Et Final HND This Is Emerging Technology Assignment Guide On To Get The Distinction

Download as pdf or txt
Download as pdf or txt
You are on page 1of 82

lOMoARcPSD|43701029

ET Final HND - This is Emerging Technology Assignment


Guide on to get the Distinction.
HND in Computing (ESOFT Metro Campus)

Scan to open on Studocu

Studocu is not sponsored or endorsed by any college or university


Downloaded by Aruna Piyumi ([email protected])
lOMoARcPSD|43701029

Higher Nationals
Internal verification of assessment decisions – BTEC (RQF)

INTERNAL VERIFICATION – ASSESSMENT DECISIONS

Programme title HND in Computing

Assessor Internal Verifier


45: Emerging Technologies
Unit(s)
Researching an ET for a potential client
Assignment title

Student’s name
List which assessment criteria Pass Merit Distinction
the Assessor has awarded.

INTERNAL VERIFIER CHECKLIST

Do the assessment criteria awarded match


those shown in the assignment brief? Y/N

Is the Pass/Merit/Distinction grade awarded


justified by the assessor’s comments on the Y/N
student work?
Has the work been assessed
Y/N
accurately?
Is the feedback to the student:
Give details:
• Constructive? Y/N
• Linked to relevant assessment criteria? Y/N
• Identifying opportunities for Y/N
improved performance?
• Agreeing actions? Y/N

Does the assessment decision need


Y/N
amending?

Assessor signature Date

Internal Verifier signature Date


Programme Leader signature (if required)
Date

Confirm action completed


Remedial action taken
Give details:

Assessor signature Date

Internal Verifier
Date
signature

Downloaded by Aruna Piyumi ([email protected])


lOMoARcPSD|43701029

Programme Leader
Date
signature (if required)

Downloaded by Aruna Piyumi ([email protected])


lOMoARcPSD|43701029

Higher Nationals - Summative Assignment Feedback Form


Student Name/ID

Unit Title 45: Emerging Technologies

Assignment Number 1 Assessor


Date Received
Submission Date
1st submission
Date Received 2nd
Re-submission Date
submission
Assessor Feedback:
LO1 Assess what Emerging Technologies are necessary and appropriate when designing software
applications for the future
Pass, Merit & Distinction P1 P2 M1 M2 D1
Descripts

LO2 Research state-of-the-art Emerging Technologies and choose one you believe will have significant
impact in the future
Pass, Merit & Distinction P3 P4 M3 M4
Descripts

LO3 Discuss the current state and future impact of your chosen Emerging Technology

Pass, Merit & Distinction P5 P6 M5 M6 D2


Descripts

LO4 Evaluate the political, economic and social factors which play a role in the competition between
Emerging Technologies and their success or failure in the future

Pass, Merit & Distinction P7 M7 D3


Descripts

Grade: Assessor Signature: Date:

Resubmission Feedback:

Grade: Assessor Signature: Date:

Internal Verifier’s Comments:

Signature & Date:

Downloaded by Aruna Piyumi ([email protected])


lOMoARcPSD|43701029

* Please note that grade decisions are provisional. They are only confirmed once internal and external moderation has taken place and grades
decisions have been agreed at the assessment board.

Assignment Feedback
Formative Feedback: Assessor to Student

Need to Add Advantages and Disadvantages in ET

Add more information about the blockchain

Make short presentation

Action Plan

Add more information

Add ET Advantages and disadvantages

Add presentation

Summative feedback

Feedback: Student to Assessor

Knowledgeable person. He shares a lot of educational stuffs with us. Clearly understand what he said
and very supportive person.

Assessor signature Date

2023

Student signature Date

Downloaded by Aruna Piyumi ([email protected])


lOMoARcPSD|43701029

Pearson Higher Nationals in


Computing
45: Emerging Technologies
Assignment 01 of 01

Downloaded by Aruna Piyumi ([email protected])


lOMoARcPSD|43701029

General Guidelines

1. A Cover page or title page – You should always attach a title page to your assignment. Use previous
page as your cover sheet and make sure all the details are accurately filled.
2. Attach this brief as the first section of your assignment.
3. All the assignments should be prepared using a word processing software.
4. All the assignments should be printed on A4 sized papers. Use single side printing.
5. Allow 1” for top, bottom, right margins and 1.25” for the left margin of each page.

Word Processing Rules

1. The font size should be 12 point, and should be in the style of Time New Roman.
2. Use 1.5 line spacing. Left justify all paragraphs.
3. Ensure that all the headings are consistent in terms of the font size and font style.
4. Use footer function in the word processor to insert Your Name, Subject, Assignment No, and
Page Number on each page. This is useful if individual sheets become detached for any reason.
5. Use word processing application spell check and grammar check function to help editing your
assignment.

Important Points:

1. It is strictly prohibited to use textboxes to add texts in the assignments, except for the compulsory
information. eg: Figures, tables of comparison etc. Adding text boxes in the body except for the
before mentioned compulsory information will result in rejection of your work.
2. Avoid using page borders in your assignment body.
3. Carefully check the hand in date and the instructions given in the assignment. Late submissions
will not be accepted.
4. Ensure that you give yourself enough time to complete the assignment by the due date.
5. Excuses of any nature will not be accepted for failure to hand in the work on time.
6. You must take responsibility for managing your own time effectively.
7. If you are unable to hand in your assignment on time and have valid reasons such as illness, you
may apply (in writing) for an extension.
8. Failure to achieve at least PASS criteria will result in a REFERRAL grade .
9. Non-submission of work without valid reasons will lead to an automatic RE FERRAL. You will then
be asked to complete an alternative assignment.
10. If you use other people’s work or ideas in your assignment, reference them properly using
HARVARD referencing system to avoid plagiarism. You have to provide both in-text citation and
a reference list.
11. If you are proven to be guilty of plagiarism or any academic misconduct, your grade could be
reduced to A REFERRAL or at worst you could be expelled from the course

Downloaded by Aruna Piyumi ([email protected])


lOMoARcPSD|43701029

Student Declaration

I hereby, declare that I know what plagiarism entails, namely to use another’s work and to present it as
my own without attributing the sources in the correct form. I further understand what it means to copy
another’s work.

1. I know that plagiarism is a punishable offence because it constitutes theft.


2. I understand the plagiarism and copying policy of Edexcel UK.
3. I know what the consequences will be if I plagiarise or copy another’s work in any of the
assignments for this program.
4. I declare therefore that all work presented by me for every aspect of my program, will be my own,
and where I have made use of another’s work, I will attribute the source in the correct way.
5. I acknowledge that the attachment of this document signed or not, constitutes a binding
agreement between myself and Pearson, l UK.
6. I understand that my assignment will not be considered as submitted if this document is not
attached to the assignment.

Student’s Signature: Date:


(Provide E-mail ID) (Provide Submission Date)

Downloaded by Aruna Piyumi ([email protected])


lOMoARcPSD|43701029

Higher National Diploma in Business


Assignment Brief
Student Name /ID Number

Unit Number and Title 45: Emerging Technologies

Academic Year 2021/2022

Unit Tutor

Assignment Title Dex Consulting - ET & the Future

Issue Date

Submission Date 2023-03-28

IV Name & Date

Submission format

Submission for this assignment should be a document and a presentation.

1. Final Report – Arrange all your answers in a professionally written report.


2. Research report as a part of the research conducted - Develop a research report using
research gathered about your chosen Emerging Technology, industry and end user
3. 15 minutes Presentation – Arrange a presentation to demonstrate your findings, gather
feedback and answer questions.

For the final report and the research report, you are expected to make use of appropriate
structure – including headings, paragraphs, subsections and illustrations as appropriate and all
work must be supported with research and referenced using Harvard referencing system.

For your presentation you will be expected to utilize appropriate tools (PowerPoint, etc.) and
include support material such as wireframes, diagrams, sketches, user interviews, etc. where
appropriate.

Downloaded by Aruna Piyumi ([email protected])


lOMoARcPSD|43701029

Unit Learning Outcomes:

LO1 - Assess what Emerging Technologies are necessary and appropriate when designing
software applications for the future.

LO2 - Research state-of-the-art Emerging Technologies and choose one you believe will have
significant impact in the future.

LO3 - Discuss the current state and future impact of your chosen Emerging Technology.

LO4 - Evaluate the political, economic and social factors, which play a role in the competition
between emerging technologies and their success or failure in the future.

Downloaded by Aruna Piyumi ([email protected])


lOMoARcPSD|43701029

Assignment Brief and Guidance:

Scenario

‘Dex Consulting’ is a leading research and consultancy firm researching new market trends
and Emerging Technologies for corporate clients and the consumer market. You currently
work as a trainee technology analyst for ‘Dex Consulting’. As part of your role, your manager
has tasked you to research on an Emerging Technology suitable for a potential client. You are
required to identify a specific user group you believe will be most influenced by this Emerging
Technology.

As part of this assignment, you must develop a report using research data gathered about
your chosen Emerging Technology, industry and end user and present your findings in a 15
minutes presentation.

You may supporting evidence and material such as user personas, hype cycle, etc to the
report.

Activity 01
• Assess formats, characteristics, trends, of Emerging Technologies and evaluate how
they can challenge the status quo of the markets, established practices and end user
experiences. Your answer should support with valid and relevant examples.

• Review different emerging technologies relevant to software development by exploring


their advantages/ disadvantage. Evaluate and justify the relevance and purpose of the
emerging technologies review above when designing innovative and useful software
applications for the future .

Downloaded by Aruna Piyumi ([email protected])


lOMoARcPSD|43701029

Activity 02

Select and research on a specific emerging technology that would be impacted on software
development industry. Organize your research findings and produce a small research
report with the following

• Select a specific emerging technology as stated in the scenario and relate it to the
existing technologies to demonstrate how the selected ET is likely to merge or replace
an existing technology in the industry. Defend your choice of emerging technology by
evaluating why you believe that it would have the most impact on the future software
development.

• Contrast and evaluate the benefits, features, advantages and disadvantage of the
selected ET. Identify the industry and the end user group that will be mostly influenced
by the selected ET and review how they will be impacted by it.

• Critically evaluate the above findings while justifying the selected ET and its impact on
its end users and software development industry as a whole.

Activity 03

Demonstrate your research findings in a 15 minutes presentation to the client that you are
supposed to recommend the emerging technology. The presentation should cover the
following

• Demonstrate the findings of the research conducted on emerging technology, its


benefits, features, advantages and disadvantages.

• Gather feedback from the audience and answer the questions they raise about your
research. Document the feedback received and questions raised by the end users and
attach to your report.

Downloaded by Aruna Piyumi ([email protected])


lOMoARcPSD|43701029

Downloaded by Aruna Piyumi ([email protected])


lOMoARcPSD|43701029

ACKNOWLEDGEMENT
We deem it’s a pleasure to acknowledge our sense of gratitude to our project guide Mr.
Sudesh under whom we have carried out the project work. His incisive and objective
guidance and timely advice encourage us with constant flow of energy to continue the
work. We must say that no height ever achieved without some sacrifice made at some end
and it is here where we owe our special debt to our parents and our friends for showing
their generous love and care throughout the entire period time. And I would like to my
friends in batch 71 for all the support. Thank you!

