Professional Documents
Culture Documents
Augmented reality:
1.Input Devices: These are the devices used to capture the real-world environment that
will be augmented. Common input devices include cameras, depth sensors, and GPS.
2.Processing Unit: This component processes the input data captured by the input
devices and generates the necessary information for overlaying the augmented content
on the real-world environment. The processing unit is typically a computer, a mobile
device, or a dedicated AR headset.
3.Tracking System: This component helps to determine the position and orientation of the
device in the real world. This is essential for overlaying the augmented content in the
correct location and orientation. Common tracking systems include visual tracking,
marker-based tracking, and sensor-based tracking.
4.Augmented Content: This is the computer-generated content that is overlaid on the real
-world environment. Augmented content can take various forms, including images,
videos, and 3D models.
5.Output Devices: These are the devices used to display the augmented content to the
user. Common output devices include screens, projectors, and AR headsets.
6.User Interface: This is the interface through which the user interacts with the AR system.
The user interface can take various forms, including touchscreens, voice commands,and
gesture-based interfaces.
Examples of some brands using AR :
ASOS - See my Fit : it enhances the customer experience by capturing, by capturing their
body profile and display how they look in different sizes
Gucci - Try on shoes in AR : a very functional example of AR for retail in the footwear
industry by giving customers a visual representation of how a product will look in real life
after wearing it.
Lenskrt
SNAp chat
Application of AR military:
Training: AR can be used to simulate combat scenarios and train soldiers in a virtual
environment. This allows soldiers to gain experience and practice without putting
themselves or others in danger.
Navigation: AR can provide soldiers with real-time information about their surroundings,
including maps, landmarks, and potential threats. This can help soldiers navigate
unfamiliar terrain and make better decisions in the field.
Maintenance: AR can help soldiers diagnose and repair equipment in the field by
providing visual guides and instructions.
Surgical Navigation: AR can help surgeons visualize and plan complex procedures by
overlaying medical images and other relevant data onto the patient's body during surgery.
This can help reduce the risk of error and improve surgical outcomes.
Medical Training: AR can be used to simulate medical procedures and provide interactive
training for medical students and healthcare professionals
Diagnosis and Treatment: AR can be used to help physicians diagnose and treat patients
by providing real-time information and visualizations of medical images and
Virtual Tour Guides: AR can provide virtual tour guides that offer real-time information
about tourist attractions and historical sites, providing visitors with a more engaging and
informative experience.
Interactive Maps: AR can overlay digital maps with relevant information, such as
directions to popular tourist sites and the location of nearby restaurants or
accommodations.
Language Translation: AR can translate signs and menus in real-time, making it easier for
tourists to navigate unfamiliar environments and communicate with locals.
Virtual reality:
An example of virtual reality could be a VR game that simulates a real-life activity, such as
skiing or flying a plane. In such a game, a player would wear a VR headset and would be
able to experience the game's environment as if they were actually skiing down a
mountain or flying a plane. The player would be able to interact with objects in the
environment, such as adjusting the controls of the plane or making turns while skiing.
Mixed reality :
Mixed reality (MR) is a type of technology that blends elements of both virtual reality and
augmented reality. It allows for digital and physical objects to interact with each other in
real-time, creating a unique and immersive experience for users.
Augmented reality (AR) and mixed reality (MR) are two related but distinct technologies
that share some similarities but also have significant differences.
Augmented reality (AR) technology superimposes digital content (such as images, sounds,
or video) onto the real world, creating an enhanced or augmented experience for users.
AR technology typically uses a smartphone or tablet camera to recognize objects or
images in the physical environment and then overlays digital content on top of them.
Examples of AR applications include Pokémon Go and Snapchat filters.
Mixed reality (MR) technology, on the other hand, blends digital and physical content
together in a way that allows them to interact with each other in real-time. Unlike AR,
which simply overlays digital content onto the real world, MR combines both virtual and
real-world elements to create a new, hybrid environment. MR technology typically
requires the use of specialized headsets or glasses that allow users to see and interact
with virtual objects in their physical environment. Examples of MR applications include the
Microsoft HoloLens and Magic Leap.
Advantages of AR :
Enhanced experience
Disadvantages of AR
Unaffordable
Risky behaviour
Module 6
Ethics in technology:
Ethics in technology refers to the moral principles and values that guide the development,
use, and impact of technology on individuals, society, and the environment. Ethical issues
arise in various areas of technology, including data privacy, cybersecurity, artificial
intelligence, biotechnology, and more.
