SlideShare a Scribd company logo
SMAC
Presented By:
Miss. Meena Venkatachalam
Nanu.pabcet@live.com
https://twitter.com/MEENANU_V
Pavendar Bharathidasan College of Engineering
and Technology, Trichy-24.
Final Year / Eighth Semester
Computer Science and Engineering
INTRODUCTION
 SMAC- Social, Mobile, Analytics, Cloud.
 Now, this four Technology has occupy the IT Business services.
 It make the more innovation, emerging and Booming Technology
in Business.
SOCIAL Media
 Computer-mediated tools that allow people
o To create Share.
o To exchange information and ideas.
o Pictures/videos in virtual communities and networks.
 A group of Internet-based applications that build on the
ideological and technological foundations of Web 2.0, and
that allow the creation and exchange of user-generated
content.
MOBILE
Mobile technology is the technology used for cellular communication.
1g (analog)
2G (GSM) (CDMA)
2.5G (GPRS) 40 KBit/s
2.75G (EDGE)500 KBit/s
3G
o HSPA 14.4 Mbit/s downlink and 5.76 MBit/s uplink.
o HSPA+ 168 Mbit/s downlink and 22 Mbit/s uplink.
4G
o LTE Advantage 1GBit/s downlink 500 Mbit/s uplink.
o 4G LTE 100 MBit/s downlink 50 MBit/s uplink.
5G Research.
Data ANALYTICS
 Data analysis is the process of finding the right data to answer
your question.
 Understanding the processes underlying the data.
 Discovering the important patterns in the data, and then
communicating your results to have the biggest possible impact.
Types of Data:
o Volume
o Velocity
o Variety
CLOUD Computing
 Cloud computing involves deploying groups of remote
servers and software networks that allow centralized data
storage and online access to computer services or resources.
 Clouds deployment model:
o Public
o Private
o hybrid
 Cloud Service model:
o Infrastructure-as-a-Service
o Platform-as-a-Service
o Software-as-a-Service
TRENDS
 Now the Cloud Computing is in peak of IT Business services
 But most of the Companies now move on to the Big Data
Technology.
 In Future Data Analytics will take the peak in the IT Business
services.
 Because of Cost, Storage, Maintenance are efficiency high
compare to cloud computing.
 Big Data was hired by the Large scale Business organization by
social media, Medicinal, Research and so on.
INTERST AREAS
 My interesting area is Cloud Computing.
 In that there are lot of security issue in Infrastucture-as-a-Service.
 So, I will work for ensure the security problem by analyzing it and
cure it.
 Example: In IaaS the Storage is also one service in that model. In
that environment normally user upload the data directly to the
cloud service provider
INTERST AREAS
Example:
 In IaaS the Storage is also one service in that model. In that
environment normally user upload the data directly to the cloud
service provider.
 Then the Cloud Server encrypt the data and Store it.
 Suppose the intruders know the path of transaction at the time of
uploading data. They can easily hacked the data.
 Hence I wish to do encryption on the end user level. Thus the
encrypted data is now upload to cloud service provided.
 Now intruders know the path of transaction at the time of
uploading data. They hacked the encrypted data only.
Thank you

More Related Content

What's hot

Fog computing
Fog computingFog computing
Fog computing
Valarmathi Srinivasan
 
San Francisco Fog Computing Meetup
San Francisco Fog Computing MeetupSan Francisco Fog Computing Meetup
San Francisco Fog Computing Meetup
Breaux Walker
 
Latest Trends in Information Technology - Wikki Verma
Latest Trends in Information Technology - Wikki VermaLatest Trends in Information Technology - Wikki Verma
Latest Trends in Information Technology - Wikki Verma
Wikki Verma
 
Fog Computing with VORTEX
Fog Computing with VORTEXFog Computing with VORTEX
Fog Computing with VORTEX
Angelo Corsaro
 
Sustainability and fog computing applications, advantages and challenges
Sustainability and fog computing applications, advantages and challengesSustainability and fog computing applications, advantages and challenges
Sustainability and fog computing applications, advantages and challenges
AbdulMajidFarooqi
 
Fog Computing and the Internet of Things
Fog Computing and the Internet of ThingsFog Computing and the Internet of Things
Fog Computing and the Internet of Things
S.Mostafa Sayyedi
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
Adnyesh Dalpati
 
Seminar ppt fog comp
Seminar ppt fog compSeminar ppt fog comp
Seminar ppt fog comp
Mahantesh Hiremath
 