13 |

Downloaded by Aruna Piyumi ([email protected])


lOMoARcPSD|43701029

TABLE OF CONTENT
ACKNOWLEDGEMENT .......................................................................................................... 13
Activity 1 ....................................................................................................................................... 16
1.1 Emerging technologies Introduction ................................................................................... 16
1.1.1 Emerging technologies characteristics ............................................................................. 17
1.2 Disruptive Technologies ...................................................................................................... 18
1.3 The Hype Cycle ................................................................................................................... 20
1.4 Emerging Technologies Pros and Cons ............................................................................... 29
1.5 Emerging Technologies in Software Engineering Field...................................................... 31
Activity 2 ....................................................................................................................................... 38
2.1 Cryptocurrency Introduction ............................................................................................... 38
2.1.1 History .............................................................................................................................. 38
2.1.2 Distributed Ledger ............................................................................................................ 39
2.1.3 Different Type of Distributed Ledger Technologies ........................................................ 41
Hashgraph:................................................................................................................................. 42
2.1.4 Distributed Ledger Technology Pros and Cons ................................................................ 43
2.2 Blockchain Disruptive quality ............................................................................................. 44
2.3 Modern Development of Blockchain .................................................................................. 51
2.4 Blockchain Algorithms ........................................................................................................ 56
2.5 Blockchain Industry............................................................................................................. 60
2.5.1 Health Care ................................................................................................................... 61
2.5.2 Insurance ...................................................................................................................... 61
2.5.3 Supply Chain ................................................................................................................ 62
2.5.4 Finance and Bank ......................................................................................................... 63
2.6 Blockchain Technology Research Feedback ....................................................................... 67
Activity 3 ....................................................................................................................................... 71
Conclusion ..................................................................................................................................... 73

14 |

Downloaded by Aruna Piyumi ([email protected])


lOMoARcPSD|43701029

List of Figures

Figure 1: The Hype Cycle ............................................................................................................... 20


Figure 2: Tesla Robot ..................................................................................................................... 21
Figure 3: Four Stage of IOT Architecture ....................................................................................... 23
Figure 4: What is crypto ................................................................................................................ 27
Figure 5: Distributed Ledger .......................................................................................................... 40
Figure 6: Blockchain works for Bitcoin .......................................................................................... 42
Figure 7: NFT Minting Process ....................................................................................................... 45
Figure 8: Cryptokitty NFT Market .................................................................................................. 46
Figure 9: Rock NFT Twitter ............................................................................................................ 47
Figure 10: Crypto (Bitcoin) Mining Process ................................................................................... 50
Figure 11: SSO Process .................................................................................................................. 54
Figure 12: Cryptography Algorithm ............................................................................................... 57
Figure 13: P2P Protocol Example - BitTorrent ............................................................................... 58
Figure 14: Zero Knowledge Proof Example ................................................................................... 59

15 |

Downloaded by Aruna Piyumi ([email protected])


lOMoARcPSD|43701029

Leading research and consulting company DEX Consulting studies emerging technologies
and new market trends for business clients as well as the general public. When clients are
come to the company we give an idea about what emerging technology to used. It’s a
difficult sometimes but before we doing a case study for that.

As a training technology analyst, I had to do this research. My goal is recommended for


best emerging technology to base on their requirement. Doing this research, I follow up
many resources. All the researched ones are based on client requirements and I decide to
do this research. Here is the full research I found on that.

Activity 1

1.1 Emerging technologies Introduction


Emerging technologies are cutting-edge innovations that are either already widely
available or are expected to do so soon. They will have a big impact on society, business,
and people's daily lives. These innovations have the potential to upend established markets
and ways of operating since they are frequently at the cutting edge of scientific and
technical research and development. Artificial intelligence, robotics, the Internet of Things,
biotechnology, nanotechnology, and renewable energy are a few examples of developing
technologies. Although these technologies are still in their infancy, they could one day
completely alter the way we work and live.

The future of emerging technologies is hard to predict with any degree of accuracy because
they are continually changing and frequently have unpredictable effects. But it's likely that
these technologies will continue to have a big impact on how the world develops.
According to some analysts, new technology will significantly alter many facets of society,
including how we live, work, and interact with one another. The healthcare, transportation,
and energy sectors may also be significantly impacted. Robotics and artificial intelligence,
for instance, may transform transportation and manufacturing, while renewable energy
technology may assist to combat climate change. It is important for society to carefully

16 |

Downloaded by Aruna Piyumi ([email protected])


lOMoARcPSD|43701029

consider the potential impacts of these technologies and to ensure that they are developed
and used in a responsible and ethical manner.

1.1.1 Emerging technologies characteristics


Emerging technologies have several characteristics that set them apart from established
technologies. Here are some of the key characteristics of emerging technologies:

Novelty: Emerging technologies are new and innovative. They often represent a significant
departure from existing technologies, offering new capabilities or solving problems in new
ways.

Rapid Development: Emerging technologies typically undergo rapid development and


evolution, with new versions, features, and capabilities appearing frequently.

Uncertainty: Emerging technologies are often associated with uncertainty, including


uncertainties about their effectiveness, safety, and long-term impact. This can create
challenges for decision-makers who need to evaluate the potential risks and benefits of
adopting emerging technologies.

Disruptiveness: Emerging technologies can disrupt existing markets and business models,
challenging established players and creating opportunities for new entrants.

High-risk/high-reward: Emerging technologies often involve significant risks, including


financial risks and risks to human health and safety. However, they also offer the potential
for high rewards, such as improved performance, efficiency, and quality of life.

Experimental: Emerging technologies are often experimental in nature, with researchers


and innovators testing new approaches and technologies to see what works best. This
experimental approach can lead to breakthroughs and innovations that transform entire
industries.

Complexity: Emerging technologies can be highly complex, involving intricate systems


and technologies that require specialized knowledge and expertise to develop and
implement. This complexity can create challenges for decision-makers who need to
evaluate the feasibility and potential impact of emerging technologies.

17 |

Downloaded by Aruna Piyumi ([email protected])


lOMoARcPSD|43701029

1.2 Disruptive Technologies


Disruptive technologies are innovations that come to replace a process, a product, or
technology that is already well-established, giving rise to a new way to operate, be it for
consumers, organizations, or both. Disruptive technologies completely change and replace
solutions because they have better features that allow new possibilities to open up.

The car and the television can be named as two famous disruptive technologies in history.
The car changed completely the way we go from one place to another, while TV changed
the way we entertain ourselves. (SYDLE, 2022)

In now days traditional models are left on the market. The new emerging disruptive
technologies are coming to change the industry. I mentioned few disruptive technologies
still popular right now on industry.

Video Streaming: This is a perfect example of disruptive technologies. Having a video


provider these days is typical if you want to view movies and TV shows. However, it wasn't
like this twenty years ago. In the past, the leaders in video broadcasting were Cable TV
and Blockbuster. The latter lost out on the chance to benefit from the novel disruptive
technology that would ultimately replace it. In right now we can watch anything
everywhere just using video streaming platform. Also, we can use social media video call
features to share our thoughts. This was a huge changing disruptive technology everyone
used right now.
Example: Netflix, Amazon prime, TikTok live, Facebook live

Virtual Reality (VR): Virtual reality, which is typically associated with games and
entertainment, is a technology that has the potential to pioneer a wide number of industries.
A few industries that potentially benefit from this digital upheaval are interior designers,
merchants, and automobiles. Most of the video games are also released for VR. As a gamer
we can go through a real-life experience on it.
Example: PlayStation VR, Meta Verse

18 |

Downloaded by Aruna Piyumi ([email protected])


lOMoARcPSD|43701029

Online Encyclopedias: Old days we used some books, papers to search something. But
nowadays we can search many things just one keyword. An online encyclopedia makes
finding information more-quicker and easier. Its search engines aid in quick and precise
searches. Additionally, it has a capacity that is enormously greater than that of earlier
encyclopedias.
Example: Wikipedia

Digital Currency: A discipline as renowned as economics was changed by


cryptocurrency. The blockchain is just one of the many technologies used in
cryptocurrencies that guarantee its efficiency and dependability.
Example: Bitcoin, XRP

Online Education: E-learning, commonly referred to as online education, peaked during


the COVID-19 epidemic. Millions of students have continued their studies virtually
throughout the world. Most of people used on these platforms to educate itself. After going
through online education system whole education system will be changed a lot.

Example: Zoom, MS Teams

C-Commerce: C-Commerce meaning is a Collaborative commerce. This e-commerce


method facilitates the transaction between customers and sellers so they can conduct
business. This innovative company strategy is expanding and breaking down barriers.

Example: Amazon, Shopify

Also, they are had many disruptive technologies right now. In above I mentioned most of
the popular technologies right now. But other technologies are Augmented reality, 3D
Printing, Cross-platform instant messaging apps, and Digital transport services etc.

19 |

Downloaded by Aruna Piyumi ([email protected])


lOMoARcPSD|43701029

1.3 The Hype Cycle


A quick glance at the relative market promotion and perceived importance of computer
advances is provided by hype cycles and priority matrices. They point out overexposed
areas, predict when technologies and trends will mature, and offer practical guidance to
assist businesses decide whether to embrace.

The Hype Cycle is a visual representation of a typical pattern that appears with every major
invention in technology or another field. For clients to evaluate technology maturity and
future potential, Gartner annually develops more than 90 hype cycles across a variety of
technology and application (such as social software and ERP), information and IT services
(cloud computing, big data), and business sectors.

Introduced in 1995, Gartner's Hype Cycle illustrates how innovations often advance from
overexcitement through a time of disillusionment to a final grasp of the innovation's
significance and usefulness in a market or domain. The hype cycle is included some
technologies on it. Looking the hype cycle, we can decide what technology is up trending
right now and what happen each individual technology in to the future.

Figure 1: The Hype Cycle

20 |

Downloaded by Aruna Piyumi ([email protected])


lOMoARcPSD|43701029

Looking for a hype cycle we can decide in many of the technology’s future. In below I
mentioned one of the popular technology’s in current world.

Smart Robot: Every business we come across has adopted robotic technology. Based on
hype cycle this was a another most valuable emerging technology. Everything from
factories to stores, hospitals, and our homes. Robotics is a crucial tool for helping
humanity. A smart robot is an artificial intelligence (AI) system that, by definition, is able
to learn from its surroundings and past experiences and expand upon its capabilities in light
of that knowledge. In contrast, utility and human contact are the major areas where
traditional and smart robots diverge.

Cobots, or intelligent robots, work alongside humans to do jobs. Traditional robots are self-
sufficient machines that work without human direction. The worldwide smart robot market
has a value of $8.94 billion in 2021, according to Business Wire. The publication projects
that the market will grow at a CAGR of 17.9% from 2022 to 2027, reaching US$ 24.28
billion. Robots can be divided into various categories. robots used in industry, such as those
in Tesla's plant. (Haiston, 2021)

Figure 2: Tesla Robot

21 |

Downloaded by Aruna Piyumi ([email protected])


lOMoARcPSD|43701029

Smart Robot had many of advantages and disadvantages. Below table is showing what are
they.

Advantages Disadvantages
Productivity Increase. Increase unemployment.
Using smart robots can increase Replacing all the works using smart
productivity. Robots didn’t get tired. They robots, it will affect to the human
can already work without any limitation. employee jobs. After that unemployment
ratio will be going to high.
Cost effectiveness. High maintains cost.
Applying one smart robot we can save our If continually work, Machines need to
money. Because someone don’t need hire repair. Smart robots also must need to
lots of employees and pay for it. maintains. This maintains process are not
a cheap. If someone had smart robot they
must need to pay a high cost for maintains
for year by year.
Can work unsafe environments. No human sense is involved.
Smart robots can work with any In some jobs need to sense of human.
environment. Example right now, in the Example is a nursing. But using smart
military they used smart robots for search robot that’s not had human sense. It’s
bombs. It’s also saved real human life. giving a bad impact for patients and
others.
High Accurate and speed. Only Can do a specific task.
In doing a task smart robot can do very Real humans are made smart robots. This
accurate and fast. In mathematic process machine must need to programmed. In
are also can do it fast on using smart programing part humans are doing this
robots. one specific task. Also, smart robots are
train for specific task.

22 |

Downloaded by Aruna Piyumi ([email protected])


lOMoARcPSD|43701029

IoT Platforms: Enterprises are increasingly connecting a broad variety and number of IoT
endpoints to access data from and better manage physical assets that are relevant to their
business. Typical IoT-enabled business objectives include traditional benefits, such as
improved asset optimization, as well as new business opportunities and revenue models,
such as subscribed-to services (versus owned assets). An IoT platform is an on-premises
software suite or a cloud service (IoT platform as a service [PaaS]) that monitors and may
manage and control various types of endpoints, often via applications business units deploy
on the platform. The IoT platform usually provides Web-scale infrastructure capabilities
to support basic and advanced IoT solutions and digital business operations. (Gartner,
2021)

Looking for a hype cycle IoT is the new trending emerging technology. In IoT architecture
had four stages. Data is gathered in the first stage and transformed into meaningful data.
Data is transformed from an analog form to a digital form in the second stage. The Edge
IT system conducts additional data analysis in the third stage.

