Introducing 

Prezi AI.

Your new presentation assistant.

Refine, enhance, and tailor your content, source relevant images, and edit visuals quicker than ever before.

Loading…
Transcript

EMPOWERMENT TECHNOLOGY

Project Introduction

Empowerment

- refers to the process of allowing or giving yourself/other people the capacity to execute a task.

Technology

- refers to the computer technology used in the day to day life of a person.

This combined defines the

capability to do tasks

without asking for

professional help in

relation with technology.

Definition

ICT and Society

ICT and So

Based on studies conducted around the world, it was pointed out the importance of ICT for sustainable development. Significant changes have been observed in four major aspects of life: communication, economics, education and travel.

Empowerment Technology

Empowerment through ICT

The World Wide Web

THE INTERNET

The internet has provided a lot of services that users have enjoyed since its creation, one of which is the World Wide Web. But did you know that it is also evolved into something which provides users a wide range of services? Look at how the web evolved.

Definition

Evolution of the Web

Web Versions

Web 1.0 Read Only

Web 1.0

  • Also known as Static Web

  • Wherein the information or hypertext file is accessed by the user

  • There were no facilities to interact with it other than to read or view the content

Web 2.0 Read-Write Web

Web 2.0

Details

  • Also known as Web of Interaction, Participative Web, and Dynamic Web Pages

  • Coined by Darcy DiNucci on January 1999, in her article “Fragmented Future”

  • Enable the users to see a website differently than other.

  • Allow the users to interact and collaborate with each other through social media dialogue where they could create user-generated content in a virtual community. They can be able to comment or create a user account.

Details

Web 3.0 Semantic Web

Web 3.0

Web 3.0 Features

Details

  • Also known as Web of Data

  • The semantic web is an extension of Web 2.0 by virtue of the standard of World Wide Web.

  • The semantic web provides a common framework that allows data to be shared and reused across application, enterprise and community boundaries

Latest Technology Trends

Gartner defines a strategic technology trend as one with substantial disruptive potential that is beginning to break out of an emerging state into broader impact and use, or which is rapidly growing with a high degree of volatility reaching tipping points over the next five years.

Latest Technology Trends

People Centric Trends

Technology which are centered for human development and usage

People Centric

Hyper Automation

Hyper-automatization proposes is an automation of processes with software tools such as BPM and RPA, accompanied by Machine Learning to optimize time, decision-making and the discovery of new activities to be automated.

Hyper Automation

Multi-Epxerience

Multi-experience also refers to the inclusion of new sensory experiences (visual, audible, tactile, etc.) such as those offered by VR (Virtual Reality), AR (Augmented Reality) and MR (Mixed Reality).

Multi-Experience

Democratization

This trend is to create simplified models so that all users can enjoy the latest technological experiences, not only as users, but also as application developers, data analysts, etc. Low-Code, No-Code, and advances in Artificial Intelligence play an important role in this field.

Democratization

Human Augmentation

This entails using technology to increase human capabilities, whether it be hardware or software. It seeks to enhance vision, hearing, calculation, analysis, decision-making, or many other capabilities. These advances are mainly aimed at facilitating human work.

Human

Augmentation

Transparency and Traceability

Privacy and digital ethics continue to gain momentum in digitalization as people are increasingly aware of the importance of their data. Organizations that provide technology services must take special care to protect this data and user privacy, especially in environments that begin to use Machine Learning algorithms.

Transparency and Traceability

Smart Spaces

Technology which are centered with maximizing data space while utilizing it at the same time

Smart Spaces

Empowered Edge

Edge Computing describes a computer topology in which information processing and content collection and delivery are placed closer to those who consume the information; stemming from the distributed processing philosophy. This aims to keep network traffic and computer processing in a local environment, so as not to saturate the central servers and to reduce latency.

Empowered Edge

Distributed Cloud

Distributed cloud is the distribution of public cloud services to different locations outside the provider’s data center and it is the provider who is responsible for the operation, governance and maintenance of the data. This implies a change from the centralized model of most cloud service providers.

Distributed Cloud

Autonomous Things

Autonomous systems are physical devices that use AI to perform tasks that were previously carried out by people. This includes industrial robots, humanoids, drones and autonomous vehicles, among others. The main areas that are developed in these systems are: perception, interaction, mobility, manipulation, collaboration and autonomy.

Autonomous Things

Practical Blockchain

Blockchain is an expandable list of irrevocable transaction records, cryptographically signed and shared by all participants in a network. Each record contains a temporary stamp and a reference link to the previous transaction. Simply speaking, it is the digital implementation of a distributed and unalterable ledger.

Practical

Blockchain

AI Security

Given the capabilities of Artificial Intelligence, and especially Machine Learning, it is expected that in the next 5 years these technologies will be used to augment analysis and decision-making in a wide range of intelligent environments, from companies to leading cities. The amount of data processed by ML models is immense, and, in many cases, includes personal information. This involves a vast amount of potential points of attack, for example, IoT, microservices, servers, connected personal devices, etc. creating the need for advanced cybersecurity systems.

AI Security

Learn more about creating dynamic, engaging presentations with Prezi