Emerging Trends, Technologies and Applications PDF
Document Details
Uploaded by HealthfulTheory
Tags
Summary
This document provides an overview of emerging trends in software and service distribution, including virtual reality, cloud computing, and nanotechnology. It explores the objectives, characteristics, and examples of these technologies, as well as advantages and disadvantages of application service providers (ASPs).
Full Transcript
Emerging Trends, Technologies and Applications Objectives ▸ Summarize new trends in SW and service distribution ▸ Describe virtual reality components and applications ▸ Describe the foundation, models, and applications of cloud computing ▸ Discuss uses of nanotechnology ▸ Describe blockchain...
Emerging Trends, Technologies and Applications Objectives ▸ Summarize new trends in SW and service distribution ▸ Describe virtual reality components and applications ▸ Describe the foundation, models, and applications of cloud computing ▸ Discuss uses of nanotechnology ▸ Describe blockchain technology and cryptocurrency 2 Trends in Software and Service **1** Distribution An Introduction in Application Development and Emerging Technologies Pull and Push Technology ▸ Pull technology, a user states a need before getting information, as when a URL is entered in a web browser so the user can go to a certain website ▸ Push technology (webcasting), a web server delivers information to users instead of waiting for users to request the information be sent to them. 4 Pull Technology ▸ Pull Technology is a network communication style where the client requests the server for data, and then the server responds with the requested information. This technology works on a request/response paradigm. ▸ Known as Polling. You ask for data by typing a URL into your browser's address bar, and it takes your request to the server over the Internet, and the server initiates the transfer of information. 5 Example of Pull Technology Internet search engines ▸ All internet search engines like Google, Yahoo, and Bing use pull technology. You enter your request to find a valuable site by typing a URL in the browser's search box, and the browser then carries your request to the server. Upon receiving your request, the server will send you back the required information as a response. Companies with restricted repositories ▸ Several companies have restricted repositories to which all employees are denied access. For example, Apple doesn't allow product development teams to communicate with other people regarding ongoing projects. However, if anyone needs to gather specific information to continue their task, they need to apply Pull technology. 6 Push Technology ![](media/image6.png) ▸ Push technology is a network communication process in which a server initiates data transfer to the recipient without their explicit request. It works on a publish-subscribe model. ▸ In this model, a client subscribes to specific channels hosted by a server. Whenever new content is added to these channels, it is automatically "pushed" to the subscriber. 7 Example of Push Technology ▸ Email. Email systems use Push technology to send messages to receivers automatically with the help of SMTP. It is a push protocol that is used when sending an email to build a connection with the recipient's email server and actively push email messages. ▸ Providing system updates. Users often request system updates on the server to update their device to the latest version. Therefore, they use push technology, where users automatically get notifications for updates on their devices. It eliminates the constant update requests from clients, reduces server load, and allows the proper functioning of other processes in your application server. ▸ Cloud messaging refers to the way of informing users about new data or updates related to an application. This push notification mechanism is useful when some or all of the app's data is managed by a company's server rather than fully stored on the user's device. With remote notification, companies can decide when to initiate and push a notification to the user's device without a request. 8 Application Service Providers ▸ Application Service Providers (ASPs) provide software or services for a fee. ▸ Software as a Service (SaaS), also known as "on-demand software", is a model for ASPs to deliver software to users for a fee; the software is not temporary or long-term use. SaaS model forms: 1\. Software services for general use, such as office suite packages 2. A specific service, such as credit card processing 3\. A service in a vertical market, such as software solutions for doctors, accountants, and attorneys 9 Advantages of ASPs 1\. The customer does not need to be concerned about whether software is current 2\. Information Systems (IS) personnel time is freed up to focus on applications that are more strategically important to the organization 3\. Software development costs are spread over several customers 4\. Software is kept up to date, based on users' requests 5\. The ASP contract guarantees a certain level of technical support 6\. An organization's software costs can be reduced to a predictable monthly fee 10 Disadvantages of ASPs 1\. Users must accept applications as provided by ASPs; software customized to users' needs is not offered. 