Data that needs more processing but is not urgently needed will be sent to the data center
or cloud-based services at stage four. Below image is showing the how IoT is worked.

Figure 3: Four Stage of IOT Architecture

23 |

Downloaded by Aruna Piyumi ([email protected])


lOMoARcPSD|43701029

There are few examples of IoT are smart home systems (The most often used model is
Amazon Echo), Smartwatches that support text and phone calls (Apple watch, Mi Band),
Connected cars (Like Apple car, Tesla) etc.

Advantage and Disadvantages also had in IOT platforms. There are clearly mentioned in
below.

Advantages Disadvantages
Time saving High depends on the internet
Using IoT platforms we can save human IoT devices are must need to internet.
times. If someone used smart watch or Without internet it can’t be work. This
something support in IoT, it will be device is highly depending on the internet.
helped for human works. It showing many That’s the disadvantage of IoT devices.
human days to day work such as blood
pressure, exercises etc.
Minimize Human effort Chance to system corrupt
Every time we must need to human These devices are always connected to the
involvement on archiving some tasks. But internet. These devices systems highly
using IoT devices that human had chance to corrupt. Because these
involvement can minimize. systems are running on servers. Its some
Ex: Google map servers are down these IoT devices system
will corrupt.
Help for human health Low data accuracy
If someone wearing an apple smart watch We can’t highly expect all IoT platform
it helps to track human health. data is accurate. Because some data will
Researchers found that IoT devices health be depending on nature. These data not
trackers are mostly accurate are same like 100% accurate like human involved.
doctors gave.
Improving data collection Privacy Problems
IoT devices are collect some human data IoT platform data security had many
to get analyze human behaviors. Anyone issues. In hackers’ attacks on these system

24 |

Downloaded by Aruna Piyumi ([email protected])


lOMoARcPSD|43701029

can access to that data collection in any data bases. After that they leak real IoT
moments. Its help to see our data on any platform data to the persons. It’s will
country or anywhere. harm for human privacy and other
censored data.

Micro Data Center: Micro data centers are deployments that have all of the crucial
elements present in a regular data center but on a smaller scale. There is enough space to
house your servers, delicate IT equipment, and the rack accessories of your choosing inside
one conventional IT rack that houses all of the components. Micro data centers typically
sustain critical loads of up to 100–150 kilowatts (kW). Uninterruptible power supply
(UPS), Rack power distribution unit (rPDU), Rack cooling unit, climate controls with
integrated heat rejection, and remote monitoring sensors and software are typically
included in the rack's components.

A subset of the larger family of pre-built data center systems is the micro data center. Due
to the requirement for IT managers to swiftly and efficiently deploy additional capacity
close to end users, these systems are growing in popularity. Prefabricated data centers of
other prominent varieties include:

Mini data center: Mini data centers are scaled-down, miniature replicas of their much
bigger data center counterparts, just like micro data centers. Edge computing uses
prefabricated, edge-specific mini data centers.

Micro module data center: Micro-modular data centers, which provide independent, self-
contained infrastructure, are very similar to micro data centers. IT cabinets are confined or
crammed into their own technical area. These systems frequently consist of many deployed
and modularly connected pieces.

Prefabricated value data center: Larger, standalone installations, prefabricated modular


data centers are frequently used outside of main buildings or in outlying areas. To fulfill
demand, capacity units can be added in a modular fashion.

25 |

Downloaded by Aruna Piyumi ([email protected])


lOMoARcPSD|43701029

These Micro data centers also had advantages and disadvantages. Below I mentioned what
are the advantages and disadvantages in Micro data centers.

Advantages Disadvantages
Latency is Low Must need expertise knowledge
Micro data centers can reduce latency by Micro data centers are highly
processing high volume data with minimal customizable, making them easier to
delay. optimize and manage than traditional data
centers.
Maintenance cost is low. Capability is limited
Micro data centers have standardized and In comparison to typical data centers,
modulated designs, making maintenance micro data centers are much more
easier and OPEX less costly. configurable, so you have the
responsibility of managing and optimizing
them to the fullest extent possible,
especially if you intend to host your
website on-site.
Deployment is fast Compatibility issues
Micro data centers are designed to be Micro data centers are convenient to move
easily replaced in the event of failures or around, but require site prep. On this it’s
malfunctions. will happening many compatibility issues.

Cryptocurrency: A digital currency, or cryptocurrency, is an alternative payment method


developed utilizing encryption methods. By utilizing encryption technology,
cryptocurrencies can act as both a medium of exchange and a virtual accounting system.
You need a cryptocurrency wallet in order to use cryptocurrencies. These wallets can be
software that is downloaded to your PC, mobile device, or the cloud. Your encryption keys,
which verify your identity and connect to your cryptocurrency, are kept in the wallets.
(York, 2022)

26 |

Downloaded by Aruna Piyumi ([email protected])


lOMoARcPSD|43701029

Every cryptocurrency's digital architecture (code) is unique, so are the ways in which they
operate. Let's use the "mined" cryptocurrency bitcoin as an example.

The way cryptocurrency mining operates in the real world is as follows: A sophisticated
computer processor generates an amazing amount of noise and heat and runs on electricity.
That chip is competing to solve a mathematical conundrum in the digital realm. The first
computer to figure out the riddle wins some freshly created bitcoin. This idea was included
in the open source code written by the unidentified organization that introduced bitcoin in
2009.

Go through the hype cycle it’s a now day trend. Every one used cryptocurrency to trade
and buy goods. This cryptocurrency must need to wallet. Crypto wallets are doing the all
crypto savings and exchanges. Without a crypto wallet we can’t buy or save our cryptos.
The famous crypto exchanges are Binance, Coinbase, Crypto.com and Gemini.

Also, you can used hardware wallets war save your crypto. Hardware wallets are expensive
in the market. But security wise hardware wallet is the best option to the save your cryptos.
Software wallets are free for everyone but security wise they had some risk. Below image
is showing how cryptocurrency are worked in real world.

Figure 4: What is crypto

27 |

Downloaded by Aruna Piyumi ([email protected])


lOMoARcPSD|43701029

Crypto is a new gen currency in future. But this IoT things also had advantages and
disadvantages.

Advantages Disadvantages
Good for Inflation Data lost risk
Inflation mean depreciates the currency. Cryptocurrency wallets are untraceable
On crypto doesn’t depreciates on the and unhackable, but if lost, they are gone
ongoing world currency. Its only had their forever.
own coins based on Bitcoin. If save some
crypto its good for inflation.
Decentralized Illegal
Ledgers are running on cryptocurrency. Some countries cryptocurrency things are
All the records are saving on these illegal. Canada is a great example on that.
ledgers. On all the ledger records are They are not approved any of crypto stuffs
saved on many worldwide ledgers. This is and transaction on their country.
the decentralization.
Cost effective No transaction cancelation
On crypto wallet inside does not have a If someone share cryptos it must need to
transaction fee. Its help to send crypto to require the correct wallet address. Put on
other wallets without extra charges. the wrong wallet address it will be gone
forever. Because they had a no option to
cancel transaction.
Transparent No refunds
Cryptocurrency are the decentralized Someone shares cryptos to another wallet
thing. All the transaction will be records it will had no refunded option. If someone
on many ledgers. On this method will be accidentally share crypto to wrong address
transparent the information on all the they can’t refund those crypto.
records.
Good privacy Need more energy

28 |

Downloaded by Aruna Piyumi ([email protected])


lOMoARcPSD|43701029

If some one shares cryptos it can be sent Crypto is a decentralized process. They
without crypto owner name. They are must need more electricity power to run
privacy does not revel and its help to send crypto servers. That’s the huge energy and
without their information. they need to maintain those servers.

Digital Security: Our gadgets, sensitive information, and online persona are all protected
by digital security measures from outside threats. It contains all the security training, tools,
and methods necessary to keep you safe online.

We are browsing online existence is an ecosystem of tools, data, behaviors, and


information systems that are continually interacting with one another. This is ultimately
what constitutes your digital footprint.

Innovators and cyber security specialists from around the world are creating cutting-edge
digital security solutions to counter the massive number of cyberattacks occurring online.
This is the new innovation emerging technology on the new trend. When cyberattack will
come it’s done many developed ways to protect user data. There are many expects on
digital security. There is device protection, network security, parental control, antivirus
software etc.

1.4 Emerging Technologies Pros and Cons


On daily life emerging technologies are become a huge innovation. On that its successfully
doing a great job for human life. But Introducing some technologies had many of
advantages and disadvantage. Most of the innovation technologies does not have a full
100% advantages. Below table is showing each emerging technologies pros and cons
separately.

Pros Cons
Improve efficiency Laziness
Using emerging technologies, everyone Using technology is good but using this
can work more productively and easy. over and over again humans are become
laziness people. In the future human self-

29 |

Downloaded by Aruna Piyumi ([email protected])


lOMoARcPSD|43701029

Also, every human can do their work behaviors and many life styles is going to
without work hard. be lazy.
Ex: AI Robots
Save time More expensive
We can use the time saved for other We can save time using these
crucial tasks since we are able to technologies, But, most of the tools are
complete a work in less time. Many expensive. User must need to use
tasks, including writing, working, and subscription money model to use those
commuting, are sped up with the aid of tools. Those tools basic plans are also
technology. limited features. If you using these tools
Ex: Web base tools such as SEO Tool you must need to paid more money.
MOZE
Better Communication Social Isolation
Social media and other smart Using smart communication more time
telecommunication methods are easy to its affect on human relationship. Human
use. Its helps to better communication. peoples are socially isolations on using
more time on this. Because this is not a
physically connection in real human
peoples. That’s the reason why these
technologies are affects people.
Reduce the Cybercrime risk Malfunction
Using some smart security software, we This thing happening on mostly
can reduce cyber security risk. Most of unauthorized tools. Most Asian countries
the common cyber security risks are virus used illegal software. Using this its affect
attacks, DDOS attacks and phishing some malfunction like ransomware,
attacks. This smart security software can viruses etc. These are really harm to your
do protect our data from those attacks. personal data.
Ex: Bitdefender
Fast and Speed Health problems

30 |

Downloaded by Aruna Piyumi ([email protected])


lOMoARcPSD|43701029

Using some smart stuff, we can do In example of 5G, some people said its
something really fast. In harm to people. Because expand 5G areas
telecommunication world 5G is the we must need to more towers. More
fastest network in the world. Its really towers provide more signal coverage.
help to people day to day work. These radio signals are affected to human
life. Probably, it’s will harm to human
health. That’s the reason why some
emerging technologies are had issues.

1.5 Emerging Technologies in Software Engineering Field

Though making future predictions is notoriously difficult, there are certain new disciplines
that appear to be promising for software engineering. This is as good a moment as any to
jump on the bandwagon if you are thinking about a career in this already rapidly expanding
and intriguing area.

Now days Software Engineering field used most of Emerging Technologies. Below I
mentioned what emerging technologies are uptrend on software field.

Cloud Native Software: Building, delivering, and administering contemporary


applications in cloud computing settings is known as "cloud native" software development.
Modern businesses want to create apps that are extremely scalable, adaptable, and resilient
so they can quickly upgrade them to meet client expectations. They accomplish this by
utilizing cutting-edge tools and methods that naturally enable application development on
cloud infrastructure. These quick and frequent application modifications are supported by
cloud-native technologies without affecting service delivery, giving adopters a cutting-
edge competitive advantage. (AWS, 2022)

Most of the software developers used to cloud native technologies. Implementing on this
they used cloud native stacks. Cloud native stack used for develop cloud native
programmes. This stack is handled build cloud software, manage and run. There are had 6
layers on cloud native stack.

31 |

Downloaded by Aruna Piyumi ([email protected])


lOMoARcPSD|43701029

Infrastructure layer: The cloud-native stack is built on an infrastructure layer. Operating


systems, storage, networks, and other computing resources are all part of it and are handled
by external cloud service providers.

Provisioning layer: The cloud services that assign resources and set up the cloud
environment make up the provisioning layer.

