EmergChapt (1 6)
EmergChapt (1 6)
Contents
Evolution of Technology
Andualem T.
3 4
List of some currently available Emerged Technologies Introduction to the Industrial Revolution (IR)
• A period of major industrialization and innovation that took place
• Artificial Intelligence
during the late 1700s and early 1800s.
• Blockchain
• IR occurs when a society shifts from using tools to make products to
• Augmented Reality and Virtual Reality use new sources of energy, such as coal, to power machines in
• Cloud Computing factories.
• Angular and React • The revolution started in England, with a series of innovations to make
• DevOps labor more efficient and productive.
• Internet of Things (IoT) • IR was a time when the manufacturing of goods moved from small
• Intelligent Apps (I-Apps) shops and homes to large factories.
• Big Data • This shift brought about changes in culture as people moved from
• Robotic Processor Automation (RPA) rural areas to big cities in order to work.
7 8
Introduction to the Industrial Revolution (IR) Introduction to the Industrial Revolution (IR)
• The American Industrial Revolution commonly referred to as the
• Generally, the following industrial revolutions
Second Industrial Revolution, started sometime between 1820
and 1870. fundamentally changed and transfer the world around
• Industries such as textile manufacturing, mining, glass making,
us into modern society.
and agriculture all had undergone changes.
• For example, prior to the Industrial Revolution, textiles were • The steam engine,
primarily made of wool and were handspun.
• From the first industrial revolution (mechanization through • The age of science and mass production, and
water and steam power) to the mass production and assembly
lines using electricity in the second, the fourth industrial • The rise of digital technology
revolution will take what was started in the third with the
• Smart and autonomous systems fueled by data and
adoption of computers and automation and enhance it with smart
and autonomous systems fueled by data and machine learning. machine learning.
9 10
Introduction to the Industrial Revolution (IR) Historical Background (IR 1.0, IR 2.0, IR 3.0)
• The Most Important Inventions of the Industrial • The industrial revolution began in Great Britain in the late 1770s
before spreading to the rest of Europe.
Revolution
• The first European countries to be industrialized after England
• Transportation: The Steam Engine, The Railroad, The Diesel
were Belgium, France, and the German states.
Engine, The Airplane.
• The final cause of the Industrial Revolution was the effects
• Communication.: The Telegraph, Transatlantic Cable,
created by the Agricultural Revolution.
Phonograph, the Telephone.
• As previously stated, the Industrial Revolution began in Britain in
• Industry: The Cotton Gin. The Sewing Machine. Electric the 18th century due in part to an increase in food production,
Lights. which was the key outcome of the Agricultural Revolution.
11 12
Historical Background (IR 1.0, IR 2.0, IR 3.0) Historical Background (IR 1.0, IR 2.0, IR 3.0)
• The four types of industries are: • Industrial Revolution (IR 1.0)
• The Industrial Revolution (IR) is described as a transition to new
• Primary industry involves getting raw materials e.g. mining,
manufacturing processes.
farming, and fishing.
• IR was first coined in the 1760s, during the time where this revolution
• Secondary industry involves manufacturing e.g. making cars began.
and steel. • The transitions in the first IR included going from hand production
• Tertiary industries provide a service e.g. teaching and nursing. methods to machines, the increasing use of steam power, the development
of machine tools and the rise of the factory system.
• Quaternary industry involves research and development
Historical Background (IR 1.0, IR 2.0, IR 3.0) Historical Background (IR 1.0, IR 2.0, IR 3.0)
• Industrial Revolution (IR 2.0) • Industrial Revolution (IR 3.0)
• Also known as the Technological Revolution, began somewhere in the • Introduced the transition from mechanical and analog electronic
1870s. technology to digital electronics which began from the late 1950s.
• The advancements in IR 2.0 included the development of methods for • Due to the shift towards digitalization, IR 3.0 was given the nickname,
manufacturing interchangeable parts and widespread adoption of pre- “Digital Revolution”.
existing technological systems such as telegraph and railroad networks. • The core factor of this revolution is the mass production and widespread
• This adoption allowed the vast movement of people and ideas, enhancing use of digital logic circuits and its derived technologies such as the
communication. computer, handphones and the Internet.
• Moreover, new technological systems were introduced, such as electrical • These technological innovations have arguably transformed traditional
power and telephones. production and business techniques enabling people to communicate with
another without the need of being physically present.
• Certain practices that were enabled during IR 3.0 is still being practiced
until this current day, for example – the proliferation of digital computers
and digital record.
15 16
Historical Background (IR 1.0, IR 2.0, IR 3.0, IR 4.0) Role of Data for Emerging Technology
• Industrial Revolution (IR 4.0) • Data is regarded as the new oil and strategic asset since we are living in the
• Now, with advancements in various technologies such as robotics, Internet age of big data, and drives or even determines the future of science,
of Things (IoT), additive manufacturing and autonomous vehicles, the term
“Fourth Industrial technology, the economy, and possibly everything in our world today and
• Revolution” or IR 4.0 was coined by Klaus Schwab, the founder and tomorrow.
executive chairman of World Economic Forum, in the year 2016.
• The technologies mentioned above are what you call – cyber physical • Data have not only triggered tremendous hype and buzz but more
systems. importantly, presents enormous challenges that in turn bring incredible
• A cyber-physical system is a mechanism that is controlled or monitored by
computer-based algorithms, tightly integrated with the Internet and its innovation and economic opportunities.
users.
