SlideShare a Scribd company logo
Continue Introduce to Internet
Fast Internet
InternetTrend
Mobile
•Rising Adoption of NewerTask-DrivenWireless-Enabled Devices
Mobile
 Mobile Internet represents a new
computing cycle
◦ Mainframe  Minicomputer  PC  PC
Internet  Mobile Internet
 Unlike past cycles, US is follower, not
leader
◦ 85% of mobile subscribers, 87% of mobile data
subscribers in non-US markets(2007E); China
is #1 in both
InternetTrend
Mobile
 Uncharted / new sources of usage
generated for / from Mobile Internet
platform
◦ Killer application(s) for mobile? Social Networking / Presence?Video? Location-
Based Services? Browser? email? SMS? Music? Games? Search? Ringtones?
Camera? Blogs?
 •Why now? 1) handsets becoming small
functional computers; 2) cheaper / faster
/ more data; 3) more content
◦ 450MM (48%) of handsets shipped (21% of base) Mobile Internet ready (can run
Java or BREW applications…),2006E
◦ 2.9B subscribers with <2.5G (~50Kbps) network access; 311MM 3G subscribers
have broadband-like services (browsing, full track music), 2007E
◦ Mobile content improving steadily - consumers are spending billions on it
InternetTrend
Mobile
InternetTrend
•3 Skype Phone Launcher – „Presence‟ is Key
Mobile
InternetTrend
Mobile
InternetTrend
•New Computing Cycles – 10x More Devices New = Reduce
Usage FrictionVia Better Processing Power + Improved User
Interface + Smaller Form Factor + Lower Prices + Expanded
Services
Mobile
InternetTrend
•Wireless Options Growing Rapidly – Creating Broad-Based
Wireless Infrastructure
Mobile
InternetTrend
Mobile
InternetTrend
•User Interface + Device Usage Evolution Over Past 30Years –
From Input…to Output…to Sharing
Mobile
 In Just 2Years,
Wireless Consumers
Expect…
◦ Always-On Access with
Super-Fast „BootTime‟
◦ Near Zero Latency Access to
Nearly All Information
◦ Day-Long-Plus Battery Life in
Elegant Portable Devices
InternetTrend
Emerging Markets
InternetTrend
•Internet User and Mobile Phone User
Emerging Markets
InternetTrend
•Internet Users
Emerging Markets
InternetTrend
•Mobile Users
Technology
InternetTrend
•More Connected – Real-time connectivity / 24x7 / in palm of
hand…
•More Affordable – Wi-Fi nearly ubiquitous in many developed
markets…for many / 3G tiered pricing lowers adoption barrier…
•Faster – Near-zero latency for boot-up / search / connect / pay…
•Easier to Use – User Interface revolution + location awareness
provide something for nearly everyone…
•Fun to Use – Social / casual gaming / reward-driven marketing…
•Access Nearly Everything – Music / video / documents / „stuff‟ in
cloud…
•Longer Battery Life – Hours of continuous usage…
Cloud Computing
Internet&CloudComputing
•Home Users Ahead of Enterprise Users -
Quality of home based computing has been
evolving at faster pace than enterprise
computing for years and cloud- based
connectivity has become so pervasive that
enterprises are finally being forced to play
catch up.
Cloud Computing
•Consumers Expect Easy-to-Use 24x7
Connectivity andWant the Same atWork -
Wireless device (smartphone / tablet)
adoption has empowered consumers to
expect (and demand) cloud-based high-
speed wireless connectivity 24x7.
Internet&CloudComputing
Cloud Computing
•Recession-Spending Delays Helped
Underlying Markets Develop - Recession-
related technology spending delays from
2007 to 2009, in effect, allowed cloud-based
services to evolve / develop / mature to
levels that are more „enterprise-ready.‟
Internet&CloudComputing
Cloud Computing
•Less Concern about Security Issues -
Cloud-based security concerns have abated
somewhat as enterprises realize the
difference in risk profile between internal
and external environments is lower than
they once believed.
Internet&CloudComputing
The Four Generations Cohort of
Customers
Veterans
Baby
Boomers
Xers
Millenials
<1946
1946-1964
1964-1980
>1980
From “close” to “open” environment:
• Society
• Communication
• Market
• Mind
• Behavior
•Value
CONNECTING
or CONFLICTING
?
InternetUsers
Generation Characteristics
VETERANS
< 1946
BABY BOOMERS
1946-1964
XERS
1965-1980
MILLENIALS
>1981
Dedicated to a job Live to work Work to live Live in the moment
Respectful of
authority
Sense of optimism Contract Technology savvy
Duty before
pleasure
Champions of
causes
Pragmatic world Consistent
expectations
Patience is a virtue Go into debt Self-reliant Street smart
Honor and integrity Team and process
oriented
Attached to the edge Fun is a must
Reluctant to change Personal
gratification
Authority is casual Give respect if they
are respected
Patriotic Nostalgic of youth Versatility of skills Diverse in nature
InternetUsers
Worlds and Environment of the
Generation
VETERANS
< 1946
BABY BOOMERS
1946-1964
XERS
1965-1980
MILLENIALS
>1981
HOME HOME HOME HOME
SCHOOL SCHOOL SCHOOL
PUBLIC PUBLIC
INTERNET
InternetUsers
Internet Generation
InternetUsers
Generation- C
Linkster Generation
Millenials Generation
Google Generation
Google Generation
InternetUsers
The `Google generation‟ is a
popular phrase that
refers to a generation of young
people, born after
1993, that is growing up in a
world dominated by the
internet.
Google Generation
InternetUsers
Most students entering our colleges and
universities today are younger than the
microcomputer, are more comfortable
working on a keyboard than writing in a
spiral notebook, and
are happier reading from a computer
screen than from paper in hand.
Constant connectivity – being in touch
with friends and family at any time and
from any place – is of utmost
importance.
Google Generation
1. They are more
competent with
technology
2. They have very high