Runtime layer: Cloud-native technologies are made available by the runtime layer for the
use of containers. This consists of networking ability, cloud data storage, and a container
runtime like contained.

Orchestration and management layer: The integration of the many cloud components
into a cohesive whole is the responsibility of orchestration and management. It functions
in a manner akin to an operating system in conventional computers. For the deployment,
administration, and scaling of cloud applications across several computers, developers use
orchestration tools like Kubernetes.

application development and definition layer: The software technologies in this tier of
the cloud-native stack are used to create cloud-native apps. To construct cloud apps, for
instance, developers use cloud technologies including communications, databases,
container images, and continuous integration (CI) and continuous delivery (CD) tools.

Tools for observability and analysis: Tools for observability and analysis track, assess,
and enhance cloud application system health. To make sure there is no degradation in the
quality of the app's service, developers employ tools to track metrics like CPU
consumption, memory usage, and latency.

Using this cloud native software architectures developer had many advantages and
disadvantages. Below table it’s showing those things.

32 |

Downloaded by Aruna Piyumi ([email protected])


lOMoARcPSD|43701029

Advantages Disadvantages
Easy for customize Security issues
DevOps teams can choose the best On this Containerized cloud native
framework, system, and language for their architectures typically call for the adoption
projects by using loosely connected of new security technologies or
services rather than technological stacks. modifications to current security systems.
On this they can customize easily their The use of containers increases assault
programmes to anyone. surfaces, which can make defense more
difficult.
Optimization Dependencies
On this, any cloud native developers can Microservices' flexibility is typically
optimize their services individually. Also, limited by the need for specialized
its help to get best end user experience in software, hardware, or operating system
the final product. dependencies (such as GPUs or SSDs).
Dependencies, for instance, can link a
program to a particular operating system.
Efficiency More tools must need.
All the developers can organize their work Apps that are cloud-native generally really
load on using this. Schedule is the great on more tools. This is the combination of
way to on that. Automatically it will be can more tools. Without one tool its not be
set to work. developed.
Portability
On this Developers can individually
optimize each microservice to provide the
best end-user experience because
microservices are autonomous.
Low impact updates
The availability of the application can be
maintained as developers update a single

33 |

Downloaded by Aruna Piyumi ([email protected])


lOMoARcPSD|43701029

service or add new features using


microservice architectures.

The great examples for cloud native software architectures are Aws, Azure, Google cloud
platforms etc.

Artificial Intelligence and Machine learning: Although the terms artificial intelligence
and machine learning are frequently used synonymously, machine learning is actually a
subset of AI. Although AI may seem like science fiction to some, it is one of the trends in
software development that is expanding the fastest. Additionally, applications for AI and
machine learning are no longer limited to HiTech. Modern software has tapped into the
enormous computational and predictive capabilities of Machine Learning and AI,
particularly in the FinTech sector.

In development process now, most software engineers used AI. If you have a problem
about code or something AI helps to you fix that. There are many frameworks for useful to
develop AI. Below I mentioned some AI frameworks to help software engineering.

Scikit Learn: This is the one of most well-known ML libraries. It underpins many
administered and unsupervised learning calculations. Precedents incorporate direct and
calculated relapses, choice trees, bunching, k-implies, etc. (Sayantini, 2022)

Ensorflow: This AI framework is the mostly useful for voice picture recognizing
applications. Google is used this framework to develop their most applications.

The exciting part about Tensorflow is that we can set up and maintain running on either
your CPU or GPU when you create a program in Python. Therefore, to continue using
GPUs, you do not need to compose at the C++ or CUDA level.

PyTorch: This is a Facebook-developed AI system. Its source is available on GitHub and


has more than 22k ratings as of this writing. Since 2017, it has gained a lot of momentum
and is currently experiencing relentless growth. (Sayantini, 2022)

34 |

Downloaded by Aruna Piyumi ([email protected])


lOMoARcPSD|43701029

Google ML Kit: Google's machine learning beta SDK for mobile developers, known as
Google ML Kit, aims to make it possible for developers to create customized features for
Android and iOS phones. This is operated by App-based APIs. These include functions
like picture labeling, face and text recognition, barcode scanning, and more.

On software engineers used lots of AI Frameworks such as Open NN, H20, MxNet, Keras
for develop machine learning things.

On this also had advantages and disadvantages. Below table is showing on those things.

Advantages Disadvantages
Help for Reduce Human Error High cost
Using AI framework can automatically fix These AI Frameworks are highly cost.
human errors. This is help to fix big errors Users must need to paid. Open source AI
on earlier development stage without frameworks are limited some features and
wasting time. company wise we should need to pay more
money to activate some features.
Support Available 24x7 Risk for data saving: Some frameworks,
You can access those frameworks anytime. our data is only saved on framework
Because its not shutdown or something. If providers servers. If server goes to be down
someone need to work ai frameworks are it will harm on our data.
available in 24x7.
Get fastest decision. Directly impact for human thinking
Sometimes get the decision is hard to Still human brain is the most powerful
human brain. On this point we can get help thing in universe. But using framework its
to support to AI Framework. Using AI, we affect on human thinking. AI is not help for
can get fastest decision without wasting out of the box thinking peoples.
our time.
Help for repetitive jobs High unemployed risk
Using AI its affect for employees. Because
all stuffs are going through a AI, company

35 |

Downloaded by Aruna Piyumi ([email protected])


lOMoARcPSD|43701029

We can used AI machine learning stuffs for does not hire employees. Its really harm for
some job careers. Its help for company employers and its increase unemployment.
wise to not hiring employees.

The great examples for AI develop software are Content DNA platforms, JuPyter
notebook, Google cloud AI platforms and Azure machine learning studio etc.

Microservices: Microservices are one of the most exciting technologies in software


development to watch. A distinctive way to organize an application so that each feature
and function is a separate component is through the use of microservices. Developers can
scale particular features independently of one another using this structure. Additionally,
even if one component fails, the rest of the application can still run smoothly.

Microservices improve software management and maintenance in addition to performance.


Additionally, developers can make portions of an application available to users while they
work to improve the software's other features. Microservices improve communication
between an application's components and the efficiency of development and deployment.

Most of them are used JAVA to develop those tools. There are so many tools developed
by using micro services.

Docker: This is a program's code and dependencies are packaged together in a common
format known as a "Docker container," which makes it possible for the application to
execute swiftly and consistently across a variety of computer environments. A Docker
container is a well-known, compact, standalone executable file that contains all the
necessary libraries, system tools, code, and runtime to run an application. Developers may
swiftly create, test, and deploy containerized applications using the Docker software
platform.

36 |

Downloaded by Aruna Piyumi ([email protected])


lOMoARcPSD|43701029

Kubernetes: Kubernetes (also spelled “K8s”) is an open-source software platform used to


manage containers. Using automation, it takes care of the manual engineering effort in
deploying container-based applications at scale.

Kubernetes has awareness of both applications and infrastructure requirements, reducing


operational complexity and making it location-independent. (CISCO, 2020)

Apache Kafka: Numerous businesses use the well-known open-source Apache Kafka
distributed event streaming platform for high-performance data pipelines, streaming
analytics, data integration, and streaming data for mission-critical applications. In 2011,
Apache Kafka was developed by LinkedIn and given to the Apache Foundation. It is now
the go-to open source technology for large-scale data streaming.

This one is made up of servers and clients that communicate with one another using the
fast TCP network protocol. It may be set up both locally and in cloud environments on bare
metal hardware, virtual machines, and containers.

RabbitMQ: The first of its kind program, RabbitMQ, allows asynchronous


communication to take place between two systems with various throughputs. It has long
been difficult for various systems to communicate with one another. Different protocols
specify how communication is transported.

Examples include SMTP, FTP, HTTP, and others. TCP/UDP is the foundation of these
communication technologies. They only deal with data formatting and determining who
should receive a message. When we require a middleman to accept the job while receiving
the message. In this case, RabbitMQ is utilized.

37 |

Downloaded by Aruna Piyumi ([email protected])


lOMoARcPSD|43701029

Activity 2

2.1 Cryptocurrency Introduction


Cryptography is used to safeguard and authenticate transactions, as well as to regulate the
generation of new units, in cryptocurrencies, which are digital or virtual assets intended to
function as a means of exchange. Cryptocurrencies are decentralized and run on the
distributed ledger technology known as blockchain, which is a network of computers that
keeps track of all transactions. Although Bitcoin was the first and most well-known
cryptocurrency, there are now thousands of other cryptocurrencies in use.
Cryptocurrencies, which are not backed or issued by governments like traditional money,
have grown in popularity as alternative investments and as a method of paying for goods
and services.

2.1.1 History
The first attempts to establish a decentralized digital money using encryption were made
in the late 1990s, which is when cryptocurrency first emerged. However, the idea of
cryptocurrencies didn't start to acquire mainstream acceptance until the launch of Bitcoin
in 2009.

Using the alias Satoshi Nakamoto, an unidentified person or group of people invented
Bitcoin. Nakamoto described a peer-to-peer electronic cash system that would do away
with the need for middlemen like banks in a white paper that was published in 2008. The
Bitcoin network became operational in January 2009 after the initial Bitcoin client was
made available and the "genesis block" was mined.

The concept of cryptocurrencies gained popularity during the following few years, and an
increasing number of programmers and business owners started investigating the potential
of blockchain technology. This sparked the development of several additional
cryptocurrencies, including Ethereum, Ripple, and Litecoin, among others.

38 |

Downloaded by Aruna Piyumi ([email protected])


lOMoARcPSD|43701029

The value of Bitcoin and other cryptocurrencies rose in 2017, which resulted in a
substantial influx of new investors and an uptick in media coverage. However, this trend
was short-lived because prices fell later that year and have since seen high volatility. In
spite of this, many experts think that the technology underlying cryptocurrencies has the
potential to transform the financial sector and displace established financial intermediaries
because it has continued to develop and mature.

Many various cryptocurrencies are currently in use, and the industry as a whole is worth
billions of dollars. Cryptocurrency is a subject of strong curiosity and speculative activity
despite the difficulties and controversies that have emerged, and its influence on the
financial industry is only anticipated to increase in the years to ahead.

2.1.2 Distributed Ledger

A distributed ledger is a type of database that is shared, replicated, and synchronized among
the members of a decentralized network. The distributed ledger records the transactions,
such as the exchange of assets or data, among the participants in the network.

Participants in the network govern and agree by consensus on the updates to the records in
the ledger. No central authority or third-party mediator, such as a financial institution or
clearinghouse, is involved. Every record in the distributed ledger has a timestamp and
unique cryptographic signature, thus making the ledger an auditable, immutable history of
all transactions in the network. (Sloane Brakeville, 2019)

39 |

Downloaded by Aruna Piyumi ([email protected])


lOMoARcPSD|43701029

Figure 5: Distributed Ledger

In DLT history, the Roman Empire was home to a financial system that let people conduct
transactions across other empire-affiliated regions. Paper checks were used to further
explore distributed ledger in the Roman Empire, which improved updating and recording
of transactions. But the Byzantine Generals Problem, a conundrum, prevented the
widespread application of DLT (BGP).

Outside of the enemy's area are several generals strategically positioned with their different
forces. To reach a consensus, messengers and generals must communicate. But what if one
of the generals is dishonest and plots to stop the others from achieving their objective?
Leslie Lamport, Robert Shostak, and Marshall Pease discussed the conundrum in their
1982 study.

There are a Few types of Distributed Ledgers in Industry. They are also described as a
Distributed Ledgers category. Those are mentioned in below.

Public permission: Permits the deployment or removal of apps without the need for
notification, identity disclosure, or compliance with any application requirements. Nodes
that comprise the network and power its running apps must be asked to join. (Dickson,
2022)

40 |

Downloaded by Aruna Piyumi ([email protected])


lOMoARcPSD|43701029

Privet permission: This kind of network does not have decentralization. Apps must be
asked to join the network, and network nodes that operate such applications must also meet
standards or present identification documentation. On this Any party may be removed at
any moment and without notice.

Public non-permission: The most decentralized kind of network is this one. Applications
can be deployed in production or deleted without needing to give notice, declare their
identity, or satisfy any application criteria requirements. The network's nodes can also join
and participate freely and anonymously, typically in exchange for the network's native
cryptocurrency.

