ISQS Exam 2

¡Supera tus tareas y exámenes ahora con Quizwiz!

1. According to the definition provided in the article, "artificial intelligence is a sub-field of computer science."

-__________-

According to the article, a blockchain "is a cryptographic database maintained by a network of computers, each of which stores a copy of the most up-to-date version."

indeed

1. What are KPIs, and how do they relate to data analytics and having a data-driven culture? What will having "a deep understanding of the metrics that influence those KPIs ..." do for organizations?

key performance indicators is a performance measurer this relates to data analytics because it helps you keep track of what the important data is, a deep understanding of the metrics that influence those KPIs, and the capability to do analytical reporting, will help process all your data and create a data-driven team that investigates trends, predicts outcomes, and discovers new insights.

1. What are some of the other applications for blockchain technologies mentioned on the website besides cryptocurrencies (i.e., see the "Blockchain in Action" section)?

trusted concert tickets, more efficient markets, contracts written in code, digital ID,

1. According to the article: "What many people often do not understand is that what is legal is not always ethical."

yep

1. Bitcoin was the cryptocurrency blockchain was initially created to support

yep

1. In Tableau, you can "keep on asking questions in the data until you discover the root cause

yuh

1. The Tableau application helps you to "see the stories in your data."

yuh

1. Tableau is "designed to help you be smarter, so you can make better decisions, faster."

yup

1. What are the benefits of 3D Printing? Be specific here.

- 3D printing brings a revolutionary approach to manufacturing through three key advantages: Shorter lead time, design freedom, and lower costs.

1. According to the video, what are some of the statistics for cyber attacks and data breaches?

- 50% of cyber attacks are successful

1. What are the key challenges the article suggests need to be addressed to create a health AI ecosystem?

1. BIAS BUILT INTO DATA 2. AI-INDUCED BIAS 3. TEACHING AI HUMAN RULES 4. EVALUATING CASES OF SUSPECTED AI BIAS

1. Identify and define the SDLC stages/ best practices listed in this reading.

1. Identify the Current Problems "What are the current problems?" This stage of the SDLC means getting input from all stakeholders, including customers, salespeople, industry experts, and programmers. 2. Plan "What do we want?" In this stage of the SDLC, the team determines the cost and resources required for implementing the analyzed requirements. It also details the risks involved and provides sub-plans for softening those risks. In other words, the team should determine the feasibility of the project and how they can implement the project successfully with the lowest risk in mind. 3. Design "How will we get what we want?" This phase of the SDLC starts by turning the software specifications into a design plan called the Design Specification. All stakeholders then review this plan and offer feedback and suggestions. It's crucial to have a plan for collecting and incorporating stakeholder input into this document. Failure at this stage will almost certainly result in cost overruns at best and the total collapse of the project at worst. 4. Build "Let's create what we want." At this stage, the actual development starts. It's important that every developer sticks to the agreed blueprint. Also, make sure you have proper guidelines in place about the code style and practices. For example, define a nomenclature for files or define a variable naming style such as camelCase. This will help your team to produce organized and consistent code that is easier to understand but also to test during the next phase. 5. Code Test "Did we get what we want?" In this stage, we test for defects and deficiencies. We fix those issues until the product meets the original specifications. In short, we want to verify if the code meets the defined requirements. 6. Software Deployment "Let's start using what we got." At this stage, the goal is to deploy the software to the production environment so users can start using the product. However, many organizations choose to move the product through different deployment environments such as a testing or staging environment. This allows any stakeholders to safely play with the product before releasing it to the market. Besides, this allows any final mistakes to be caught before releasing the product. Extra: Software Maintenance "Let's get this closer to what we want." The plan almost never turns out perfect when it meets reality. Further, as conditions in the real world change, we need to update and advance the software to match. The DevOps movement has changed the SDLC in some ways. Developers are now responsible for more and more steps of the entire development process. We also see the value of shifting left. When development and Ops teams use the same toolset to track performance and pin down defects from inception to the retirement of an application, this provides a common language and faster handoffs between teams. Application performance monitoring (APM) tools can be used in a development, QA, and production environment. This keeps everyone using the same toolset across the entire development lifecycle.