• This reshaping and paradigm-shifting are driven not just by data itself but all
• Examples: Computer Numerical Control (CNC) machines and Artificial
Intelligence (AI). other aspects that could be created, transformed, and/or adjusted by
• CNC Machines: operated by giving it instructions using a computer
understanding, exploring, and utilizing data.
• AI: one of the main elements that give life to Autonomous Vehicles and
Automated Robots.
17 18
Role of Data for Emerging Technology Enabling Devices & Network (Programmable Devices)
• In the world of digital electronic systems, there are four basic kinds of
• The preceding trend and its potential have triggered new debate about data- devices: memory, microprocessors, logic, and networks.
intensive scientific discovery as an emerging technology, the so-called “fourth • Memory devices store random information such as the contents of a
spreadsheet or database.
industrial revolution,” There is no doubt, nevertheless, that the potential of • Microprocessors execute software instructions to perform a wide variety of
tasks such as running a word processing program or video game.
data science and analytics to enable data-driven theory, economy, and • Logic devices provide specific functions, including device-to-device
professional development is increasingly being recognized. interfacing, data communication, signal processing, data display, timing and
control operations, and almost every other function a system must perform.
• This involves not only core disciplines such as computing, informatics, and • Network is a collection of computers, servers, mainframes, network devices,
peripherals, or other devices connected to one another to allow the sharing of
statistics, but also the broad-based fields of business, social science, and data.
• Example of a network is the Internet, which connects millions of people all
health/medical science. over the world Programmable devices usually refer to chips that incorporate
field programmable logic devices (FPLDs), complex programmable logic
devices (CPLD) and programmable logic devices (PLD).
• There are also devices that are the analog equivalent of these called field
programmable analog arrays.
19 20
Enabling Devices & Network (Programmable Devices) Enabling Devices & Network (Programmable Devices)
• Why is a computer referred to as a programmable device?
• Service Enabling Devices (Network Related Equipment)
• Because a computer follows a set of instructions.
• Many electronic devices are computers that perform only one operation, • Traditional channel service unit (CSU) and data service unit (DSU)
but they are still following instructions that reside permanently in the unit. • Modems
• List of some Programmable devices
• Achronix Speedster SPD60 • Routers
• Actel’s
• Altera Stratix IV GT and Arria II GX • Switches
• Atmel‟s AT91CAP7L
• Cypress Semiconductor‟s programmable system-on-chip (PSoC) family • Conferencing equipment
• Lattice Semiconductor‟s ECP3
• Network appliances (NIDs and SIDs)
• Lime Microsystems‟ LMS6002
• Silicon Blue Technologies
• Hosting equipment and servers
• Xilinx Virtex 6 and Spartan 6
• Xmos Semiconductor L series
21 22
23 24
• Computer science: Including graphics, technology, prototyping tools, user • Autonomous Devices
interface management systems. • Blockchain
• Linguistics
• Augmented Analytics
• Engineering and design
• Digital Twins
• Artificial intelligence
• Enhanced Edge Computing and
• Human factors
• Immersive Experiences in Smart Spaces
25 26
?
• Some emerging technologies that will shape the future of you and
your business
• The future is now or emerging technologies are taking over our minds
more and more each day.
• These are very high-level emerging technologies though.
• Chatbots
• Virtual/augmented reality
END OF CHAPTER ONE
• Blockchain Next: Chapter Two: Data Science
• Ephemeral Apps and
• Artificial Intelligence are already shaping your life whether you like it
or not.
27 28
Contents
from structured, semi-structured and unstructured data. which should be suitable for communication, interpretation, or processing, by human or
electronic machines.
• Data science is much more than simply analyzing data.
• It can be described as unprocessed facts and figures.
• Let’s consider this idea by thinking about some of the data involved in • Represented with the help of characters such as alphabets (A-Z, a-z), digits (0-9) or special
buying a box of cereal from the store or supermarket: characters (+, -, /, *, <,>, =, etc.).
• Whatever your cereal preferences teff, wheat, or burly you prepare Information
for the purchase by writing “cereal” in your notebook. This planned • Is the processed data on which decisions and actions are based
• It is data that has been processed into a form that is meaningful to the recipient
purchase is a piece of data though it is written by pencil that you can
• Information is interpreted data; created from organized, structured, and processed data in
read.
a particular context.
31 32
• Data processing consists of the following basic steps - input, processing, of the several types of storage medium, such as hard disk, CD, flash disk and so on.
• The particular form of the output data depends on the use of the data.
Data Types and their Representation Data Types and their Representation
• Data types can be described from diverse perspectives. 2. Data types from Data Analytics perspective
• In computer science and computer programming, for instance, a data type is • From a data analytics point of view, it is important to understand that there
simply an attribute of data that tells the compiler or interpreter how the are three common types of data types or structures:
programmer intends to use the data.
A. Structured
1. Data types from Computer programming perspective
• Almost all programming languages explicitly include the notion of data type.
B. Semi-structured, and
35 36
therefore straightforward to analyze. with the formal structure of data models associated with relational
• Structured data conforms to a tabular format with a relationship between databases or other forms of data tables, but nonetheless, contains tags or
the different rows and columns. other markers to separate semantic elements and enforce hierarchies of
data model or is not organized in a pre-defined manner. is one of the most important elements for Big Data analysis and big data
such as dates, numbers, and facts as well. • Metadata is data about data.
