Quantum Computing and Other Transformative Technologies

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book explores quantum computing as a transformative technology and its applications in communications, cryptography, teleportation, IoT, AI, and blockchain, in addition to the revolutionary concept of quantum internet. It also explains the concept of dark, small, thick data, and clarifies the concept of a data lake. Other exciting technologies like edge/fog computing, CDN, SDN, wearable technology and IoE topics are discussed in detail in the book. Information security applications like zero trust model, zero-day vulnerability and heuristic analysis, and use of AI in cybersecurity are explored. Two of the most intriguing concepts in computing, “affective computing” and “autonomic computing”, are explained and simplified. The blockchain applications presented include blockchain and supply chain, crowdsourcing, cryptocurrency, and IoT. The book ends with a look at using technology to fight COVID-19 and future pandemics.

Author(s): Ahmed Banafa
Series: River Publishers Series in Computing and Information Science and Technology
Publisher: River Publishers
Year: 2023

Language: English
Pages: 259
City: Gistrup

Cover
Half Title
Series Page
Title Page
Copyright Page
Dedication
Table of Contents
Preface
Audience
Acknowledgment
List of Figures
List of Abbreviations
Introduction
Part 1: Quantum Computing
Chapter 1: What is Quantum Computing?
1.1: A Comparison of Classical and Quantum Computing
1.2: Quantum Superposition and Entanglement
1.3: Difficulties with Quantum Computers
1.4 The Future of Quantum Computing
References
Chapter 2: Quantum Cryptography
2.1: Problems with using Quantum Cryptography
References
Chapter 3: Quantum Internet
3.1: What is Quantum Internet?
3.2: Quantum Communications
References
Chapter 4: Quantum Teleportation
4.1: Quantum Teleportation: Paving the Way for a Quantum Internet
References
Chapter 5: Quantum Computing and IoT
5.1: A Comparison of Classical and Quantum Computing
5.2: Quantum Communications
5.3: Quantum Computing and IoT
5.4: The Road Ahead
References
Chapter 6: Quantum Computing and Blockchain: Myths and Facts
6.1: Difficulties with Quantum Computers
6.2: What Is Quantum Supremacy?
6.3: What is Quantum Cryptography?
References
Chapter 7: Quantum Computing and AI: A Mega-Buzzword
7.1: What is Quantum Computing?
7.2: Difficulties with Quantum Computers
7.3: Applications of Quantum Computing and AI
7.4: Processing Large Sets of Data
7.5: Solve Complex Problem Faster
7.6: Better Business Insights and Models
7.7: Integration of Multiple Sets of Data
7.8: The Future
References
Chapter 8: Quantum Computing Trends
8.1: A Comparison of Classical and Quantum Computing
8.2: Physical vs. Logical Qubits
8.3: Quantum Superposition and Entanglement
8.4: Quantum Emulator/Simulator
8.5: Quantum Annealer
8.6: Noisy Intermediate-Scale Quantum (NISQ) Computers
8.7: Universal Quantum Computers/Cryptographically Relevant Quantum Computers (CRQC)
8.8: Post-Quantum/Quantum-Resistant Codes
8.9: Difficulties with Quantum Computers
References
Part 2: Other Computing Technologies
Chapter 9: What is Deep Learning?
9.1: Neural Network
9.2: Deep Learning vs. Machine Learning
9.3: The Deep Learning Game
9.4: The Future
References
Chapter 10: Affective Computing
10.1: Emotion in Machines
10.2: The Future
References
Chapter 11: Autonomic Computing
11.1: Benefits
11.2: Future of Autonomic Computing
References
Part 3: Big Data, Dark Data, Thick Data, and Small Data
Chapter 12: Thick Data vs. Big Data
12.1: Comparison of Big Data and Thick Data
References
Chapter 13: Understanding Dark Data
13.1: Types of Dark Data
13.2: Value of Dark Data
13.3: Future of Dark Data
References
Chapter 14: Small Data vs. Big Data: Back to the Basics
14.1: Why Small Data?
14.2: The Future of Small Data
References
Chapter 15: What is a Data Lake?
15.1: Data Lake vs. Data Warehouse
15.2: Five Key Components of a Data Lake Architecture
15.3: Data Lake Advantages
15.4: Data Lake Disadvantages
15.5: The Future
References
Part 4: Cloud Computing
Chapter 16: Edge Computing Paradigm
16.1: Advantages of Edge Computing
16.2: Benefits of Edge Computing
16.3: Real-Life Example
16.4: Future of Edge Computing
References
Chapter 17: The Internet of Everything
17.1: What is the Internet of Everything (IoE)?
17.2: Pillars of the Internet of Everything (IoE)
17.3: The Internet of Things (IoT)
17.4: The Difference Between IoE and IoT
17.5: The Future
References
Chapter 18: Content Delivery Networks – CDNs
18.1: Dynamics of CDNs
18.2: Difference Between Serving Content without a CDN and with a CDN
18.3: Types of Services
18.4: Advantages of CDNs
18.5: Disadvantages of CDNs
18.6: The Future
References
Chapter 19: Network Functions Virtualization (NFV) or Software-Defined Networking (SDN)?
19.1: What is Network Functions Virtualization (NFV)?
19.2: The Benefits of NFV
19.3: Types of NFV
19.4: Which is Better – SDN or NFV?
19.5: The Future of NFV
References
Chapter 20: What is Virtualization?
20.1: What is Virtualization?
20.2: Types of Virtualizations
