Week 1 – Microprocessor Design and Security Exploits
Week 1
Meltdown and exploit is considered to be most critical kind of vulnerabilities in present processors. These are considered to be hardware vulnerabilities which allows different types of programs to easily steal data which is mainly processed in the computers (Trippel, Lustig and Martonosi, 2018). In it various kinds of programs are not easily permitted for reading data from other kinds of programs. A malicious program is mainly used for exploiting meltdown and spectre which is mainly used for getting in memory of other associated programs. Meltdown and spectre is mainly works on personal system, mobile system which are present in the cloud. Based on cloud provider’s infrastructure it is also possible to steel important data from other customers. Meltdown mainly breaks various kinds of isolation between OS and application of user. Meltdown mainly various kinds of program to easily access the required memory and so various kinds of secret of other programs and OS can be easily managed. While on the contrary spectre breaks any kind of isolation between various types of application. It also different kinds of attackers to easily trick error free programs, which manly allows bests kinds of practices for leaking into the secret. Spectre is considered to be much harder for exploitation in comparison to meltdown.
Week 2
Macintosh was released for public domain in the year of 1984. It has ultimately changed the way in an individual interacts with system (Picardi et al., 2015). Macintosh operating system give Mac a good value of competitive edge in the market. Prior to Mac, various people make use of system by typing a proper command at the command prompt. In the Mac has changed the whole kind of thing. Mac has GUI (Graphical User Interface) to large number of masses. The first platform where people come with the idea was desktop. From the desktop users can easily access the files and move the respective item to be trashed away easily. Desktop metaphor mainly appeared to both kinds of novice and system users as it represents various kinds of items which are used in daily life. Previously Macintosh system software was totally based on Lisa OS, which is considered to be a part of Lisa computer in 1983. The first version of Mac OS is considered to be distinguishable from many other operating system as it does not make use of command line interface. It is considered to be much different graphical user interface. Apart from system kernel it comes up with proper file management which mainly displays the desktop.
Week 3
Low power WAN is a well-known wireless technology for wide area network that mainly establish connection by low-bandwidth, battery power based devices over large area. With decrease in the requirement of power, it provides longer ranges and minimum cost in comparison to mobile networks (Raza, Kulkarni and Sooriyabandara, 2017). LPWAN mainly enables a large number of mobile to mobile and IOT based application. In which none of it has issue of budget and power. Proper selection of LPWAN mainly depends on specific kind of application like desired speed and amount or range of area covered. Major of LPWAN technologies comes up with downlink capabilities. LPWAN are mainly found in large number of application like smart metering to tracking. LPWAN comes up some kinds of characteristics like it ranges from 5 to 30 km in various environmental condition, it comes up with autonomy of smart devices which a lifetime of 10 years. A small value of data is mainly transmitted with any kind of low input which vary from few bit/sec to 100 bits/sec. It comes up with low latency which is not considered to be key parameter in application of internet of things. It comes up with lesser value of access points which is mainly covering a large area. LPWAN is considered to be good kind of solution in overcoming a large number of problems.
Week 2 – Graphical User Interfaces Prior to 1985
Week 4
Voice over IP (VoIP) is defined as a latest technology which mainly an individual to make voice calls by making use of broadband internet connection. Some of VoIP allows an individual to make calls by making use of same equipment’s. It also allows an individual to make call by making use of phone number (De Pessemier et al., 2016). One of the biggest benefit of VoIP it can easily make telephone calls over the internet as it does charges beyond the fact which the user is paying. It makes use of codes for encapsulation of audio into data packets. It can easily transmit packets across the various IP packets and along with this it encapsulates the packets into respective kind of audio. It also eliminates the use of circuit-switched network for voice. It also reduces infrastructure cost of network and also enables various kinds of providers to easily deliver voice service over the broadband and private networks. It also allows various kinds of enterprise operate on single and data network. VoIP services mainly converts voice signal into digital signal which mainly travels over the internet. VoIP easily an individual to make calls directly from a provided computer. For VoIP a broadband connection is mainly needed. This can be in the form of cable modem, high speed services, local area network. Some of VoIP tends to offer services for free, it can normally for establishing calls. The biggest plus point of VoIP is that offers various kinds of features and services which are not easily available in traditional phones. It eliminates the whole process of paying for both broadband connection and traditional kind of phone.
Week 5
Blockchain can be easily defined a digitized, decentralized and public ledger of various cryptocurrency. It can be defined as a growing complete blocks which are recorded and added in proper order. It also various kinds of market participants to easily keep a track of various digital currency transaction with any kind of record keeping (Dunphy and Petitcolas, 2018). In this each copy gets a proper copy of blockchain when it is downloaded in an automatic way. It was original developed as an accounting method for various kinds of bitcoin which is also known as distributed ledger technology. This particular technology is mainly used for verification of various kinds of transaction within various kinds of digital currencies. In achieving this it creates a record which cannot be changed in any other form. Various kinds of records are not changed along with it needs some kind of records which comes up with authentication which makes use of blockchain into a single kind of authority. Basically Blockchain comes up with two kinds of features like it comes up data for recording different kinds of exchange of data. This record is known as ledger as it helps in data exchange which are known as transaction. It mainly makes use of distributed system for verification of each kind of transaction which can easily take place.
