Introduction to Futureskills
◼ The main objective of Future Skills is to train workers
on new technology for the changes taking place in
the industrial sector.
◼ Future Skills can play a very important role in
promoting skill employment in the future
◼ NASSCOM (National Association of Software and
Service Companies ) Future Skills portal was
launched on 19 Feb. 2018.
3.
Introduction to Futureskills
◼ It aims to prepare 2 million professionals and potential employees
and students over a period of 5 years to adapt to the changes taking
place in the industry.
◼ This Future Skills portal provides free and paid training based on
future technology.
◼ Through the Future Skills portal, training based on various Future
technologies is provided such as Artificial Intelligence, Blockchain, Big
Data Analytics, Cloud Computing, Cyber Security, Internet of Things,
Mobile Tech, Robotic Process Automation, Virtual Reality, and 3D.
Focuses on 155+ skills spread across 70+ job roles on 10 emerging
technologies.
4.
INTRODUCTION TO IOT
◼IOT- INTERNET OF THINGS
◼ The term Internet of Things was
allegedly first coined by Kevin
Ashton in 1999
◼ The IOT is the networking of objects
over the internet, such as, for
example, industrial machines, cars,
TVs, and washing machines.
◼ IOT OBJECTS / DEVICES -AUTOMATED
VEHICLES, NETWORKED TRAFFIC
LIGHTS, PARKING SENSORS, SMART TVS
OR INTELLIGENT WASHING MACHINES
Main Components ofIoT
4 basic components of IoT systems that
are used in IoT technology:-
1. Sensor/Device
2. Connectivity
3. Data Processing
4. User Interface
Challenges of Internetof Things
◼Privacy
◼Security
◼Network Congestion
◼Electricity Consumption
9.
BIG DATA
◼ BigData refers to a collection of large datasets that cannot be
effectively processed using traditional processing techniques.
◼ Big data is not just information; it has turned into a whole field
that includes different tools, methods, and systems.
◼ Big data assists in analyzing detailed concepts to make better
decisions and formulate strategies for organizational
development.
◼ Firms like Google, Facebook, Amazon, and eBay were built
around BIG DATA from the beginning.
10.
Examples of BigData
◼ Stock Exchanges
◼ Social Media
◼ Big Data in Education Industry
◼ Big Data in Healthcare Industry
◼ Big Data in Government Sector
◼ Big Data in the Media and Entertainment Industry
◼ Big Data in Weather Patterns
◼ Big Data in the Banking Sector
11.
Type of BigData
◼Structured
◼Unstructured
◼Semi structured
12.
THE AGE OFBIG DATA
◼ The age when everything is connected to the internet has
come.
◼ Up until now, the internet has mainly been used to connect
computers, tablets, and other devices that require human
input.
◼ However, recent advances in technology have decreased the
cost of microprocessors and telecommunication modules,
allowing previously unconnected “things” to tap into the
internet and start communicating and transmitting
information.
Who are theones who use the
Big Data Technology?
BANKING
HEALTHCARE
GOVERNMENT
EDUCATION
MANUFACTURIN
G
15.
Cloud Computing
◼ Insimple terms, cloud computing means storing
data and programs over the internet instead of on
your computer’s hard drive.
◼ The cloud is known as the internet in ‘Cloud
Computing’.
◼ Cloud Computing provides computing services such
as servers, storage, database networking, software,
analytics, and intelligence on the cloud ( Internet ).
16.
Following are someof the major cloud
service providers:
◼Amazon Web Service
(AWS )
◼Microsoft Azure
◼Google Cloud Platform
◼IBM Cloud Services
◼Adobe Creative Cloud
◼VMware
◼Red Hat
◼Salesforce
◼Oracle Cloud
◼SAP
◼Dropbox
17.
Advantages of cloudcomputing
Cost: It reduces the huge capital outlay of purchasing
hardware and software.
Speed: Resources can be accessed within minutes,
usually in a few clicks Inside.
Scalability: We can scale resources according to business
needs The requirement can be increased or decreased.
18.
Advantages of cloudcomputing
◼ Productivity: The productivity achieved by using cloud
computing platforms. For this reason, there is no need to maintain
software or hardware. team only 'One can concentrate on
achieving goals which has a direct impact on productivity.
◼ Reliability: Low cost due to consistency of data backup and
recovery and very fast.
◼ Security: Cloud vendors enforce policies that strengthen our
data security and provide a comprehensive set of technologies and
controls.
19.
Types of CloudComputing
◼Public Cloud
◼Private Cloud
◼Hybrid Cloud
20.
Types of CloudServices
◼ Infrastructure as a Service (IaaS): In IaaS, infrastructure like
servers, operating system, virtual machines, storage, and
networks can be rented from the cloud service vendor.
◼ Platform as a Service (PaaS): This service provides
development, and testing and provides an on-demand
environment for delivery and management.
