SlideShare a Scribd company logo
PRISM Informatics
We Drive
Devisions
• SAP HANA
• Hardware
• Predictive Analytics
• Mobile Application
• Cyber Security
SAP HANA
1. License Sale
2. Implementation Support
3. Application Support
SAP HANA
• HANA stands for High Performance
Analytic Appliance
• Let us see one by one what is High
Performance, Analytic and Appliance
separately
SAP HANA
High Performance
• High performance is achieved by moving
the Data Base from slow Hard Disk to fast
RAM memory
• High Performance is achieved by changing
the table structure from row to columns for
faster search
SAP HANA
Analytics
• OLAP is an acronym for Online Analytical
Processing. OLAP performs
multidimensional analysis of business data
and provides the capability for complex
calculations, trend analysis, and
sophisticated data modeling.
SAP HANA
Online Transaction Processing
• OLTP is a class of software programs
capable of supporting transaction-oriented
applications on the Internet. Typically,
OLTP systems are used for order entry,
financial transactions, customer relationship
management (CRM) and retail sales.
SAP HANA
Appliance
• SAP HANA is available with pre-
configured servers, with all software,
securities and industry best practice reports
and dash boards. This reduces the
implementation time from months to weeks
SAP HANA
• All the reports and dash boards can be
viewed on personal devices like Smart
phones and tabs on the go.
• Real time reports can be viewed and
decisions can be taken on the spot
• No more waiting for any critical reports
Hardware
• Servers
• Data Centre
• Back up Servers
• Disaster Recovery
• Cloud Solution
• Network
• Firewall
• Cloud Security
• Routers
•
Hardware
•Office Access Control
•Big Data Security
•Video Surveillance
•
Cyber Security
• Information is Power
• Power is Money
• So information is stolen to make quick
money or create damages
• So it becomes necessary to protect our
data
• Here comes our Cyber Security division
•
Cyber Security
• Computer security is critical in almost any
industry which uses computers. Currently,
most electronic devices such as computers,
laptops and cellphones come with built in
firewall security software, but despite this,
computers are not 100 percent secure and
dependable to protect our data – Wikipedia
•
•
Cyber Security
• There are many different ways of hacking
into computers. It can be done through a
network system, clicking into unknown
links, connecting to unfamiliar Wi-Fi,
downloading software and files from unsafe
sites, electromagnetic radiation waves, and
many more – Wikipedia
• .
•
Cyber Security
• However, computers can be protected
through well built software and hardware,
by having strong internal interactions of
properties, software complexity and prevent
software crash and security failure -
Wikipedia
Cyber Security
• Red Team Consulting
• Application Security
• Security Operation Center
• Testing and Validation – FIPS 140-2
• Threat Analytics and Predictive Modeling
• Cyber Forensic and e-Discovery
• Cyber Security Culture Building
• Cyber Security Capacity Building
• Industrial Control System and SCADA
Security
Predictive Analytics
• Predictive analytic is an upcoming
technology which processes historical
data and gives a lot of insights,
understanding and guides us towards
future course of action in all the aspects
of enterprise
Predictive Analytic
Predictive analytic encompasses a variety of
statistical techniques from predictive
modeling, machine learning, and data mining
that analyze current and historical facts to
make predictions about future or otherwise
unknown events
Predictive Analytic
• In business, predictive models exploit
patterns found in historical and
transactional data to identify risks and
opportunities. Models capture relationships
among many factors to allow assessment
of risk or potential associated with a
particular set of conditions, guiding decision
making for candidate transactions
Predictive Analytic
• Predictive analytics is used in actuarial
science, marketing, financial services,
insurance, telecommunications, retail,
travel, healthcare, child protection,
pharmaceuticals, capacity planning
• and other fields.
Predictive Analytics
• One of the best-known applications is credit
scoring, which is used throughout financial
services. Scoring models process a
customer's credit history, loan application,
customer data, etc., in order to rank-order
individuals by their likelihood of making
future credit payments on time.
Predictive Analytic
• In future industrial systems, the value of
predictive analytics will be to predict and
prevent potential issues to achieve near-
zero break-down and further be integrated
into prescriptive analytics for decision
optimization. Furthermore, the converted
data can be used for closed-loop product
life cycle improvement which is the vision of
the Industrial Internet Consortium.
Mobile Application
• Mobile devices have become part of
parcel of human life. We use them in day
to day environment for communication,
entertainment and in profession too. So
customers look for new application to suit
their personal and profession requirement.
We develop such apps in all platforms

More Related Content

What's hot

Internet of Things - An Architectural Perspective
Internet of Things - An Architectural PerspectiveInternet of Things - An Architectural Perspective
Internet of Things - An Architectural PerspectiveGaurav Awasthi
 
Mobile Middleware and Mobility in the Enterprise - Yad Jaura, Marketing Manag...
Mobile Middleware and Mobility in the Enterprise - Yad Jaura, Marketing Manag...Mobile Middleware and Mobility in the Enterprise - Yad Jaura, Marketing Manag...
Mobile Middleware and Mobility in the Enterprise - Yad Jaura, Marketing Manag...
mfrancis
 
Healthcare presentation
Healthcare presentationHealthcare presentation
Healthcare presentation
Nicholas Pace
 
