The document provides an overview of the latest trends in information technology for 2020, including industrial intelligent automation, intelligent transportation systems, autonomous aviation, the internet of things, virtual reality, big data analytics, cloud computing, and 5G wireless technology. It discusses each trend in 1-3 paragraphs, covering definitions, examples, enabling technologies, and potential applications. The document is an informative guide to the major developments expected to influence information technology in 2020 and beyond.
Cybersecurity Awareness Training Presentation v1.0DallasHaselhorst
Note: There is an updated version of this slide deck available on SlideShare at
https://www.slideshare.net/DallasHaselhorst/cybersecurity-awareness-training-presentation-v11
--
Do you want an cybersecurity awareness training you can present at *your* business or in *your* community? Awesome!
We spent months putting together this training presentation on cybersecurity awareness. We then presented it multiple times and continued modifying the presentation based on feedback from attendees as well as feedback from those in the information security community. We are now releasing this in the hope it is a call to action for others in their communities.
The slides are available for download on our website. Download it and please present it in your own communities, e.g. at your local library, business events, co-working spaces, schools, etc. We also have a free cybersecurity quiz available on the site that is also based on the material.
Download the latest version as a Microsoft PowerPoint presentation (.pptx) or 'Make a Copy' in Google Slides.
https://www.treetopsecurity.com/slides
A Webinar on cyber Security Awareness and Digital Safety is hosted on the 7th of June, 2020. Sthir Yuwa in association with Information Security Response Team Nepal and Center For Cyber Security Research and Innovation conducted successfully. There were almost 70 participants on this webinar.
In this slide I present you an awareness about cyber security and crimes for students. Targeted audience are students aged 14-17 years of age. I also present common mistakes we all do in our lives that lead to cyber insecurities
Cybersecurity Awareness Training Presentation v1.0DallasHaselhorst
Note: There is an updated version of this slide deck available on SlideShare at
https://www.slideshare.net/DallasHaselhorst/cybersecurity-awareness-training-presentation-v11
--
Do you want an cybersecurity awareness training you can present at *your* business or in *your* community? Awesome!
We spent months putting together this training presentation on cybersecurity awareness. We then presented it multiple times and continued modifying the presentation based on feedback from attendees as well as feedback from those in the information security community. We are now releasing this in the hope it is a call to action for others in their communities.
The slides are available for download on our website. Download it and please present it in your own communities, e.g. at your local library, business events, co-working spaces, schools, etc. We also have a free cybersecurity quiz available on the site that is also based on the material.
Download the latest version as a Microsoft PowerPoint presentation (.pptx) or 'Make a Copy' in Google Slides.
https://www.treetopsecurity.com/slides
A Webinar on cyber Security Awareness and Digital Safety is hosted on the 7th of June, 2020. Sthir Yuwa in association with Information Security Response Team Nepal and Center For Cyber Security Research and Innovation conducted successfully. There were almost 70 participants on this webinar.
In this slide I present you an awareness about cyber security and crimes for students. Targeted audience are students aged 14-17 years of age. I also present common mistakes we all do in our lives that lead to cyber insecurities
This slide provides details about cyber security as following;
what is cyber security or computer security?
why cyber security is important?
what is cyber crime?
cyber security problems,
how to prevent from cyber crime?
global scenario of cyber crime?
organisation in world for cyber security,
top companies in cyber security,
career choice in cyber security,
scope of cyber security.
Public WiFi works as an essential tool for people who are constantly on the move and need to get things done. But, while having easy access to public WiFi networks is convenient, it can put your data at risk of being snooped by attackers, simply because such networks are often not secured. This webinar will give you an in-depth knowledge on:
1. Dangers of using unsecured WiFi networks
2. 6 security tips for using such networks securely
3. How Quick Heal helps reduce the risks of unsecured WiFi networks
** Cyber Security Course: https://www.edureka.co/cybersecurity-certification-training **
This Edureka PPT on "Cybersecurity Fundamentals" will introduce you to the world of cybersecurity and talks about its basic concepts. Below is the list of topics covered in this session:
Need for cybersecurity
What is cybersecurity
Fundamentals of cybersecurity
Cyberattack Incident
Follow us to never miss an update in the future.