◼ Software as a Service (SaaS): Like Microsoft One Drive,
Google Drive, Dropbox, WordPress, Office 365 Amazon
Kindle, etc.
Applications of virtualreality
◼Education
◼Scientific visualization
◼Medicine
◼Industrial design and architecture
◼Sports and entertainment
24.
ARTIFICIAL INTELLIGENCE (AI)
◼HUMAN INTELLIGENCE PROCESSES BY MACHINES.
◼ Artificial intelligence (AI) is the capability of a computer
program or machine to think and learn.
◼ John McCarthy is called the father of Artificial intelligence.
◼ Artificial intelligence (AI) is a branch of computer science
that focuses on developing intelligent machines capable
of working and reacting in ways similar to humans.
▪ SPEECH RECOGNITION.
▪ VOICE TO TEXT FEATURES.
▪ PERSONALISATION OF NEWS FEEDS.
25.
Applications of AI
◼Gaming
◼NaturalLanguage Processing
◼Expert System
◼Vision System
◼Speech recognition
◼Handwriting recognition
◼Intelligent robots
Blockchain Technology
◼Blockchain isa P2P network that acts as
a decentralized ledger for one or more
digital assets.
◼Blockchain technology first came to
light when Satoshi Nakamoto published
a white paper on “Bitcoin: A peer-to-
peer electronic cash system” in 2008.
28.
How does blockchaintechnology
work?
◼Bitcoin is a famous example of
blockchain. Bitcoin is a cryptocurrency
and is used to transact digital assets
online.
29.
Distributed Database
◼There isno central server or system
that stores the blockchain’s data. The
data is distributed across millions of
computers around the world that are
connected to the blockchain.
30.
Use of blockchaintechnology
◼Banking system
◼Blockchain Internet-of-Things
◼Smart device
◼Blockchain healthcare
◼Personal identification
◼Birth, marriage, and death certificate
◼Passport
◼Smart City
31.
Robotics Process Automation
◼RPAcan be used to automate the
process of infrastructure like banks,
railways, industries, offices, etc. RPA is a
software program that runs on the end
user’s PC, laptop, or mobile device.
◼It is a sequence of orders that are
executed by bots under some defined
set of trading rules.
32.
CYBER CRIMES
◼ Phishingis the use of
deceptive email messages to
acquire personal information
from internet users.
◼ Misusing personal
information (identity theft)
◼ Hacking involves disrupting
or misusing websites or
computer networks.
◼ Spreading hate and inciting
terrorism
33.
CYBER SECURITY ANDDATA
PROTECTION
◼CYBER SECURITY
▪Cybersecurity involves
protecting networks, devices,
programs, and data from
attacks and unauthorized
access.
▪Cybersecurity is sometimes
also called information
technology security.
34.
Tools & TechniquesUsed in Cyber Security
◼ Authentication: This fundamental cyber security technique
intends to verify the identity of the user based on the
credentials stored in the security domain of the system. The
prevalent mode of governance is password technology, and
other methods include using SIM cards in cell phones. SIM
cards have unique IDs transmitted securely for phone
identification. The main challenge encountered in the
authenticating process is thwarting attempts of
unauthorized people to eavesdrop on the authenticating
message. The password transmitted over an insecure
medium is liable to be intercepted by dishonest people who
can use it to disguise themselves as the original user. This
problem is countered by encryption.
35.
Tools & TechniquesUsed in Cyber Security
◼Encryption makes data unreadable without
the right key. Breaking it involves solving
tough math problems, demanding a lot of
computing power and time. Symmetric
encryption uses one key for both encoding and
decoding, but sharing the key can be risky.
Asymmetric encryption uses a public key to
encrypt and a private key to decrypt. Many
modern security methods use asymmetric
encryption for key distribution.
36.
Tools & TechniquesUsed in Cyber Security
◼ Digital signatures use mathematical algorithms like those in
asymmetric encryption. A user can prove they have a private key
by encoding information with it. Others can verify this by
decrypting it with the user's public key. This is the reverse of
public key encryption, assuming only the authorized user has the
private key.
◼ Anti-virus software protects against computer viruses and
unwanted programs that execute commands without user
permission. It prevents virus installation and scans for existing
viruses. Windows is a common target due to its popularity. Apple
and Linux users can also come under the attack of viruses
exclusively built for such operating systems.
37.
Tools & TechniquesUsed in Cyber Security
◼Firewall: Firewalls effectively hinder any
attempt of unauthorized access to a
computer when it is connected to the
internet by hackers directly or via other
network connections. Firewalls are included
in most operating systems and are usually
activated by default. If the default firewall
isn't strong enough or hinders legitimate
network activities, commercial firewalls can
be used for additional security.
38.
Thanks!
Do you haveany questions?
+91 8181050066
www.sagarindia.in
@Vaibhav Katiyar
SAGAR PRASHIKSHAN SANSTHAN
@COMPUTER_SAGAR
COMPUTER_SAGAR