Quantum computing and other transformative technologies:
This book explores quantum computing as a transformative technology and its applications in communications, cryptography, teleportation, IoT, AI, and blockchain, in addition to the revolutionary concept of quantum internet. It also explains the concept of dark, small, thick data, and clarifies what...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Gistrup, Denmark
River Publishers
[2022]
|
Schriftenreihe: | River Publishers series in computing and information science and technology
|
Schlagworte: | |
Online-Zugang: | FHI01 Volltext Taylor & Francis https://public.ebookcentral.proquest.com/choice/PublicFullRecord.aspx?p=7178727 EBSCOhost https://www.vlebooks.com/vleweb/product/openreader?id=none&isbn=9781000794328 |
Zusammenfassung: | This book explores quantum computing as a transformative technology and its applications in communications, cryptography, teleportation, IoT, AI, and blockchain, in addition to the revolutionary concept of quantum internet. It also explains the concept of dark, small, thick data, and clarifies what the concept of a data lake. Other exciting technologies like edge/fog computing, CDN, SDN, wearable technology and IoE topics are discussed in details in the book. Information security applications like zero trust model, zero-day vulnerability and heuristic analysis, and use of AI in cybersecurity are explored. Two of the most intriguing concepts in computing "affective computing" and "autonomic computing" are explained and simplified. The blockchain applications presented include blockchain and supply chain, crowdsourcing, cryptocurrency, and IoT. The book ends with a look at using technology to fight COVID-19 and future pandemics |
Beschreibung: | 1 Online-Ressource (xvii, 231 Seiten) |
ISBN: | 9788770226837 8770226830 9781000794328 1000794326 9781003339175 1003339174 1000797481 9781000797480 |
Internformat
MARC
LEADER | 00000nmm a2200000 c 4500 | ||
---|---|---|---|
001 | BV049486665 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 240104s2022 |||| o||u| ||||||eng d | ||
020 | |a 9788770226837 |9 9788770226837 | ||
020 | |a 8770226830 |9 8770226830 | ||
020 | |a 9781000794328 |9 9781000794328 | ||
020 | |a 1000794326 |9 1000794326 | ||
020 | |a 9781003339175 |9 9781003339175 | ||
020 | |a 1003339174 |9 1003339174 | ||
020 | |a 1000797481 |9 1000797481 | ||
020 | |a 9781000797480 |9 9781000797480 | ||
024 | 7 | |a 10.1201/9781003339175 |2 doi | |
035 | |a (OCoLC)1418697819 | ||
035 | |a (DE-599)BVBBV049486665 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-573 | ||
100 | 1 | |a Banafa, Ahmed |e Verfasser |0 (DE-588)1260403297 |4 aut | |
245 | 1 | 0 | |a Quantum computing and other transformative technologies |c Ahmed Banafa |
264 | 1 | |a Gistrup, Denmark |b River Publishers |c [2022] | |
300 | |a 1 Online-Ressource (xvii, 231 Seiten) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a River Publishers series in computing and information science and technology | |
505 | 8 | |a Preface xvii Audience xix Acknowledgment xxi List of Figures xxiii List of Abbreviations xxv Introduction 1 Part 1 Quantum Computing 3 1 What is Quantum Computing? 5 1.1 A Comparison of Classical and Quantum Computing 5 1.2 Quantum Superposition and Entanglement 6 1.3 Difficulties with Quantum Computers 6 1.4 The Future of Quantum Computing 7 References 7 2 Quantum Cryptography 9 2.1 Problems with using Quantum Cryptography 10 References 11 3 Quantum Internet 13 3.1 What is Quantum Internet? 14 3.2 Quantum Communications 15 References 16 4 Quantum Teleportation 17 4.1 Quantum Teleportation: Paving the Way for a Quantum Internet 19 References 19 5 Quantum Computing and IoT 21 5.1 A Comparison of Classical and Quantum Computing 22 5.2 Quantum Communications 23 5.3 Quantum Computing and IoT 24 5.4 The Road Ahead 24 References 25 6 Quantum Computing and Blockchain: Myths and Facts 27 6.1 Difficulties with Quantum Computers 27 6.2 What Is Quantum Supremacy? 28 6.3 What is Quantum | |
505 | 8 | |a Cryptography? 29 References 30 7 Quantum Computing and AI: A Mega-Buzzword 31 7.1 What is Quantum Computing? 31 7.2 Difficulties with Quantum Computers 32 7.3 Applications of Quantum Computing and AI 32 7.4 Processing Large Sets of Data 32 7.5 Solve Complex Problem Faster 33 7.6 Better Business Insights and Models 33 7.7 Integration of Multiple Sets of Data 34 7.8 The Future 34 References 34 8 Quantum Computing Trends 37 8.1 A Comparison of Classical and Quantum Computing 37 8.2 Physical vs Logical Qubits 38 8.3 Quantum Superposition and Entanglement 39 8.4 Quantum Emulator/Simulator 40 8.5 Quantum Annealer 40 8.6 Noisy Intermediate-Scale Quantum (NISQ) Computers 40 8.7 Universal Quantum Computers/Cryptographically Relevant Quantum Computers (CRQC) 41 8.8 Post-Quantum/Quantum-Resistant Codes 41 8.9 Difficulties with Quantum Computers 41 References 41 Part 2 Other Computing Technologies 43 9 What is Deep Learning? 45 9.1 Neural Network 45 9.2 Deep Learning vs Machine Learning 46 9.3 | |
505 | 8 | |a The Deep Learning Game 46 9.4 The Future 47 References 47 10 Affective Computing 49 10.1 Emotion in Machines 50 10.2 The Future 51 References 51 11 Autonomic Computing 53 11.1 Benefits 55 11.2 Future of Autonomic Computing 55 References 55 Part 3 Big Data, Dark Data, Thick Data, | |
505 | 8 | |a and Small Data 57 12 Thick Data vs Big Data 59 12.1 Comparison of Big Data and Thick Data 60 References 62 13 Understanding Dark Data 65 13.1 Types of Dark Data 66 13.2 Value of Dark Data 66 13.3 Future of Dark Data 67 References 67 14 Small Data vs Big Data: Back to the Basics 69 14.1 Why Small Data? 70 14.2 The Future of Small Data 71 References 72 15 What is a Data Lake? 73 15.1 Data Lake vs Data Warehouse 73 15.2 Five Key Components of a Data Lake Architecture 74 15.3 Data Lake Advantages 75 15.4 Data Lake Disadvantages 76 15.5 The Future 76 References 77 Part 4 Cloud Computing 79 16 Edge Computing Paradigm 81 16.1 Advantages of Edge Computing 82 16.2 Benefits of Edge Computing 83 16.3 Real-Life Example 83 16.4 Future of Edge Computing 84 References 85 17 The Internet of Everything 87 17.1 What is the Internet of Everything (IoE)? 87 17.2 Pillars of the Internet of Everything (IoE) 88 17.3 The Internet of Things (IoT) 88 17.4 The Difference Between IoE and IoT 88 17.5 The Future | |
505 | 8 | |a 88 References 89 18 Content Delivery Networks - CDNs 91 18.1 Dynamics of CDNs 91 18.2 Difference Between Serving Content without a CDN and with a CDN 92 18.3 Types of Services 94 18.4 Advantages of CDNs 94 18.5 Disadvantages of CDNs 95 18.6 The Future 95 References 95 19 Network Functions Virtualization (NFV) or Software-Defined Networking (SDN)? 97 19.1 What is Network Functions Virtualization (NFV)? 97 19.2 The Benefits of NFV 98 19.3 Types of NFV 98 19.4 Which is Better - SDN or NFV? 99 19.5 The Future of NFV 100 References 100 20 What is Virtualization? 101 20.1 What is Virtualization? 101 20.2 Types of Virtualizations 102 20.3 How is Virtualization Different from Cloud Computing? 103 20.4 The Future of Virtualization 103 References 103 21 Risks of Cloud Computing Explained (Both Sides) 105 21.1 The Risks Will Never Diminish 107 References 108 22 Cloud-of-Clouds or (Intercloud) 109 22.1 The Future 110 References 111 23 Myths and Facts About Cloud Computing 113 23.1 Types of Cloud | |