Instagram: https://www.instagram.com/edureka_learning/
Facebook: https://www.facebook.com/edurekaIN/
Twitter: https://twitter.com/edurekain
LinkedIn: https://www.linkedin.com/company/edureka
Studies and analysis the aspects of confidentiality, integrity and availability of information(data) with regard to the organisation. Identify exposure to accidental or intentional , destruction, disclosure , modification or interruption of information that may cause serious financial and or information loss Study of cyber security and incident response and has become necessary because attacks frequently cause the compromise of personal and business data. Heightened incidents concerns about national security and exposure of personally identifiable information. Racing awareness of the possible effects of computer barred attacks is the other reason.
This presentation deals about "CYBER SECURITY ON SOCIAL MEDIA". In this presentation ,I focused mainly on what cyber security actually is . I even covered what are different cyber crimes, cyber attacks as we could only provide security only if we know the threats.Then why do we actually need "CYBER SECURITY?" , followed by the safety measures.I mainly focused on how ,the end-to-end encryption of messages is done in any social media using "CRYPTOGRAPHY" .
+ Background & Basics of Web App Security, The HTTP Protocol, Web.
+ Application Insecurities, OWASP Top 10 Vulnerabilities (XSS, SQL Injection, CSRF, etc.)
+ Web App Security Tools (Scanners, Fuzzers, etc), Remediation of Web App
+ Vulnerabilities, Web Application Audits and Risk Assessment.
Web Application Security 101 was conducted by:
Vaibhav Gupta, Vishal Ashtana, Sandeep Singh from Null.
Latest trends in information technologyAtifa Aqueel
This ppt includes the latest trends in information technology such as big data analytics, cloud computing, virtual reality, 5G wireless technology etc.
This slide provides details about cyber security as following;
what is cyber security or computer security?
why cyber security is important?
what is cyber crime?
cyber security problems,
how to prevent from cyber crime?
global scenario of cyber crime?
organisation in world for cyber security,
top companies in cyber security,
career choice in cyber security,
scope of cyber security.
Public WiFi works as an essential tool for people who are constantly on the move and need to get things done. But, while having easy access to public WiFi networks is convenient, it can put your data at risk of being snooped by attackers, simply because such networks are often not secured. This webinar will give you an in-depth knowledge on:
1. Dangers of using unsecured WiFi networks
2. 6 security tips for using such networks securely
3. How Quick Heal helps reduce the risks of unsecured WiFi networks
** Cyber Security Course: https://www.edureka.co/cybersecurity-certification-training **
This Edureka PPT on "Cybersecurity Fundamentals" will introduce you to the world of cybersecurity and talks about its basic concepts. Below is the list of topics covered in this session:
Need for cybersecurity
What is cybersecurity
Fundamentals of cybersecurity
Cyberattack Incident
Follow us to never miss an update in the future.
Instagram: https://www.instagram.com/edureka_learning/
Facebook: https://www.facebook.com/edurekaIN/
Twitter: https://twitter.com/edurekain
LinkedIn: https://www.linkedin.com/company/edureka
Studies and analysis the aspects of confidentiality, integrity and availability of information(data) with regard to the organisation. Identify exposure to accidental or intentional , destruction, disclosure , modification or interruption of information that may cause serious financial and or information loss Study of cyber security and incident response and has become necessary because attacks frequently cause the compromise of personal and business data. Heightened incidents concerns about national security and exposure of personally identifiable information. Racing awareness of the possible effects of computer barred attacks is the other reason.
This presentation deals about "CYBER SECURITY ON SOCIAL MEDIA". In this presentation ,I focused mainly on what cyber security actually is . I even covered what are different cyber crimes, cyber attacks as we could only provide security only if we know the threats.Then why do we actually need "CYBER SECURITY?" , followed by the safety measures.I mainly focused on how ,the end-to-end encryption of messages is done in any social media using "CRYPTOGRAPHY" .
