wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Top 5 Tech Innovations of 2018

profile
Nisha Naik
Jul 13, 2018
0 Likes
1 Discussions
539 Reads
  1. Babel Fish earbuds Image result for Babel Fish earbuds Named for the science-fiction comedy concept introduced by Douglas Adams in The Hitchhiker’s Guide To The Galaxy, these are earbuds utilizing instant online translation technology, effectively letting humans understand each other while communicating in different languages, in near real-time. Rotman says “Google’s Pixel Buds mean that people can easily carry out a natural conversation with someone speaking a different language.”Although the ear buds themselves are still at an early stage and, reportedly, do not yet function too well, anyone can access the underlying technology today through Google’s voice-activated translation services on computers and mobile devices.   2. Genetic Fortune Telling   Related image   Huge advances are being made in predictive analytics using genomic data by players including Helix, 23andMe, Myriad Genetics, BK Biobank and the Broad Institute. This is making is possible to predict chances of diseases such as cancer, or even IQ, by analyzing genetic data. This promises to be the next quantum leap in public health protection, but also raises huge ethical concerns, including the risk of genetic discrimination.“Genetic fortune telling will make it possible to predict the chances that you’ll be smart or below average in intelligence. It will also make it possible to predict behavior traits. But how will we use that information? Will it change how we educate children and judge their potential?” Though the new DNA tests offer probabilities, not diagnoses, they could greatly benefit medicine. For example, if women at high risk for breast cancer got more mammograms and those at low risk got fewer, those exams might catch more real cancers and set off fewer false alarms.   3. 3D Metal Printing   Related image “3D metal printing gives manufacturers the ability to make a single or small number of metal parts much more cheaply than using existing mass-production techniques,” Rotman says. “Instead of keeping a large inventory of parts, the company can simply print a part when the customer needs it. Additionally, it can make complex shapes not possible with any other method. That can mean lighter or higher performance parts.”   4. Perfecting Online Privacy   Image result for Perfecting Online Privacy   Blockchain-based privacy systems make it possible for digital transactions to be recorded and validated while protecting the privacy of the information and identities underlying the exchange of information. This means it is easier to disclose information without risking privacy or exposure to threats such as fraud or identity theft. The tool is an emerging cryptographic protocol called a zero-­knowledge proof. Though researchers have worked on it for decades, interest has exploded in the past year, thanks in part to the growing obsession with cryptocurrencies, most of which aren’t private.   5. Dueling Neural Networks   Related image   “Dueling Neural Networks describes a breakthrough in artificial intelligence that allows AI to create images of things it has never seen. It gives AI a sense of imagination,” says Rotman. However, he also urges caution, as it raises the possibility of computers becoming alarmingly capable tools for digital fakery and fraud. The technology has become one of the most promising advances in AI in the past decade, able to help machines produce results that fool even humans.

Comments ()


Sign in

Read Next

Best password managers: Reviews of the top products

Blog banner

Decrypting Cryptocurrency: Tracing Transactions in Cyber Investigations

Blog banner

Bots and Cyber Security

Blog banner

Maharashtrian culture: Tradition, Art, Food

Blog banner

Predictive Analysis - Ek Overview

Blog banner

What is Packet Filtering?

Blog banner

SECURITY VULNERABILITIES COUNTERMEASURES IN A SMART SHIP SYSTEM

Blog banner

All you need to know about Website Traffic

Blog banner

Windows Operating System

Blog banner

Cherish the Craft — Essential Tips to Maintain Your Patola Collection

Blog banner

SNAPCHAT

Blog banner

Operating Systems

Blog banner

How College Events Build Real-world Skills You Can’t Learn From Textbooks

Blog banner

“Shot on iPhone” : A campaign by Apple that turned into a prodigy

Blog banner

Threat management

Blog banner

EID UL FITR

Blog banner

CSI and Organizational Change

Blog banner

Deadlock and Starvation

Blog banner

What is Minting & Mining

Blog banner

Indian Food

Blog banner

Virtual Memory

Blog banner

Networking 101: How to Build Meaningful Connections in College

Blog banner

Virtual Memory

Blog banner

Modern operating system

Blog banner

Decision Tree: A Diagram Model

Blog banner

Pilgrimage at LOC: A privilege and a paradox

Blog banner

Vulnerability Assessment (Vulnerability Analysis)

Blog banner

Making Money through Instagram

Blog banner

The art of being alone

Blog banner

semaphores in os

Blog banner

OPERATING SYSTEM

Blog banner

Service Strategy In ITSM

Blog banner

What is Email? Uses of Emails

Blog banner

MODERN OPERATING SYSTEM

Blog banner

Study of Sniffing Tools

Blog banner

Modern OS

Blog banner

Real-Time Operating Systems (RTOS) Deep Explanation

Blog banner

Review on Recovering Deleted Files

Blog banner

Memory management

Blog banner

Random Forests

Blog banner

INDIAN CHEAPEST COSMETICS BRAND

Blog banner

Exploring Virtual Machines and Computer Forensic Validation Tools

Blog banner