505 | 8 | |a Computing 113 23.2 The Promise of Cloud Computing 115 23.3 What is Next for Cloud Computing? 116 Part 5 Security 119 24 Zero-Day Vulnerability and Heuristic Analysis 121 24.1 What is a Zero-Day Vulnerability? 121 24.2 Zero-Day Exploit 122 24.3 Zero-Day Threat 122 24.4 Defending Against Zero-Day Threats 122 24.5 What are Heuristics? 123 References 125 25 The Zero Trust Model 127 25.1 "Outside-In" to "Inside-Out" Attacks 128 25.2 Zero Trust Recommendations 129 References 129 26 Cloud Computing Security 131 26.1 Cloud Security Threats 132 26.2 The Future 133 27 First Line of Defense for Cybersecurity: AI 135 27.1 Four Fundamental Security Practices 137 27.1.1 Identifying the patterns 137 27.1.2 Educating the users 137 27.1.3 Patching the holes 138 27.1.4 Checking off the controls 138 27.2 Challenges Faced by AI in Cybersecurity 138 27.2.1 AI-powered attacks 138 27.2.2 More sandbox-evading malware 139 27.2.3 Ransomware and IoT 139 27.2.4 A rise of state-sponsored attacks 140 27.2.5 | |
505 | 8 | |a Shortage of skilled staff 140 27.2.6 IT infrastructure 140 27.3 The Future of Cybersecurity and AI 140 References 141 28 Second Line of Defense for Cybersecurity: Blockchain 143 28.1 Implementing Blockchain in Cybersecurity 144 28.2 Advantages of using Blockchain in Cybersecurity 145 28.2.1 Decentralization 145 28.2.2 Tracking and tracing 146 28.2.3 Confidentiality 146 28.2.4 Fraud security 146 28.2.5 Sustainability 146 28.2.6 Integrity 146 28.2.7 Resilience 146 28.2.8 Data quality 146 28.2.9 Smart contracts 147 28.2.10 Availability 147 28.2.11 Increased customer trust 147 28.3 Disadvantages of using Blockchain in Cybersecurity 147 28.3.1 Irreversibility 147 28.3.2 Storage limits 147 28.3.3 Risk of cyberattacks 147 28.3.4 Adaptability challenges 148 28.3.5 High operation costs 148 28.3.6 Blockchain literacy 148 28.4 Conclusion 148 References 149 29 Network Security Needs Big Data 151 29.1 Zero Trust Model (ZTM) 152 29.2 Big Data and ZTM 153 Part 6 Blockchain 155 30 Blockchain | |
505 | 8 | |a Technology and COVID-19 157 30.1 Major Challenges of COVID-19 158 30.2 Can Blockchain Help in Preventing Pandemics? 158 30.3 Tracking Infectious Disease Outbreaks 159 30.4 Donations Tracking 159 30.5 Crisis Management 160 30.6 Securing Medical Supply Chains 160 30.7 WHO and Blockchain Technology 160 References 161 31 How Blockchain is Revolutionizing Crowdfunding 163 31.1 Limitations of Current Crowdfunding Platforms 163 31.2 How Blockchain Helps Crowdfunding 165 References 166 32 Blockchain Technology and Supply Chain Management 167 32.1 Blockchain and SCM 168 32.2 Applications of Blockchain in SCM 169 References 169 Part 7 IoT 171 33 IoT and COVID-19 173 33.1 IoT and WFH 174 33.2 IoT and Blockchain 174 33.3 IoT and E-Commerce 175 33.4 IoT and Telemedicine 175 References 176 34 IoT and 5G Convergence 177 34.1 Benefits of using 5G in IoT 178 34.1.1 Higher transmission speed 178 34.1.2 More devices connected 178 34.1.3 Lower latency 179 34.2 Challenges Faced by 5G and IoT Convergence | |
505 | 8 | |a 179 34.2.1 Operating across multiple spectrum bands 179 34.2.2 A gradual upgradation from 4G to 5G 179 34.2.3 Data interoperability 180 34.2.4 Establishing 5G business models 180 34.3 Examples of Applications of 5G in IoT 180 34.3.1 Automotive 180 34.3.2 Industrial 181 34.3.3 Healthcare 181 References 181 Part 8 Wearable and Mobile Technology 183 35 The Smart Platform: Wearable Computing Devices (WCD) 185 35.1 Concerns with Wearable Computing Devices 186 35.2 Applications of Wearable Computing Devices 186 35.3 The Future of Wearable Computing Devices 186 References 187 36 Your Smart Device Will Feel Your Pain and Fear 189 References 192 37 Technology Under Your Skin: Three Challenges of Microchip Implants 193 References 196 Part 9 Future Trends in Technology 197 38 The Metaverse: A Different Perspective 199 38.1 Different Perspective of the Metaverse 200 38.2 Pillars of the Metaverse 200 38.3 The Future 200 References 201 39 The Metaverse: Myths and Facts 203 39.1 Myths about the | |
505 | 8 | |a Metaverse 204 39.1.1 Myth #1: No one knows what the metaverse is 204 39.1.2 Myth #2: The metaverse is only gaming 204 39.1.3 Myth #3: The metaverse is only virtual reality 204 39.1.4 Myth #4: The metaverse will replace the real world 204 39.1.5 Myth #5: The metaverse is a fad 205 39.1.6 Myth #6: The metaverse will be a monopoly 205 39.1.7 Myth #7: The speed of technology will set the pace for adoption 206 39.1.8 Myth #8: The metaverse is already here 206 39.1.9 Myth #9: The metaverse is inevitable 206 39.1.10 Myth #10: The metaverse is suitable for everything 207 39.2 What is the Future of the Metaverse? 207 References 208 40 Eight Key Tech Trends in a Post-COVID-19 World 209 40.1 Artificial Intelligence (AI) 210 40.2 Cloud Computing 211 40.3 VR/AR 211 40.4 5G Networks 211 40.5 Voice User Interface (VUI) 212 40.6 Internet of Things (IoT) 212 40.7 Cybersecurity 213 40.8 Blockchain Technology 213 40.9 Tracking Infectious Disease Outbreaks 214 40.10 Donations Tracking 214 40.11 Crisis | |
505 | 8 | |a Management 215 40.12 Securing Medical Supply Chains 215 References 215 References 217 Index 227 About the Author 231 | |
520 | 3 | |a This book explores quantum computing as a transformative technology and its applications in communications, cryptography, teleportation, IoT, AI, and blockchain, in addition to the revolutionary concept of quantum internet. It also explains the concept of dark, small, thick data, and clarifies what the concept of a data lake. Other exciting technologies like edge/fog computing, CDN, SDN, wearable technology and IoE topics are discussed in details in the book. Information security applications like zero trust model, zero-day vulnerability and heuristic analysis, and use of AI in cybersecurity are explored. Two of the most intriguing concepts in computing "affective computing" and "autonomic computing" are explained and simplified. The blockchain applications presented include blockchain and supply chain, crowdsourcing, cryptocurrency, and IoT. The book ends with a look at using technology to fight COVID-19 and future pandemics | |
653 | 0 | |a Quantum computing | |
653 | 0 | |a Informatique quantique | |
653 | 0 | |a SCIENCE / Energy | |
653 | 0 | |a Quantum computing | |
653 | 6 | |a Electronic books | |
776 | 0 | 8 | |i Print version |a BANAFA, PROFESSOR AHMED. |t QUANTUM COMPUTING AND OTHER TRANSFORMATIVE TECHNOLOGIES. |d Gistrup, Denmark: RIVER PUBLISHERS, 2022 |z 8770226849 |
856 | 4 | 0 | |u https://ieeexplore.ieee.org/book/9933493 |x Aggregator |z URL des Erstveröffentlichers |3 Volltext |
856 | 4 | 0 | |u https://www.taylorfrancis.com/books/9781003339175 |3 Taylor & Francis |
856 | 4 | 0 | |u https://public.ebookcentral.proquest.com/choice/PublicFullRecord.aspx?p=7178727 |
856 | 4 | 0 | |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=3530769 |3 EBSCOhost |
856 | 4 | 0 | |u https://www.vlebooks.com/vleweb/product/openreader?id=none&isbn=9781000794328 |
912 | |a ZDB-37-RPEB | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-034832062 | ||
966 | e | |u https://ieeexplore.ieee.org/book/9933493 |l FHI01 |p ZDB-37-RPEB |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804186281586982912 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Banafa, Ahmed |
author_GND | (DE-588)1260403297 |
author_facet | Banafa, Ahmed |
author_role | aut |
author_sort | Banafa, Ahmed |
author_variant | a b ab |
building | Verbundindex |
bvnumber | BV049486665 |
collection | ZDB-37-RPEB |