2\. Applications might not fully meet the organization's needs. 3\. Integration with the customer's other applications and systems might be challenging 11 Virtual Reality **2** An Introduction in Application Development and Emerging Technologies Virtual Reality (VR) ▸ Virtual Reality (VR) uses computer-generated, three-dimensional images to create the illusion of interaction in a real-world environment. ▸ Virtual reality, or VR, is a simulated three-dimensional (3D) environment that lets users explore and interact with a virtual surrounding in a way that approximates reality, as it\'s perceived through the users\' senses. The environment is created with computer hardware and software, although users might also need to wear devices such as goggles, headsets or bodysuits to interact with the environment. ▸ The more deeply users can immerse themselves in a VR environment \-- and block out their physical surroundings \-- the more they can suspend their belief and accept it as real, even if it\'s fantastical in nature. 13 Characteristics and Features 1\. Immersion - By immersing users in a computer-generated world that seems and feels genuine, VR seeks to evoke a feeling of immersion. The level of immersion can vary depending on the type of VR system and the quality of the content. By donning and using wearable technology interactive gear \-- such as data gloves, motion controllers, game consoles and head-mounted displays, like Meta Quest 2 \-- viewers can fully immerse themselves in the virtual world. 2\. Interaction -Virtual reality is a highly interactive experience where people can interact with various elements realistically. The elements of interaction depend on range, speed and mapping, letting users manipulate and control objects, navigate through virtual space and engage in activities within the virtual world. 14 Characteristics and Features 3\. Realistic visuals - High-resolution monitors and sophisticated graphics rendering techniques are used in VR to produce vivid, lifelike images. This includes realistic lighting and textures, realistic 3D visuals and stereoscopic imaging for depth perception. 4\. Spatial audio - Technology offers realistic sound effects positioned physically within the virtual environment. By producing an audio experience that corresponds with the user\'s visual environment, VR increases the user\'s sensation of presence and immersion. 5\. Multi-sensory haptic feedback -Advanced virtual reality systems can also include haptic feedback, which gives tactile sensations to the users. This can involve force feedback, vibrations, or even full-body haptic suits that let users experience real-world bodily sensations in a virtual setting. 15 Characteristics and Features 6\. Spatial collaboration - The capacity for individuals or groups to work together and communicate in a common virtual environment through the use of virtual reality technology is known as spatial collaboration. Regardless of where they\'re physically located, it lets users collaborate virtually on projects, exchange ideas and interact as if they were in the same space. For example, Vision Pro, which is Apple\'s first spatial computer, combines mixed reality and VR to create an immersive experience without completely obstructing the outside world. 7\. Complete 360-degree views - With a full 360-degree spherical field of view that most VR systems offer, users can look in any direction and explore the virtual space from different perspectives, just as they would in the real world. 16 Characteristics and Features 8\. Adaptive environments - When generative AI is integrated with VR settings, the result is a responsive and personalized experience that can change dynamically in response to human inputs. AI-driven systems, for instance, can evaluate user behavior in real time, enabling virtual environments to adjust and react to the user\'s activities to create a genuinely personalized and engaging experience. 17 Types of VR Environment ▸ Egocentric environment: the user is totally immersed in the VR world ▸ Exocentric environment: the user is given a "window view". Data is still rendered in 3D, but users can only view it on screen. They cannot interact with objects, as in a egocentric environment. 