"In Vain have you acquired knowledge if you have not imparted it to others." Deuteronomy Rabbah
# Update Insights on October 2021
Services transformed how companies do business even after 2017. The rise of Web 2.0 was largely driven by three core layers of innovation: mobile, social and cloud - data centers located around the world. In the process of social connectedness - triggered by social media and mobile phones browser / app development - it moved from “attract” to “extract” their users;
consequently, Individuals or businesses began to suffer via higher fees or platform safety risk on Cloud types. Though as-a-service types are growing by the day, there are usually three models of cloud service to compare applications: Software as a Service (SaaS) vs (IaaS) Infrastructure as a Service vs (PaaS) Platform as a Service ---> but there are also other public or private services, such as Desktop as a service (DaaS) and Functions as a Service (Faas) or even XaaS (anything as a service —
that are all integrated with the on-premises IT infrastructure to create a cohesive ecosystem called the hybrid cloud of embedded systems ;
In Practice, The Web 3.0, rather than just searching for content based on keywords or numbers, can use AI to understand the semantics of the content on the web- to enable users to find, share and combine information more easily - " How? " - with the use of techs like Neuro-symbolic machine learning architecture , Artificial Intelligence Neural Network , Blockchain technology , 3D hyper Graphics, Virtual and Augmented Reality network, that allows machines to understand and interpret information. - Many of the recent revolutions in computer networking-including peer-to-peer file sharing, and media streaming-have taken place at the application layer.
Tokenization vs Encryption - are both used today as methods to secure/protect data stored in cloud services or applications, under different circumstances. The architecture of a blockchain system can be divided into six layers and work as independent systems : data layer, network layer ( virtualized nodes, that connect to the "net operating system"), consensus layer , incentive layer, contract layer, and application layer.
The Web 3.0 was built on three new layers of spatial technological innovation: edge computing, decentralized data networks and artificial intelligence
Large data centres supplemented by a multitude of powerful computing resources spread across phones, computers, appliances, sensors and vehicles marks a move towards trusting all constituents of a network implicitly, rather than needing to trust each individual explicitly
- submitted to compatible interconnectivity and powered-energized durability dependency ( system of objects network ) - More of it is associated to a world that is growing faster inequality, nationalism, mistrust in traditional government/banking institutions, global warming environment duo to faster trend consumption - such climate impacts of “proof-of-work” cryptocurrency mining, as currencies require miners to compete to validate transactions on their blockchains take power-hungry servers that create air pollution and carbon emissions.
While some are more useful in certain circumstances than others, the configuration, or topology of a network is key to determining its performance , functionality, connectivity, and security protection.
How does Information systems (IS) and information technology (IT) thrive in this fast-changing environment and create systems that withstand time as much as possible? --
There are several ways to arrange a network topology - architectural, political and logical - attempt to experiment with new economic models based on distributed networks, that reflect different pros & cons:
A centralized Single Point Of Failure ( SPOF - divided by 3 categories : Hardware failures, for example, server crashes, network failures, power failures, or disk drive crashes; Software failures, for example, Directory Server or Directory Proxy Server crashes; Database corruption; ) leads to a situation in which one malfunction of the server causes the whole system to shut down, leaving all clients lose their access to the app .
The scalability maintainance of the system is limited to hardware: you can increase the resources of this node by adding more RAM or hard drives (vertical scaling), but you can't add more nodes (horizontal scaling). On the other hand, the idea of Web3 Decentralization could enable a web system controlled by many entities ( local private Key ) without centralized corporation servers ( Hosted Keys )
, where every client would contribute to the web (like a peer-to-peer network). The system is still vulnerable to failures and attacks (account takeover, digital identity theft; apps that contain an overly aggressive monetization library collect extensive details from users’ devices; money launderin and hacking) , but the impact is proportional to the number of master nodes impacted. The integrity of the data, to a large extent, depend on the data management capability and functionality of the repository : nodes with more computational resources than the rest of the network , dominates the verification approval of transactions and controls the content of a blockchain - it can outpace all other nodes, manipulate the blockchain, insert fraudulent transactions, double-spend funds, or even steal asset from others.
It's also more scalable because you can add more nodes (scale horizontally and vertically ) that have the same control over the system ( BitTorrent as a peer-to-peer file sharing protocol).
Historically, socially and politically have been powerful in sustaining an ideology of the network market as a non-coercive coordination mechanism withi Decentralized finance. Governments and corporations are increasingly pursuing a reconstruction of money as a system of control and surveillance machine. However, markets require significant legal and ideological enforcement to function in practice, often with substantial systemic coercion.
A better understanding of the power and limitations of each network is necessary - it would allow for hybrid approaches and less on what it can achieve. Local vs Hosted Key aren't immune to malware, virus, worms and other attacks - There are Pros and Cons for scenarios where you need to upgrade - - nor distributed network / decentralisation dichotomy automatically yield an egalitarian, equitable or just social-economic-political resolution, in practice with ambitions for rearranging power dynamics.
The increasing threats to our information, users, and systems from cyber criminals, urges several training solutions to help organizations educate staff as an essential part of running a healthy organization.
Google realized the potential of a new search engine platform for the growing Internet and transfered it's virtual knowledge into hardware devices, developing a network with it's own operating system - Alongside smartphones and web services - it became a place where people could search the repository of human knowledge, communicate, perform work, consume media, and maneuver the endlessly; Google also began working on experimental hardware - Reshaping the world by linking, sorting and filtering data into a number of nearly incomprehensible size ;
Its name represents the infinite amount of information that it provides through different services. Meanwhile, algorithms using artificial intelligence are discovering unexpected tricks to solve problems that astonish their developers, raising concerns about our ability to control them. Unlike traditional computer programs, AIs are designed to explore, make decisions and develop novel approaches to tasks (It wouldn’t be so, without DeepMind) - So we began to Question : " How is it possible for an AI system to "outsmart" its human masters? " ---- Since information exchange is increasingly happening online and optimized through interconnected technologies , business prosper the trade-offs between the central principles and values - these were issues discussed at the GDG Devfest : It began focused on how Tech resources could be used for the benefit of society towards the improvement of collective sustainable ecosystems
- able to create systems that enforce and guarantee the rights that are necessary to maintain a free and open society.