contents | Preface xvii Audience xix Acknowledgment xxi List of Figures xxiii List of Abbreviations xxv Introduction 1 Part 1 Quantum Computing 3 1 What is Quantum Computing? 5 1.1 A Comparison of Classical and Quantum Computing 5 1.2 Quantum Superposition and Entanglement 6 1.3 Difficulties with Quantum Computers 6 1.4 The Future of Quantum Computing 7 References 7 2 Quantum Cryptography 9 2.1 Problems with using Quantum Cryptography 10 References 11 3 Quantum Internet 13 3.1 What is Quantum Internet? 14 3.2 Quantum Communications 15 References 16 4 Quantum Teleportation 17 4.1 Quantum Teleportation: Paving the Way for a Quantum Internet 19 References 19 5 Quantum Computing and IoT 21 5.1 A Comparison of Classical and Quantum Computing 22 5.2 Quantum Communications 23 5.3 Quantum Computing and IoT 24 5.4 The Road Ahead 24 References 25 6 Quantum Computing and Blockchain: Myths and Facts 27 6.1 Difficulties with Quantum Computers 27 6.2 What Is Quantum Supremacy? 28 6.3 What is Quantum Cryptography? 29 References 30 7 Quantum Computing and AI: A Mega-Buzzword 31 7.1 What is Quantum Computing? 31 7.2 Difficulties with Quantum Computers 32 7.3 Applications of Quantum Computing and AI 32 7.4 Processing Large Sets of Data 32 7.5 Solve Complex Problem Faster 33 7.6 Better Business Insights and Models 33 7.7 Integration of Multiple Sets of Data 34 7.8 The Future 34 References 34 8 Quantum Computing Trends 37 8.1 A Comparison of Classical and Quantum Computing 37 8.2 Physical vs Logical Qubits 38 8.3 Quantum Superposition and Entanglement 39 8.4 Quantum Emulator/Simulator 40 8.5 Quantum Annealer 40 8.6 Noisy Intermediate-Scale Quantum (NISQ) Computers 40 8.7 Universal Quantum Computers/Cryptographically Relevant Quantum Computers (CRQC) 41 8.8 Post-Quantum/Quantum-Resistant Codes 41 8.9 Difficulties with Quantum Computers 41 References 41 Part 2 Other Computing Technologies 43 9 What is Deep Learning? 45 9.1 Neural Network 45 9.2 Deep Learning vs Machine Learning 46 9.3 The Deep Learning Game 46 9.4 The Future 47 References 47 10 Affective Computing 49 10.1 Emotion in Machines 50 10.2 The Future 51 References 51 11 Autonomic Computing 53 11.1 Benefits 55 11.2 Future of Autonomic Computing 55 References 55 Part 3 Big Data, Dark Data, Thick Data, and Small Data 57 12 Thick Data vs Big Data 59 12.1 Comparison of Big Data and Thick Data 60 References 62 13 Understanding Dark Data 65 13.1 Types of Dark Data 66 13.2 Value of Dark Data 66 13.3 Future of Dark Data 67 References 67 14 Small Data vs Big Data: Back to the Basics 69 14.1 Why Small Data? 70 14.2 The Future of Small Data 71 References 72 15 What is a Data Lake? 73 15.1 Data Lake vs Data Warehouse 73 15.2 Five Key Components of a Data Lake Architecture 74 15.3 Data Lake Advantages 75 15.4 Data Lake Disadvantages 76 15.5 The Future 76 References 77 Part 4 Cloud Computing 79 16 Edge Computing Paradigm 81 16.1 Advantages of Edge Computing 82 16.2 Benefits of Edge Computing 83 16.3 Real-Life Example 83 16.4 Future of Edge Computing 84 References 85 17 The Internet of Everything 87 17.1 What is the Internet of Everything (IoE)? 87 17.2 Pillars of the Internet of Everything (IoE) 88 17.3 The Internet of Things (IoT) 88 17.4 The Difference Between IoE and IoT 88 17.5 The Future 88 References 89 18 Content Delivery Networks - CDNs 91 18.1 Dynamics of CDNs 91 18.2 Difference Between Serving Content without a CDN and with a CDN 92 18.3 Types of Services 94 18.4 Advantages of CDNs 94 18.5 Disadvantages of CDNs 95 18.6 The Future 95 References 95 19 Network Functions Virtualization (NFV) or Software-Defined Networking (SDN)? 97 19.1 What is Network Functions Virtualization (NFV)? 97 19.2 The Benefits of NFV 98 19.3 Types of NFV 98 19.4 Which is Better - SDN or NFV? 99 19.5 The Future of NFV 100 References 100 20 What is Virtualization? 101 20.1 What is Virtualization? 101 20.2 Types of Virtualizations 102 20.3 How is Virtualization Different from Cloud Computing? 103 20.4 The Future of Virtualization 103 References 103 21 Risks of Cloud Computing Explained (Both Sides) 105 21.1 The Risks Will Never Diminish 107 References 108 22 Cloud-of-Clouds or (Intercloud) 109 22.1 The Future 110 References 111 23 Myths and Facts About Cloud Computing 113 23.1 Types of Cloud Computing 113 23.2 The Promise of Cloud Computing 115 23.3 What is Next for Cloud Computing? 116 Part 5 Security 119 24 Zero-Day Vulnerability and Heuristic Analysis 121 24.1 What is a Zero-Day Vulnerability? 121 24.2 Zero-Day Exploit 122 24.3 Zero-Day Threat 122 24.4 Defending Against Zero-Day Threats 122 24.5 What are Heuristics? 123 References 125 25 The Zero Trust Model 127 25.1 "Outside-In" to "Inside-Out" Attacks 128 25.2 Zero Trust Recommendations 129 References 129 26 Cloud Computing Security 131 26.1 Cloud Security Threats 132 26.2 The Future 133 27 First Line of Defense for Cybersecurity: AI 135 27.1 Four Fundamental Security Practices 137 27.1.1 Identifying the patterns 137 27.1.2 Educating the users 137 27.1.3 Patching the holes 138 27.1.4 Checking off the controls 138 27.2 Challenges Faced by AI in Cybersecurity 138 27.2.1 AI-powered attacks 138 27.2.2 More sandbox-evading malware 139 27.2.3 Ransomware and IoT 139 27.2.4 A rise of state-sponsored attacks 140 27.2.5 Shortage of skilled staff 140 27.2.6 IT infrastructure 140 27.3 The Future of Cybersecurity and AI 140 References 141 28 Second Line of Defense for Cybersecurity: Blockchain 143 28.1 Implementing Blockchain in Cybersecurity 144 28.2 Advantages of using Blockchain in Cybersecurity 145 28.2.1 Decentralization 145 28.2.2 Tracking and tracing 146 28.2.3 Confidentiality 146 28.2.4 Fraud security 146 28.2.5 Sustainability 146 28.2.6 Integrity 146 28.2.7 Resilience 146 28.2.8 Data quality 146 28.2.9 Smart contracts 147 28.2.10 Availability 147 28.2.11 Increased customer trust 147 28.3 Disadvantages of using Blockchain in Cybersecurity 147 28.3.1 Irreversibility 147 28.3.2 Storage limits 147 28.3.3 Risk of cyberattacks 147 28.3.4 Adaptability challenges 148 28.3.5 High operation costs 148 28.3.6 Blockchain literacy 148 28.4 Conclusion 148 References 149 29 Network Security Needs Big Data 151 29.1 Zero Trust Model (ZTM) 152 29.2 Big Data and ZTM 153 Part 6 Blockchain 155 30 Blockchain Technology and COVID-19 157 30.1 Major Challenges of COVID-19 158 30.2 Can Blockchain Help in Preventing Pandemics? 158 30.3 Tracking Infectious Disease Outbreaks 159 30.4 Donations Tracking 159 30.5 Crisis Management 160 30.6 Securing Medical Supply Chains 160 30.7 WHO and Blockchain Technology 160 References 161 31 How Blockchain is Revolutionizing Crowdfunding 163 31.1 Limitations of Current Crowdfunding Platforms 163 31.2 How Blockchain Helps Crowdfunding 165 References 166 32 Blockchain Technology and Supply Chain Management 167 32.1 Blockchain and SCM 168 32.2 Applications of Blockchain in SCM 169 References 169 Part 7 IoT 171 33 IoT and COVID-19 173 33.1 IoT and WFH 174 33.2 IoT and Blockchain 174 33.3 IoT and E-Commerce 175 33.4 IoT and Telemedicine 175 References 176 34 IoT and 5G Convergence 177 34.1 Benefits of using 5G in IoT 178 34.1.1 Higher transmission speed 178 34.1.2 More devices connected 178 34.1.3 Lower latency 179 34.2 Challenges Faced by 5G and IoT Convergence 179 34.2.1 Operating across multiple spectrum bands 179 34.2.2 A gradual upgradation from 4G to 5G 179 34.2.3 Data interoperability 180 34.2.4 Establishing 5G business models 180 34.3 Examples of Applications of 5G in IoT 180 34.3.1 Automotive 180 34.3.2 Industrial 181 34.3.3 Healthcare 181 References 181 Part 8 Wearable and Mobile Technology 183 35 The Smart Platform: Wearable Computing Devices (WCD) 185 35.1 Concerns with Wearable Computing Devices 186 35.2 Applications of Wearable Computing Devices 186 35.3 The Future of Wearable Computing Devices 186 References 187 36 Your Smart Device Will Feel Your Pain and Fear 189 References 192 37 Technology Under Your Skin: Three Challenges of Microchip Implants 193 References 196 Part 9 Future Trends in Technology 197 38 The Metaverse: A Different Perspective 199 38.1 Different Perspective of the Metaverse 200 38.2 Pillars of the Metaverse 200 38.3 The Future 200 References 201 39 The Metaverse: Myths and Facts 203 39.1 Myths about the Metaverse 204 39.1.1 Myth #1: No one knows what the metaverse is 204 39.1.2 Myth #2: The metaverse is only gaming 204 39.1.3 Myth #3: The metaverse is only virtual reality 204 39.1.4 Myth #4: The metaverse will replace the real world 204 39.1.5 Myth #5: The metaverse is a fad 205 39.1.6 Myth #6: The metaverse will be a monopoly 205 39.1.7 Myth #7: The speed of technology will set the pace for adoption 206 39.1.8 Myth #8: The metaverse is already here 206 39.1.9 Myth #9: The metaverse is inevitable 206 39.1.10 Myth #10: The metaverse is suitable for everything 207 39.2 What is the Future of the Metaverse? 