1. What does the article suggest the future work (i.e., jobs, skills, etc.) may look like? What numbers (both historical and future estimates) support these suggestions?

- A recent study by Pew Research found that in 10 advanced and emerging economies, most workers expect computers will do much of the work currently done by humans within 50 years. Workers are clearly anxious about the effects on the job market of artificial intelligence and automation. Estimates about how much of the workforce could be automated vary from about 9% to 47%. The consultancy McKinsey estimates up to 800 million workers globally could be displaced by robotic automation by 2030. Some jobs will change dramatically, while others will disappear altogether.

1. What are the parts of a successful cyber security approach and what does it involve?

- A successful cybersecurity approach has multiple layers of protection spread across the computers, networks, programs, or data that one intends to keep safe. In an organization, the people, processes, and technology must all complement one another to create an effective defense from cyber attacks.

1. Identify the objectives for those working on building AI-based systems? (See the Strong AI, weak AI and everything in between section in the article.)

- For some, the goal is to build systems that think exactly the same way that people do. Others just want to get the job done and don't care if the computation has anything to do with human thought. And some are in-between, using human reasoning as a model that can inform and inspire but not as the final target for imitation.

1. What is humanics, and what are its three basic pillars?

- He says education needs to change dramatically if workers are to adapt to this new environment. His solution, which he calls humanics, has three basic pillars: - Technical ability: understanding how machines function and how to interact with them. - Data discipline: navigating the sea of information that's generated by these machines. - And the human discipline: "which is what we humans can do that machines for the foreseeable future, cannot emulate."

1. According to the article, what has become a major weak point for an organization's information security, and what number backs this up?

- Human error has become a major weak point today; one that is easily exploited by cyber criminals. In fact, almost 90 percent of cyber attacks are caused by human error or behavior.

1. What does this article suggest is the reason why we need professional ethics?

- I believe it is our responsibility as IT professionals to act in an ethical manner in the performance of our work duties. To inadvertently do otherwise risks losing the trust of our students, faculty, staff, communities, and the general public.

1. At its very core, what does machine learning do? As suggested in the talk, what are some example tasks where machine learning is used?

- It allows machines to learn from data and mimic some of the things humans do. assessing credit risks, sorting mail, now they can grade high school papers, diagnose eye diseases.

1. How are advances in 3D Printing technologies and techniques "changing the game" for 3D Printing compared to traditional manufacturing?

- It makes it so much cheaper and faster, and all the parts it makes are much better and higher quality.

1. What is the overarching goal of AI? (See the AI: A textbook definition section in the article.)

- Its goal is to enable the development of computers that are able to do things normally done by people -- in particular, things associated with people acting intelligently

1. What is the definition of a robot, according to many roboticists?

- Its hard to define one, roboticists don't really agree on a definition. Intelligence is the best way to describe a robot.

1. The advice given in this article has applicability for more than just IT professionals. How might this advice be applicable to you in your future professional career?

- Its just a good rule to act ethical whereever you are working so that you treat your co workers or employees or customers with respect.

1. What are the security best-practices the article mentions?

- Lock your device before you leave your desk. For Windows users, press and hold the Windows key, then press the "L" key. For Mac users, press Control + Shift + Eject (or the Power key) at the same time. - Store documents in a locked cabinet. Employees should avoid having sensitive information floating around on their desk. At the end of the day, or before they leave their desk unattended, it's always a good idea to stow company documents and the like into a lockable safe or cabinet. - Properly discard information. When it comes time to get rid of those documents or files, be sure to properly shred and discard them.

1. According to the article, what are some of the projections/ estimates for drones and their impact on business?

- Of all drone applications explored so far, delivery robots have generated by far the most public attention, but the use of delivery drones is still mainly in early phases. Federal and local regulations are holding back their potential use. Commercial drones are currently making a real impact in applications that take advantage of their ability to quickly and cheaply gather localized visual information. Several such areas are agriculture, construction, infrastructure, and inventory management. Industries that already benefiting from a cheap eye in the sky.

1. What does the article suggest that "proactively establishing a set of professional ethics" might do for you?

- Proactively establishing a set of professional ethics can help you navigate the complex interactions and relationships encountered in the workplace.