20.3: How is Virtualization Different from Cloud Computing?
20.4: The Future of Virtualization
References
Chapter 21: Risks of Cloud Computing Explained (Both Sides)
21.1: The Risks Will Never Diminish
References
Chapter 22: Cloud-of-Clouds or (Intercloud)
22.1: The Future
References
Chapter 23: Myths and Facts About Cloud Computing
23.1: Types of Cloud Computing
23.2: The Promise of Cloud Computing
23.3: What is Next for Cloud Computing?
Part 5: Security
Chapter 24: Zero-Day Vulnerability and Heuristic Analysis
24.1: What is a Zero-Day Vulnerability?
24.2: Zero-Day Exploit
24.3: Zero-Day Threat
24.4: Defending Against Zero-Day Threats
24.5: What are Heuristics?
References
Chapter 25: The Zero Trust Model
25.1: “Outside-In” to “Inside-Out” Attacks
25.2: Zero Trust Recommendations
References
Chapter 26: Cloud Computing Security
26.1: Cloud Security Threats
26.2: The Future
Chapter 27: First Line of Defense for Cybersecurity: AI
27.1: Four Fundamental Security Practices
27.1.1: Identifying the patterns
27.1.2: Educating the users
27.1.3: Patching the holes
27.1.4: Checking off the controls
27.2: Challenges Faced by AI in Cybersecurity
27.2.1: AI-powered attacks
27.2.2: More sandbox-evading malware
27.2.3: Ransomware and IoT
27.2.4: A rise of state-sponsored attacks
27.2.5: Shortage of skilled staff
27.2.6: IT infrastructure
27.3: The Future of Cybersecurity and AI
References
Chapter 28: Second Line of Defense for Cybersecurity: Blockchain
28.1: Implementing Blockchain in Cybersecurity
28.2: Advantages of using Blockchain in Cybersecurity
28.2.1: Decentralization
28.2.2: Tracking and tracing
28.2.3: Confidentiality
28.2.4: Fraud security
28.2.5: Sustainability
28.2.6: Integrity
28.2.7: Resilience
28.2.8: Data quality
28.2.9: Smart contracts
28.2.10: Availability
28.2.11: Increased customer trust
28.3: Disadvantages of using Blockchain in Cybersecurity
28.3.1: Irreversibility
28.3.2: Storage limits
28.3.3: Risk of cyberattacks
28.3.4: Adaptability challenges
28.3.5: High operation costs
28.3.6: Blockchain literacy
28.4: Conclusion
References
Chapter 29: Network Security Needs Big Data
29.1: Zero Trust Model (ZTM)
29.2: Big Data and ZTM
Part 6: Blockchain
Chapter 30: Blockchain Technology and COVID-19
30.1: Major Challenges of COVID-19
30.2: Can Blockchain Help in Preventing Pandemics?
30.3: Tracking Infectious Disease Outbreaks
30.4: Donations Tracking
30.5: Crisis Management
30.6: Securing Medical Supply Chains
30.7: WHO and Blockchain Technology
References
Chapter 31: How Blockchain is Revolutionizing Crowdfunding
31.1: Limitations of Current Crowdfunding Platforms
31.2: How Blockchain Helps Crowdfunding
References
Chapter 32: Blockchain Technology and Supply Chain Management
32.1: Blockchain and SCM
32.2: Applications of Blockchain in SCM
References
Part 7: IoT
Chapter 33: IoT and COVID-19
33.1: IoT and WFH
33.2: IoT and Blockchain
33.3: IoT and E-Commerce
33.4: IoT and Telemedicine
References
Chapter 34: IoT and 5G Convergence
34.1: Benefits of using 5G in IoT
34.1.1: Higher transmission speed
34.1.2: More devices connected
34.1.3: Lower latency
34.2: Challenges Faced by 5G and IoT Convergence
34.2.1: Operating across multiple spectrum bands
34.2.2: A gradual upgradation from 4G to 5G
34.2.3: Data interoperability
34.2.4: Establishing 5G business models
34.3: Examples of Applications of 5G in IoT
34.3.1: Automotive
34.3.2: Industrial
34.3.3: Healthcare
References
Part 8: Wearable and Mobile Technology
Chapter 35: The Smart Platform: Wearable Computing Devices (WCD)
35.1: Concerns with Wearable Computing Devices
35.2: Applications of Wearable Computing Devices
35.3: The Future of Wearable Computing Devices
References
Chapter 36: Your Smart Device Will Feel Your Pain and Fear
References
Chapter 37: Technology Under Your Skin: Three Challenges of Microchip Implants
References
Part 9: Future Trends in Technology
Chapter 38: The Metaverse: A Different Perspective
38.1: Different Perspective of the Metaverse
38.2: Pillars of the Metaverse
38.3: The Future
References
Chapter 39: The Metaverse: Myths and Facts
39.1: Myths about the Metaverse
39.1.1: Myth #1: No one knows what the metaverse is
39.1.2: Myth #2: The metaverse is only gaming
39.1.3: Myth #3: The metaverse is only virtual reality
39.1.4: Myth #4: The metaverse will replace the real world
39.1.5: Myth #5: The metaverse is a fad
39.1.6: Myth #6: The metaverse will be a monopoly
39.1.7: Myth #7: The speed of technology will set the pace for adoption
39.1.8: Myth #8: The metaverse is already here
39.1.9: Myth #9: The metaverse is inevitable
39.1.10: Myth #10: The metaverse is suitable for everything
39.2: What is the Future of the Metaverse?
References
Chapter 40: Eight Key Tech Trends in a Post-COVID-19 World
40.1: Artificial Intelligence (AI)
40.2: Cloud Computing
40.3: VR/AR
40.4: 5G Networks
40.5: Voice User Interface (VUI)
40.6: Internet of Things (IoT)
40.7: Cybersecurity
40.8: Blockchain Technology
40.9: Tracking Infectious Disease Outbreaks
40.10: Donations Tracking
40.11: Crisis Management
40.12: Securing Medical Supply Chains
References
References
Index
About the Author