• This results in irregularities and ambiguities that make it difficult to • It provides additional information about a specific set of data.
understand using traditional programs as compared to data stored in • metadata is frequently used by Big Data solutions for initial analysis.
structured databases. • In a set of photographs, for example, metadata could describe when and
• Example: Audio, video files or NoSQL databases. where the photos were taken. The metadata then provides fields for dates
and locations which, by themselves, can be considered structured data.
39 40
within a big data system as a series of steps needed to generate value and a data warehouse or any other storage solution on which data analysis can
useful insights from data. be carried out.
• The Big Data Value Chain identifies the following key high-level • Data acquisition is one of the major big data challenges in terms of
• Related areas include data mining, business intelligence, and machine improving the accessibility and quality of data.
• Data curators (also known as scientific curators or data annotators) hold the
learning.
responsibility of ensuring that data are trustworthy, discoverable, accessible,
reusable and fit their purpose.
• A key trend for the duration of big data utilizes community and
crowdsourcing approaches.
43 44
properties that guarantee database transactions lack flexibility with regard to competitiveness through the reduction of costs, increased added
schema changes and the performance and fault tolerance when data volumes value, or any other parameter that can be measured against
and complexity grow, making them unsuitable for big data scenarios. existing performance criteria.
• NoSQL technologies have been designed with the scalability goal in mind
technologies needed to gather, organize, process, and gather that it becomes difficult to process using on-hand database
insights from large datasets. management tools or traditional data processing applications.
and Veracity
47 48
• Volume: large amounts of data Zeta bytes/Massive datasets • Because of the qualities of big data, individual computers are often
inadequate for handling the data at most stages.
• Velocity: Data is live streaming or in motion
• To better address the high storage and computational needs of big
• Variety: data comes in many different forms from diverse sources
data, computer clusters are a better fit.
• Veracity: can we trust the data? How accurate is it? etc. • Big data clustering software combines the resources of many
smaller machines, seeking to provide a number of benefits:
• Resource Pooling
• High Availability
• Easy Scalability
49 50
Clustered Computing and Hadoop Ecosystem Clustered Computing and Hadoop Ecosystem
• Resource Pooling • Using clusters requires a solution for managing cluster membership,
• Combining the available storage space to hold data is a clear benefit, but coordinating resource sharing, and scheduling actual work on
CPU and memory pooling are also extremely important.
• Processing large datasets requires large amounts of all three of these individual nodes.
resources.
• Cluster membership and resource allocation can be handled by
• High Availability software like Hadoop’s YARN (which stands for Yet Another
• Clusters can provide varying levels of fault tolerance and availability Resource Negotiator).
guarantees to prevent hardware or software failures from affecting access
to data and processing. • The assembled computing cluster often acts as a foundation that other
• This becomes increasingly important as we continue to emphasize the
software interfaces with to process the data.
importance of real-time analytics.
• The machines involved in the computing cluster are also typically
• Easy Scalability
involved with the management of a distributed storage system, which
• Clusters make it easy to scale horizontally by adding additional machines
to the group. This means the system can react to changes in resource we will talk about when we discuss data persistence.
requirements without expanding the physical resources on a machine.
51 52
• It is a framework that allows for the distributed processing of large datasets computers can be used for data processing.
across clusters of computers using simple programming models. • Reliable: It is reliable as it stores copies of the data on different
• It is inspired by a technical document published by Google.
machines and is resistant to hardware failure.
• The four key characteristics of Hadoop are:
• Scalable: It is easily scalable both, horizontally and vertically. A
• Economical
few extra nodes help in scaling up the framework
• Reliable
• Flexible: It is flexible and you can store as much structured and
• Scalable
unstructured data as you need to and decide to use them later.
• Flexible
53 54
55 56
Big Data Life Cycle with Hadoop Big Data Life Cycle with Hadoop
• Ingesting data into the system • Computing and analyzing data
• The first stage of Big Data processing is Ingest. • The third stage is to Analyze.
• The data is ingested or transferred to Hadoop from various sources • Here, the data is analyzed by processing frameworks such as Pig,
such as relational databases, systems, or local files. Hive, and Impala.
• Sqoop transfers data from RDBMS to HDFS, whereas Flume • Pig converts the data using a map and reduce and then analyzes it.
transfers event data. • Hive is also based on the map and reduce programming and is most
• Processing the data in storage suitable for structured data.
• The second stage is Processing. • Visualizing the results
• In this stage, the data is stored and processed. • The fourth stage is Access, which is performed by tools such as Hue
• The data is stored in the distributed file system, HDFS, and the
NoSQL distributed data, HBase. and Cloudera Search.
• Spark and MapReduce perform data processing. • In this stage, the analyzed data can be accessed by users.
57 8/8/2021 Fundamental of Information System 58
? CHAPTER THREE
END OF CHAPTER TWO Artificial Intelligence
Next: Chapter Three: Artificial Intelligence
Andualem T.
Artificial Intelligence
Intelligence.