1. What are some applications of 3D Printing?

- Prototyping - Manufacturing large entertainment models used in everything from movies to training personnel in new practices - Low volume production and tooling - Aerospace manufacturing - Medical device solutions - And much more

1. What is the software/ system development life cycle (SDLC)?

- SDLC or the Software Development Life Cycle is a process that produces software with the highest quality and lowest cost in the shortest time possible.

In your own words, what does a software developer do?

- Software developers are the creative minds behind software programs, and they have the technical skills to build those programs or to oversee their creation by a team. They create software that enables users to perform specific tasks on computer devices.

1. What is the maker movement? How does this movement compare to old-style crafting?

- The idea that resulted—that of "a magic toy box that could print toys"—gave rise to Shapiro's company, Glowforge, one of the most interesting pick-and-shovel businesses in what is popularly known as the maker movement. What does distinguish the maker movement from old-style crafting, however, besides its iconoclastic air, is the willingness to embrace cutting-edge manufacturing methods alongside, or even in place of, traditional craftsmanship.

1. What does ethics have to do with information systems and information technologies?

- The introduction of new technology can have a profound effect on human behavior. New technologies give us capabilities that we did not have before, which in turn create environments and situations that have not been specifically addressed in an ethical context.

1. How does Google use data and analytics in their "People Analytics Department"?

- The team started an operation called project oxygen which consisted of them trying to figure out if managers actually mattered in the workplace. They first gathered all the data they could from performance reviews and employee surveys. After they had all of the data, they used a regression analysis and were able to show a big difference between the groups in terms of employee turnover, happiness, and team productivity. The data analytics they used proved that managers do make a difference.

1. What does the term ethics mean?

- The term ethics means "a set of moral principles" or "the principles of conduct governing an individual or a group."

1. Differentiate between "strong AI", "weak AI", and the "in-between" AI. In this regard, also differentiate between IBM's Deep Blue and Watson systems. Also, what is the "important takeaway" the article mentions?

- The work aimed at genuinely simulating human reasoning tends to be called "strong AI - The work in the second camp, aimed at just getting systems to work, is usually called "weak AI - Somewhere in the middle of strong and weak AI is a third camp (the "in-between"): systems that are informed or inspired by human reasoning.

1. What kinds of tasks will these robots undertake?

- The world's largest retailer announced Tuesday that it is adding thousands of new robots to its stores. By next February, it expects to have autonomous floor scrubbers in 1,860 of its more than 4,700 US stores. Walmart will also have robots that scan shelf inventory at 350 stores. And there will be bots at 1,700 stores that automatically scan boxes as they come off delivery trucks and sort them by department onto conveyer belts.

1. Differentiate between "narrow AI" and "general AI".

- There is another distinction to be made here -- the difference between AI systems designed for specific tasks (often called "narrow AI") and those few systems that are designed for the ability to reason in general (referred to as "general AI").

1. What are the main aims of cyber attacks?

- These cyberattacks are usually aimed at accessing, changing, or destroying sensitive information; extorting money from users; or interrupting normal business processes.

1. What is social engineering, and what tactics do hackers use when attempting a social engineering attack?

- They focus on gaining your trust using opaque pieces of information that seem reliable. Thyre trying to get you to hand your info over. Phishing, credential harvesting, phone phishing.

1. Differentiate between traditional manufacturing and 3D Printing.

- Traditional manufacturing has humans and machines working together to get stuff done, now it is just machines doing the work.

1. How is AR different than VR?

- Unlike virtual reality, which requires you to inhabit an entirely virtual environment, augmented reality uses your existing natural environment and simply overlays virtual information on top of it. As both virtual and real worlds harmoniously coexist, users of augmented reality experience a new and improved natural world where virtual information is used as a tool to provide assistance in everyday activities.

1. According to this reading, what differentiates AR, VR, and MR?

- Virtual reality (VR) immerses users in a fully artificial digital environment. - Augmented reality (AR) overlays virtual objects on the real-world environment. - Mixed reality (MR) not just overlays but anchors virtual objects to the real world.