expectations of ICTs
3. They prefer interactive
systems and are turning
away from being passive
consumers of
information
InternetUsers
Research from
University of
California, 2008
Google Generation
4. They have shifted
decisively to digital forms
of communication: texting
rather than talking
5. They multitask in all areas
of their lives
6. They are used to being
entertained and now
expect this of their formal
learning experience at
university
InternetUsers
Research from
University of
California, 2008
Google Generation
7. They prefer visual
information over text
8. They have zero tolerance
for delay and their
information needs must
be fulfilled immediately
9. They find their peers
more credible as
information sources than
authority figures
InternetUsers
Research from
University of
California, 2008
Google Generation
10. They need to feel
constantly connected to
the web
11. They pick up computer
skills by trial-and-error
12. They prefer quick
information in the form
of easily digested
chunks, rather than full
text
InternetUsers
Research from
University of
California, 2008
Google Generation
13. They are expert
searchers
14. They think everything is
on the web (and it’s all
free)
15. They do not respect
intellectual property
16. They are format agnostic
InternetUsers
Research from
University of
California, 2008
Content Creators
Connected
Co-creation
Customise
Community
Curious
Control ‘C’
InternetUsers
Research by Dan Pankraaz
5 Things To Know About Gen-C
1. They love creating and ‘mashing’ content
2. They are not passive, they form ‘active communities’
3. They thrive on social media sites where they can get
involved in ideas and cultural conversations
4. They’re in control of their own lives and are happy
with complexity
5. Gen C aspire to work in more creative industries with
less rigid social structures
InternetUsers
What Is Cybercrime
Computer crime, or
cybercrime, refers to
any crime that involves
a computer and a
network, where the
computers may or may
not have played an
instrumental part in the
commission of a crime
Cybercrime
Example of Cybercrime
Computer or network as targets
1. Computer viruses or Malware
2. Denial-of-service attacks
Computer or network as mediator
1. Cyber stalking
2. Fraud and identity theft
3. Information warfare
4. Phishing scams
Cybercrime
Source of Evidence
Cybercrime
A computer can be a source of evidence.
Even though the computer is not directly
used for criminal purposes, it is an excellent
device for record keeping, particularly given
the power to encrypt the data. If this
evidence can be obtained and decrypted, it
can be of great value to criminal
investigators.
ComputerViruses/Malware
Cybercrime
A computer virus is a computer
program that can copy itself
and infect a computer.The
term "virus" is also commonly
but erroneously used to refer to
other types of malware,
including but not limited to
adware and spyware programs
that do not have the
reproductive ability.
Denial Service of Attacks
Cybercrime
A denial-of-service attack (DoS
attack) or distributed denial-of-
service attack (DDoS attack) is
an attempt to make a
computer resource unavailable
to its intended users.Although
the means to carry out, motives
for, and targets of a DoS attack
may vary, it generally consists
of the concerted efforts of a
person or people to prevent an
Internet site or service from
functioning efficiently or at all,
temporarily or indefinitely.
Cyberstalking
Cybercrime
Cyberstalking is the use of the
Internet or other electronic
means to stalk or harass an
individual, a group of
individuals, or an organization.
It may include false accusations,
monitoring, making threats,
identity theft, damage to data
or equipment, the solicitation
of minors for sex, or gathering
information in order to harass.
Fraud and Identity Theft
Cybercrime
Identity theft is a form of fraud
or cheating of another person's
identity in which someone
pretends to be someone else by
assuming that person's identity,
typically in order to access
resources or obtain credit and
other benefits in that person's
name
Information Warfare
Cybercrime
Information warfare is the use and management of information
in pursuit of a competitive advantage over an opponent.
Information warfare may involve collection of tactical
information, assurance(s) that one's own information is valid,
spreading of propaganda or disinformation to demoralize or
manipulate the enemy and the public, undermining the quality of
opposing force information and denial of information-collection
opportunities to opposing forces.
Phising Scams
Cybercrime
Phishing is the criminally fraudulent
process of attempting to acquire
sensitive information such as
usernames, passwords and credit card
details by masquerading as a
trustworthy entity in an electronic
communication. Communications
purporting to be from popular social
web sites, auction sites, online
payment processors or IT
administrators are commonly used
to lure the unsuspecting public.
Conclusion
 Conclusion
◦ The Internet (andWorldWideWeb) was have today was
created by some very bright, talented people who either had
vision, or were inspired by other talented people’s visions.
◦ Though their ideas were not always popular, they pressed
ahead.
◦ Their perseverance and hard work brought us to where we are
today.
◦ There is a lot to be learned by studying these people, their
early work and keeping in mind what they had to work with.
◦ Today, we owe a great deal for the wired world we enjoy, to the
hard work of these people.
◦ Internet has changed the world, how modern people think and
behave.
ThankYou!

More Related Content

What's hot

Lesson 1 2 Edited
Lesson 1 2 EditedLesson 1 2 Edited
Lesson 1 2 Edited
Juvywen
 
Information and Communication Technology (ICT) - Empowerment Technologies
Information and Communication Technology (ICT) - Empowerment TechnologiesInformation and Communication Technology (ICT) - Empowerment Technologies
Information and Communication Technology (ICT) - Empowerment Technologies
Mark Jhon Oxillo
 
INTERNET SERVICES BY DEEPIKA CHETTRI
INTERNET SERVICES BY DEEPIKA CHETTRIINTERNET SERVICES BY DEEPIKA CHETTRI
INTERNET SERVICES BY DEEPIKA CHETTRI
Deepika Chettri
 
Empowerment technology
Empowerment technologyEmpowerment technology
Empowerment technology
terlyn711
 
Information and communications technology SHS
Information and communications technology SHSInformation and communications technology SHS
Information and communications technology SHS
erwin marlon sario
 
Future of the Internet
Future of the InternetFuture of the Internet
Future of the Internet
Yogi Schulz
 
Top Internet & Technology Trends for 2014
Top Internet & Technology Trends for 2014Top Internet & Technology Trends for 2014
Top Internet & Technology Trends for 2014
QNET Ltd
 
Internet of things (IoT)
Internet of things (IoT)Internet of things (IoT)
Internet of things (IoT)
Ajinkya Dubey
 
Webinar slides sept 23 2021 mary aiken
Webinar slides sept 23 2021 mary aikenWebinar slides sept 23 2021 mary aiken
Webinar slides sept 23 2021 mary aiken
CapitolTechU
 
Future Of Internet Presentation
Future Of Internet PresentationFuture Of Internet Presentation
Future Of Internet Presentation
guestf0bdc63
 
Empowerment technology Group 7
Empowerment technology Group 7Empowerment technology Group 7
Empowerment technology Group 7
FrancisJuanson1
 
Etech activity
Etech activityEtech activity
Etech activity
AppleCristobal1
 
20090906 On Future Internet, Cloud Computing, and Semantics – You name it
20090906 On Future Internet, Cloud Computing, and Semantics – You name it20090906 On Future Internet, Cloud Computing, and Semantics – You name it
20090906 On Future Internet, Cloud Computing, and Semantics – You name it
Arian Zwegers
 
Ethical and Social Issues in ICT
Ethical and Social Issues in ICTEthical and Social Issues in ICT
Ethical and Social Issues in ICT
RoshanMaharjan13
 
Media and Information Literacy 104
Media and Information Literacy 104Media and Information Literacy 104
Media and Information Literacy 104
Marvin Broñoso
 
Internet technology and web engineering
Internet technology and web engineeringInternet technology and web engineering
Internet technology and web engineering
Professor Lili Saghafi
 
Internet
InternetInternet
Internet
RajniKashyap9
 
Empowerment Technologies - Module 1
Empowerment Technologies - Module 1Empowerment Technologies - Module 1
Empowerment Technologies - Module 1
Jesus Rances
 
Internet surfing
Internet surfingInternet surfing
Internet surfing
National Bank of Pakistan
 
Introduction to Information Communication and Technologies
Introduction to Information Communication and TechnologiesIntroduction to Information Communication and Technologies
Introduction to Information Communication and Technologies
Juvy Novicio
 

What's hot (20)

Lesson 1 2 Edited
Lesson 1 2 EditedLesson 1 2 Edited
Lesson 1 2 Edited
 
Information and Communication Technology (ICT) - Empowerment Technologies
Information and Communication Technology (ICT) - Empowerment TechnologiesInformation and Communication Technology (ICT) - Empowerment Technologies
Information and Communication Technology (ICT) - Empowerment Technologies
 
INTERNET SERVICES BY DEEPIKA CHETTRI
INTERNET SERVICES BY DEEPIKA CHETTRIINTERNET SERVICES BY DEEPIKA CHETTRI
INTERNET SERVICES BY DEEPIKA CHETTRI
 
Empowerment technology
Empowerment technologyEmpowerment technology
Empowerment technology
 
Information and communications technology SHS
Information and communications technology SHSInformation and communications technology SHS
Information and communications technology SHS
 
Future of the Internet
Future of the InternetFuture of the Internet
Future of the Internet
 
Top Internet & Technology Trends for 2014
Top Internet & Technology Trends for 2014Top Internet & Technology Trends for 2014
Top Internet & Technology Trends for 2014
 
Internet of things (IoT)
Internet of things (IoT)Internet of things (IoT)
Internet of things (IoT)
 
Webinar slides sept 23 2021 mary aiken
Webinar slides sept 23 2021 mary aikenWebinar slides sept 23 2021 mary aiken
Webinar slides sept 23 2021 mary aiken
 
Future Of Internet Presentation
Future Of Internet PresentationFuture Of Internet Presentation
Future Of Internet Presentation
 
Empowerment technology Group 7
Empowerment technology Group 7Empowerment technology Group 7
Empowerment technology Group 7
 
Etech activity
Etech activityEtech activity
Etech activity
 
20090906 On Future Internet, Cloud Computing, and Semantics – You name it
20090906 On Future Internet, Cloud Computing, and Semantics – You name it20090906 On Future Internet, Cloud Computing, and Semantics – You name it
20090906 On Future Internet, Cloud Computing, and Semantics – You name it
 
Ethical and Social Issues in ICT
Ethical and Social Issues in ICTEthical and Social Issues in ICT
Ethical and Social Issues in ICT
 
Media and Information Literacy 104
Media and Information Literacy 104Media and Information Literacy 104
Media and Information Literacy 104
 
Internet technology and web engineering
Internet technology and web engineeringInternet technology and web engineering
Internet technology and web engineering
 
Internet
InternetInternet
Internet
 
Empowerment Technologies - Module 1
Empowerment Technologies - Module 1Empowerment Technologies - Module 1
Empowerment Technologies - Module 1
 
Internet surfing
Internet surfingInternet surfing
Internet surfing
 
Introduction to Information Communication and Technologies
Introduction to Information Communication and TechnologiesIntroduction to Information Communication and Technologies
Introduction to Information Communication and Technologies
 

Similar to Introduce to internet2

Presentation (6).pptx
Presentation (6).pptxPresentation (6).pptx
Presentation (6).pptx
SONISINGH52160
 
Misuse of Internet
Misuse of InternetMisuse of Internet
Misuse of Internet
VaishnaviPalkar
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
RheamaeLiwan
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docx
JakeTorio1
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
EliseoBartolome1
 
REVIEWER ETECH
REVIEWER ETECHREVIEWER ETECH
REVIEWER ETECH
TrixieAnneAlindao
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docx
EhraicaSaquing
 
Empowerment Technology
Empowerment Technology Empowerment Technology
Empowerment Technology
ChadrickThompson1
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
DineLiwan
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
Liberty Aquino
 
Comm%20 tech%20final%20project
Comm%20 tech%20final%20projectComm%20 tech%20final%20project
Comm%20 tech%20final%20projectawgalv01
 
Cloud Tools & Social Media Workshop
Cloud Tools & Social Media WorkshopCloud Tools & Social Media Workshop
Cloud Tools & Social Media Workshop
Lasa UK
 
Digital content
Digital contentDigital content
Digital content
Snehal Jadhav
 
Cloud computing & disadvantages of technology
Cloud computing & disadvantages of technologyCloud computing & disadvantages of technology
Cloud computing & disadvantages of technology
nomibuilder
 
Powerpoint.pptx
Powerpoint.pptxPowerpoint.pptx
Powerpoint.pptx
NibbleGribble
 
Advantages and disadvantages of computer system
Advantages and disadvantages of computer systemAdvantages and disadvantages of computer system
Advantages and disadvantages of computer system
parag dhok
 
Information Technology and Modern Gadgets
Information Technology and Modern GadgetsInformation Technology and Modern Gadgets
Information Technology and Modern Gadgets
Arnav Chowdhury
 
About internet by krishna tibdewal...!!!!
About internet by krishna tibdewal...!!!!About internet by krishna tibdewal...!!!!
About internet by krishna tibdewal...!!!!
Krishna Tibdewal
 
Empowerment Technologies 1.pptx
Empowerment Technologies 1.pptxEmpowerment Technologies 1.pptx
Empowerment Technologies 1.pptx
JerryHalibas
 

Similar to Introduce to internet2 (20)

Presentation (6).pptx
Presentation (6).pptxPresentation (6).pptx
Presentation (6).pptx
 
Misuse of Internet
Misuse of InternetMisuse of Internet
Misuse of Internet
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docx
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
REVIEWER ETECH
REVIEWER ETECHREVIEWER ETECH
REVIEWER ETECH
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docx
 
Empowerment Technology
Empowerment Technology Empowerment Technology
Empowerment Technology
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
Comm%20 tech%20final%20project
Comm%20 tech%20final%20projectComm%20 tech%20final%20project
Comm%20 tech%20final%20project
 
Cloud Tools & Social Media Workshop
Cloud Tools & Social Media WorkshopCloud Tools & Social Media Workshop
Cloud Tools & Social Media Workshop
 
Digital content
Digital contentDigital content
Digital content
 
Cloud computing & disadvantages of technology
Cloud computing & disadvantages of technologyCloud computing & disadvantages of technology
Cloud computing & disadvantages of technology
 
Powerpoint.pptx
Powerpoint.pptxPowerpoint.pptx
Powerpoint.pptx
 
Advantages and disadvantages of computer system
Advantages and disadvantages of computer systemAdvantages and disadvantages of computer system
Advantages and disadvantages of computer system
 
Information Technology and Modern Gadgets
Information Technology and Modern GadgetsInformation Technology and Modern Gadgets
Information Technology and Modern Gadgets
 
About internet by krishna tibdewal...!!!!
About internet by krishna tibdewal...!!!!About internet by krishna tibdewal...!!!!
About internet by krishna tibdewal...!!!!
 
Empowerment Technologies 1.pptx
Empowerment Technologies 1.pptxEmpowerment Technologies 1.pptx
Empowerment Technologies 1.pptx
 
History of intermet ppt uls
History of intermet ppt ulsHistory of intermet ppt uls
History of intermet ppt uls
 

More from Hardini_HD

Hardini 3201416015 3_b
Hardini 3201416015 3_b Hardini 3201416015 3_b
Hardini 3201416015 3_b
Hardini_HD
 
Delphi
DelphiDelphi
Delphi
Hardini_HD
 
Class dan object
Class dan objectClass dan object
Class dan objectHardini_HD
 
Using of computer tech
Using of computer tech Using of computer tech
Using of computer tech
Hardini_HD
 
Software
Software Software
Software
Hardini_HD
 
Number system
Number system Number system
Number system
Hardini_HD
 
Komp. dan aplikasi
Komp. dan aplikasi Komp. dan aplikasi
Komp. dan aplikasi
Hardini_HD
 
Jarkom
Jarkom Jarkom
Jarkom
Hardini_HD
 
Introduction to software 2
Introduction to software 2 Introduction to software 2
Introduction to software 2
Hardini_HD
 
Introduction to software1
Introduction to software1 Introduction to software1
Introduction to software1
Hardini_HD
 
Introduce to internet1
Introduce to internet1 Introduce to internet1
Introduce to internet1
Hardini_HD
 
Intro to e gov
Intro to e gov Intro to e gov
Intro to e gov
Hardini_HD
 
Internet
Internet Internet
Internet
Hardini_HD
 
Hardware
Hardware Hardware
Hardware
Hardini_HD
 
Flowchart dan dfd
Flowchart dan dfd Flowchart dan dfd
Flowchart dan dfd
Hardini_HD
 
File org
File org File org
File org
Hardini_HD
 
Data comm
Data comm Data comm
Data comm
Hardini_HD
 
Business computing
Business computing Business computing
Business computing
Hardini_HD
 
Pti (8) teknologi internet dan web
Pti (8)   teknologi internet dan webPti (8)   teknologi internet dan web
Pti (8) teknologi internet dan web
Hardini_HD
 
Pti (7) sistem bilangan
Pti (7)   sistem bilanganPti (7)   sistem bilangan
Pti (7) sistem bilangan
Hardini_HD
 

More from Hardini_HD (20)

Hardini 3201416015 3_b
Hardini 3201416015 3_b Hardini 3201416015 3_b
Hardini 3201416015 3_b
 
Delphi
DelphiDelphi
Delphi
 
Class dan object
Class dan objectClass dan object
Class dan object
 
Using of computer tech
Using of computer tech Using of computer tech
Using of computer tech
 
Software
Software Software
Software
 
Number system
Number system Number system
Number system
 
Komp. dan aplikasi
Komp. dan aplikasi Komp. dan aplikasi
Komp. dan aplikasi
 
Jarkom
Jarkom Jarkom
Jarkom
 
Introduction to software 2
Introduction to software 2 Introduction to software 2
Introduction to software 2
 
Introduction to software1
Introduction to software1 Introduction to software1
Introduction to software1
 
Introduce to internet1
Introduce to internet1 Introduce to internet1
Introduce to internet1
 
Intro to e gov
Intro to e gov Intro to e gov
Intro to e gov
 
Internet
Internet Internet
Internet
 
Hardware
Hardware Hardware
Hardware
 
Flowchart dan dfd
Flowchart dan dfd Flowchart dan dfd
Flowchart dan dfd
 
File org
File org File org
File org
 
Data comm
Data comm Data comm
Data comm
 
Business computing
Business computing Business computing
Business computing
 
Pti (8) teknologi internet dan web
Pti (8)   teknologi internet dan webPti (8)   teknologi internet dan web
Pti (8) teknologi internet dan web
 
Pti (7) sistem bilangan
Pti (7)   sistem bilanganPti (7)   sistem bilangan
Pti (7) sistem bilangan
 

Recently uploaded

How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 

Recently uploaded (20)

How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 

Introduce to internet2

  • 1. Continue Introduce to Internet Fast Internet
  • 2. InternetTrend Mobile •Rising Adoption of NewerTask-DrivenWireless-Enabled Devices
  • 3. Mobile  Mobile Internet represents a new computing cycle ◦ Mainframe  Minicomputer  PC  PC Internet  Mobile Internet  Unlike past cycles, US is follower, not leader ◦ 85% of mobile subscribers, 87% of mobile data subscribers in non-US markets(2007E); China is #1 in both InternetTrend
  • 4. Mobile  Uncharted / new sources of usage generated for / from Mobile Internet platform ◦ Killer application(s) for mobile? Social Networking / Presence?Video? Location- Based Services? Browser? email? SMS? Music? Games? Search? Ringtones? Camera? Blogs?  •Why now? 1) handsets becoming small functional computers; 2) cheaper / faster / more data; 3) more content ◦ 450MM (48%) of handsets shipped (21% of base) Mobile Internet ready (can run Java or BREW applications…),2006E ◦ 2.9B subscribers with <2.5G (~50Kbps) network access; 311MM 3G subscribers have broadband-like services (browsing, full track music), 2007E ◦ Mobile content improving steadily - consumers are spending billions on it InternetTrend
  • 5. Mobile InternetTrend •3 Skype Phone Launcher – „Presence‟ is Key
  • 7. Mobile InternetTrend •New Computing Cycles – 10x More Devices New = Reduce Usage FrictionVia Better Processing Power + Improved User Interface + Smaller Form Factor + Lower Prices + Expanded Services
  • 8. Mobile InternetTrend •Wireless Options Growing Rapidly – Creating Broad-Based Wireless Infrastructure
  • 10. Mobile InternetTrend •User Interface + Device Usage Evolution Over Past 30Years – From Input…to Output…to Sharing
  • 11. Mobile  In Just 2Years, Wireless Consumers Expect… ◦ Always-On Access with Super-Fast „BootTime‟ ◦ Near Zero Latency Access to Nearly All Information ◦ Day-Long-Plus Battery Life in Elegant Portable Devices InternetTrend
  • 15. Technology InternetTrend •More Connected – Real-time connectivity / 24x7 / in palm of hand… •More Affordable – Wi-Fi nearly ubiquitous in many developed markets…for many / 3G tiered pricing lowers adoption barrier… •Faster – Near-zero latency for boot-up / search / connect / pay… •Easier to Use – User Interface revolution + location awareness provide something for nearly everyone… •Fun to Use – Social / casual gaming / reward-driven marketing… •Access Nearly Everything – Music / video / documents / „stuff‟ in cloud… •Longer Battery Life – Hours of continuous usage…
  • 16. Cloud Computing Internet&CloudComputing •Home Users Ahead of Enterprise Users - Quality of home based computing has been evolving at faster pace than enterprise computing for years and cloud- based connectivity has become so pervasive that enterprises are finally being forced to play catch up.
  • 17. Cloud Computing •Consumers Expect Easy-to-Use 24x7 Connectivity andWant the Same atWork - Wireless device (smartphone / tablet) adoption has empowered consumers to expect (and demand) cloud-based high- speed wireless connectivity 24x7. Internet&CloudComputing
  • 18. Cloud Computing •Recession-Spending Delays Helped Underlying Markets Develop - Recession- related technology spending delays from 2007 to 2009, in effect, allowed cloud-based services to evolve / develop / mature to levels that are more „enterprise-ready.‟ Internet&CloudComputing
  • 19. Cloud Computing •Less Concern about Security Issues - Cloud-based security concerns have abated somewhat as enterprises realize the difference in risk profile between internal and external environments is lower than they once believed. Internet&CloudComputing
  • 20. The Four Generations Cohort of Customers Veterans Baby Boomers Xers Millenials <1946 1946-1964 1964-1980 >1980 From “close” to “open” environment: • Society • Communication • Market • Mind • Behavior •Value CONNECTING or CONFLICTING ? InternetUsers
  • 21. Generation Characteristics VETERANS < 1946 BABY BOOMERS 1946-1964 XERS 1965-1980 MILLENIALS >1981 Dedicated to a job Live to work Work to live Live in the moment Respectful of authority Sense of optimism Contract Technology savvy Duty before pleasure Champions of causes Pragmatic world Consistent expectations Patience is a virtue Go into debt Self-reliant Street smart Honor and integrity Team and process oriented Attached to the edge Fun is a must Reluctant to change Personal gratification Authority is casual Give respect if they are respected Patriotic Nostalgic of youth Versatility of skills Diverse in nature InternetUsers
  • 22. Worlds and Environment of the Generation VETERANS < 1946 BABY BOOMERS 1946-1964 XERS 1965-1980 MILLENIALS >1981 HOME HOME HOME HOME SCHOOL SCHOOL SCHOOL PUBLIC PUBLIC INTERNET InternetUsers
  • 23. Internet Generation InternetUsers Generation- C Linkster Generation Millenials Generation Google Generation
  • 24. Google Generation InternetUsers The `Google generation‟ is a popular phrase that refers to a generation of young people, born after 1993, that is growing up in a world dominated by the internet.
  • 25. Google Generation InternetUsers Most students entering our colleges and universities today are younger than the microcomputer, are more comfortable working on a keyboard than writing in a spiral notebook, and are happier reading from a computer screen than from paper in hand. Constant connectivity – being in touch with friends and family at any time and from any place – is of utmost importance.
