1st Edition

Quantum Computing and Other Transformative Technologies

By Ahmed Banafa Copyright 2023
    260 Pages 65 Color & 2 B/W Illustrations
    by River Publishers

    285 Pages 65 Color & 2 B/W Illustrations
    by River Publishers

    This book explores quantum computing as a transformative technology and its applications in communications, cryptography, teleportation, IoT, AI, and blockchain, in addition to the revolutionary concept of quantum internet. It also explains the concept of dark, small, thick data, and clarifies the concept of a data lake. Other exciting technologies like edge/fog computing, CDN, SDN, wearable technology and IoE topics are discussed in detail in the book. Information security applications like zero trust model, zero-day vulnerability and heuristic analysis, and use of AI in cybersecurity are explored. Two of the most intriguing concepts in computing, “affective computing” and “autonomic computing”, are explained and simplified. The blockchain applications presented include blockchain and supply chain, crowdsourcing, cryptocurrency, and IoT. The book ends with a look at using technology to fight COVID-19 and future pandemics.

    Part 1: Quantum Computing  1. What is Quantum Computing  2. Quantum Cryptography  3. Quantum Internet  4. Quantum Teleportation  5. Quantum Computing and IoT  6. Quantum Computing and Blockchain: Myths and Facts  7. Quantum Computing and AI: A Mega-Buzzword  8. Quantum Computing Trends  Part 2: Other Computing Technologies  9. What is Deep Learning?  10. Affective Computing  11. Autonomic Computing  Part 3: Big Data, Dark Data, Thick Data, and Small Data  12. Thick Data vs. Big Data  13. Understanding Dark Data  14. Small Data vs. Big Data: Back to the Basics  15. What is a Data Lake?  Part 4: Cloud Computing  16. Edge Computing Paradigm  17. The Internet of Everything  18. Content Delivery Networks – CDNs  19. Network Functions Virtualization (NFV) or Software-Defined Networking (SDN)?  20. What is Virtualization?  21. Risks of Cloud Computing Explained (Both Sides)  22. Cloud-of-Clouds or (Intercloud)  23. Myths and Facts About Cloud Computing  Part 5: Security  24. Zero-Day Vulnerability and Heuristic Analysis  25. The Zero Trust Model  26. Cloud Computing Security  27. First Line of Defense for Cybersecurity: AI  28. Second Line of Defense for Cybersecurity: Blockchain  29. Network Security Needs Big Data  Part 6: Blockchain  30. Blockchain Technology and COVID-19  31. How Blockchain is Revolutionizing Crowdfunding  32. Blockchain Technology and Supply Chain Management  Part 7: IoT  33. IoT and COVID-19  34. IoT and 5G Convergence  Part 8: Wearable and Mobile Technology  35. The Smart Platform: Wearable Computing Devices (WCD)  36. Your Smart Device Will Feel Your Pain and Fear  37. Technology Under Your Skin: Three Challenges of Microchip Implants  Part 9: Future Trends in Technology  38. The Metaverse: A Different Perspective  39. The Metaverse: Myths and Facts  40. Eight Key Tech Trends in a Post-COVID-19 World  

    Biography

    Ahmed Banafa, Professor, Award Winning Author, Technology Expert and International Keynote Speaker, has extensive experience in research, operations and management, with a focus on IoT, blockchain, cybersecurity and AI. He is the recipient of a Certificate of Honor from the City and County of San Francisco and the Author & Artist Award 2019 of San Jose State University. He was named as number 1 tech voice to follow, technology fortune teller and influencer by LinkedIn in 2018, his research has featured in Forbes, IEEE and MIT Technology Review, and he has been interviewed by ABC, CBS, NBC, CNN, BBC, NPR and Fox. He is a member of the MIT Technology Review Global Panel. He is the author of the book Secure and Smart Internet of Things (IoT) using Blockchain and Artificial Intelligence (AI) which won 3 awards, the San Jose State University Author and Artist Award, One of the Best Technology eBooks of all Time Award, and One of the Best AI Models Books of All Time Award. His second book was Blockchain Technology and Applications used at Stanford University and other prestigious schools in the USA. He studied Electrical Engineering at Lehigh University, Cybersecurity at Harvard University and Digital Transformation at Massachusetts Institute of Technology (MIT).