SlideShare a Scribd company logo
1 of 5
Emerging Technologies
- Surya Teja Swamy
Certified LabView Associate Developer
Internet of ThingsIOT
Combination of ML and DLAI
Cloud ComputingCC
Cyber SecurityCS
A Brief
Presentation about
the Technologies
IOT
Using all different sensors we can achieve IOT
AI
1
Artificial
Intelligence is
machine
independent of
Human
2
For that the basic
tool is Machine
Learning(ML),
which later joins
Deep
Learning(DL)
3
With
Combination of
ML, DL and some
input sensors AI
can be achieved
4
Need different
sort of
Algorithms
Cost
Speed
Global Scale
Productivity
performance
Security
Benefits
Clouds
Public
Private
Hybrid
Services
IaaS
PaaS
Server less
SaaS
Definition
•Combination of technologies and process to protect data
and programs from unauthorized access
Importance
•Different bodies such as government, military, corporate,
financial…stores, process unprecedented data on
computers, for safeguarding such Data
Challenges
•Network security
•Application security
•Endpoint security
•Data security

More Related Content

What's hot

IOT Model An Overview
IOT Model An OverviewIOT Model An Overview
IOT Model An OverviewKnoldus Inc.
 
IoT Security Risks and Challenges
IoT Security Risks and ChallengesIoT Security Risks and Challenges
IoT Security Risks and ChallengesOWASP Delhi
 
Internet of Things Architecture / Topology
Internet of Things Architecture / TopologyInternet of Things Architecture / Topology
Internet of Things Architecture / TopologyNEEVEE Technologies
 
Research Topics in IOT
Research Topics in IOTResearch Topics in IOT
Research Topics in IOTTechsparks
 
A 2020 Security strategy for Health Care Providers
A 2020 Security strategy for Health Care ProvidersA 2020 Security strategy for Health Care Providers
A 2020 Security strategy for Health Care ProvidersFeisal Nanji
 
TOP 6 Security Challenges of Internet of Things
TOP 6 Security Challenges of Internet of ThingsTOP 6 Security Challenges of Internet of Things
TOP 6 Security Challenges of Internet of ThingsChromeInfo Technologies
 
Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough? Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough? Ravindra Dastikop
 
Blockchain for Manufacturing Sector
Blockchain for Manufacturing SectorBlockchain for Manufacturing Sector
Blockchain for Manufacturing SectorSuradhaIyer
 
Agile Network India | Demystifying IoT | Himanshu Jain
Agile Network India | Demystifying IoT | Himanshu JainAgile Network India | Demystifying IoT | Himanshu Jain
Agile Network India | Demystifying IoT | Himanshu JainAgileNetwork
 
Internet of Things - Esper
Internet of Things - EsperInternet of Things - Esper
Internet of Things - EsperTarun Vashisth
 
What is Cloud and what are the best practices?
What is Cloud and what are the best practices?What is Cloud and what are the best practices?
What is Cloud and what are the best practices?IndSightsResearchSG
 
Drobics trustworthy io-t-for-industrial-applications
Drobics trustworthy io-t-for-industrial-applicationsDrobics trustworthy io-t-for-industrial-applications
Drobics trustworthy io-t-for-industrial-applicationsMario Drobics
 
5th Meetup - Ethereum & IoT: examples, opportunities and IBM initiative
5th Meetup - Ethereum & IoT: examples, opportunities and IBM initiative5th Meetup - Ethereum & IoT: examples, opportunities and IBM initiative
5th Meetup - Ethereum & IoT: examples, opportunities and IBM initiativeAlexander Hirner
 
The Internet of Things - Solutions to Drive Business Transformation
The Internet of Things - Solutions to Drive Business TransformationThe Internet of Things - Solutions to Drive Business Transformation
The Internet of Things - Solutions to Drive Business TransformationRed Hat India Pvt. Ltd.
 