Intel boubker el mouttahid
Intel boubker el mouttahidIntel boubker el mouttahid
Intel boubker el mouttahid
BigDataExpo
 
How to Detect Heartbleed with Wire Data Analytics
How to Detect Heartbleed with Wire Data AnalyticsHow to Detect Heartbleed with Wire Data Analytics
How to Detect Heartbleed with Wire Data Analytics
ExtraHop Networks
 
How to Use Big Data to Transform IT Operations
How to Use Big Data to Transform IT OperationsHow to Use Big Data to Transform IT Operations
How to Use Big Data to Transform IT Operations
ExtraHop Networks
 
Old Dogs, New Tricks: Big Data from and for Mainframe IT
Old Dogs, New Tricks: Big Data from and for Mainframe ITOld Dogs, New Tricks: Big Data from and for Mainframe IT
Old Dogs, New Tricks: Big Data from and for Mainframe IT
Precisely
 
NARCA Presentation - IT Best Practice
NARCA Presentation - IT Best PracticeNARCA Presentation - IT Best Practice
NARCA Presentation - IT Best PracticeBrenda Majewski
 
Nexthink_it_operations_white_paper
Nexthink_it_operations_white_paperNexthink_it_operations_white_paper
Nexthink_it_operations_white_paperChristel Gunnarson
 
Nexthink-See your infrastructure as never before!!
Nexthink-See your infrastructure as never before!!Nexthink-See your infrastructure as never before!!
Nexthink-See your infrastructure as never before!!
rolandpiedl
 
Using a Cognitive Analytic Approach to Enhance Cybersecurity on Oil and Gas O...
Using a Cognitive Analytic Approach to Enhance Cybersecurity on Oil and Gas O...Using a Cognitive Analytic Approach to Enhance Cybersecurity on Oil and Gas O...
Using a Cognitive Analytic Approach to Enhance Cybersecurity on Oil and Gas O...
SparkCognition
 
Getting Real About Security Management and “Big Data”
Getting Real About Security Management and “Big Data” Getting Real About Security Management and “Big Data”
Getting Real About Security Management and “Big Data”
EMC
 
Defending Healthcare Networks with NetFlow
Defending Healthcare Networks with NetFlowDefending Healthcare Networks with NetFlow
Defending Healthcare Networks with NetFlowLancope, Inc.
 
Frontier Backupand Recovery Presentation 110311
Frontier Backupand Recovery Presentation 110311Frontier Backupand Recovery Presentation 110311
Frontier Backupand Recovery Presentation 110311JohnMDoe
 
GDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceGDPR Part 2: Quest Relevance
GDPR Part 2: Quest Relevance
Adrian Dumitrescu
 
Securing Sensitive IBM i Data At-Rest and In-Motion
Securing Sensitive IBM i Data At-Rest and In-MotionSecuring Sensitive IBM i Data At-Rest and In-Motion
Securing Sensitive IBM i Data At-Rest and In-Motion
Precisely
 
Jms secure data presentation
Jms secure data  presentationJms secure data  presentation
Jms secure data presentation
JMS Secure Data
 
Essential Security Control Implementation in IT
Essential Security Control Implementation in ITEssential Security Control Implementation in IT
Essential Security Control Implementation in IT
Professor Lili Saghafi
 
Payment Card Industry Security Standards
Payment Card Industry Security StandardsPayment Card Industry Security Standards
Payment Card Industry Security Standards
Ashintha Rukmal
 

What's hot (20)

Internet of Things - An Architectural Perspective
Internet of Things - An Architectural PerspectiveInternet of Things - An Architectural Perspective
Internet of Things - An Architectural Perspective
 
Mobile Middleware and Mobility in the Enterprise - Yad Jaura, Marketing Manag...
Mobile Middleware and Mobility in the Enterprise - Yad Jaura, Marketing Manag...Mobile Middleware and Mobility in the Enterprise - Yad Jaura, Marketing Manag...
Mobile Middleware and Mobility in the Enterprise - Yad Jaura, Marketing Manag...
 
Healthcare presentation
Healthcare presentationHealthcare presentation
Healthcare presentation
 
Intel boubker el mouttahid
Intel boubker el mouttahidIntel boubker el mouttahid
Intel boubker el mouttahid
 
Brochure NEXThink
Brochure NEXThinkBrochure NEXThink
Brochure NEXThink
 
How to Detect Heartbleed with Wire Data Analytics
How to Detect Heartbleed with Wire Data AnalyticsHow to Detect Heartbleed with Wire Data Analytics
How to Detect Heartbleed with Wire Data Analytics
 
How to Use Big Data to Transform IT Operations
How to Use Big Data to Transform IT OperationsHow to Use Big Data to Transform IT Operations
How to Use Big Data to Transform IT Operations
 
Old Dogs, New Tricks: Big Data from and for Mainframe IT
Old Dogs, New Tricks: Big Data from and for Mainframe ITOld Dogs, New Tricks: Big Data from and for Mainframe IT
Old Dogs, New Tricks: Big Data from and for Mainframe IT
 
NARCA Presentation - IT Best Practice
NARCA Presentation - IT Best PracticeNARCA Presentation - IT Best Practice
NARCA Presentation - IT Best Practice
 
Nexthink_it_operations_white_paper
Nexthink_it_operations_white_paperNexthink_it_operations_white_paper
Nexthink_it_operations_white_paper
 
Nexthink-See your infrastructure as never before!!
Nexthink-See your infrastructure as never before!!Nexthink-See your infrastructure as never before!!
Nexthink-See your infrastructure as never before!!
 
