What comes to your mind when hearing about night vision? It is a pretty simple term. It means the ability to see in a low-light or even dark condition. These days, almost CCTV or security cameras are equipped with the technology. Human’s poor biological vision is the reason behind a night vision technology was created. Goggles with its technologyare the most common equipment used to see in the dark. If you want to go somewhere or watching wildlife at night, then goggles are the best pick! But, how actually these amazing kits turn darkness into brightness?
How does it work?
There are two different ways of how this technology works, namely thermal Imaging and Image intensification.
It needs to capture the higher section of the light spectrum that is released as heat energy by objects rather than being reflected as light. By this capture, the temperature is easily detected. You may not be able to see in the dark, but you can feel the heat with high intensity. However, there are some disadvantages found with thermal imaging such as poor quality image, too expensive, and you can’t see the targeted objects if there are see-through obstacles in your field of view.
The image intensification method involves the implications of ambient light. It detects the low-level of light and after that magnifies it. When a tiny energy packet that makes up the light (photon) comes into an enhancer of an image, it will strike a layer called a photocathode to discharge electrons. Those electrons then will hit the second layer (microchannel plate) which increases the electrons before hitting the phosphor screen. Afterward, it will be converted back to produce light. Now there are many more electrons you will get for a brighter reflection. However, this method will fail if there is no sufficient beam for the thermal enhancer to notice by any means.
The technology was initially created for warfare. The military generally uses three major kits of night vision technology such as weapon scopes, goggles, and hand-held sighting scopes. Nowadays, the application of this technology is not only for the military but also for security. An NVD (night vision device) is lately also used by civilians such as EVS (enhanced vision system) which is used by aircraft to enhance the situational responsiveness of pilots to avoid accidents.
Another popular application is NVG (night vision goggles) a device with double eyepieces. It is combined with magnification lenses to forms binoculars. It can also be used in vehicles. A system called automotive night vision is utilized to improve the perception of a driver as well as seeing distance in poor weather or darkness. It typically uses infrared cameras which combined with the technique of active illumination to collect information to be displayed to the vehicle’s driver. The system is currently available in premium types of vehicles.
In a brief, the technology of night vision has many uses such as for law enforcement and military. Furthermore, it is also helpful for surveillance and navigation.
Do you remember a dream of a future where everything would be controlled wirelessly? Yes, this is it. The internet of things makes all of that happen with a system that is easy to use and everything is controlled remotely using everyday devices such as smartphones and so on.
You only need to connect the existing system with your smartphone and boom, everything can be controlled. This is the future promised by the internet of things.
The Internet of Things is able to provide solutions for wireless devices. This means that a system, whatever the system, will be remotely controlled. Herein lies the use of the Internet of Things.
Back to micro electromechanical, which is a device consisting of small electronics coupled with a small mechanical device, but on occasion it will be able to trigger a large operation. Call it a relay, light switch, and so on that can be controlled remotely. However, it certainly won’t stop there!
The Working Principal of the Internet of Things
The key to the working principle of the internet of things is to create a wireless connection and a simple interface between the system and the user. This system is always being developed so that it is easier for users to control the system which may be much more complex.
The internet of things around the world works using a similar system, which uses several elements of its founder which can be basically described in the following categories.
Robust Intelligence is intelligence created by programmers so that the system can understand what commands are meant by the user. This is the first key to internet success of things. Without artificial intelligence, the internet of things will not be possible.
Connection (Bluetooth or WiFi or Internet)
Without connectivity, of course it becomes impossible for dadu online users to be able to send command signals from their device to a receiving system, a system located far from it. This is the second key to the internet of things. Connectivity does not have to be so large or have a large bandwidth like a conventional internet connection. Since the command signal is a series of small signals, even a small connection is sufficient, as long as it’s reliable.
Sensors and Actuators
Sensors and actuators are sets of devices that will read the current condition of a system, and then report that condition to the user. Later, the user will use the condition information to make decisions related to what actions the system should take.