1. How might smart contracts impact various industries (as discussed in the article)?

Smart contracts could change entire fields of law. Blockchain wills could automatically take effect when a person dies, transferring inheritances without needing an executor. Replacing legal jargon with blockchain logic would require a different type of corporate lawyer with skills akin to a computer programmer. Imagine the implications for law schools!

1. What is an intermediary (also called a "middleman")?

Someone who buys goods from someone and sells them to retailers or consumers

1. According to the article, what are some of the benefits of making stuff?

- It would save so much money for everyone

1. What kinds of tasks do machines do well at? Conversely, what kinds of tasks do humans do well at (generally)?

- Machines: frequent high volume tasks - Humans: Novel solutions

1. How is Texas Tech using reality technologies to help students with visual impairments?

- Texas Tech University's Student Disability Services has partnered with software company Aira to provide an augmented reality service to students with visual impairments. - The partnership will allow anyone on-campus to access the Aira mobile app, free of charge. - With the touch of a button, the app connects each user to a mobility and orientation specialist who will help them navigate through their environment.

1. According to the article, why is Walmart introducing robots in many of its stores?

- Walmart wants store workers to help out customers instead of mopping up floors and unloading boxes in backrooms. So it's increasingly turning to robots to fill those tasks.

1. What are the different ways VR is experienced?

- You need to wear a special VR headset to experience virtual reality. Most VR headsets are connected to a computer (Oculus Rift) or a gaming console (PlayStation VR) but there are standalone devices (Google Cardboard is among the most popular) as well. Most standalone VR headsets work in combination with smartphones - you insert a smartphone, wear a headset, and immerse in the virtual reality.

1. Tableau "makes analyzing data fast, easy, and beautiful for everyone."

buppy

1. The Tableau application allows you to "sort, highlight, drill down, or filter your data in seconds."

damn straight

1. According to the website, blockchain "provides a simple, secure way to ________________

establish trust for virtually any kind of transaction, helping simplify the movement of money, products or sensitive information worldwide

1. Determine the most common sources for cyber attacks?

Emails, phone calls

1. What are the most common SDLC models, according to the reading? What are some of the key features of each?

· Waterfall Model. This SDLC model is the oldest and most straightforward. With this methodology, we finish one phase and then start the next. Each phase has its own mini-plan and each phase "waterfalls" into the next. The biggest drawback of this model is that small details left incomplete can hold up the entire process. · Agile Model. The Agile SDLC model separates the product into cycles and delivers a working product very quickly. This methodology produces a succession of releases. Testing of each release feeds back info that's incorporated into the next version. According to Robert Half, the drawback of this model is that the heavy emphasis on customer interaction can lead the project in the wrong direction in some cases. · Iterative Model. This SDLC model emphasizes repetition. Developers create a version very quickly and for relatively little cost, then test and improve it through rapid and successive versions. One big disadvantage here is that it can eat up resources fast if left unchecked. · V-Shaped Model. An extension of the waterfall model, this SDLC methodology tests at each stage of development. As with waterfall, this process can run into roadblocks. · Big Bang Model. This high-risk SDLC model throws most of its resources at development and works best for small projects. It lacks the thorough requirements definition stage of the other methods. · Spiral Model. The most flexible of the SDLC models, the spiral model is similar to the iterative model in its emphasis on repetition. The spiral model goes through the planning, design, build and test phases over and over, with gradual improvements at each pass.

1. Understand the following terms: Acceptable Use Policy (AUP), intellectual property, copyright, fair use, Creative Commons, patent, trademark, privacy, NORA, and Do Not Track.

