IT - Hype

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 9

The field of human augmentation (sometimes referred to as Human 2.

0) focuses on creating cognitive and physical improvements as an integral part of the human body. An example is using active control systems to create limb prosthetics with characteristics that can exceed the highest natural human performance.
Nobody would argue against a treatment that restores normal function to a sick or disabled individual. But the consequences of going further than thatgoing beyond normalare not commonly studied, nor endorsed by many in medicine. Indeed, in any medical procedure, there is risk. If you are already normal, then conventional wisdom dictates that thats enough. Do no harm, the old aphorism sayswe should focus on altering the body and mind only when the risk of the alteration is justified, preferably by the hope of solving a deficit of vastly greater magnitude. Human enhancement refers to any attempt to temporarily or permanently overcome the current limitations of the human body through natural or artificial means. The term is sometimes applied to the use of technological means to select or alter human characteristics and capacities, whether or not the alteration results in characteristics and capacities that lie beyond the existing human range. Here, the test is whether the technology is used for non-therapeutic purposes. Some bioethicists restrict the term to the non-therapeutic application of specific technologies neuro-, cyber-, gene-, and nano-technologies to human biology.[

Automatic content recognition (ACR) refers to the ability of a client application (typically a smartphone or media tablet app) to identify a content element within its proximity _ audio, video or digital image _ based on sampling a portion of the audio or video (or image), processing the sample and comparing it with a source service that identifies content by its unique characteristics such as audio or video fingerprints or watermarks. Automatic Content Recognition is fast becoming a very big issue in the entertainment industry. Intrasonics has an extensive history and track record using our embedded audio code technology to enable smartphone apps to uniquely identify a broadcast show. And we don't just identify the show or the particular episode, we identify the precise time point that the viewer has reached within that show, whether watching or listening live or via a catch-up service.

An autonomous car, also known as a robotic car, or informally as driverless or self-driving, is an autonomous vehicle capable of fulfilling the human transportation capabilities of a traditional car. As an autonomous vehicle, it is capable of sensing its environment and navigating without human input.[3] Robotic cars exist mainly as prototypes and demonstration systems, but are likely to become more widespread in the near future. Autonomous vehicles sense their surroundings with such techniques as radar, lidar, GPS, and computer vision. Advanced control systems interpret sensory information to identify appropriate navigation paths, as well as obstacles and relevant signage.[4] Some autonomous vehicles update their maps based on sensory input, allowing the vehicles to keep track of their position even when conditions change or when they enter uncharted environments.

Vehicular automation involves the use of mechatronics and artificial intelligence to assist a vehicle's operator. These features and the vehicles employing them may be labeled as intelligent or smart. A vehicle using automation for difficult tasks, especially navigation, may be referred to as semiautonomous. A vehicle relying solely on automation is consequently referred to as robotic or autonomous. After the invention of the integrated circuit, the sophistication of automation technology increased. Manufacturers and researchers subsequently added a variety of automated functions to automobiles and other vehicles.

A 3D scanner is a device that analyzes a real-world object or environment to collect data on its shape and possibly its appearance (i.e. color). The collected data can then be used to construct digital, three dimensional models. The "picture" produced by a 3D scanner describes the distance to a surface at each point in the picture. This allows the three dimensional position of each point in the picture to be identified. Many different technologies can be used to build these 3D scanning devices; each technology comes with its own limitations, advantages and costs. Collected 3D data is useful for a wide variety of applications. These devices are used extensively by the entertainment industry in the production of movies and video games.

A mobile robot is an automatic machine that is capable of movement in any given environment

Mobile robots have the capability to move around in their environment and are not fixed to one physical location. Mobile robots are a major focus of current research and almost every major university has one or more labs that focus on mobile robot research. Mobile robots are also found in industry, military and security environments. Silicon Anode Batteries
Silicon anode batteries are an extension of widely used lithium ion (Li-Ion) batteries. Early generation Li-Ion batteries used lithium as the anode material. This was replaced with carbon/graphite following a number of widely reported overheating and explosion incidents. Nextgeneration Li-Ion batteries are likely to make use of silicon anodes that utilize silicon nanotubes, or a comparable coating process. This will result in significantly higher energy storage and longer battery life.