Interconnection is very much needed by devices, both system devices and user devices in order to create interconnected relationships. Notify each other when there are changes in conditions or changes in orders.
Companies want to verify all people who come and leave the building, to do this task; they utilize the technology called facial recognition. It is not new thing due to have been implemented years ago. It was started as the expensive tech. Today, you can get this one on smartphone, computer, and even local store.
In general, this tech is simpler than iris and fingerprint recognition. The basic principle is capability to recognize digital image resembles a specific person. It uses mapping so that the facial feature is verified. For your information, this tech is advanced version of similar platform that can validate color and picture.
At first glance, it looks very sophisticated. In fact, facial recognition is lower than fingerprint and iris ones. It is less invasive when implementing directly in real world. However, the adoption is quite difficult when the source image has low resolution. Today, camera and its app implement the basic facial feature to point the person when capturing photo.
Implementation of Facial Recognition
- Person identification or verification
The common use is person identification or verification. You have app on smartphone that requires verifying your face. The app uses this tech with guide how the photo must be taken. If users do not follow the procedure, the verification is failed. They start again until the photo is identified.
- Security measures
Facial recognition is useful for security measure. The latest smartphone replaces the old fingerprint scanner with this one. The phone will unlock when the security recognizes the face. The more advanced implementation is in public places such as stations, bus stop, airports. The system will scan all people on video that comes from security camera. It is part of surveillance to increase safety and avoid incident.
- Education and research
The next implementation is education and research. You can learn about digital image and facial verification. This tech is suitable to support research that requires facial properties such as archeology, psychology, education, judi online and some social sciences. Data collections become specific due to focus on certain images related with facial features.
- Criminal investigation
Another one is for criminal investigation. To recognize the suspect, law enforcement must get the video from security camera. After that, this tech will do scanning and find a match with the existing databases.
Issues Related To Facial Recognition
Facial recognition seems to be the practical and useful tech. More implementations will be available in the future. Several fields see this one with benefits. On the contrary, some issues arise that must be solved properly.
When devices scan the digital image contains people and their faces, this action may create privacy violation. Some of them do not like being scanning and verifying unless the urgent matter. That’s why the implementation of this tech will include the consent. If a person provides permission facial recognition can be implemented.
IT world continues to develop along with the development of the digital era. One of the jobs that is still relatively new is DevOps Engineer. These jobs are still in great demand by large companies. Then, what does a DevOps Engineer do? What are the duties and responsibilities to the company and to the product being released?
What is DevOps?
Before getting into the work, let’s first find out what DevOps is. DevOps is a set of practices that automate the process between app development and development teams
This is done so that they can build, test and release software faster and more reliable. In DevOps that has been running well, the resulting product is stable and has increased in value.
DevOps is very important in IT companies. Why? The reason is, one of the best practices in DevOps is to make small and fast product updates. In the IT industry, this can be called a minor or patch update.
By making small product updates, organizations or companies can innovate faster for their products. Apart from that, they can also rollback easily if a bug is found that hasn’t been touched by the automated testing or the QA team. With this practice, companies can monitor products and get the most valuable data, namely user data.
In essence, DevOps has a role to accelerate the development process by releasing a project that is being made into a product that will get feedback from end users.
Then, what are the benefits of DevOps for companies?
Speed up the application development process and reduce the risk of failure
When the Developer team has been given flexibility in deploying code, and rolling back the code itself, the developer is able to write code locally on the laptop and upload code to the test server.
After that, the QA / Tester checks and the developer uploads the code to the Production Server. This step is faster, more efficient, and reduces the risk of failure than if the Developer and Operations teams are separated. This is why having DevOps in a company is a lot more profitable for a long run.
A more productive team
By combining the Developer team with the Operations team, of course it will make them much more likely to collaborate and communicate more effectively.
This makes the two teams have one common goal, which is to be able to launch a feature or bug as quickly as possible to users. The aim is to create a sense of belonging and increase team productivity.