- Acceptable Use Policy (AUP) before those services can be accessed. Similar to a code of ethics, this policy outlines what is allowed and what is not allowed while someone is using the organization's services. - Intellectual property is defined as "property (as an idea, invention, or process) that derives from the work of the mind or intellect." - Copyright is the protection given to songs, computer programs, books, and other creative works - Fair use is a limitation on copyright law that allows for the use of protected works without prior authorization in specific cases. For example, if a teacher wanted to discuss a current event in class, copies of the copyrighted new story could be handed out in class without first getting permission. - Creative Commons is a nonprofit organization that provides legal tools for artists and authors. The tools offered make it simple to license artistic or literary work for others to use or distribute in a manner consistent with the author's intentions. - A patent creates protection for someone who invents a new product or process. - A trademark is a word, phrase, logo, shape or sound that identifies a source of goods or services. - A trademark is a word, phrase, logo, shape or sound that identifies a source of goods or services. - The term privacy has many definitions, but for purposes here, privacy will mean the ability to control information about oneself. - This process of collecting large quantities of a variety of information and then combining it to create profiles of individuals is known as Non-Obvious Relationship Awareness, or NORA. - Do Not Track is a technology and policy proposal that enables users to opt out of tracking by websites they do not visit, including analytics services, advertising networks, and social platforms.

1. What did research out of Oxford suggest about how many jobs may be automated by machines?

- Almost ½ of jobs are at risk of being automated by machines

1. What is AR?

- An enhanced version of reality where live direct or indirect views of physical real-world environments are augmented with superimposed computer-generated images over a user's view of the real-world, thus enhancing one's current perception of reality

1. What is a blockchain "at its heart"? In what ways are blockchains used for more than just the "movement of money"?

- At its heart, a blockchain is a record of transactions, like a traditional ledger. - These transactions can be any movement of money, goods or secure data—a purchase at a supermarket, for example, or the assignment of a government ID number.

1. Based upon this definition (see your answer above), what technologies might be considered a robot, and conversely what technologies would not be considered a robot?

- Automated drones, anything that adapts to its environment is a robot. Its not considered a robot if you tell it to do it.

1. In your own words, define information systems ethics.

- Being ethical with the technology and power you are given through it. For example, people illegally download music every day, but those same people would never walk into a music store and steal CD's.

1. What is cyber security?

- Cybersecurity is the practice of protecting systems, networks, and programs from digital attacks.

1. What should a solid security awareness training program cover?

- Don't click! Users should never click on a link, attachment, or reply with the requested information if they feel like something is not quite right. - Inform the IT team or MSP. If it's a legitimate scam, informing the right people and passing along that knowledge may help prevent it from spreading company-wide. Encourage your clients to forward the email to you to investigate, or turn to you for next steps.

1. According to the article, what are some of the potential benefits of using drone technology?

- Faster, cheaper, easier way to scan areas, products, disasters, anything you need to see from an aerial view without you being able to get there.

1. What are some tools to help prevent cyber attacks? Are they sufficient to help prevent the modern cyber attack? Why or why not? If not, what else can help?

- Firewalls, security software. Not anymore because hackers are too advanced

1. What does the article suggest businesses do to "build a data-savvy workforce"? How will each of these things help (e.g., not relying on the "HiPPO", etc.)?

1. Start from the top with data-driven leadership - Start with the obvious: leaders must lead by example. Today's top managers are sharing insights with their teams and using data to help tell their story. In the absence of a data-driven leadership team, decisions are often based on the HiPPO—"highest paid person's opinion." 2. Hire data-driven team members - If you hire people who are already data driven, bringing them into a work environment that's data savvy it will only make them thrive and perform better 3. Look within your existing ranks - if you can't hire them, start nurturing the talent you have and help them discover new capabilities and opportunities to learn and build out their skill sets. 4. Use data everywhere and embed it into your culture A data driven culture will have a huge advantage over those who don't use data in their everyday work experience because the more data you have the more you will learn from it and help your team progress faster. 5. Create your own data dictionary and tools strategy a data dictionary to define the key metrics, and an inventory of the tools available is key to your data-driven cultural success.The number and variety of tools available for organizations to leverage is exploding, and the data those tools are creating is growing exponentially. 6. Remember that data is not everything A data-driven culture can only take an organization so far. Sometimes you see organizations get so deep into reporting, analysis, and testing that they become paralyzed. Also, if you focus on the wrong thing you may miss the big wave that is happening around you.

