Skip to main content

THREE INTERESTING IT SOLUTIONS


1980s: Machine Learning



Do you know that today's massive algorithms probably know you better than you know of yourself?

It all started with Alan Turin saying a famous and interesting phrase in the 1950s: Can machines think?
That is when they started to investigate algorithms in which machines could learn by themselves from data. Until a few years later, when an IBM researcher named Arthur Lee Samuel created the first machine learning algorithm in the game of checkers and popularised it among IT researchers.
For various reasons, there were about 25 years without any optimal algorithm results and the popularity of machine learning declined considerably, until the 1980s, when the backpropagation algorithm (neural network) was developed. From then on, different algorithms were developed and improved. Until today where machine learning is one of the most used fields collecting massive amounts of data and looking for patterns among them (without privacy) to improve the experience of each user. Depending on how you approach the application of machine learning in reality you may like it or not.

Finally, I would like to add that if the Web 3.0 project ("Privacy")  emerges, the usability of machine learning today could become obsolete, unless it is focused on other fields.




1990s: Quantum Computing



Will quantum computing be able to solve problems or dilemmas in quantum mechanics?

The vision of being able to translate quantum mechanics into computation is the cause of the emergence of quantum computing. Today we can already see the emergence of quantum computers. But before the creation of the first quantum computer, algorithms and principles were formulated which could be applied to quantum computing, such as Shor's algorithm(1) or the principles of superposition, entanglement and interference.
As we know, a classical computer works through bits (0 or 1) can only be in one state only. On the contrary, a quantum computer works through Qbits (0 and 1) in which the state can be 0 or 1 at the same time, there lies the power of quantum computing. These Qbits can be made up of different types of atoms (electrons, photons, and more). The first Qbits ever created was in 1998, a computer made up of two Qbits. From then on, quantum computers with more Qbits and new algorithms were developed at the same time.
At the moment, today's quantum computers can only perform very simple operations and are not very useful compared to classical computers. But that's why big investors are putting a lot of money into their development.
We are still a long way away from quantum computers becoming useful because, for example, in order to compute Shor's algorithm you need at least 1000000 Qbits and today the maximum number of Qbits inside a quantum computer is 100. It will be complicated because Qbits are very sensitive, they have to reside in a totally noiseless space (no waves), but nothing is impossible.

(1): Shor's algorithm is used to factor very large numbers, reversing the one-way-function. In other words, it compromises the integrity of today's cryptography.




2000s: Blockchain



Could blockchain technology be implemented on the Internet (Web 3.0)?

It is one of the most interesting technologies that has been discovered in the last decades. Why? Until a few years ago, everything was regulated and controlled by companies, and by "everything" I mean banks, data (personal and non-personal), etc. In other words, everything was centralised, controlled by the CEOs of big companies. Blockchain technology eliminates the CEOs. Everything involved is decentralised, held by different people around the world and connected by a single and untouchable ledger. This ledger is made up of blocks of validated data and each block is related to the previous one, making the data written and validated in a block untouchable. 
The implementation of this technology has become popular in cryptocurrencies, when in 2009 a person or a group of people with the nickname of Satoshi Nakamoto created Bitcoin with a type of blockchain implemented.
Another project that is starting to emerge and is based on the blockchain would be Web 3.0. Imagine the internet of today but instead of Facebook belonging to Mark Zuckerberg, it would belong to all the people who own Facebook's own cryptocurrency, you could buy an amount of those cryptocurrencies yourself and you could be involved in the decision making for the improvement of Facebook.

The blockchain is a technology that more and more companies are implementing in their projects because it is secure, immutable and distributed.






Marti Pujol




Comments

Popular posts from this blog

Cybersecurity in Spain

  Currently, 93% of Spanish citizens use the Internet. This is why new projects are already appearing in order to increase cybersecurity as much as possible. In Spain there are two institutions created for cybersecurity under the name of INCIBE-CERT and CCN-CERT. The first one is focused on companies and citizens and the second one only for the government.  I think it is worth making a separation before analysing security in Spain: before and after the appearance of COVID.  Before the pandemic there was not so much concern about cybersecurity, which has affected us in the state of inferiority that we are currently in compared to the UK or Germany. There were a few projects going on but at the official conferences, most of the companies did not attend, they had their minds set on their own company's profit or other reasons. But what's the point of getting wealth when they can take it away from you in hours through malware. The key to Spain's focus on internet security was ...

RHEL vs CentOS

  Nowadays the are more than 300 Linux distros. There is no one better than the other, each distro is different and one of them can be perfect for one user or unusable for another one. But, inside these 300 there are the contintents distros, that they aquired most of users and developers of the society. The other distros we can see them as small islands, not too popular but they have their specifics fans users, perfectly suited for their needs or their cusiosity. We are going to talk about two of the "continents" distros of Linux, their features, pros and conts, etc. The first distribution I want to talk about is Red Hat Enterprise Linux (RHEL), the gold stantard for the commercial Linux distributions. It is a high quality distribution created by two young american guys in 1994, available for workstations, servers, mainframes and supercomputers. It has become the most deployed coomercial Linux distribution in the public cloud thanks to the support of software applications and...

CENSORSHIP AND PRIVACY

  Censorship and privacy are two very important concepts in our lives.  Nowadays censorship is mostly misused. Unfortunately, it has become very much linked to the politics of each country, and this leads to unfair censorship. Privacy is a feature that in theory we care a lot about, but then in practice most of society does whatever they want and they don't even care if they use their data for anything else. But sometimes there are cases where a person loses their privacy without consent, that is the problem. Let's look at two examples, one of censorship and the other of privacy. As censorship we can use one of the most current examples and one that has affected globally. The censorship of information about COVID 19. Maybe there are people who don't agree with this but in the end it has been a case of censorship and I put it as an example. Rajat Khosla, Amnesty International's Senior Director for Research, Advocacy and Policy, said: "Throughout the pandemic, govern...