Quantum Computing and Other Transformative Technologies
This book explores quantum computing as a transformative technology and its applications in communications, cryptography, teleportation, IoT, AI, and blockchain, in addition to the revolutionary concept of quantum internet. It also explains the concept of dark, small, thick data, and clarifies the concept of a data lake. Other exciting technologies like edge/fog computing, CDN, SDN, wearable technology and IoE topics are discussed in detail in the book. Information security applications like zero trust model, zero-day vulnerability and heuristic analysis, and use of AI in cybersecurity are explored. Two of the most intriguing concepts in computing, “affective computing” and “autonomic computing”, are explained and simplified. The blockchain applications presented include blockchain and supply chain, crowdsourcing, cryptocurrency, and IoT. The book ends with a look at using technology to fight COVID-19 and future pandemics.
Part 1: Quantum Computing 1. What is Quantum Computing 2. Quantum Cryptography 3. Quantum Internet 4. Quantum Teleportation 5. Quantum Computing and IoT 6. Quantum Computing and Blockchain: Myths and Facts 7. Quantum Computing and AI: A Mega-Buzzword 8. Quantum Computing Trends Part 2: Other Computing Technologies 9. What is Deep Learning? 10. Affective Computing 11. Autonomic Computing Part 3: Big Data, Dark Data, Thick Data, and Small Data 12. Thick Data vs. Big Data 13. Understanding Dark Data 14. Small Data vs. Big Data: Back to the Basics 15. What is a Data Lake? Part 4: Cloud Computing 16. Edge Computing Paradigm 17. The Internet of Everything 18. Content Delivery Networks – CDNs 19. Network Functions Virtualization (NFV) or Software-Defined Networking (SDN)? 20. What is Virtualization? 21. Risks of Cloud Computing Explained (Both Sides) 22. Cloud-of-Clouds or (Intercloud) 23. Myths and Facts About Cloud Computing Part 5: Security 24. Zero-Day Vulnerability and Heuristic Analysis 25. The Zero Trust Model 26. Cloud Computing Security 27. First Line of Defense for Cybersecurity: AI 28. Second Line of Defense for Cybersecurity: Blockchain 29. Network Security Needs Big Data Part 6: Blockchain 30. Blockchain Technology and COVID-19 31. How Blockchain is Revolutionizing Crowdfunding 32. Blockchain Technology and Supply Chain Management Part 7: IoT 33. IoT and COVID-19 34. IoT and 5G Convergence Part 8: Wearable and Mobile Technology 35. The Smart Platform: Wearable Computing Devices (WCD) 36. Your Smart Device Will Feel Your Pain and Fear 37. Technology Under Your Skin: Three Challenges of Microchip Implants Part 9: Future Trends in Technology 38. The Metaverse: A Different Perspective 39. The Metaverse: Myths and Facts 40. Eight Key Tech Trends in a Post-COVID-19 World