1. What are some of the main concepts underlying 3D Printing, including definitions and how 3D Printing works generally?

3D printing refers to any manufacturing process which additively builds or forms 3D parts in layers from CAD data. 3D printing starts with a digital file derived from computer aided design (CAD) software. Once a design is completed, it must then be exported as a standard tessellation language (STL) file, meaning the file is translated into triangulated surfaces and vertices. A 3D printer then reads the 2-D layers as building blocks which it layers one atop the other, thus forming a three dimensional object. All design files, regardless of the 3D printing technology, are sliced into layers before printing. Layer thickness - the size of each individual layer of the sliced design - is determined partly by technology, partly by material, and partly by desired resolution and your project timeline; thicker layers equates to faster builds, thinner layers equate to finer resolution, less visible layer lines and therefore less intensive post-processing work. Orientation refers to how and which direction a part is placed on the 3D printing build platform. For example, a part may be oriented at an angle, or lying flat/standing vertical. Most 3D printing processes require support structures to act as "scaffolding" for features that can't be built above open air, such as overhangs, undercuts, holes, cavities, etc.

1. Fundamentally, how does blockchain technology work (make sure you include concepts such as blocks, hash, etc. in your explanation)?

A blockchain needs to do two things: gather and order data into blocks, and then chain them together securely using cryptography. Ex. Let's start with a simple transaction: Alice sells her car to Bill. The transaction information is recorded and shared with the other computers in the blockchain network. On the network, the record is combined with other transactions into a block—like a traditional computer database. Each transaction is time-stamped. When a block is complete, it also gets its own time stamp. So all information is sequential, which helps avoid duplicate entries. The completed block is sent out across the network, where it's appended to the chain.Other participants on the network may be sending out their own blocks at the same time. But the time stamps ensure that data is added in the right order, and all participants have the latest version. The key to a blockchain's security is something called a hash. It's a bit of cryptographic math that makes the links between blocks virtually unbreakable. A hash function takes the information in each block and uses it to create the hash—a unique string of characters. The hash from one block is added to the data in the next block. So when the next block goes through the hash function, a trace of it is woven into the new hash. And so on, throughout the chain. So if there's any attempt to alter a previously created block, the hash that's encoded in the next block won't match up anymore. This mismatch will continue through all subsequent blocks denoting an alteration in the chain.

1. What is a blockchain protocol?

A blockchain protocol is a set of rules that dictate how the computers in the network, called nodes, should verify new transactions and add them to the database.

1. What is a "data-driven culture"? Is generating "lots of reports" or having "dashboards throughout [the] organization" sufficient for having a data-driven culture? Why or why not?

A data-driven culture is when an organization's progress is measured using data rather than intuition (gut feel) or past examples. Many organizations believe they have a data-driven culture because they generate lots of reports, or have dashboards throughout their organization. Unfortunately, it's not that simple. Because you must have the ability to develop strategic insights into what is influencing your key performance indicators.

1. What is a smart contract?

A smart contract is a computer program that runs on a blockchain network.

1. What are some benefits of SDLC? Likewise, what are some pitfalls?

Benefits: SDLC done right can allow the highest level of management control and documentation. Developers understand what they should build and why. All parties agree on the goal upfront and see a clear plan for arriving at that goal. Everyone understands the costs and resources required. Pitfalls: Several pitfalls can turn an SDLC implementation into more of a roadblock to development than a tool that helps us. Failure to take into account the needs of customers and all users and stakeholders can result in a poor understanding of the system requirements at the outset. The benefits of SDLC only exist if the plan is followed faithfully.

1. What is a blockchain node?

Computers in the network

What skills and competencies should a software developer have, according to this reading?

Creativity and innovation: Yours should be the minds behind new software capabilities, even when others say it can't be done. Interpersonal and communication skills: You won't be working in a void. This job often involves collaboration with a team, and you'll have to be able to concisely and clearly communicate instructions to others. Analytical skills: You'll have to match improvements and creations to users' and clients' needs. Concentration and focus: Software development involves numerous and minute interlocking pieces. You can't be prone to distraction if you want to be successful.

1. What is cyber self-defence, what are its tactics (understand the specifics here), and what is the cyber self-defense golden rule?

Don't click, seriously don't click, use strong passwords, don't reuse passwords, stop using passwords, patch yourself. Golden rule: Trust, but verify

1. Differentiate between data and AI-induced biases.

Data biases have to do with what we plug into the data to make it bias; we just have to watch what we put in. However AI induced biases constantly evolve and change making them vulnerable to bias.