Internet of things architecture perspective - IndicThreads Conference
Internet of things architecture perspective - IndicThreads ConferenceInternet of things architecture perspective - IndicThreads Conference
Internet of things architecture perspective - IndicThreads ConferenceIndicThreads
 
Identive | Press Release | Innovative Access Control Technology from Identive...
Identive | Press Release | Innovative Access Control Technology from Identive...Identive | Press Release | Innovative Access Control Technology from Identive...
Identive | Press Release | Innovative Access Control Technology from Identive...Identive
 

What's hot (20)

Iot Overview
Iot Overview Iot Overview
Iot Overview
 
IOT Model An Overview
IOT Model An OverviewIOT Model An Overview
IOT Model An Overview
 
Nazmul haq abir
Nazmul haq abirNazmul haq abir
Nazmul haq abir
 
IoT Security Risks and Challenges
IoT Security Risks and ChallengesIoT Security Risks and Challenges
IoT Security Risks and Challenges
 
Internet of Things Architecture / Topology
Internet of Things Architecture / TopologyInternet of Things Architecture / Topology
Internet of Things Architecture / Topology
 
What is an IoT Gateway Device & Why It's Important?
What is an IoT Gateway Device & Why It's Important?What is an IoT Gateway Device & Why It's Important?
What is an IoT Gateway Device & Why It's Important?
 
Questions in iot
Questions in iotQuestions in iot
Questions in iot
 
Research Topics in IOT
Research Topics in IOTResearch Topics in IOT
Research Topics in IOT
 
A 2020 Security strategy for Health Care Providers
A 2020 Security strategy for Health Care ProvidersA 2020 Security strategy for Health Care Providers
A 2020 Security strategy for Health Care Providers
 
TOP 6 Security Challenges of Internet of Things
TOP 6 Security Challenges of Internet of ThingsTOP 6 Security Challenges of Internet of Things
TOP 6 Security Challenges of Internet of Things
 
Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough? Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough?
 
Blockchain for Manufacturing Sector
Blockchain for Manufacturing SectorBlockchain for Manufacturing Sector
Blockchain for Manufacturing Sector
 
Agile Network India | Demystifying IoT | Himanshu Jain
Agile Network India | Demystifying IoT | Himanshu JainAgile Network India | Demystifying IoT | Himanshu Jain
Agile Network India | Demystifying IoT | Himanshu Jain
 
Internet of Things - Esper
Internet of Things - EsperInternet of Things - Esper
Internet of Things - Esper
 
What is Cloud and what are the best practices?
What is Cloud and what are the best practices?What is Cloud and what are the best practices?
What is Cloud and what are the best practices?
 
Drobics trustworthy io-t-for-industrial-applications
Drobics trustworthy io-t-for-industrial-applicationsDrobics trustworthy io-t-for-industrial-applications
Drobics trustworthy io-t-for-industrial-applications
 
5th Meetup - Ethereum & IoT: examples, opportunities and IBM initiative
5th Meetup - Ethereum & IoT: examples, opportunities and IBM initiative5th Meetup - Ethereum & IoT: examples, opportunities and IBM initiative
5th Meetup - Ethereum & IoT: examples, opportunities and IBM initiative
 
The Internet of Things - Solutions to Drive Business Transformation
The Internet of Things - Solutions to Drive Business TransformationThe Internet of Things - Solutions to Drive Business Transformation
The Internet of Things - Solutions to Drive Business Transformation
 
Internet of things architecture perspective - IndicThreads Conference
Internet of things architecture perspective - IndicThreads ConferenceInternet of things architecture perspective - IndicThreads Conference
Internet of things architecture perspective - IndicThreads Conference
 
Identive | Press Release | Innovative Access Control Technology from Identive...
Identive | Press Release | Innovative Access Control Technology from Identive...Identive | Press Release | Innovative Access Control Technology from Identive...
Identive | Press Release | Innovative Access Control Technology from Identive...
 

Similar to Emerging Tech: IOT, AI, Cloud, Cyber Security

Ultimate list of 50 Best IoT platforms of 2019
Ultimate list of 50 Best  IoT platforms of 2019Ultimate list of 50 Best  IoT platforms of 2019
Ultimate list of 50 Best IoT platforms of 2019ThingsCloud
 
IoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.PrabhakaranIoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.PrabhakaranKoenig Solutions Ltd.
 