207 References 208 40 Eight Key Tech Trends in a Post-COVID-19 World 209 40.1 Artificial Intelligence (AI) 210 40.2 Cloud Computing 211 40.3 VR/AR 211 40.4 5G Networks 211 40.5 Voice User Interface (VUI) 212 40.6 Internet of Things (IoT) 212 40.7 Cybersecurity 213 40.8 Blockchain Technology 213 40.9 Tracking Infectious Disease Outbreaks 214 40.10 Donations Tracking 214 40.11 Crisis Management 215 40.12 Securing Medical Supply Chains 215 References 215 References 217 Index 227 About the Author 231 |
ctrlnum | (OCoLC)1418697819 (DE-599)BVBBV049486665 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>12671nmm a2200661 c 4500</leader><controlfield tag="001">BV049486665</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">240104s2022 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9788770226837</subfield><subfield code="9">9788770226837</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">8770226830</subfield><subfield code="9">8770226830</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781000794328</subfield><subfield code="9">9781000794328</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1000794326</subfield><subfield code="9">1000794326</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781003339175</subfield><subfield code="9">9781003339175</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1003339174</subfield><subfield code="9">1003339174</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1000797481</subfield><subfield code="9">1000797481</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781000797480</subfield><subfield code="9">9781000797480</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1201/9781003339175</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1418697819</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV049486665</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-573</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Banafa, Ahmed</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1260403297</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Quantum computing and other transformative technologies</subfield><subfield code="c">Ahmed Banafa</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Gistrup, Denmark</subfield><subfield code="b">River Publishers</subfield><subfield code="c">[2022]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xvii, 231 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">River Publishers series in computing and information science and technology</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Preface xvii Audience xix Acknowledgment xxi List of Figures xxiii List of Abbreviations xxv Introduction 1 Part 1 Quantum Computing 3 1 What is Quantum Computing? 5 1.1 A Comparison of Classical and Quantum Computing 5 1.2 Quantum Superposition and Entanglement 6 1.3 Difficulties with Quantum Computers 6 1.4 The Future of Quantum Computing 7 References 7 2 Quantum Cryptography 9 2.1 Problems with using Quantum Cryptography 10 References 11 3 Quantum Internet 13 3.1 What is Quantum Internet? 14 3.2 Quantum Communications 15 References 16 4 Quantum Teleportation 17 4.1 Quantum Teleportation: Paving the Way for a Quantum Internet 19 References 19 5 Quantum Computing and IoT 21 5.1 A Comparison of Classical and Quantum Computing 22 5.2 Quantum Communications 23 5.3 Quantum Computing and IoT 24 5.4 The Road Ahead 24 References 25 6 Quantum Computing and Blockchain: Myths and Facts 27 6.1 Difficulties with Quantum Computers 27 6.2 What Is Quantum Supremacy? 28 6.3 What is Quantum </subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Cryptography? 29 References 30 7 Quantum Computing and AI: A Mega-Buzzword 31 7.1 What is Quantum Computing? 31 7.2 Difficulties with Quantum Computers 32 7.3 Applications of Quantum Computing and AI 32 7.4 Processing Large Sets of Data 32 7.5 Solve Complex Problem Faster 33 7.6 Better Business Insights and Models 33 7.7 Integration of Multiple Sets of Data 34 7.8 The Future 34 References 34 8 Quantum Computing Trends 37 8.1 A Comparison of Classical and Quantum Computing 37 8.2 Physical vs Logical Qubits 38 8.3 Quantum Superposition and Entanglement 39 8.4 Quantum Emulator/Simulator 40 8.5 Quantum Annealer 40 8.6 Noisy Intermediate-Scale Quantum (NISQ) Computers 40 8.7 Universal Quantum Computers/Cryptographically Relevant Quantum Computers (CRQC) 41 8.8 Post-Quantum/Quantum-Resistant Codes 41 8.9 Difficulties with Quantum Computers 41 References 41 Part 2 Other Computing Technologies 43 9 What is Deep Learning? 45 9.1 Neural Network 45 9.2 Deep Learning vs Machine Learning 46 9.3 </subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">The Deep Learning Game 46 9.4 The Future 47 References 47 10 Affective Computing 49 10.1 Emotion in Machines 50 10.2 The Future 51 References 51 11 Autonomic Computing 53 11.1 Benefits 55 11.2 Future of Autonomic Computing 55 References 55 Part 3 Big Data, Dark Data, Thick Data, </subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">and Small Data 57 12 Thick Data vs Big Data 59 12.1 Comparison of Big Data and Thick Data 60 References 62 13 Understanding Dark Data 65 13.1 Types of Dark Data 66 13.2 Value of Dark Data 66 13.3 Future of Dark Data 67 References 67 14 Small Data vs Big Data: Back to the Basics 69 14.1 Why Small Data? 70 14.2 The Future of Small Data 71 References 72 15 What is a Data Lake? 73 15.1 Data Lake vs Data Warehouse 73 15.2 Five Key Components of a Data Lake Architecture 74 15.3 Data Lake Advantages 75 15.4 Data Lake Disadvantages 76 15.5 The Future 76 References 77 Part 4 Cloud Computing 79 16 Edge Computing Paradigm 81 16.1 Advantages of Edge Computing 82 16.2 Benefits of Edge Computing 83 16.3 Real-Life Example 83 16.4 Future of Edge Computing 84 References 85 17 The Internet of Everything 87 17.1 What is the Internet of Everything (IoE)? 87 17.2 Pillars of the Internet of Everything (IoE) 88 17.3 The Internet of Things (IoT) 88 17.4 The Difference Between IoE and IoT 88 17.5 The Future </subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">88 References 89 18 Content Delivery Networks - CDNs 91 18.1 Dynamics of CDNs 91 18.2 Difference Between Serving Content without a CDN and with a CDN 92 18.3 Types of Services 94 18.4 Advantages of CDNs 94 18.5 Disadvantages of CDNs 95 18.6 The Future 95 References 95 19 Network Functions Virtualization (NFV) or Software-Defined Networking (SDN)? 97 19.1 What is Network Functions Virtualization (NFV)? 97 19.2 The Benefits of NFV 98 19.3 Types of NFV 98 19.4 Which is Better - SDN or NFV? 99 19.5 The Future of NFV 100 References 100 20 What is Virtualization? 101 20.1 What is Virtualization? 101 20.2 Types of Virtualizations 102 20.3 How is Virtualization Different from Cloud Computing? 