SlideShare a Scribd company logo
1 of 23
Presented by ~ Sourabh Choudhary(18BEC1084)
Vivek Kumar(18BEC1086)
Saurabh Kumar(18BEC1083)
*
*
•Technology that will disappear in next 5 years
•Reason of disappearance
•Alternative
A keyboard is a typewriter-style device, which uses an arrangement of
buttons or keys, to act as mechanical levers or electronic switches.
Following the decline of punch cards and paper tape, interaction via
teleprinter-style keyboards became the main input device for
computers.
*
•Takes a lot of space.
•Durability
•We have to make efforts while typing.
*
Intelligence Voice Assistants
Cortana Siri Google Assistant
An intelligent voice assistant is a software agent that can perform tasks or
services for an individual. These tasks or services are based on user input,
location awareness, and the ability to access information from a variety of
online sources (such as weather or traffic conditions, news, stock prices, user
schedules, retail prices, etc.).
• Direct-to-Home (DTH) television is a method of receiving satellite
television by means of signals transmitted from direct-broadcast
satellites.
• India is the largest DTH market in the world by number of
subscribers.
• Some common DTH providers are Dish TV, Airtel TV,Tata Sky etc.
*
•Takes a lot of space.
•Get affected by weather conditions.
•Heavy installation charges.
•Limitation on HD channels.
*
Future of Watching TV
Chrome cast Apple TV Amazon Fire stick
Applications
*
•Mobile, directly connect with TV.
•Does not get affected by weather conditions.
•Can be access through TV as well as
smartphone.
The Global Positioning System (GPS) is a space-based satellite
navigation system that provides location and time information in
all weather conditions, anywhere on or near the earth where
there is an unobstructed line of sight to four or more GPS
satellites.
*
• All Source Positioning and Navigation(ASPN).
• More advanced Positioning.
• More reliable and accurate than GPS.
• Can also track particular person and can be
viewed in 3D.
• DARPA is developing sensors that “use signals of opportunity” such as
television, radio, cell towers, satellites, and even lightning, for real-
time tracking.
• The ultimate goal is to develop a compact navigation system that
could be given to soldiers, put on tanks or implemented in guidance
systems. For that, the sensors and circuitry have to be shrunk down
and designed to operate within a certain power consumption limit.
*
A telephone, or phone, is a telecommunications device that permits
two or more users to conduct a conversation when they are too far
apart to be heard directly. A telephone converts sound, typically and
most efficiently the human voice, into electronic signals suitable for
transmission via cables or other transmission media over long
distances, and replays such signals simultaneously in audible form to
its user.
*
•Not able to receive sms.
•Long distance calls are expensive without a
long distance calling option added to your
monthly service.
•Forwarding option also costs money without a
forwarding option added to your monthly
service.
•They are not portable.
*
Mobile Phones Smartwatches
*
• A remote control is a component of an electronic device used
to operate the device from a distance, usually wirelessly.
• A remote control can be used to operate devices such as a
television set, DVD player, or other home appliance, from a
short distance.
*
•Searching of TV remote, that is scarmbling
around your home throwing the cushions of
your couch here and there in the air looking for
the that mysterious remote.
•Fragile
*
Internet of things
• Television will know when to ON/OFF.
• Automatically adjust the sound level.
• Ac automatically detect presence & know temperature needed
inside the room.
*
A password is a word or string of characters used for user
authentication to prove identity or access approval to gain access to a
resource (example: an access code is a type of password), which is to
be kept secret from those not allowed access.
*
•Not secure.
•You usually forget your passwords.
•Replacing passwords is a difficult task as
nowadays people have a password for almost
but breaking them is not a big deal.
*
Biometrics
Fingerprint Iris biometrics Voice biometrics
*

More Related Content

Similar to Technology that will disappear after five years

Similar to Technology that will disappear after five years (20)

Mobile communication &computing
Mobile communication &computingMobile communication &computing
Mobile communication &computing
 
Wireless communication by abhishek mmahajan
Wireless communication by abhishek mmahajanWireless communication by abhishek mmahajan
Wireless communication by abhishek mmahajan
 
Basic Fundamental Electronics by D-Sarda PART V
Basic Fundamental Electronics by D-Sarda PART VBasic Fundamental Electronics by D-Sarda PART V
Basic Fundamental Electronics by D-Sarda PART V
 
Wireless devices by hm
Wireless devices by hmWireless devices by hm
Wireless devices by hm
 
MOBILE COMPUTING Unit 1.pptx
MOBILE COMPUTING Unit 1.pptxMOBILE COMPUTING Unit 1.pptx
MOBILE COMPUTING Unit 1.pptx
 
FIXED TELEPHONE, MOBILE TELEPHONE AND SATELLITE COMMUNICATION SYSTEMS
FIXED TELEPHONE, MOBILE TELEPHONE AND SATELLITE COMMUNICATION SYSTEMSFIXED TELEPHONE, MOBILE TELEPHONE AND SATELLITE COMMUNICATION SYSTEMS
FIXED TELEPHONE, MOBILE TELEPHONE AND SATELLITE COMMUNICATION SYSTEMS
 
Basics of Mobile COmmunication.pptx
Basics of Mobile COmmunication.pptxBasics of Mobile COmmunication.pptx
Basics of Mobile COmmunication.pptx
 
4g technology
4g technology4g technology
4g technology
 
1g to 5g technologies
1g to 5g technologies1g to 5g technologies
1g to 5g technologies
 