+ Background & Basics of Web App Security, The HTTP Protocol, Web.
+ Application Insecurities, OWASP Top 10 Vulnerabilities (XSS, SQL Injection, CSRF, etc.)
+ Web App Security Tools (Scanners, Fuzzers, etc), Remediation of Web App
+ Vulnerabilities, Web Application Audits and Risk Assessment.
Web Application Security 101 was conducted by:
Vaibhav Gupta, Vishal Ashtana, Sandeep Singh from Null.
Latest trends in information technologyAtifa Aqueel
This ppt includes the latest trends in information technology such as big data analytics, cloud computing, virtual reality, 5G wireless technology etc.
COMIT/Fiatech Conference 2015, Hallam, London
Well known to COMIT members, futurist Fran is back by popular demand looking towards the future of technology.
1. What are the differences between a DBMS and RDBMS?
2. Explain the terms database and DBMS. Also, mention the different types of DBMS.
3. What are the advantages of DBMS?
4. Mention the different languages present in DBMS
5. What do you understand by query optimization?
6. Do we consider NULL values the same as that of blank space or zero?
7. What do you understand by aggregation and atomicity?
8. What are the different levels of abstraction in the DBMS?
9. What is an entity-relationship model?
10. What do you understand by the terms Entity, Entity Type, and Entity Set in DBMS?
11. What are relationships and mention different types of relationships in the DBMS
12. What is concurrency control?
13. What are the ACID properties in DBMS?
14. What is normalization and what are the different types of normalization?
15. What are the different types of keys in the database?
16. What do you understand by correlated subqueries in DBMS?
17. Explain Database partitioning and its importance.
18. What do you understand by functional dependency and transitive dependency in DBMS?
19. What is the difference between two and three-tier architectures?
20. Mention the differences between Unique Key and Primary Key
21. What is a checkpoint in DBMS and when does it occur?
22. Mention the differences between Trigger and Stored Procedures
23. What are the differences between Hash join, Merge join and Nested loops?
24. What do you understand by Proactive, Retroactive and Simultaneous Update?
25. What are indexes? Mention the differences between the clustered and non-clustered index
26. What do you understand by intension and extension?
27. What do you understand by cursor? Mention the different types of cursor A cursor is a database object which helps in manipulating data, row by row and represents a result set.
28. Explain the terms specialization and generalization
29. What do you understand by Data Independence?
30. What are the different integrity rules present in the DBMS?
31. What does Fill Factor concept mean with respect to indexes?
32. What is Index hunting and how does it help in improving query performance?
33. What are the differences between network and hierarchical database model?
34. Explain what is a deadlock and mention how it can be resolved?
35. What are the differences between an exclusive lock and a shared lock?
=>Concept of Governance
=>Risk and Control (GRC) as applicable to IT operational risk
=>Importance of documentation
=>DATA FLOW DIAGRAM for every application
=>Review of changes in the Data flow, reporting, etc.
=>Parameters for review
=>Importance of review on SLA compliance
=>Reporting to IT Strategy committee, Board etc.
Importance of Data - Where to find it, how to store, manipulate, and characterize it
Artificial Intelligence (AI)- Introduction to AI & ML Technologies/ Applications
Machine Learning (ML), Basic Machine Learning algorithms.
Applications of AI & ML in Marketing, Sales, Finance, Operations, Supply Chain
& Human Resources Data Governance
Legal and Ethical Issues
Robotic Process Automation (RPA)
Internet of Things (IoT)
Cloud Computing
What is Data ?
What is Information?
Data Models, Schema and Instances
Components of Database System
What is DBMS ?
Database Languages
Applications of DBMS
Introduction to Databases
Fundamentals of Data Modeling and Database Design
Database Normalization
Types of keys in database management system
Distributed Database
CASE (COMPUTER AIDED SOFTWARE ENGINEERING)
CASE and its Scope
CASE support in software life cycle documentation
project management
Internal Interface
Reverse Software Engineering
Architecture of CASE environment.