What are the duties and responsibilities of a software developer listed in this reading?

Develop and test software to meet consumers' and clients' needs. Develop upgrades for existing applications. Monitor quality and performance of applications through testing and maintenance. Document all work for future reference.

1. What are some of the potential uses of drone technology?

Drones a natural fit with the world of agriculture, where farmers can benefit from real time information about large tracts of land. Drones can help track almost everything including water use, crop health, heat signatures, and soil analysis. The use of drones to inspect existing infrastructure can be cheaper, faster, and importantly safer. For example, the New York Power Authority recently tested using drones to inspect an ice boom near Lake Erie. Inspecting one of these ice booms normally costs $3,500 to send a helicopter or $3,300 to send a boat to perform the task, but it cost less than $300 to deploy a drone. Several energy companies like Southern Company, and Duke Energy are using drones to inspect power lines, power plants, and storm damage. SunPower is using drones to improve solar farms. Similarly, start-ups such as SkySpecs are using drones to perform inspections of wind turbines which used to take hours in just minutes. Drones aren't just being used to inspect traditional infrastructure but also to replace it. In early 2017 AT&T successfully tested their comically named Flying COW (Cell on Wings). The drone functions as a small replacement cell tower which can be deployed at disaster scenes or during big events to spread the load placed on static towers. Construction application: Real time aerial inspection allows for the ability to quickly survey sites or catch mistakes. Using drones to quickly scans thousand of crops in a field is not much different than using drones to scan thousands of items in a warehouse, so it is only natural that large retailers are adopting similar drone technology for their inventory needs. Wal-Mart has been testing the use of drones in its warehouses to check and flag missing items. According to the company, drones flying through the warehouse can do a full inventory check in a day, a task that currently takes a month for people to do manually.

1. How do you think Tableau (or a similar visualization app/ platform) might help you in your future career (if at all)?

It would help a lot for me to have all of my data in one place and be able to access it so quickly and easily to help me make better decisions for my job in the future.

1. What are the different types of AR, and what differentiates these types?

Marker Based Augmented Reality: Marker-based augmented reality (also called Image Recognition) uses a camera and some type of visual marker, such as a QR/2D code, to produce a result only when the marker is sensed by a reader. Marker based applications use a camera on the device to distinguish a marker from any other real world object. Distinct, but simple patterns (such as a QR code) are used as the markers, because they can be easily recognized and do not require a lot of processing power to read. The position and orientation is also calculated, in which some type of content and/or information is then overlaied the marker. Markerless Augmented Reality: As one of the most widely implemented applications of augmented reality, markerless (also called location-based, position-based, or GPS) augmented reality, uses a GPS, digital compass, velocity meter, or accelerometer which is embedded in the device to provide data based on your location. A strong force behind markerless augmented reality technology is the wide availability of smartphones and location detection features they provide. It is most commonly used for mapping directions, finding nearby businesses, and other location-centric mobile applications. Projection Based Augmented Reality: Projection based augmented reality works by projecting artificial light onto real world surfaces. Projection based augmented reality applications allow for human interaction by sending light onto a real world surface and then sensing the human interaction (i.e. touch) of that projected light. Detecting the user's interaction is done by differentiating between an expected (or known) projection and the altered projection (caused by the user's interaction). Another interesting application of projection based augmented reality utilizes laser plasma technology to project a three-dimensional (3D) interactive holograminto mid-air. Superimposition Based Augmented Reality: Superimposition based augmented reality either partially or fully replaces the original view of an object with a newly augmented view of that same object. In superimposition based augmented reality, object recognition plays a vital role because the application cannot replace the original view with an augmented one if it cannot determine what the object is. A strong consumer-facing example of superimposition based augmented reality could be found in the Ikea augmented reality furniture catalogue. By downloading an app and scanning selected pages in their printed or digital catalogue, users can place virtual ikea furniture in their own home with the help of augmented reality.

