (IaaS)
Platform as a service (PaaS)
Software as service (SaaS)
IaaS : IaaS is the utilization of APIs to manage the lowest levels of network infrastructure,
including networking, storage, servers, and virtualization.
Examples: Rack space, Digital Ocean, Google Compute Engine, and some deployments of
Microsoft Azure and Amazon Web Services (AWS)
Paas: PaaS offers an even greater abstraction of cloud service, offering users the capability to
build or deploy applications using tools (i.e. programming languages, libraries, services) without
maintaining the underlying infrastructure. Users instead have control over the applications
themselves.
Examples: Salesforce, AWS Elastic Beanstalk, Heroku, Google App Engine (GAE), and Open
Shift
SaaS : SaaS enables users to use and access the cloud provider’s applications that are running
on the provider’s infrastructure from thin client or program interfaces.
Examples: There are loads: Google G-Suite, Dropbox, Cisco Webex, Concur, Microsoft O365,
Gen esys, PayPal.
Cyber Security : Cyber security is the application of technologies, processes and controls to
protect systems, networks, programs, devices and data from cyber attacks. It aims to reduce
the risk of cyber attacks and protect against the unauthorised exploitation of systems, networks
and technologies.
Types of Cyber Security :
Critical infrastructure security
(Examples: Electricity grid, Water Purification, Traffic lights, shopping centers, Hospital)
Application security (Examples : Antivirus programs, Firewalls, Encryption Programs)
Network security. (Examples : Extra logins, New Passwords, Application security)
Cloud security.
Internet of Things (IoT) security.
Essential Elements of Cyber Security :
1. An Effective Framework
2. End-to-End Scope
3. Thorough Risk Assessment and Threat Modelling
4. Proactive Incident Response Planning
5. Dedicated Cybersecurity Resources.
Components of cybersecurity :
End Point Protection
Next Generation Firewall
Intrusion Prevention System/ Intrusion Detection System/ Wireless Intrusion Prevention
System
Data Loss Prevention
Security Incident & Event Management
Secure Web Gateway
Unified Threat Management
Types of Cybersecurity Attacks Malware :
Phishing
Man-in-the Middle (MitM) Attacks
Denial – of – Service (DOS) Attack
SQL Injections
Zero-day Exploit
Password Attack
Cross-site Scripting
Tips to Avoid Cyber Attacks
Train employees in cyber security principles
Install use and regularly update antivirus and anti-spyware software
Use a firewall for internet connection
Download and install software for operating system and application has become
available.
Make backup copies of important business data and information
Control physical access of your computers and network components
Secure the wi-fi network
Require individual user accounts for each employee
Limit employee access to data and information a limit authority to install software.
Regularly change passwords
Preventing Cyber Attacks on your Company
Identify the Threats
Beware of Cybercrimes
Keep an Eye on Employee
Use tow Factor Authentication
Conduct audits on a Regular Basis
Ensure a Strong Sign Off Policy
Protect the important data
Carry out risk assessments
Insure your company against cybercrime
Have In-Depth knowledge about risk factors.