THE ROLE OF EDGE COMPUTING IN INTERNET OF THINGS
THE ROLE OF EDGE COMPUTING IN INTERNET OF THINGSTHE ROLE OF EDGE COMPUTING IN INTERNET OF THINGS
THE ROLE OF EDGE COMPUTING IN INTERNET OF THINGS
suthi
 
Iot and cloud computing
Iot and cloud computingIot and cloud computing
Iot and cloud computing
eteshagarwal1
 
Michael enescu keynote chicago2014_from_cloud_to_fog_and_iot
Michael enescu keynote chicago2014_from_cloud_to_fog_and_iotMichael enescu keynote chicago2014_from_cloud_to_fog_and_iot
Michael enescu keynote chicago2014_from_cloud_to_fog_and_iot
Michael Enescu
 
Fog computing in IoT
Fog computing in IoTFog computing in IoT
Fog computing in IoT
sreelesh balan
 
IoT A Fog-Cloud Computing Model
IoT A Fog-Cloud Computing ModelIoT A Fog-Cloud Computing Model
IoT A Fog-Cloud Computing Model
Ahmed Banafa
 
Fog computing ( foggy cloud)
Fog computing  ( foggy cloud)Fog computing  ( foggy cloud)
Fog computing ( foggy cloud)
Iffat Anjum
 
Edge and Fog computing, a use-case prespective
Edge and Fog computing, a use-case prespectiveEdge and Fog computing, a use-case prespective
Edge and Fog computing, a use-case prespective
Chetan Kumar S
 
Fog computing provide security to data in cloud ppt
Fog computing provide security to data in cloud pptFog computing provide security to data in cloud ppt
Fog computing provide security to data in cloud pptpriyanka reddy
 
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
DESMOND YUEN
 
Good research paper
Good research paperGood research paper
Good research paper
Niharika Varshney
 

What's hot (19)

Fog computing
Fog computingFog computing
Fog computing
 
San Francisco Fog Computing Meetup
San Francisco Fog Computing MeetupSan Francisco Fog Computing Meetup
San Francisco Fog Computing Meetup
 
Latest Trends in Information Technology - Wikki Verma
Latest Trends in Information Technology - Wikki VermaLatest Trends in Information Technology - Wikki Verma
Latest Trends in Information Technology - Wikki Verma
 
Fog Computing with VORTEX
Fog Computing with VORTEXFog Computing with VORTEX
Fog Computing with VORTEX
 
Sustainability and fog computing applications, advantages and challenges
Sustainability and fog computing applications, advantages and challengesSustainability and fog computing applications, advantages and challenges
Sustainability and fog computing applications, advantages and challenges
 
Fog Computing and the Internet of Things
Fog Computing and the Internet of ThingsFog Computing and the Internet of Things
Fog Computing and the Internet of Things
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
 
Seminar ppt fog comp
Seminar ppt fog compSeminar ppt fog comp
Seminar ppt fog comp
 
Fog
FogFog
Fog
 
THE ROLE OF EDGE COMPUTING IN INTERNET OF THINGS
THE ROLE OF EDGE COMPUTING IN INTERNET OF THINGSTHE ROLE OF EDGE COMPUTING IN INTERNET OF THINGS
THE ROLE OF EDGE COMPUTING IN INTERNET OF THINGS
 
Iot and cloud computing
Iot and cloud computingIot and cloud computing
Iot and cloud computing
 
Michael enescu keynote chicago2014_from_cloud_to_fog_and_iot
Michael enescu keynote chicago2014_from_cloud_to_fog_and_iotMichael enescu keynote chicago2014_from_cloud_to_fog_and_iot
Michael enescu keynote chicago2014_from_cloud_to_fog_and_iot
 
Fog computing in IoT
Fog computing in IoTFog computing in IoT
Fog computing in IoT
 
IoT A Fog-Cloud Computing Model
IoT A Fog-Cloud Computing ModelIoT A Fog-Cloud Computing Model
IoT A Fog-Cloud Computing Model
 
Fog computing ( foggy cloud)
Fog computing  ( foggy cloud)Fog computing  ( foggy cloud)
Fog computing ( foggy cloud)
 
Edge and Fog computing, a use-case prespective
Edge and Fog computing, a use-case prespectiveEdge and Fog computing, a use-case prespective
Edge and Fog computing, a use-case prespective
 
Fog computing provide security to data in cloud ppt
Fog computing provide security to data in cloud pptFog computing provide security to data in cloud ppt
Fog computing provide security to data in cloud ppt
 
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
 
Good research paper
Good research paperGood research paper
Good research paper
 

Similar to Smac

SMAC
SMACSMAC
SMAC
Mphasis
 
Modern computer network technologies
Modern computer network technologies Modern computer network technologies
Modern computer network technologies
Shamima Akther
 