Privet non-permission: demands that programs that are already in use be given permission
to join the network and that their removal from it can happen at any moment without prior
notice. The nodes that make up the network and carry out the applications can join and
participate freely and anonymously, typically in return for the native cryptocurrency of the
network.

2.1.3 Different Type of Distributed Ledger Technologies


Now in modern world Distributed Ledger technologies used for various industries. Below
I explain what are that industries and different types of Distributed Ledgers.

Blockchain: It's one of the most well-liked DLTs available. A form of DLT known as the
blockchain stores transaction records as a chain of blocks in a ledger. The blocks are
composed of digital data. They typically consist of three different kinds of elements.
Consider a blockchain transaction as an illustration. Say someone transacted something.
The sender's time, date, and amount sent are all included in the transaction block. Along
with the block, the sender's details will be disclosed. However, the system will use your
particular "digital signature" rather than your real name to preserve your anonymity.

41 |

Downloaded by Aruna Piyumi ([email protected])


lOMoARcPSD|43701029

Figure 6: Blockchain works for Bitcoin

Hashgraph: This is allowing for the storing of many transactions with the same timestamp
on the ledger. All transactions are kept in a parallel framework. In this scenario, "Event" is
used to refer to every item in the ledger. Without blockchain, no node on the network will
have the ability to alter the data or transactions in this distributed ledger. It means that no
one can alter, delay, or take control of the transaction's workflow on the DLT system.

DAG (Direct Acyclic Graph): Although not a blockchain, the Directed Acyclic Graph is
a bold new member of the distributed ledger family. DAG was developed for alternative
for blockchain DL. Thus, this distributed ledger without a blockchain offers all the
advantages of a blockchain while also enhancing them. Although it's an alternative, the
structure of this ledger is very different. One of the key benefits of using the DAG
distributed ledger is the availability of fee-free Nano-transactions. Because the network
becomes more scalable as it expands.

Holochain: This is pleased to demonstrate the most recent advancements in digital ledger
technology. The platform's transition from a data-centric to an agent-centric strategy is the
most obvious difference. Because Holochain-DLT does not employ a global consensus

42 |

Downloaded by Aruna Piyumi ([email protected])


lOMoARcPSD|43701029

system, its scalability is almost infinite. Instead of only decentralizing network transactions
like Blockchain, it wants to also decentralize how nodes communicate with one another.
The network's nodes each run their own chains, enabling them to function independently
while still being a part of a bigger network that consists of thousands of other nodes.

And also, there had another type of DL calling as Tempo. Tempo is a new DLT variant.
Tempo's main advantage is that it can be used for both public and private modules without
any modifications.

2.1.4 Distributed Ledger Technology Pros and Cons

Distributed Ledgers are built with a new cryptocurrency thing. As a blockchain this method
is mostly used in crypto technology. Below I mentioned the What are the Advantage and
Disadvantage using distributed ledger.

Advantages Disadvantages
No single point failures are come. High cost
This DLT’s are connect with more then Ledgers are not a single point thing. This is
one point. On this advantage one single expandable thing. Whole DL must need to
point failure is come it’s not going to maintain. It will spend high cost on it. This
another point. This is the first advantage on will be affected on whole ledger stuff on
this. the network.
Reduce Frauds and scam. Speed Problem
Using distributed ledgers record every On every time this ledgers information is
transaction thing in every time. In someone going to nodes. Think about how much
doing a wrong thing its record every time information are going on in one minute.
on each single ledger. On this we can Many records are going through on this it
reduce frauds and scams. will be a slow-down.

Good Transparent. Changing uncertain regulation

43 |

Downloaded by Aruna Piyumi ([email protected])


lOMoARcPSD|43701029

On the ledger inside we can see what On DL inside regulations must need to
transaction are doing, how much update. This regulation will be changed
transaction are done and many more every time. Whole ledger end point must
things. Its help to good transparent things. need to update those regulation.
Because in ledger inside anyone can see all
the information.
Easy accessibility. No control
On this technology we can access any time This is not a one-pointed thing. Whole end
and any moment. pointed ledgers are free to handle. They are
no control in one ledger handler.

2.2 Blockchain Disruptive quality


Blockchain is an emerging and potentially disruptive technology that business scholars
have recently begun investigating. The first and most famous blockchain application is
Bitcoin. Its anonymous inventor, Satoshi Nakamoto released it in 2009 during the global
financial crisis. Their goal was to create a new kind of digital currency that was
decentralized and removed the control of governments, banks, and other traditional
financial institutions (sciencedirect.com, 2020)

This replace technologies are identified as a many-ways. That technologies are modified
in day by day. Anyone can involve those stuffs and used for many things. Below I
mentioned those technologies proving blockchain disruptive quality.

NFT: Using a blockchain, non-fungible tokens (NFTs) are assets that have been tokenized.
They receive particular identifying numbers and metadata that set them apart from other
tokens. Depending on how much the market and their owners are willing to pay for them,
NFTs can be traded and converted into fiat currency, cryptocurrencies, or other NFTs. To
create a token for an image of a banana, for instance, you may use an exchange. The NFT
may be worth millions to some people but nothing to others.

44 |

Downloaded by Aruna Piyumi ([email protected])


lOMoARcPSD|43701029

Say something about NFT history, NFT’s developed before they were widely used in
society. Quantum, created and tokenized by Kevin McKoy in 2014 on one blockchain
(Namecoin), was reportedly the first NFT sold. It was coined and sold on Ethereum in
2021.

NFT creating process calling as a Minting. On a blockchain, the NFT's data is kept track
of. On a broad level, the minting procedure comprises the creation of a new block,
validation of NFT data by a validator, and closing of the block. Smart contracts that handle
ownership and transferability of the NFT are frequently incorporated during this minting
process.

When a token is created, it is given a special identification number that is connected to a


single blockchain address. Every token has an owner, and the ownership details are made
available to the public. Even if 5,000 NFTs of the exact same thing are produced, each one
may be identified and separated from the others thanks to its special identifier.

Figure 7: NFT Minting Process

The Relationship of Blockchain and Fungibility as a financial standpoint,


cryptocurrencies are typically fungible, which means they may be traded or exchanged one
for the other. Like every dollar bill in US currency has an inherent exchange value of $1,

45 |

Downloaded by Aruna Piyumi ([email protected])


lOMoARcPSD|43701029

one bitcoin is always equivalent to another bitcoin on a particular exchange. Because of


their fungibility, cryptocurrencies can be used as safe transactional mediums in the digital
economy.

Because each token is distinct and unreplaceable, NFTs change the crypto paradigm and
make it impossible for two non-fungible tokens to be "equivalent." Due to the fact that each
token has a distinct, non-transferable identity that allows it to be distinguished from other
tokens, they are digital representations of assets and have been compared to digital
passports. They are also extendable, which allows you to join two NFTs to produce a third,
distinct NFT.

NFT Examples

Crypto kitties are the most well-known image of NFTs. Crypto kitties are digital images of
cats with distinctive identifications that were introduced in November 2017 and are stored
on the blockchain of Ethereum. Each cat is special and costs differently. They "reproduce"

Figure 8: Cryptokitty NFT Market

among one another, producing new offspring with different qualities and values from their
"parents." Fans of crypto-kitties built a following and paid $20 million worth of ether to
buy, feed, and care for them. Even more than $100,000 was invested in the project by some
fans.

46 |

Downloaded by Aruna Piyumi ([email protected])


lOMoARcPSD|43701029

The bizarre example of NFT is rock NFT. Clip art of a rock just sold for 400 ether, or about
$1.3 million. The transaction marks the latest sale of EtherRock, a brand of crypto
collectible that’s been around since 2017 making it one of the oldest non-fungible tokens
(NFTs) on the block. (CNBC, 2021)

Figure 9: Rock NFT Twitter

NFT Pros and Cons

Every blockchain stuffs not had a full of advantages. It’s had a 50% of advantages and
disadvantages. These NFT stuffs also had these. Below table I mentioned what is the
advantages and disadvantages of using NFT.

Advantage Disadvantages
Useful for represent ownerships Can be stolen
NFT is represent the unique ownership. If Taking a screenshot is a simple thing
someone buy NFT it’s represented his own anyone can do. Using that method any can
bran to the world. This was giving to stolen their NFT’s. After taking a
unique ownership to NFT buyer. screenshot we can change and reupload for
other purposes like represent logo etc.
Great method to licensing digital art. Unpredictable Market

47 |

Downloaded by Aruna Piyumi ([email protected])


lOMoARcPSD|43701029

NFT Art is a licence art anyone can buy. NFT market is can’t predictable. It is
It’s can buy as a digital but it’s gave unique change in every moment day by day.
digital art licence to the buyer. Sometime it’s a risk for traders who buy
NFT.
Fundraising project Harm to environment
NFT can used for to collect fundraising. As NFT is a blockchain based technology.
a fundraising person we can add value for Running Blockchain is a not easy. Its need
every spend on NFT fundraising project. to more power resources and electricity.
It’s a document less and useful for More machine power generates some
fundraising person in future. carbon to the environment. If NFT or
Blockchain based thing it will be
happening continually.
Good for future trading No revenue generates
Normal trading process will be going to Only NFT had gain and loss. They are not
money things. But as NFT it’s represent like as a traditional financial stuff like
whole digital art. If someone buy NFT stocks, bonds and real state extra. NFT
right now for cheap price in future it can be providers and owners not received any
trade. dividend, interest and rent. That’s the
reason why NFT is not generate revenues.

NFT is the emerging technology is based on block chain. In 2021 it’s become a huge
profitable asset on the cryptocurrency market. But in years later that market its going to
low. Day by day its going to low. This is the emergency technology common thing and
how NFTs future are works.

Crypto Mining: Blockchain networks use mining to create and validate new blocks of
transactions and secure the network. In the process, the so-called miners use significant
amounts of computational resources to create new units of cryptocurrencies, increasing
their existing circulating supply.

48 |

Downloaded by Aruna Piyumi ([email protected])


lOMoARcPSD|43701029

Bitcoin, Litecoin (LTC), and many other blockchain networks use the Proof of Work
(PoW) consensus algorithm for cryptocurrency mining. PoW determines how a blockchain
network reaches consensus across all the distributed participants without third-party
intermediaries. In addition, it solves the double-spend problem, preventing the network
participants from using the same funds more than once. (Binance, 2022)

The History of Crypto mining is going to 2009. The first mining was carried out using
CPUs when Bitcoin originally launched in 2009. Since there were only CPU miners
(software) available at the time, Satoshi's concept of "one CPU - one vote" was quite
practical.

Official Bitcoin miners were the first miners. It is available here. It should be noted that
the first and authorized CPU-based Bitcoin miner is Bitcoin Core. Right now, mining using
Bitcoin Core is essentially worthless. The first ASIC projects began to take shape in 2012.
Soon after, ASIC miners took control of the Bitcoin blockchain, rendering GPU mining
inefficient and useless.

Crypto mining process is happening on different ways. Mostly miners used GPU power
to mining process. Below I mentioned on different ways on crypto mining.

Individual mining process: Anyone can connect to the Internet and buy specialized
mining devices. In the early 2010s, this was more doable than it is now. However, new
currencies are constantly being created, and if they use the proof-of-work (PoW) approach
rather than the proof-of-stake (PoS) method, then mining may just require a standard
computer or a computer with a powerful GPU.

Example: GPU Mining

Mining Pools: In order to get a ton of mining equipment, organizations pool their
resources. Anyone can join the network by joining one of the public mining pools.

Example: Slush Pool, Pooling, viaBTC

Cloud mining: A monthly charge can be used to rent time on a cloud mining service. If
someone pay for it they can used their cloud for mining. The benefits on this cloud mining

49 |

Downloaded by Aruna Piyumi ([email protected])


lOMoARcPSD|43701029

is miner does not need to provide


machine power or electricity manually. All the resources are going
through a cloud base and anyone can use that method to mining.

Example: Pionex, IQ cloud mine, ECOS

Figure 10: Crypto (Bitcoin) Mining Process

Crypto Mining pross and cons

Crypto mining process is a huge process. Its depending on machine power hash rate. On
mining process also had advantage and disadvantages. Below I mentioned that things.