Mobile Communication.pptx
Mobile Communication.pptxMobile Communication.pptx
Mobile Communication.pptx
 
MOBILE COMMERCE UNIT-III PPT.pptx
MOBILE COMMERCE UNIT-III PPT.pptxMOBILE COMMERCE UNIT-III PPT.pptx
MOBILE COMMERCE UNIT-III PPT.pptx
 
Mobile devices hardware characteristics
Mobile devices hardware characteristicsMobile devices hardware characteristics
Mobile devices hardware characteristics
 
Mobile technologies
Mobile technologiesMobile technologies
Mobile technologies
 
Tech dev cssfounder.com
Tech dev cssfounder.comTech dev cssfounder.com
Tech dev cssfounder.com
 
Mobile Communication final 4-2- Copy.pptx
Mobile Communication  final 4-2- Copy.pptxMobile Communication  final 4-2- Copy.pptx
Mobile Communication final 4-2- Copy.pptx
 
Wireless communications
Wireless communicationsWireless communications
Wireless communications
 
Unit1_4G-5G_Part1.pptx
Unit1_4G-5G_Part1.pptxUnit1_4G-5G_Part1.pptx
Unit1_4G-5G_Part1.pptx
 
seminar report on wireless communication ppt
seminar report on wireless communication pptseminar report on wireless communication ppt
seminar report on wireless communication ppt
 
M.Sc Mobile computing.pptx
M.Sc Mobile computing.pptxM.Sc Mobile computing.pptx
M.Sc Mobile computing.pptx
 
1.INTRO MOBILE AND WIRELESS COMMN.ppt
1.INTRO MOBILE AND WIRELESS COMMN.ppt1.INTRO MOBILE AND WIRELESS COMMN.ppt
1.INTRO MOBILE AND WIRELESS COMMN.ppt
 

Recently uploaded

Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
panagenda
 

Recently uploaded (20)

Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development Companies
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
الأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهالأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهله
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
 
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfFrisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
 

Technology that will disappear after five years

  • 1. Presented by ~ Sourabh Choudhary(18BEC1084) Vivek Kumar(18BEC1086) Saurabh Kumar(18BEC1083)
  • 2. *
  • 3. * •Technology that will disappear in next 5 years •Reason of disappearance •Alternative
  • 4. A keyboard is a typewriter-style device, which uses an arrangement of buttons or keys, to act as mechanical levers or electronic switches. Following the decline of punch cards and paper tape, interaction via teleprinter-style keyboards became the main input device for computers.
  • 5. * •Takes a lot of space. •Durability •We have to make efforts while typing.
  • 6. * Intelligence Voice Assistants Cortana Siri Google Assistant An intelligent voice assistant is a software agent that can perform tasks or services for an individual. These tasks or services are based on user input, location awareness, and the ability to access information from a variety of online sources (such as weather or traffic conditions, news, stock prices, user schedules, retail prices, etc.).
  • 7. • Direct-to-Home (DTH) television is a method of receiving satellite television by means of signals transmitted from direct-broadcast satellites. • India is the largest DTH market in the world by number of subscribers. • Some common DTH providers are Dish TV, Airtel TV,Tata Sky etc.
  • 8. * •Takes a lot of space. •Get affected by weather conditions. •Heavy installation charges. •Limitation on HD channels.
  • 9. * Future of Watching TV Chrome cast Apple TV Amazon Fire stick Applications
  • 10. * •Mobile, directly connect with TV. •Does not get affected by weather conditions. •Can be access through TV as well as smartphone.
  • 11. The Global Positioning System (GPS) is a space-based satellite navigation system that provides location and time information in all weather conditions, anywhere on or near the earth where there is an unobstructed line of sight to four or more GPS satellites.
  • 12. * • All Source Positioning and Navigation(ASPN). • More advanced Positioning. • More reliable and accurate than GPS. • Can also track particular person and can be viewed in 3D.
  • 13. • DARPA is developing sensors that “use signals of opportunity” such as television, radio, cell towers, satellites, and even lightning, for real- time tracking. • The ultimate goal is to develop a compact navigation system that could be given to soldiers, put on tanks or implemented in guidance systems. For that, the sensors and circuitry have to be shrunk down and designed to operate within a certain power consumption limit.
  • 14. * A telephone, or phone, is a telecommunications device that permits two or more users to conduct a conversation when they are too far apart to be heard directly. A telephone converts sound, typically and most efficiently the human voice, into electronic signals suitable for transmission via cables or other transmission media over long distances, and replays such signals simultaneously in audible form to its user.
  • 15. * •Not able to receive sms. •Long distance calls are expensive without a long distance calling option added to your monthly service. •Forwarding option also costs money without a forwarding option added to your monthly service. •They are not portable.
  • 17. * • A remote control is a component of an electronic device used to operate the device from a distance, usually wirelessly. • A remote control can be used to operate devices such as a television set, DVD player, or other home appliance, from a short distance.
  • 18. * •Searching of TV remote, that is scarmbling around your home throwing the cushions of your couch here and there in the air looking for the that mysterious remote. •Fragile
  • 19. * Internet of things • Television will know when to ON/OFF. • Automatically adjust the sound level. • Ac automatically detect presence & know temperature needed inside the room.
  • 20. * A password is a word or string of characters used for user authentication to prove identity or access approval to gain access to a resource (example: an access code is a type of password), which is to be kept secret from those not allowed access.
  • 21. * •Not secure. •You usually forget your passwords. •Replacing passwords is a difficult task as nowadays people have a password for almost but breaking them is not a big deal.
  • 23. *