Chapter 8 - Multimedia Storage and RetrievalPratik Pradhan
This is the subject slides for the module MMS2401 - Multimedia System and Communication taught in Shepherd College of Media Technology, Affiliated with Purbanchal University.
This article gives a complete review of computer storage devices, lists many examples of different types as well as introduces how to make use of them.
Chapter 8 - Multimedia Storage and RetrievalPratik Pradhan
This is the subject slides for the module MMS2401 - Multimedia System and Communication taught in Shepherd College of Media Technology, Affiliated with Purbanchal University.
This article gives a complete review of computer storage devices, lists many examples of different types as well as introduces how to make use of them.
In this presentation, we describe the computer storage.
The basic unit of data storage,
Memory hierarchy
CPU register
Cache memory
Types of storage
Primary Memory
RAM
ROM
Secondary Memory
Magnetic memory
Optical storage
Explains the following topic such as Types of Secondary Storage Devices, Magnetic Tape,Magnetic Disk,Types of Magnetic Disks,Optical Disk
Types of Optical Disks,Magneto-Optical Storage Devices,Universal Serial Bus,Memory Stick,Mass Storage Devices
Secondary storage devices are required mainly because primary storage devices are volatile and information is lost the moment power is switched off. Floppy Disks and Drive, Hard Disks, CD/DVD drive, Pen drive and magnetic tapes are some of the secondary storage devices.
For more such innovative content on management studies, join WeSchool PGDM-DLP Program: http://bit.ly/ZEcPAc
You can present like this :
Good to all
I am --
going to present a presentation on Computer c.p.u
We all know that cpu consist of three elements
C.U,ALU,MU ___ Explain little all because are main focus on secondary memory
FOUND ANY ERROR PLEASE COMMENT
Thank you
In this presentation, we describe the computer storage.
The basic unit of data storage,
Memory hierarchy
CPU register
Cache memory
Types of storage
Primary Memory
RAM
ROM
Secondary Memory
Magnetic memory
Optical storage
Explains the following topic such as Types of Secondary Storage Devices, Magnetic Tape,Magnetic Disk,Types of Magnetic Disks,Optical Disk
Types of Optical Disks,Magneto-Optical Storage Devices,Universal Serial Bus,Memory Stick,Mass Storage Devices
Secondary storage devices are required mainly because primary storage devices are volatile and information is lost the moment power is switched off. Floppy Disks and Drive, Hard Disks, CD/DVD drive, Pen drive and magnetic tapes are some of the secondary storage devices.
For more such innovative content on management studies, join WeSchool PGDM-DLP Program: http://bit.ly/ZEcPAc
You can present like this :
Good to all
I am --
going to present a presentation on Computer c.p.u
We all know that cpu consist of three elements
C.U,ALU,MU ___ Explain little all because are main focus on secondary memory
FOUND ANY ERROR PLEASE COMMENT
Thank you
2016.05.05 collective intelligence – an innovative research approach to promo...NUI Galway
Dr. Patricia McHugh, Dr. Veronica McCauley & Dr. Kevin Davison presented this seminar on Collective Intelligence - An Innovative Research Approach to Promoting Ocean Literacies in Ireland under the Sea Change project. They spoke on behalf of the Social Innovation, Participation and Policy Cluster (SIPPs) as part of the Whitaker Institute's Ideas Forum on 5th May 2016.
Creation and Development of a Mobile application for Domino’s Pizza España
Domino’s Pizza España will upgrade the ordering system through implementing a new
mobile application, starting at one franchise located in Valencia (Spain).
This project will facilitate the take of orders through mobile devices (iPhone, iPod touch
and iPad), which will help Domino’s Pizza customers to make orders through its mobile phones providing them various benefits.
Moreover, this project continues the strategy that it is been implementing in the US market, where they have carried a similar project in order to satisfy the customer needs as well as exploiting the opportunities of new technologies.
This is for educational purpose only. If you own any of the content please let me know. We are not here to hurt anyone's emotion. Please try to co-operate and use this for educational purposes only.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
2. Why Learn About Hardware?
• Organizations invest in computer hardware to improve
– worker productivity,
– Increase revenue,
– reduce costs,
– provide better customer service,
– speed up time-to-market, and
– enable collaboration among employees.
• Organizations that don’t make wise hardware investments
will be stuck with outdated equipment that is unreliable
and cannot take advantage of the latest software advances.
• Such obsolete hardware can place an organization at a
competitive disadvantage.
3.
4. Hardware
• Any machinery (most of which uses digital
circuits) that assists in the input, processing,
storage, and output activities of an
information system.
5. COMPUTER SYSTEMS: INTEGRATING THE POWER
OF TECHNOLOGY
• As auto manufacturers must match the
intended use of a vehicle to its components,
so too must business managers select the
hardware components of an effective
information system.
• E.g The Iowa Health System
– Store and manage image data such as magnetic
resonance images (MRIs).
– NHS failure
6. Central Processing Unit (CPU)
• It is also called microprocessor or processor
• The part of the computer that consists of three associated elements: the
arithmetic/logic unit, the control unit, and the register areas.
Arithmetic/logic unit (ALU)
• Performs mathematical calculations and makes logical comparisons.
Control unit
• Sequentially accesses program instructions, decodes them, and coordinates the
flow of data in and out of the ALU, registers, primary storage, and even secondary
storage and various output devices.
Register
• A high-speed storage area in the CPU used to temporarily hold small units of
program instructions and data immediately before, during, and after execution by
the CPU.
• Registers provide temporary memory storage locations within the processor.
7.
8. • Three kinds of buses link the CPU, primary storage, and
the other devices in the computer system.
• The data bus moves data to and from primary storage.
• The address bus transmits signals for locating a given
address in primary storage, indicating where data
should be placed.
• The control bus transmits signals specifying whether
to read or write data to or from a given primary storage
address, input device, or output device.
9. CPU speed
• The speed and performance of a computer’s
microprocessors help determine a computer’s
processing power.
• The first factor is Word length: the number of
bits that the computer can process at one
time.
– 32 bit-process 4 bytes
– 64 bit process 8 bytes data at the same time
10. • A second factor affecting chip speed is cycle
speed
– measured in megahertz
• A third factor affecting speed is the data bus
width.
– For better performance the word length and data
bus width should match
11. Memory
Random access memory (RAM)
– A form of memory in which instructions or data
can be temporarily stored.
Read-only memory (ROM)
– A nonvolatile form of memory.
Cache memory
– A type of high-speed memory that a processor can
access more rapidly than main memory.
12. Secondary Storage Technology
Magnetic Disk
• The most widely used secondary-storage
medium today is magnetic disk. There are two
kinds of magnetic disks:
– floppy disks (used in PCs) and
– hard disks (used on large commercial disk drives
and PCS
13. Magnetic Tape
• is a type of sequential secondary storage
medium, now used primarily for storing
backups.
• Cheaper and slower in retrieval
• U.S. federal government is the largest user of
magnetic tape in the world, buying over 1
million reels of tape each year
14. DVD
• DVD-5 (DVD-R, DVD-RW, and DVD+RW)
– single sided single layered
– is capable of holding up to 4.37 GB worth of data
and is available in each of the media formats listed
in the above heading.
• DVD-9 (DVD+R9 or DVD+R DL (Dual Layered))
– singled sided dual layered
– DVD-9 is capable of holding up to 8.5 GB worth of
data
15. cont
• DVD-10 (DVD-R, DVD-RW, and DVD+RW)
– double sided single layered
– is capable of holding up to 9.4 GB worth of data and is
available in each of the media formats listed in the
above heading.
– It is important to understand when buying these discs
they are labeled as "DVD-RW Only" or "DVD+RW
Only", make sure to purchase the discs designed for
your drive.
• DVD-18 (DVD+R9 or DVD+R DL (Dual Layered))
– double sided dual layered,
– is capable of holding up to 15.9 GB worth of data
16. DVD standards
• Unfortunately, unlike recordable CD drives,
there are many different competing standards
for creating DVD discs
• DVD-R And DVD-RW arean approved standard
by DVD Forum
• DVD+R And DVD+RW are DVD+RW Alliance
standard of disc.
17. Blu Ray
• The Blu-ray high-definition video-disc format
based on blue-laser technology stores at least
three times as much data as a DVD now holds.
• The primary use for this new format is in
home entertainment equipment to store high-
definition video, though this format can also
store computer data.
18. Holographic versatile disc
• Holographic versatile disc (HVD) is a
holographic storage format that looks like a
DVD but is capable of storing far more data.
• Prototype HVD devices have been created
with a capacity of 3.9 terabytes (TB) and a
transfer rate of 1 gigabit per second (1 Gbps).
At that capacity, an HVD could store as much
information as 830 DVDs or 160 Blu-Ray discs.
19. Access Method
• Sequential access A retrieval method in which data
must be accessed in the order in which it is stored.
• Direct access A retrieval method in which data can be
retrieved without the need to read and discard other
data.
• sequential access storage devices (SASDs) A device
used to sequentially access secondary storage data.
• direct access storage devices (DASDs). A device used
for direct access of secondary storage data.
20. Redundant array of independent
disks (RAID)
• A method of storing data that generates extra bits of
data from existing data, allowing the system to create a
“reconstruction map” so that if a hard drive fails, it can
rebuild lost data.
• With this approach, data is split and stored on different
physical disk drives using a technique called striping to
evenly distribute the data.
Disk mirroring
• A process of storing data that provides an exact copy
that protects users fully in the event of data loss.
• One application of RAID
21. Enterprise Storage Options
• Attached Storage
• Network-Attached Storage
– Storage devices that attach to a network instead
of to a single computer.
– NAS includes software to manage storage access
and file management and relieve the users’
computers of those tasks
– both application software and files can be served
faster because they are not competing for the
same processor resources
22. • Storage Area Network
– a special-purpose, high-speed network that
provides direct connections between data-storage
devices and computers across the enterprise
– Using a SAN, an organization can centralize the
people, policies, procedures, and practices
23.
24. Computing
• Parallel computing is the simultaneous
execution of the same task on multiple
processors to obtain results faster.
25. cont
• Grid computing is the use of a collection of
computers, often owned by multiple individuals
or organizations, to work in a coordinated
manner to solve a common problem.
• Grid computing is a low-cost approach to parallel
computing.
• European and Asian researchers are using a grid
consisting of some 40,000 computers spread
across 45 countries to combat the deadly bird flu.
26. Examples of grid computing
• SETI (Search for Extraterrestrial Intelligence) @Home project
– SETI@home is a scientific experiment that uses Internet-connected
computers in the Search for Extraterrestrial Intelligence (SETI).
– You can participate by running a free program that downloads and
analyzes radio telescope data.
• BOINC (Berkeley Open Infrastructure for Network Computing)
– Developed by University of California, Berkeley, BOINC lets you
contribute computing power on your home PC to projects doing
research in many scientific areas.
– BOINC is a common one for academic projects seeking public
volunteers
• Folding@home (abbreviated as FAH or F@h)
– Understanding how proteins self-assemble (“protein folding”) is a holy
grail of modern molecular biophysics.
27. cont
• Einstein@Home
Einstein@Home is a program that uses your
computer’s idle time to search for spinning neutron
stars (also called pulsars) using data from the LIGO
gravitational wave detector. It also searches for radio
pulsars in binary systems, using data from the Arecibo
Observatory in Puerto Rico.
• LHC@home
LHC@home is a volunteer computing program which
enables you to contribute idle time on your computer
to help physicists develop and exploit particle
accelerators, such as CERN’s Large Hadron Collider.
28. • Cloud computing involves using a giant cluster
of computers that serves as a host to run
applications that require high-performance
computing.
• Cloud computing supports a wider variety of
applications than grid computing and pools
computing resources so they can be managed
primarily by software rather than people.
30. Grid computing Cloud computing
What? Grids enable access to shared computing
power and storage capacity from your
desktop
Clouds enable access to leased computing
power and storage capacity from your
desktop
Who provides the service? Research institutes and universities
federate their services around the world
through projects such as EGI-InSPIRE and
the European Grid Infrastructure.
Large individual companies e.g. Amazon
and Microsoft and at a smaller scale,
institutes and organisations deploying
open source software such as Open Slate,
Eucalyptus and Open Nebula.
Who uses the service? Research collaborations, called "Virtual
Organisations", which bring together
researchers around the world working in
the same field.
Small to medium commercial businesses
or researchers with generic IT needs
Who pays for the service? Governments - providers and users are
usually publicly funded research
organisations, for example through
National Grid Initiatives.
The cloud provider pays for the computing
resources; the user pays to use them
Where are the computing resources? In computing centres distributed across
different sites, countries and continents.
The cloud providers private data centres
which are often centralised in a few
locations with excellent network
connections and cheap electrical power.
31. Why use them? - You don`t need to buy or
maintain your own large computer
centre
- You can complete more work
more quickly and tackle more
difficult problems.
- You can share data with your
distributed team in a secure way.
- You don`t need to buy or
maintain your own personal
computer centre
- You can quickly access extra
resources during peak work periods
What are they useful for? Grids were designed to handle large
sets of limited duration jobs that
produce or use large quantities of
data (e.g. the LHC and life sciences)
Clouds best support long term
services and longer running jobs
(E.g. facebook.com)
How do they work? Grids are an open source
technology. Resource users and
providers alike can understand and
contribute to the management of
their grid
Clouds are a proprietary technology.
Only the resource provider knows
exactly how their cloud manages
data, job queues, security
requirements and so on.
32. Benefits? - Collaboration: grid offers a
federated platform for
distributed and collective work.
- Ownership : resource
providers maintain ownership
of the resources they
contribute to the grid
- Transparency: the
technologies used are open
source, encouraging trust and
transparency.
- Resilience: grids are located at
multiple sites, reducing the risk
in case of a failure at one site
that removes significant
resources from the
infrastructure.
- Flexibility: users can quickly
outsource peaks of activity
without long term commitment
- Reliability: provider has
financial incentive to guarantee
service availability (Amazon, for
example, can provide user
rebates if availability drops
below 99.9%)
- Ease of use: relatively quick
and easy for non-expert users
to get started but setting up
sophisticated virtual machines
to support complex applications
is more difficult.
33. Drawbacks? - Reliability: grids rely on distributed
services maintained by distributed staff,
often resulting in inconsistency in
reliability across individual sites, although
the service itself is always available.
- Complexity: grids are complicated to
build and use, and currently users require
some level of expertise.
- Commercial: grids are generally only
available for not-for-profit work, and for
proof of concept in the commercial sphere
- Generality: clouds do not offer many of
the specific high-level services currently
provided by grid technology.
- Security: users with sensitive data may
be reluctant to entrust it to external
providers or to providers outside their
borders.
- Opacity: the technologies used to
guarantee reliability and safety of cloud
operations are not made public.
- Rigidity: the cloud is generally located at
a single site, which increases risk of
complete cloud failure.
- Provider lock-in: there’s a risk of being
locked in to services provided by a very
small group of suppliers.
When? The concept of grids was proposed in
1995. The Open science grid (OSG) started
in 1995 The EDG (European Data Grid)
project began in 2001.
In the late 1990`s Oracle and EMC offered
early private cloud solutions . However the
term cloud computing didn't gain
prominence until 2007.
34. Advanced input
• A magnetic stripe card
– stores limited amounts of data by modifying the
magnetism of tiny iron-based particles contained
in a band on the card.
– Magnetic stripe cards are commonly used in credit
cards, transportation tickets, and driver’s licenses.
– the card contain any information about the
cardholder in the magnetic stripe.
35. • Point-of-Sale Devices
– are terminals used in retail operations to enter
sales information into the computer system. The
POS device then computes the total charges,
including tax.