Advantages Disadvantages
Can make profits. High cost.
In mining process we can earn some If someone need to involve mining process
money using this process. After mining are it must need high end devices. Because
done we can exchange our coins to us high end devices expensive. That’s the
dollars using crypto exchange wallet. reason why this process had high cost.
Anyone can do. Decrease device lifespan.
If someone have good computer anyone On the mining process GPU poweris the
can mine. We can share our computer for latest trend. If someone have high end GPU

50 |

Downloaded by Aruna Piyumi ([email protected])


lOMoARcPSD|43701029

mining platform.After that we can mine its help to get more hash rate. More hash
crypto. rate provide more profits. But using GPU
mining decrese the GPU life span
continusly. It also affect other devices.
Usefull for payments. Cyber attack Risk.
If someone mine crypto, it can be used for Mining process must need internet
our payments. Nowdays most of countries connection. Because mining software
enable crypto payments. This one is useful connect our device to their blockchains.
for payments in future. This software must need administrator
rights. Anyone can do anything via using
internet. That’s the huge risk in mining
process.

2.3 Modern Development of Blockchain


Blockchain is the latest technology combine with margining technologies. Recently, it will
connect all the other technologies. This structure-based technology is changed year by year.
Below the modern development technologies based on blockchain.

Supply chain Management: Supply chain management (SCM) is the process of managing
the complete production process, from the procurement of raw materials to the delivery of
the finished good or service to the customer. On the other hand, current SCM systems are
handled by software, from the production of products and services, warehousing, inventory
management, order fulfillment, information tracking, and product/service delivery to after-
sales services.

The digital supply network, which combines data and information from multiple sources
to deliver goods and services along the value chain, is incorporating modern technology
like artificial intelligence (AI), robotics, and blockchain. (COSTANTINE, 2022)

Compared to Blockchain and other financial blockchain applications, which might be


public, supply chain networks based on blockchain may require a closed, private,

51 |

Downloaded by Aruna Piyumi ([email protected])


lOMoARcPSD|43701029

permissioned blockchain with a limited actor pool. A more diverse group of relationships
might still be possible, though.

Four major actors’ registrars, standard organizations, certifiers, and actors play roles in
supply networks built on blockchains:

Registrars: This people provide network actors with unique identities.

Standard organizations: These groups create technical specifications for blockchains and
standards programs like Fairtrade for supply chains that are environmentally sustainable.

Certifiers: This authorize people to participate in supply chain networks.

Actors: To maintain the credibility of the system, participants or actors including


producers, sellers, and purchasers must be certified by a recognized auditor or certifier.

The value chain's overall transparency is improved since the parties involved must satisfy
a smart contract requirement before a product is transferred (or sold) to another actor to
confirm the exchange of products or services, and the blockchain ledger is updated with
transaction information once everyone has satisfied with their obligations.

Furthermore, blockchain technology publicly specifies the product dimensions for nature,
amount, quality, location, and ownership. Customers can now see the continuous chain of
custody and transactions from the initial purchase to the final sale, doing away with the
need for a trustworthy central organization to manage and maintain digital supply chains.

Enhance traceability of Supply chain is the One of the key advantages of blockchain-
driven supply chain innovations is traceability. Transactions take place in real-time because
blockchain is made up of decentralized, open-source ledgers that store data that is
reproducible by users.

52 |

Downloaded by Aruna Piyumi ([email protected])


lOMoARcPSD|43701029

As a result, the blockchain may be used to create a supply chain that is smarter and more
secure since it enables the tracking of products through a thorough audit trail with nearly
simultaneous visibility.

There are few benefits of blockchain traceability provides. Below table is mentioned what
key members had these benefits.

Benefits
Consumer Inside of supply chain its help to consumer decision making.
Retailer Provide authenticity of our products
Wholesaler Can manage stocks with real data
Logistic Can find automated real time logistic tracking updates
Regulator Can easily control the quality of the supply chain.
Manufacturer Manufacture can measure and reduce the environmental impacts.
Supplier Ethical resource ensured

The future of supply chain is new technology we can faced on future. Supply chain
management use cases for blockchain technology have the ability to address issues with
conventional supply networks, such as the need to do away with onerous paperwork.
Moreover, organizations' digitalization of physical assets and a decentralized,
unchangeable record of all transactions can make it feasible to track products from the
manufacturing facility to the delivery destination, providing a more transparent and visible
supply chain.

Cloud Integration Single Sign Out Concept: Single sign-on (SSO) is a session and user
authentication service that permits a user to use one set of login credentials for example, a
username and password to access multiple applications. SSO can be used by enterprises,
small and midsize organizations, and individuals to ease the management of multiple
credentials. (Teravainen, 2022)

53 |

Downloaded by Aruna Piyumi ([email protected])


lOMoARcPSD|43701029

Cloud single sign on (SSO) makes it simple for users to access cloud applications by
allowing them to log into all of their cloud applications using a single identity a single set
of login and password credentials. Cloud SSO solutions save IT management costs and
password fatigue by keeping a single identity for all cloud apps.

This was decentralization process. Having decentralization process it can be implemented


blockchain technology on it. If authorized one have a correct login password they can enter
the network without any of limitation. This process is simply display on below image.

Figure 11: SSO Process

We can used software to implemented SSO concept. There is few famous software had to
support Cloud SSO. They are mentioned in below.

Okta Single Sign On: A fully functional single sign-on solution is available from Okta. It
is completely customizable and integrates with all of the user's web and mobile
applications. Users may easily utilize one account across mobile and desktop because to
its device compatibility. In addition, Okta offers self-service password reset, allowing users
to gain access to accounts right away and sparing administrators from having to deal with
time-consuming support tickets for password reset. Adaptive authentication, which secures
access for all users with context-based two factor authentication, is also a feature of Okta
SSO.

OneLogin Secure: By using the OneLogin platform to validate identity across all of your
accounts, single sign-on with OneLogin enables users to securely connect to numerous
54 |

Downloaded by Aruna Piyumi ([email protected])


lOMoARcPSD|43701029

applications with only one username and password. Users of OneLogin can access a single
sign-on portal that lists all of their corporate and personal accounts and allows them to log
in using their OneLogin credentials. To make sure that only authorized users have access
to the correct data, administrators can install multi-factor authentication across all of a
user's corporate accounts.

RSA Secure ID: Access management and multi-factor authentication are offered by RSA.
Organizations may consistently and centrally enforce dynamic risk-driven access controls
thanks to RSA SecurID access' main feature. Single Sign-On and adaptive multi-factor
authentication are used to deliver this. It enables customers to manage all of their accounts
through a single web-based interface, increasing productivity and simplifying user access.

Microsoft Azure Active Directory: IT administrators utilize Active Directory to automate


the provisioning of users onto cloud applications, which helps save admins' time and makes
life easier for users by allowing them to log into various applications with a single Office
365 account. With Azure AD, administrators may impose multi-factor authentication and
safeguard user identities.

There are had some advantage and disadvantage to using SSO. Below table is revealed on
those things in side by side.

Advantages Disadvantage
Easy to memorize Security risk
On SSO concept passwords are can easily On SSO it’s using one single sign in
to memorize. Because we used one and concept. All the login details are based on
only password to access the network. We one password and user name. Anyone
do not want to memorize the separate using this user name and password to
password on access the network. misleading it had huge security risk.
Can be Implement easily. Extra strong password required
This is the one-time password. Its can be Giving one login password can do anyone.
implement without any problem. But this SSO process we must need to
make strong password. Because without

55 |

Downloaded by Aruna Piyumi ([email protected])


lOMoARcPSD|43701029

using strong password it’s has huge risk to


hack. That’s the reason why it’s required
an extra strong password.
Reduce the cash load Limited web apps
On using this we can reduce the cash load. SSO applications had many apps. Login
Because, many of passwords are running it using SSO its help to access all the apps on
must need to many loads. One SSO is inside. But these apps are limited. All the
applying its reduce the cash load. SSO platforms are made for specific task.
Anyone wants to work beyond the giving
task it required to install another
application out of the SSO.

2.4 Blockchain Algorithms

Blockchain is quite a complicated concept in technology, especially with its various


advantages dictating its popularity. It offers the assurance of a highly secure, distributed,
and transparent exchange of information or money between two parties. However, many
people have doubts regarding the ways in which blockchain ensures security for all
participants.

This is where you need to look at algorithms used for blockchain security. Blockchain
depends on cryptography and consensus mechanisms along with other algorithms for
establishing strong security. (Geroni, 2021)

Below I mentioned which Blockchain algorithms are using on protect the security.

Cryptography Algorithms: Blockchain is a continuously expanding database of records,


and new blocks are continuously added to the list. It will be challenging to guarantee that
all the data on the blockchain is secure from any unwanted threats as the network expands.
One of the essential conditions for the blockchain is cryptography.

56 |

Downloaded by Aruna Piyumi ([email protected])


lOMoARcPSD|43701029

It provides a framework for customizing protocols and approaches to prevent third parties
from accessing and obtaining data included in private messages during a communication
session. The goal of a cryptography algorithm is to make it impossible for a third party to
eavesdrop on confidential communications sent over a blockchain network.

Figure 12: Cryptography Algorithm

In above picture the inside of the file showing the real text. Using algorithm, it will convert
into the encrypted file. If someone want to see the original file we must need to the original
encryption key to unlock the original file. This was the Cryptography algorithms example
in real world used. Also, Digital Signatures and Hashing methods using Cryptography
algorithms to secure their blockchain network.

P2P Network Protocol: Peer-to-peer network algorithms are decent alternatives for big
businesses. Massive volumes of user or personal data are stored by centralized, single
devices in large organizations.

As a result, it shows clearly a single point of failure in the case of any security threat, poor
management, or data loss. Blockchain effectively addresses the single point of failure issue,
greatly enhancing security. The blockchain's structure gives nodes the authority to verify
transactions' legitimacy without the use of a middleman. BitTorrent is the great example to
P2P network and below picture is showing how P2P is worked.

57 |

Downloaded by Aruna Piyumi ([email protected])


lOMoARcPSD|43701029

Figure 13: P2P Protocol Example - BitTorrent

Considering about picture if some one downloads the file using torrents it’s connect to the
other people who are download the same file. That’s are calling as a seed. Maximize the
seeds is better to get the good download speed.

All the torrent clients are identified as a P2P Network protocol and BitTorrent is the best
example to help to connect our pc to P2P Protocol.

Zero Knowledge Proof: Zero-Knowledge Proofs are a famous example of a blockchain


algorithm used for security on blockchain networks (ZKPs). Zero-knowledge proof enables
one party to reassure another party of the veracity of information and truly acts as a
consensus decision-making process. The 'prover' of ZKP algorithms doesn't have to reveal

58 |

Downloaded by Aruna Piyumi ([email protected])


lOMoARcPSD|43701029

any information, which is a key factor in their efficiency.ZKP provides enhanced security
by utilizing cryptographic methods to the fullest extent possible to ensure that the prover
is not required to reveal information about the transaction. On the other hand, the other
party may be aware of the veracity of the information the prover possesses. Hence, ZKP
algorithms can protect blockchain's decentralized character while preventing any
transaction-related disclosures.

Figure 14: Zero Knowledge Proof Example

The advantage and disadvantages are zero knowledge proofs are also had. These are the
few of that.

Pros Cons
Simple Intensive
This one doesn’t need any complex Zero-knowledge proofs typically
cryptographic algorithms or methods. require 2,000 computations per
transaction, translating to significant
computing power
Private Vulnerable
don't need to divulge any Zero-knowledge proofs, as with
personal or identifying data to verify all cryptography, could be vulnerable to

59 |

Downloaded by Aruna Piyumi ([email protected])


lOMoARcPSD|43701029

information. quantum computing breakthroughs.


Secure Permanence
The information is never transferred If the originator forgets the
between parties, eliminating the potential information, the data could be lost forever.
for theft or loss.

Consensus Algorithm: Blockchain distributes power across network users. Before a


transaction can be included in a block, the majority of network users must agree on it. In
this situation, consensus algorithms provide the capability of achieving consensus on a
certain data value across distributed systems and processes.