18 VR CAVE ▸ A VR CAVE (Cave Automatic Virtual Environment) is a VR space or cube like room, with 3D images projected onto the walls of the room, to create a walk-in immersive 3D environment. ▸ A CAVE (also called Computer Automatic Virtual Environment) is composed of a minimum of 2 walls but can go up to 6 sides of the cube when adding a floor and a ceiling to all 4 walls. These walls act as a projection screens onto which the 3D graphics are projected. Typically these screens use 3D stereoscopic rear projection, to recreate a 3D immersion virtual environment, using multiple projectors of up to 4k resolution to ensure a very high quality image. 19 Cloud Computing: Foundation, Applications, **3** and Models An Introduction in Application Development and Emerging Technologies Cloud Computing ▸ Cloud computing is the on-demand access of computing resources---physical servers or virtual servers, data storage, networking capabilities, application development tools, software, AI-powered analytic tools and more---over the internet with pay-per-use pricing. ▸ The cloud computing model offers customers greater flexibility and scalability compared to traditional on-premises infrastructure. ▸ A cloud services provider (CSP) manages cloud-based technology services hosted at a remote [data center] and typically makes these resources available for a pay-as-you-go or monthly subscription fee. 21 Benefits of Cloud Computing ▸ Unlimited scalability - Cloud computing provides elasticity and self service provisioning, so instead of purchasing excess capacity that sits unused during slow periods, you can scale capacity up and down in response to spikes and dips in traffic. You can also use your cloud provider's global network to spread your applications closer to users worldwide. ▸ Enhanced strategic value - Cloud computing enables organizations to use various technologies and the most up-to-date innovations to gain a competitive edge. For instance, in retail, banking and other customer facing industries, generative AI-powered virtual assistants deployed over the cloud can deliver better customer response time and free up teams to focus on higher-level work. In manufacturing, teams can collaborate and use cloud-based software to monitor real-time data across logistics and supply chain processes. 22 Benefits of Cloud Computing ▸ Cost-effectiveness - Cloud computing lets you offload some or all of the expense and effort of purchasing, installing, configuring and managing mainframe computers and other on-premises infrastructure. You pay only for cloud-based infrastructure and other computing resources as you use them. ▸ Increased speed and agility - With cloud computing, your organization can use enterprise applications in minutes instead of waiting weeks or months for IT to respond to a request, purchase and configure supporting hardware and install software. This feature empowers users---specifically DevOps and other development teams---to help leverage cloud-based software and support infrastructure. 23 Origins of Cloud Computing The origins of cloud computing technology go back to the early 1960s when Dr. Joseph Carl Robnett Licklider, an American computer scientist and psychologist known as the \"father of cloud computing\", introduced the earliest ideas of global networking in a series of memos discussing an Intergalactic Computer Network. However, it wasn't until the early 2000s that modern cloud infrastructure for business emerged. In 2002, Amazon Web Services started cloud-based storage and computing services. In 2006, it introduced Elastic Compute Cloud (EC2), an offering that allowed users to rent virtual computers to run their applications. That same year, Google introduced the Google Apps suite (now called Google Workspace), a collection of SaaS productivity applications. In 2009, Microsoft started its first SaaS application, Microsoft Office 2011. Today, Gartner predicts worldwide end-user spending on the public cloud will total USD 679 billion and is projected to exceed USD 1 trillion. 24 Cloud Computing Components ▸ Data centers ![](media/image1.png) CSPs own and operate remote data centers that house physical or [bare] [metal servers], [cloud storage] systems and other physical hardware that create the underlying infrastructure and provide the physical foundation for cloud computing. ▸ Virtualization Cloud computing relies heavily on the virtualization of IT infrastructure--- servers, operating system software, networking and other infrastructure that's abstracted using special software so that it can be pooled and divided irrespective of physical hardware boundaries. For example, a single hardware server can be divided into multiple virtual servers. Virtualization enables cloud providers to make maximum use of their data centerresources. 25 Cloud Computing Components -- -- ▸ Networking capabilities In cloud computing, high-speed [networking] connections are crucial. Typically, an internet connection known as a wide-area network (WAN) connects front-end users (for example, client-side interface made visible through web-enabled devices) with back-end functions (for example, data centers and cloud-based applications and services). Other advanced cloud computing networking technologies, including [load balancers], [content delivery networks] ([CDNs)] and [software-defined networking (SDN)], are also incorporated to ensure data flows quickly, easily and securely between front-end users and back-end resources. 