You are on page 1of 15

Artificial Intelligence

What is Artificial

intelligence

Artificial Intelligence (AI) is a field of computer science

that aims to create computer systems capable of

performing tasks typically associated with human

intelligence, such as problem-solving, learning, and

decision-making.

HISTORY OF ARTIFICIAL INTELLIGENCE

1940S - 1950S: THE BIRTH OF AI

- The idea of AI can be traced back to the 1940s and 1950s when

computer scientists and mathematicians started exploring the concept

of creating machines that could simulate human intelligence.

Alan Turing's work on the "Turing Test" in 1950 laid the foundation

for assessing a machine's ability to exhibit intelligent behavior.

1956: DARTMOUTH WORKSHOP

-In 1956, the Dartmouth Workshop, organized by John McCarthy and

Marvin Minsky, is considered the birth of AI as an academic discipline.

1980S: AI WINTER

The 1980s saw a period known as the "AI winter" characterized by

reduced funding and interest in AI research due to unmet expectations

and technical limitations.

1990S - 2000S: RESURGENCE OF AI

In the 1990s, AI experienced a resurgence with the development of

expert systems, natural language processing, and machine learning

techniques.
2000S - PRESENT: AI ADVANCEMENTS

The 21st century witnessed remarkable advancements in AI, driven

by improvements in computing power, big data, and machine

learning algorithms.

Cyborg and Human-

Machines Relationship

Cyborgs are a mix of humans and machines.

They use technology to boost their abilities.

This blending of people and machines raises

big questions about what it means to be

human and how we work with technology.

AI in Healthcare

Medical Imaging:

AI-POWERED IMAGE ANALYSIS AIDS IN THE EARLY

DETECTION OF DISEASES LIKE CANCER THROUGH

RADIOLOGY AND PATHOLOGY.

Drug Discovery:

AI ACCELERATES DRUG DISCOVERY BY PREDICTING

POTENTIAL DRUG CANDIDATES AND ANALYZING

CLINICAL TRIAL DATA.

AI in Finance

Customer Service:

AI CHATBOTS PROVIDE 24/7 CUSTOMER SUPPORT

AND STREAMLINE ROUTINE INQUIRIES.


AI in Autonomous Vehicles

Self-Driving Cars:

AI ALGORITHMS ENABLE VEHICLES TO NAVIGATE

WITHOUT HUMAN INTERVENTION, POTENTIALLY

REDUCING ACCIDENTS AND CONGESTION.

AI in Natural Language Processing

Chatbots and Virtual

Assistants:

CHATBOTS AND VIRTUAL ASSISTANTS: AI-

POWERED CHATBOTS LIKE SIRI AND ALEXA

RESPOND TO VOICE COMMANDS AND ASSIST

USERS.

Language Translation:

AI TRANSLATES TEXT AND SPEECH BETWEEN

LANGUAGES, BRIDGING COMMUNICATION GAPS.

AI in Gaming

Virtual NPC Behavior:

AI-CONTROLLED NON-PLAYER CHARACTERS ADAPT

TO PLAYER ACTIONS, CREATING DYNAMIC

GAMEPLAY.

Procedural Content Generation:

AI GENERATES GAME CONTENT, SUCH AS LEVELS

AND LANDSCAPES, TO KEEP GAMES ENGAGING.

AI in Cybersecurity

AI ANALYZES NETWORK TRAFFIC PATTERNS TO

IDENTIFY SUSPICIOUS ACTIVITIES AND POTENTIAL


BREACHES.

AI in Agriculture

Crop Monitoring:

AI-POWERED DRONES AND SENSORS MONITOR

CROP HEALTH, ENABLING TARGETED

INTERVENTIONS.

Predictive Analytics:

AI PREDICTS WEATHER PATTERNS AND OPTIMAL

PLANTING TIMES.

network etiquette
concerned with the proper way to communicate in an online environment

-GOLDEN RULES

-AVOID SLANGS

-AVOID SCREAMING AND TYPE CAPS

-PROOFREAD

-EXERCISE GOOD JUDGEMENT AND SHARING INFOS

-RESPECT DIVERSITY

10 COMMANDMENTS

1.

Remember the Human. When communicating

electronically, practice the golden rule: do unto others as

you would have others do unto you.

2.