Lower human error rate
With the help of several tools used such as servers in the Cloud (AWS, GCP, Azure, etc.), Jenkins, Ansible, to Python, this profession can create a system where developers can just type 1 command to automatically upload their code to server, and so it is with the rollback.
The latest technology with significant improvement is cloud computing. The term may not be the new thing. In fact, you know about this one from business, office, school, company, even your own computer. People are wondering what the real meaning of this technology. If you do not have prerequisite understanding to know detail, it is better to start with the simple definition. After that, you learn more pros and cons. Technology is applicable due to it brings pros and cons. The last part will be the latest trend and the future of cloud computing.
What Is Cloud Computing
Cloud computing is the usage of computer and its resources including storage and data center to handle the task over internet. In fact, many experts might have various explanations when you ask them about this tech. They use cloud to represent something not you can get with hand.
You use internet and access the website including playing game and social media. The developers store the files in the hosting service based on their options. It can be shared hosting, vps, and dedicated server. Regardless platform, users only know they will get the content. You install server with database, software, and application. You can open document virtually via browser and edit without installing the app in your computer. Therefore, this is what the cloud computing supposed to be.
Users collaborate and manage the content then share with other. The file is not in their local disk but located in virtual storage such as dedicated server or just hardware virtualization computer from third party provider. You do not need to worry about hardware installation, data center, and technical things. As users, you just get the service based on data and apps that your company will use.
The simple example of this service is Google drive. It is started as cloud storage, which means you can save files over internet. This kind of service is similar to file sharing website. The different is the service is more dynamic. You not just save and upload but edit, send, and share. More importantly, you can work with this platform as equal as office.
Company can outsources all apps and software including data center and technology into third party service that provide cloud computing. People think this one is high risk due to all services and private data are not available at in-house server. It was past issue because the latest update provides security measures including privacy and legal aspects when using this service.
The Future of Cloud Computing
Cloud computing has various models and implementations. You order vps or virtual private server for personal use. It is also the most common example of this technology that one person can get. Some platforms are for public and community where everyone can access. On the other side, you also see specific order for cloud computing with hybrid model.
You often send message via email and the reply is much formal with the standard content. Company has system that will answer and reply all similar questions with automatic message. This is the foundation of chatbot. Unlike email, you communicate directly via application or online. The term refers to app, system, platform, and software that generate human-like conversation. The most sophisticated chatbot utilizes artificial intelligence that mimics human behavior, response, and attribute. You think the answer is from a real person.
Implementations of Chatbots
In general, this kind of technology has been around since the invention of telephone. In that time, companies received order and complaints from clients. After collecting data, they saw some repetitive questions and orders. To avoid answering the same question more often, an automatic system was developer. The next list shows some implementations you often find with chatbot.
The most common use of this technology is messaging app. Some developers create this app with automatic answering for several questions. Some popular apps have features to automate reply. On the other hand, you also see some software that generates human conversation.
The advanced implementation is virtual assistant. This one emerged when internet and communication integrated into human life. The simple example is music app that receive task from the owner and deliver it. You just say the word and the assistant will answer. The most sophisticated version is the assistant can handle complex tasks even project.
The practical use of chatbot is customer service. Company can reduces employees who handle complaints. Some calls have same content, which mean they will have the same response. On the other side, customer service still considers human attributes. When receiving answers, the content or message will look as if it comes from the real person.
The next implementation is in education field. More people use smartphone that can access internet with tons of app. This situation also changes the way of learning. You should install apps with valuable knowledge. To deliver the best learning experience, the app utilizes chatbot. It is useful when users cannot see or read at the moment. They rely on listening.
The next implementation is artificial intelligent. Automatic response and virtual assistant are the early adoption of AI. Even though they do not use complex algorithm, the purpose is relatively similar. Today, chatbot is added into AI system to do more than answer and help. It can analyze, decide, act, and do as human.
One thing you cannot forget is this technology becomes much entertaining to relax and enjoy. You see some entertainment, party, and anything for dun utilize chatbot. In general, this implementation depends on previous development. When virtual assistant and AI become more advanced, you also see the adoption in the entertainment industry.