Using a Cognitive Analytic Approach to Enhance Cybersecurity on Oil and Gas O...
Using a Cognitive Analytic Approach to Enhance Cybersecurity on Oil and Gas O...Using a Cognitive Analytic Approach to Enhance Cybersecurity on Oil and Gas O...
Using a Cognitive Analytic Approach to Enhance Cybersecurity on Oil and Gas O...
 
Getting Real About Security Management and “Big Data”
Getting Real About Security Management and “Big Data” Getting Real About Security Management and “Big Data”
Getting Real About Security Management and “Big Data”
 
Defending Healthcare Networks with NetFlow
Defending Healthcare Networks with NetFlowDefending Healthcare Networks with NetFlow
Defending Healthcare Networks with NetFlow
 
Frontier Backupand Recovery Presentation 110311
Frontier Backupand Recovery Presentation 110311Frontier Backupand Recovery Presentation 110311
Frontier Backupand Recovery Presentation 110311
 
GDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceGDPR Part 2: Quest Relevance
GDPR Part 2: Quest Relevance
 
Securing Sensitive IBM i Data At-Rest and In-Motion
Securing Sensitive IBM i Data At-Rest and In-MotionSecuring Sensitive IBM i Data At-Rest and In-Motion
Securing Sensitive IBM i Data At-Rest and In-Motion
 
Jms secure data presentation
Jms secure data  presentationJms secure data  presentation
Jms secure data presentation
 
Essential Security Control Implementation in IT
Essential Security Control Implementation in ITEssential Security Control Implementation in IT
Essential Security Control Implementation in IT
 
Payment Card Industry Security Standards
Payment Card Industry Security StandardsPayment Card Industry Security Standards
Payment Card Industry Security Standards
 

Viewers also liked

Form 7
Form 7Form 7
Sorolla y la_luz
Sorolla y la_luzSorolla y la_luz
Sorolla y la_luz
Ana Delia López García
 
328 lsb-oficial(1)
328 lsb-oficial(1)328 lsb-oficial(1)
328 lsb-oficial(1)
sleven00
 
Clowns
Clowns Clowns
Clowns
jesscrawford9
 
Glosararium card teks debat , aby dan nuryahya ,luky ch xotr1 vocsten malang
Glosararium card teks debat , aby dan nuryahya ,luky ch xotr1 vocsten malangGlosararium card teks debat , aby dan nuryahya ,luky ch xotr1 vocsten malang
Glosararium card teks debat , aby dan nuryahya ,luky ch xotr1 vocsten malang
Nuril anwar
 
Contabilidad
Contabilidad Contabilidad
Contabilidad
Henry Cobo Hdez
 
Economic reforms in India
Economic reforms in IndiaEconomic reforms in India
Economic reforms in India
Samprada Dekate
 
Service marketing- customer relationship management
Service marketing- customer relationship managementService marketing- customer relationship management
Service marketing- customer relationship management
sksbatish
 
Gamification: Missverständnisse und Lösungen
Gamification: Missverständnisse und LösungenGamification: Missverständnisse und Lösungen
Gamification: Missverständnisse und Lösungen
Sebastian Deterding
 
Apache Solr as a compressed, scalable, and high performance time series database
Apache Solr as a compressed, scalable, and high performance time series databaseApache Solr as a compressed, scalable, and high performance time series database
Apache Solr as a compressed, scalable, and high performance time series database
Florian Lautenschlager
 
πειραματα χημειας στην στ1 του 2ου δημοτικου σχολειου
πειραματα χημειας στην στ1 του 2ου δημοτικου σχολειουπειραματα χημειας στην στ1 του 2ου δημοτικου σχολειου
πειραματα χημειας στην στ1 του 2ου δημοτικου σχολειου
alexkonta
 
Contabilidad básica
Contabilidad básicaContabilidad básica
Contabilidad básica
José Daniel
 
3Com 3C17715USED
3Com 3C17715USED3Com 3C17715USED
3Com 3C17715USED
savomir
 
Polynomial
PolynomialPolynomial
10 pravil interneta
10 pravil interneta10 pravil interneta
10 pravil interneta
Helen2015
 
Obras teatrales opcionales (1)
Obras teatrales opcionales (1)Obras teatrales opcionales (1)
Obras teatrales opcionales (1)
Anthony K. Floreano Alfaro
 
ФАБЕРЛИК КАТАЛОГ №05/2017 (20.03 — 02.04)
ФАБЕРЛИК КАТАЛОГ №05/2017 (20.03 — 02.04)ФАБЕРЛИК КАТАЛОГ №05/2017 (20.03 — 02.04)
ФАБЕРЛИК КАТАЛОГ №05/2017 (20.03 — 02.04)
Garik Yenokyan
 
