This book explores quantum computing as a transformative technology and its applications in communications, cryptography, teleportation, IoT, AI, and blockchain, in addition to the revolutionary concept of quantum internet. It also explains the concept of dark, small, thick data, and clarifies what the concept of a data lake is. Other exciting technologies such as edge/fog computing, CDN, SDN, wearable technology and IoE topics are discussed in detail. Information security applications like zero trust model, zero-day vulnerability and heuristic analysis, and use of AI in cybersecurity are explored. Two of the most intriguing concepts in computing “affective computing” and “autonomic computing” are explained and simplified. The blockchain applications presented include blockchain and supply chain, crowdsourcing, cryptocurrency, and IoT. The book ends with a look at using technology to fight COVID-19 and future pandemics.
Part 1: Quantum Computing
1. What is Quantum Computing
2. Quantum
Cryptography
3. Quantum Internet
4. Quantum Teleportation
5. Quantum
Computing and IoT
6. Quantum Computing and Blockchain: Myths and Facts
7.
Quantum Computing and AI: A Mega-Buzzword
8. Quantum Computing Trends Part 2:
Other Computing Technologies
9. What is Deep Learning?
10. Affective
Computing
11. Autonomic Computing Part 3: Big Data, Dark Data, Thick Data,
and Small Data
12. Thick Data vs. Big Data
13. Understanding Dark Data
14.
Small Data vs. Big Data: Back to the Basics
15. What is a Data Lake? Part 4:
Cloud Computing
16. Edge Computing Paradigm
17. The Internet of Everything
18. Content Delivery Networks CDNs
19. Network Functions Virtualization
(NFV) or Software-Defined Networking (SDN)?
20. What is Virtualization?
21.
Risks of Cloud Computing Explained (Both Sides)
22. Cloud-of-Clouds or
(Intercloud)
23. Myths and Facts About Cloud Computing Part 5: Security
24.
Zero-Day Vulnerability and Heuristic Analysis
25. The Zero Trust Model
26.
Cloud Computing Security
27. First Line of Defense for Cybersecurity: AI
28.
Second Line of Defense for Cybersecurity: Blockchain
29. Network Security
Needs Big Data Part 6: Blockchain
30. Blockchain Technology and COVID-19
31.
How Blockchain is Revolutionizing Crowdfunding
32. Blockchain Technology and
Supply Chain Management Part 7: IoT
33. IoT and COVID-19
34. IoT and 5G
Convergence Part 8: Wearable and Mobile Technology
35. The Smart Platform:
Wearable Computing Devices (WCD)
36. Your Smart Device Will Feel Your Pain
and Fear
37. Technology Under Your Skin: Three Challenges of Microchip
Implants Part 9: Future Trends in Technology
38. The Metaverse: A Different
Perspective
39. The Metaverse: Myths and Facts
40. Eight Key Tech Trends in a
Post-COVID-19 World
Ahmed Banafa, Professor, Award Winning Author, Technology Expert and International Keynote Speaker, has extensive experience in research, operations and management, with a focus on IoT, blockchain, cybersecurity and AI. He is the recipient of a Certificate of Honor from the City and County of San Francisco and the Author & Artist Award 2019 of San Jose State University. He was named as number 1 tech voice to follow, technology fortune teller and influencer by LinkedIn in 2018, his research has featured in Forbes, IEEE and MIT Technology Review, and he has been interviewed by ABC, CBS, NBC, CNN, BBC, NPR and Fox. He is a member of the MIT Technology Review Global Panel. He is the author of the book Secure and Smart Internet of Things (IoT) using Blockchain and Artificial Intelligence (AI) which won 3 awards, the San Jose State University Author and Artist Award, One of the Best Technology eBooks of all Time Award, and One of the Best AI Models Books of All Time Award. His second book was Blockchain Technology and Applications used at Stanford University and other prestigious schools in the USA. He studied Electrical Engineering at Lehigh University, Cybersecurity at Harvard University and Digital Transformation at Massachusetts Institute of Technology (MIT).