26 Types of Cloud Computing PUBLIC CLOUD ▸ A public cloud is a type of cloud computing in which a cloud service provider makes computing resources available to users over the public internet. These include SaaS applications, individual virtual machines (VMs), bare metal computing hardware, complete enterprise-grade infrastructures and development platforms. These resources might be accessible for free or according to subscription-based or pay-per-usage pricing models. ▸ Public cloud is a multi-tenant environment where all customers pool and share the cloud provider's data center infrastructure and other resources. In the world of the leading public cloud vendors, such as Amazon Web Services (AWS), Google Cloud, IBM Cloud®, Microsoft Azure and Oracle Cloud, these customers can number in the millions. 27 Types of Cloud Computing PRIVATE CLOUD ▸ A private cloud is a cloud environment where all cloud infrastructure and computing resources are dedicated to one customer only. Private cloud combines many benefits of cloud computing---including elasticity, scalability and ease of service delivery---with the access control, security and resource customization of on-premises infrastructure. ▸ Many companies choose a private cloud over a public cloud environment to meet their regulatory compliance requirements. Entities like government agencies, healthcare organizations and financial institutions often opt for private cloud settings for workloads that deal with confidential documents, personally identifiable information (PII), intellectual property, medical records, financial data or other sensitive data. 28 Types of Cloud Computing HYBRID CLOUD ▸ A hybrid cloud is just what it sounds like: a combination of public cloud, private cloud and on-premises environments. Specifically (and ideally), a hybrid cloud connects a combination of these three environments into a single, flexible infrastructure for running the organization's applications and workloads. ▸ At first, organizations turned to hybrid cloud computing models primarily to migrate portions of their on-premises data into private cloud infrastructure and then connect that infrastructure to public cloud infrastructure hosted off premises by cloud vendors. This process was done through a packaged hybrid cloud solution like Red Hat® OpenShift® or middleware and IT management tools to create a \"single pane of glass.\" Teams and administrators rely on this unified dashboard to view their applications, networks and systems. 29 Types of Cloud Computing MULTICLOUD ▸ Uses two or more clouds from two or more different cloud providers. A multiclou[d] environment can be as simple as email SaaS from one vendor and image editing SaaS from another. But when enterprises talk about multicloud, they typically refer to using multiple cloud services---including SaaS, PaaS and IaaS services---from two or more leading public cloud providers. ▸ Organizations choose multicloud to avoid vendor lock-in, to have more services to select from and to access more innovation. With multicloud, organizations can choose and customize a unique set of cloud features and services to meet their business needs. This freedom of choice includes selecting "best-of-breed" technologies from any CSP, as needed or as they emerge, rather than being locked into offering from a single vendor. For example, an organization may choose AWS for its global reach with web-hosting, IBM Cloud for data analytics and machine learning platforms and Microsoft Azure for its security features.~30~ Cloud Computing Services ▸ [IaaS (Infrastructure-as-a-Service)] provides on-demand access to fundamental computing resources---physical and virtual servers, networking and storage---over the internet on a pay-as-you-go basis. IaaS enables end users to scale and shrink resources on an as-needed basis, reducing the need for high up-front capital expenditures or unnecessary on-premises or \"owned\" infrastructure and for overbuying resources to accommodate periodic spikes in usage. ▸ [PaaS (Platform-as-a-Service)] provides software developers with an on-demand platform---hardware, complete software stack, infrastructure and development tools---for running, developing and managing applications without the cost, complexity and inflexibility of maintaining that platform on-premises. With PaaS, the cloud provider hosts everything at their data center. These include servers, networks, storage, operating system software, [middleware] and databases. Developers simply pick from a menu to spin up servers and environments they need to run, build, test, deploy, maintain, update and scale applications. 