SOFTWARE RELIABILITY AND QUALITY ASSURANCE
Reliability issues
Reliability metrics
Reliability growth modeling
Software quality
ISO 9000 certification for software industry
SEI capability maturity model
comparison between ISO and SEI CMM
Software Testing
Different Types of Software Testing
Verification
Validation
Unit Testing
Beta Testing
Alpha Testing
Black Box Testing
White Box testing
Error
Bug
Software Design
Design principles
Problem partitioning
Abstraction
Top down and bottom up-design
Structured approach
Functional versus object oriented approach
Design specifications and verification
Monitoring and control
Cohesiveness
Coupling
Fourth generation techniques
Functional independence
Software Architecture
Transaction and Transform Mapping
SDLC
PDLC
Software Development Life Cycle
Program Development Life Cycle
Iterative model
Advantages of Iterative model
Disadvantages of Iterative model
When to use iterative model
Spiral Model
Advantages of Spiral model
Disadvantages of Spiral model
When to use Spiral model
Role of Management in Software Development
Software Lifecycle Models / Software Development Models
Types of Software development models
Waterfall Model
Features of Waterfall Model
Phase of Waterfall Model
Prototype Model
Advantages of Prototype Model
Disadvantages of Prototype model
V Model
Advantages of V-model
Disadvantages of V-model
When to use the V-model
Incremental Model
ITERATIVE AND INCREMENTAL DEVELOPMENT
INCREMENTAL MODEL LIFE CYCLE
When to use the Incremental model
Rapid Application Development RAD Model
phases in the rapid application development (RAD) model
Advantages of the RAD model
Disadvantages of RAD model
When to use RAD model
Agile Model
Advantages of Agile model
Disadvantages of Agile model
When to use Agile model
Introduction to software engineering
Software products
Why Software is Important?
Software costs
Features of Software?
Software Applications
Software—New Categories
Software Engineering
Importance of Software Engineering
Essential attributes / Characteristics of good software
Software Components
Software Process
Five Activities of a Generic Process framework
Relative Costs of Fixing Software Faults
Software Qualities
Software crisis
Software Development Stages/SDLC
What is Software Verification
Advantages of Software Verification
Advantages of Validation
Cloud Computing
Categories of Cloud Computing
SaaS
PaaS
IaaS
Threads of Cloud Computing
Insurance Challenges
Cloud Solutions
Security of the Insurance Industry
Cloud Solutions
Insurance Security in the Insurance Industry with respect to Indian market
Application Software
Applications Software
Software Types
Task-Oriented Productivity Software
Business Software
Application Software and Ethics
Computers and People
Software:
Systems and Application Software
Identify and briefly describe the functions of the two basic kinds of software
Outline the role of the operating system and identify the features of several popular operating systems
Discuss how application software can support personal, workgroup, and enterprise business objectives
Identify three basic approaches to developing application software and discuss the pros and cons of each
Outline the overall evolution and importance of programming languages and clearly differentiate among the generations of programming languages
Identify several key software issues and trends that have an impact on organizations and individuals
Programming Languages
A formal language for describing computation?
A “user interface” to a computer?
Syntax + semantics?
Compiler, or interpreter, or translator?
A tool to support a programming paradigm?
Number Codes and Registers
2’s complement numbers
Addition and subtraction
Binary coded decimal
Gray codes for binary numbers
ASCII characters
Moving towards hardware
Storing data
Processing data
More from Amity University | FMS - DU | IMT | Stratford University | KKMI International Institute | AIMA | DTU (20)
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Honest Reviews of Tim Han LMA Course Program.pptxtimhan337
Personal development courses are widely available today, with each one promising life-changing outcomes. Tim Han’s Life Mastery Achievers (LMA) Course has drawn a lot of interest. In addition to offering my frank assessment of Success Insider’s LMA Course, this piece examines the course’s effects via a variety of Tim Han LMA course reviews and Success Insider comments.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
3. Table of Contents
• Introduction
• Information Technology
• Latest Trends in IT - 2020
• Industrial Intelligent Automation
• Intelligent Automated Transportation
Systems
• Autonomous On Demand Aviation
• Internet of Things
• History of Internet of Things
• SMAC
• Virtual Reality - VR
• History of VR
• Types of Virtual Reality
• Applications of VR
• Big Data Analytics
• BIG DATA as an Opportunity
• Hadoop: Solution to BIG DATA Problems
• Hadoop Ecosystem
• Cloud Computing
• Cloud Computing Services
• Cloud Architecture
• Modes of Clouds
• Distributed Vs Grid Vs Cloud
• Is Cloud Computing reduces E-Wastes?
