INNER SANCTUM VECTORN360™|EXPONENTIAL

Page 1

INNER SANCTUM

N360 ©™ VECTOR LIBRARY OF CONGRESS ISSN 2833 0455

EXPONENTIALTECHNOLOGY

Where Price Performance makes it possible to solve today’s business problems in ways that were not previously possible. Exponential Technologies include but are not limited to: § Artificial Intelligence § Augmented and Virtual Reality § Robotics § Quantum Technology § Machine Learning § Autonomous Vehicles § the IoT § Blockchain We are living in a Century of No Return. Computers process information much faster than a Human Brain. We are actually "brain limited" in our capacity to keep up with the complexities and the application of technology. But, our lack of ability will not stop the advancement of exponential technologies. 3

As the world becomes interconnected by information it becomes easier for technology to span the world at pace. We do not know how it will unfold, but the response to it must be integrated and comprehensive. Stakeholders to include the global polity, public and private sectors, governments, academia and civil society.

Technology is not neutral neither is it applied evenly”.

Free market economies help drive globalization. Globalization helps kindle the Exponential Age and Free market capitalism has unleased the power of exponentially.

In recent years these technologies have been developing at unprecedented rates as they

improve, they combine and recombine, creating more and more possibilities.

Exponential Technology is the type of technology that grows at an exponential rate. It does this through conversion which is one technology interacting with another technology.

ARTIFICIAL INTELLIGENCE

Programs with the ability to learn and reason like humans

MACHINE LEARNING

Algorithms with the ability to learn without being explicitly programed

DEEP LEARNING

A type of machine learning based on artificial neural networks to which multiple layers of processing are used to extract progressively higher level features from data

MACHINE LEARNING SUPERVISED LEARNING UNSUPERVISED LEARNING REINFORCEMENT LEARNING 9
A basic reason they become exponential is that costs come down creating more opportunities for more growth.
A disruption occurs when we are unable to prepare for the changes that are occurring.
“ Indeed disruption, adaptability and survival is the Game Plan for the Future”.
“ The
difficulty is not so much in Developing new ideas as in Escaping from old ones.”
-
John Maynard Keyes -
11

BOYS BIG BRING IN THE

TECHNOLOGY OF

Machine Learning with Python

Training Output

INPUT PAST DATA

Learn from data

Machine learning Algorithm New data

Humans learn from their experiences with machines or computers which work on our instructions. Machine Learning is a subset of artificial intelligence that is mainly concerned with the development of algorithms that allow a computer to learn from the data and past experiences on their own without being explicitly programmed.

Machine learning’s “right” answers are usually in the eye of the beholder, so a system that is designed for one purpose may not work for a different purpose.

Building Logical Models

No test checks the stupidity of subjective definitions and objectives, so choose your project leader wisely.

Machine learning utilizes algorithms that learn from historical data. The more we will provide the information, the higher will be the performance. A machine will learn if it can gain more data. A Machine Learning system learns from historical data, builds the prediction models, and whenever it receives new data, predicts the output for it.

CLASSIFICATION OF MACHINE LEARNING

Supervised Learning

Reinforcement Learning

Unsupervised Learning

15
Every day Machine Learning becomes more and more of a necessity in that it is capable of doing tasks too large and complex for a person to implement directly. But it goes deeper than that, machine learning can consist of three variations: § Supervised learning § Unsupervised learning § Reinforcement learning. § Supervised learning is a type of machine learning method in which we provide sample labeled data to the machine learning system in order to train it, and on that basis, it predicts the output. § Unsupervised learning is a learning method in which a machine learns without any supervision. § Reinforcement learning. is a feedback-based learning method, in which a learning agent gets a reward for each right action and gets a penalty for each wrong action.

Quantum computing is an area of computing focused on developing computer technology based on the principles of quantum theory.

Quantum technology is a place where everything goes awry, “universal” laws don’t apply and nothing makes sense. Quantum computing offers exponentially faster speeds than classical computing. The most exciting thing about a quantum enhanced world, however, is that no one yet knows what it will bring.

The building of quantum computers works on three underlying principles. The FIRST is quantum theory;

the SECOND is that of superposition. This could mean that the quantum bit, also known as the qubit, can be a one or a zero, or pretty much anything in between. For example, if you have a coin you have heads or tails, it’s binary, it is either a head or a tail but if you spin that coin, then it can be both heads and tails at the same time. ENTANGLEMENT is the third one. With entanglement, if you have two coins that are spinning, the result of one impacts and changes the result of the other. In a nutshell entanglement, superposition, and quantum theory are the foundation of quantum computing.