31 Cloud Computing Services ▸ [SaaS (Software-as-a-Service),] also known as cloud-based software or cloud applications, is application software hosted in the cloud. Users access SaaS through a web browser, a dedicated desktop client or an API that integrates with a desktop or mobile operating system. Cloud service providers offer SaaS based on a monthly or annual subscription fee. They may also provide these services through pay-per-usage pricing. \`In addition to the cost savings, time-to-value and scalability benefits of cloud, SaaS offers the following: ▸ Automatic upgrades: With SaaS, users use new features when the cloud service provider adds them without orchestrating an on-premises upgrade. ▸ Protection from data loss: Because SaaS stores application data in the cloud with the application, users don't lose data if their device crashes or breaks. 32 Nanotechnology **4** An Introduction in Application Development and Emerging Technologies Nanotechnology Nanotechnology involves manipulating atoms and molecules to give structures new chemical and physical properties. Nanotechnology devices have a wide range of applications, such as electronics, medicine, energy, textiles and more. These devices typically have a scale of fewer than 100 nanometers (nm). A nanometer is a very small unit of measurement equal to one billionth of a meter. For reference, a sheet of paper is about 100,000 nanometers thick. 34 ![](media/image3.png)**CREDIT TO: https://www.worksheetsplanet.com/what-is-nanotechnology/\#google\_vignette** 35 Why is nanotechnology is important? ▸ We can use nanotechnology to create materials, devices and systems with unique properties and functions. The very small size of the materials allows them to exhibit different physical and chemical properties than the same materials at a larger scale. Due to their small size, nanomaterials have a large surface area-to volume ratio, which can lead to increased reactivity, strength and conductivity. ▸ Additionally, the small size of nanomaterials allows them to be easily incorporated into a wide variety of products and processes, including electronic devices, medical treatments, energy production and environmental remediation. The properties of nanomaterials also make them useful for creating new products and improving existing ones, such as increasing the efficiency of solar cells and batteries, creating stronger and more durable materials for construction and developing more effective medical treatments. 36 Examples of Nanotechnology ▸ Electronics. We use nanomaterials in smartphones, laptops and televisions. Nanomaterials help to improve various properties of these devices such as [conductivity], strength and durability. ▸ Cosmetics. Some cosmetics, like foundations and moisturizers, contain nanoparticles that can help to improve the product's texture and appearance. ▸ Sporting goods. Some sports equipment, such as golf clubs and tennis rackets, contain nanomaterials that can help to improve their performance. For example, nanoclay is added to [soccer and tennis balls] to increase their life spans. ▸ Clothing. Some clothing, such as outdoor gear and athletic wear, contain nanomaterials that can make them more durable and water-resistant, or even reduce odor. 37 Examples of Nanotechnology ▸ Sunscreen. Zinc oxide and titanium oxide can be [added to sunscreens] at the nanoscale, making sunscreens stronger and longer-lasting with limited health risks. ▸ Furniture. Manufacturers create more lightweight yet durable [furniture] [with nanomaterials]. Nanomaterials can also increase the endurance of furniture's colors. ▸ Adhesives. Nanoparticles can [strengthen adhesives] without sacrificing stickiness, raising the durability of adhesive materials. ▸ Automotive. Automotive manufacturers are [experimenting with] [nanomaterials] to make car coats more wear-resistant and enable cars to heal scratches on their own. 38 Blockchain Technology and **5** Cryptocurrency An Introduction in Application Development and Emerging Technologies Block Chain Technology and Cryptocurrency ▸ Blockchain is a method of recording information that makes it impossible or difficult for the system to be changed, hacked, or manipulated. A blockchain is a distributed ledger that duplicates and distributes transactions across the network of computers participating in the blockchain. ▸ Blockchain technology is a structure that stores transactional records, also known as the block, of the public in several databases, known as the "chain," in a network connected through peer-to-peer nodes. Typically, this storage is referred to as a 'digital ledger.' ▸ Every transaction in this ledger is authorized by the digital signature of the owner, which authenticates the transaction and safeguards it from tampering. Hence, the information the digital ledger contains is highly secure. 