SMAC
SMACSMAC
SMAC
Mphasis
 
Smac sai kiran
Smac sai kiranSmac sai kiran
Smac sai kiran
Srinath Shree
 
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...
IJERD Editor
 
Cloud Computing: Overview and its Deployment Model
Cloud Computing: Overview and its Deployment ModelCloud Computing: Overview and its Deployment Model
Cloud Computing: Overview and its Deployment Model
IJERA Editor
 
SMAC
SMACSMAC
SMAC
Mphasis
 
Trends in cloud computingTRENDS IN CLOUD COMPUTINGAB.docx
Trends in cloud computingTRENDS IN CLOUD COMPUTINGAB.docxTrends in cloud computingTRENDS IN CLOUD COMPUTINGAB.docx
Trends in cloud computingTRENDS IN CLOUD COMPUTINGAB.docx
juliennehar
 
Mobile Cloud Computing
Mobile Cloud ComputingMobile Cloud Computing
Mobile Cloud Computing
BhaktiKarale
 
Authentication And Authorization Issues In Mobile Cloud Computing A Case Study
Authentication And Authorization Issues In Mobile Cloud Computing  A Case StudyAuthentication And Authorization Issues In Mobile Cloud Computing  A Case Study
Authentication And Authorization Issues In Mobile Cloud Computing A Case Study
Angie Miller
 
Information Technology that drives growth in Telecommunications.pdf
Information Technology that drives growth in Telecommunications.pdfInformation Technology that drives growth in Telecommunications.pdf
Information Technology that drives growth in Telecommunications.pdf
Anil
 
TRENDS IN INFORMATION TECHNOLOGY
TRENDS IN INFORMATION TECHNOLOGYTRENDS IN INFORMATION TECHNOLOGY
TRENDS IN INFORMATION TECHNOLOGY
Dhrutim25
 
SMAC
SMACSMAC
SMAC
Mphasis
 
Business with Cloud Computing
Business with  Cloud ComputingBusiness with  Cloud Computing
Business with Cloud Computing
IMC Institute
 
Security and privacy issues and solutions of Mobile Cloud Computing
Security and privacy issues and solutions of Mobile Cloud ComputingSecurity and privacy issues and solutions of Mobile Cloud Computing
Security and privacy issues and solutions of Mobile Cloud Computing
Tahmin Aysha Murshed
 
SMAC
SMACSMAC
SMAC
Mphasis
 
Information Technology that drives growth in Telecommunications.pdf
Information Technology that drives growth in Telecommunications.pdfInformation Technology that drives growth in Telecommunications.pdf
Information Technology that drives growth in Telecommunications.pdf
Anil
 
Advantages Of Online Edu Moodle
Advantages Of Online Edu MoodleAdvantages Of Online Edu Moodle
Advantages Of Online Edu Moodle
Julie Kwhl
 
Encryption Algorithms for Cloud
Encryption Algorithms for CloudEncryption Algorithms for Cloud
Encryption Algorithms for Cloud
Mphasis
 

Similar to Smac (20)

SMAC
SMACSMAC
SMAC
 
Modern computer network technologies
Modern computer network technologies Modern computer network technologies
Modern computer network technologies
 
SMAC
SMACSMAC
SMAC
 
Smac sai kiran
Smac sai kiranSmac sai kiran
Smac sai kiran
 
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...
 
Cloud Computing: Overview and its Deployment Model
Cloud Computing: Overview and its Deployment ModelCloud Computing: Overview and its Deployment Model
Cloud Computing: Overview and its Deployment Model
 
SMAC
SMACSMAC
SMAC
 
Trends in cloud computingTRENDS IN CLOUD COMPUTINGAB.docx
Trends in cloud computingTRENDS IN CLOUD COMPUTINGAB.docxTrends in cloud computingTRENDS IN CLOUD COMPUTINGAB.docx
Trends in cloud computingTRENDS IN CLOUD COMPUTINGAB.docx
 
Mobile Cloud Computing
Mobile Cloud ComputingMobile Cloud Computing
Mobile Cloud Computing
 
Authentication And Authorization Issues In Mobile Cloud Computing A Case Study
Authentication And Authorization Issues In Mobile Cloud Computing  A Case StudyAuthentication And Authorization Issues In Mobile Cloud Computing  A Case Study
Authentication And Authorization Issues In Mobile Cloud Computing A Case Study
 
