SlideShare a Scribd company logo
How
Life Becomes
Easy
Fast
And
Time Efficient
EASY
FAST
TIME EFFICIENT
Financial
Transaction
ATM
UBL VALUE ADDED SERVICES
VALVO AND APPLE ALLIANCE
Samsung:
On 8th October 2013, the Samsung Galaxy Round
mobile phone with flexible display.
Desktop PC
LCD
Laptops
Satellite
Communication
Dish/Antenna
ROBOTICS:
A Field
In Which
IT not only Saves Time
But Also
Human Power
Doctor Robot
Flying Robot
Mechatronics
Robotic Hand
IT’s application
in business
E-Shopping
Search
Engines for
Business
Research
Connectivity
Worldwide presence
*
*
*
*
ABUSES OF IT
Now
Without IT
The world is
just like
A Video IS
Running On Radio
ITM presentation

More Related Content

What's hot

2009 Telecom Outlook
2009 Telecom Outlook2009 Telecom Outlook
2009 Telecom Outlook
Raúl Castañón Martínez
 
Technologies that will change our world
Technologies that will change our worldTechnologies that will change our world
Technologies that will change our world
Ronald Velten
 
Future technologies
Future technologiesFuture technologies
Future technologies
Asad Ali
 
Rasmus Malling-Hansen, a writing ball, and the evolution of modern typing
Rasmus Malling-Hansen, a writing ball, and the evolution of modern typingRasmus Malling-Hansen, a writing ball, and the evolution of modern typing
Rasmus Malling-Hansen, a writing ball, and the evolution of modern typing
Nuance Communications
 
Sis thu 0900 dave tan
Sis thu 0900 dave tanSis thu 0900 dave tan
Sis thu 0900 dave tan
MediaPost
 
Turning dreams into digital businesses - Eric van Uum (Microsoft)
Turning dreams into digital businesses - Eric van Uum (Microsoft)Turning dreams into digital businesses - Eric van Uum (Microsoft)
Turning dreams into digital businesses - Eric van Uum (Microsoft)
Frontis
 
Sempl 18: George Bethell
Sempl 18: George BethellSempl 18: George Bethell
Sempl 18: George Bethell
Sempl 21
 
NMI15 Petr Dvořák – Neviditelné technologie, aneb kontext v nás i kolem nás
NMI15 Petr Dvořák – Neviditelné technologie, aneb kontext v nás i kolem násNMI15 Petr Dvořák – Neviditelné technologie, aneb kontext v nás i kolem nás
NMI15 Petr Dvořák – Neviditelné technologie, aneb kontext v nás i kolem nás
New Media Inspiration
 
New Media Inspiration 2015 - Invisible technologies and context inside and ar...
New Media Inspiration 2015 - Invisible technologies and context inside and ar...New Media Inspiration 2015 - Invisible technologies and context inside and ar...
New Media Inspiration 2015 - Invisible technologies and context inside and ar...
Petr Dvorak
 
eCommerce Presentation 112615
eCommerce Presentation 112615eCommerce Presentation 112615
eCommerce Presentation 112615
Eric Manuel
 
Creuna Digital Briefing 2011: The New Retail
Creuna Digital Briefing 2011: The New RetailCreuna Digital Briefing 2011: The New Retail
Creuna Digital Briefing 2011: The New Retail
Ali Ivmark
 
실리콘밸리 라이브 Silicon Valley Live
실리콘밸리 라이브 Silicon Valley Live실리콘밸리 라이브 Silicon Valley Live
실리콘밸리 라이브 Silicon Valley Live
JaeKwon Son
 
The Mobile Perspective
The Mobile PerspectiveThe Mobile Perspective
The Mobile Perspective
eugenelin89
 
Future Vision: Contextual Displays & Experiences
Future Vision: Contextual Displays & ExperiencesFuture Vision: Contextual Displays & Experiences
Future Vision: Contextual Displays & Experiences
Ali Ivmark
 
Police pad® & firetab® featured at applecdw g public safety events
Police pad® & firetab® featured at applecdw g public safety eventsPolice pad® & firetab® featured at applecdw g public safety events
Police pad® & firetab® featured at applecdw g public safety events
Zco Corporation | Nashua, NH - Profile and Reviews
 
Building Smart Cities with Smart Citizens
Building Smart Cities with Smart CitizensBuilding Smart Cities with Smart Citizens
Building Smart Cities with Smart Citizens
Dr. Mazlan Abbas
 
Smart Cities in the AI Era
Smart Cities in the AI EraSmart Cities in the AI Era
Smart Cities in the AI Era
NVIDIA
 
Webinar on technologies that will drive entrepreneurship
Webinar on technologies that will drive entrepreneurshipWebinar on technologies that will drive entrepreneurship
Webinar on technologies that will drive entrepreneurship
mechselva49
 
The Internet of Everything: Informed Airports
The Internet of Everything: Informed AirportsThe Internet of Everything: Informed Airports
The Internet of Everything: Informed Airports
Samsung Business USA
 
All Energy 2011 Final
All Energy 2011 FinalAll Energy 2011 Final
All Energy 2011 Final
ashcgupta
 

What's hot (20)

2009 Telecom Outlook
2009 Telecom Outlook2009 Telecom Outlook
2009 Telecom Outlook
 
Technologies that will change our world
Technologies that will change our worldTechnologies that will change our world
Technologies that will change our world
 
Future technologies
Future technologiesFuture technologies
Future technologies
 
Rasmus Malling-Hansen, a writing ball, and the evolution of modern typing
Rasmus Malling-Hansen, a writing ball, and the evolution of modern typingRasmus Malling-Hansen, a writing ball, and the evolution of modern typing
Rasmus Malling-Hansen, a writing ball, and the evolution of modern typing
 