• 5G Wireless Technology
• Wireless Evolution
• Technology Evolution
• 5G DRIVERS
• Research Challenges for 5G
• 5G Timeline
• Features of 5G Technology
• Conclusion
4. Introduction
• ITAA (Information Technology Association of America) defined
information technology as being the study, design, development,
implementation, support and/or management of any computer based
information system.
5. Information Technology
• Of many revolutions that have
changed the world, it is
Information Technology that
rules the roost in the 21st
century.
• IT has led to complete
metamorphosis of society.
• Life without technology is
paralyzed today.
6. Latest Trends in Information
Technology in 2020
• Internet of Things - IoT
• Virtual Reality
• Big DataAnalytics
• Cloud Computing
• 5G Wireless Technology
• Artificial Intelligence
• Enterprise Software
• Blockchains
• Seamless voice recognition
• Wearable Technologies
7. The new IT platform will enable the 4th wave of economicrevolution
8. Industrial Intelligent Automation
• Industrial Intelligent Automation will be enabled by IoT, Cognitive/AI, Analytics,
Intelligent Machines and Assembly Lines, Robots and Robotics, Edge (Fog)
Computing and Swarming Technology.
• We are seeing an increased number of robots designed for industry specific
applications.
10. Intelligent Automated Transportation
Systems
Technologies such as IoT, Cognitive/AI, analytics, advanced vehicle
communications, edge (fog) computing and swarming technology, will enable
driverless on-demand vehicles… virtually eliminating accidents, reducing
congestion and pollution, while increasing productivity.
11. Contd…
Driverless cars get all the press but think about all the otherautonomous
transportation vehicles that are coming…
Source: Bill Chamberlin, Distinguished MI Professional, Technology Trends to watch in 2017(IBM internal version) /
Horizon Watch Community Leader. 2017
12. Autonomous On Demand Aviation
The future of air transportation will be autonomous and on demand. Enabling
technologies will include IoT,AI, Cloud, Fog Computing, SwarmingTechnology,
Quantum Computing technology.
Companies to watch:
• Uber
• Airbus
• Kitty Hawk / Zee.Aero
• JobyAviation
• UrbanAeronautics
• LiliumAviation
• AeroMobile
• Volocopter
Source: Bill Chamberlin, Distinguished MI Professional, Technology Trends to watch in 2017(IBM internal version) /
Horizon Watch Community Leader. 2017
13. What will come??
The Future of Work will involve a partnership between humansand cognitive
systems technology.
14. Where arewe headed
The future (2040-50) IT platform will be very fast and optimizedfor
distributed cloud-based cognitive applications.
Characteristics:
•Distributed / Edge Computing
•Secure
•Data as an Asset
•Blockchain
•Analytics
•Cognitive
•UX by Design
•Very Fast a Zettascale computing (1021)?
15. “How much more IOT can do is only left to your imagination and to
your budget. You can do as little or as much with IoT as you want.”
Internet of Things (IOT)
- We Are At The Tip of AnIceberg
16. The Internet Of Things
IDC estimates there will
be approximately 212
billion things globally by
the end of 2020.
Extreme Networks
estimates that 5 billion
people will have
Internet
access.
The ‘Internet of Things’
will generate
$14,400,000,000 of
value over the next
decade1.
There will be 40 times
more devices than
people on the Internet in
20202.
source: 1read.bi/1yDOQQ3 | 2 http://www.idc.com/getdoc.jsp?containerId=prUS24366813
17.