The most frequently chosen algorithms for blockchain security are consensus algorithms.
They assist various blockchain network users in reaching agreement or consensus over the
current data state in the ledger. In distributed computer systems, consensus techniques are
also useful for determining whether peers may be trusted.

Blockchain networks depend on consensus algorithms because they support the security
and integrity of distributed computing systems.

2.5 Blockchain Industry

The potential benefits of blockchain are vast. Furthermore, there are many diverse use cases
for blockchain technology, including supply chain, healthcare, government, insurance,
banking, real estate, and many more.

Although blockchain was once solely thought to be useful in the banking sector, it has
begun to disrupt a variety of other businesses as well. We currently have a large number of
solutions that are either in the enterprise or are currently in the pilot stage.

Below I mentioned which industry and company using blockchain technology right now.

60 |

Downloaded by Aruna Piyumi ([email protected])


lOMoARcPSD|43701029

2.5.1 Health Care


The new technology and the healthcare industry have a lot more in common than most
organizations think. It should come as no surprise that the global blockchain market for
healthcare could reach $5.61 billion by 2025. Using blockchain technology could help
tackle major problems in the healthcare business, costing us hundreds of billions of dollars
annually.

According to a BIS Research analysis, the healthcare industry might save up to $100 billion
annually by 2025, thanks to blockchain technology. Reduced costs for data breach-related
expenses, IT costs, operations costs, support function and staff costs, counterfeit-related
frauds, and insurance frauds are responsible for these savings.

In real world these blockchain technologies are running in to below health companies.

Change health care: One of the major corporations using blockchain technology is
Change Healthcare. Indeed, they are working on the Intelligent Healthcare NetworkTM,
which is powered by Hyperledger Fabric. In any case, they can manage patient claims and
track their status in real-time thanks to the platform. As a result, the system can readily
audit, foster, and increase user trust.

FDA: The FDA is also developing blockchain-based healthcare solutions. In order to


safeguard healthcare data, they are now using Hyperledger to power a platform. they can
protect electronic medical records, genomic data, and clinical trials with this platform
(EMR).

Also, Pfizer and Centers for Disease Control and Prevention companies used blockchain
technology to their daily works.

2.5.2 Insurance

The insurance ecosystem is growing rapidly, yet with this expansion come new issues.
Blockchain can be a great answer for the insurance industry, helping with fraud detection,

61 |

Downloaded by Aruna Piyumi ([email protected])


lOMoARcPSD|43701029

reducing the amount of risk associated with underwriting, or improving cyber insurance
plans.

By 2023, the global insurance blockchain market could reach $1.39 billion. By promoting
information sharing, automating procedures, and lowering expenses, blockchain
technology can help reinsurers save up to $10 billion while lowering risk and costs. It
makes sense that 65% of insurance executives thought that DLT adoption was necessary
for their company to stay competitive.

In real world insurance companies apply blockchain to inside of their environment. Below
I mentioned the one of the top companies who applied blockchains.

AIA: Another significant business utilizing blockchain for insurance is AIA Group. In
reality, the company started for bancassurance solutions with the other partnered banks.
This platform will utilize the potential of blockchain and keep sharing supporting
documents and policy data in real-time in a secure communication channel.

AIG Company: AIG, a company that uses blockchain technology, is one of the publicly
traded companies. They currently collaborate with International Business Machines
Corporation to create a smart insurance platform. They can finally address all the intricate
issues with foreign insurance thanks to the platform.

MetLife: One more of the large companies utilizing blockchain based is MetLife. Actually,
LumenLab is MetLife’s Singapore based incubator company, and they are collaborating
with NTUC Income and Singapore Press Holdings (SPH) for creating Lifechain.

Also, there are other finance companies like AIG, Aegon and Prudential Finance used
blockchain technology to increase their productivity.

2.5.3 Supply Chain

Supply chain management is quite complex and involves a lot of data. It's mostly because
paper-based record-keeping is still widely used, notably in the marine industry, which

62 |

Downloaded by Aruna Piyumi ([email protected])


lOMoARcPSD|43701029

makes up a sizable portion of the global supply chain. There are still significant digital
transformation efforts needed for the supply chain management sector.

The COVID-19 pandemic's recent supply chain interruptions have cost businesses in the
sector a lot of money. But, at the same time, it has presented itself as a great potential as
well, as underlined by a number of worldwide corporations

Few of worldwide companies uses blockchain technology to their companies.

Unilever: The list of businesses using blockchain in the supply chain also includes
Unilever. Actually, Unilever is managing its tea sector with technology at the moment.
They will monitor all of their supply chain transactions with the aid of technology.

Additionally, they can monitor the suppliers to ensure quality at every stage of the process.

Walmart: Walmart has long been interested in blockchain technology. In reality, the
business is supporting their supply chain process with IBM's Hyperledger Fabric platform.
Additionally, they intend to follow the provenance of their items all the way back to the
farmers and encourage buyers to do the same before making a purchase.

De Beers: Another business using blockchain in the supply chain is DE Beers. They
developed the blockchain platform Tracer to aid in the regulation of their supply chain
management system. More so, on this platform, you can track any size of diamonds from
the mining site to the retail store. In fact, it's a fantastic technique to demonstrate the
authenticity of DeBeers' diamonds.

2.5.4 Finance and Bank


Blockchain offers several advantages in terms of transparency, security, and better record-
keeping in the financial and banking sector. It makes it the ideal option for banking needs
like fraud protection, client onboarding, and anti-money laundering. The obvious use is
monitoring, as blockchain's digital nature enables transparency, improved traceability, and
quicker analysis.

Another choice may be to share distributed ledgers with regulators, which would save time
by removing the need to write reports while also making it easier to spot dangers. Using

63 |

Downloaded by Aruna Piyumi ([email protected])


lOMoARcPSD|43701029

blockchain will facilitate automation, which will result in lower procedure costs and faster
decision-making.

In finance there are few companies using blockchain technology to their companies. Below
is mentioned the famous world companies using blockchain in their bank and finance
works.

HSBC: By the end of March 2020, the bank HSBC intends to implement the blockchain-
based platform. They will transition even more from their current paper-based records to
the fully digital and decentralized Vault platform. As a result, their investors can finally
monitor their funds in real-time. Also, it will include private features.

Visa: This was one of the companies with blockchain technology that did come a long way
in the niche. Previously in 2016, they presented a blockchain platform that would deal with
business-to-business payment services. Nonetheless, it took them time to get the project
live. By the end of 2019, they hoped to cover 90 markets that the firms can payments to.

BBVA: One business using blockchain technology in the financial industry is BBVA. With
this amazing technology, Red Electrica Company and BBVA just finished a syndicated
loan. Supposedly, the €150 million acquisition was funded by MUFG, BNP Paribas, and
BBVA. Furthermore, using BBVA's blockchain platform, the loan was disbursed in record
time.

2.5.5 Energy

One of the major concerns of international governments today is access to affordable


renewable energy. Low-carbon technologies receive close to 80% of public research and
development funding, and this number is increasing. Global energy consumption decreased
by 4.5% in 2020 because to the COVID-19 epidemic, but it increased by nearly 5% in
2021.

The energy markets are being seriously disrupted by blockchain-based solutions. These are
some of the possible benefits of blockchain-based solutions for the energy sector.

64 |

Downloaded by Aruna Piyumi ([email protected])


lOMoARcPSD|43701029

Automated invoicing for dispersed generators and customers may be possible with
blockchain-based technologies like smart contracts and smart meters.

Markets & Trading: Blockchain-based trading platforms may contribute to the


advancement of commodity trading, risk management, and forecasting as well as wholesale
energy markets.

Grid management: Blockchain-based solutions would naturally be helpful for data storage,
controlling smart grids, easing interactions between entities, and protecting data
transmissions.

Sharing of resources: The use of blockchain technology would be especially advantageous


for private and commercial offers to share the charging solutions, such as for electric
vehicles or future mobility solutions.

There are few world energy companies using blockchain technology to their production.

Shell: One of the energy businesses utilizing blockchain technology in the industry is Shell.
Shell intends to employ blockchain for crude oil trading, along with Sinochem Energy
Technologies Co Ltd and Macquarie.

Furthermore, they have previously investigated the technology for the oil sectors.
However, using the platform makes it simple to track the products, encourage transparency,
and stop fraud.

Siemens: Another business investing in blockchain for energy is Siemens. Furthermore,


the business recently stated that it wanted to innovate the energy industry. In any case, they
also have plans to expand the solution to include Electricity generating Services.

Chile’s National Energy Commission: The National Energy Commission of Chile will
record all of its energy sector data on an Ethereum-based network. It will be wiser to have
an unchangeable record as there are many inconsistencies in the energy business. To
leverage the open Ethereum platform for this, though, they are more than eager.

65 |

Downloaded by Aruna Piyumi ([email protected])


lOMoARcPSD|43701029

Beyond these things blockchain technology used for travel industry, government, IoT and
many industries. Applications for blockchain technology are expanding globally across. It
continuously updated daily and change in future.

2.6 Current Trends software engineering field with Blockchain

Blockchain technology has emerged as a disruptive force in the software engineering field,
enabling the creation of decentralized, trustless systems that can securely store and transfer
data and value without the need for intermediaries. Here are some of the current trends in
software engineering that are related to blockchain technology:

Decentralized Applications (dApps): One of the most significant trends in software


engineering is the development of decentralized applications or dApps that are built on
blockchain technology. These applications are designed to operate without a central
authority or middleman, and they leverage the inherent security and transparency of
blockchain technology to provide users with greater control over their data and assets.

Smart Contracts: Another major trend in software engineering is the use of smart
contracts, which are self-executing contracts that are encoded on a blockchain. Smart
contracts can be used to automate various business processes, eliminate the need for
intermediaries, and reduce costs associated with traditional contract management.

Blockchain-as-a-Service (BaaS): With the growing popularity of blockchain technology,


many cloud providers are now offering blockchain-as-a-service (BaaS) platforms that
allow developers to build and deploy blockchain applications quickly and easily. BaaS
platforms typically provide tools for managing blockchain networks, creating smart
contracts, and integrating with other systems.

Interoperability: As blockchain technology continues to mature, there is a growing need


for interoperability between different blockchain networks. Software engineers are
working on solutions that allow different blockchain networks to communicate and

66 |

Downloaded by Aruna Piyumi ([email protected])


lOMoARcPSD|43701029

exchange information securely, paving the way for the creation of more complex,
interconnected blockchain-based systems.

Privacy and Security: Finally, privacy and security are major concerns in the software
engineering field, and blockchain technology is no exception. Software engineers are
working on solutions that allow users to maintain their privacy while still leveraging the
benefits of blockchain technology. This includes the use of zero-knowledge proofs, multi-
party computation, and other cryptographic techniques to ensure the confidentiality and
integrity of data on a blockchain.

2.7 Blockchain Technology Research Feedback


In this I create a google form to collect real information about blockchain technology. This
survey participations are giving their real opinions about block chain technology. All the
questions are based on blockchain technology and below questions are asking on 7
participants.

How familiar are you with blockchain technology?

What are your thoughts on the potential of blockchain technology?

In which industries do you think blockchain technology can be most impactful?

What are the biggest challenges facing the adoption and implementation of blockchain
technology?

How likely are you to invest in blockchain-related ventures or cryptocurrencies?

What resources or tools do you think would be helpful for those interested in learning more
about blockchain technology?

Is there anything else you would like to share about your thoughts on blockchain
technology?

67 |

Downloaded by Aruna Piyumi ([email protected])


lOMoARcPSD|43701029

Results are generating like this. Those results are showing the exact knowledge about
blockchain technology in our people. These are the clearly showing question results easily
identify on blockchain technology.

1 - How familiar are you with blockchain technology?

In this results in blockchain technology 42.9% percentage peoples are said they are very
familiar about blockchain technology. This is the large portion about this survey. After that
we can identify people knows about blockchain technologies.

3- In which industries do you think blockchain technology can be most impactful?

68 |

Downloaded by Aruna Piyumi ([email protected])


lOMoARcPSD|43701029

Above results showing our participants think finance market is the most impactful industry.
They think Finance industry will impact on blockchain.