Ecosystems can be symbiotic or parasitic : ecological relationship cocreate value, capable of shaping the market ; wherever economics serve the people and not otherwise - bridging the 'discursive gap' between policy text and practice, unleashes social innovation for societal benefit.
"How can technology and innovation become more inclusive?" - On the one hand, there is a wide gap between the pace of law and technology - on the other, there are also different types of Democracy and interpretation views.
When the physicist Stephen Hawking told an audience in Portugal during a talk at the Web Summit technology conference in Lisbon, Portugal, in which he said,
“computers can, in theory, emulate human intelligence, and exceed it.”
he was alerting that AI’s impact could be cataclysmic unless its rapid development is strictly and ethically controlled:
“Unless we learn how to prepare for, and avoid, the potential risks,” he
explained,
“AI could be the worst event in the history of our civilization.” Hawking explained that to avoid this potential reality, creators of AI need to “employ best practice and effective management.”
- "Is Your AI Ethical? " - Responsible A.I. Has a Bias Problem, and Only Humans Can Make It a Thing of the Past: As more company’s adopt A.I., more issues will surely come to the forefront.
Many business are already working toward making changes that will stop A.I. problems before they go any further. It relies on several key technologies, such as machine learning, natural language processing,
rule-based expert systems, neural networks, deep learning, physical robots, and robotic process automation. Some AI applications have moved beyond task automation but still fall well short of context awareness.
Responsible AI is defined as the integration of ethical and responsible use of AI into the strategic implementation and business planning process:
transparent and accountable AI solutions that create better service provision. Such solutions harness, deploy, evaluate and monitor AI machines, thus helping to maintain individual trust and minimize privacy invasion.
“As A.I. systems get more sophisticated and start to play a larger role in people’s lives, it’s imperative for business to develop and adopt clear principles that guide the people building, using and applying A.I.” ;
“We need to ensure systems working in high-stakes areas such as autonomous driving and health care will behave safely and in a way that reflects human values.”
The event held the debate on major technological forces, currently driving to digital disruption on the medium cloud, social Movements on mobile, Big Data, while IoT
are Transforming Physical Security in the Digital Age .
It´s not just Netflix or Facebook’s that feed drives views , privileging the stimulus–response loop recommendation system / optimizing for engagement as a key interface for content consumption.
Yet this same design has been criticized for leading users towards more extreme content,
other online platforms like YouTube, shape users’ world views considering new rules for the artificial intelligence programs, spreading malicious content.
---------> "What Are The Alternatives to the Danger of engagement-focused algorithms - that are Hacking the Brain with deep psychology stimulation inside preferences (neuromodulation "tuned" to activate) through “emotional surveillance technology”? :
In a world where Citizens are not products, clients or customers - rather reshape public human rights , and the Economy represents a tool we humans invented
- like democracy and politics - to help govern our relationships to adapt between each other - ourselves with nature and the world we live in.
If these tools aren't getting the outcomes that make us happy, safe, healthy, better educated and protecting / preparing our country for an increasingly uncertain future , as quality of life is stagnating; unfair , jobs and health education systems, regardless of how much money you have or where you live; while our environment is suffering, then it's time our economic tools and practices change to embrace transformative policies that allow the data analyze to improve future business decisions and reprioritise our investments.
This is where the rights approach to ethical decision making comes in, although fairness can be subject to different definitions across divergent languages, cultures and political systems : “stipulates that the best ethical action is that which protects the ethical rights of those who are affected by the action. It emphasizes the belief that all humans have a right to dignity” (Bonde and Firenze, A Framework for Ethical Decision Making).
Technologies appear to achieve the same goal: to make the city more efficient, connectivity, and social harmony from a “healthy body” into an “efficient machine - signaling technologies that transformed the city into a programmed and programmable entity, a machinery, whose behavior can be predicted, controlled and modulated according to the principles established by some well- intentioned technocrat
. However, the use of AI within many industries - retail to supply chain - from banking to finance, manufacturing to operations - security predictive artificial intelligence (AI) threat detection ( Identifies and blocks deep-learning based malware detection ) or deep learning acceleration built directly into the chip, Intel® hardware (-architecture, accelerators, memory, storage, software, security -) have all changed the way industries operate.
In social media environments - digital marketers, created a new way to connect and engage with the target audience or media marketing performance. In oposition, it raised ethical concerns and eventually carries the risk of attracting consumers’ distrust - extracting harmful marketing appeals, lack of transparency, information leakage and identity thef.
Developing AI solutions should consider human rights, fairness inclusion, employment and equality that can lead to potential gains in credibility for products and brands - ensure brand safety and protect consumers from fraud and the
dissemination of fake information, thus increasing customer trust towards brands. Recognizing the value of sensitive data and the harm that could be caused if certain data were to fall into the hands of the wrong parties, many governments and industries have established laws and compliance standards by which sensitive data must be Pseudonymized or Anonymized.
Europe is putting pressure on internet companies like Facebook and Google to safeguard against hate speech, trolling, cyber-bullying, fake news, sex traffickers online and terrorist activities online.
The GDPR (general data protection regulations act - on MAY 4 2020) passed by the parliament of the EU aims to safeguard the data privacy rights of its citizens.
While the act combined with the EU court’s “Right to be forgotten” judgment has set precedence in the way companies handle the data of their consumers.
Individuals now have the "right of data portability", the "right of data access" along with the "right to be forgotten" and can withdraw their consent whenever they want , as well as intrusive online brand presence.
" Social media marketing is in transition as AI and analytics have the potential to liberate the power of social media data and optimize the customer experience and journey. Widespread access to consumer -
generated information on social media, along with appropriate use of AI, have brought positive impacts to individuals, organisations, industries and society " (Cohen, 2018).
-- Considering the conscious principles of compromise, chain potentially relevant questions about General Data Protection Regulations ::
" How are organisations ensuring that the content posted by staff and consumers does not compromise the ethical principles of the brand - managing their social media presence in line with data protection, visual misinformation and privacy regulations ? ; What do you need to protect : on whatever occasion the adversary gains access to information that is sensitive to you? What are the risks of compromise and how to mitigate them ? What practices and mechanisms can enable firms to cultivate an ethical culture of AI use / How can digital marketing professionals ensure that they utilize AI to deliver value to the target customers with an ethical mindset? "
- --> The importance of getting interested in areas of privacy law, digital legislation and regulation of AI ethics, is recognizing digital literacy education that serves to take responsibility in civics and citizenship towards the environmental impacts of human-machine technology relationships, but also protect and question oneself values critically, bridging the discursive gap between policy text and practice into a re-formed conceptions of learning, creativity and identity in the new machine age.
Examples of Seeking capital - information, social, and cultural Individuals - are applied whenever companies join uses of artificial intelligence for recruitment or machine-learning systems like In the process of
seeking various types of capital through digital marketing platforms, consumers experience both positive (benefits) and negative (costs ) effects.
Also, Filtering Perception and Awareness ( munitions of the mind) - starting with stone monuments, coins, broadsheets, paintings and pamphlets, posters, radio, film, television, computers and satellite communications - have been present throughout history, as propaganda has had access to ever more complex and versatile media.
The velocity of information flow, volume of information shared, network clusters and cross-posts on different social media may be analyzed and compared for negative and positive electronic word-of-mouth.
These intra-interaction consequences such as consumers’ cognitive, emotional, and behavioral engagement with the brand thus trigger extra-interaction consequences of brand trust and attitude thus developing brand equity through the DCM strategy. While it articulates and builds the digitally enabled capabilities required to transform their linear supply chains into connected, intelligent, scalable, customizable, and nimble digital supply networks through Synchronized planning, Intelligent supply Smart operations Dynamic fulfillment
-- Digital development supply networks (Hyper-connectivity, Social networking, Cognitive computing where Matlab /excel and python can transform raw sound data into numeric data for machine learning - training accuracy for deep Learning Models -
"This means that if your data contains categorical data, you must encode it to numbers before you can fit and evaluate a model. The two most popular techniques are an integer encoding and a one hot encoding, although a newer technique called learned
embedding may provide a useful middle ground between these two methods."
Cloud computing combined with software-as-a-service (SaaS) delivery models, 3D printing. The use of customer analytics to make smarter business decisions that generate more loyal customers.
ensure how customers are having positive experiences with the company at all levels, including initial brand awareness and loyalty - crucial to the success of any business.
This often leads to confusion ( 'discursive gap' ) about when and how to deploy what information technology, to maximize value creation opportunities during stages of
the customer journey - usually questioning :
" What is the interplay between customer traits (e.g. innovativeness, brand involvement, technology readiness) and attributes of technological platforms in this process? What firm capabilities are required to capture, manage and exploit these innovation opportunities from customers to gain a deeper understanding of them?"
---- Since There are different Types of Data: Nominal, Ordinal, Discrete, Continuous, Interval and Ratio scale -- The Netflix’s dynamic optimizer example, attempts to improve the quality
of compressed video, but gathers data - initially from human viewers
- and uses it to train an algorithm to make future choices about video transmission, with the aim to deliver personalized and
targeted experiences to multiscreen audiences to keep them coming back -
. Netflix’s algorithm library is vast but much of the content is geographically restricted due to copyright agreements -
- the movies and TV shows are limited by the country. Whenever traveling abroad you may need a VPN to securely access your usual home streaming services. Because not all Netflix shows are available worldwide, many of its subscribers turn to VPNs that disguise their location and fool the streaming service into offering them a content catalog for a different region but Netflix algorithms ban most of them.
Not all VPNs work with Netflix. Due to rapid growth of the digital devices and their access to the Internet caused security threats to user data; while advance measures have been adapted by the attackers, security and privacy threats has become more and more sophisticated day by day,
increasing the demand for an updated technical Skills and highly secure medium to secure entities and their valuable information into the Internet.
"Netflix’s machine learning algorithms are driven by business needs."
|
|
 |
AI is progressing in Broadcast & Media, through some mainstream applications , to uncover patterns that aren’t always intuitive to human perception and able to change consumer behaviours - the two most viewer-centric applications would be on content discovery and content personalization :
Netflix’s new AI tweaks each scene individually to
make video look good even on slow internet - It also tracks the movies we watch, our searches, ratings, when we watch, where we watch, what devices we use, and more. In addition to machine data,
Netflix algorithms churn through massive amounts of movie data that is derived from large groups of trained movie taggers ; Google Is Using Artificial Intelligence to Make Sure YouTube Content Safer for Brands .
It uses Deep learning, to build artificial neural networks to mimic the way organic(living) brains sort or process information, applying AI in a number of areas.
|
Strategic information is essential to maintain competitiveness to build a proper aligned architecture with the business objectives that need to stay on top of utilization to determine whether there are wasted resources - a challenge, to figure out how to unify analytics across data science, engineering and the business ——— tapping into the benefits of machine learning and AI.
Data science aims to use the different data sources -The Internet of Events (IoE) is based on the Internet of Content (IoC.Turning Data into Information), theInternet of People (IoP Understanding and Influencing Human Behavior), the Internet of Things (IoT Gathering the Data) , and the Internet of Locations(IoL Turning Data into Information) toanswer questions grouped into the following four categories:
– Reporting: What happened?
– Diagnosis: Why did it happen?
– Prediction: What will happen?
– Recommendation: What is the best that can happen?
[ People who understand how to fish outanswers to important business questions from today’s tsunami of unstructuredinformation Identity the different stages :
– Exploration: just like we need to find oil, we need to locate relevant data before we can extract it.
– Extraction: after locating the data, we need to extract it.
– Transform: clean, filter, and aggregate data.
– Storage: the data needs to be stored and this may be challenging if it is huge.
– Transport: getting the data to the right person, organization or software tool.
– Usage: while driving a car one consumes oil. Similarly, providing analysisresults requires data. ]
--- Many data analysis, big data, and machine learning projects require scraping websites to gather the data for further analyze :
“A CDP is a technology that collects data in a governed way from sources like web, mobile, in store, call center, and IoT, unifies it to create accurate customer profiles in real time, then makes it accessible to and actionable for other tools and technology ---> How does “smart home” and its analysis data can improve our routine by automating tasks everyday ?”
---- The Python programming language is widely used in the data science community, and therefore has an ecosystem of modules and tools : Beautiful Soup module / Selenium / pandas - turn the unstructured data on the web into machine readable, structured data which is ready for analysis ----
While interactive and responsive chart types tools starting as xls / cvs Excel files , transfered to tableau software , range from simple bars and lines to arrow, range and scatter plots , help into creating data analysis, from locator maps to thematic choropleth & symbol maps.
Some good examples of data scrapping / web scraping are: News articles; Sports scores ; Weather forecasts; Stock prices; and Online retailer prices - act of pulling data directly from a website by parsing the HTML from the web page itself, and how we tie together automation and user interaction with web scraping that would take hours to copy manually.
"There are legal concerns regarding this, but most of the time, you just need to understand the terms and conditions of the website you’re scraping, and then you can use the data from the site."
Apps in Google Maps with AI-enable mapping search / scans road information, using algorithms to determine the optimal route to take on foot , a car, bike, bus or train. Google Maps
— especially Google Earth are low-level graphics API like WebGL interact with 3D content on a website and mobile devices using JavaScript binding to access the GPU. The WebGL API
— especially shader programming in the Graphics Library Shader Language (GLSL).
The participants introduced the Google App Engine as an alternative environment to deliver serverless platform for developing and hosting web applications at scale.
Designed to host applications using programming languages such as Java, Python, PHP, and Go - and written to serve many simultaneous users without
degrading performance. A suite of services for running scalable applications, performes large amounts of computational work, while it stores information and analyzes large amounts of data .
- This way, Google Cloud Platform offers several kinds of data storage you can use with an AppEngine app, including a relational database (Google Cloud SQL).
Most scalable apps use Google Cloud Datastore to host applications efficiently and effectively, at minimal cost.
With indexes and optimistic concurrency control, Cloud Datastore is designed for applications that need to read data quickly, ensure that the data it sees is in a consistent form, and scale the number of users and the size of the data automatically.
App Engine’s specific role on the platform is to host web applications and scale them automatically. Using the other services of the platform as needed, especially for data storage.
Each Google account can own or be a member of up to 25 Cloud projects. A Cloudproject has exactly one App Engine “app,”. A project includes all of the Cloud resources for a major application .
That said, having multiple projects for different purposes is often useful just to keepthings organized. Each project has its own billing configuration and list of contributors. A single company that produces multiple web products might have one projectper product.
If 25 projects per account is a burden in your case, Google offers more apps with theirpaid support programs.
You can create an app by using the free limits without setting up a billing account.
Free apps never incur charges, but are constrained by the free quotas. --- Understand data store models : Generally, it's wiser to start by considering which storage model is best suited for the project requirements: to choose from among SQL and NoSQL databases. Then consider a particular data store within that category, based on factors such as feature set, cost, and ease of management.
Polyglot persistence is used to describe solutions that use a mix of data store technologies. A datastore is the storage repository for virtual machines and their data. A datastore can be either a NetworkFile System (NFS) or Virtual Machine File System (VMFS).
Cisco UCS Director provides a task library tocreate datastores from physical storage. You can add, delete, and scale clusters.
Therefore, it's important to understand the main storage models and their tradeoffs.
Both connection strength andconnection trust are sometimes referred to as connection fairness quality, relevance and user orientation , solving problems in a timely manner . Even a small site with a few pages needs a logical Architecture / Clean and structured interface "code injections" will ensure it will work on all devices : Link Research Tools like
Meta titles and
descriptions that make them relevant and associate with great content; Implement third-party tracking software or plugin library - Google recognizes the problem with spam traffic and provides a webmastertool option in Google Analytics that allows you to block hits from known trafficbots / block a spam transfer ;
Google Trueview advertises on YouTube ; Using
custom audiences with intent and affinity , reselling to customers who have recently made a purchase so that they willkeep coming back for more;
Custom URLs and alt text - The most common cause of duplicate content issues is that multiple versionsof the same URL deliver the same content to search engine bots,
Using the NoIndex tag , in order tobetter optimize the crawling results, follows a code used on the page's head tag::
|| Meta Name = "Robots" Content = "noindex, follow" || ) or
funnel keyword suggestions that improve ranking / Remarketing target markets and optimize site; as much as social networkingintegration
links or backlink / Discovering the common backlinks of competitors ( Brand Search Terms) - will likely find that they have somebacklinks in common that you don't already have ;
Site Booster displays the site on Google Maps, as it shows what it is worth browsing;
Search engines penalize slow-loading pages web designs and love sitemaps, so Pingdom; YSlow and WebPageTest tools, measure the speedperformance of the website . Sitemaps help searchengines understand the structure of your site and identify the links to crawl.
The integration of Google Analytics and Search Console is as easy asentering a tracking code. Likewise, direct products can show up in a specific Google search, such as:4k LED TV search ; YouTube, Gmail and thousands of partner sites ; If you search for local businesses on Google or even directly on Google Maps, you may also see ads.
|
|
 |
There are dozens of reporting features and metrics to review web services.
With Search Console you can monitor, maintain, and troubleshoot your presence in Google’s Search results and be aware of any warnings or issues that come directly from Google.
On a technical level, Google Analytics works through JavaScript tags that run in your website’s source code and is usually operated with Google Tag Manager - – these JavaScript tags running Google Analytics set cookies on their browsers that harvest personal and sometimes sensitive data from them in return.
The question arises : " Is Google Analytics GDPR compliant to use? How do you balance Google Analytics, cookies and end-user consent on your website?" Google Tag Manager is a hugely popular tool for websites of any size and shape. It organizes all third-party tags on your website (like Google Analytics or Facebook pixels), and it also controls when these are triggered. Important for website owners to know, is that almost all of such “third party tags” will set cookies that, according to EU law (the GDPR), fall into categories that require the explicit prior consent of your users.
In other words, tags are what happens, while triggers are when what happens. Inceptionv3 is a convolutional neural network for assisting in image analysis and object detection, and got its start as a module for
Googlenet — especially shader programming in the Graphics Library Shader Language (GLSL).
RESEARCH COLLECTION | 2020 : Connect Google Analytics to Google Data Studio |
Besides the platform alternatives such as
Supabase ;
Heroku ;
Netlify ;
Pythonanywhere ;
AWS Amplify ;
Back4app ;
Parse ;
Kinvey ;
Backendless - Google’s looking to play a bigger role in fueling the burgeoning creator economy with a new platform designed to help creators maximize their efforts.
- Some Key Features of
Firebase as a platform - Backend-as-a-Service (Baas) provided by Google integrates open-source tools in real-time that enable the developers to test Machine Learning components,
launch, analyze and distribute apps or database storage for various platforms such as IoT, iOS, web, and Android without hassle-free scalability - They accelerate app development and scale them easily without investing in infrastructure :
offering some perspectives on Baas ( backend as a service) . It takes care of cloud infrastructure and all the backend needs that lets you develop and deploy faster products, such as Realtime Database, Cloud Firestore, and Authentication.
It also allows hosting and offers API's for machine learning tasks like text recognition, image labelling and so much more.
Using a cloud-based system enables access on any device anywhere, avoids wasting resources on creating materials that already exist , accelerates progress and prevents reoccurring problems : reliable base search function with improved experience , reduces time searching to combat information gaps; easy to manage, it allows effective storage, and simplifies distribution in less time sorting and sifting through information, can improve the usability of your resources increases productivity as employees can focus on the task at hand.When files are stored on different systems, you may not notice when they are out-of-date.
(
Google HTML service and submit data sheets) Nowadays, there are tools like
PlugXR - A Cloud-based Augmented Reality platform without the need of code , that allows developers to create their own face filters, for example the Firebase ML Kit.
With Firebase - an app dev platform built on the Google Cloud Platform providing services and cross-platform SDKs -
it is possible to detect the positions of eyes, mouth, nose, and contours. Such data can then be used to place a 3D mesh with proper graphics over the camera image.
AR can be useful for training, collaboration, and visualization - updates to the device’s operating system and SDK , but haven't appealled consumers, due to the high price and relative infancy of the still-bulky technology.
IoT and M2M ( Machine-to-Machine ) Data Analysis , feature extraction, stratified sampling, data integration, normalization , web scraping, pattern recognition - through open source software environments, such as SQLite and R - are system service system that concurrently satisfy three requirements: massive data analysis, real-time data analysis, and deep data analysis for extract challenges of the future.
As well as they Impulse tools to interact with emerging Tecnologies , including SceneKit, Firebase ML Kit, ARCore, RTDB
. Python Libraries are a collection of features that remove any need for codes to be written from scratch - essential in creating machine learning, data science, data visualization, image and data processing applications and more ; deep learning algorithms and techniques for performing smart web automation; Integrate neural network architectures to create powerful full-stack web applications . Additionally, some technologies aren’t compatible with each other, so it's important to check the existing systems.
In response to
predictive analitics - including big data, data mining, statistical modeling, machine learning and assorted mathematical processes. Organizations use predictive analytics to sift through current and historical data to detect trends and forecast events and conditions that should occur at a specific time, based on supplied parameters - to find and exploit patterns contained within data in order to detect risks and opportunities -
- new tools have emerged, such as # Anonymized data # can provide you with useful insights - into user behavior. GDPR restrictions on the collection and use of personal data mean that many analytics users are asking themselves: " Can I do useful analytics without personal data? - Analytics without personal data – a long history and a promising future - "
There are a great set of tools that integrate artificial intelligence into industrial applications. A good example is TensorFlow,a framework for developing applications based on neural networks deep, which allows equipping systems with the ability to recognize objects and sounds and to predict the occurrence of events in the environment. In 2015, the open sourced
TensorFlow machine learning and deep learning-focused programming platform , allowed anyone to develop neural
network-based solutions using the same technology they use - were the servers can be segmented and analyzed for content and context and Finding new ways to reduce the latency (
Google Video Intelligence Analyzes Images in Video )
;
AI disruption in TV and Broadcasting revolutionized the Cloud opening up video analytics to new audiences, such as
IBM Research Takes Watson to Hollywood with the First “Cognitive Movie Trailer”
;
Content Discovery and Personalization content , based on user information, preferences, watch history, and context - viewing recommendations based on previously viewed or searched videos;
Ad Targeting / Filtering - uses AI to ensure if content is "safe" and not offensive / filters ads and protect the brands of advertisers / sorts ad priorities or themes / Geo-targeting is
used as a way to restrict ad audience to a certain geographic area or regionally direct message to maximize ad efficacy by location ( zipcode / city or country). ;
Content Clustering and Metadata Building - recognizes images from live or recorded videos can lead to metadata tags or descriptive information of a movie or a program beyond its usual essential attributes (genre, idioms, credit ) : building
Datasets from image recognition , cluster content by context that result from advances in learning algorithms (such as deep learning), computer hardware, and less-intuitively, the availability of
high-quality training datasets ;
Voice-assisted Content Search & Playback - personal assistants like Siri and Alexa ;
Content Curation through Audience or Scene Recognition / computer vision - through the use of the camera , determine content according to pre-built assumptions or carefully analyzed audience data ;
Cognitive analysis - that looks deeply into individual viewer consumption habits or even emotions, and then predict intent, tailor content selection, or even produce unique real-time
content ;
Network Optimization - analyzes available bandwidth and delivering the best balance between video quality and streaming bandwidth ;
Time optimization of codecs, network paths and data transfers, all to minimize the amount of data and time to reach a viewer while ensuring optimum video quality .
So has The
“internet of things” (IoT) , connected cars and
wearable computing (Fitbit, Samsung Gear , Garmin) increased the level of interest and the volume / variety of data -
about what is happening across vast and complex human and machine/device networks - such as wearables ( internet-connected fabrics) , eyewear and smartwatch projects ; pair of sunglasses
that projects holographic icons; smartwatch that has a digital screen but analog hands; temporary tattoo that, when applied to your skin, transforms your body into a living touchpad (concept is similar to braille); virtual reality controller that lets you pick up objects in digital worlds and feel their weight as you swing them .
In the long run, Wearable Computing - technology products ranging home automation , such as smart watches, machinery-gadget sensors, smart shirts, belts, contact lenses, and more - is the paradigm that entails lightweight, miniature computers that are worn much like clothing such that the user and the computer can interact at any time,
as needed.
— There has been a surge of interest in self-driving cars due to breakthroughs of deep learning - deep neural networks that are trained to perform tasks that typically require human intervention.
CNN’s apply
models to identify patterns and features in images, making them useful in the field of Computer Vision -
such as image classification or image captioning by a simulated car in order to drive the car autonomously where CNN learns features from the images and generates steering predictions allowing the car to drive without a human .
Cars can be connected as well it provides some communication interface and a browser that can access other resources.
The same principle can be applied to
smart watches and other interactive devices that adhere to the same model - connectivity protocol - an interface that allow to interact / communicate with the other devices in the same environment,
as they share storage available for storing and retrieving information.
----> Once computers understand space, spatial computing is the shift of computing from 2 dimensions to 3 dimensions - placing digital objects and information in it view through a transparent digital screen - augmented by 5G data speeds,
open data formats (open-source software) with the expansion of artificial intelligence (AI), “smart” Web integrated around peer-to-peer (P2P) technologies and the shift to Web 3.0 socioeconomic operating system — enables a visually dynamic Web for ecommerce and a virtual economy.
___Programs are expressed in languages which can be understood by people easily. At the same time, the language will be common to different computer architectures, translated to machine code. Generally speaking: Computer technology and programming languages are different things : ( " cyber system hardware" ≠ “algorithms + data structures = programs”) __ :
The industry does not move that fast, trends make it appear that way by wrapping illusions over perceptions , but generally, not much in programming changed
- From that perspective, alongside compilers, libraries, specifications, languages, and state machines - in analgorithmic lens - it shapes the way in which we might inquire into contemporary digital culture.
There might be awfull lot of languages, though the concepts are pretty similar : # Windows 10 Universal? It's C# and XAML, which has been around for ages. # Cloud services?
It's just another name for SOA (Service Oriented Architecture) or SaaS (Software as a Service) and been around for literally decades. # Android? It's Linux and Java, Linux is a copy of something decades old, and Java has been around forever too.
There are fundamental differences between software engineering (lifecycle from code development to testing to deprecation) and programming or “computer science” to Effectively manage your codebase and efficiently respond to change and make optimal software decisions by keeping time and scale in mind.
The actual art of programming revolves around understanding computer architectures and operating systems, writing algorithms managing different data structures, optimizing for performance and stability - Many experienced programmers try to bend a language to fit patterns they learned from other languages, and never discover features outside of their experience.
As long as you’ve spent enough time building production code, in at least a couple different programming languages, switching to a new one becomes very common.
All the top software companies, Microsoft, Google, Facebook, etc., have mature codebases measured in millions of lines of code
A new employee, no matter how experienced, will take a while to get familiar enough with the codebase to be productive. They will take even longer to become an expert - a significant pressure to learn the right stuff and identify what that is.
FACEBOOK New Technologies, | 2021 : Investing in European Talent to Help Build the Metaverse
NVIDIA Unveil New Technologies, | 2021 : "GTC is a great opportunity for developers and business leaders to learn the latest advances in AI, accelerated computing and computer graphics from the world’s top innovators, scientists and researchers,” said Greg Estes, vice president of Developer Programs at NVIDIA."
RESEARCH COLLECTION | 2020 : What it’s like to be an Apple WWDC student scholar and why you should apply this year.
REPOSITORY OF SCIENTIFIC RESEARCH PAPERS | 2020: Google Colaboratory.
ACADEMIA | 2020: Microsoft Academic knows journal titles, conference names, and many research topics.
ACADEMIA | 2020: Cursos e certificações Microsoft Academiy .
CYBERSECURITY | 2021: What Cyber Security Certifications Should You Train For?
This means that new players have inserted themselves into the value chain, while hundred billion lines of new software code are added to the existing digital infrastructure of our world.
So, I also personally think that a hybrid solution is an optimal answer in many software-related cases as the web development industry is currently going into a hybrid phase as well, with Server-Side Rendering (SSR) and Incremental Static Generation (ISG) data fetching options ---"
They solve the problem with pre-rendering the most critical software parts on the server and everything that needs to be asynchronous will be put together in the browser ”(
Szczeciński, B. (2018) 'What's Server Facet Rendering and do I would like it? )
--- .
There is abundance of data in the new digital age, and can be harnessed to gather insights through application of data analytics.
In order to provide oversight and governance over the collection, usage and management of data, it's also necessary to understand where the data is coming from and whether it was properly permissioned.
Systems aren't always identical because clients present different demands over time —whether it's storage, CPU, or database—and these demands change over the lifecycle of the customer’s needs. So systems that can't evolve and scale don't keep up to the speed of technology changes and get stuck to technical difficulties quite often.
More than ever, we are an interconnected world where the actions of one person or device in a social or physical network can have a “butterfly
effect”on all of the people and devices across that Network and On Languages of Interaction ( Physical manipulation; Input using code; Mouse manipulation; Presence, location, and image; Haptic interfaces
and multitouch; Gesture; Voice and speech recognition ).
Alongside a higher cost technology or cryptographic schemes even in face of quantum computing - data infrastructure issues on How
lattice-based cryptographic algorithms can be scaled to protect more types of electronic information - ; also, the process of creating games, environments / ads were considered to be
essential scalable, captivating and engaged into clean design , to avoid user experience demage and VR security brand . Currently, the high-end tools that exist for XR
creation are complicated and difficult to learn; those without a coding background have more difficult in implementation - the reason why this has added market pressure towards 360 video interactive
content, when the only way to disengage with the ad is to remove the headset. “AR” was coined by Boeing researcher, Tim Caudell in 1990 and comes here in advantage to VR while XR becomes the solution
in between - new value in terms of functionality, reliability, convenience or price ; Imagining ways of New and exciting medium to create unique 3D apps and experiences - shaping the future of art
, it enables new applications on Smartphones, Smart Glasses, City-wide Outdoor localization and tracking : like accurate AR way-finding, visualizing urban points-of-interest, social AR, architecture
pre-visualization and historical restoration.
The design and analysis of geometric algorithms has seen remarkable growth in recent years, due to their application in, for example, computer vision, graphics, virtual reality, medical imaging and CAD.
Onwards — The next era of spatial computing and how Google allows us to experience 3D & augmented reality in Search :
the user experience is still a primary obstacle for AR mass adoption and the biggest obstacle for VR mass adoption too ; as it is gradually gaining influence on automobile industry - In the future , people will have access to information via glasses, lenses or other mobile devices ; autonomous vehicles, drones and robots move freely environments - understanding where they are; where they are going and what is around them -.
By solving the problem of inaccurate positioning from GPS to camera-enabled Scape’s VPS long term vision, many of the applications once imagined by
AR developers, are now a reality and It's expected to AR revenues surpass VR revenues by 2020 - Knowadays , almost everyone owns a cellphone. Plus, mobile phones have upgraded to the required hardware
for AR technology including CPU, sensors, and GPU - enabling infrastructure for a vast array of new spatial computing services , accelerated by the imminent arrival of widespread 5G networking and edge
compute, delivering massive bandwidth at extremely low latency
.
RESEARCH COLLECTION | 2020 - Web VR Experiments with Google
LEARNED LESSONS | 2020: Estruturas WebXR
TOOLKIT AR | 2020: New Spark AR Studio Integrations Arrive in Blender/ Creators can now build 3D assets and AR experiences more efficiently.
"Customer experience with Digital Content refers to a customer’s perception of their interactive and integrative participation with a brand’s content in any digital media. " - (Judy & Bather, 2019) -
In addition to adding Augmented Reality to the product value, Microsoft has been offering MSOffice applications for its HoloLens device and showing what future offices can look
like without screens and hardware. This could also point to new virtual competitors. AR apps can serve as a further direct-to-consumer channel.
Some unanswered questions that are both theoretically and managerially relevant are: " How does it impact consumer-brand relationships, for instance, if consumers 3D-scan branded products and replicate them as holograms?
How do consumers interact with virtual products in their perceived real world, compared to real products - what advantages and disadvantages do consumers see ? Which dynamic capabilities drive the success of Augmented Reality Marketing? Which competencies do Augmented Reality marketers need? How should these requirements be integrated into digital
marketing curricula to lead for better decisions and lower return rates? How should Augmented Reality Marketing be organized and implemented - How does good content marketing or good storytelling - inspirational user experiences - are organized? What drives the adoption of Augmented Reality?
What advantages and disadvantages do consumers see in virtual versus real products ? How can the success of Augmented Reality Marketing be measured?"
_______________ At the End of the Event I suggested Filipe Barroso
( responsible for organizing the
Lisbon Google Developer Groups Event ) that it would be invaluable to get in touch with programming schools like
ETIC that we all could engage into future
educational workshops together - intersecting areas and interact with the events. For a person who is learning it was important to interconnect: students expressed opened to initiatives that included group
and teamwork contexts - sharing knowledge and opportunities to grow - .

When I spoke to Filipe Barroso, I felt it would be a good initiative for all - to generate revenue and bridging the gap between knowledge seeking and sharing an opportunity for self-discovery and personal development.
Eventually, other initiatives starting with this GOOGLE event spread on the same direction , so web development / media-programming colleagues, brought up a bridge together event # Code in the Dark
- merging different courses in a workshop google event. I felt willing, because it taught me more than
programming skills that any good proggeammer strives, such as coding(20%) ; algorithmic thinking (30%) ; computer science and software engineering concepts (25%) ; languages and software technologies (25%) :
The importance of these Soft skills and proactive initiatives also from others, which I learnt from during this process, was
for me more about "Sharing" in "Effective Interpersonal Relationships": aware that all social movements, are about others, how to learn with each other as a team; co-working towards mutual success and not towards an individual
behaviour. This is what I understand to be the qualities of teamwork and
#the road to create value. When studying programming, soft skills come at use in a practical way - job collective satisfaction beyond a collective co-working perspective range.

Intersecting Personal Experiences - I got to the conclusion that Technology itself continues to evolve creating performance and productivity opportunities for business and even reshape the way we imagine social network as it interacts with the future.
Tech and IT Organizations suffer from constant changes due to hardware evolution - this pushes competition between industry sectors -
What elements are needed in the Digital supply network transformation methodology:
• What does digital supply chain look like ( vision )?
• What is the implementation roadmap - what are the value drivers and dependencies ?
• What is the project plan for piloting a digital thread and cost ( ROI opportunities ) ?
• How long will it take to scale up, reconfigure the existing supply chain processes , Prioritization that mitigate risks?~ That's why I understand the
importance of educational skill upgrades inside tech associations and organizations [ Professional development , through courses or training ]. Skill upgrade should not be ignored if it really wants to make business-market differences.
That is also the main fact why I have pursued knowledge in different Educational systems. In a world of constant transformation,
it is important to stay up to date and try different approaches. You get to a point realizing solution's that disable our ability to grow and innovate will not work to survive.
Even Though, I witnessed a kind of resistance to
CPD - Continuing Professional Development (CPD) – Continuing Education – Some companies feel threatened or create resistence ( encounter reluctance) - having hard time in understanding on how corrosive This attitude could turn
out to be for every coworkers productivity and creativity: it only retrogrades growth and creates miss understandings or internal conflicts that could be easily solved with Education and shared perspectives.
Training can also become a means of altering behavior, not in a punitive way but so that gaps inorganizational performance can be closed. Redifining the value is not just about profit maximization issues, but sustainable growth towards the measure of value ( Value Creation vs. Revenue Extraction) . The concept of training has many more aspects than just learning a skill:
: Productivity; Quality; Empowerment of intellectual property; Alignment & Teamwork; Liability; Risk reduction; Professional development that supports employees in gaining a wider perspective in theirjobs and in their
personal lives ; evaluates what level of performance will be required to assist the organization inachieving its goals; Establishes a strategy to meet current and future needs; Determines where gaps currently exist
between the existing performance andthe required performance - Preparing for Change through Knowledge Sharing; Business Conduct and Social Responsibility.
The Reduced cost comes with improve quality , for example,
reducing the amount of rework and returns. Similarly, we
reduce cost when we raise productivity or decrease lost time due to accidents.
Just like The best stories have interesting characters that have been put into a difficult situation, I learned with past projects that the path to ensure growth and create value in a business ecosystem is a process that integrates consistent elements - such as , resilient; security / compliance; interoperabile ; flexible scaling : combining with the right tools for the team to grow from a human and professional point of view.
Important tools, that allow development teams to deliver software or other projects at an ever-increasing pace without compromising quality , because sometimes it can be easy to lose oneself in overwhelming routine . Cultivating a Knowledge-Sharing Culture- properly documenting failures also makes it easier for other people (present and future) to know what happened and avoid repeating history - To avoid erasing tracks instead, light them up! Informed individuals are less likely to panic as they understand what’s going on and how to respond appropriately. They’re more likely to prepare and prevent disasters when they understand the real risks that they
might face
— to improve your security wisely, to maximize the impact, and the metrics you’ll need to make decisions, set goals and track progress. Software designers, developers, and architects are constantly confronted
with the same confounding problem: how to design software that is both flexible and resilient amid change. The more connected, proactive or knowledge sharing, higher the quality exchange between employees and more productive
/ healthy workplaces - .
Why is it so important being organized and have a balanced legal / liable business plan ? Those who own "brick-and-mortar " operations, must understand liability and how it affects them.
Unfortunately, accidents happen all the time. Understanding liability, conducting trainings, getting proper coverage, and other steps can act as a shield against financial claims. As you work to make your business safe
and prevent accidents. If a
client is unhappy with deliverables, timelines, or even
the outcome of the project, he could file a lawsuit based on your management service agreement / contract . Upgrade, migrating knowledge ecosystems will deliver reliable, legal, faster performance to all
staff.
It's also important to put inside the clients skin: Consistency determines rather they decide to stay with contract or walk away towards other services.
"If you're facing error, call it version 1.0 and keep trying! "
When I look back to this event, even though I wasn't totally prepared to understand some concepts, it did make sense later. This is the process of knowledge: to realize that even if something does
not make sense back then , it will eventually connect in the Future.
There are alternative ways to connect - You don’t have to follow traditional advice or go to events to successfully build and maintain a valuable network. Most are mixing bowls for professionals who are there for different reasons. While attending , I realized how Millennium Professionals don't like the idea of meetings, but contradictorily waste amounts of time on more expensive events without a good return on their investment of time and money.
An activity should be meant to increase the value of your network and/or the value you contribute to it. Proper networking is about building new relationships and deepening your existing ones.
LEARNED LESSONS | 2020: Build useful apps, internal tools, simplified workflows, or brilliant bots for just your team or Slack's millions of users.
Communication in teams is equivalent to the neural network of the human body. Technology that supports collective interaction include online discussion boards and mailing list. So even after the google event, I opened a channel online - on our Computer Science
SLACK
called "eventos_tech" - the virtual space, where I shared all that I learnt in group, as an incentive to my colleagues sensibilize towards the importance of exchanging knowledge and being there to help the other - the notion of shared workshops and events on tech , creates or motivates
towards other bigger challenges. It was also important to understand how Thee lack of an adequate project scope to contextualize the project so that it does not become dispersed or mispercept by teamwork members
and even future clients; underestimating the time and effort required to deliver a task can turn a challenging project into a hellish project. Without clarity and vision we’re unfocused, going nowhere fast.
Another thing to consider is that the way people learn and digest information is much different from what it was in the past: Every person will have his/her own way to learn - their own learning process : a time to absorb information and a time to be able to learn how to decode , inter-connect and re-create ideas - respecting
this is understanding oneself - to be aligned with your consciousness . Change is about alowing transformation of ideas. Reenforce knowledge , comes with consistently learning - Go back to the start - relearn
and try it out - implement data , sharing experiences ; teaching others after learning it, in a clearer way.
What lacks proper hierarchical structure needed for learning a subject matter thoroughly, because this could lead to your being stuck quite frequently.
In short, you will not have the know-how—the comprehensive knowledge—you need to use that language as a tool—. Workshops and interactive educational programs help people understand themselves ; be in contact
with the market; sharing and gripping the right knowledge : It’s these type of events that lead to opportunity. My advice is to Get involved in new activities; lead with curiosity ; Talk to new people ; Explore new subjects that you’ve wanted to knowmore about;
Think about small experiments thatyou can run in order to learn and create opportunities to thrive both personally and professionally.
In the end , It is up to you to make the world a better place - rediscover views from an intersectional lens. It takes a proactive plan to bring your views to light.
Surround yourself with people who value the perspectives and insights you have to offer as a multicultural professional.
All too often, we ignore or actively change who we are in order to feel accepted into a group, a team or organization and we lose ourselves in the process; who truly see yourpotential and whose opinion you value to form a success team. The best way to move from a state of powerlessness to empowerment isto have a clear understanding of what you want personally and professionally, how it impacts your life, and what you need to do to attain it. Plans don't have to be elaborate or complicated.
"What is one thing you want to change in your life? What do you need to do to get there?" - Once you get clear on what you want to transform,you find the psychological ease that comes with feeling aligned with your goals and ideals ; personal growth and development is an automatic key to making a difference in life : you can make conscious decisions to either continue along or use these current to move in a different direction.
Without the conversion of putting theory into practice, time is lost, resources are wasted, and lessons are not learned. It's becoming harder to retain knowledge without it being applied regularly.
Developers need "soft skills" like the ability to learn new technologies, communicate clearly with management and consulting clients, negotiate a fair hourly rate, and unite teammates and coworkers - nurturing gratitude - in working toward a common goal. Throughout the years, I learned not to fear my own opinion, even if others do not understand / disagree
decision making. I don't fear Failure and rather prefer to start from the beginning or unveil "key" strategies, because
I believe in the capacity to overcome obstacles. There's nothing wrong in finding a better version of oneself . Acknowledging your strengths and weaknesses rather apply the learnings from each experiment in future efforts. Error can
teach us more about a problem that we might not have seen before and prepare to identify risks : by identifying / understanding where the project fails upgrades the impact of effective risk management (Key To
Innovation) on project success. This doesn't mean I keep repeating the same failures all over again, but instead, commit myself to encounter knew challenging ones , so I can learn more throughout the process
of measuring / tracking sequences of keystrokes, that reconfigure awareness networks.