Sis thu 0900 dave tan
Sis thu 0900 dave tanSis thu 0900 dave tan
Sis thu 0900 dave tan
 
Turning dreams into digital businesses - Eric van Uum (Microsoft)
Turning dreams into digital businesses - Eric van Uum (Microsoft)Turning dreams into digital businesses - Eric van Uum (Microsoft)
Turning dreams into digital businesses - Eric van Uum (Microsoft)
 
Sempl 18: George Bethell
Sempl 18: George BethellSempl 18: George Bethell
Sempl 18: George Bethell
 
NMI15 Petr Dvořák – Neviditelné technologie, aneb kontext v nás i kolem nás
NMI15 Petr Dvořák – Neviditelné technologie, aneb kontext v nás i kolem násNMI15 Petr Dvořák – Neviditelné technologie, aneb kontext v nás i kolem nás
NMI15 Petr Dvořák – Neviditelné technologie, aneb kontext v nás i kolem nás
 
New Media Inspiration 2015 - Invisible technologies and context inside and ar...
New Media Inspiration 2015 - Invisible technologies and context inside and ar...New Media Inspiration 2015 - Invisible technologies and context inside and ar...
New Media Inspiration 2015 - Invisible technologies and context inside and ar...
 
eCommerce Presentation 112615
eCommerce Presentation 112615eCommerce Presentation 112615
eCommerce Presentation 112615
 
Creuna Digital Briefing 2011: The New Retail
Creuna Digital Briefing 2011: The New RetailCreuna Digital Briefing 2011: The New Retail
Creuna Digital Briefing 2011: The New Retail
 
실리콘밸리 라이브 Silicon Valley Live
실리콘밸리 라이브 Silicon Valley Live실리콘밸리 라이브 Silicon Valley Live
실리콘밸리 라이브 Silicon Valley Live
 
The Mobile Perspective
The Mobile PerspectiveThe Mobile Perspective
The Mobile Perspective
 
Future Vision: Contextual Displays & Experiences
Future Vision: Contextual Displays & ExperiencesFuture Vision: Contextual Displays & Experiences
Future Vision: Contextual Displays & Experiences
 
Police pad® & firetab® featured at applecdw g public safety events
Police pad® & firetab® featured at applecdw g public safety eventsPolice pad® & firetab® featured at applecdw g public safety events
Police pad® & firetab® featured at applecdw g public safety events
 
Building Smart Cities with Smart Citizens
Building Smart Cities with Smart CitizensBuilding Smart Cities with Smart Citizens
Building Smart Cities with Smart Citizens
 
Smart Cities in the AI Era
Smart Cities in the AI EraSmart Cities in the AI Era
Smart Cities in the AI Era
 
Webinar on technologies that will drive entrepreneurship
Webinar on technologies that will drive entrepreneurshipWebinar on technologies that will drive entrepreneurship
Webinar on technologies that will drive entrepreneurship
 
The Internet of Everything: Informed Airports
The Internet of Everything: Informed AirportsThe Internet of Everything: Informed Airports
The Internet of Everything: Informed Airports
 
All Energy 2011 Final
All Energy 2011 FinalAll Energy 2011 Final
All Energy 2011 Final
 

Recently uploaded

Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Zilliz
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 

Recently uploaded (20)

Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 

ITM presentation

Editor's Notes

  1. This is the biggest advantage of conducting business online. A firm engaging in e-business can have a nationwide or a worldwide presence. IBM was one of the first companies to use the term e-business to refer to servicing customers and collaborating with business partners from all over the world. Dell Inc. too had a flourishing business selling PCs throughout the US, only via telephone and the Internet till the year 2007. Amazon.com is another success story that helps people buy internationally from third parties. Hence, worldwide presence is ensured if companies rethink their business in terms of the Internet. 
  2. Using the web to market products guarantees worldwide reach at a nominal price. Advertising techniques like pay per click advertising ensure that the advertiser only pays for the advertisements that are actually viewed. Affiliate marketing, where customers are directed to a business portal because of the efforts of the affiliate who in turn receive a compensation for their efforts meeting with success, has emerged on account of e-business. Affiliate marketing has helped both the business and the affiliates. Firms engaging in e-business have managed to use cost effective online advertising strategies to their advantage.
  3. Firms need to have a competitive strategy in order to ensure a competitive advantage. Without an effective strategy, they will find it impossible to maintain the advantage and earn profits. The strategy, that the firms can pursue, can be a be a cost strategy or a differentiation strategy. For instance, till the year 2007, Dell Inc. was selling computers only via the Internet and the phone. It adopted a differentiation strategy by selling its computers online and customizing its laptops to suit the requirements of the clients. Thus, e-business resulted in Dell Inc. managing to capture a vast segment of the market using the differentiation strategy.
  4. E-Business has resulted in improved customer service. Many a times, on visiting a website, the customer is greeted by a pop-up chat window. Readily available customer service may help in encouraging the customer to know more about the product or service. Moreover, payments can be made online, products can be shipped to the customer without the customer having to leave the house. 
  5. Basically this means that you passed of a stolen check with the signature forged. You are asserting that the check is valid and is yours to use, when in reality it is not. Identity theft is a form of fraud in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name.
  6. A program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. Viruses can also replicate themselves.. A simple virus that can make a copy of itself over and over again is relatively easy to produce. Even such a simple virus is dangerous because it will quickly use all available memory and bring the system to a halt. An even more dangerous type of virus is one capable of transmitting itself across networks and bypassing security systems.