4-5 What are the biggest challenges facing the adoption and implementation of blockchain
technology And How likely are you to invest in blockchain-related ventures or
cryptocurrencies?

Challenging and investing is another question I include. On these results showing most of
the participants are like to invest. but they faced legacy system issues to on using
blockchain.

The final results are giving good idea about blockchain technology. Overall, most of the
participants are knowing about blockchain and they are like to learn about it. Measuring
all the results it helps to understand participants knowledge about blockchain.

69 |

Downloaded by Aruna Piyumi ([email protected])


lOMoARcPSD|43701029

2.8 Future Impact of Blockchain


Blockchain technology has the potential to revolutionize various industries and have
significant impacts on the future. Here are some of the potential impacts that blockchain
technology could have in the future:

Increased Transparency and Trust: One of the most significant impacts of blockchain
technology is the potential to increase transparency and trust in various industries.
Blockchain technology can provide a tamper-proof, decentralized record of transactions
that is transparent and immutable, making it easier to trace the movement of assets and
ensuring the integrity of data.

Disruptive Business Models: Blockchain technology can also enable the creation of
entirely new business models that are more efficient, cost-effective, and secure than
existing models. For example, decentralized marketplaces, peer-to-peer lending platforms,
and crowdfunding platforms are already emerging as viable alternatives to traditional
models.

Greater Efficiency and Lower Costs: Blockchain technology can also increase efficiency
and lower costs by eliminating intermediaries and reducing the time and resources needed
to manage complex processes. This could have significant impacts on industries such as
finance, supply chain management, and healthcare.

Improved Security: Blockchain technology can also improve security by providing a more
secure, tamper-proof way of storing and transferring data. With blockchain, transactions
are cryptographically secured, and the decentralized nature of the technology makes it more
difficult for hackers to compromise the system.

Improved Identity Management: Blockchain technology could also provide a more


secure and efficient way of managing digital identities. By using blockchain-based identity
systems, individuals would have more control over their personal data and could choose to
share specific pieces of information with others on a need-to-know basis.

70 |

Downloaded by Aruna Piyumi ([email protected])


lOMoARcPSD|43701029

Activity 3
All the information is summering in below presentation. This presentation is showing the
full summery about the blockchain technology. Information are showing on single point
form and anyone can understand what is the blockchain technology gave to our industry
and future.

71 |

Downloaded by Aruna Piyumi ([email protected])


lOMoARcPSD|43701029

72 |

Downloaded by Aruna Piyumi ([email protected])


lOMoARcPSD|43701029

Conclusion
Emerging technologies are rapidly changing the world we live in, and blockchain
technology is one of the most promising of these technologies. With its ability to provide
a tamper-proof, decentralized record of transactions, blockchain technology is poised to
disrupt various industries, from finance and supply chain management to healthcare and
identity management.

Blockchain technology has already demonstrated its potential to increase transparency,


trust, and efficiency while lowering costs and improving security. It has enabled the
creation of new business models, such as decentralized marketplaces and peer-to-peer
lending platforms, that are more efficient and cost-effective than traditional models.
Additionally, blockchain-based identity systems could provide a more secure and efficient
way of managing digital identities.

As with any emerging technology, there are challenges and risks associated with
blockchain technology. For example, scalability and interoperability issues, regulatory
concerns, and the potential for misuse and abuse of the technology are all areas that need
to be addressed as blockchain technology continues to evolve.

Despite these challenges, it is clear that blockchain technology has the potential to
transform various industries and have a significant impact on the future. As more
organizations and individuals adopt blockchain technology, we can expect to see new use
cases and applications emerge that will continue to push the boundaries of what is possible
with this powerful technology.

Due of its fundamental promise, blockchain technology has drawn the attention of
numerous companies. The potential of this cutting-edge technology has been investigated
in a number of industries, including finance, supply chain management, and healthcare.
Nevertheless, there hasn't been enough focus on the usage of blockchain in software
engineering. In order to identify the software engineering applications made possible by
blockchain, we conducted a methodical mapping study in this area.

73 |

Downloaded by Aruna Piyumi ([email protected])


lOMoARcPSD|43701029

This systematic mapping adheres to the recommendations made by Petersen et al. for
systematic mappings in SE. I found 22 pertinent papers after a thorough search and
selection procedure, and we then retrieved data from them under the headings of study
type, research topic, and contribution type. My findings point to a rising trend in studies
starting in 2023. While some research concentrated on leveraging smart contracts to
automate SDLC tasks, such as the acceptance phase, payments to software developers, and
compliance adherence, several studies focused on replacing centralized platforms, such as
GitHub, Travis CI, and cloud-based package managers. Furthermore, blockchain enables
reliable coordination and collaboration in the areas of distributed software development,
software provenance, and software integrity evaluation.

Researchers should produce more prototypes and proofs-of-concept because the use of
blockchain in software engineering is still in its infancy. This will help researchers better
grasp the benefits that blockchain may provide the SE industry. The use of blockchain-
focused SE applications by practitioners may be encouraged by increased research
activities on this subject. I present the following future directions based on this analysis:
Using smart contracts, automatically compare software requirements and design to
established acceptance criteria. look into the overall effects of blockchain on the
effectiveness and quality of software development. enquire about the alignAppl. ment
between agile concepts and blockchain principles analyze the features of various
blockchain systems and look into whether they can be used for SE use cases. examine how
blockchain 4.0 will affect software engineering and the demand for people with both
blockchain and software engineering expertise. The development and validation of a
blockchain-enabled framework for requirements management and traceability in
interorganizational software projects will be the main focus of our upcoming work.

74 |

Downloaded by Aruna Piyumi ([email protected])


lOMoARcPSD|43701029

In final conclusion, emerging technologies are shaping the future of our world, and
blockchain technology is at the forefront of this revolution. As software engineers and
innovators continue to push the boundaries of what is possible with blockchain technology,
I can expect to see significant impacts in various industries that will drive innovation,
efficiency, and transparency. While there are challenges and risks associated with
blockchain technology, the potential benefits far outweigh the risks, and it is an exciting
time to be part of the blockchain revolution.

75 |

Downloaded by Aruna Piyumi ([email protected])


lOMoARcPSD|43701029

References
AWS, 2022. What is Cloud Native?. [Online]
Available at: https://aws.amazon.com/what-is/cloud-native/#:~:text=The%20cloud-
native%20architecture%20combines,blocks%20of%20cloud-native%20architecture.
[Accessed 20 Jan 2023].

Binance, 2022. How to Mine Cryptocurrency?. [Online]


Available at: https://academy.binance.com/en/articles/how-to-mine-
cryptocurrency?utm_campaign=googleadsxacademy&utm_source=googleadwords_int&utm_m
edium=cpc&ref=HDYAHEES&gclid=CjwKCAiA_6yfBhBNEiwAkmXy51690rz2ouiCZZ8ahH1cSvFLQv
xxiUduhFBefxQ2F4twZixPUYtiZxoCgo4QAvD_BwE
[Accessed 15 FEB 2023].

CISCO, 2020. What Is Kubernetes?. [Online]


Available at: https://www.cisco.com/c/en/us/solutions/cloud/what-is-kubernetes.html
[Accessed 21 JAN 2023].

CNBC, M. S. -., 2021. Somebody just paid $1.3 million for a picture of a rock. [Online]
Available at: https://www.cnbc.com/2021/08/23/people-are-paying-millions-of-dollars-for-
digital-pictures-of-rocks.html
[Accessed 13 FEB 2023].

COSTANTINE, J., 2022. How is supply chain management utilizing blockchain technology?.
[Online]
Available at: https://thecryptostar.co/?p=19190
[Accessed 17 FEB 2023].

Dickson, E., 2022. What Distinguishes a Distributed Ledger From a Blockchain?. [Online]
Available at: https://www.thewatchtower.com/blogs_on/what-distinguishes-a-distributed-
ledger-from-a-blockchain
[Accessed 8 FEB 2023].

Gartner, 2021. IoT Platforms. [Online]


Available at: https://www.gartner.com/en/information-technology/glossary/iot-platforms
[Accessed 17 Jan 2023].

Geroni, D., 2021. Blockchain Security Algorithms Used To Protect The Blockchain Security.
[Online]
Available at: https://101blockchains.com/blockchain-security-algorithms/
[Accessed 28 March 2023].

Haiston, J., 2021. Smart Robots 101. [Online]


Available at: https://www.symmetryelectronics.com/blog/smart-robotics-101/
[Accessed 17 Jan 2023].

76 |

Downloaded by Aruna Piyumi ([email protected])


lOMoARcPSD|43701029

Sayantini, 2022. Top 12 Artificial Intelligence Tools & Frameworks you need to know. [Online]
Available at: https://www.edureka.co/blog/top-12-artificial-intelligence-tools/
[Accessed 20 JAN 2023].

sciencedirect.com, 2020. Blockchain as a disruptive technology for business. [Online]


Available at: https://www.sciencedirect.com/science/article/abs/pii/S0268401219306024
[Accessed 13 FEB 2023].

Sloane Brakeville, B. P., 2019. Blockchain basics: Introduction to distributed ledgers. [Online]
Available at: https://developer.ibm.com/tutorials/cl-blockchain-basics-intro-bluemix-trs/
[Accessed 2 FEB 2023].

SYDLE, 2022. Disruptive Technologies You Need to Know. [Online]


Available at: https://www.sydle.com/blog/disruptive-technologies-
61aa52868621853d1165bf07/
[Accessed 6 Jan 2023].

Teravainen, T., 2022. single sign-on (SSO). [Online]


Available at: https://www.techtarget.com/searchsecurity/definition/single-sign-on
[Accessed 17 FEB 2023].

York, S. U. o. N., 2022. The Basics about Cryptocurrency. [Online]


Available at: https://www.oswego.edu/cts/basics-about-cryptocurrency
[Accessed 18 Jan 2023].

77 |

Downloaded by Aruna Piyumi ([email protected])


lOMoARcPSD|43701029

Grading Rubric

Learning Outcomes and Assessment Criteria

Grading Criteria Achieved Feedback

LO1 Assess what Emerging Technologies are necessary and appropriate when designing software applications for the future

P1 Assess formats, characteristics and trends of


Emerging Technologies.

P2 Explore the advantages and disadvantages of


Emerging Technology.

M1 Evaluate the ability of Emerging Technology to


disrupt the status quo throughout industries,
markets, user adoption and established practices.

M2 Review various forms of Emerging Technologies,


focusing on their relevance to software development
and computing.

D1 Evaluate Emerging Technologies and

78 |

Downloaded by Aruna Piyumi ([email protected])


lOMoARcPSD|43701029

justify their use when designing software

applications for the future.

LO2 Research state-of-the-art Emerging Technologies and choose one you believe will have significant impact in the future

P3 Select a specific Emerging Technology.

P4 Review a specific industry and end user

group that will be the most influenced by this


Emerging Technology.

M3 Evaluate the benefits, features, advantages and


disadvantages of this Emerging Technology.

M4 Show how Emerging Technologies can converge


with existing technologies or replace them.

LO3 Discuss the current state and future impact of your chosen Emerging Technology

P5 Organise your research and findings.

79 |

Downloaded by Aruna Piyumi ([email protected])


lOMoARcPSD|43701029

P6 Contrast the benefits, features, advantages and


disadvantages of your chosen Emerging Technology.

M5 Relate how your chosen Emerging Technologies


can converge with existing technologies or replace
them.

M6 Develop a report of your research and findings.

LO2 & LO3


D2 Defend your choice of Emerging Technology in
relation to your belief it will have the most impact on
software application design and development in the
future.

LO4 Evaluate the political, economic and social factors which play a role in the competition between Emerging Technologies and their success
or failure in the future

P7 Evaluate your report findings and research.

M7 Arrange a presentation to demonstrate your


findings, gather feedback and answer questions.

D3 Critique the benefits, features, advantages and


disadvantages of your chosen Emerging Technology.

80 |

Downloaded by Aruna Piyumi ([email protected])


lOMoARcPSD|43701029

81 |

Downloaded by Aruna Piyumi ([email protected])

You might also like