Professional Documents
Culture Documents
• IOT
• Virtualization
• Cloud
• Artificial Intelligence
• Machine Learning
• AI & ML - Implications for Managers
• Block chain
Tapscott
IoT
Internet-of-Things
IoT is a network of number of sensors and actuators that are connected via Sensors
the internet to a set of machines for capturing stimulus events and respond
to them by effecting pre-determined actions/events and control of A sensor is a electronic/mechanical device
actions/events.
Also referred to as IoE (Internet of everything), IIoT (Industrial IoT), that detects change or events or
Internet 4.0 movements in/around its physical
space/environment and provides an
electronic output/signal for onward
transmission.
Actuators
Security alarm. When an intruder/movement is sensed by sensors in the home. Actuators send email/warning to the owner. Number of
signals sent by sensors in a plane to Rolls Royce, the engine manufacturer, who decides on service requirements.
Wearable, SmartCity, etc…
IoT Architecture
Home Security management-
Alarm on detection of
Intruder/movement
( Functional logic/algorithm
layer)
Analyze the
design/arran
Manages the functioning of all
components of IoT ( IT layer) gement of
sensors and
actuators in
a TOLL
Consists of Routers, Switches, management
gateways to receive and manage
network traffic of data coming system
from sensors
Airjaldi
JustDial
Cloud Computing
Cloud Computing
Cloud
Disruptive Technology/innovation: Creates a new – Servers, Databases, software available on
market and disrupts an existing product, service lease, which are connected over an
and market. internet.
Can impact one or more industries (ex: Mobile – Can be procured for a short period of
phone, Internet, etc… time to meet peak demand and released,
at a Fee.
– Lead time is minimized
Cloud Computing
Cost
Sensitive nature of data
Lead time
Variation in peak load
Cloud Technologies
Investment in
installments/stages Vs
Gradual
CAPEX-> OPEX
Artificial Intelligence
AI
Create ability in computers to think, see, hear, walk, talk and feel. (SMELL is a
challenge).
AI Applications
Advances in cloud and sensor technology has fueled the growth of AI.
Applications –
Machine Learning
(ML)
Machine Learning
Feed Back
Types of ML:
1. Supervised Learning : where we know input variable(X) and output variable(Y) and we can develop a
relationship/an algorithm to learn the mapping function from the input to the output. (Y=ax+b). Disease
recognition, seasonal patterns, etc..
2. Unsupervised Learning : Unsupervised learning is commonly used for finding meaningful patterns and
groupings inherent in data, extracting generative features, and exploratory purpose. It is the training/developing
of a model using information that is neither classified not labeled in which there is no explanation of the data.
Similar to "Clustering Analysis“. Example -Unlabeled picture or audio downloaded from internet and trying to
classify it. Customer Segmentation, Genetics-clustering DNA patterns to analyze evolutionary biology.
3. Reinforcement Learning: It is an area of machine learning where an RL agent learns from the consequences of
its actions, rather than being taught explicitly. It selects the actions on the basis of its past
experiences(exploitation) and also by new choices (exploration). Here machine takes the decision on its own.
Reward /Punishment- Consequences. Self driving cars, trading, etc..
At any point of X, value of Y can be a relationship (assume simple equation) like Y=aX+b ….Model developed by computer looking at the
historical data.
When we predict a new value of Y for a given X, we observe a GAP/ERROR between the actual value and predicted value of Y. Through ML,
computer learns about this gap and tries to reduce the gap for future computations by recalculating the values of A and B.
• Managers will have to decide on using ML for division of work in every organization.
• Tasks, requiring judgment and decision making, have to be performed by humans, while routine
activities with some variation can be given to machines.
• Managers will also have to look for new opportunities/ challenges where ML can be employed
• Managers have to balance job loss , reskilling with adoption of new technologies for being competitive
in the market
• Getting reliable huge data from market is a challenge as ML requires volume of data for developing
models
• Getting people with required skill set and keeping them motivated is not an easy job
• Short supply of experts
Virtualization
Virtualization
VM
Use of virtualization allows many CPUs to be function as a single
unit on which many Operating systems and applications can be
run simultaneously. This is used to increase capacity and improve
services. Virtualization software allows you to run two or more
operating systems using only one PC. So it's like two (or more)
computers in one. One is physical, and the others are virtual. ...
