SlideShare a Scribd company logo
1 of 34
Future of Information Technology VishalSalgotraDepartment of Computer Science & ITUniversity of Jammu
Contents Objectives Introduction 	1. Communication Technology 	2. Brain Technologies 	3. Cloud Computing 	4. Virtual Reality 3.  Conclusion 4.	Future Work 5.	References
Objectives Information Technology Different Emerging Technologies. Use of Future Technologies for mankind. Future Aspects/Trends of IT
Introduction Information technology (IT), as defined by the ITAA, is "the study, design, development, implementation, support or management of computer-based information systems, particularly software applications and computer hardware.”
What is going to be The Future ???
Talk over the phone
Talk over the phone Multimedia Capabilities
Talk over the phone Multimedia Capabilities Browse Internet
Talk over the phone Multimedia Capabilities Even Video call Browse Internet
Future Communication Technology
Synthesized or Matterless Displays
Your communication device  can never be stolen. Walking and movement patterns are noted.
Transporter Technology -> Based on Quantum Physics -> Idea is to scramble a person`s  atoms & regroup them at  some other place.
Brain Technologies
Store the data in a database directly accessible by the brain. Intelligent embedded systems  would supplement your memory. Cyborg.
Homo-Technicus
Cloud Computing Internet (cloud) based development and use of computer technology for computation.
Virtual Reality Human senses are stimulated using computer.
Real 					Virtual
Conclusion In the near future technologies like cloud computing are going to boom and change the way we use machines. In addition Brain technologies will supplement a human in every aspect.
References: [1] Li Bian ET.AL, “Information Technology and Its Application in E-learning”, volume 1,  30-31 May 2009 Page(s):293 - 296 . [2] Lookabaugh, T.; Sicker, D.C.; “Information technology mediated education - revolution not evolution”, 2004 Page(s):T3E/7 - T3E11 Vol. 1  [3] Zigli, R.M.; Dhir, K.S.; “Emerging issues in information technology: an international perspective revisited”, 17-18 Dec. 1993 Page(s):112 - 115  [4] Bali, V.; Rathore, R.S.; Sirohi, A.; Verma, P.; “Information Technology Architectures for Grid Computing and Applications”, 23-29 Aug. 2009 Page(s):52 - 56 . [5] Magjarevic, R.; Jaksic, M.; Bilas, V.; Summers, R.; “Evaluation of use of information technology for the benefit of individuals with spinal cord injury”, 24-26 April 2003 Page(s):102 - 105 

More Related Content

What's hot

FIA Budapest - Meyer
FIA Budapest - MeyerFIA Budapest - Meyer
FIA Budapest - MeyerEric Meyer
 
INFORMATION TECHNOLOGY
INFORMATION TECHNOLOGYINFORMATION TECHNOLOGY
INFORMATION TECHNOLOGYAryan Chhibber
 
Role of Information Technology in Human Resource Management
Role of Information Technology in Human Resource ManagementRole of Information Technology in Human Resource Management
Role of Information Technology in Human Resource ManagementDr. C.V. Suresh Babu
 
Internet of Things
Internet of ThingsInternet of Things
Internet of ThingsMphasis
 
Rochi2008 Microwler
Rochi2008 MicrowlerRochi2008 Microwler
Rochi2008 MicrowlerMarius Butuc
 
Digital Literacy and its importance in our future and present life
Digital Literacy and its importance in our future and present lifeDigital Literacy and its importance in our future and present life
Digital Literacy and its importance in our future and present lifeSayantan Mukherjee
 
Usage of ict in daily life
Usage of ict in daily lifeUsage of ict in daily life
Usage of ict in daily lifeTina Lokman
 
Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...ijsrd.com
 
Technological innovation, women's safety & equitable mobilities
Technological innovation, women's safety & equitable mobilitiesTechnological innovation, women's safety & equitable mobilities
Technological innovation, women's safety & equitable mobilitiesJenna Condie
 
1 history computers
1 history computers1 history computers
1 history computersJobi Mathai
 
Pervasive Domain of Digital & Social Media
Pervasive Domain of Digital & Social MediaPervasive Domain of Digital & Social Media
Pervasive Domain of Digital & Social MediaSyed Mohsin Raja
 
Information&communication technology
Information&communication technologyInformation&communication technology
Information&communication technologySourabh Dubey
 
