SlideShare a Scribd company logo
VALUE BUILDING THROUGH M-TECHNOLOGY BY PROF.SANGEETA SHARMA, UNIVERSITY OF RAJASTHAN,INDIA WEB-VISIT www. sangeetasharma .in
WHY VALUE-BUILDING? ,[object Object],[object Object],[object Object],[object Object],[object Object]
WHAT IS M-TECHNOLOGY? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],TRANSFORMATIONAL PROGNOSIS
INQUISITIVENESS… ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
CAN WE FIND SOME PLAUSIBLES? If yes, then how  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
ROLE? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
LOGISTICS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
CONVERSIONS ,[object Object],DEMANDS EXPECTATIONS COMPLEXITIES ANXIETIES POLICIES ACTUALS REALITIES SIMPLICITIES SOLACE ACTION  M-INTERVENTIONS
DYNAMICS OF M-SOCIETY ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],-MULTI-CULTURALIST -ETHICALLY REALIGNED  -MOBILIZED  -COMMUNICABLE -ADAPTABLE LIFE PATTRENS -NEW LEARNINGS M-SOCIETY CONFIGURE AS
PREMISSES FOR MS ,[object Object],[object Object],[object Object],[object Object],[object Object]
TECHNOLOGY AS TOOL OF ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
INFROMATIONAL INPUTS FOR M-SOCIETY ,[object Object],[object Object],[object Object],[object Object]
HOW E/M- GOVERNANCE CAN HELP ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
HOW MT AFFECTS? WHEN GOVERNMENT HAS ETHICAL CONTENT (POWER/ AUTHORITY ) PEOPLE  TO PEOPLE WILL HAVE ETHICAL BONDS AT SUBLIMINAL  LEVEL  SOCIAL  STRUCTURE GENERATE BUOYANCY FORCE TO ENABLE TO SUSTAIN PRESSURES
MESSAGE ,[object Object],[object Object],[object Object],[object Object],[object Object]

More Related Content

Similar to Value Building Through M-Technology

Onderwijs Dagen 2011
Onderwijs Dagen 2011Onderwijs Dagen 2011
Onderwijs Dagen 2011
Seats2Meet.com, CDEF Holding BV.
 
Ecosystemic Resilience in Uncertain Times
Ecosystemic Resilience in Uncertain TimesEcosystemic Resilience in Uncertain Times
Ecosystemic Resilience in Uncertain Times
Martha Russell
 
OWD2011 - Society 3.0 en impact hiervan op het onderwijs - Ronald van den Hoff
OWD2011 - Society 3.0 en impact hiervan op het onderwijs - Ronald van den HoffOWD2011 - Society 3.0 en impact hiervan op het onderwijs - Ronald van den Hoff
OWD2011 - Society 3.0 en impact hiervan op het onderwijs - Ronald van den HoffSURF Events
 
Transforming Sociotech Design (TSD) Tutorial
Transforming Sociotech Design (TSD) TutorialTransforming Sociotech Design (TSD) Tutorial
Transforming Sociotech Design (TSD) Tutorial
Agnis Stibe
 
Insights & More model for Context Research
Insights & More model for Context ResearchInsights & More model for Context Research
Insights & More model for Context Research
Nandini Ghoshal
 
THEORIES OF TECHNOLOGY.pptx
THEORIES OF TECHNOLOGY.pptxTHEORIES OF TECHNOLOGY.pptx
THEORIES OF TECHNOLOGY.pptx
RichieManlimosJr
 
MelissaJarquin_Portfolio extract_compressed
MelissaJarquin_Portfolio extract_compressedMelissaJarquin_Portfolio extract_compressed
MelissaJarquin_Portfolio extract_compressedMelissa Jarquin
 
Cognitive Computing in Cyber Physical Systems Transformative Integration for ...
Cognitive Computing in Cyber Physical Systems Transformative Integration for ...Cognitive Computing in Cyber Physical Systems Transformative Integration for ...
Cognitive Computing in Cyber Physical Systems Transformative Integration for ...
ijtsrd
 
How to Build a Culture of Innovation
How to Build a Culture of InnovationHow to Build a Culture of Innovation
How to Build a Culture of Innovation
Michael Henry
 
Truth, Trust and The Future of Commerce
Truth, Trust and The Future of CommerceTruth, Trust and The Future of Commerce
Truth, Trust and The Future of Commerce
sparks & honey
 
Exploratory theory network_society_castells
Exploratory theory network_society_castellsExploratory theory network_society_castells
Exploratory theory network_society_castellsJulim Coelho
 
Transformational Sociotech Design for Urban Mobility and Sustainable Wellbein...
Transformational Sociotech Design for Urban Mobility and Sustainable Wellbein...Transformational Sociotech Design for Urban Mobility and Sustainable Wellbein...
Transformational Sociotech Design for Urban Mobility and Sustainable Wellbein...
Agnis Stibe
 
Knowledge management
Knowledge managementKnowledge management
Knowledge managementNEHA SHARMA
 
What PLN's, PLC's, and 21st Century Literacies mean to us
What PLN's, PLC's, and 21st Century Literacies mean to usWhat PLN's, PLC's, and 21st Century Literacies mean to us
What PLN's, PLC's, and 21st Century Literacies mean to us
awenzel
 
Burnham Social Engineering
Burnham Social EngineeringBurnham Social Engineering
Burnham Social EngineeringJason Burnham
 
Icm501 vasquez
Icm501 vasquezIcm501 vasquez
Icm501 vasquezroadvas
 
Civilization Progression
Civilization ProgressionCivilization Progression
Civilization Progression
Robert Short
 
(2002) roberts the role of info and comm tech in knowledge transfer
(2002) roberts the role of info and comm tech in knowledge transfer(2002) roberts the role of info and comm tech in knowledge transfer
(2002) roberts the role of info and comm tech in knowledge transfer
Siti Khatizah Aziz
 
Smart Cities, Smart Citizens and Smart Decisions
Smart Cities, Smart Citizens and Smart DecisionsSmart Cities, Smart Citizens and Smart Decisions
Smart Cities, Smart Citizens and Smart Decisions
Martha Russell
 
El inventario de activos del conocimiento
El inventario de activos del conocimientoEl inventario de activos del conocimiento
El inventario de activos del conocimiento
FLOK Society
 

Similar to Value Building Through M-Technology (20)

Onderwijs Dagen 2011
Onderwijs Dagen 2011Onderwijs Dagen 2011
Onderwijs Dagen 2011
 
Ecosystemic Resilience in Uncertain Times
Ecosystemic Resilience in Uncertain TimesEcosystemic Resilience in Uncertain Times
Ecosystemic Resilience in Uncertain Times
 
OWD2011 - Society 3.0 en impact hiervan op het onderwijs - Ronald van den Hoff
OWD2011 - Society 3.0 en impact hiervan op het onderwijs - Ronald van den HoffOWD2011 - