This document discusses emerging information technologies that can improve organizational performance, including expert systems, neural networks, geographic information systems, groupware, and internet applications. It provides an overview of key topics such as the evolution of IT infrastructure, advantages and challenges of the internet and groupware, how expert systems and neural networks can be used, applications of geographic information systems, and contemporary trends in hardware/software platforms and management issues when adopting new technologies.
Computer Science is an ever-changing field with new inventions each day. Here are the latest trends in the field of computer science which are making their mark in this era of digitization.
Source: http://www.techsparks.co.in
Information Technology and Modern Gadgets: Introduction, Utilization of Various Gadgets, Advantages of modern gadgets, Disadvantages of modern gadgets, Top 10 gadgets in India with small description.
The global networks of economic wealth, political power and media will depend more and more on knowledge generation. Society will become more and more symbolic - that is, the capacity to produce and distribute goods and services will become increasingly dependent on the ability to create and manipulate electronic symbols. Companies will have to adapt to this new environment, although the process will not be easy. Companies will have to conceive of themselves as located within a shifting network of suppliers, competitors and consumers; their boundaries will accordingly be highly fluid. Permanent flexibility will be the key to survival in the new economy.
CUbRIK tutorial at ICWE 2013: part 1 Introduction to Human ComputationCUbRIK Project
2013, July 8
Part 1 of the tutorial illustrated at ICWE 2013, by Alessandro Bozzon (Delft University of Technology)
Crowdsourcing and human computation are novel disciplines that enable the design of computation processes that include humans as actors for task execution. In such a context, Games With a Purpose are an effective mean to channel, in a constructive manner, the human brainpower required to perform tasks that computers are unable to perform, through computer games. This tutorial introduces the core research questions in human computation, with a specific focus on the techniques required to manage structured and unstructured data. The second half of the tutorial delves into the field of game design for serious task, with an emphasis on games for human computation purposes. Our goal is to provide participants with a wide, yet complete overview of the research landscape; we aim at giving practitioners a solid understanding of the best practices in designing and running human computation tasks, while providing academics with solid references and, possibly, promising ideas for their future research activities.
IoT Internet of Things , represents many kinds of devices in the field, connected to data centres via various networks, submitting data, and allow themselves to be controlled. Connected cameras, TV, media players, access control systems, and wireless sensors are becoming pervasive. Their applications include Retail Solutions, Home, Transportation and Automotive, Industrial and Energy etc. This growth also represents security threat, as several hacker attacks been launched using these devices as agents. We explore the current environment and propose a quantitative and qualitative trust model, using a multi dimensional exploration space, based on the hardware and software stack. This can be extended to any combination of IoT devices, and dynamically updated as the type of applications, deployment environment or any ingredients change. Karthik MV "Trust Modelling for Security of IoT Devices" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-4 , June 2020, URL: https://www.ijtsrd.com/papers/ijtsrd31573.pdf Paper Url :https://www.ijtsrd.com/computer-science/computer-security/31573/trust-modelling-for-security-of-iot-devices/karthik-mv
Big data refers to huge set of data which is very common these days due to the increase of internet utilities. Data generated from social media is a very common example for the same. This paper depicts the summary on big data and ways in which it has been utilized in all aspects. Data mining is radically a mode of deriving the indispensable knowledge from extensively vast fractions of data which is quite challenging to be interpreted by conventional methods. The paper mainly focuses on the issues related to the clustering techniques in big data. For the classification purpose of the big data, the existing classification algorithms are concisely acknowledged and after that, k-nearest neighbour algorithm is discreetly chosen among them and described along with an example.
Computer Science is an ever-changing field with new inventions each day. Here are the latest trends in the field of computer science which are making their mark in this era of digitization.
Source: http://www.techsparks.co.in
Information Technology and Modern Gadgets: Introduction, Utilization of Various Gadgets, Advantages of modern gadgets, Disadvantages of modern gadgets, Top 10 gadgets in India with small description.
The global networks of economic wealth, political power and media will depend more and more on knowledge generation. Society will become more and more symbolic - that is, the capacity to produce and distribute goods and services will become increasingly dependent on the ability to create and manipulate electronic symbols. Companies will have to adapt to this new environment, although the process will not be easy. Companies will have to conceive of themselves as located within a shifting network of suppliers, competitors and consumers; their boundaries will accordingly be highly fluid. Permanent flexibility will be the key to survival in the new economy.