Advancements in technology
Advancements in technologyAdvancements in technology
Advancements in technologyJoan Pramod
 

What's hot (20)

FIA Budapest - Meyer
FIA Budapest - MeyerFIA Budapest - Meyer
FIA Budapest - Meyer
 
Introduction to ict
Introduction to ictIntroduction to ict
Introduction to ict
 
Ict and education
Ict and educationIct and education
Ict and education
 
INFORMATION TECHNOLOGY
INFORMATION TECHNOLOGYINFORMATION TECHNOLOGY
INFORMATION TECHNOLOGY
 
Role of Information Technology in Human Resource Management
Role of Information Technology in Human Resource ManagementRole of Information Technology in Human Resource Management
Role of Information Technology in Human Resource Management
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Rochi2008 Microwler
Rochi2008 MicrowlerRochi2008 Microwler
Rochi2008 Microwler
 
IoT
IoTIoT
IoT
 
Digital Literacy and its importance in our future and present life
Digital Literacy and its importance in our future and present lifeDigital Literacy and its importance in our future and present life
Digital Literacy and its importance in our future and present life
 
Sem 5 books-list
Sem 5 books-listSem 5 books-list
Sem 5 books-list
 
Material related to ICT
Material related to ICTMaterial related to ICT
Material related to ICT
 
Ict
IctIct
Ict
 
Usage of ict in daily life
Usage of ict in daily lifeUsage of ict in daily life
Usage of ict in daily life
 
Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...
 
Ai defence services
Ai  defence servicesAi  defence services
Ai defence services
 
Technological innovation, women's safety & equitable mobilities
Technological innovation, women's safety & equitable mobilitiesTechnological innovation, women's safety & equitable mobilities
Technological innovation, women's safety & equitable mobilities
 
1 history computers
1 history computers1 history computers
1 history computers
 
Pervasive Domain of Digital & Social Media
Pervasive Domain of Digital & Social MediaPervasive Domain of Digital & Social Media
Pervasive Domain of Digital & Social Media
 
Information&communication technology
Information&communication technologyInformation&communication technology
Information&communication technology
 
Advancements in technology
Advancements in technologyAdvancements in technology
Advancements in technology
 

Viewers also liked

Everwear Fluid Program Midas Set Up
Everwear Fluid Program Midas Set UpEverwear Fluid Program Midas Set Up
Everwear Fluid Program Midas Set UpLROLeary
 
Chiropractic Lifestyle
Chiropractic LifestyleChiropractic Lifestyle
Chiropractic Lifestyledakotaswan
 
Social Networking in Ireland - an Amrach report August2010
Social Networking in Ireland - an Amrach report August2010Social Networking in Ireland - an Amrach report August2010
Social Networking in Ireland - an Amrach report August2010Brendan Mc Coy
 
最低稅負制之境外基金所得申報 (Jonas wang's conflicted copy 2011 06-09)
最低稅負制之境外基金所得申報 (Jonas wang's conflicted copy 2011 06-09)最低稅負制之境外基金所得申報 (Jonas wang's conflicted copy 2011 06-09)
最低稅負制之境外基金所得申報 (Jonas wang's conflicted copy 2011 06-09)cayliechung
 
最低稅負制之境外基金所得申報
最低稅負制之境外基金所得申報最低稅負制之境外基金所得申報
最低稅負制之境外基金所得申報cayliechung
 

Viewers also liked (6)

Everwear Fluid Program Midas Set Up
Everwear Fluid Program Midas Set UpEverwear Fluid Program Midas Set Up
Everwear Fluid Program Midas Set Up
 
Chiropractic Lifestyle
Chiropractic LifestyleChiropractic Lifestyle
Chiropractic Lifestyle
 
Social Networking in Ireland - an Amrach report August2010
Social Networking in Ireland - an Amrach report August2010Social Networking in Ireland - an Amrach report August2010
Social Networking in Ireland - an Amrach report August2010
 
最低稅負制之境外基金所得申報 (Jonas wang's conflicted copy 2011 06-09)
最低稅負制之境外基金所得申報 (Jonas wang's conflicted copy 2011 06-09)最低稅負制之境外基金所得申報 (Jonas wang's conflicted copy 2011 06-09)
最低稅負制之境外基金所得申報 (Jonas wang's conflicted copy 2011 06-09)
 