Proposal Sistem Informasi Pemesanan Tiket Bioskop Online
Proposal Sistem Informasi Pemesanan Tiket Bioskop OnlineProposal Sistem Informasi Pemesanan Tiket Bioskop Online
Proposal Sistem Informasi Pemesanan Tiket Bioskop Online
Lucha Kamala Putri
 
Quadrilaterals
QuadrilateralsQuadrilaterals
Quadrilaterals
Harold Laguilles
 
Racismo, Preconceitos e Discriminações
Racismo, Preconceitos e Discriminações Racismo, Preconceitos e Discriminações
Racismo, Preconceitos e Discriminações
Daniel de Carvalho Luz
 

Viewers also liked (20)

Form 7
Form 7Form 7
Form 7
 
Sorolla y la_luz
Sorolla y la_luzSorolla y la_luz
Sorolla y la_luz
 
328 lsb-oficial(1)
328 lsb-oficial(1)328 lsb-oficial(1)
328 lsb-oficial(1)
 
Clowns
Clowns Clowns
Clowns
 
Glosararium card teks debat , aby dan nuryahya ,luky ch xotr1 vocsten malang
Glosararium card teks debat , aby dan nuryahya ,luky ch xotr1 vocsten malangGlosararium card teks debat , aby dan nuryahya ,luky ch xotr1 vocsten malang
Glosararium card teks debat , aby dan nuryahya ,luky ch xotr1 vocsten malang
 
Contabilidad
Contabilidad Contabilidad
Contabilidad
 
Economic reforms in India
Economic reforms in IndiaEconomic reforms in India
Economic reforms in India
 
Service marketing- customer relationship management
Service marketing- customer relationship managementService marketing- customer relationship management
Service marketing- customer relationship management
 
Gamification: Missverständnisse und Lösungen
Gamification: Missverständnisse und LösungenGamification: Missverständnisse und Lösungen
Gamification: Missverständnisse und Lösungen
 
Apache Solr as a compressed, scalable, and high performance time series database
Apache Solr as a compressed, scalable, and high performance time series databaseApache Solr as a compressed, scalable, and high performance time series database
Apache Solr as a compressed, scalable, and high performance time series database
 
πειραματα χημειας στην στ1 του 2ου δημοτικου σχολειου
πειραματα χημειας στην στ1 του 2ου δημοτικου σχολειουπειραματα χημειας στην στ1 του 2ου δημοτικου σχολειου
πειραματα χημειας στην στ1 του 2ου δημοτικου σχολειου
 
Contabilidad básica
Contabilidad básicaContabilidad básica
Contabilidad básica
 
3Com 3C17715USED
3Com 3C17715USED3Com 3C17715USED
3Com 3C17715USED
 
Polynomial
PolynomialPolynomial
Polynomial
 
10 pravil interneta
10 pravil interneta10 pravil interneta
10 pravil interneta
 
Obras teatrales opcionales (1)
Obras teatrales opcionales (1)Obras teatrales opcionales (1)
Obras teatrales opcionales (1)
 
ФАБЕРЛИК КАТАЛОГ №05/2017 (20.03 — 02.04)
ФАБЕРЛИК КАТАЛОГ №05/2017 (20.03 — 02.04)ФАБЕРЛИК КАТАЛОГ №05/2017 (20.03 — 02.04)
ФАБЕРЛИК КАТАЛОГ №05/2017 (20.03 — 02.04)
 
Proposal Sistem Informasi Pemesanan Tiket Bioskop Online
Proposal Sistem Informasi Pemesanan Tiket Bioskop OnlineProposal Sistem Informasi Pemesanan Tiket Bioskop Online
Proposal Sistem Informasi Pemesanan Tiket Bioskop Online
 
Quadrilaterals
QuadrilateralsQuadrilaterals
Quadrilaterals
 
Racismo, Preconceitos e Discriminações
Racismo, Preconceitos e Discriminações Racismo, Preconceitos e Discriminações
Racismo, Preconceitos e Discriminações
 

Similar to Prism presentation

Platforming the Major Analytic Use Cases for Modern Engineering
Platforming the Major Analytic Use Cases for Modern EngineeringPlatforming the Major Analytic Use Cases for Modern Engineering
Platforming the Major Analytic Use Cases for Modern Engineering
DATAVERSITY
 
Deteo. Data science, Big Data expertise
Deteo. Data science, Big Data expertise Deteo. Data science, Big Data expertise
Deteo. Data science, Big Data expertise
deteo
 
Disrupting Insurance with Advanced Analytics The Next Generation Carrier
Disrupting Insurance with Advanced Analytics The Next Generation CarrierDisrupting Insurance with Advanced Analytics The Next Generation Carrier
Disrupting Insurance with Advanced Analytics The Next Generation Carrier
DataWorks Summit/Hadoop Summit
 
Cb12e basic ppt ch15
Cb12e basic ppt ch15Cb12e basic ppt ch15
Cb12e basic ppt ch15Eric
 
Cisco_Big_Data_Webinar_At-A-Glance_ABSOLUTE_FINAL_VERSION
Cisco_Big_Data_Webinar_At-A-Glance_ABSOLUTE_FINAL_VERSIONCisco_Big_Data_Webinar_At-A-Glance_ABSOLUTE_FINAL_VERSION
Cisco_Big_Data_Webinar_At-A-Glance_ABSOLUTE_FINAL_VERSIONRenee Yao
 
Software Defined Networking in the ATMOSPHERE project
Software Defined Networking in the ATMOSPHERE projectSoftware Defined Networking in the ATMOSPHERE project
Software Defined Networking in the ATMOSPHERE project
ATMOSPHERE .
 
IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...
Leif Davidsen
 
3433 IBM messaging security why securing your environment is important-feb2...
3433   IBM messaging security why securing your environment is important-feb2...3433   IBM messaging security why securing your environment is important-feb2...
3433 IBM messaging security why securing your environment is important-feb2...
Robert Parker
 
What’s New: Splunk App for Stream and Splunk MINT
What’s New: Splunk App for Stream and Splunk MINTWhat’s New: Splunk App for Stream and Splunk MINT
What’s New: Splunk App for Stream and Splunk MINT
Splunk
 
Information technology in global arena & enterprise resource planning
Information technology in global arena & enterprise resource planningInformation technology in global arena & enterprise resource planning
Information technology in global arena & enterprise resource planning
Subhajit Bhattacharya
 
SplunkLive! London - Splunk App for Stream & MINT Breakout
SplunkLive! London - Splunk App for Stream & MINT BreakoutSplunkLive! London - Splunk App for Stream & MINT Breakout
SplunkLive! London - Splunk App for Stream & MINT Breakout
Splunk
 
Hadoop and Financial Services
Hadoop and Financial ServicesHadoop and Financial Services
Hadoop and Financial Services
Cloudera, Inc.
 
Final Presentation
Final PresentationFinal Presentation
Final Presentationchris odle
 
Splunk MINT for Mobile Intelligence and Splunk App for Stream for Enhanced Op...
Splunk MINT for Mobile Intelligence and Splunk App for Stream for Enhanced Op...Splunk MINT for Mobile Intelligence and Splunk App for Stream for Enhanced Op...
Splunk MINT for Mobile Intelligence and Splunk App for Stream for Enhanced Op...
Splunk
 
Visualizing Your Network Health - Know your Network
Visualizing Your Network Health - Know your NetworkVisualizing Your Network Health - Know your Network
Visualizing Your Network Health - Know your Network
DellNMS
 
Splunk MINT and Stream Breakout
Splunk MINT and Stream BreakoutSplunk MINT and Stream Breakout
Splunk MINT and Stream Breakout
Splunk
 
NZS-4555 - IT Analytics Keynote - IT Analytics for the Enterprise
NZS-4555 - IT Analytics Keynote - IT Analytics for the EnterpriseNZS-4555 - IT Analytics Keynote - IT Analytics for the Enterprise
NZS-4555 - IT Analytics Keynote - IT Analytics for the Enterprise
IBM z Systems Software - IT Service Management
 

Similar to Prism presentation (20)

BREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAPBREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAP
 
Platforming the Major Analytic Use Cases for Modern Engineering
Platforming the Major Analytic Use Cases for Modern EngineeringPlatforming the Major Analytic Use Cases for Modern Engineering
Platforming the Major Analytic Use Cases for Modern Engineering
 
Deteo. Data science, Big Data expertise
Deteo. Data science, Big Data expertise Deteo. Data science, Big Data expertise
Deteo. Data science, Big Data expertise
 
Disrupting Insurance with Advanced Analytics The Next Generation Carrier
Disrupting Insurance with Advanced Analytics The Next Generation CarrierDisrupting Insurance with Advanced Analytics The Next Generation Carrier
Disrupting Insurance with Advanced Analytics The Next Generation Carrier
 
Oi
OiOi
Oi
 
Cb12e basic ppt ch15
Cb12e basic ppt ch15Cb12e basic ppt ch15
Cb12e basic ppt ch15
 
Cisco_Big_Data_Webinar_At-A-Glance_ABSOLUTE_FINAL_VERSION
Cisco_Big_Data_Webinar_At-A-Glance_ABSOLUTE_FINAL_VERSIONCisco_Big_Data_Webinar_At-A-Glance_ABSOLUTE_FINAL_VERSION
Cisco_Big_Data_Webinar_At-A-Glance_ABSOLUTE_FINAL_VERSION
 
Software Defined Networking in the ATMOSPHERE project
Software Defined Networking in the ATMOSPHERE projectSoftware Defined Networking in the ATMOSPHERE project
Software Defined Networking in the ATMOSPHERE project
 
IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...
 
3433 IBM messaging security why securing your environment is important-feb2...
3433   IBM messaging security why securing your environment is important-feb2...3433   IBM messaging security why securing your environment is important-feb2...
3433 IBM messaging security why securing your environment is important-feb2...
 