36. Automated Teller Machine (ATM) Devices
• Another type of special-purpose input/output device, the
automated teller machine (ATM)
• is a terminal that bank customers use to perform
withdrawals and other transactions with their bank
accounts.
• The ATM, however, is no longer used only for cash and bank
receipts.
– Companies use various ATM devices, sometimes called kiosks, to
support their business processes.
– Some can dispense tickets, such as for airlines, concerts, and
soccer games.
– Some colleges use them to produce transcripts.
37. Pen Input Devices
• By touching the screen with a pen input
device, you can activate a command or cause
the computer to perform a task, enter
handwritten notes, and draw objects and
figures.
38. Touch-Sensitive Screens
• Advances in screen technology allow display
screens to function as input as well as output
devices
• E.g windows 8 pcs
39. Bar-Code Scanners
• A bar-code scanner employs a laser scanner to read a
bar-coded label widely used in grocery store checkouts
and warehouse inventory control.
• A radio frequency signal can update this memory as
the status of the item changes. The data transmitted by
the tag might provide identification, location
information, or details about the product tagged, such
as date manufactured, retail price, color, or date of
purchase.
40. Advanced Output Devices
• Eyebud Screens
• Eyebud screens are portable media devices
that display video in front of one eye.
• They employ optical technology that provides
very high resolution and “enlarges” the video
or images.
41. Categories of Computers
• A personal computer (PC), which is sometimes
referred to as a microcomputer, is one that can be
placed on a desktop or carried from room to
room
• A workstation also fits on a desktop but has more
powerful mathematical and graphics processing
capability than a PC and can perform more
complicated tasks than a PC in the same amount
of time. Workstations are used for scientific,
engineering, and design work that requires
powerful graphics or computational capabilities.
42. Thin Client
• A thin client is a low-cost, centrally managed
computer with no extra drives, such as a CD or
DVD drive, or expansion slots.
• A mainframe is the largest computer, a
powerhouse with massive memory and
extremely rapid processing power. It is used for
very large business, scientific, or military
applications where a computer must handle
massive amounts of data or many complicated
processes.
43. • A supercomputer is a highly sophisticated and
powerful computer that is used for tasks requiring
extremely rapid and complex calculations with
hundreds of thousands of variable factors.
• Supercomputers use parallel processing and can
perform billions and even trillions of calculations
per second, many times faster than the largest
mainframe.
• Server computer specifically optimized to
provide software and other resources to other
computers over a network.
44. Capacity Planning and Scalability
• Capacity planning is the process of predicting when a
computer hardware system becomes saturated.
• It considers factors such as the
– maximum number of users that the system can
accommodate,
– the impact of existing and future software applications,
and
– performance measures such as minimum response time
for processing business transactions.
• Although capacity planning is performed by
information system specialists, input from managers is
essential.
45. • Scalability refers to the ability of a computer, product,
or system to expand to serve a larger number of users
without breaking down.
• There are several approaches to achieving scalability.
– One is to scale up, replacing, for example, a small server
with a larger multiprocessor server or even a mainframe.
– Another approach is to scale out, which involves adding a
large number of smaller servers.
• The choice of approach depends on the nature of the
application or set of applications requiring upgraded
hardware capacity.
46. Hardware Acquisition and the Total Cost
of Ownership (TCO) of Technology Assets
• The actual cost of owning technology
resources includes both direct and indirect
costs,
• TCO designates the total cost of owning
technology resources, including initial
purchase costs, the cost of hardware and
software upgrades, maintenance, technical
support, and training.
47. cont
• A key to reducing TCO is to create a
comprehensive asset management plan.
• Software tools are now available to help identify
and track these technology assets.
• TCO for a PC might run up to three times the
original purchase price
• Some of these tools even show managers what
assets are breaking down and why, and when
these assets should be cycled out of service.
48.
49. Monitoring Technology Trends
• Computing technology continues to change at
a blinding pace, requiring managers to
constantly monitor technology trends and
make decisions about upgrading the
organization’s information technology
infrastructure.
• New hardware technologies can provide new
ways of organizing work and sources of new
products and services.