40 Structure of Blockchain A blockchain is a distributed, immutable, and decentralized ledger at its core that consists of a chain of blocks and each block contains a set of data. The blocks are linked together using cryptographic techniques and form a chronological chain of information. The structure of a blockchain is designed to ensure the security of data through its consensus mechanism which has a network of nodes that agree on the validity of transactions before adding them to the blockchain. Blocks: A block in a blockchain is a combination of three main components: 1\. The header contains metadata such as a timestamp which has a random number used in the mining process and the previous block\'s hash. 2\. The data section contains the main and actual information like transactions and smart contracts which are stored in the block. 3\. Lastly, the hash is a unique cryptographic value that works as a representative of the entire block which is used for verification purposes. 41 Structure of Blockchain Block Time: Block time refers to the time taken to generate a new block in a blockchain. Different blockchains have different block times, which can vary from a few seconds to minutes or may be in hours too. Shorter block times can give faster transaction confirmations but the result has higher chances of conflicts but the longer block times may increase the timing for transaction confirmations but reduce the chances of conflicts. Hard Forks: A hard fork in a blockchain refers to a permanent divergence in the blockchain\'s history that results in two separate chains. It can happen due to a fundamental change in the protocol of a blockchain and all nodes do not agree on the update. Hard forks can create new cryptocurrencies or the splitting of existing ones and It requires consensus among the network participants to resolve. 42 Structure of Blockchain Decentralization: Decentralization is the key feature of blockchain technology. In a decentralized blockchain, there is no single central authority that can control the network. In decentralization,the decision-making power is distributed among a network of nodes that collectively validate and agree on the transactions to be added to the blockchain. This decentralized nature of blockchain technology helps to promote transparency, trust, and security. It also reduces the risk to rely on a single point of failure and minimizes the risks of data manipulation. Finality: Finality refers to the irreversible confirmation of transactions in a blockchain. If and when a transaction is added to a block and the block is confirmed by the network, it becomes immutable and cannot be reversed. This feature ensures the integrity of the data and prevents double spending, providing a high level of security and trust in Blockchain Types & Sustainability 43 Structure of Blockchain Openness: Openness in blockchain technology makes the blockchain accessible to anyone who intends to participate in the network. This implies that it is open for all and anyone can join the network, validate transactions, and can add new blocks to the blockchain, so long as they know the consensus rules. Openness promotes inclusivity, transparency, and innovation, as it allows for participation from various stakeholders. Public Blockchain: It is a kind of blockchain which is open for the public and allows everyone to join the network to perform transactions and to participate in the consensus process. Public blockchains are transparent, because all transactions are publicly recorded. 44 How Does Blockchain Technology Work? Blockchain is a combination of three leading technologies: ▸ Cryptographic keys ▸ A peer-to-peer network containing a shared ledger ▸ A means of computing, to store the transactions and records of the network Cryptography keys consist of two keys -- Private key and Public key. These keys help in performing successful transactions between two parties. Each individual has these two keys, which they use to produce a secure digital identity reference. This secured identity is the most important aspect of Blockchain technology. In the world of cryptocurrency, this identity is referred to as 'digital signature' and is used for authorizing and controlling transactions. 45 How Does Blockchain Technology Work? The digital signature is merged with the peer-to-peer network; a large number of individuals who act as authorities use the digital signature in order to reach a consensus on transactions, among other issues. When they authorize a deal, it is certified by a mathematical verification, which results in a successful secured transaction between the two network-connected parties. So to sum it up, Blockchain users employ cryptography keys to perform different types of digital interactions over the peer-to-peer network. 