Virtualization software, also called a hypervisor, is what allows
one computer or server to host multiple operating systems.
Virtual Computers
A virtual computer system is known as a “virtual machine” (VM): a tightly isolated software container with an
operating system and application inside. Each self-contained VM is completely independent. Putting multiple
VMs on a single computer enables several operating systems and applications to run on just one physical
server, or “host.”
A thin layer of software called a HYPERVISOR separates the virtual machines from the host and
dynamically allocates computing resources to each Virtual Computer on need basis.
Virtualization
Block Chain
• What
• Why
• When
• Who/Whom
• How
Background:
Information/IT Revolution:
• Computing/Memory The challenge felt and expressed is the lack of trust, due to
• Internet which we need a middle person to broker any
• e-mail deal/transaction.
• the World Wide Web
• dot-coms A third party like a bank or a government is required to
• E-Retail, entertainment, e-cash prove our identity. Ex: Buyer has to pay the seller. Buyer has
• social media to go through a bank to make the payment, which verifies
• mobile Web his identity and arranges payment. Bank charges
• big data, AI and analytics commission.
• cloud computing,
• IoT, etc… These intermediaries/banks collect our data and invade our
• Pervasive technology privacy for commercial gain.
The block chain is a public ledger which works like a log by keeping a record of all transactions in a
chronological order, secured by an appropriate consensus mechanism and providing an immutable
record. Its exceptional characteristics include immutability, irreversibility, decentralization,
persistence, encryption and anonymity.
With these advantages, it has found applications in almost all fields requiring data sharing among
multiple parties but with secure authentication, anonymity and permanence. Some of the
applications are finance, real-estate and IoT.
Trust protocol
Nick Szabo - paper entitled “The God Protocol” It may not be the Almighty, but a trustworthy global platform
for our transactions is something very big. We’re calling it the
Similar to “the God particle”. Trust Protocol – Block chain Technology.
In his paper, Szabo discussed about the creation of a be-all This protocol is the foundation of a growing number of global
end-all technology protocol. distributed ledgers called blockchains—of which the bitcoin
blockchain is the largest.
Protocol: set of rules/procedures to exchange data and
perform operations in digital world. While the technology is complicated and the word blockchain
isn’t exactly resonant, the main idea is simple. Blockchains
In 2008, a pseudonymous person or persons named Satoshi enable us to send money directly and safely from me to you,
Nakamoto outlined a new protocol for a peer-to-peer without going through a bank, a credit card company, or
(P2P)electronic cash system using a cryptocurrency (digital PhonePe/GooglePe.
currencies ) called bitcoin.
Rather than the Internet of Information, it’s the Internet of
This protocol established a set of rules—in the form of Value or of Money. It’s also a platform for everyone to know
distributed computations—that ensured the integrity what is true—at least with regard to structured recorded
(valid and accurate) of the data exchanged among these information.
billions of devices without going through a trusted third
party.
This feature captured the imagination of the computing
world and has spread to businesses, governments, privacy
advocates, social development activists, media theorists,
and journalists, to name a few, everywhere.
• Immutability
• Irreversibility
• Decentralization
• Persistence
• encryption
• anonymity. How does blockchain achieve anonymity?
Transactions on permissionless ledgers are pseudo-
anonymous by design– transactions are linked to addresses
that correspond to public keys derived by user-held private
Types of Block Chain keys, not by username or password.
Transactions are encrypted and stored on multiple devices,
Public: Open to all/Permission less
or nodes around the globe.
Private: Organizational
level/Invited/Permissioned Challenges
Consortium: Accessible to predetermined
entities
Crypto Currency
Bitcoin mining is the process by which bitcoins are released into circulation. Generally, mining
requires the solving of computationally difficult puzzles in order to discover a new block, which is
added to the blockchain. In contributing to the blockchain, mining adds and verifies transaction
records across the network. For adding blocks to the blockchain, miners receive a reward in the form
of a few bitcoins.
Bitcoin is a type of cryptocurrency. Balances of Bitcoin tokens are kept using public and private
"keys," which are long strings of numbers and letters linked through the mathematical encryption
algorithm that was used to create them.