An entirely new domain of computation which makes direct use of quantum mechanical phenomena to perform operations on data.

Gamification is the use of game thinking and game mechanics in a non-game context to engage users and solve problems.[1][2][3] Gamification is used in applications and processes to improve user engagement, return on investment, data quality, timeliness, and learning.[4] The word was coined by Nick Pelling, a British-born computer programmer and inventor

Gamification techniques strive to leverage people's natural desires for competition, achievement, status, self-expression, altruism, and closure. A core gamification strategy is rewards for players who accomplish desired tasks. Competition is another element of games that can be used in gamification. Making the rewards for accomplishing tasks visible to other players or providing leader boards are ways of encouraging players to compete. Another approach to gamification is to make existing tasks feel more like games.Some techniques used in this approach include adding meaningful choice, onboarding with a tutorial, increasing challenge, and adding narrative. Gamification has been widely applied in marketing. Over 70% of Forbes Global 2000 companies plan to use gamification for the purposes of marketing and customer retention

Big data refers to datasets whose size is beyond the ability of typical database software tools to capture, store, manage, and analyse. It is an opportunity to find insights in new and emerging types of data and content, to make a business more agile, and to answer questions that were previously considered beyond reach. Machine-generated data is produced in much larger quantities than non-traditional data. For instance, a single jet engine can generate 10TB of data in 30 minutes. With more than 25,000 airline flights per day, the daily volume of just this single data source runs into the Petabytes. Smart meters and heavy industrial equipment like oil refineries and drilling rigs generate similar data volumes, compounding the problem. Velocity Social media data streams while not as massive as machine-generated data produce a large influx of opinions and relationships valuable to customer relationship management. Even at 140 characters per tweet, the high velocity (or frequency) of Twitter data ensures large volumes (over 8 TB per day). Variety Traditional data formats tend to be relatively well defined by a data schema and change slowly. In contrast, non-traditional data formats exhibit a dizzying rate of change. As new services are added, new sensors deployed, or new marketing campaigns executed, new data types are needed to capture the resultant information. Value

The economic value of different data varies significantly. Typically there is good information hidden amongst a larger body of non-traditional data; the challenge is identifying what is valuable and then transforming and extracting that data for analysis.

A wireless power supply facilitates the charging or direct powering of electrical and electronic equipment using inductive or radio frequency (RF) energy transfer. Inductive systems are preferred for short ranges (a few centimeters) and can provide very high levels of power equaling several thousand watts or more. RF power transfer operates over longer distances (tens or hundreds of meters or more) and provides more modest levels of power (a few milliwatts or less). Wireless power or wireless energy transmission is the transmission of electrical energy from a power source to an electrical load without man-made conductors. Wireless transmission is useful in cases where interconnecting wires are inconvenient, hazardous, or impossible. The problem of wireless power transmission differs from that of wireless telecommunications, such as radio. In the latter, the proportion of energy received becomes critical only if it is too low for the signal to be distinguished from the background noise.[1] With wireless power, efficiency is the more significant parameter. A large part of the energy sent out by the generating plant must arrive at the receiver or receivers to make the system economical. The most common form of wireless power transmission is carried out using direct induction followed by resonant magnetic induction. Other methods under consideration are electromagnetic radiation in the form of microwaves or lasers[2] and electrical conduction through natural media

Cloud computing has evolved in recent years. The new world of the hybrid cloud is an environment that employs both private and public cloud services. Companies are realizing that they need many different types of cloud services in order to meet a variety of customer needs. The growing importance of hybrid cloud environments is transforming the entire computing industry as well as the way businesses are able to leverage technology to innovate. Economics and speed are the two greatest issues driving this market change. There are two primary deployment models of clouds: public and private. Most organizations will use a combination of private computing resources (data centers and private clouds) and public services, where some of the services existing in these environments touch each other this is the hybrid cloud environment.