46 Quantum **6** Computing An Introduction in Application Development and Emerging Technologies Quantum Computing ▸ Quantum computing is a new approach to calculation that uses principles of fundamental physics to solve extremely complex problems very quickly. ▸ Digital computers have been making it easier for us to process information for decades. But quantum computers are poised to take computing to a whole new level. Quantum computers represent a completely new approach to computing. They have the potential to solve very complex statistical problems that are beyond the limits of today's computers. Quantum computing has so much promise and momentum that McKinsey has identified it as one of the next big trends in tech. Quantum computing alone---just one of three main areas of emerging quantum technology---could account for nearly \$1.3 trillion in value by 2035. Investors of all kinds are perking up their ears---and opening up their wallets: government investors alone have pledged \$34 billion in investments. In 2022, the US government announced \$1.8 billion in funding, bringing its total investment to \$3.7 billion. 48 How does a quantum computer work? Here's how quantum computing works: classical computing, the technology th~~a~~t powers your laptop and smartphone, is built on bits. A bit is a unit of information that can store either a zero or a one. By contrast, quantum computing is built on quantum bits, or qubits, which can store zeros and ones. Qubits can represent any combination of both zero and one simultaneously---this is called superposition, and it is a basic feature of any quantum state. Chips are the physical hardware that store qubits, just like in classical computing. When a classical computer solves a problem with multiple variables, it must conduct a new calculation every time a variable changes. Each calculation is a single path to a single result. Quantum computers, however, can explore many paths in parallel through superposition. Additionally, qubits can interact with one another. This is known as entanglement. Entanglement allows qubits to scale exponentially; two qubits, for example, can store and process four bits of information, three can process eight, and so on. This exponential scaling gives the quantum computer much more power than classical computers. 49 What industries stand to benefit the most from quantum computing? *1. Pharmaceuticals -* Quantum computing has the potential to revolutionize the research and development of molecular structures in the biopharmaceuticals industry. *2. Chemicals -* Quantum computing could be used to improve catalyst design, which could enable savings on existing production processes. Innovative catalysts could also enable the replacement of petrochemicals with more sustainable feedstock or the breakdown of carbon for CO~2~ usage. *3. Mobility -* Quantum computing could result in a mobility ecosystem that is fully connected, intelligent, and environmentally friendly. Changes depend on the rapid and smooth exchange of vast amounts of data between in-vehicle computers and computers elsewhere. 50 What industries stand to benefit the most from quantum computing? *4. Automotive. -* Quantum computing could be applied to decrease manufacturing costs by optimizing complex multirobot processes including welding, gluing, and painting. *5. Finance -* The long-term promise of quantum computing in finance lies in portfolio and risk management. One example could be quantum-optimized loan portfolios that focus on collateral to allow lenders to improve their offerings. By the time a fault-tolerant quantum computer is available, we estimate that the use cases in finance could create \$622 billion in value. 51 References: ▸Somrita Shyam. (2024, July 18). *Push Vs Pull Technology: Key Differences with Examples*. 10Pie. [https://10pie.com/push-vs-pull technology/\#google\_vignette ] ▸(2024). Coursehero.com. [https://www.coursehero.com/file/11787598/Chapter-14-Notes/?userType=student] ▸Sheldon, R. (2022, August). *What is Virtual Reality?* WhatIs.com. [https://www.techtarget.com/whatis/definition/virtual-reality] ▸*The VR CAVE, halfway between reality and virtuality*. (2020, October 1). SkyReal. [https://sky-real.com/news/the-vr-cave-halfway between-reality-and-virtuality/\#:\~:text=A%20VR%20CAVE%] ▸Susnjara, S., & Smalley, I. (2024, February 14). *What is cloud computing*. Www.ibm.com; IBM. [https://www.ibm.com/topics/cloud computing ] ▸Oppermann, A. (2023, February 13). *What Is Nanotechnology? (Definition, Examples, Risks) \| Built In*. Builtin.com. [https://builtin.com/hardware/nanotechnology ] ▸worksheetsplanet. (2024, February 11). *What is Nanotechnology \| Definition of Nanotechnology*. Worksheets Planet. [https://www.worksheetsplanet.com/what-is-nanotechnology/\#google\_vignette ] ▸A S, R. (2022, February 21). *What is Blockchain Technology and How Does It Work?* Simplilearn.com. [https://www.simplilearn.com/tutorials/blockchain-tutorial/blockchain-technology] ▸McKinsey. (2023, May 1). *What is quantum computing? \| McKinsey*. Www.mckinsey.com. [https://www.mckinsey.com/featured insights/mckinsey-explainers/what-is-quantum-computing] 52 THANKS! **Any questions?** 53