103 20.4 The Future of Virtualization 103 References 103 21 Risks of Cloud Computing Explained (Both Sides) 105 21.1 The Risks Will Never Diminish 107 References 108 22 Cloud-of-Clouds or (Intercloud) 109 22.1 The Future 110 References 111 23 Myths and Facts About Cloud Computing 113 23.1 Types of Cloud </subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Computing 113 23.2 The Promise of Cloud Computing 115 23.3 What is Next for Cloud Computing? 116 Part 5 Security 119 24 Zero-Day Vulnerability and Heuristic Analysis 121 24.1 What is a Zero-Day Vulnerability? 121 24.2 Zero-Day Exploit 122 24.3 Zero-Day Threat 122 24.4 Defending Against Zero-Day Threats 122 24.5 What are Heuristics? 123 References 125 25 The Zero Trust Model 127 25.1 "Outside-In" to "Inside-Out" Attacks 128 25.2 Zero Trust Recommendations 129 References 129 26 Cloud Computing Security 131 26.1 Cloud Security Threats 132 26.2 The Future 133 27 First Line of Defense for Cybersecurity: AI 135 27.1 Four Fundamental Security Practices 137 27.1.1 Identifying the patterns 137 27.1.2 Educating the users 137 27.1.3 Patching the holes 138 27.1.4 Checking off the controls 138 27.2 Challenges Faced by AI in Cybersecurity 138 27.2.1 AI-powered attacks 138 27.2.2 More sandbox-evading malware 139 27.2.3 Ransomware and IoT 139 27.2.4 A rise of state-sponsored attacks 140 27.2.5 </subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Shortage of skilled staff 140 27.2.6 IT infrastructure 140 27.3 The Future of Cybersecurity and AI 140 References 141 28 Second Line of Defense for Cybersecurity: Blockchain 143 28.1 Implementing Blockchain in Cybersecurity 144 28.2 Advantages of using Blockchain in Cybersecurity 145 28.2.1 Decentralization 145 28.2.2 Tracking and tracing 146 28.2.3 Confidentiality 146 28.2.4 Fraud security 146 28.2.5 Sustainability 146 28.2.6 Integrity 146 28.2.7 Resilience 146 28.2.8 Data quality 146 28.2.9 Smart contracts 147 28.2.10 Availability 147 28.2.11 Increased customer trust 147 28.3 Disadvantages of using Blockchain in Cybersecurity 147 28.3.1 Irreversibility 147 28.3.2 Storage limits 147 28.3.3 Risk of cyberattacks 147 28.3.4 Adaptability challenges 148 28.3.5 High operation costs 148 28.3.6 Blockchain literacy 148 28.4 Conclusion 148 References 149 29 Network Security Needs Big Data 151 29.1 Zero Trust Model (ZTM) 152 29.2 Big Data and ZTM 153 Part 6 Blockchain 155 30 Blockchain </subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Technology and COVID-19 157 30.1 Major Challenges of COVID-19 158 30.2 Can Blockchain Help in Preventing Pandemics? 158 30.3 Tracking Infectious Disease Outbreaks 159 30.4 Donations Tracking 159 30.5 Crisis Management 160 30.6 Securing Medical Supply Chains 160 30.7 WHO and Blockchain Technology 160 References 161 31 How Blockchain is Revolutionizing Crowdfunding 163 31.1 Limitations of Current Crowdfunding Platforms 163 31.2 How Blockchain Helps Crowdfunding 165 References 166 32 Blockchain Technology and Supply Chain Management 167 32.1 Blockchain and SCM 168 32.2 Applications of Blockchain in SCM 169 References 169 Part 7 IoT 171 33 IoT and COVID-19 173 33.1 IoT and WFH 174 33.2 IoT and Blockchain 174 33.3 IoT and E-Commerce 175 33.4 IoT and Telemedicine 175 References 176 34 IoT and 5G Convergence 177 34.1 Benefits of using 5G in IoT 178 34.1.1 Higher transmission speed 178 34.1.2 More devices connected 178 34.1.3 Lower latency 179 34.2 Challenges Faced by 5G and IoT Convergence </subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">179 34.2.1 Operating across multiple spectrum bands 179 34.2.2 A gradual upgradation from 4G to 5G 179 34.2.3 Data interoperability 180 34.2.4 Establishing 5G business models 180 34.3 Examples of Applications of 5G in IoT 180 34.3.1 Automotive 180 34.3.2 Industrial 181 34.3.3 Healthcare 181 References 181 Part 8 Wearable and Mobile Technology 183 35 The Smart Platform: Wearable Computing Devices (WCD) 185 35.1 Concerns with Wearable Computing Devices 186 35.2 Applications of Wearable Computing Devices 186 35.3 The Future of Wearable Computing Devices 186 References 187 36 Your Smart Device Will Feel Your Pain and Fear 189 References 192 37 Technology Under Your Skin: Three Challenges of Microchip Implants 193 References 196 Part 9 Future Trends in Technology 197 38 The Metaverse: A Different Perspective 199 38.1 Different Perspective of the Metaverse 200 38.2 Pillars of the Metaverse 200 38.3 The Future 200 References 201 39 The Metaverse: Myths and Facts 203 39.1 Myths about the </subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Metaverse 204 39.1.1 Myth #1: No one knows what the metaverse is 204 39.1.2 Myth #2: The metaverse is only gaming 204 39.1.3 Myth #3: The metaverse is only virtual reality 204 39.1.4 Myth #4: The metaverse will replace the real world 204 39.1.5 Myth #5: The metaverse is a fad 205 39.1.6 Myth #6: The metaverse will be a monopoly 205 39.1.7 Myth #7: The speed of technology will set the pace for adoption 206 39.1.8 Myth #8: The metaverse is already here 206 39.1.9 Myth #9: The metaverse is inevitable 206 39.1.10 Myth #10: The metaverse is suitable for everything 207 39.2 What is the Future of the Metaverse? 207 References 208 40 Eight Key Tech Trends in a Post-COVID-19 World 209 40.1 Artificial Intelligence (AI) 210 40.2 Cloud Computing 211 40.3 VR/AR 211 40.4 5G Networks 211 40.5 Voice User Interface (VUI) 212 40.6 Internet of Things (IoT) 212 40.7 Cybersecurity 213 40.8 Blockchain Technology 213 40.9 Tracking Infectious Disease Outbreaks 214 40.10 Donations Tracking 214 40.11 Crisis </subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Management 215 40.12 Securing Medical Supply Chains 215 References 215 References 217 Index 227 About the Author 231</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">This book explores quantum computing as a transformative technology and its applications in communications, cryptography, teleportation, IoT, AI, and blockchain, in addition to the revolutionary concept of quantum internet. It also explains the concept of dark, small, thick data, and clarifies what the concept of a data lake. Other exciting technologies like edge/fog computing, CDN, SDN, wearable technology and IoE topics are discussed in details in the book. Information security applications like zero trust model, zero-day vulnerability and heuristic analysis, and use of AI in cybersecurity are explored. Two of the most intriguing concepts in computing "affective computing" and "autonomic computing" are explained and simplified. The blockchain applications presented include blockchain and supply chain, crowdsourcing, cryptocurrency, and IoT. The book ends with a look at using technology to fight COVID-19 and future pandemics</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Quantum computing</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Informatique quantique</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">SCIENCE / Energy</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Quantum computing</subfield></datafield><datafield tag="653" ind1=" " ind2="6"><subfield code="a">Electronic books</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version</subfield><subfield code="a">BANAFA, PROFESSOR AHMED.</subfield><subfield code="t">QUANTUM COMPUTING AND OTHER TRANSFORMATIVE TECHNOLOGIES.</subfield><subfield code="d">Gistrup, Denmark: RIVER PUBLISHERS, 2022</subfield><subfield code="z">8770226849</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://ieeexplore.ieee.org/book/9933493</subfield><subfield code="x">Aggregator</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://www.taylorfrancis.com/books/9781003339175</subfield><subfield code="3">Taylor & Francis</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://public.ebookcentral.proquest.com/choice/PublicFullRecord.aspx?p=7178727</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=3530769</subfield><subfield code="3">EBSCOhost</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://www.vlebooks.com/vleweb/product/openreader?id=none&isbn=9781000794328</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-37-RPEB</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-034832062</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://ieeexplore.ieee.org/book/9933493</subfield><subfield code="l">FHI01</subfield><subfield code="p">ZDB-37-RPEB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV049486665 |