CUbRIK tutorial at ICWE 2013: part 1 Introduction to Human ComputationCUbRIK Project
2013, July 8
Part 1 of the tutorial illustrated at ICWE 2013, by Alessandro Bozzon (Delft University of Technology)
Crowdsourcing and human computation are novel disciplines that enable the design of computation processes that include humans as actors for task execution. In such a context, Games With a Purpose are an effective mean to channel, in a constructive manner, the human brainpower required to perform tasks that computers are unable to perform, through computer games. This tutorial introduces the core research questions in human computation, with a specific focus on the techniques required to manage structured and unstructured data. The second half of the tutorial delves into the field of game design for serious task, with an emphasis on games for human computation purposes. Our goal is to provide participants with a wide, yet complete overview of the research landscape; we aim at giving practitioners a solid understanding of the best practices in designing and running human computation tasks, while providing academics with solid references and, possibly, promising ideas for their future research activities.
IoT Internet of Things , represents many kinds of devices in the field, connected to data centres via various networks, submitting data, and allow themselves to be controlled. Connected cameras, TV, media players, access control systems, and wireless sensors are becoming pervasive. Their applications include Retail Solutions, Home, Transportation and Automotive, Industrial and Energy etc. This growth also represents security threat, as several hacker attacks been launched using these devices as agents. We explore the current environment and propose a quantitative and qualitative trust model, using a multi dimensional exploration space, based on the hardware and software stack. This can be extended to any combination of IoT devices, and dynamically updated as the type of applications, deployment environment or any ingredients change. Karthik MV "Trust Modelling for Security of IoT Devices" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-4 , June 2020, URL: https://www.ijtsrd.com/papers/ijtsrd31573.pdf Paper Url :https://www.ijtsrd.com/computer-science/computer-security/31573/trust-modelling-for-security-of-iot-devices/karthik-mv
Big data refers to huge set of data which is very common these days due to the increase of internet utilities. Data generated from social media is a very common example for the same. This paper depicts the summary on big data and ways in which it has been utilized in all aspects. Data mining is radically a mode of deriving the indispensable knowledge from extensively vast fractions of data which is quite challenging to be interpreted by conventional methods. The paper mainly focuses on the issues related to the clustering techniques in big data. For the classification purpose of the big data, the existing classification algorithms are concisely acknowledged and after that, k-nearest neighbour algorithm is discreetly chosen among them and described along with an example.
The survival kit for your digital transformationrun_frictionless
To go digital, you need an IT organization, an enterprise architecture, IT processes, and tools that allow for new projects to go live tomorrow instead of next week. The ability to do this will give you a competitive advantage and it will also reduce costs. But how do you get there? This white paper will get you there.
https://runfrictionless.com/b2b-white-paper-service/
Digitalization is the new buzzword, and digital solutions have become the platform for a new generation of Information Technology use cases, architectures and systems. Digital strategies and emerging digital technologies are the basis for disruptive IT innovations that will influence and guide enterprise planners and designers for many years to come. This white paper identifies and introduces the key framework technologies that will push us into the new digital era.
Rebooting IT Infrastructure for the Digital AgeCapgemini
The Digital Transformation Institute has launched its latest research report titled “Faster, Better, Smarter: Rebooting IT Infrastructure for the Digital Age.” The report highlights why organizations need robust and seamless IT infrastructure that keeps pace with evolving market and technology demands. IT infrastructure has always been known as a “keeping the lights on” function but now it has evolved into a core catalyst of Digital Transformation. However, as a function, IT infrastructure is yet to undergo a core transformation. The report discusses why a reboot is critical.
Process oriented architecture for digital transformation 2015Vinay Mummigatti
How the digitally savvy enterprises need to transform their business processes - A paper on architecture and patterns for business and technology audience.
AN INTRODUCTION TO DIGITAL TRANSFORMATION TECHNOLOGIESIAEME Publication
Digital transformation is process of using digital technologies and integrating the technologies in all areas of business which transforms four important aspects including system, process, technology and people involved in an enterprise. Business organizations cannot remain without integrating digital technologies in the businesses as expectations of customers become so trendy and they want to make all business transactions via smart technologies and internet. The emerging technologies support business organization in automating their processes and facilitate improved processes. This ultimately achieves the customers’ expectations. In this paper, the need for digital transformation, steps of digital transformation and important digital transformation technologies namely cloud computing, big data, data mining, machine learning techniques, etc., are discussed.
Efficient Data Filtering Algorithm for Big Data Technology in Telecommunicati...Onyebuchi nosiri
Efficient data filtering algorithm for Big Data technology Telecommunication is a concept aimed at effectively filtering desired information for preventive purposes, the challenges posed by unprecedented rise in volume, variety and velocity of information has necessitated the need for exploring various methods Big Data which is simply a data sets that are so large and complex that traditional data processing tools and technologies cannot cope with is been considered. The process of examining such data to uncover hidden patterns in them was evolved, this was achieved by coming up with an Algorithm comprising of various stages like Artificial neural Network, Backtracking Algorithm, Depth First Search, Branch and Bound and dynamic programming and error check. The algorithm developed gave rise to the flowchart, with each line of block representing a sub-algorithm.
Analysis of Annual Indian Visas Issued:
• Around 3.5 million visas are issued annually
• 80% of the visas issued are tourist visas
• There is strong seasonality – higher number of visas issued during the winter months
• Top 10 countries account for 60% of all the visas issued
• Higher concentration of work visas observed for China and Japan
Analysis of hit and flop Bollywood movies. The focus of this analysis is to understand the ingredients of a hit movie: Month of Release, Genre, Directors, and Actors.
1. Emerging IS Technologies and Process
Submitted to:
Prof. Sumeet Gupta
Submitted by:
Rohit Garg 12PGP091
Management Information System
Indian Institute of Management, Raipur
2012 – 2013
IIM Raipur 1 | Page
2. Abstract: Information technology has had a major impact in most industries, from grocery
stores to trucking, and has literally transformed some industries, such as financial services.
Every day brings new types of information technologies into existence, making it very
difficult for managers and board members of organizations to stay informed. This report
discusses several emerging types of information technologies and process that organizations
can use to improve their performance. Emerging technologies discussed include expert
systems, neural networks, geographic information systems, groupware, and a variety of
internet applications.
1. Introduction
Information technology has had a major impact in most industries, from grocery stores to
trucking, and has literally transformed some industries, such as financial services. Many
organizations have been relatively slow to take advantage of emerging IT.
The Information Age
The current era is commonly referred to as the “information age” because of the rapid
developments taking place in information technology, the volume and variety of
information available, and our expanding ability to process information.
Employees who work primarily at producing, managing and using information are
called “knowledge workers”.
Most managers and board members of business organizations understand how
important IT is to being competitive, or to just surviving.
Three forces seem to be converging to force organizations to use emerging IT more
effectively.
The growing government requirement for organizations to conduct their
billing and collection transactions electronically.
The growing amount of information available on the Internet, about everything
from demographics to funding sources.
The growing infiltration of personal computers making technology accessible
to both the buyers and the suppliers.
Information technology infrastructure is the set of physical devices and software required to
operate enterprise. Set of firm-wide services including:
Computing platforms providing computing services
Telecommunications services
Data management services
Application software services
Physical facilities management services
• General-purpose mainframe and minicomputer era:
1959 to present
Evolution of IT • Personal computer era: 1981 to present
infrastructure • Client / server era: 1983 to present
• Enterprise computing era: 1992 to present
• Cloud Computing: 2000 to present
IIM Raipur 2 | Page
3. Technology drivers of infrastructure evolution
Moore’s law and micro-processing power: Computing power doubles every 18
months
Law of Mass Digital Storage: The amount of data being stored each year doubles
Metcalfe’s Law and network economics: Value or power of a network grows
exponentially as a function of the number of network members
Declining communication costs and the Internet: An estimated 1.5 billion people
worldwide have Internet access. As communication costs fall toward a very small
number and approach zero, utilization of communication and computing facilities
explodes
2. Internet & Groupware
Internet access has become a routine part of all businesses. Businesses are eagerly leaping on
the E-commerce band-wagon as net-companies like Amazon.com and E-Bay skyrocket to
success.
Gathering information via the web: Like individuals and businesses, organizations use
Internet access to get virtually any kind of information they need.
Development officers use the Internet to search for information needed to
complete grant proposals.
Case workers use the Internet to find information on services ranging from
counselling to apartments for clients.
Teachers in schools at all levels use the Internet to find information for research
papers and to teach their classes.
Researchers can now do most such searches from the office or home, and the full
text of the article is often available for downloading.
Disseminating information on a web site: Just as companies are using the Internet to
provide product information and technical support, organizations are using the Internet to
provide programmatic information to a variety of constituents.
Building community: Many businesses use Internet web sites to build community.
Organizations use the formal means of distributing information to build
community, and the informal, interactive, groupware tools then let individuals
participate actively in building community.
The groupware interpersonal communication tools include E-mail, lists,
discussion boards and chat rooms.
There are an incredible variety of support groups on the Internet, for everything
from alcohol abuse to home schooling.
• Computer hardware platforms
• Operating system platforms
IT Infrastructure • Enterprise software applications
has 7 main • Data management and storage
components • Networking/telecommunications platforms
• Internet platforms
• Consulting system integration services
IIM Raipur 3 | Page
4. Advocacy: The Internet and groupware can be tailored for advocacy groups and cause-
oriented organizations. The ease with which existing list members can forward individual
items of interest to friends can drastically expand the reach of such advocacy activities.
Caveats: The Dark Side of the Internet and Groupware
While it costs very little to get Internet access, there are many hidden costs.
Employees may spend time surfing the net instead of working.
Most lists are open and un-moderated. Some lists have experienced serious disruption.
Another downside of lists is the lack of historical perspective. Some lists have
searchable archives, which is very useful if you come into the middle of an interesting
discussion.
Problems arise when an organization decides to develop its own web site. The
development and maintenance costs and the difficulty of matching IT applications
with organizational strategy and existing operations are far larger. Many organizations
that jumped onto the Internet without adequate planning have paid dearly for their
haste.
Web sites must be maintained to be effective. To keep viewers coming back, you have
to provide new, current, interesting information.
If your Internet site includes one or more E-mail addresses, it is important to respond
to messages sent to those addresses. In a busy organization, this can become a serious
time sink.
3. Expert Systems & Neural Networks
Artificial intelligence is the science of making IT replicate human behaviour, judgments and
decisions. Expert systems and neural networks are two branches of artificial intelligence that
have been widely applied in business settings and show promise for organizations.
Expert Systems: Are also called “rule based” systems. An information technology
specialist called a knowledge engineer elicits the expert decision process from the domain
expert to create a set of rules that become the knowledge base of the expert system. When
a new instance arises that requires an expert judgment, the data is fed into the expert
system, which then makes a decision by applying the rules to the new data. They can also
be used to train new human experts using an explanation facility that tells the users what
rules the expert system applied to reach its conclusion.
Neural Networks: The fundamental design of a neural network is based on the neural
structure observed in animal brains. Neural networks can recognize and match patterns.
Unlike an expert system, a neural net requires neither an expert nor rules. Neural
networks can be used as stand-alone applications, or run in conjunction with popular and
familiar spreadsheet packages.
4. Geographic Information Systems
Geographic information systems are used to graphically present and analyze spatial data,
basically anything that can be shown in map form.
Geographic information systems have been applied to police reports to analyze crime
patterns, and decide where to locate police station.
Community associations and economic development agencies have probably been the
heaviest users to date.
IIM Raipur 4 | Page
5. 5. Contemporary Hardware Platform Trends
The emerging mobile digital platform: Cell phones, smart phones, net-books, and
Tablets. These are small, low-cost lightweight devices optimized for wireless
communication and core computing tasks.
Grid computing: Connects geographically remote computers into a single network to
combine processing power and create virtual supercomputer.
Virtualization: Allows single physical resource to act as multiple resources. It reduces
hardware and power expenditures and facilitates hardware centralization.
Cloud computing: On demand computing service obtained over a network. Cloud can be
public or private and it allows companies to minimize IT investments.
Green computing: Practices and technologies for manufacturing, using, disposing of
computing and networking hardware.
Autonomic computing: Industry-wide effort to develop systems that can configure, heal
themselves when broken, and protect themselves from outside intruders.
6. Contemporary Software Platform Trends
Linux and open-source software: Produced by community of programmers, free and
modifiable by user.
Web Services: Software components that exchange information using Web standards and
languages. XML (Extensible Mark-up Language), SOAP (Simple Object Access
Protocol), WSDL (Web Services Description Language), UDDI (Universal Description,
Discovery, and Integration)
SOA (Service-oriented architecture): Set of self-contained services that communicate
with each other to create a working software application. Software developers reuse these
services in other combinations to assemble other applications as needed.
Software outsourcing and cloud services: Three external sources for software:
Software packages and enterprise software
Software outsourcing
Cloud-based software services
• Domestic: Primarily for middleware, integration
services, software support
Software outsourcing
• Offshore: Primarily for lower level maintenance,
data entry, and call centre
• Cloud computing: Ranges from free or low-
cost services for individuals to business and
enterprise software. It is accessed with Web
browser over Internet.
Cloud-based software • Mash-ups: Combinations of two or more online
services applications, such as combining mapping
software with local content
• Apps: Small pieces of software that run on the
Internet, on your computer, or on your cell
phone.
IIM Raipur 5 | Page
6. 7. Contemporary Management Issues
Dealing with platform and infrastructure change: As firms shrink or grow, IT needs to
be flexible and scalable. Scalability is the ability to expand to serve larger numbers of
users.
Making wise infrastructure investments: Amount to spend on information technology is
a complex question but the managers need to analyze direct and indirect cost (hardware,
software, and other costs including installation, training, support, maintenance,
infrastructure, downtime, space and energy)
Competitive forces model for IT infrastructure investment
Market demand for firm’s services
Firm’s business strategy
Firm’s IT strategy, infrastructure, and cost
Information technology assessment
Competitor firm services
Competitor firm IT infrastructure investments
IIM Raipur 6 | Page