18. KEVIN ASHTON: The Father of IoT
In 1999, Kevin Ashton coins the term INTERNET
OF THINGS (IoT) and establishes MIT’s auto ID
center a global research network of academic
laboratories focused on RFID and the IoT
He believed IoT could “turn the world into
data” that could be used to make macro
decisions on resource utilization.
“Information is a great way to reduce waste
and increase efficiency, and that’s really
what the Intewrnet of Thnings provide”
Source: The reimagination thought Leaders summit, Sydney, 17 Nov 2015
KEVINASHTON
22. 1. SENSORS and Actuators
• We are giving our world a digital nervous system. Locating data using
GPS sensors. Eyes and ears using microphones and cameras, along with
sensory organs that can measure everything from temperature to pressure.
Source: http://postscapes.com/what-exactly-is-the-internet-of-things-
23. 2. CONNECTIVITY
• These inputs are digitized and placed onto networks.
Source: http://postscapes.com/what-exactly-is-the-internet-of-things-
24. 3. PEOPLE and Processes
• These networked inputs can then be combined into bidirectionalsystems
that integrate data, people, processes and systems for betterdecision
making.
Source: http://postscapes.com/what-exactly-is-the-internet-of-things-
44. What is Virtual Reality
Virtual Reality (VR) is the illusion of a Three-Dimensional,Interactive,
Computer-Generated Reality, where Sight, Sound, and sometimes even
Touch are simulated to create Pictures, Sounds, and Objects that actually seem
real.
45. Why VR?
VR is able to immerse you in a Computer-Generated World of
your own making: Room, City, The interior of Human body. With
VR, you can explore any Uncharted Territory of the Human
Imagination.
46. History of VR
•In 1950s, flight simulators were built by
US Air Force to train student pilots.
•In 1965, a research program for computer
graphics called “The Ultimate Display”
was laid out.
•In 1988, commercial development of VR
began.
•In 1991, first commercial entertainment
VR system "Virtuality" was released.
Source:
47. Types of Virtual Reality
1. Immersive VR :
• Completely immerse the user's personal
viewpoint inside the Virtual 3D-World.
•The user has No Visual Contact with the
physical world.
• Often equipped with a Head Mounted
Display (HMD).
2. Window on World (WOW):
• Also known as DesktopVR.
• Use of a Monitor to display the visual
world.
• Does Not require Special Hardware.
• Low Cost , Low Performance, Less
Immersion.
Source: www.slideshare.net/virtual-
48. Contd….Types of Virtual Reality
3. Telepresence :
• Real-time Telepresence-
Interaction are Reflected to some
real world objects.
• Delayed Telepresence
Interactions are Recorded, and later
operations are applied to the real-world
object.
4. Augmented Reality :
• The seamless merging of Real
space and Virtual space.
• Integrating the Computer-
Generated Virtual objects into the
Physical world which become in
a sense an equal part of our
natural environment.
Source: www.slideshare.net/virtual-
49. Applications of VR
1. Entertainment and Movies :-
• 360-Degree cameras or VR
cameras, that have the ability to
record in all directions.
• VR cameras are used to create
images and videos that can be
viewed in VR.
• The experience allows users to
interact with the characters and
worlds.
Source: www.slideshare.net/virtual-
50. Contd…
2. Biological :-
• Practice performing surgery.
• Perform surgery on a remote patient.
• Teach new skills in a safe, controlled environment
Source: www.slideshare.net/virtual-
51. Contd…
3.GAMES :-
• The use of graphics, sound and
input technology in Video
games can be incorporated into VR.
•The VR Technology gives feedback
through visual, auditory, haptic and
other sensory systems.
Source: www.slideshare.net/virtual-
52. Contd…
4. Education and Training :-
• Provide learners with a Virtual
environment where they can
develop their skills without the
real world consequences of
failing.
• The fully Immersive training
environment allows to train
through a wide variety of
Terrains, situations and
scenarios..
Source: www.slideshare.net/virtual-
53. Problems and Advantages
• Motion sickness / Simulator sickness
• Low-Accuracy
• Expensive
• Bit lack of integration between application
• packages.
Cost-saving
High-level contact between participants inVR.