The public key (comparable to a bank account number) serves as the address which is published to
the world and to which others may send bitcoins. The private key (comparable to an ATM PIN) is
meant to be a guarded secret and only used to authorize Bitcoin transmissions.
Informative Videos
https://www.youtube.com/watch?v=SSo_EIwHSd4
https://www.youtube.com/watch?v=3xGLc-zz9cA
Decentralized applications (dApps) are digital applications or programs that exist and run on a blockchain or P2P network of
computers instead of a single computer, and are outside the purview and control of a single authority
bAirbnb is a distributed application (DApp), a set of smart contracts that stores data on a home-listings blockchain. Similar Filters
will be available for location selection.
User experience is identical to that in Airbnb, except that you communicate peer to peer on the network, through encrypted and
cryptographically signed messages.
You and the room owner are the only two people who can read these messages. On bAirbnb you and the owner could communicate
off-chain and complete the transaction entirely off-chain, but you are better off completing the transaction on-chain for a few
reasons.
Ethereum
Blockchain developer Gavin Wood makes this point describing the Ethereum blockchain as a platform for processing.
“There is only one Ethereum computer in the world,” he said. “It’s also multiuser—anyone who ever uses it is automatically
signed in.” Because Ethereum is distributed and built to the highest standards of cryptosecurity.
Ethereum is a blockchain-based software platform that can be used for sending and receiving value globally via its native
cryptocurrency.
BitTorrent the peer-to-peer file-sharing app, demonstrates the power of DApps Lovers of music, film, and other media
share their files for free, with no central server for authorities to shut down.
Autonomous agents— software that makes decisions and acts on them without human intervention.
Each autonomous agent is responsible for instantiating key processes, such as user authentication and authorization, smart
contracts, and knowledge graph generation through data integration among the participating stakeholders in the network.
Ex: A cloud computing service rents processing power from various sources, growing to Amazon’s size by making rental
deals with other computers that have excess capacity.
A driverless car owned by a community, company, individual, or perhaps itself moves around the city picking up and
dropping off passengers and charging them appropriate fees, without a middle man like Uber, Ola..
These are computer agents that can do transactions, acquire resources, make payments, or otherwise produce value on
behalf of their creator. How about middle man fees/Commission?.
WeatherNodes
As an incentive, each weatherNode receives a micropayment every thirty seconds for providing accurate
weather telemetry (temperature, humidity, wind, etc.) at a particular location in the world.
“WeatherDataMarketplace DApp”
The blockchain allows any entity to become a weather provider or weather data consumer, with very low
barriers to entry. Just buy a weatherNode, put it on your roof, and connect it to the
GlobalWeatherDataMarketplace DApp LP (for linked peers) and you’ll start earning income right away.
4. The Metering Economy - Wi-Fi hot spots, computing power or storage capacity, the heat generated by our
computers, our extra mobile minutes. And even physical assets like autonomous cars
5. The Platform Builders : Platforms to carry out certain transactions: Zipcar (a service aggregator) as well
as Buzzcar (users can share their cars with others)
6. Block chain Makers
7. The Enterprise Collaborators
Thank You
How? ( 2 videos below)
Honesty is not just an ethical issue; it has become an economic one. To establish trusting relationships with employees,
partners, customers, shareholders, and the public, organizations must be truthful, accurate, and complete in
communications. No lying through omission, no confusion through complexity.
Consideration in business often means a fair exchange of benefits or detriments that parties will operate in good faith. But
trust requires a genuine respect for the interests, desires, or feelings of others, and that parties can operate with goodwill
toward one another.
Accountability means making clear commitments to stakeholders and abiding by them. Individuals and institutions alike
must demonstrate that they have honored their commitments and owned their broken promises, preferably with the
verification of the stakeholders themselves or independent outside experts. No passing the buck, no playing the blame
game.
Transparency means operating out in the open, in the light of day. “What are they hiding?” is a sign of poor transparency
that leads to distrust. Of course, companies have legitimate rights to trade secrets and other kinds of proprietary
information. But when it comes to pertinent information for customers, shareholders, employees, and other stakeholders,
active openness is central to earning trust. Rather than dressing for success, corporations can undress for success.