illustrated | Not Illustrated |
index_date | 2024-07-03T23:18:58Z |
indexdate | 2024-07-10T10:08:38Z |
institution | BVB |
isbn | 9788770226837 8770226830 9781000794328 1000794326 9781003339175 1003339174 1000797481 9781000797480 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-034832062 |
oclc_num | 1418697819 |
open_access_boolean | |
owner | DE-573 |
owner_facet | DE-573 |
physical | 1 Online-Ressource (xvii, 231 Seiten) |
psigel | ZDB-37-RPEB |
publishDate | 2022 |
publishDateSearch | 2022 |
publishDateSort | 2022 |
publisher | River Publishers |
record_format | marc |
series2 | River Publishers series in computing and information science and technology |
spelling | Banafa, Ahmed Verfasser (DE-588)1260403297 aut Quantum computing and other transformative technologies Ahmed Banafa Gistrup, Denmark River Publishers [2022] 1 Online-Ressource (xvii, 231 Seiten) txt rdacontent c rdamedia cr rdacarrier River Publishers series in computing and information science and technology Preface xvii Audience xix Acknowledgment xxi List of Figures xxiii List of Abbreviations xxv Introduction 1 Part 1 Quantum Computing 3 1 What is Quantum Computing? 5 1.1 A Comparison of Classical and Quantum Computing 5 1.2 Quantum Superposition and Entanglement 6 1.3 Difficulties with Quantum Computers 6 1.4 The Future of Quantum Computing 7 References 7 2 Quantum Cryptography 9 2.1 Problems with using Quantum Cryptography 10 References 11 3 Quantum Internet 13 3.1 What is Quantum Internet? 14 3.2 Quantum Communications 15 References 16 4 Quantum Teleportation 17 4.1 Quantum Teleportation: Paving the Way for a Quantum Internet 19 References 19 5 Quantum Computing and IoT 21 5.1 A Comparison of Classical and Quantum Computing 22 5.2 Quantum Communications 23 5.3 Quantum Computing and IoT 24 5.4 The Road Ahead 24 References 25 6 Quantum Computing and Blockchain: Myths and Facts 27 6.1 Difficulties with Quantum Computers 27 6.2 What Is Quantum Supremacy? 28 6.3 What is Quantum Cryptography? 29 References 30 7 Quantum Computing and AI: A Mega-Buzzword 31 7.1 What is Quantum Computing? 31 7.2 Difficulties with Quantum Computers 32 7.3 Applications of Quantum Computing and AI 32 7.4 Processing Large Sets of Data 32 7.5 Solve Complex Problem Faster 33 7.6 Better Business Insights and Models 33 7.7 Integration of Multiple Sets of Data 34 7.8 The Future 34 References 34 8 Quantum Computing Trends 37 8.1 A Comparison of Classical and Quantum Computing 37 8.2 Physical vs Logical Qubits 38 8.3 Quantum Superposition and Entanglement 39 8.4 Quantum Emulator/Simulator 40 8.5 Quantum Annealer 40 8.6 Noisy Intermediate-Scale Quantum (NISQ) Computers 40 8.7 Universal Quantum Computers/Cryptographically Relevant Quantum Computers (CRQC) 41 8.8 Post-Quantum/Quantum-Resistant Codes 41 8.9 Difficulties with Quantum Computers 41 References 41 Part 2 Other Computing Technologies 43 9 What is Deep Learning? 45 9.1 Neural Network 45 9.2 Deep Learning vs Machine Learning 46 9.3 The Deep Learning Game 46 9.4 The Future 47 References 47 10 Affective Computing 49 10.1 Emotion in Machines 50 10.2 The Future 51 References 51 11 Autonomic Computing 53 11.1 Benefits 55 11.2 Future of Autonomic Computing 55 References 55 Part 3 Big Data, Dark Data, Thick Data, and Small Data 57 12 Thick Data vs Big Data 59 12.1 Comparison of Big Data and Thick Data 60 References 62 13 Understanding Dark Data 65 13.1 Types of Dark Data 66 13.2 Value of Dark Data 66 13.3 Future of Dark Data 67 References 67 14 Small Data vs Big Data: Back to the Basics 69 14.1 Why Small Data? 70 14.2 The Future of Small Data 71 References 72 15 What is a Data Lake? 73 15.1 Data Lake vs Data Warehouse 73 15.2 Five Key Components of a Data Lake Architecture 74 15.3 Data Lake Advantages 75 15.4 Data Lake Disadvantages 76 15.5 The Future 76 References 77 Part 4 Cloud Computing 79 16 Edge Computing Paradigm 81 16.1 Advantages of Edge Computing 82 16.2 Benefits of Edge Computing 83 16.3 Real-Life Example 83 16.4 Future of Edge Computing 84 References 85 17 The Internet of Everything 87 17.1 What is the Internet of Everything (IoE)? 87 17.2 Pillars of the Internet of Everything (IoE) 88 17.3 The Internet of Things (IoT) 88 17.4 The Difference Between IoE and IoT 88 17.5 The Future 88 References 89 18 Content Delivery Networks - CDNs 91 18.1 Dynamics of CDNs 91 18.2 Difference Between Serving Content without a CDN and with a CDN 92 18.3 Types of Services 94 18.4 Advantages of CDNs 94 18.5 Disadvantages of CDNs 95 18.6 The Future 95 References 95 19 Network Functions Virtualization (NFV) or Software-Defined Networking (SDN)? 97 19.1 What is Network Functions Virtualization (NFV)? 97 19.2 The Benefits of NFV 98 19.3 Types of NFV 98 19.4 Which is Better - SDN or NFV? 99 19.5 The Future of NFV 100 References 100 20 What is Virtualization? 101 20.1 What is Virtualization? 101 20.2 Types of Virtualizations 102 20.3 How is Virtualization Different from Cloud Computing? 103 20.4 The Future of Virtualization 103 References 103 21 Risks of Cloud Computing Explained (Both Sides) 105 21.1 The Risks Will Never Diminish 107 References 108 22 Cloud-of-Clouds or (Intercloud) 109 22.1 The Future 110 References 111 23 Myths and Facts About Cloud Computing 113 23.1 Types of Cloud Computing 113 23.2 The Promise of Cloud Computing 115 23.3 What is Next for Cloud Computing? 116 Part 5 Security 119 24 Zero-Day Vulnerability and Heuristic Analysis 121 24.1 What is a Zero-Day Vulnerability? 121 24.2 Zero-Day Exploit 122 24.3 Zero-Day Threat 122 24.4 Defending Against Zero-Day Threats 122 24.5 What are Heuristics? 123 References 125 25 The Zero Trust Model 127 25.1 "Outside-In" to "Inside-Out" Attacks 128 25.2 Zero Trust Recommendations 129 References 129 26 Cloud Computing Security 131 26.1 Cloud Security Threats 132 26.2 The Future 133 27 First Line of Defense for Cybersecurity: AI 135 27.1 Four Fundamental Security Practices 137 27.1.1 Identifying the patterns 137 27.1.2 Educating the users 137 27.1.3 Patching the holes 138 27.1.4 Checking off the controls 138 27.2 Challenges Faced by AI in Cybersecurity 138 27.2.1 AI-powered attacks 138 27.2.2 More sandbox-evading malware 139 27.2.3 Ransomware and IoT 139 27.2.4 A rise of state-sponsored attacks 140 27.2.5 Shortage of skilled staff 140 27.2.6 IT infrastructure 140 27.3 The Future of Cybersecurity and AI 140 References 141 28 Second Line of Defense for Cybersecurity: Blockchain 143 28.1 Implementing Blockchain in Cybersecurity 144 28.2 Advantages of using Blockchain in Cybersecurity 145 28.2.1 Decentralization 145 28.2.2 Tracking and tracing 146 28.2.3 Confidentiality 146 28.2.4 Fraud security 146 28.2.5 Sustainability 146 28.2.6 Integrity 146 28.2.7 Resilience 146 28.2.8 Data quality 146 28.2.9 Smart contracts 147 28.2.10 Availability 147 28.2.11 Increased customer trust 147 28.3 Disadvantages of using Blockchain in Cybersecurity 147 28.3.1 Irreversibility 147 28.3.2 Storage limits 147 28.3.3 Risk of cyberattacks 147 28.3.4 Adaptability challenges 148 28.3.5 High operation costs 148 28.3.6 Blockchain literacy 148 28.4 Conclusion 148 References 149 29 Network Security Needs Big Data 151 29.1 Zero Trust Model (ZTM) 152 29.2 Big Data and ZTM 153 Part 6 Blockchain 155 30 Blockchain Technology and COVID-19 157 30.1 Major Challenges of COVID-19 158 30.2 Can Blockchain Help in Preventing Pandemics? 