What’s New: Splunk App for Stream and Splunk MINT
What’s New: Splunk App for Stream and Splunk MINTWhat’s New: Splunk App for Stream and Splunk MINT
What’s New: Splunk App for Stream and Splunk MINT
 
Information technology in global arena & enterprise resource planning
Information technology in global arena & enterprise resource planningInformation technology in global arena & enterprise resource planning
Information technology in global arena & enterprise resource planning
 
SplunkLive! London - Splunk App for Stream & MINT Breakout
SplunkLive! London - Splunk App for Stream & MINT BreakoutSplunkLive! London - Splunk App for Stream & MINT Breakout
SplunkLive! London - Splunk App for Stream & MINT Breakout
 
Hadoop and Financial Services
Hadoop and Financial ServicesHadoop and Financial Services
Hadoop and Financial Services
 
ISS CAPSTONE TEAM
ISS CAPSTONE TEAMISS CAPSTONE TEAM
ISS CAPSTONE TEAM
 
Final Presentation
Final PresentationFinal Presentation
Final Presentation
 
Splunk MINT for Mobile Intelligence and Splunk App for Stream for Enhanced Op...
Splunk MINT for Mobile Intelligence and Splunk App for Stream for Enhanced Op...Splunk MINT for Mobile Intelligence and Splunk App for Stream for Enhanced Op...
Splunk MINT for Mobile Intelligence and Splunk App for Stream for Enhanced Op...
 
Visualizing Your Network Health - Know your Network
Visualizing Your Network Health - Know your NetworkVisualizing Your Network Health - Know your Network
Visualizing Your Network Health - Know your Network
 
Splunk MINT and Stream Breakout
Splunk MINT and Stream BreakoutSplunk MINT and Stream Breakout
Splunk MINT and Stream Breakout
 
NZS-4555 - IT Analytics Keynote - IT Analytics for the Enterprise
NZS-4555 - IT Analytics Keynote - IT Analytics for the EnterpriseNZS-4555 - IT Analytics Keynote - IT Analytics for the Enterprise
NZS-4555 - IT Analytics Keynote - IT Analytics for the Enterprise
 

Recently uploaded

一比一原版(QU毕业证)皇后大学毕业证成绩单
一比一原版(QU毕业证)皇后大学毕业证成绩单一比一原版(QU毕业证)皇后大学毕业证成绩单
一比一原版(QU毕业证)皇后大学毕业证成绩单
enxupq
 
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
ahzuo
 
Sample_Global Non-invasive Prenatal Testing (NIPT) Market, 2019-2030.pdf
Sample_Global Non-invasive Prenatal Testing (NIPT) Market, 2019-2030.pdfSample_Global Non-invasive Prenatal Testing (NIPT) Market, 2019-2030.pdf
Sample_Global Non-invasive Prenatal Testing (NIPT) Market, 2019-2030.pdf
Linda486226
 
一比一原版(TWU毕业证)西三一大学毕业证成绩单
一比一原版(TWU毕业证)西三一大学毕业证成绩单一比一原版(TWU毕业证)西三一大学毕业证成绩单
一比一原版(TWU毕业证)西三一大学毕业证成绩单
ocavb
 
一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单
一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单
一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单
vcaxypu
 
Algorithmic optimizations for Dynamic Levelwise PageRank (from STICD) : SHORT...
Algorithmic optimizations for Dynamic Levelwise PageRank (from STICD) : SHORT...Algorithmic optimizations for Dynamic Levelwise PageRank (from STICD) : SHORT...
Algorithmic optimizations for Dynamic Levelwise PageRank (from STICD) : SHORT...
Subhajit Sahu
 
Data Centers - Striving Within A Narrow Range - Research Report - MCG - May 2...
Data Centers - Striving Within A Narrow Range - Research Report - MCG - May 2...Data Centers - Striving Within A Narrow Range - Research Report - MCG - May 2...
Data Centers - Striving Within A Narrow Range - Research Report - MCG - May 2...
pchutichetpong
 
一比一原版(CBU毕业证)卡普顿大学毕业证如何办理
一比一原版(CBU毕业证)卡普顿大学毕业证如何办理一比一原版(CBU毕业证)卡普顿大学毕业证如何办理
一比一原版(CBU毕业证)卡普顿大学毕业证如何办理
ahzuo
 
社内勉強会資料_LLM Agents                              .
社内勉強会資料_LLM Agents                              .社内勉強会資料_LLM Agents                              .
社内勉強会資料_LLM Agents                              .
NABLAS株式会社
 
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdfCriminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP
 
一比一原版(UVic毕业证)维多利亚大学毕业证成绩单
一比一原版(UVic毕业证)维多利亚大学毕业证成绩单一比一原版(UVic毕业证)维多利亚大学毕业证成绩单
一比一原版(UVic毕业证)维多利亚大学毕业证成绩单
ukgaet
 
做(mqu毕业证书)麦考瑞大学毕业证硕士文凭证书学费发票原版一模一样
做(mqu毕业证书)麦考瑞大学毕业证硕士文凭证书学费发票原版一模一样做(mqu毕业证书)麦考瑞大学毕业证硕士文凭证书学费发票原版一模一样
做(mqu毕业证书)麦考瑞大学毕业证硕士文凭证书学费发票原版一模一样
axoqas
 
Opendatabay - Open Data Marketplace.pptx
Opendatabay - Open Data Marketplace.pptxOpendatabay - Open Data Marketplace.pptx
Opendatabay - Open Data Marketplace.pptx
Opendatabay
 