The Internet of Things refers to uniquely identifiable objects and their virtual representations in an Internet-like structure. Radio-frequency identification (RFID) is often seen as a prerequisite for the Internet of Things. If all objects and people in daily life were equipped with identifiers, they could be managed and inventoried by computers.[3][4] Tagging of things may be achieved through such technologies as near field communication, barcodes, QR codes and digital watermarking. Equipping all objects in the world with minuscule identifying devices could be transformative of daily life. For instance, business may no longer run out of stock or generate waste products, as involved parties would know which products are required and consumed. One's ability to interact with objects could be altered remotely based on immediate or present needs, in accordance with existing end-user agreements "We have a clear vision to create a world where every object - from jumbo jets to sewing needles is linked to the Internet. Compelling as this vision is, it is only achievable if this system is adopted by everyone everywhere. Success will be nothing less than global adoption. According to ABI Research more than 30 billion devices will be wirelessly connected to the Internet of Things (Internet of Everything) by 2020.[11] Cisco created a dynamic "connections counter" to track the estimated number of connected things from July 2013 until July 2020 (methodology included)

A)Predictive Analytics:Predictive analytics encompasses a variety of techniques from statistics, modeling, machine learning, and data mining that analyze current and historical facts to make predictions about future, or otherwise unknown, events. Advantages: Predictive analytics is used in actuarial science, marketing, financial services, insurance, telecommunications, retail, travel, healthcare, pharmaceuticals and other fields. Applications: 3.1 Analytical customer relationship management (CRM) 3.2 Clinical decision support systems 3.3 Collection analytics 3.4 Cross-sell 3.5 Customer retention 3.6 Direct marketing 3.7 Fraud detection 3.8 Portfolio, product or economy-level prediction 3.9 Risk management 3.10 Underwriting

B) Speech Recognition:Speech recognition (SR) is the translation of spoken words into text.

Applications : 1.1 Healthcare 1.2 Military 1.2.1 High-performance fighter aircraft 1.2.2 Helicopters 1.2.3 Training air traffic controllers 1.3 Telephony and other domains

C)Consumer Telematics typically is any integrated use of telecommunications and informatics, also known as ICT (Information and Communications Technology). Applications :Hence the application of telematics is with any of the following: The technology of sending, receiving and storing information via telecommunication devices in conjunction with affecting control on remote objects. The integrated use of telecommunications and informatics, for application in vehicles and with control of vehicles on the move. Most narrowly, the term has evolved to refer to the use of such systems within road vehicles, in
which case the termvehicle telematics may be used for following things
o o o o o o o o o o o o 3.1 Vehicle tracking 3.2 Trailer tracking 3.3 Container tracking 3.4 Cold store 3.5 Fleet management 3.6 Satellite navigation 3.7 Mobile data 3.8 Wireless vehicle safety communications 3.9 Emergency warning system for vehicles 3.10 Intelligent vehicle technologies 3.11 Car clubs 3.12 Auto insurance

D) Home Health Monitoring Technology :Using wireless technology, a central computer hub captures data on weight, blood pressure, cholesterol and more and transmits it to a command and control center where the data can be analyzed and checked for any medical response that might be needed. E) Machine to machine (M2M) refers to technologies that allow both wireless and wired systems to communicate with other devices of the same type. Applications :Below are a few 'emerging segments' that are gaining growth benefits through leveraging M2M solutions: Telecommunication - IP Internetworking / Wireless WAN / Mobile Learning

Manufacturing - Supply Chain / Inventory Management / Factory Automation Light Industrial - Sensor Monitoring / Remote Access Control / Utilities Transportation - Asset Tracking / Logistics Management Retail - Point-of-Sale / Kiosk / Digital Content Signage Telematics - Aftermarket / In-Vehicle Solutions e-Business / m-Business Solutions Real Estate - Building Automation Security - Video Surveillance

The benefits of M2M : These are just some of the benefits that are gained through leveraging M2M to solve business challenges: Cost-effective preventive maintenance and Quality of Service Fast response through outsourcing troubleshooting Centralized service support and data management On-going revenues throughout product lifecycle Increased revenues from minimized downtime Remote diagnostics and Real-time statistion

What makes up an M2M solution? Usually an M2M solution is made up of several components: Device(s) or sensor(s) to collect data and/or monitor changes. An application and database to process the data sent and received. A central server to send and / or receive data transmitted by the device(s) or sensor(s). Connectivity (either fixed line or wireless) to connect the device or sensor to a central server. A modem to allow data exchange between the device(s) or sensor(s) and the central server. An application to ensure security of the data transmitted and to monitor and manage the connectivity to the device or sensor network.