  • 26. Google Generation 1. They are more competent with technology 2. They have very high expectations of ICTs 3. They prefer interactive systems and are turning away from being passive consumers of information InternetUsers Research from University of California, 2008
  • 27. Google Generation 4. They have shifted decisively to digital forms of communication: texting rather than talking 5. They multitask in all areas of their lives 6. They are used to being entertained and now expect this of their formal learning experience at university InternetUsers Research from University of California, 2008
  • 28. Google Generation 7. They prefer visual information over text 8. They have zero tolerance for delay and their information needs must be fulfilled immediately 9. They find their peers more credible as information sources than authority figures InternetUsers Research from University of California, 2008
  • 29. Google Generation 10. They need to feel constantly connected to the web 11. They pick up computer skills by trial-and-error 12. They prefer quick information in the form of easily digested chunks, rather than full text InternetUsers Research from University of California, 2008
  • 30. Google Generation 13. They are expert searchers 14. They think everything is on the web (and it’s all free) 15. They do not respect intellectual property 16. They are format agnostic InternetUsers Research from University of California, 2008
  • 32. 5 Things To Know About Gen-C 1. They love creating and ‘mashing’ content 2. They are not passive, they form ‘active communities’ 3. They thrive on social media sites where they can get involved in ideas and cultural conversations 4. They’re in control of their own lives and are happy with complexity 5. Gen C aspire to work in more creative industries with less rigid social structures InternetUsers
  • 33. What Is Cybercrime Computer crime, or cybercrime, refers to any crime that involves a computer and a network, where the computers may or may not have played an instrumental part in the commission of a crime Cybercrime
  • 34. Example of Cybercrime Computer or network as targets 1. Computer viruses or Malware 2. Denial-of-service attacks Computer or network as mediator 1. Cyber stalking 2. Fraud and identity theft 3. Information warfare 4. Phishing scams Cybercrime
  • 35. Source of Evidence Cybercrime A computer can be a source of evidence. Even though the computer is not directly used for criminal purposes, it is an excellent device for record keeping, particularly given the power to encrypt the data. If this evidence can be obtained and decrypted, it can be of great value to criminal investigators.
  • 36. ComputerViruses/Malware Cybercrime A computer virus is a computer program that can copy itself and infect a computer.The term "virus" is also commonly but erroneously used to refer to other types of malware, including but not limited to adware and spyware programs that do not have the reproductive ability.
  • 37. Denial Service of Attacks Cybercrime A denial-of-service attack (DoS attack) or distributed denial-of- service attack (DDoS attack) is an attempt to make a computer resource unavailable to its intended users.Although the means to carry out, motives for, and targets of a DoS attack may vary, it generally consists of the concerted efforts of a person or people to prevent an Internet site or service from functioning efficiently or at all, temporarily or indefinitely.
  • 38. Cyberstalking Cybercrime Cyberstalking is the use of the Internet or other electronic means to stalk or harass an individual, a group of individuals, or an organization. It may include false accusations, monitoring, making threats, identity theft, damage to data or equipment, the solicitation of minors for sex, or gathering information in order to harass.
  • 39. Fraud and Identity Theft Cybercrime Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name
  • 40. Information Warfare Cybercrime Information warfare is the use and management of information in pursuit of a competitive advantage over an opponent. Information warfare may involve collection of tactical information, assurance(s) that one's own information is valid, spreading of propaganda or disinformation to demoralize or manipulate the enemy and the public, undermining the quality of opposing force information and denial of information-collection opportunities to opposing forces.
  • 41. Phising Scams Cybercrime Phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication. Communications purporting to be from popular social web sites, auction sites, online payment processors or IT administrators are commonly used to lure the unsuspecting public.
  • 42. Conclusion  Conclusion ◦ The Internet (andWorldWideWeb) was have today was created by some very bright, talented people who either had vision, or were inspired by other talented people’s visions. ◦ Though their ideas were not always popular, they pressed ahead. ◦ Their perseverance and hard work brought us to where we are today. ◦ There is a lot to be learned by studying these people, their early work and keeping in mind what they had to work with. ◦ Today, we owe a great deal for the wired world we enjoy, to the hard work of these people. ◦ Internet has changed the world, how modern people think and behave.