Machine learning and optimization techniques for electrical drives.pptx
Machine learning and optimization techniques for electrical drives.pptxMachine learning and optimization techniques for electrical drives.pptx
Machine learning and optimization techniques for electrical drives.pptx
balafet
 
Malana- Gimlet Market Analysis (Portfolio 2)
Malana- Gimlet Market Analysis (Portfolio 2)Malana- Gimlet Market Analysis (Portfolio 2)
Malana- Gimlet Market Analysis (Portfolio 2)
TravisMalana
 
一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单
一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单
一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单
vcaxypu
 
一比一原版(BU毕业证)波士顿大学毕业证成绩单
一比一原版(BU毕业证)波士顿大学毕业证成绩单一比一原版(BU毕业证)波士顿大学毕业证成绩单
一比一原版(BU毕业证)波士顿大学毕业证成绩单
ewymefz
 
一比一原版(CU毕业证)卡尔顿大学毕业证成绩单
一比一原版(CU毕业证)卡尔顿大学毕业证成绩单一比一原版(CU毕业证)卡尔顿大学毕业证成绩单
一比一原版(CU毕业证)卡尔顿大学毕业证成绩单
yhkoc
 
一比一原版(CBU毕业证)卡普顿大学毕业证成绩单
一比一原版(CBU毕业证)卡普顿大学毕业证成绩单一比一原版(CBU毕业证)卡普顿大学毕业证成绩单
一比一原版(CBU毕业证)卡普顿大学毕业证成绩单
nscud
 
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
slg6lamcq
 

Recently uploaded (20)

一比一原版(QU毕业证)皇后大学毕业证成绩单
一比一原版(QU毕业证)皇后大学毕业证成绩单一比一原版(QU毕业证)皇后大学毕业证成绩单
一比一原版(QU毕业证)皇后大学毕业证成绩单
 
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
 
Sample_Global Non-invasive Prenatal Testing (NIPT) Market, 2019-2030.pdf
Sample_Global Non-invasive Prenatal Testing (NIPT) Market, 2019-2030.pdfSample_Global Non-invasive Prenatal Testing (NIPT) Market, 2019-2030.pdf
Sample_Global Non-invasive Prenatal Testing (NIPT) Market, 2019-2030.pdf
 
一比一原版(TWU毕业证)西三一大学毕业证成绩单
一比一原版(TWU毕业证)西三一大学毕业证成绩单一比一原版(TWU毕业证)西三一大学毕业证成绩单
一比一原版(TWU毕业证)西三一大学毕业证成绩单
 
一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单
一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单
一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单
 
Algorithmic optimizations for Dynamic Levelwise PageRank (from STICD) : SHORT...
Algorithmic optimizations for Dynamic Levelwise PageRank (from STICD) : SHORT...Algorithmic optimizations for Dynamic Levelwise PageRank (from STICD) : SHORT...
Algorithmic optimizations for Dynamic Levelwise PageRank (from STICD) : SHORT...
 
Data Centers - Striving Within A Narrow Range - Research Report - MCG - May 2...
Data Centers - Striving Within A Narrow Range - Research Report - MCG - May 2...Data Centers - Striving Within A Narrow Range - Research Report - MCG - May 2...
Data Centers - Striving Within A Narrow Range - Research Report - MCG - May 2...
 
一比一原版(CBU毕业证)卡普顿大学毕业证如何办理
一比一原版(CBU毕业证)卡普顿大学毕业证如何办理一比一原版(CBU毕业证)卡普顿大学毕业证如何办理
一比一原版(CBU毕业证)卡普顿大学毕业证如何办理
 
社内勉強会資料_LLM Agents                              .
社内勉強会資料_LLM Agents                              .社内勉強会資料_LLM Agents                              .
社内勉強会資料_LLM Agents                              .
 
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdfCriminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdf
 
一比一原版(UVic毕业证)维多利亚大学毕业证成绩单
一比一原版(UVic毕业证)维多利亚大学毕业证成绩单一比一原版(UVic毕业证)维多利亚大学毕业证成绩单
一比一原版(UVic毕业证)维多利亚大学毕业证成绩单
 
做(mqu毕业证书)麦考瑞大学毕业证硕士文凭证书学费发票原版一模一样
做(mqu毕业证书)麦考瑞大学毕业证硕士文凭证书学费发票原版一模一样做(mqu毕业证书)麦考瑞大学毕业证硕士文凭证书学费发票原版一模一样
做(mqu毕业证书)麦考瑞大学毕业证硕士文凭证书学费发票原版一模一样
 
Opendatabay - Open Data Marketplace.pptx
Opendatabay - Open Data Marketplace.pptxOpendatabay - Open Data Marketplace.pptx
Opendatabay - Open Data Marketplace.pptx
 
Machine learning and optimization techniques for electrical drives.pptx
Machine learning and optimization techniques for electrical drives.pptxMachine learning and optimization techniques for electrical drives.pptx
Machine learning and optimization techniques for electrical drives.pptx
 
Malana- Gimlet Market Analysis (Portfolio 2)
Malana- Gimlet Market Analysis (Portfolio 2)Malana- Gimlet Market Analysis (Portfolio 2)
Malana- Gimlet Market Analysis (Portfolio 2)
 
一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单
一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单
一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单
 