2 13
Quantum Computation (BOP) Classical Algorithm (BPP) Classical ML Algorithm w/data 17
Blockchain is not complicated. It is a specific type of Database and like all databases it is a collection of information electronically stored on a Computer System. The major difference in Blockchain is that it stores Data in Blocks. While all Blockchains are databases Not all databases are Blockchains.

In Blockchain new data enters into a fresh block. Once filled the block is chained into the previous Block. This has the impact of blocks which are chronologically chained together.

You now have an irreversible timeline of data with each block in the chain having the exact timestamp when it was added to the system.

Technology perpetuates issues of security and trust.

Data is always added to the "END” of the Blockchain which compounds the security of Blockchain Technology.

Blocks are stored Linearly and chronologically.

create digital information into

string of letters and

which

Blockchain
FIRST NEW New
Functions
a
numbers
become MATH HASH CODES
ANY changed or edited information changes the HASH CODE WITH each block containing a HASH unique to itself along with the HASH of the block before it and the TIMESTAMP, it becomes difficult to go back and change data. DIFFICULT BUT NOT IMPOSSIBLE. THE goal of BLOCKCHAIN Technology is to allow digital information to be recorded and distributed, BUT NOT EDITED.
All of these Technologies discussed herein are growing at Exponential Rates: § Artificial Intelligence § Augmented and Virtual Reality § Robotics § Quantum Technology § Machine Learning § Autonomous Vehicles § the IoT § Blockchain Individually they are all dynamic but converging with each other they produce a power never seen before or imagined possible. In the linear perception of humans we think of things by compounding one against the other. A ten percent increase over another ten percent Increase (linear thinking).

A basic definition of Exponential growth is a process that increases quantity over time. It occurs when the instantaneous rate of change (that is the derivative) of a quantity with respect to time is proportional to the quantity itself. Described as a function, a quantity undergoing exponential growth is an exponential function of time.

23
“ Exponential rates of change have transcended all industry barriers Leaving many unprepared for the disruptive opportunity.”
23
Exponential Technologies are a refining Force in our society. The disruptive Power of the Exponential Age is not limited to the exponential change itself, but to the way humans respond to this change.
Exponential Technologies are being risen by three mutually reinforcing factors: 1) The transformative power of learning by doing 2) The increasing nitration and combination of new technologies 3) The emergence of new networks of information and trade. 25

It is imperative going forward to understand the economic and political context associated with Exponential Technologies. Globalization, Technology, Politics, and economics are intertwined. With the Exponential Age is a challenge to redefine Codified laws, unspoken social norms; legacy Corporations, Governments, and political systems.

Most social norms, Corporations, Governments, and political systems have followed a linear trajectory. Changing, evolving, adapting incrementally which often has the allusion of stability. We have reached a point where exponential growth, behaviors, relationships and structures now collide head on with norms designed for earlier technology. “ Resulting in tension and misunderstanding when the systems we have in place are suddenly inadequate. We have reached the Exponential Gap.” - Linda Restrepo27

Linda Restrepo is Director of Education and Innovation Human Health Education and Research Foundation. She is a recognized Women in Technology Leader Cybersecurity and Artificial Intelligence.

Restrepo's expertise includes Exponential Technologies, Computer Algorithms, Research, Implementation Management of Complex Human machine Systems, Global Economic Impacts Research. Restrepo is President of a global government and military defense multidisciplinary research and strategic development firm.

She has directed Corporate Technology Commercialization through the US National Laboratories. Emerging Infectious Diseases, Restrepo is also the Chief Executive Officer of Professional Global Outreach. Restrepo has advanced degrees from The University of Texas and New Mexico State University.

31
TECHNOLOGY IN THE MAKING
LINDA
RESTREPO | PUBLISHER EDITOR INNER SANCTUM VECTOR N360 ™ ©

TECHNOLOGY IN THE MAKING

DISCLAIMER: This Magazine is designed to provide information, entertainment and motivation to our readers. It does not render any type of political, cybersecurity, computer programming, defense strategy, ethical, legal or any other type of professional advice. It is not intended to, neither should it be construed as a comprehensive evaluation of any topic. The content of this Presentation is the sole expression and opinion of the authors. No warranties or guarantees are expressed or implied by the authors or the Editor. Neither the authors nor the Editor are liable for any physical, psychological, emotional, financial, or commercial damages, including, but not limited to, special, incidental, consequential or other damages. You are responsible for your own choices, actions, and results.

LINDA RESTREPO | PUBLISHER EDITOR

Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.