Information technologies used in “swordfish”


Published on

Published in: Technology, Business
  • Be the first to comment

  • Be the first to like this

Information technologies used in “swordfish”

  1. 1. INFORMATION TECHNOLOGIES USED IN “SWORDFISH” By – Kevin Joseph MBA (Energy Trading) 500026236
  2. 2. Plot :  Swordfish is a 2001 American thriller film starring John Travolta, Hugh Jackman, Halle Berry.  The film centers around Stanley Jobson, an ex-con computer hacker who is targeted for recruitment into a bank robbery conspiracy because of his formidable hacking skills.
  3. 3. Multiscreen systems  It is the use of multiple physical display devices, such as monitors, televisions, and projectors, in order to increase the area available for computer programs running on a single computer system.  The system can be run by a single CPU or multiple CPUs  Multi-head may increase the productivity by up to 40-50%.
  4. 4. Super Computers  A supercomputer is a computer which increases processing capacityparticularly speed of calculation. These systems work in two ways :  In one approach is a large number of computers distributed across a network devote some or all of their time to solving a common problem each individual computer receives and completes many small tasks, reporting the results to a central server which integrates the task results into the overall solution.  In another approach, a large number of dedicated processors are placed in close proximity to each other; this saves considerable time moving data around and makes it possible for the processors to work together, for example in mesh architectures. Cray Titan – 17.59 PetaFLOPS
  5. 5. Supercomputers are used for a wide range of computationally intensive tasks in various fields.  Quantum mechanics.  Weather forecasting  Climate research  Oil and gas exploration  Molecular modeling  Aerodynamics  Counter-cryptography. NUDT Tianha – 33.86 PetaFLOPS
  6. 6. Radio dog collar  Used for tracking  Works on radio waves of particular frequency  Has to be in Line of sight  Can be used as a communication means also.
  7. 7. Servers  A server is a system that responds to requests across a computer network to provide a network service.  Servers are computer programs running to serve the requests of other programs, the clients. Thus, the server performs some task on behalf of clients.  Servers can be run on a dedicated computer, which is also often referred to as "the server", but many networked computers are capable of hosting servers. Typical computing servers are • Database server • File server • Mail server • Print server • Web server • Gaming server, etc.
  8. 8. Internet  It is a global system of interconnected computer networks that use the standard Internet protocol suite (TCP/IP) to serve several billion users worldwide.  It is a network of networks  Consists of millions of private, public, academic, bus iness, and government networks, of local to global scope, that are linked by a broad array of electronic, wireless and optical networking technologies.
  9. 9. Ciphering technology  Cryptography  Encoding and Decoding of Information  Military  Banks  Educational sectors(Exams)
  10. 10. Computer worms  A worm is designed to tunnel into your system and allow malicious users to control your computer remotely.  Does not require an action to spread  Can make multiple copies of itself. (E-mail)  Slows down computers n networks significantly.
  11. 11. Transatlantic Telecommunication Cable  A transatlantic telecommunications cable is a submarine communications cable running under the Atlantic Ocean.  All modern cables use fiber optic technology.
  12. 12.  Most such cables connect London, Englan d to New York City, USA  Built mainly for high- speed requirements of international financial transactions.  Financial trading firms spend billions of dollars annually to get an edge on trading
  13. 13. THANK YOU