One of the most significant ethical concerns in technology is data privacy. The collection,
use, and storage of personal data by tech companies have raised concerns about the
protection of individuals' privacy rights. Ethical principles such as transparency, informed
consent, and data minimization are critical in ensuring that personal data is collected and
used in an ethical manner ,Another ethical concern in technology is cybersecurity. The
increasing reliance on technology in various sectors has made cybersecurity an essential
aspect of technology ethics. Ethical principles such as integrity, confidentiality, and
accountability are critical in ensuring that technology is developed and used in a way that
safeguards against cyber threats.
Digital privacy :
Digital privacy refers to the right of individuals to control their personal information online
and how it is collected, used, and shared by companies and organizations. Example :
personal data , online activities tracking , social media , cybersecurity.
Data security
Big data
Cloud computing
Mobile payments
Social media related liabilities
Wearable computing
Virtual currencies
History: Blockchain isn’t just a database, it’s a new technology stack with ‘digital
trust’ that is revolutionizing the way we exchange value and information across the
internet, by taking out the ‘gatekeepers’ from the process. For a complete and more
detailed deep dive check out our article: A concise history of blockchain technology
Blockchain history goes back farther than you might imagine, but we’ve condensed it by
answering four critical questions:
The first blockchain-like protocol was proposed by cryptographer David Chaum in 1982.
Later in 1991, Stuart Haber and W. Scott Stornetta wrote about their work on consortiums.
But it was Satoshi Nakamoto (presumed pseudonym for a person or group of people)
who invented and implemented the first blockchain network after deploying the world’s
first digital currency, bitcoin.
Types of blockchain:
1. Public blockchain refers to a decentralized digital ledger technology that allows anyone
to participate and verify transactions on the network. In a public blockchain, data is stored
across a distributed network of computers or nodes, rather than in a central location. This
makes it difficult for any single entity to manipulate or control the data on the network.
2.private blockchain
Private blockchains are not open, they have access restrictions. People who want to join
require permission from the system administrator. They are typically governed by one
entity, meaning they’re centralized. For example, hyper ledger is a private, permissioned
blockchain.
3.hybrid blockchain :A hybrid blockchain is a combination of public and private
blockchains that leverages the benefits of both types of blockchains. It allows for a more
flexible and customizable approach to blockchain technology that can be tailored to meet
specific business needs and requirements.
It allows users to move digital assets between two different blockchains and improves
scalability and efficiency. An example of a sidechain is the liquid network
Cloud computing : Cloud computing is a technology that allows you to access computing
resources, such as storage, applications, and processing power, over the internet. Instead
of having to run software or store data on your own computer or server, you can use
remote servers and resources hosted by a cloud service provider .In simple words, cloud
computing works like renting a computer or server over the internet. You can use as much
or as little of the resources you need, and you only pay for what you use. This makes it a
flexible and cost-effective solution for individuals and businesses of all sizes.
Public cloud
Private cloud
Hybrid cloud
Analyze data
Quantum computing :
The idea behind autonomic computing is to create computer systems that are more
reliable, efficient, and adaptable, and that require less human intervention to operate. This
is achieved by building systems with a high degree of automation, self-monitoring, and
self-healing capabilities.
Computer vision :
Computer vision Is an interdisciplinary scientific field that deals with how computers can
gain high-level understanding from digital images or videos.
From the perspective of engineering, it seeks to understand and automate tasks that
the human visual system can do.
Computer vision tasks include methods for acquiring, processing, analyzing and
understanding digital images, and extraction of high-dimensional data from the real world
in order to produce numerical or symbolic information,
Example: Computer vision is used to detect and classify objects (e.G., Road signs or
traffic lights), create 3D maps or motion estimation, and played a key role in making
autonomous vehicles a reality. Self-driving cars collect data on their surroundings from
sensors and cameras, interpret it, and respond accordingly
Cyber security:
It aims to reduce the risk of cyber attacks and protect against the unauthorised
exploitation of systems, networks and technologies.
2. Network security
3. Cloud security
4. iOT security
5. Application security
A 3D Digital model of the item is created, either by computer-aided design (CAD) or using
a 3D scanner.
Additive manufacturing is a specific 3D printing process. This process builds parts layer
by layer by depositing material according to digital 3D design data.
Module 6
Technology refers to the practical application of scientific knowledge for a particular
purpose. It encompasses a wide range of tools, techniques, and processes that are used
to solve problems, improve efficiency, and create new products or services.