158 30.3 Tracking Infectious Disease Outbreaks 159 30.4 Donations Tracking 159 30.5 Crisis Management 160 30.6 Securing Medical Supply Chains 160 30.7 WHO and Blockchain Technology 160 References 161 31 How Blockchain is Revolutionizing Crowdfunding 163 31.1 Limitations of Current Crowdfunding Platforms 163 31.2 How Blockchain Helps Crowdfunding 165 References 166 32 Blockchain Technology and Supply Chain Management 167 32.1 Blockchain and SCM 168 32.2 Applications of Blockchain in SCM 169 References 169 Part 7 IoT 171 33 IoT and COVID-19 173 33.1 IoT and WFH 174 33.2 IoT and Blockchain 174 33.3 IoT and E-Commerce 175 33.4 IoT and Telemedicine 175 References 176 34 IoT and 5G Convergence 177 34.1 Benefits of using 5G in IoT 178 34.1.1 Higher transmission speed 178 34.1.2 More devices connected 178 34.1.3 Lower latency 179 34.2 Challenges Faced by 5G and IoT Convergence 179 34.2.1 Operating across multiple spectrum bands 179 34.2.2 A gradual upgradation from 4G to 5G 179 34.2.3 Data interoperability 180 34.2.4 Establishing 5G business models 180 34.3 Examples of Applications of 5G in IoT 180 34.3.1 Automotive 180 34.3.2 Industrial 181 34.3.3 Healthcare 181 References 181 Part 8 Wearable and Mobile Technology 183 35 The Smart Platform: Wearable Computing Devices (WCD) 185 35.1 Concerns with Wearable Computing Devices 186 35.2 Applications of Wearable Computing Devices 186 35.3 The Future of Wearable Computing Devices 186 References 187 36 Your Smart Device Will Feel Your Pain and Fear 189 References 192 37 Technology Under Your Skin: Three Challenges of Microchip Implants 193 References 196 Part 9 Future Trends in Technology 197 38 The Metaverse: A Different Perspective 199 38.1 Different Perspective of the Metaverse 200 38.2 Pillars of the Metaverse 200 38.3 The Future 200 References 201 39 The Metaverse: Myths and Facts 203 39.1 Myths about the Metaverse 204 39.1.1 Myth #1: No one knows what the metaverse is 204 39.1.2 Myth #2: The metaverse is only gaming 204 39.1.3 Myth #3: The metaverse is only virtual reality 204 39.1.4 Myth #4: The metaverse will replace the real world 204 39.1.5 Myth #5: The metaverse is a fad 205 39.1.6 Myth #6: The metaverse will be a monopoly 205 39.1.7 Myth #7: The speed of technology will set the pace for adoption 206 39.1.8 Myth #8: The metaverse is already here 206 39.1.9 Myth #9: The metaverse is inevitable 206 39.1.10 Myth #10: The metaverse is suitable for everything 207 39.2 What is the Future of the Metaverse? 207 References 208 40 Eight Key Tech Trends in a Post-COVID-19 World 209 40.1 Artificial Intelligence (AI) 210 40.2 Cloud Computing 211 40.3 VR/AR 211 40.4 5G Networks 211 40.5 Voice User Interface (VUI) 212 40.6 Internet of Things (IoT) 212 40.7 Cybersecurity 213 40.8 Blockchain Technology 213 40.9 Tracking Infectious Disease Outbreaks 214 40.10 Donations Tracking 214 40.11 Crisis Management 215 40.12 Securing Medical Supply Chains 215 References 215 References 217 Index 227 About the Author 231 This book explores quantum computing as a transformative technology and its applications in communications, cryptography, teleportation, IoT, AI, and blockchain, in addition to the revolutionary concept of quantum internet. It also explains the concept of dark, small, thick data, and clarifies what the concept of a data lake. Other exciting technologies like edge/fog computing, CDN, SDN, wearable technology and IoE topics are discussed in details in the book. Information security applications like zero trust model, zero-day vulnerability and heuristic analysis, and use of AI in cybersecurity are explored. Two of the most intriguing concepts in computing "affective computing" and "autonomic computing" are explained and simplified. The blockchain applications presented include blockchain and supply chain, crowdsourcing, cryptocurrency, and IoT. The book ends with a look at using technology to fight COVID-19 and future pandemics Quantum computing Informatique quantique SCIENCE / Energy Electronic books Print version BANAFA, PROFESSOR AHMED. QUANTUM COMPUTING AND OTHER TRANSFORMATIVE TECHNOLOGIES. Gistrup, Denmark: RIVER PUBLISHERS, 2022 8770226849 https://ieeexplore.ieee.org/book/9933493 Aggregator URL des Erstveröffentlichers Volltext https://www.taylorfrancis.com/books/9781003339175 Taylor & Francis https://public.ebookcentral.proquest.com/choice/PublicFullRecord.aspx?p=7178727 https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=3530769 EBSCOhost https://www.vlebooks.com/vleweb/product/openreader?id=none&isbn=9781000794328 |
spellingShingle | Banafa, Ahmed Quantum computing and other transformative technologies Preface xvii Audience xix Acknowledgment xxi List of Figures xxiii List of Abbreviations xxv Introduction 1 Part 1 Quantum Computing 3 1 What is Quantum Computing? 5 1.1 A Comparison of Classical and Quantum Computing 5 1.2 Quantum Superposition and Entanglement 6 1.3 Difficulties with Quantum Computers 6 1.4 The Future of Quantum Computing 7 References 7 2 Quantum Cryptography 9 2.1 Problems with using Quantum Cryptography 10 References 11 3 Quantum Internet 13 3.1 What is Quantum Internet? 14 3.2 Quantum Communications 15 References 16 4 Quantum Teleportation 17 4.1 Quantum Teleportation: Paving the Way for a Quantum Internet 19 References 19 5 Quantum Computing and IoT 21 5.1 A Comparison of Classical and Quantum Computing 22 5.2 Quantum Communications 23 5.3 Quantum Computing and IoT 24 5.4 The Road Ahead 24 References 25 6 Quantum Computing and Blockchain: Myths and Facts 27 6.1 Difficulties with Quantum Computers 27 6.2 What Is Quantum Supremacy? 28 6.3 What is Quantum Cryptography? 29 References 30 7 Quantum Computing and AI: A Mega-Buzzword 31 7.1 What is Quantum Computing? 31 7.2 Difficulties with Quantum Computers 32 7.3 Applications of Quantum Computing and AI 32 7.4 Processing Large Sets of Data 32 7.5 Solve Complex Problem Faster 33 7.6 Better Business Insights and Models 33 7.7 Integration of Multiple Sets of Data 34 7.8 The Future 34 References 34 8 Quantum Computing Trends 37 8.1 A Comparison of Classical and Quantum Computing 37 8.2 Physical vs Logical Qubits 38 8.3 Quantum Superposition and Entanglement 39 8.4 Quantum Emulator/Simulator 40 8.5 Quantum Annealer 40 8.6 Noisy Intermediate-Scale Quantum (NISQ) Computers 40 8.7 Universal Quantum Computers/Cryptographically Relevant Quantum Computers (CRQC) 41 8.8 Post-Quantum/Quantum-Resistant Codes 41 8.9 Difficulties with Quantum Computers 41 References 41 Part 2 Other Computing Technologies 43 9 What is Deep Learning? 45 9.1 Neural Network 45 9.2 Deep Learning vs Machine Learning 46 9.3 The Deep Learning Game 46 9.4 The Future 47 References 47 10 Affective Computing 49 10.1 Emotion in Machines 50 10.2 The Future 51 References 51 11 Autonomic Computing 53 11.1 Benefits 55 11.2 Future of Autonomic Computing 55 References 55 Part 3 Big Data, Dark Data, Thick Data, and Small Data 57 12 Thick Data vs Big Data 59 12.1 Comparison of Big Data and Thick Data 60 References 62 13 Understanding Dark Data 65 13.1 Types of Dark Data 66 13.2 Value of Dark Data 66 13.3 Future of Dark Data 67 References 67 14 Small Data vs Big Data: Back to the Basics 69 14.1 Why Small Data? 70 14.2 The Future of Small Data 71 References 72 15 What is a Data Lake? 73 15.1 Data Lake vs Data Warehouse 73 15.2 Five Key Components of a Data Lake Architecture 74 15.3 Data Lake Advantages 75 15.4 Data Lake Disadvantages 76 15.5 The Future 76 References 77 Part 4 Cloud Computing 79 16 Edge Computing Paradigm 81 16.1 Advantages of Edge Computing 82 16.2 Benefits of Edge Computing 83 16.3 Real-Life Example 83 16.4 Future of Edge Computing 84 References 85 17 The Internet of Everything 87 17.1 What is the Internet of Everything (IoE)? 