• Machine perception is the ability to use input from sensors (such • Image recognition in photographs
• Spam filtering
as cameras, microphones, sensors, etc.) to deduce aspects of the
• Prediction of judicial decisions and
world. e.g., Computer Vision. • Online advertisements
8/8/2021 Fundamental of Information System 65 8/8/2021 Fundamental of Information System 66
capable of performing tasks that humans are very good at. • Neural networks are biologically inspired networks that extract
• Example: recognizing objects, recognizing and making sense of features from the data in a hierarchical fashion.
speech, and decision making in a constrained environment. • The field of neural networks with several hidden layers is called deep
History of AI History of AI
A. Maturation of Artificial Intelligence (1943-1952) B. The birth of Artificial Intelligence (1952-1956)
• The year 1943: The first work which is now recognized as AI was done by • The year 1955: An Allen Newell and Herbert A. Simon created the
Warren McCulloch and Walter pits in 1943. They proposed a model of "first artificial intelligence program" Which was named "Logic
artificial neurons.
Theorist". This program had proved 38 of 52 Mathematics theorems,
• The year 1949: Donald Hebb demonstrated an updating rule for modifying
and find new and more elegant proofs for some theorems.
the connection strength between neurons. His rule is now called Hebbian
learning. • The year 1956: The word "Artificial Intelligence" first adopted by
• The year 1950: The Alan Turing who was an English mathematician and American Computer scientist John McCarthy at the Dartmouth
pioneered Machine learning in 1950. Conference. For the first time, AI coined as an academic field. At that
• Alan Turing publishes "Computing Machinery and Intelligence" in time high-level computer languages such as FORTRAN, LISP, or
which he proposed a test. The test can check the machine's ability to exhibit COBOL were invented. And the enthusiasm for AI was very high at
intelligent behavior equivalent to human intelligence, called a Turing test.
that time.
History of AI History of AI
C. The golden years-Early enthusiasm (1956-1974) E. A boom of AI (1980-1987)
• The year 1980: After AI winter duration, AI came back with "Expert System".
• The year 1966: The researchers emphasized developing algorithms that can
Expert systems were programmed that emulate the decision-making ability of a
solve mathematical problems. Joseph Weizenbaum created the first chatbot in 1966,
human expert.
which was named as ELIZA.
• In the Year 1980, the first national conference of the American Association of
• The year 1972: The first intelligent humanoid robot was built in Japan which Artificial Intelligence was held at Stanford University.
was named WABOT-1. F. The second AI winter (1987-1993)
D. The first AI winter (1974-1980) • The duration between the years 1987 to 1993 was the second AI Winter
• The duration between the years 1974 to 1980 was the first AI winter duration. AI winter duration.
refers to the time period where computer scientists dealt with a severe shortage of • Again, Investors and government stopped in funding for AI research due to
funding from the government for AI researches. high cost but not efficient results. The expert system such as XCON was very
• During AI winters, an interest in publicity on artificial intelligence was decreased. cost-effective.
8/8/2021 Fundamental of Information System 77 8/8/2021 Fundamental of Information System 78
History of AI History of AI
G. The emergence of intelligent agents (1993-2011) H. Deep learning, big data and artificial general intelligence (2011-
present)
• The year 1997: In the year 1997, IBM Deep Blue beats
• The year 2011: In the year 2011, IBM's Watson won jeopardy, a
world chess champion, Gary Kasparov, and became the
quiz show, where it had to solve complex questions as well as
first computer to beat a world chess champion
riddles.
• The year 2002: for the first time, AI entered the home in
• Watson had proved that it could understand natural language and
the form of Roomba, a vacuum cleaner.
can solve tricky questions quickly.
• The year 2006: AI came into the Business world until the
• The year 2012: Google has launched an Android app feature
year 2006. Companies like Facebook, Twitter, and Netflix
"Google now", which was able to provide information to the user
also started using AI.
as a prediction.
History of AI Levels of AI
• Stage 1 – Rule-Based Systems
H. Deep learning, big data and artificial general intelligence (2011-present)
• Uses rules as the knowledge representation
• The year 2014: In the year 2014, Chatbot "Eugene Goostman" won a
• Is a system that applies human-made rules to store, sort and
competition in the infamous "Turing test" manipulate data. In doing so, it mimics human intelligence.
• The year 2018: The "Project Debater" from IBM debated on complex • It‟s a logical program that uses pre-defined rules to make deductions
and choices to perform automated actions.
topics with two master debaters and also performed extremely well.
• Stage 2 – Context Awareness and Retention
• Google has demonstrated an AI program "Duplex" which was a virtual
• Algorithms that develop information about the specific domain they
assistant and which had taken hair dresser appointment on call, and the are being applied in.
lady on the other side didn't notice that she was talking with the • They are trained on the knowledge and experience of the best
humans, and their knowledge base can be updated as new situations
machine.
and queries arise.
• Eg. chatbots and “robo advisors”
8/8/2021 Fundamental of Information System 81 8/8/2021 Fundamental of Information System 82
Levels of AI Levels of AI
• Stage 3 – Domain-Specific Expertise • Stage 5 – Self Aware Systems / Artificial General Intelligence (AGI)
• Expertise and Domain Specific Knowledge. • These systems have human-like intelligence
• Going beyond the capability of humans • AGI is the intelligence of a machine that has the capacity to understand or
• These systems build up expertise in a specific context taking in learn any intellectual task that a human being can.
massive volumes of information which they can use for decision
making. • Stage 6 – Artificial Superintelligence (ASI)
• Eg. AlphaGo • AI algorithms can outsmart even the most intelligent humans in every
• Stage 4 – Reasoning Machines domain.
• These algorithms have some ability to attribute mental states to themselves • Logically it is difficult for humans to articulate what the capabilities might
and others – they have a sense of beliefs, intentions, knowledge, and how be, yet we would hope examples would include solving problems we have
their own logic works. failed to so far, such as world hunger and dangerous environmental change.