一比一原版(BU毕业证)波士顿大学毕业证成绩单
一比一原版(BU毕业证)波士顿大学毕业证成绩单一比一原版(BU毕业证)波士顿大学毕业证成绩单
一比一原版(BU毕业证)波士顿大学毕业证成绩单
 
一比一原版(CU毕业证)卡尔顿大学毕业证成绩单
一比一原版(CU毕业证)卡尔顿大学毕业证成绩单一比一原版(CU毕业证)卡尔顿大学毕业证成绩单
一比一原版(CU毕业证)卡尔顿大学毕业证成绩单
 
一比一原版(CBU毕业证)卡普顿大学毕业证成绩单
一比一原版(CBU毕业证)卡普顿大学毕业证成绩单一比一原版(CBU毕业证)卡普顿大学毕业证成绩单
一比一原版(CBU毕业证)卡普顿大学毕业证成绩单
 
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
 

Prism presentation

  • 2. Devisions • SAP HANA • Hardware • Predictive Analytics • Mobile Application • Cyber Security
  • 3. SAP HANA 1. License Sale 2. Implementation Support 3. Application Support
  • 4. SAP HANA • HANA stands for High Performance Analytic Appliance • Let us see one by one what is High Performance, Analytic and Appliance separately
  • 5. SAP HANA High Performance • High performance is achieved by moving the Data Base from slow Hard Disk to fast RAM memory • High Performance is achieved by changing the table structure from row to columns for faster search
  • 6. SAP HANA Analytics • OLAP is an acronym for Online Analytical Processing. OLAP performs multidimensional analysis of business data and provides the capability for complex calculations, trend analysis, and sophisticated data modeling.
  • 7. SAP HANA Online Transaction Processing • OLTP is a class of software programs capable of supporting transaction-oriented applications on the Internet. Typically, OLTP systems are used for order entry, financial transactions, customer relationship management (CRM) and retail sales.
  • 8. SAP HANA Appliance • SAP HANA is available with pre- configured servers, with all software, securities and industry best practice reports and dash boards. This reduces the implementation time from months to weeks
  • 9. SAP HANA • All the reports and dash boards can be viewed on personal devices like Smart phones and tabs on the go. • Real time reports can be viewed and decisions can be taken on the spot • No more waiting for any critical reports
  • 10. Hardware • Servers • Data Centre • Back up Servers • Disaster Recovery • Cloud Solution • Network • Firewall • Cloud Security • Routers •
  • 11. Hardware •Office Access Control •Big Data Security •Video Surveillance •
  • 12. Cyber Security • Information is Power • Power is Money • So information is stolen to make quick money or create damages • So it becomes necessary to protect our data • Here comes our Cyber Security division •
  • 13. Cyber Security • Computer security is critical in almost any industry which uses computers. Currently, most electronic devices such as computers, laptops and cellphones come with built in firewall security software, but despite this, computers are not 100 percent secure and dependable to protect our data – Wikipedia • •
  • 14. Cyber Security • There are many different ways of hacking into computers. It can be done through a network system, clicking into unknown links, connecting to unfamiliar Wi-Fi, downloading software and files from unsafe sites, electromagnetic radiation waves, and many more – Wikipedia • . •
  • 15. Cyber Security • However, computers can be protected through well built software and hardware, by having strong internal interactions of properties, software complexity and prevent software crash and security failure - Wikipedia
  • 16. Cyber Security • Red Team Consulting • Application Security • Security Operation Center • Testing and Validation – FIPS 140-2 • Threat Analytics and Predictive Modeling • Cyber Forensic and e-Discovery • Cyber Security Culture Building • Cyber Security Capacity Building • Industrial Control System and SCADA Security
  • 17. Predictive Analytics • Predictive analytic is an upcoming technology which processes historical data and gives a lot of insights, understanding and guides us towards future course of action in all the aspects of enterprise
  • 18. Predictive Analytic Predictive analytic encompasses a variety of statistical techniques from predictive modeling, machine learning, and data mining that analyze current and historical facts to make predictions about future or otherwise unknown events
  • 19. Predictive Analytic • In business, predictive models exploit patterns found in historical and transactional data to identify risks and opportunities. Models capture relationships among many factors to allow assessment of risk or potential associated with a particular set of conditions, guiding decision making for candidate transactions
  • 20. Predictive Analytic • Predictive analytics is used in actuarial science, marketing, financial services, insurance, telecommunications, retail, travel, healthcare, child protection, pharmaceuticals, capacity planning • and other fields.
  • 21. Predictive Analytics • One of the best-known applications is credit scoring, which is used throughout financial services. Scoring models process a customer's credit history, loan application, customer data, etc., in order to rank-order individuals by their likelihood of making future credit payments on time.
  • 22. Predictive Analytic • In future industrial systems, the value of predictive analytics will be to predict and prevent potential issues to achieve near- zero break-down and further be integrated into prescriptive analytics for decision optimization. Furthermore, the converted data can be used for closed-loop product life cycle improvement which is the vision of the Industrial Internet Consortium.
  • 23. Mobile Application • Mobile devices have become part of parcel of human life. We use them in day to day environment for communication, entertainment and in profession too. So customers look for new application to suit their personal and profession requirement. We develop such apps in all platforms