Principal
PrincipalPrincipal
Principal
 
最低稅負制之境外基金所得申報
最低稅負制之境外基金所得申報最低稅負制之境外基金所得申報
最低稅負制之境外基金所得申報
 

Similar to Future Of It

Most cited articles in academia - International journal of network security &...
Most cited articles in academia - International journal of network security &...Most cited articles in academia - International journal of network security &...
Most cited articles in academia - International journal of network security &...IJNSA Journal
 
May 2021: Top 10 Read Articles in Network Security and Its Applications
May 2021: Top 10 Read Articles in Network Security and Its ApplicationsMay 2021: Top 10 Read Articles in Network Security and Its Applications
May 2021: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
June 2021 - Top 10 Read Articles in Network Security and Its Applications
June 2021 - Top 10 Read Articles in Network Security and Its ApplicationsJune 2021 - Top 10 Read Articles in Network Security and Its Applications
June 2021 - Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
76 s201918
76 s20191876 s201918
76 s201918IJRAT
 
March 2021: Top 10 Read Articles in Network Security and Its Applications
March 2021: Top 10 Read Articles in Network Security and Its ApplicationsMarch 2021: Top 10 Read Articles in Network Security and Its Applications
March 2021: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
October 2020 - Top Read Articles in Network Security & Its Applications
October 2020 - Top Read Articles in Network Security & Its ApplicationsOctober 2020 - Top Read Articles in Network Security & Its Applications
October 2020 - Top Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
January 2021 - Top 10 Read Articles in Network Security & Its Applications
January 2021 - Top 10 Read Articles in Network Security & Its ApplicationsJanuary 2021 - Top 10 Read Articles in Network Security & Its Applications
January 2021 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
September 2021: Top 10 Read Articles in Network Security and Its Applications
September 2021: Top 10 Read Articles in Network Security and Its ApplicationsSeptember 2021: Top 10 Read Articles in Network Security and Its Applications
September 2021: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
July 2021 - Top 10 Read Articles in Network Security & Its Applications
July 2021 - Top 10 Read Articles in Network Security & Its ApplicationsJuly 2021 - Top 10 Read Articles in Network Security & Its Applications
July 2021 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
March 2023: Top 10 Read Articles in Network Security and Its Applications
March 2023: Top 10 Read Articles in Network Security and Its ApplicationsMarch 2023: Top 10 Read Articles in Network Security and Its Applications
March 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
December 2023 - Top 10 Read Articles in Network Security & Its Applications
December 2023 - Top 10 Read Articles in Network Security & Its ApplicationsDecember 2023 - Top 10 Read Articles in Network Security & Its Applications
December 2023 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
April 2023: Top 10 Read Articles in Network Security and Its Applications
 April 2023: Top 10 Read Articles in Network Security and Its Applications April 2023: Top 10 Read Articles in Network Security and Its Applications
April 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
January 2023: Top 10 Read Articles in Network Security and Its Applications
January 2023: Top 10 Read Articles in Network Security and Its ApplicationsJanuary 2023: Top 10 Read Articles in Network Security and Its Applications
January 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
April 2024 - Top 10 Read Articles in Network Security & Its Applications
April 2024 - Top 10 Read Articles in Network Security & Its ApplicationsApril 2024 - Top 10 Read Articles in Network Security & Its Applications
April 2024 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
February 2023: Top 10 Read Articles in Network Security and Its Applications
February 2023: Top 10 Read Articles in Network Security and Its ApplicationsFebruary 2023: Top 10 Read Articles in Network Security and Its Applications
February 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
March 2022 - Top 10 Read Articles in Network Security and Its Applications
March 2022 - Top 10 Read Articles in Network Security and Its ApplicationsMarch 2022 - Top 10 Read Articles in Network Security and Its Applications
March 2022 - Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
May 2023: Top 10 Read Articles in Network Security and Its Applications
May 2023: Top 10 Read Articles in Network Security and Its ApplicationsMay 2023: Top 10 Read Articles in Network Security and Its Applications
May 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
June 2023: Top 10 Read Articles in Network Security and Its Applications
June 2023: Top 10 Read Articles in Network Security and Its ApplicationsJune 2023: Top 10 Read Articles in Network Security and Its Applications
June 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
March 2024 - Top 10 Read Articles in Network Security & Its Applications
March 2024 - Top 10 Read Articles in Network Security & Its ApplicationsMarch 2024 - Top 10 Read Articles in Network Security & Its Applications
March 2024 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
January 2024 - Top 10 Read Articles in Network Security & Its Applications
January 2024 - Top 10 Read Articles in Network Security & Its ApplicationsJanuary 2024 - Top 10 Read Articles in Network Security & Its Applications
January 2024 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 

