Emerging Information Technologies

Slides:



Advertisements
Similar presentations
ENERGY ENGINEERING MASTERS DEGREE. Why a Consortium? Great problems are solved with high performance equipment. We celebrate that eight leader companies.
Advertisements

Technology Life Cycle Wikipedia: Most new technologies follow a similar technology maturity lifecycle describing the technological maturity of a product.
Aaron Summers. What is Artificial Intelligence (AI)? Great question right?
School of Business University of Bridgeport Admissions Presentation Robert Gilmore, Ph.D. Associate Dean School of Business.
1 Exploring NSF Funding Opportunities in DUE Tim Fossum Division of Undergraduate Education Vermont EPSCoR NSF Research Day May 6, 2008.
Strategic Plan for CIS Department. Vision Have an international reputation, apart from the main campus, for innovative research and excellent educational.
Carnegie Mellon University Computer Science Foundations for Ph.D. Students The Carnegie Mellon Perspective Computer Science Foundations for Ph.D. Students.
Thumbs Up for Security Thumbs Up for Security Overview Dr. Charles Tappert (
College Strategic Plan by Strategic Planning and Quality Assurance Committee.
Mohammad Alshayeb 19 May Agenda Update on Computer Science Program Assessment/Accreditation Work Update on Software Engineering Program Assessment/Accreditation.
Distance Learning Opportunities & Challenges Dr. Safia Barikzai Informatics Department, Business School London South Bank University June 2014.
EIT ICT Labs  ICT innovation is driving transformations in society to improve quality of life  Rapid disruptive ICT innovation is a key driver in the.
Alexandra Savelieva, Sergey Avdoshin, PhD National Research University “Higher School of Economics” Alexandra Savelieva, Sergey Avdoshin, PhD National.
Charles Tappert Seidenberg School of CSIS, Pace University
Research Day Statistics and What is Research Day? Dr. Charles C. Tappert Professor of Computer Science Seidenberg School of CSIS 2015 Research Day.
May 25, IAB: Trends in CSE CSE Fall Enrollments CSE Degrees Awarded Assessment ABET accreditation Annual SACS Assessment Reports Graduate Program.
Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity for Critical Infrastructure Workshop Summary May 3, 2013 Support for.
Most of contents are provided by the website Introduction TJTSD66: Advanced Topics in Social Media Dr.
Center for Cybersecurity Research and Education (CCRE)
1 1 © International Business Machines Corporation 2015 IBM Career Education Program Making Partnerships Work … 10 th October, VC’s Retreat, 2015 Pune P.
Information Assurance – A Technology Transfer Success Story Deidre W. Evans, Edward L. Jones, Christy L. Chatmon Computer and Information Sciences Department.
Marv Adams Chief Information Officer November 29, 2001.
Carnegie Mellon University Computer Science Foundations for Ph.D. Students The Carnegie Mellon Perspective Computer Science Foundations for Ph.D. Students.
MANAGEMENT and MARKETING DEPARTMENT PERM NATIONAL RESEARCH POLYTECHNIC UNIVERSITY.
Research Day Statistics and What is Research Day? Dr. Charles C. Tappert Professor of Computer Science Seidenberg School of CSIS 2016 Research Day.
Department of Computer and Information Sciences
Outline of Quality assurance and accreditation
Department of Computer and Information Sciences
Grades 7 to 12 Math & Science Specialist Talent Management Strategy
Health Informatics Domain and its Development with potentialities of proposed MTech-Health Information Sciences for sustainable Public Health Systems.
Innovation Center Riga, 2017.
Computer-User-Input Behavioral Biometrics Dr. Charles C
Leading E Competent Schools – Implementing Digital Learning Materials
Day 1 Session 2/ Programme Objectives
Provided by: Anthony C. Smith, Sr. Director/Program Manager
Computer-User-Input Behavioral Biometrics The Biometrics we focus on at Pace University Dr. Charles C. Tappert Seidenberg School of CSIS, Pace University.
Computer Science Department, University of Missouri, Columbia
Chapter 1- Introduction
Doctor of Professional Studies Orientation
Digital library for Earth System Education Teaching Boxes
Frequently asked questions about software engineering
Lots of news about Artificial Intelligence in the press
AP computer science PRINCIPLES
Competition in Markets
CYBER SPACE ASIA 2018.
Dr. Charles Tappert Professor of Computer Science
CS691-CS692-IT691 Capstone Projects Course
UTSA Cyber Security Ecosystem
Smart Learning concepts to enhance SMART Universities in Africa
National Quantum Initiative
Emerging Information Technologies I
Integrating Deep Learning with Cyber Forensics
Seidenberg’s Key Areas of Expertise
CS691-CS692-IT691 Capstone Projects Course
Computer Science Section
Cybersecurity Workforce Development for the Nation
Superminds by Thomas Malone, 2018
Chapter 8 Further Concerns in Developing ICT in Language Learning
Lifelong Learning.
Technology and the Future of Medicine Introduction to Course September 8, Kim Solez, M.D.
Wokshop SAIS 2018 Dr. Meg Murray Kennesaw state university
PUTTING PEOPLE AT THE CENTRE OF DIGITAL TRANSFORMATION
Nathaniel Rochester & J. Presper Eckert
Experience Teaching Quantum Computing
Doctor of Professional Studies Orientation Revisited
CS691-CS692-IT691 Capstone Projects Course
IT Applications with Emerging Techniques: Security Solutions
Emerging Information Technologies
© 2016 Global Market Insights, Inc. USA. All Rights Reserved AI Chipsets Market Size will witness a rapid growth to 2025.
Presentation transcript:

Emerging Information Technologies Charles C. Tappert and Tilak Agerwala Seidenberg School of CSIS

Agenda Teaching Emerging Information Technologies Technology Life Cycle – puts into context what we mean by an “emerging technology” Current Emerging Information Technologies Artificial Intelligence (AI) and related technologies Collective Human-Computer Intelligence Quantum Computing Cybersecurity and Biometrics Internet Platform Businesses Blockchain Conclusion – Teaching Emerging Information Technologies is an area rich with opportunity for growth

Teaching Emerging Information Technologies Two-semester course taught in Pace University’s Doctor of Professional Studies (DPS) in computing program for the last 20 years The DPS program provides IT professionals with a unique opportunity to pursue a doctoral degree and work full time It supports interdisciplinary study among the computing disciplines and applied research, providing a background highly valued by both academia and industry It is an innovative, research doctoral program structured to meet the needs of practicing computing professionals The students come to the university five weekends a semester to attend courses Additional work between meetings – readings, assignments, teamwork

Teaching Emerging Information Technologies The course sequence is taught in the 2nd year of the program 15-20 students take the course sequence each year and the students are divided into 4-5 person teams Assessment varies depending on the material covered but usually each team investigates and makes a presentation on an emerging IT topic of current interest, and writes a technical paper to be submitted to our internal computing conference As an executive program for working professionals, the underlying technical details of the emerging information technologies are not covered in class, but teams explore certain topics in greater detail. As these areas are explored, the focus is on potential dissertation and discussion material

Teaching Emerging Information Technologies Course sequence taught in 2nd year of the program The learning objectives of the course are: Learn the current important emerging and disruptive technologies and their application Understand their potential impact on science, engineering, business, and national security Learn to apply these technologies to their research and engineering projects Gain an awareness of the ethical issues that decision makers at all levels will face

Technology Life Cycle S Curve

Technology Life Cycle S Curve The maturity phase of the S-curve is steep People are adopting technologies at an unprecedented pace in the US Good examples are social media and smart phones It is difficult to predict the impact of technologies like computer vision and speech recognition that are at the cusp of a steep maturity curve In business, predicting the adoption rate accurately is the difference between success and failure  In an emerging technology course, instructors should be careful about claims and students made aware of this unpredictability through examples

Technology Life Cycle Kurzweil Kendall Invention Emergence Acceptance (established) Sublime (fully appreciated) Surplus Kurzweil 0. Precursor (dream/contemplation) Invention Development (emergence) Maturity (established) Pretenders (threat by upstart) Obsolescence (by new tech) Antiquity

Emerging Information Technologies Artificial Intelligence (AI) & related technologies Collective Human-Computer Intelligence Quantum Computing Cybersecurity and Biometrics Internet Platform Businesses Blockchain

Artificial Intelligence Artificial Intelligence (AI) refers to an artificial creation of human-like intelligence So far AIs have been in specific narrow areas In 1997 IBM’s Deep Blue beat the world’s best human chess player In 2011 IBM’s Watson beat the world’s best human jeopardy players In 2017 Google's AlphaGo beat the world's best human Go player The Google search engine quickly finds information Apple’s Siri and Amazon’s Alexa voice services answer questions There is currently a focus on Artificial General Intelligence (AGI), AIs that can perform any intellectual task that a human can

