ABSTRACT

This book explores quantum computing as a transformative technology and its applications in communications, cryptography, teleportation, IoT, AI, and blockchain, in addition to the revolutionary concept of quantum internet. It also explains the concept of dark, small, thick data, and clarifies what the concept of a data lake. Other exciting technologies like edge/fog computing, CDN, SDN, wearable technology and IoE topics are discussed in details in the book. Information security applications like zero trust model, zero-day vulnerability and heuristic analysis, and use of AI in cybersecurity are explored. Two of the most intriguing concepts in computing “affective computing” and “autonomic computing” are explained and simplified. The blockchain applications presented include blockchain and supply chain, crowdsourcing, cryptocurrency, and IoT. The book ends with a look at using technology to fight COVID-19 and future pandemics.

chapter |1 pages

Introduction

part 1|40 pages

Quantum Computing

chapter 1|3 pages

What is Quantum Computing?

chapter 2|3 pages

Quantum Cryptography

chapter 3|4 pages

Quantum Internet

chapter 4|3 pages

Quantum Teleportation

chapter 5|5 pages

Quantum Computing and IoT

chapter 7|5 pages

Quantum Computing and AI: A Mega-Buzzword

chapter 8|6 pages

Quantum Computing Trends

part 2|13 pages

Other Computing Technologies

chapter 9|3 pages

What is Deep Learning?

chapter 10|3 pages

Affective Computing

chapter 11|3 pages

Autonomic Computing

part 3|22 pages

Big Data, Dark Data, Thick Data, and Small Data

chapter 12|5 pages

Thick Data vs. Big Data

chapter 13|4 pages

Understanding Dark Data

chapter 15|6 pages

What is a Data Lake?

part 4|39 pages

Cloud Computing

chapter 16|5 pages

Edge Computing Paradigm

chapter 17|4 pages

The Internet of Everything

chapter 18|6 pages

Content Delivery Networks – CDNs

chapter 20|3 pages

What is Virtualization?

chapter 22|4 pages

Cloud-of-Clouds or (Intercloud)

chapter 23|5 pages

Myths and Facts About Cloud Computing

part 5|36 pages

Security

chapter 25|3 pages

The Zero Trust Model

chapter 26|3 pages

Cloud Computing Security

chapter 29|4 pages

Network Security Needs Big Data

part 6|15 pages

Blockchain

part 7|12 pages

IoT

chapter 33|4 pages

IoT and COVID-19

chapter 34|6 pages

IoT and 5G Convergence

part 8|14 pages

Wearable and Mobile Technology

part 9|19 pages

Future Trends in Technology

chapter 38|3 pages

The Metaverse: A Different Perspective

chapter 39|6 pages

The Metaverse: Myths and Facts