Ethics in technology:
Ethics in technology refers to the moral principles and values that guide the development,
use, and impact of technology on individuals, society, and the environment. Ethical issues
arise in various areas of technology, including data privacy, cybersecurity, artificial
intelligence, biotechnology, and more.
One of the most significant ethical concerns in technology is data privacy. The collection,
use, and storage of personal data by tech companies have raised concerns about the
protection of individuals' privacy rights. Ethical principles such as transparency, informed
consent, and data minimization are critical in ensuring that personal data is collected and
used in an ethical manner ,Another ethical concern in technology is cybersecurity. The
increasing reliance on technology in various sectors has made cybersecurity an essential
aspect of technology ethics. Ethical principles such as integrity, confidentiality, and
accountability are critical in ensuring that technology is developed and used in a way that
safeguards against cyber threats.
Digital privacy :
Digital privacy refers to the right of individuals to control their personal information online
and how it is collected, used, and shared by companies and organizations. Example :
personal data , online activities tracking , social media , cybersecurity.
Data security
Big data
Cloud computing
Mobile payments
Wearable computing
The internet of things
Virtual currencies
History: Blockchain isn’t just a database, it’s a new technology stack with ‘digital
trust’ that is revolutionizing the way we exchange value and information across the
internet, by taking out the ‘gatekeepers’ from the process. For a complete and more
detailed deep dive check out our article: A concise history of blockchain technology
Blockchain history goes back farther than you might imagine, but we’ve condensed it by
answering four critical questions:
The first blockchain-like protocol was proposed by cryptographer David Chaum in 1982.
Later in 1991, Stuart Haber and W. Scott Stornetta wrote about their work on consortiums.
But it was Satoshi Nakamoto (presumed pseudonym for a person or group of people)
who invented and implemented the first blockchain network after deploying the world’s
first digital currency, bitcoin
Types of blockchain:
1. Public blockchain refers to a decentralized digital ledger technology that allows anyone
to participate and verify transactions on the network. In a public blockchain, data is stored
across a distributed network of computers or nodes, rather than in a central location. This
makes it difficult for any single entity to manipulate or control the data on the network.
2.private blockchain
Private blockchains are not open, they have access restrictions. People who want to join
require permission from the system administrator. They are typically governed by one
entity, meaning they’re centralized. For example, hyper ledger is a private, permissioned
blockchain.
3.hybrid blockchain :A hybrid blockchain is a combination of public and private
blockchains that leverages the benefits of both types of blockchains. It allows for a more
flexible and customizable approach to blockchain technology that can be tailored to meet
specific business needs and requirements.
It allows users to move digital assets between two different blockchains and improves
scalability and efficiency. An example of a sidechain is the liquid network
Cloud computing :
Cloud computing is a technology that allows you to access computing resources, such as
storage, applications, and processing power, over the internet. Instead of having to run
software or store data on your own computer or server, you can use remote servers and
resources hosted by a cloud service provider .In simple words, cloud computing works
like renting a computer or server over the internet. You can use as much or as little of the
resources you need, and you only pay for what you use. This makes it a flexible and cost-
effective solution for individuals and businesses of all sizes.
Public cloud
Private cloud
Hybrid cloud
Analyze data
Stream audio and video
Embedded intelligence
Quantum computing :
Autonomic computing:
The idea behind autonomic computing is to create computer systems that are more
reliable, efficient, and adaptable, and that require less human intervention to operate. This
is achieved by building systems with a high degree of automation, self-monitoring, and
self-healing capabilities.
Computer vision :
Computer vision Is an interdisciplinary scientific field that deals with how computers can
gain high-level understanding from digital images or videos.
From the perspective of engineering, it seeks to understand and automate tasks that
the human visual system can do.
Computer vision tasks include methods for acquiring, processing, analyzing and
understanding digital images, and extraction of high-dimensional data from the real world
in order to produce numerical or symbolic information,
Example: Computer vision is used to detect and classify objects (e.G., Road signs or
traffic lights), create 3D maps or motion estimation, and played a key role in making
autonomous vehicles a reality. Self-driving cars collect data on their surroundings from
sensors and cameras, interpret it, and respond accordingly
Cyber security:
It aims to reduce the risk of cyber attacks and protect against the unauthorised
exploitation of systems, networks and technologies.
2. Network security
3. Cloud security
4. iOT security
5. Application security
A 3D Digital model of the item is created, either by computer-aided design (CAD) or using
a 3D scanner.
Additive manufacturing is a specific 3D printing process. This process builds parts layer
by layer by depositing material according to digital 3D design data.