What are the benefits of wireless M2M? Flexibility Devices that are wirelessly connected to a network are not limited to a physical location. This gives you the flexibility to move them should you need to, for example if a vending machine is not getting much footfall and therefore revenue in one location, you can simply place it elsewhere. Devices in remote locations where its difficult to run cables can also be attached to a wireless network quickly and easily. Mobility Mobile devices can connect into a network, which is not possible with a fixed line network, allowing data communication with all devices. Access to information Wireless networks deliver real-time information to mobile devices enabling information to be

received or sent whenever and wherever it is required, so organizations have access to live information for effective and fast decision-making. Independent network A wireless network can be quickly and easily deployed into a building or location without the need for integration with the existing fixed line network, thereby delivering an independent secure network. Speed A wireless network can be deployed much more quickly than a fixed network as no cabling is needed between devices. This in allows devices to be active more quickly and can provide cost savings. Cost There are cost savings related to the speed of deployment, the elimination of cabling costs, and the reduction in communication costs, as CDMA - cellular is more cost effective than PSTN/fixed line.

F) Social analytics is monitoring, analyzing, measuring and interpreting digital interactions and relationships of people, topics, ideas and content. Interactions occur in workplace and externalfacing communities. Social analytics include sentiment analysis, natural-language processing and social networking analysis (influencer identification, profiling and scoring), and advanced techniques such as text analysis, predictive modeling and recommendations, and automated identification and classification of subject/topic, people or content.

G)Complex event processing, or CEP, is event processing that combines data from multiple sources to infer events or patterns that suggest more complicated circumstances. The goal of complex event processing is to identify meaningful events (such as opportunities or threats) and respond to them as quickly as possible. These events may be happening across the various layers of an organization as sales leads, orders or customer service calls. Or, they may be news items,[4] text messages, social media posts, stock market feeds, traffic reports, weather reports, or other kinds of data. Example of CEP involves a car, some sensors and various events and reactions. Imagine that a car has several sensorsone that measures tire pressure, one that measures speed, and one that detects if someone sits on a seat or leaves a seat. In the first situation, the car is moving and the pressure of one of the tires moves from 45 psi (pound per square inch) to 41 psi over 15 minutes. As the pressure in the tire is decreasing, a series of events containing the tire pressure is generated. In addition, a series of events containing the speed of the car is generated. The car's Event Processor may detect a situation whereby a loss of tire pressure over a relatively long period of time results in the creation of the "lossOfTirePressure" event. This new event may trigger a reaction process to note the pressure loss into the car's maintenance log, and alert the driver via the car's portal that the tire pressure has reduced.

In the second situation, the car is moving and the pressure of one of the tires drops from 45 psi to 20 psi in 5 seconds. A different situation is detectedperhaps because the loss of pressure occurred over a shorter period of time, or perhaps because the difference in values between each event were larger than a predefined limit. The different situation results in a new event "blowOutTire" being generated. This new event triggers a different reaction process to immediately alert the driver and to initiate onboard computer routines to assist the driver in bringing the car to a stop without losing control through skidding. Most CEP solutions and concepts can be classified into two main categories: Computation-oriented CEP: A computation-oriented CEP solution is focused on executing on-line algorithms as a response to event data entering the system. A simple example is to continuously calculate an average based in data on the inbound events. Detection-oriented CEP : Detection-oriented CEP is focused on detecting combinations of events called events patterns or situations. A simple example of detecting a situation is to look for a specific sequence of events.

You might also like