IoT meets AI in the Clouds
IoT meets AI in the CloudsIoT meets AI in the Clouds
IoT meets AI in the CloudsDr. Mirko Kämpf
 
Best Practices for Cloud-Based IoT Security
Best Practices for Cloud-Based IoT SecurityBest Practices for Cloud-Based IoT Security
Best Practices for Cloud-Based IoT SecuritySatyaKVivek
 
School of Computer & Information SciencesITS-532 Cloud C.docx
School of Computer & Information SciencesITS-532 Cloud C.docxSchool of Computer & Information SciencesITS-532 Cloud C.docx
School of Computer & Information SciencesITS-532 Cloud C.docxjeffsrosalyn
 
Internet & iot security
Internet & iot securityInternet & iot security
Internet & iot securityUsman Anjum
 
Revealing the Potential and Risks From the Coming Together of IoT, AI, and C...
 Revealing the Potential and Risks From the Coming Together of IoT, AI, and C... Revealing the Potential and Risks From the Coming Together of IoT, AI, and C...
Revealing the Potential and Risks From the Coming Together of IoT, AI, and C...IndianAppDevelopers
 
DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)
DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)
DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)Gerardo Pardo-Castellote
 
RISE OF THE MACHINES: IRM IN AN IOT WORLD
RISE OF THE MACHINES: IRM IN AN IOT WORLDRISE OF THE MACHINES: IRM IN AN IOT WORLD
RISE OF THE MACHINES: IRM IN AN IOT WORLDForgeRock
 
Roberto Minerva: iot challenges - IoT Tunisia 2016
Roberto Minerva:  iot challenges  - IoT Tunisia 2016Roberto Minerva:  iot challenges  - IoT Tunisia 2016
Roberto Minerva: iot challenges - IoT Tunisia 2016IoT Tunisia
 
Cybersecurity In IoT Challenges And Effective Strategies.pdf
Cybersecurity In IoT Challenges And Effective Strategies.pdfCybersecurity In IoT Challenges And Effective Strategies.pdf
Cybersecurity In IoT Challenges And Effective Strategies.pdfRahimMakhani2
 
Introduction to IoT Security
Introduction to IoT SecurityIntroduction to IoT Security
Introduction to IoT SecurityCAS
 
Daniel Grabski | Microsofts cybersecurity story
Daniel Grabski | Microsofts cybersecurity storyDaniel Grabski | Microsofts cybersecurity story
Daniel Grabski | Microsofts cybersecurity storyMicrosoft Österreich
 
GSMA Intelligence Webinar - 27 November 2018
GSMA Intelligence Webinar - 27 November 2018GSMA Intelligence Webinar - 27 November 2018
GSMA Intelligence Webinar - 27 November 2018The GSMA
 
Bhadale group of companies it cloud security catalogue
Bhadale group of companies it cloud security catalogueBhadale group of companies it cloud security catalogue
Bhadale group of companies it cloud security catalogueVijayananda Mohire
 
Emerging trends in information technology
Emerging trends in information technologyEmerging trends in information technology
Emerging trends in information technologyShiv Mehmi
 

Similar to Emerging Tech: IOT, AI, Cloud, Cyber Security (20)

Ultimate list of 50 Best IoT platforms of 2019
Ultimate list of 50 Best  IoT platforms of 2019Ultimate list of 50 Best  IoT platforms of 2019
Ultimate list of 50 Best IoT platforms of 2019
 
IoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.PrabhakaranIoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.Prabhakaran
 
IoT meets AI in the Clouds
IoT meets AI in the CloudsIoT meets AI in the Clouds
IoT meets AI in the Clouds
 
Best Practices for Cloud-Based IoT Security
Best Practices for Cloud-Based IoT SecurityBest Practices for Cloud-Based IoT Security
Best Practices for Cloud-Based IoT Security
 
School of Computer & Information SciencesITS-532 Cloud C.docx
School of Computer & Information SciencesITS-532 Cloud C.docxSchool of Computer & Information SciencesITS-532 Cloud C.docx
School of Computer & Information SciencesITS-532 Cloud C.docx
 
Internet & iot security
Internet & iot securityInternet & iot security
Internet & iot security
 
Revealing the Potential and Risks From the Coming Together of IoT, AI, and C...
 Revealing the Potential and Risks From the Coming Together of IoT, AI, and C... Revealing the Potential and Risks From the Coming Together of IoT, AI, and C...
Revealing the Potential and Risks From the Coming Together of IoT, AI, and C...
 
DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)
DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)
DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)
 
Industrial IOT Data Connectivity Standard
Industrial IOT Data Connectivity StandardIndustrial IOT Data Connectivity Standard
Industrial IOT Data Connectivity Standard
 
RISE OF THE MACHINES: IRM IN AN IOT WORLD
RISE OF THE MACHINES: IRM IN AN IOT WORLDRISE OF THE MACHINES: IRM IN AN IOT WORLD
RISE OF THE MACHINES: IRM IN AN IOT WORLD
 
Roberto Minerva: iot challenges - IoT Tunisia 2016
Roberto Minerva:  iot challenges  - IoT Tunisia 2016Roberto Minerva:  iot challenges  - IoT Tunisia 2016
Roberto Minerva: iot challenges - IoT Tunisia 2016
 
Iot(security)
Iot(security)Iot(security)
Iot(security)
 
Cybersecurity In IoT Challenges And Effective Strategies.pdf
Cybersecurity In IoT Challenges And Effective Strategies.pdfCybersecurity In IoT Challenges And Effective Strategies.pdf
Cybersecurity In IoT Challenges And Effective Strategies.pdf
 
Introduction to IoT Security
Introduction to IoT SecurityIntroduction to IoT Security
Introduction to IoT Security
 
Daniel Grabski | Microsofts cybersecurity story
Daniel Grabski | Microsofts cybersecurity storyDaniel Grabski | Microsofts cybersecurity story
Daniel Grabski | Microsofts cybersecurity story
 
GSMA Intelligence Webinar - 27 November 2018
GSMA Intelligence Webinar - 27 November 2018GSMA Intelligence Webinar - 27 November 2018
GSMA Intelligence Webinar - 27 November 2018
 
Internet of Things Forensics
Internet of Things ForensicsInternet of Things Forensics
Internet of Things Forensics
 
Bhadale group of companies it cloud security catalogue
Bhadale group of companies it cloud security catalogueBhadale group of companies it cloud security catalogue
Bhadale group of companies it cloud security catalogue
 
Emerging trends in information technology
Emerging trends in information technologyEmerging trends in information technology
Emerging trends in information technology
 
ICC Networking Data Security
ICC Networking Data SecurityICC Networking Data Security
ICC Networking Data Security
 

More from suryateja swamy

More from suryateja swamy (6)

IOT Uisng Arduino
IOT Uisng ArduinoIOT Uisng Arduino
IOT Uisng Arduino
 
Magneto impedance sensor
Magneto impedance sensorMagneto impedance sensor
Magneto impedance sensor
 
Artificial Intelligence(AI)
Artificial Intelligence(AI)Artificial Intelligence(AI)
Artificial Intelligence(AI)
 
Telecommunicatoins and Fiber Optics
Telecommunicatoins and Fiber OpticsTelecommunicatoins and Fiber Optics
Telecommunicatoins and Fiber Optics
 
THE CMOS VLSI DESIGN
THE CMOS VLSI DESIGNTHE CMOS VLSI DESIGN
THE CMOS VLSI DESIGN
 
DPCM
DPCMDPCM
DPCM
 

Recently uploaded

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 

Recently uploaded (20)

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 

Emerging Tech: IOT, AI, Cloud, Cyber Security

Editor's Notes

  1. ML: Machine Learning; DL: Deep learning
  2. IOT: Getting environment connected through Internet; simply life connected with internet PIR Motion sensor; Photoelectric sensor; esp8266(internet sensor); HCSR04 (Ultrasonic Sensor)
  3. Reference: https://azure.microsoft.com/en-in/overview/what-is-cloud-computing/
  4. Reference: https://digitalguardian.com/blog/what-cyber-security