It is the delivery of computing services including servers, storages, databases, networking, software, analytics, and intelligence - over the internet to offer faster innovation, flexible resources, and economies of scale.
Benefits of Cloud Computing: Cost, Speed, Global Scale, Productivity, Performance, Reliability, Security
Types of Cloud Computing: Public, Private, Hybrid
Types of Cloud Services: IaaS (Infrastructure as a Service), PaaS (Platform as a Service), Serverless, SaaS (Software as a Service)
Internet of Things (IoT)
Refers to the billions of physical devices that are now connected to the internet, all connecting and sharing data.
It integrates the connection of human culture – our ‘things’ – with the interconnection of our digital information system – ‘the internet’
The collective network of connected devices and the technology that facilitates communication between devices and the cloud, as well as between the devices themselves.
Mobile Application
It is a type of application software designed to run on a mobile device such as smartphone or tablet computer, that serves to provide users with similar services to those accessed on PC’s.
Several types of mobile application: gaming apps, productivity apps, lifestyle and entertainment apps.
Human Computer Interaction (HCI)
Is the study of how people interact with computers and to what extent computers are or are not developed for successful interaction with human beings.
Ex. Typing in a keyboard, virtual reality
Artificial Intelligence (AI)
It is a branch of science which deals with helping machines find solutions to complex problems in a more human-like fashion.
It is concerned with guiding computers to tasks that require human intelligence.
AI Techniques
Knowledge representation
Search
Fuzzy Logic
Intelligent Computer Aided Instruction (ICAI)
Computer Vision
Machine Learning
Handwriting Recognizers
Knowledge Representation
Equips AI agents with the capabilities to solve the most complex tasks based on what they have learned from the knowledge given to them.
Search
Can analyze vast amounts of voice search data and identify patterns in user behavior and search queries. By using natural language processing, AI can identify the intent behind specific types of queries and recommend the most relevant keywords and phrases to target in content.
Fuzzy Logic
Is an approach to computing based on "degrees of truth" rather than the usual "true or false" (1 or 0) Boolean logic on which the modern computer is based.
Intelligent Computer Aided Instruction (ICAI)
refers to the work of machines that can tutor humans.
Computer Vision / Vision Systems
It permits computers to capture, store, and manipulate visual images and pictures.
Machine Learning
Refers to a set of methods that attempt to teach computers to solve a problem.
Handwriting Recognizers
Touchscreen / Stylus
Expert System
Is a software-based system that attempts to capture human knowledge or expertise in a limited domain area.
Neural Networks
A computer system that can stimulate the functioning of the human brain.
Natural Languages Processing (NLP)
Branch of AI which is concerned with understanding natural languages.
Examples: Speech recognition / Speech synthesis
Robotics
It attempts to develop physical machines that can perform useful work normally done by humans.
Advanced Step in Innovative Mobility (ASIMO)
Data Analytics
Is the process of analyzing raw data to find trends and answer questions.
Intersection of information technology, statistics, and business
Types of data analytics: descriptive (what happened), diagnostic (why it happened), predictive (what will happen), prescriptive (what should be done).
Data Security
Refers to protecting data against unauthorized access or use that could result in exposure, deletion, or corruption of data.
Data Privacy
Refers to concerns regarding how data is handled - regulatory concerns, notification, and consent of use.
Examples of data privacy is gaining consent to collect data from website visitors by using cookies.
Cybersecurity
Is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
Types of cyber threats: cybercrime, cyber-attack, cyberterrorism.
Malware
Malicious software
It is a software that cybercriminals or hackers create to disrupt or damage a legitimate user’s computer.