Similar to Future Of It (20)

Most cited articles in academia - International journal of network security &...
Most cited articles in academia - International journal of network security &...Most cited articles in academia - International journal of network security &...
Most cited articles in academia - International journal of network security &...
 
May 2021: Top 10 Read Articles in Network Security and Its Applications
May 2021: Top 10 Read Articles in Network Security and Its ApplicationsMay 2021: Top 10 Read Articles in Network Security and Its Applications
May 2021: Top 10 Read Articles in Network Security and Its Applications
 
June 2021 - Top 10 Read Articles in Network Security and Its Applications
June 2021 - Top 10 Read Articles in Network Security and Its ApplicationsJune 2021 - Top 10 Read Articles in Network Security and Its Applications
June 2021 - Top 10 Read Articles in Network Security and Its Applications
 
76 s201918
76 s20191876 s201918
76 s201918
 
March 2021: Top 10 Read Articles in Network Security and Its Applications
March 2021: Top 10 Read Articles in Network Security and Its ApplicationsMarch 2021: Top 10 Read Articles in Network Security and Its Applications
March 2021: Top 10 Read Articles in Network Security and Its Applications
 
October 2020 - Top Read Articles in Network Security & Its Applications
October 2020 - Top Read Articles in Network Security & Its ApplicationsOctober 2020 - Top Read Articles in Network Security & Its Applications
October 2020 - Top Read Articles in Network Security & Its Applications
 
January 2021 - Top 10 Read Articles in Network Security & Its Applications
January 2021 - Top 10 Read Articles in Network Security & Its ApplicationsJanuary 2021 - Top 10 Read Articles in Network Security & Its Applications
January 2021 - Top 10 Read Articles in Network Security & Its Applications
 
September 2021: Top 10 Read Articles in Network Security and Its Applications
September 2021: Top 10 Read Articles in Network Security and Its ApplicationsSeptember 2021: Top 10 Read Articles in Network Security and Its Applications
September 2021: Top 10 Read Articles in Network Security and Its Applications
 
July 2021 - Top 10 Read Articles in Network Security & Its Applications
July 2021 - Top 10 Read Articles in Network Security & Its ApplicationsJuly 2021 - Top 10 Read Articles in Network Security & Its Applications
July 2021 - Top 10 Read Articles in Network Security & Its Applications
 
March 2023: Top 10 Read Articles in Network Security and Its Applications
March 2023: Top 10 Read Articles in Network Security and Its ApplicationsMarch 2023: Top 10 Read Articles in Network Security and Its Applications
March 2023: Top 10 Read Articles in Network Security and Its Applications
 
December 2023 - Top 10 Read Articles in Network Security & Its Applications
December 2023 - Top 10 Read Articles in Network Security & Its ApplicationsDecember 2023 - Top 10 Read Articles in Network Security & Its Applications
December 2023 - Top 10 Read Articles in Network Security & Its Applications
 
April 2023: Top 10 Read Articles in Network Security and Its Applications
 April 2023: Top 10 Read Articles in Network Security and Its Applications April 2023: Top 10 Read Articles in Network Security and Its Applications
April 2023: Top 10 Read Articles in Network Security and Its Applications
 
January 2023: Top 10 Read Articles in Network Security and Its Applications
January 2023: Top 10 Read Articles in Network Security and Its ApplicationsJanuary 2023: Top 10 Read Articles in Network Security and Its Applications
January 2023: Top 10 Read Articles in Network Security and Its Applications
 
April 2024 - Top 10 Read Articles in Network Security & Its Applications
April 2024 - Top 10 Read Articles in Network Security & Its ApplicationsApril 2024 - Top 10 Read Articles in Network Security & Its Applications
April 2024 - Top 10 Read Articles in Network Security & Its Applications
 