• This means they could reason or negotiate with humans and other • A few experts who claim it can be realized by 2029.
machines. • Fiction has tackled this idea for a long time, for example in the film Ex
• At the moment these algorithms are still in development, however, Machina or Terminator.
commercial applications are expected within the next few years
Levels of AI Levels of AI
• Stage 7 –Singularity and Transcendence
• This leads to a massive expansion in human capability.
• Human augmentation could connect our brains to each other and to a future
successor of the current internet, creating a “hive mind” that shares ideas,
solves problems collectively, and even gives others access to our dreams as
observers or participants.
• Pushing this idea further, we might go beyond the limits of the human
body and connect to other forms of intelligence on the planet – animals,
plants, weather systems, and the natural environment.
• Some proponents of singularity such as Ray Kurzweil, Google‟s Director
of Engineering, suggest we could see it happen by 2045 as a result of
exponential rates of progress across a range of science and technology
disciplines.
• The other side of the fence argues that singularity is impossible and human
consciousness could never be digitized
8/8/2021 Fundamental of Information System 85 8/8/2021 Fundamental of Information System 86
• Artificial Intelligence can be divided into various types, these are 1. Weak AI or Narrow AI:
• Based on Capabilities and • Is a type of AI which is able to perform a dedicated task with intelligence.
• cannot perform beyond its field or limitations, as it is only trained for one
• Based on Functionality
specific task.
2. General AI
3. Super AI
• Is a level of Intelligence of Systems at which machines could surpass human
• Is a type of intelligence that could perform any intellectual task with
intelligence, and can perform any task better than a human with cognitive
efficiency like a human.
properties.
• The idea behind the general AI to make such a system that could be
• This refers to aspects like general wisdom, problem solving and creativity.
smarter and think like a human on its own.
• It is an outcome of general AI.
• Currently, there is no such system exists which could come under general
• Some key characteristics of strong AI include capability include the ability to
AI and can perform any task as perfect as a human.
think, to reason solve the puzzle, make judgments, plan, learn, and
• It may arrive within the next 20 years communicate on its own.
• As systems with general AI are still under research, and it will take lots of • Super AI is still a hypothetical concept of Artificial Intelligence.
effort and time to develop such systems. • The development of such systems in real is still a world-changing task.
8/8/2021 Fundamental of Information System 89 8/8/2021 Fundamental of Information System 90
• Do not store memories or past experiences for future actions • These machines can use stored data for a limited time period only.
• Only focus on current scenarios and react on it as per possible best • As the name suggests they have limited memory or short-lived
action. memory
• Eg. IBM's Deep Blue system and Google's AlphaGo • Eg. Self-driving cars : can store the recent speed of nearby cars, the
• Still not developed • Interpret and evaluate the input that is received from the
• In AI models, this stage is represented by the sensing layer, which • The emergence of data science
perceives information from the surrounding environment. • The goal of data science is to extract knowledge or insights from data in
various forms, either structured or unstructured, which is like data mining.
• Eg: Sensors like voice recognition and visual imaging recognition
Sample AI Application
?
• Commuting • Online Shopping
• Googles AI-powered predictions
• Search (Amazon)
• Ridesharing Apps like Uber
Contents
Architecture of IOT
• They act as defining instruments that transform from standard passive network
of device in to an active system cabling of real world integration.
8/8/2021 Fundamental of Information System 103 8/8/2021 Fundamental of Information System 104
• IOT introduce a new paradigm for active content , product ,or 1. According to the internet architecture boards definition :-
service engagement rather than passive engagement. • IOT is networking of smart objects, means a huge number of devices
intelligently communicating in the presence of internet protocol that cannot
• Small device be directly operated by human beings but exist as components in building
• Those devices has become smaller, cheaper and more vehicles or the environment.
powerful over time so IOT exploits purpose built small 2. According to the internet engineering task force (IETF) organizations
• IOT is the networking of smart objects in which smart objects have some
devices to deliver its precision, scalability, and versatility.
constraints such as limited bandwidth ,power, and processing accessibility for
achieving interoperability among smart objects.
8/8/2021 Fundamental of Information System 105 8/8/2021 Fundamental of Information System 106
form of machine to machine (M2M)communication in the cloud. • Is also a system of interrelated computing devices, mechanical and
4. According to the oxfords definition digital machines, objects, animals or people that are provided with
• IOT is the interaction of everyday objects computing devices through unique identifiers and the ability to transfer data over a network
the internet that enables the sending and receiving of useful data. without requiring human-to-human or human-to-computer interaction
• The term Internet of things defines according to the 2020 conceptual
• IOT is a network of devices that can sense, accumulate and transfer
frame work is expressed through simple formula such as:-
data over the internet without any human intervention.
IOT=services + data +networks + sensors
8/8/2021 Fundamental of Information System 107 8/8/2021 Fundamental of Information System 108
• E.g. Ring, a doorbell that links to your smartphone, provides an excellent • In connected building and campus
example of a recent addition to the Internet of Things means Ring signals you
• In the health care
when the doorbell is pressed and lets you see who it is and to speak with
them. • In Logistics and other domains
8/8/2021 Fundamental of Information System 109 8/8/2021 Fundamental of Information System 110
8/8/2021 Fundamental of Information System 111 8/8/2021 Fundamental of Information System 112
History of IOT
History of IOT • The traditional fields of automation (including the automation of
• The Internet of Things has not been around for very long.
buildings and homes), wireless sensor networks, GPS, control systems,
• since the early 1800s there have been visions of machines communicating with one
and others, all support the IoT.
another.