High-Accuracy system
VR enables us to experience the virtual world that is impossible inreal
world.
VR is changing our life, eventually VR will increasingly become a partof
our life.
The Best of VR is Yet to Come
59. What is BIG DATA?
Source: www.edureka.com/big-data-and-
60.
61. Astonishing Growth of BIG DATA
Today, every two days we create as much data as we did from the beginning
of time untill 2000.
• By 2020, the amount of digital
information will have grown from
around 5 zettabytes today to 50
zettabytes
• Now a days, almost every action
we take leaves a trial
• We generate data whenever we
go online, use our GPS-
equipped smartphones,
communicate our friends
through social media or do
online shopping Image source:
62. 5 V’s of BIG DATA
• 1. VOLUME
Source: www.edureka.com/big-data-and-
75. Cloud Computing
An environment created in a user’s
machine from an on-line application
stored on the cloud and run through
a web browser.
In simple language Cloud computing
is using the internet to access
someone else's software running on
someone else's hardware in someone
else's data center.
76. Cloud Computing Services
►Software as a Service (SaaS)-
End Users
►Platform as a Service (PaaS)-
Application Developers
►Infrastructure as a Service
(IaaS)-NetworkArchitects
Source: www.slideshare.net/cloud-
77. Software as a Service(SaaS)
• Just run it for me!
• Also known as On-demand Service.
• An application that can be accessed
from anywhere on the world as long
as you can have an computer with an
Internet connection.
• We can access this cloud hosted
application without any additional
hardware or software.eg: G-mail,
Yahoo mail, Hotmail etc..,
• Also they can provide security
features such as SSL encryption,a
cryptographic protocol.
Source: www.slideshare.net/cloud-
78. Platform as a Service (PaaS)-
Application Developers
• Give us nice API (Application
Programming Interface) and take care
of the implementation.
• In the PaaS model, cloud providers
deliver a computing platform and/or
solution stack typically including
operating system, programming
language execution environment,
database, and web server.
• It is a platform for developers to
write and create their own SaaS i.e.
applications. which means rapid
development at low cost.
• E.g.: Salesforce.com, Windows Azure
etc.
Source: www.slideshare.net/cloud-
79. Infrastructure as a Service (IaaS)-
Network Architect
• Also known as hardware as a service.
• It is a computing power that you can rent for a limited period of time.
• Allows existing applications to be run on a cloud suppliershardware.
• Cloud providers offer computers – as physical or more often as virtual
machines – raw (block) storage, firewalls, load balancers, and networks
Source: www.slideshare.net/cloud-
81. Modes of Clouds
• Public Cloud
► Computing infrastructure is hosted by cloud vendor at the vendors
premises.
► and can be shared by various organizations.
► E.g. : Amazon, Google, Microsoft, Salesforce
• Private Cloud
► The computing infrastructure is dedicated to a particular organization
and not shared with other organizations.
► more expensive and more secure when compare to public cloud.
► E.g. : HP data center, IBM, Sun, Oracle, 3tera
• Hybrid Cloud
► Organizations may host critical applications on privateclouds.
► where as relatively less security concerns on publiccloud.
► usage of both public and private together is called hybridcloud.
Source:
82. Distributed vs. Grid vs. Cloud
Parameters Distributed Grid Cloud
Time Weeks to Months Days to Weeks Minutes
Scalability Slowest, Rigid and
Costly
Slower, somewhat
flexible, costly
Instant, Flexible,
Pay-per-usage
Cost High CapEx Costly, sometime
monthly/yearly
contracts, no capEx
No contracts, usage
based, no upfront
costs
*Green* Low Low High- Virtualized
Pricing Model Buy servers and pay
fully weather used
or not
Rent servers and
hosting cost
weather used or not
Rent based on usage
only
Source: www.slideshare.net/cloud-
83. Is Cloud Computing
reduces E-Wastes?
• Green IT Cloud Computing
• Cloud Computing is Eco-Friendly.
• We can reduce E-waste by using Cloud Computing i.e. by
Infrastructure as a Service (IaaS).