Adhere to the same standards of behavior

online that you follow in real life. You

should do your best to act within the laws

and ethical manners of society when you


inhabit “ cyberspace”.

3,

Know where you are in cyberspace. A form of

communication can be acceptable in one area and can

be inappropriate in another.

4.

Respect other people’s time and bandwidth.

Electronic communication takes time: time

to read and time in which to respond.

5.

Make yourself look good when online writing.

Always check for spelling and grammar errors.

6.

Share expert knowledge. Recently expanded your

knowledge about a subject that might be of interest to

others? Share it, share what you know!

7.

Help keep flame wars under control. Don’t feed

the flames; extinguish them by guiding the

discussion back to a more productive direction.

8.

Respect other people’s privacy. Always exercise

caution when decidingto discuss or not to discuss

virtual communication.

9.

Don’t abuse your power. Do not take advantage of

anyone. Think of rule 1: Remember the Human.

10.

Be forgiving of other people’s mistakes. If


you feel compelled to respond to a

mistake, do so in a private email rather

than a public forum.

DIGITAL AGE, INFORMATION AGE, AND COMPUTER AGE

THE INFORMATION AGE

also called the Computer Age, the Digital Age is

coupled tightly with the advent of personal

computers.

THE DIGITAL AGE

refers to the time period

characterized by the

widespread use of digital

technologies.

THE COMPUTER AGE

The Computer Age - Digital

industry creating a

knowledge-base society

THE INFORMATION AGE

focuses on the importance

and abundance of

information in the modern

era.

MEDIA IN THE DIGITAL AGE

In the digital age, the media landscape has

undergone significant transformations.

According to Nelson Granados. Media


normally refers to the means of

communication that uses unique tools to

interconnect among people.

The Message

Media can be the message itself,

especially for those who create

and own rights to content.

The Medium

The medium used refers to the

tool or tools used in sending a

message from the source to the

destination.

The Messenger

The messenger is the one who

delivers the message. This is why

broadcasters, for example, being

the messenger of news are called

"media."

THE EVOLUTION OF MEDIA

1. How information is

presented.

2. How the connection is

established.

THE EVOLUTION OF MEDIA

Pre-historic Age

Old Fabric/Paper

- Cave Paintings
Industrial Age

- Telegraph

- Typewriter

Electronic Age

- Televisions

- Electronic calculator

Information Age

- MP3 player

- Facebook

Information Control and Privacy


Resources

-Resources are the total means available to a

company for increasing production

materials. or profit, including land, labor,

capital, and raw.

Introduction to Resources

physical resources

conceptual resources

Information as a Resource

Information can be simply defined as "facts about something or

someone that are provided or learned.

Facts are considered relevant truths which have been validated

and identified.

Data are considered facts; therefore, processed data are considered

as information as they are organized in such a way that they have

Additional value beyond the value of the facts themselves.

Information is considered:

Expandable
compressible

transportable

diffusive

sharable

2 OPTIONS SA PAG ACQUIRE NG SOFTWARE APPS

FREE TRIAL

FULL VER.

Information is said to be valuable if it has the following characteristics :

Accurate

However, how do you determine which are accurate and which

are inaccurate? Usually, it is better to trust sites that are formal

in nature rather than informal ones such as blogs or forums.

Information is said to be valuable if it has the

following characteristics :

Complete

Economical

Reliable

Flexible

Relevant

Simple

Timely

Verifiable

Accesible

Secure

Information as a resource, has four characteristics:

Zero-marginal cost

The cost of producing the first copy

of an information good may be

substantial, but the cost of producing (or reproducing) additional copies is negligible.
Non-rivalrous

Simultaneous consumption of information by consumers is possible.\

Non-exclusive

Exclusion is not a natural property of information goods, though it is possible to construct exclusion
artificially However, the nature of information is that if it is known, it is difficult to exclude others from
its use.

No transparency

To evaluate the information, the information must be known, so one has to invest in learning how to

evaluate it

Information Economics
In economics, a good is

considered to be an

experience good if consumers

must experience it to value it.

Information, on the other hand,

may be treated differently, since

it is not the asset that provides

value in today's economy: what

provides value is the

information about the asset.

The tension between giving away your information-to let people know what you have

to offer and charging them for it to recover your

costs, is a fundamental problem in the Information economy. These strategies include

browsing previews,branding, andreputation.