87 17.2 Pillars of the Internet of Everything (IoE) 88 17.3 The Internet of Things (IoT) 88 17.4 The Difference Between IoE and IoT 88 17.5 The Future 88 References 89 18 Content Delivery Networks - CDNs 91 18.1 Dynamics of CDNs 91 18.2 Difference Between Serving Content without a CDN and with a CDN 92 18.3 Types of Services 94 18.4 Advantages of CDNs 94 18.5 Disadvantages of CDNs 95 18.6 The Future 95 References 95 19 Network Functions Virtualization (NFV) or Software-Defined Networking (SDN)? 97 19.1 What is Network Functions Virtualization (NFV)? 97 19.2 The Benefits of NFV 98 19.3 Types of NFV 98 19.4 Which is Better - SDN or NFV? 99 19.5 The Future of NFV 100 References 100 20 What is Virtualization? 101 20.1 What is Virtualization? 101 20.2 Types of Virtualizations 102 20.3 How is Virtualization Different from Cloud Computing? 103 20.4 The Future of Virtualization 103 References 103 21 Risks of Cloud Computing Explained (Both Sides) 105 21.1 The Risks Will Never Diminish 107 References 108 22 Cloud-of-Clouds or (Intercloud) 109 22.1 The Future 110 References 111 23 Myths and Facts About Cloud Computing 113 23.1 Types of Cloud Computing 113 23.2 The Promise of Cloud Computing 115 23.3 What is Next for Cloud Computing? 116 Part 5 Security 119 24 Zero-Day Vulnerability and Heuristic Analysis 121 24.1 What is a Zero-Day Vulnerability? 121 24.2 Zero-Day Exploit 122 24.3 Zero-Day Threat 122 24.4 Defending Against Zero-Day Threats 122 24.5 What are Heuristics? 123 References 125 25 The Zero Trust Model 127 25.1 "Outside-In" to "Inside-Out" Attacks 128 25.2 Zero Trust Recommendations 129 References 129 26 Cloud Computing Security 131 26.1 Cloud Security Threats 132 26.2 The Future 133 27 First Line of Defense for Cybersecurity: AI 135 27.1 Four Fundamental Security Practices 137 27.1.1 Identifying the patterns 137 27.1.2 Educating the users 137 27.1.3 Patching the holes 138 27.1.4 Checking off the controls 138 27.2 Challenges Faced by AI in Cybersecurity 138 27.2.1 AI-powered attacks 138 27.2.2 More sandbox-evading malware 139 27.2.3 Ransomware and IoT 139 27.2.4 A rise of state-sponsored attacks 140 27.2.5 Shortage of skilled staff 140 27.2.6 IT infrastructure 140 27.3 The Future of Cybersecurity and AI 140 References 141 28 Second Line of Defense for Cybersecurity: Blockchain 143 28.1 Implementing Blockchain in Cybersecurity 144 28.2 Advantages of using Blockchain in Cybersecurity 145 28.2.1 Decentralization 145 28.2.2 Tracking and tracing 146 28.2.3 Confidentiality 146 28.2.4 Fraud security 146 28.2.5 Sustainability 146 28.2.6 Integrity 146 28.2.7 Resilience 146 28.2.8 Data quality 146 28.2.9 Smart contracts 147 28.2.10 Availability 147 28.2.11 Increased customer trust 147 28.3 Disadvantages of using Blockchain in Cybersecurity 147 28.3.1 Irreversibility 147 28.3.2 Storage limits 147 28.3.3 Risk of cyberattacks 147 28.3.4 Adaptability challenges 148 28.3.5 High operation costs 148 28.3.6 Blockchain literacy 148 28.4 Conclusion 148 References 149 29 Network Security Needs Big Data 151 29.1 Zero Trust Model (ZTM) 152 29.2 Big Data and ZTM 153 Part 6 Blockchain 155 30 Blockchain Technology and COVID-19 157 30.1 Major Challenges of COVID-19 158 30.2 Can Blockchain Help in Preventing Pandemics? 158 30.3 Tracking Infectious Disease Outbreaks 159 30.4 Donations Tracking 159 30.5 Crisis Management 160 30.6 Securing Medical Supply Chains 160 30.7 WHO and Blockchain Technology 160 References 161 31 How Blockchain is Revolutionizing Crowdfunding 163 31.1 Limitations of Current Crowdfunding Platforms 163 31.2 How Blockchain Helps Crowdfunding 165 References 166 32 Blockchain Technology and Supply Chain Management 167 32.1 Blockchain and SCM 168 32.2 Applications of Blockchain in SCM 169 References 169 Part 7 IoT 171 33 IoT and COVID-19 173 33.1 IoT and WFH 174 33.2 IoT and Blockchain 174 33.3 IoT and E-Commerce 175 33.4 IoT and Telemedicine 175 References 176 34 IoT and 5G Convergence 177 34.1 Benefits of using 5G in IoT 178 34.1.1 Higher transmission speed 178 34.1.2 More devices connected 178 34.1.3 Lower latency 179 34.2 Challenges Faced by 5G and IoT Convergence 179 34.2.1 Operating across multiple spectrum bands 179 34.2.2 A gradual upgradation from 4G to 5G 179 34.2.3 Data interoperability 180 34.2.4 Establishing 5G business models 180 34.3 Examples of Applications of 5G in IoT 180 34.3.1 Automotive 180 34.3.2 Industrial 181 34.3.3 Healthcare 181 References 181 Part 8 Wearable and Mobile Technology 183 35 The Smart Platform: Wearable Computing Devices (WCD) 185 35.1 Concerns with Wearable Computing Devices 186 35.2 Applications of Wearable Computing Devices 186 35.3 The Future of Wearable Computing Devices 186 References 187 36 Your Smart Device Will Feel Your Pain and Fear 189 References 192 37 Technology Under Your Skin: Three Challenges of Microchip Implants 193 References 196 Part 9 Future Trends in Technology 197 38 The Metaverse: A Different Perspective 199 38.1 Different Perspective of the Metaverse 200 38.2 Pillars of the Metaverse 200 38.3 The Future 200 References 201 39 The Metaverse: Myths and Facts 203 39.1 Myths about the Metaverse 204 39.1.1 Myth #1: No one knows what the metaverse is 204 39.1.2 Myth #2: The metaverse is only gaming 204 39.1.3 Myth #3: The metaverse is only virtual reality 204 39.1.4 Myth #4: The metaverse will replace the real world 204 39.1.5 Myth #5: The metaverse is a fad 205 39.1.6 Myth #6: The metaverse will be a monopoly 205 39.1.7 Myth #7: The speed of technology will set the pace for adoption 206 39.1.8 Myth #8: The metaverse is already here 206 39.1.9 Myth #9: The metaverse is inevitable 206 39.1.10 Myth #10: The metaverse is suitable for everything 207 39.2 What is the Future of the Metaverse? 207 References 208 40 Eight Key Tech Trends in a Post-COVID-19 World 209 40.1 Artificial Intelligence (AI) 210 40.2 Cloud Computing 211 40.3 VR/AR 211 40.4 5G Networks 211 40.5 Voice User Interface (VUI) 212 40.6 Internet of Things (IoT) 212 40.7 Cybersecurity 213 40.8 Blockchain Technology 213 40.9 Tracking Infectious Disease Outbreaks 214 40.10 Donations Tracking 214 40.11 Crisis Management 215 40.12 Securing Medical Supply Chains 215 References 215 References 217 Index 227 About the Author 231 |
title | Quantum computing and other transformative technologies |
title_auth | Quantum computing and other transformative technologies |
title_exact_search | Quantum computing and other transformative technologies |
title_exact_search_txtP | Quantum computing and other transformative technologies |
title_full | Quantum computing and other transformative technologies Ahmed Banafa |
title_fullStr | Quantum computing and other transformative technologies Ahmed Banafa |
title_full_unstemmed | Quantum computing and other transformative technologies Ahmed Banafa |
title_short | Quantum computing and other transformative technologies |
title_sort | quantum computing and other transformative technologies |
url | https://ieeexplore.ieee.org/book/9933493 https://www.taylorfrancis.com/books/9781003339175 https://public.ebookcentral.proquest.com/choice/PublicFullRecord.aspx?p=7178727 https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=3530769 https://www.vlebooks.com/vleweb/product/openreader?id=none&isbn=9781000794328 |
work_keys_str_mv | AT banafaahmed quantumcomputingandothertransformativetechnologies |