• In 1830s and 1840s Machines have been providing direct communications since the • Kevin Ashton, the Executive Director of Auto-ID Labs at MIT, was the
telegraph (the first landline) was developed. first to describe the Internet of Things, during his 1999 speech.
• In June 3, 1900, Described as “wireless telegraphy,” the first radio voice transmission
• Kevin Ashton stated that Radio Frequency Identification (RFID) was a
took place, providing another necessary component for developing the Internet of
Things. prerequisite for the Internet of Things. He concluded if all devices were
• In 1950s The development of computers began . “tagged,” computers could manage, track, and inventory them.
• In 1962 The Internet, itself a significant component of the IOT, started out as part of
• To some extent, the tagging of things has been achieved through
DARPA (Defense Advanced Research Projects Agency).
technologies such as digital watermarking, barcodes, and QR codes.
• In 1969 evolved into ARPANET.
8/8/2021 Fundamental of Information System 113 8/8/2021 Fundamental of Information System 114
8/8/2021 Fundamental of Information System 115 8/8/2021 Fundamental of Information System 116
• Since there‟s no international standard of compatibility for IoT, it‟s difficult • Privacy − The sophistication of IoT provides substantial personal
for devices from different manufacturers to communicate with each other. data in extreme detail without the user's active participation.
• Enterprises may eventually have to deal with massive numbers maybe even
• Flexibility − Many are concerned about the flexibility of an IoT
millions of IoT devices and collecting and managing the data from all those
system to integrate easily with another. They worry about finding
devices will be challenging.
themselves with several conflicting or locking systems.
8/8/2021 Fundamental of Information System 117 8/8/2021 Fundamental of Information System 118
issue of compliance seem incredibly challenging when many • Sometimes, these devices communicate with other related devices and act on
consider standard software compliance a battle. the information they get from one another Those devices do most of the work
without human intervention, although people can interact with the devices.
• For instance, to set them up, give them instructions or access the data.
8/8/2021 Fundamental of Information System 119 8/8/2021 Fundamental of Information System 120
Architecture of IoT
• In general, an IoT device can be explained as a network of things
• Sensing
• Network
• Application layers
8/8/2021 Fundamental of Information System 121 8/8/2021 Fundamental of Information System 122
• Example on actuator is shut off a power supply, adjust an airflow valve, • For instance, environment sensors are used in many applications to improve user
or move a robotic gripper in an assembly process. experience, home automation systems, smart locks, smart lights,
8/8/2021 Fundamental of Information System 123 8/8/2021 Fundamental of Information System 124
C. Position sensors
3. Data Processing Layer
• Deal with the physical position and location of the device.
• The most common position sensors used in IoT devices are Magnetic sensors and • Consists of the main data processing unit of IoT devices
Global Positioning System (GPS) sensors.
• It takes data collected in the sensing layer and analyses the data to
• Magnetic sensors are usually used as digital compass and help to fix the
make decisions based on the result.
orientation of the device display
• Global Positioning System is used for navigation purposes in IoT devices. • In some IoT devices (e.g., smartwatch, smart home hub, etc.), the data
• Healthcare, etc. • Industrial and Enterprise IoT devices include smart meters, commercial security
systems and smart city technologies such as those used to monitor traffic and
weather conditions
8/8/2021 Fundamental of Information System 127 8/8/2021 Fundamental of Information System 128
1. IoT Based Smart Home • Smart Home Appliances: Refrigerators with LCD screen telling
• Smart Home initiative allows subscribers to remotely manage and what‟s inside, food that‟s about to expire, ingredients you need to buy
monitor different home devices from anywhere via smartphones or over and with all the information available on a smartphone app and also
the web with no physical distance limitations.
washing machine.
• These “smart” devices have the potential to share information with each
• Safety Monitoring: cameras, and home alarm systems making people
other given the permanent availability to access the broadband internet
connection. feel safe in their daily life at home.
• Components those are included in smart home development • Intrusion Detection Systems: Detection of window and door
• Remote Control Appliances: Switching on and off remotely openings and violations to prevent intruders.
appliances to avoid accidents and save energy.
• Energy and Water Use: Energy and water supply consumption
• Weather: Displays outdoor weather conditions such as humidity,
monitoring to obtain advice on how to save cost and resources, &
temperature, pressure, wind speed and rain levels with the ability to
transmit data over long distances. many more.
8/8/2021 Fundamental of Information System 131 8/8/2021 Fundamental of Information System 132
management, traffic management, and security, sharing the benefits of this production of fruits and vegetables and its quality.
technology throughout society. • Compost: Control of humidity and temperature levels in alfalfa, hay, straw,
• Components those are included in smart city development etc. to prevent fungus and other microbial contaminants.
• Structural Health: Monitoring of vibrations and material conditions in • Offspring Care: Control of growing conditions of the offspring in animal
buildings, bridges and historical monuments. farms to ensure its survival and health.
• Lightning: intelligent and weather adaptive lighting in street lights. • Field Monitoring: Reducing spoilage and crop waste with better monitoring,
• Smart Parking: Real-time monitoring of parking spaces available in the city accurate ongoing data obtaining, and management of the agriculture fields,
making residents able to identify and reserve the closest available spaces including better control of fertilizing, electricity and watering.
