wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Top 5 Tech Innovations of 2018

profile
Nisha Naik
Jul 13, 2018
0 Likes
1 Discussions
537 Reads
  1. Babel Fish earbuds Image result for Babel Fish earbuds Named for the science-fiction comedy concept introduced by Douglas Adams in The Hitchhiker’s Guide To The Galaxy, these are earbuds utilizing instant online translation technology, effectively letting humans understand each other while communicating in different languages, in near real-time. Rotman says “Google’s Pixel Buds mean that people can easily carry out a natural conversation with someone speaking a different language.”Although the ear buds themselves are still at an early stage and, reportedly, do not yet function too well, anyone can access the underlying technology today through Google’s voice-activated translation services on computers and mobile devices.   2. Genetic Fortune Telling   Related image   Huge advances are being made in predictive analytics using genomic data by players including Helix, 23andMe, Myriad Genetics, BK Biobank and the Broad Institute. This is making is possible to predict chances of diseases such as cancer, or even IQ, by analyzing genetic data. This promises to be the next quantum leap in public health protection, but also raises huge ethical concerns, including the risk of genetic discrimination.“Genetic fortune telling will make it possible to predict the chances that you’ll be smart or below average in intelligence. It will also make it possible to predict behavior traits. But how will we use that information? Will it change how we educate children and judge their potential?” Though the new DNA tests offer probabilities, not diagnoses, they could greatly benefit medicine. For example, if women at high risk for breast cancer got more mammograms and those at low risk got fewer, those exams might catch more real cancers and set off fewer false alarms.   3. 3D Metal Printing   Related image “3D metal printing gives manufacturers the ability to make a single or small number of metal parts much more cheaply than using existing mass-production techniques,” Rotman says. “Instead of keeping a large inventory of parts, the company can simply print a part when the customer needs it. Additionally, it can make complex shapes not possible with any other method. That can mean lighter or higher performance parts.”   4. Perfecting Online Privacy   Image result for Perfecting Online Privacy   Blockchain-based privacy systems make it possible for digital transactions to be recorded and validated while protecting the privacy of the information and identities underlying the exchange of information. This means it is easier to disclose information without risking privacy or exposure to threats such as fraud or identity theft. The tool is an emerging cryptographic protocol called a zero-­knowledge proof. Though researchers have worked on it for decades, interest has exploded in the past year, thanks in part to the growing obsession with cryptocurrencies, most of which aren’t private.   5. Dueling Neural Networks   Related image   “Dueling Neural Networks describes a breakthrough in artificial intelligence that allows AI to create images of things it has never seen. It gives AI a sense of imagination,” says Rotman. However, he also urges caution, as it raises the possibility of computers becoming alarmingly capable tools for digital fakery and fraud. The technology has become one of the most promising advances in AI in the past decade, able to help machines produce results that fool even humans.

Comments ()


Sign in

Read Next

MAILFENCE

Blog banner

IS CONVERTING AMBITION INTO PROFESSION?

Blog banner

Swiggi

Blog banner

Evolution of Operating Systems

Blog banner

Modern Operating Systems.

Blog banner

Rules and Regulations of Networking: "Standards and Protocols" - Part 1

Blog banner

LISP - Library Management System

Blog banner

Human Error: The weakest link in Cybersecurity

Blog banner

MUTUAL EXCLUSION

Blog banner

computer security

Blog banner

Cyber Laws In India and Around the World

Blog banner

Senseless Teeths

Blog banner

Direct Memory Access

Blog banner

Concurrency and memory

Blog banner

Direct memory access

Blog banner

Virtual memory

Blog banner

Wedding photographer

Blog banner

Python as a tool for data analysis

Blog banner

Data Security and Data Privacy in Data Science

Blog banner

Key to success in Sports

Blog banner

Bots and Cyber Security

Blog banner

New Ransomware Encrypts Your Android And Then Changes PIN Lock

Blog banner

Google

Blog banner

Navigation With Indian Constellation(NavIC) by ISRO in Geographic Information Systems

Blog banner

Cyber Forensics

Blog banner

Evolution of the Microprocessor ~ Aditya Pai

Blog banner

NIKE

Blog banner

Deadlocks in operating system

Blog banner

MULTITHREADING:ENHANCEING PERFORMANCE AND EFFICIENCY IN COMPUTING

Blog banner

PERT Overview

Blog banner

TRAIN TRAVELING

Blog banner

LIFEHACKER

Blog banner

Interesting fact about kangaroo.

Blog banner

Cache Memory in Operating Systems

Blog banner

Is it important to follow all the trends that come up on social media?

Blog banner

Characteristics of Etherum

Blog banner

Vulnerabilities in OnePlus Devices

Blog banner

Virtual Machine's

Blog banner

How to grow followers on Instagram business account?

Blog banner

Junk food vs healthy food

Blog banner

Expert System In AI

Blog banner

Cyber Security in Data Breaching

Blog banner