1. Differentiate between the two forms of MR listed in this reading?

Mixed reality that starts with the real world - virtual objects are not just overlaid on the real world but can interact with it. In this case, a user remains in the real-world environment while digital content is added to it; moreover, a user can interact with virtual objects. This form of mixed reality can be considered an advanced form of AR. If you can't figure out how this works, take a look at how Skype is used on Microsoft HoloLens. Mixed reality that starts with the virtual world - the digital environment is anchored to and replaces the real world. In this case, a user is fully immersed in the virtual environment while the real world is blocked out. Sounds like virtual reality, right? In fact it does, but the digital objects overlap the real ones whereas in conventional VR the virtual environment isn't connected to the real world around a user. To experience this form of mixed reality, you can wear Windows mixed reality headsets. Here's an example of how it all works.

1. What impact will blockchain have on intermediaries?

No more. Blockchain replaces this central system with a decentralized ledger of chained records. Each record is connected to the one before and the one after it, yielding a traceable history of every transaction. No record can be deleted and no existing records can be altered.

1. What is the 51% attack? How does it work?

Susceptibility to 51% attacks is inherent to most cryptocurrencies. That's because most are based on blockchains that use proof of work as their protocol for verifying transactions.

1. What are the methods of (or tools of the trade in) the maker movement? What kinds of machines are used?

The first of these methods was 3D printing, which creates objects by building up material, usually malleable plastic, layer by layer. By contrast, both the Othermill, Applestone's machine, and Glowforge's namesake product manufacture through subtraction.

1. Why are phishing and social engineer attacks so successful?

The reason phishing and other social engineering attacks are so successful is because they're disguised to look like they come from credible, trustworthy sources—forcing a sense of falsified trust.

1. What are some of the applications of reality technologies in business, and how are companies using these technologies specifically?

VR Remote Training Employees: Utilizing VR in the training infrastructure could reduce these costs while increasing the effectiveness of training. In the virtual world, a single instructor could teach a single classroom consisting of new employees spread all over the world. Mixed Reality Data Organization: think of tony stark organizing his iron man suits Virtual Reality Communication and Collaboration: there's no reason the conference room has to be a conference room. The team could just as easily meet on top of Mount Everest, in the Oval Office, or in outer space. The virtual environment can serve to focus employees, set the mood, or just provide a welcome change of scenery. It's true for individual workers, as well. Collaboration is a way of life in today's workforce, but everyone sometimes feels the need to concentrate on their work without the noise and distractions of their co-workers.

1. What does Walmart hope will be the outcome of introducing robots, especially (but not limited to) in terms of its associates?

Walmart says these "smart assistants" will reduce the amount of time workers spend on "repeatable, predictable and manual" tasks in stores and allow them to switch to selling merchandise to shoppers and other customer service roles. "The overall trend we're seeing is that automating certain tasks gives associates more time to do work they find fulfilling and to interact with our customer"

1. What is the "DevOps movement"?

When development and Ops teams use the same toolset to track performance and pin down defects from inception to the retirement of an application, this provides a common language and faster handoffs between teams.

1. According to article, data are not really important unless you first understand what? Why might this be the case (and why is it the case for Google)?

You must understand all of the important questions you are asking. This is important for google because they start with questions and they must be very clear about the information needs at the beginning.

1. The Tableau application allows you to "bring all your data together in one simple view."

quaint

1. What does the term disintermediation mean, and how does it relate to blockchain technology?

reduction in the use of intermediaries between producers and consumers, for example by investing directly in the securities market rather than through a bank.


Conjuntos de estudio relacionados

chapter 15 fetal assessment during labor

View Set

FIN 3365 Real Estate Exam 1 (Ch 1,2,3,4,5,8)

View Set

AP Gov. Chapter 14 - The Presidency

View Set

The Importance of Being Earnest Act 1 Quiz

View Set

II Kraniaalnärv N. opticus- nägemisnärv

View Set

Chapter Seven Mastering Biology Homework

View Set

L12 : INSTALLATION ART (NEW MEDIA ART)

View Set

PRELIM 3: LUNG CANCER Overview (21)

View Set

Tje-ljudet kan stavas med tj, k, ki, kj och ch

View Set

Custom: Postpartum care Assessment ATI

View Set

Chapter 1 (1-6 learn the basics!)

View Set