• Waste Management: Detection of rubbish levels in containers to optimize the trash • Animal Farming/Tracking: Location and identification of animals grazing in open
collection routes. Garbage cans and recycle bins with RFID tags allow the sanitation pastures or location in big stables, Study of ventilation and air quality in farms and
staff to see when garbage has put out. detection of harmful gases from excrements.
8/8/2021 Fundamental of Information System 133 8/8/2021 Fundamental of Information System 134
CHAPTER 5
AUGMENTED REALITY (AR)
?
END OF CHAPTER FOUR
Next: Chapter Five: Augmented Reality
Andualem T.
8/8/2021 Fundamental of Information System 135 8/8/2021 Fundamental of Information System 136
Introduction to AR Introduction to AR
¨ The idea of AR is to combine or mix the view of the real ¨ Through augmented vision, the information about the
environment with additional virtual content that is presented surrounding real world helps the user can digitally interact
through computer graphics. with and adjust information about their surrounding
¨ Augmented reality (AR) is a form of emerging technology that environment.
allows users to overlay computer generated virtual graphical
¨ Augmented reality is the integration of digital
content in the real world.
information with the user's environment in real time.
¨ AR refers to a live view of a physical real-world environment
¨ Example: Snapchat
whose elements are merged with augmented computer-
generated images creating a mixed reality.
8/8/2021 Fundamental of Information System 137 8/8/2021 Fundamental of Information System 138
8/8/2021 Fundamental of Information System 139 8/8/2021 Fundamental of Information System 140
8/8/2021 Fundamental of Information System 143 8/8/2021 Fundamental of Information System 144
AR vs VR vs MR Architecture of AR Systems
¨ Virtual Reality: VR is content which is 100% digital ¨ The first Augmented Reality Systems (ARS) were
8/8/2021 Fundamental of Information System 147 8/8/2021 Fundamental of Information System 148
8/8/2021 Fundamental of Information System 151 8/8/2021 Fundamental of Information System 152
Applications of AR Systems
?
3. AR in Entertainment: AR could be used in various
entertainment activities.
¨ Games
¨ Music
¨ Tv
END OF CHAPTER FIVE
Next: Chapter Six:
¨ esports
¨ theater
Outline
qTechnology and ethics
qNew ethical questions
8/8/2021 Fundamental of Information System 159 8/8/2021 Fundamental of Information System 160
General ethical principles Professional responsibilities
1. Contribute to society and to human well-being, 1. Strive to achieve high quality in both the processes and
acknowledging that all people are stakeholders in computing. products of professional work.
2. Avoid harm. 2. Maintain high standards of professional competence, conduct,
3. Be honest and trustworthy. and ethical practice.
4. Be fair and take action not to discriminate 3. Know and respect existing rules pertaining to professional
5. Respect the work required to produce new ideas, inventions, work.
creative works, and computing artifacts. 4. Accept and provide appropriate professional review.
6. Respect privacy. 5.Give comprehensive and thorough evaluations of computer
7. Honor confidentiality systems and their impacts, including analysis of possible risks.
6. Perform work only in areas of competence.
7. Foster public awareness and understanding of computing,
related technologies, and their consequences.
8/8/2021 Fundamental of Information System 161 8/8/2021 Fundamental of Information System 162
Digital privacy
8/8/2021 Fundamental of Information System 163 8/8/2021 Fundamental of Information System 164
Information Privacy
vDigital Privacy is the protection of personally identifiable or
vInformation privacy is the notion that individuals should have
business identifiable information that is collected from
respondents through information collection activities or from the freedom, or right, to determine how their digital information,
other sources. mainly that pertaining to personally identifiable information, is
collected and used.
vIt is a collective definition that encompasses three sub-related
v Every country has various laws that dictate how information
categories; information privacy, communication privacy, and
individual privacy. may be collected and used by companies. Some of those laws
are written to give agency to the preferences of
vIt is often used in contexts that promote advocacy on behalf of
individuals/consumers in how their data is used.
individual and consumer privacy rights in digital spheres, and is
v In other places, like in the United States, privacy law is argued
typically used in opposition to the business practices of many e-
marketers/businesses/companies to collect and use such by some to be less developed in this regard,
information and data. vFor example, some legislation, or lack of, allows companies to
self-regulate their collection and dissemination practices of
consumer information.
8/8/2021 Fundamental of Information System 165 8/8/2021 Fundamental of Information System 166
8/8/2021 Fundamental of Information System 167 8/8/2021 Fundamental of Information System 168
Individual Privacy Some digital privacy principles
vIndividual privacy is the notion that individuals have a right to v Data Minimization: collect the minimal amount of
exist freely on the internet, in that they can choose what types information necessary from individuals and businesses
of information they are exposed to, and more importantly that consistent with the Department‟s mission and legal
unwanted information should not interrupt them. requirements.
vAn example of a digital breach of individual privacy would be v Transparency: Notice covering the purpose of the collection
an internet user receiving unwanted ads and emails/spam, or a and use of identifiable information will be provided in a clear
computer virus that forces the user to take actions they manner. Information collected will not be used for any other
otherwise wouldn't. purpose unless authorized or mandated by law.
vIn such cases the individual, during that moment, doesn't exist vAccuracy: Information collected will be maintained in a
digitally without interruption from unwanted information; thus, sufficiently accurate, timely, and complete manner to ensure
their individual privacy has been infringed upon. that the interests of the individuals and businesses are protected.
vSecurity: Adequate physical and IT security measures will be
implemented to ensure that the collection, use, and maintenance
of identifiable information are properly safeguarded and the
information is promptly destroyed in accordance with approved
records control schedules.