• Cloud Computing Helps to Accelerate Green IT
• Can reduce Global Warming too..
84.
85. Merits and Demerits
Merits Demerits
Unlimited storage capacity Requires a constant Internet connection
Improved performance Stored data might not be secure
Reduced software costs Stored data can be lost
Instant software updates Not clear that you can run compute-
intensive HPC applications
Improved document format compatibility Does not work well with low-speed
connections
Increased data reliability Can be slow
Universal document access Features might be limited
Easier group collaboration Each cloud systems uses different
protocols and different APIs
Latest version availability When you are offline, cloud computing
simply does not work
89. Wireless Evolution
Generati
on
Access
Protocol
Key Features Level of Evolution
1G FDMA Analog, primarily voice, less secure, support Access to and roaming across
for low bit rate data single type of analog wireless
networks
2G & TDMA,CD Digital, more secure, voice and data Access to and roaming across
2.5G MA single type of digital wireless
networks and access to 1G
3G & CDMA Digital, multimedia, global roaming across a Access to and roaming across
3.5G 2000,WCD single type of wireless network(for example, digital multimedia wireless
MA,HSDP cellular), limited IP interoperability, 2Mbps networks and access to 2G and 1G
A,TD- to several Mbps
SCDMA
4G OFDM Global roaming across multiple wireless Access to and roaming across
networks, 10Mbps-100Mbps, IP diverse and heterogeneous mobile
interoperability for seamless mobile internet and wireless Broadband networks
and access to 3G,2G and 1G
91. 5G DRIVERS
Source: Dr Shahram G Niri, Reshaping mobile broadband
with 5G communication technologies, 5G World Summit
92. 5G: A Paradigm Shift and Rethinking
of Mobile Business
Source: Dr Shahram G Niri, Reshaping mobile broadband with 5G communication technologies, 5G World
93. Research Challenges for 5G
Source: Dr Shahram G Niri, Reshaping mobile broadband with 5G communication technologies, 5G World
94.
95. Capacity (New Air Interface)
Source: Dr Shahram G Niri, Reshaping mobile broadband with 5G communication technologies, 5G World
96. Quality, Efficiency and Cost
Source: Dr Shahram G Niri, Reshaping mobile broadband with 5G communication technologies, 5G World
97. 5G Timeline
Source: Dr Shahram G Niri, Reshaping mobile broadband with 5G communication technologies, 5G World
98. Features of 5G Technology
• 5G technology is going to be a new revolution in wireless systems market.
• As data traffic has tremendous growth potential under 4G. existing voice
centric telecom hierarchies will be moving flat IP architecture where base
stations will be directly connected to media gateways
• 5G will promote concept of Super Core, where all the network operators will
be connected one single core and have one single infrastructure, regardless of
their access technologies.
• 5G will bring evaluation of active infra sharing and managed services and
eventually all existing network operators will be MVNOs (Mobile virtual
network operators).
• 5G technology would offer high resolution for wireless gadget users and bi-
directional large bandwidth shaping.
• The advanced billing interfaces of 5G technology makes it more attractive and
effective.
• The high quality services of 5G technology is based on Policy to avoiderror.
99.
100. Conclusion
• IT is now called industry 4.0 which means artificial intelligence,
smart devices, big data, social media.
• IT and computer network technology is continuing to develop in new
and interesting ways.
• Some key developments that have transpired over the past several
years include:
• The growing popularity of cloud computing and cloud storage
• Improvementsto mobile (cellular) network infrastructure: 5Gis yet to
come.
• In 2018, an array of new devices targeted at the Internet of Things
(IoT) market will undoubtedly compete for our attention.
• The Pace of IPv6 Rollout Continues toAccelerate.
• The field of AI is growing very fast and develops computers and
machines with human-like intelligence which is dangerous for the
humanity.
102. ThankYou&
KeepLearning!
?Follow us :
You can find me at
https://www.linkedin.com/in/drkamalgulati/
https://mybigdataanalytics.in/
https://www.facebook.com/DrKamalGulatiBigD
ATA/