Information

Overload Information is now available so quickly, ubiquitously, and inexpensively.


Information is produced at rapidly-increasing

rates due to the following reasons:

Easy duplication and transmission of

information

Increase in communication methods

Growth archives of historical information

Mobile social media

Mobile social media is the accessing of

social media sites, such as Facebook and

Snapchat, using a mobile device. The

device may have an app installed to open

Instagram, for example, or it can use a

browser installed in the mobile device to

open Twitter.

Mobile Commerce

M-commerce or mobile commerce was a

term used during the 1997 Global Mobile

Commerce Forum by Kevin Duffey. He

described it as the delivery of electronic

commerce capabilities directly into the

consumer's hand, anywhere, via wireless

technology.

Industries that are now embracing m-commerce include:

Financial Services

Mobile Ticketing

Service/Retail

Information Services

INFORMATION CONTROL
is about allowing those who

have appropriate authority

access to and use of

information on the basis of the

authority that they hold

FUNDAMENTAL ASPECTS OF INFORMATION CONTROL:

Access Control

Data Security

Data Classification

Data Governance

Data Retention and Deletion

Regulatory Compliance

Auditing and Monitoring

Privacy Protection

Training and Awareness

Disaster Recovery and Business Continuity

Ethical Considerations

Collaboration and Information Sharing

Technology Solutions

SOFTWARE PIRACY

Software piracy can be defined as the use of

software that is not properly licensed.

5 main ways in which people pirate software

Counterfeiting: duplicating and selling unauthorized copies of

software

Softlifting: the purchasing of a single licensed copy of software and

loading it on several machines

Hard-disk loading: selling computers pre-loaded with illegal software.

In most cases, the PC manufacturer will not supply the media, license
agreement, manual or other documentation

Bulletin-board piracy: putting software on a bulletin-board service for

anyone to copy or copying software from a bulletin-board service

which is not shareware or freeware.

Software rental: renting of software for temporary use.

Four (4) Issues by Adam Thierer

Convergence

Scale

Volume

Unprecented individual empowerment

INTELLECTUAL PROPERTY (IP)

• refers to a number of distinct types of intangible assets for which set of exclusive rights

are recognized. Includes musical, literary, and artistic. It can also include words, phrases,

symbols, and even designs

INTELLECTUAL PROPERTY RIGHTS (IPR)

are the rights given to persons over their creations.

Intellectual Property Code of the Philippines (Republic Act No. 8293 s.

1998),

Copyright and related rights

b. Trademarks and service marks

c. Geographic indications

d. Industrial design

e. Patents

f. Layout designs (topographies) of Integrated Circuits (ICs)

g. Protection of undisclosed information

Intellectual Property Office of the Philippines (IP Philippines)

as provided for under R.A. 8293, or the

Intellectual Property Code of the Philippines,


and the revised Intellectual Property Code

of the Philippines known as R.A. 10372.

COPYRIGHT AND RELATED RIGHTS

set of exclusive rights granted by a state to

the creator of an original work or their

assignee for a limited period of time

provides protection for original expression

all copyrighted materials are recorded and

stored at the National Library or the Supreme

Court Library (R.A 10372, 2013).

DIGITAL RIGHTS MANAGEMENT

used to describe the processes by which

the author or publisher of a work exerts

his or her rights to control what the

purchaser of the work is entitled to do.

Techniques designed to control access and reproduction of online information:

1. ENCRYPTION

process of converting data or information in such a way that only

authorized parties can understand.

2. SERIAL KEYS

series of alphanumeric characters acting as a key to denote that the

product or software is original.

3. SCRAMBLING

to hide sensitive information from unauthorized users.

4. TAG EMBEDDING

to denote information on the owner

5. PATENTs

et of exclusive rights granted by a state to an inventor for a limited

period of time in exchange for the public disclosure of an invention


TRADEMARK

distinctive sign used by an individual, business

organization, or other legal entity to identify the

products or services to consumers. The mark comes

from a unique source, and it distinguishes its product

(trademark) or services (service mark) from the others.\

INFORMATION PRIVACY

sometimes also referred to as data privacy, is an area of data protection that concerns the proper
handling of sensitive data including personal data but also other confidential data, such as certain
financial data and intellectual property data, to meet regulatory requirements.

You might also like