Information Technology that drives growth in Telecommunications.pdf
Information Technology that drives growth in Telecommunications.pdfInformation Technology that drives growth in Telecommunications.pdf
Information Technology that drives growth in Telecommunications.pdf
 
TRENDS IN INFORMATION TECHNOLOGY
TRENDS IN INFORMATION TECHNOLOGYTRENDS IN INFORMATION TECHNOLOGY
TRENDS IN INFORMATION TECHNOLOGY
 
SMAC
SMACSMAC
SMAC
 
Business with Cloud Computing
Business with  Cloud ComputingBusiness with  Cloud Computing
Business with Cloud Computing
 
Security and privacy issues and solutions of Mobile Cloud Computing
Security and privacy issues and solutions of Mobile Cloud ComputingSecurity and privacy issues and solutions of Mobile Cloud Computing
Security and privacy issues and solutions of Mobile Cloud Computing
 
SMAC
SMACSMAC
SMAC
 
Information Technology that drives growth in Telecommunications.pdf
Information Technology that drives growth in Telecommunications.pdfInformation Technology that drives growth in Telecommunications.pdf
Information Technology that drives growth in Telecommunications.pdf
 
IOTCYBER
IOTCYBERIOTCYBER
IOTCYBER
 
Advantages Of Online Edu Moodle
Advantages Of Online Edu MoodleAdvantages Of Online Edu Moodle
Advantages Of Online Edu Moodle
 
Encryption Algorithms for Cloud
Encryption Algorithms for CloudEncryption Algorithms for Cloud
Encryption Algorithms for Cloud
 

Recently uploaded

FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 

Smac

  • 1.
  • 2. SMAC Presented By: Miss. Meena Venkatachalam Nanu.pabcet@live.com https://twitter.com/MEENANU_V Pavendar Bharathidasan College of Engineering and Technology, Trichy-24. Final Year / Eighth Semester Computer Science and Engineering
  • 3. INTRODUCTION  SMAC- Social, Mobile, Analytics, Cloud.  Now, this four Technology has occupy the IT Business services.  It make the more innovation, emerging and Booming Technology in Business.
  • 4. SOCIAL Media  Computer-mediated tools that allow people o To create Share. o To exchange information and ideas. o Pictures/videos in virtual communities and networks.  A group of Internet-based applications that build on the ideological and technological foundations of Web 2.0, and that allow the creation and exchange of user-generated content.
  • 5. MOBILE Mobile technology is the technology used for cellular communication. 1g (analog) 2G (GSM) (CDMA) 2.5G (GPRS) 40 KBit/s 2.75G (EDGE)500 KBit/s 3G o HSPA 14.4 Mbit/s downlink and 5.76 MBit/s uplink. o HSPA+ 168 Mbit/s downlink and 22 Mbit/s uplink. 4G o LTE Advantage 1GBit/s downlink 500 Mbit/s uplink. o 4G LTE 100 MBit/s downlink 50 MBit/s uplink. 5G Research.
  • 6. Data ANALYTICS  Data analysis is the process of finding the right data to answer your question.  Understanding the processes underlying the data.  Discovering the important patterns in the data, and then communicating your results to have the biggest possible impact. Types of Data: o Volume o Velocity o Variety
  • 7. CLOUD Computing  Cloud computing involves deploying groups of remote servers and software networks that allow centralized data storage and online access to computer services or resources.  Clouds deployment model: o Public o Private o hybrid  Cloud Service model: o Infrastructure-as-a-Service o Platform-as-a-Service o Software-as-a-Service
  • 8. TRENDS  Now the Cloud Computing is in peak of IT Business services  But most of the Companies now move on to the Big Data Technology.  In Future Data Analytics will take the peak in the IT Business services.  Because of Cost, Storage, Maintenance are efficiency high compare to cloud computing.  Big Data was hired by the Large scale Business organization by social media, Medicinal, Research and so on.
  • 9. INTERST AREAS  My interesting area is Cloud Computing.  In that there are lot of security issue in Infrastucture-as-a-Service.  So, I will work for ensure the security problem by analyzing it and cure it.  Example: In IaaS the Storage is also one service in that model. In that environment normally user upload the data directly to the cloud service provider
  • 10. INTERST AREAS Example:  In IaaS the Storage is also one service in that model. In that environment normally user upload the data directly to the cloud service provider.  Then the Cloud Server encrypt the data and Store it.  Suppose the intruders know the path of transaction at the time of uploading data. They can easily hacked the data.  Hence I wish to do encryption on the end user level. Thus the encrypted data is now upload to cloud service provided.  Now intruders know the path of transaction at the time of uploading data. They hacked the encrypted data only.