February 2023: Top 10 Read Articles in Network Security and Its Applications
February 2023: Top 10 Read Articles in Network Security and Its ApplicationsFebruary 2023: Top 10 Read Articles in Network Security and Its Applications
February 2023: Top 10 Read Articles in Network Security and Its Applications
 
March 2022 - Top 10 Read Articles in Network Security and Its Applications
March 2022 - Top 10 Read Articles in Network Security and Its ApplicationsMarch 2022 - Top 10 Read Articles in Network Security and Its Applications
March 2022 - Top 10 Read Articles in Network Security and Its Applications
 
May 2023: Top 10 Read Articles in Network Security and Its Applications
May 2023: Top 10 Read Articles in Network Security and Its ApplicationsMay 2023: Top 10 Read Articles in Network Security and Its Applications
May 2023: Top 10 Read Articles in Network Security and Its Applications
 
June 2023: Top 10 Read Articles in Network Security and Its Applications
June 2023: Top 10 Read Articles in Network Security and Its ApplicationsJune 2023: Top 10 Read Articles in Network Security and Its Applications
June 2023: Top 10 Read Articles in Network Security and Its Applications
 
March 2024 - Top 10 Read Articles in Network Security & Its Applications
March 2024 - Top 10 Read Articles in Network Security & Its ApplicationsMarch 2024 - Top 10 Read Articles in Network Security & Its Applications
March 2024 - Top 10 Read Articles in Network Security & Its Applications
 
January 2024 - Top 10 Read Articles in Network Security & Its Applications
January 2024 - Top 10 Read Articles in Network Security & Its ApplicationsJanuary 2024 - Top 10 Read Articles in Network Security & Its Applications
January 2024 - Top 10 Read Articles in Network Security & Its Applications
 

Future Of It

  • 1. Future of Information Technology VishalSalgotraDepartment of Computer Science & ITUniversity of Jammu
  • 2. Contents Objectives Introduction 1. Communication Technology 2. Brain Technologies 3. Cloud Computing 4. Virtual Reality 3. Conclusion 4. Future Work 5. References
  • 3. Objectives Information Technology Different Emerging Technologies. Use of Future Technologies for mankind. Future Aspects/Trends of IT
  • 4. Introduction Information technology (IT), as defined by the ITAA, is "the study, design, development, implementation, support or management of computer-based information systems, particularly software applications and computer hardware.”
  • 5. What is going to be The Future ???
  • 6.
  • 7.
  • 9. Talk over the phone Multimedia Capabilities
  • 10. Talk over the phone Multimedia Capabilities Browse Internet
  • 11. Talk over the phone Multimedia Capabilities Even Video call Browse Internet
  • 14. Your communication device can never be stolen. Walking and movement patterns are noted.
  • 15. Transporter Technology -> Based on Quantum Physics -> Idea is to scramble a person`s atoms & regroup them at some other place.
  • 17. Store the data in a database directly accessible by the brain. Intelligent embedded systems would supplement your memory. Cyborg.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28. Cloud Computing Internet (cloud) based development and use of computer technology for computation.
  • 29.
  • 30. Virtual Reality Human senses are stimulated using computer.
  • 32. Conclusion In the near future technologies like cloud computing are going to boom and change the way we use machines. In addition Brain technologies will supplement a human in every aspect.
  • 33.
  • 34. References: [1] Li Bian ET.AL, “Information Technology and Its Application in E-learning”, volume 1,  30-31 May 2009 Page(s):293 - 296 . [2] Lookabaugh, T.; Sicker, D.C.; “Information technology mediated education - revolution not evolution”, 2004 Page(s):T3E/7 - T3E11 Vol. 1  [3] Zigli, R.M.; Dhir, K.S.; “Emerging issues in information technology: an international perspective revisited”, 17-18 Dec. 1993 Page(s):112 - 115  [4] Bali, V.; Rathore, R.S.; Sirohi, A.; Verma, P.; “Information Technology Architectures for Grid Computing and Applications”, 23-29 Aug. 2009 Page(s):52 - 56 . [5] Magjarevic, R.; Jaksic, M.; Bilas, V.; Summers, R.; “Evaluation of use of information technology for the benefit of individuals with spinal cord injury”, 24-26 April 2003 Page(s):102 - 105