Artificial Intelligence Sub-areas overlap

Artificial Intelligence Deep Learning Deep learning is a machine learning method based on learning data representations, as opposed to task-specific algorithms Requires massive training data – big data

Artificial Intelligence Google’s DeepMind AlphaGo beats world’s best Go player

Artificial Intelligence The data scientist Venn diagram – big data analytics

AGI – The Singularity The hypothesis that the invention of artificial superintelligence will abruptly trigger runaway technological growth, resulting in unfathomable changes to human civilization According to this hypothesis, an upgradable intelligent agent (such as a computer running software-based artificial general intelligence) would enter a "runaway reaction" of self-improvement cycles, with each new and more intelligent generation appearing more and more rapidly, causing an intelligence explosion and resulting in a powerful superintelligence that would, qualitatively, far surpass all human intelligence. When? – 10% chance by 2022, 50% by 2040, 90% by 2075

Artificial Intelligence Problems Unintended damage from social media 2016 US presidential election and Brexit campaign Cambridge Analytica accessed Facebook user profiles to send targeted ads to influence the election and Brexit 2018 MIT study – Twitter fake news is shared 70% more often than factual information 2018 United Nations report accused Facebook of enabling religious persecution in Myanmar and Sri Lanka, many were killed 2019 book by Roger McNamee, Zucked, says Facebook creating a political and cultural crisis, and a serious danger to democracy

Collective Human-Computer Intelligence Superminds A supermind is a group of individuals acting together in ways that seem intelligent. Collective intelligence, a property of a “supermind”, is the result of groups of individuals acting together in ways that seem intelligent. There are two types of intelligence: specialized intelligence, the ability to achieve specific goals effectively in a given environment, and general intelligence, the ability to achieve a wide range of different goals effectively in different environments. The definition of general intelligence is similar to that used by psychologists and what is measured by intelligence tests Reference – Superminds by Thomas Malone, 2018

Quantum Computing Quantum computing is the use of quantum-mechanical phenomena such as superposition and entanglement to perform computation There is a quantum computing race among the tech giants Google, IBM, and Microsoft, including to a lesser extent Amazon and China’s Alibaba Governments, particularly America and China, are funding work in the area with the concern that quantum computers may soon crack current encryption methods, giving the country that gets there first a major advantage

Cybersecurity Cyber security, also called information technology security, concerns the technologies, processes, and practices designed to protect networks, devices, programs, and data from attack, damage, or unauthorized access Pace University is NSA and DHS designated National Center of Academic Excellence in Cyber Defense Education. Funded by NSA and NSF we conduct summer cybersecurity workshops for high school teachers and for high school students. Working with the Department of Defense we offer Information Assurance Scholarships. Working with the National Crime Agency, we conduct mobile application research. We also run a Computer Forensics Laboratory in NYC

Biometrics Biometrics refers to the measurement of human characteristics. Biometrics is an area of research for our doctoral students We focus on the not-well-studied biometrics because it is easier to do original research and publish results. Understandably, it is hard to compete with companies specializing in the established biometrics, such as fingerprint, face, iris, and voice. The keystroke biometric involves the authentication or recognition of a typist and Pace University currently has the world’s best keystroke biometric system In the 2016 major biometrics conference, Dr. John V. Monaco, a Pace PhD graduate working for Army Research Labs, overwhelmingly won the Keystroke Biometrics Ongoing Competition, his 15 entries outperformed all the entries from the three other competitors (KBOC, 2016).

Internet Platform Businesses A platform is a digital environment characterized by near-zero marginal cost of access, reproduction, and distribution Examples: Uber owns no vehicles Facebook creates no content Airbnb owns no real estate

Blockchain Blockchain technology has been known as the original digital currency platform since the development of Bitcoin, the first and the largest of the cryptocurrencies Blockchain was invented by a person (or group of people) using the name Satoshi Nakamoto in 2008 Blockchain is an open-source public ledger of all transactions among participating members with the potential to revolutionize business interactions

Blockchain 2018 Maersk and IBM Blockchain Shipping Solution

Conclusions Teaching emerging information technologies is an area rich with opportunity for growth We are currently proposing to the computing curriculum committee two new courses in this area The first is a rigorous computer science course for advanced masters and PhD students that covers the underlying theory of these technologies in detail and has midterm and final exams The second, at the undergraduate level, covers the highlights of the technologies and is designed to attract and retain undergraduates Because Pace University has a business school we are also proposing a course that focuses primarily on the business aspects of the emerging information technologies