8/8/2021 Fundamental of Information System 169 8/8/2021 Fundamental of Information System 170
Accountability and trust Treats and challenges
vEmerging technologies can provide improved accuracy, Ethical and regulatory challenges
better quality and cost efficiencies for businesses in vAs security professionals, we need to keep pace with ever-
every sector. changing technology and be aware of the AI, IoT, Big Data,
v They can enhance trust in the organization‟s operations Machine Learning, etc.
and financial processes, which is crucial for sustainable vGrowing needs Cyber & Data Security is getting prominence
success. But this can produce a paradox: the very that requires security practitioners to focus on the business
solutions that can be used to better manage risk, increase need for securing data, understanding security and risk from a
transparency and build confidence are often themselves business perspective by extensively interacting with the
the source of new risks, which may go unnoticed. business community in understanding their requirements or
vThe obligation of an individual or organization to what they want.
account for its activities, accept responsibility for them, vEmerging technologies are already impacting how we live and
and to disclose the results in a transparent manner. It work.
also includes the responsibility for money or other v They're also changing how we approach, plan, and integrate
entrusted property. security operations.
vFor security, both physical and cyber, the equation is the same
catalyzing many new potential applications for emerging
Cont.… Cont.…
8/8/2021 Fundamental of Information System 171 8/8/2021 Fundamental of Information System 172
Emerging technologies are making an impact include: 8. Situational awareness capabilities via GPS for disaster
1. Counter-terrorism and law enforcement informatics via response and crisis response scenarios
predictive analytics and artificial intelligence. 9. Biometrics: assured identity security screening solutions by
2. Real-time horizon scanning and data mining for threats and bio-signature: (every aspect of your physiology can be used as a
information sharing bio-signature. Measure unique heart/pulse rates,
3. Automated cyber security and information assurance electrocardiogram sensor, blood oximetry, skin temperature)
4. Enhanced Surveillance (chemical and bio-detection sensors, 10. Robotic Policing (already happening in Dubai!)
cameras, drones, facial recognition, license plate readers)
5. Simulation and augmented reality technologies for training and
modeling
6. Safety and security equipment (including bullet and bomb
proof) made with lighter and stronger materials
7. Advanced forensics enabled by enhanced computing
capabilities (including future quantum computing)
8/8/2021 Fundamental of Information System 173 8/8/2021 Fundamental of Information System 174
Challenges in using Artificial Intelligence Challenges in using Robotics in manufacturing
vAI is only as good as the data it is exposed to, which is where
vWith automation and robotics moving from production lines
certain challenges may present themselves.
out into other areas of work and business, the potential for
vAlternatively, AI also has the potential to take the burden of humans losing jobs is great here too.
laborious and time-consuming tasks from these people, freeing
vAs automation technologies become more advanced, there will
up their time and brainpower for other things e.g. doctors using
be a greater capability for automation to take over more and
diagnostic AI to help them diagnose patients will analyze the
more complex jobs.
data presented by the AI and make the ultimate decision.
vAs robots learn to teach each other and themselves, there is the
vManaging the challenges posed by AI will require careful
potential for much greater productivity but this also raises
planning to ensure that the full benefits are realized and risks
ethical and cyber security concerns.
are mitigated.
8/8/2021 Fundamental of Information System 175 8/8/2021 Fundamental of Information System 176
Challenges in using the Internet of Things Challenges in Big Data
vAlmost all the technologies mentioned above have some
vAs more and more connected devices (such as smart watches
and fitness trackers) join the Internet of Things (IoT) the relation to Big Data.
amount of data being generated is increasing. vThe huge amount of data being generated on a daily basis has
vCompanies will have to plan carefully how this will affect the
the potential to provide businesses with better insight into their
customers as well as their own business operations.
customer-facing application and how to best utilize the masses
of data being produced. vAlthough data can be incredibly useful for spotting trends and
analyzing impacts, surfacing all this data to humans in a way
vThere are also severe security implications of mass
that they can understand can be challenging. AI will play a role
connectivity that need to be addressed.
here.
8/8/2021 Fundamental of Information System 177 8/8/2021 Fundamental of Information System 178
Treats Some risks of emerging technology are:
vNew and emerging technologies pose significant opportunities vDriverless car:
for businesses if they utilize them well and understand their true
üwhile a compelling option for future fleer cars, companies could
value early on. crash and burn from claims related to bodily injury and property
v They also pose risks and questions not only to business but to damage.
society as a whole. vWearables:
v Planning for how to deal with these emerging technologies and üGoogle glass, Fitbit and other wearables can expose companies
where value can be derived while assessing potential risks to the invasion of privacy claims that may not be covered by
before they become a fully-fledged reality is essential for general liability or personal injury claims that weren‟t foreseen.
businesses that want to thrive in the world of AI, Big Data and vDrones:
IoT. üTurbulence is in the offing for manufacturers and organizations
that fail to protect themselves for property damage and bodily
injury, as well as errors and omissions.
vInternet of things:
üThe proliferation of sensors and cross-platform integration
creates potential exposure from privacy invasion, bodily injury
and property damage that may connect an organization to huge
liabilities.
8/8/2021 Fundamental of Information System 179
Questions