Week 6
Week 3 – Low-Powered Wide-Area Networks (LPWANs)
Net neutrality is defined as a principle in which different kinds of individuals should be free for accessing all the content and application in an equal way. It mainly focuses on the use of internet service providers which can be used for discriminating it against online services or website which are available. Without Net neutrality rules, various kinds of ISP can easily prevent users accessing of the websites. It can also make for the use of various kinds of service like Netflix and Hulu (Bourreau, Kourandi and Valletti, 2015). It can even redirect various kinds of users from website to competing of a website which is provided. Net Neutrality generally rules by prevention of requiring ISP for connecting users to various kinds of lawful content on the internet on an equal way. On the contrary in absence of this various firm around the globe can easily buy access for ISP customers. Various kinds of rich organization round the globe can easily pay for ISP for providing reliable access to the website in comparison to potential computers. It can easily affect innovative start-up organization which can innovate start up services that are unable to have purchase priority from different kinds of access. ISP can also be connected to large number of consumers and various consumers that comes up additional expense and cost.
Week 7
Printers and publishers: Newspaper will be totally dead in near future. Traditional media is encountering a large number of issues as internet is eating up everything. People now a day does not depend on newspaper for news (Inayatullah, 2017). One can easily get news by the help of twitter or any kind of live streaming which is taking place in near future. All the traditional kind of media are fighting for their life as they are not being able to survive due to evolution of technology.
Cashiers: America alone 8 million people who are working as cashier and in store salesperson. In the near future these people will be out of job sooner than they think. It is predicted in the near future various stores will come up checkout station. They have come up with some of the supervising fact (Cortes, Jaimovich and Siu, 2017). Amazon acquired the whole food for 14 billion dollars. Amazon is pilot test which is known Amazon go. It is nothing but a store corner in which no human involvement is required. An individual just need to walk in, get the required things and walk out of the store. Everything which is bought by the individual will be deducted from the credit card.
Travel agents: Sky scanner took over the flight industry. Booking.com is considered to be over hotel booking industry and Airbnb affected the whole hotel business (Inayatullah, 2017). There is no requirement of 3rd person for booking a flight or hotel room.
Week 8
Machine learning can be easily stated as the use of artificial intelligence (AI) that provides the system with ability to automatically learn large number of things. It will ultimately improvise various kinds of experience without being programmed. Machine learning mainly emphasis on development of large number of computer programs which can easily access data and use it for themselves. The method of machine learning mainly begins with observing data like direct experience. The ultimate goal of this technology is that it can allow various computers to easily learn large number of things. Some of the machine learning are supervision of various kinds of machine learning algorithm, unsupervised machine learning algorithm, semi-supervised machine learning algorithm and reinforcement machine leaning algorithm. Machine learning provides a platform which mainly helps in analysis of mass quantity of data. It mainly mains in delivering faster and more accurate result. It is mainly used for identifying opportunities or any kinds of dangerous risk associated with it. It also need additional kind of time and resources for training (Meng et al., 2016). When machine learning is combined with AI then various kinds of cognitive technology will make it better method or way for processing of large volume of data. In other words, machine learning can be easily defined as present application of AI. It is based on idea or logic that machines are given access to data and it can easily learn from themselves.
Week 9
Nim programming language which is known as imperative, multi-programming language has been designed and developed to be efficient, expressive and elegant. This programming language is considered to be exciting in nature. When other official tutorials it slowly introduces oneself to the language. It has been statistically type with a simple kind of syntax (Pedersen and Quinlan, 2018). It also provides a large number of time for proper compiling of various kinds of things that are mainly written in Macro and other kinds of certain language that can be easily used for reviewing macro. It also comes up with automation garbage collection that is depended on upcoming reference and along with large number of cycles. Nim compiler emits certain number of codes which is considered to be different from other kinds of available complier.
Nim comes up with certain number of benefits like performance on par with programming language. It also interop with various kinds of language like C objective, JavaScript, Lua and lastly python. It also comes up with fast compilation times (Jin and Osborn, 2016). It comes up with C like performance which means that the user is not limited to writing some of the world class application. Fast compilation will have the user to easily write scripts than comparing it in a fast way. It can also run codes which requires tiny edits or any kinds of branches associated with it.
Week 10
Internet bot is considered as the most generic sense of software which comes up with a platform which can be used for automating various kinds of task over the internet. A bot can be defined as an automated application which is mainly used for performing various kinds of application (Cevallos et al., 2015). It is mainly used for performing simple and repetitive tasks. This whole processes and task are considered to be time-consuming and impossible for various humans to easily perform. Bots are also used for various kinds of productive task and along with this they are used for various malicious needs. Spider search engine is considered as one the best example. Some other kinds of bots are mainly inclusive of chat bots and chatter bots. Chatterbot can be easily defined as a simulated talk with a human. One of the first and famous chatterbot is Eliza. It is a program which is used for pretending with other people and answering question. While shopbot can be defined as a program which is used by shops around web on the behalf of individuals. This bot is mainly used for observing various patterns of navigation of the website. After the navigation of a web site it can be used for customizing site for the user.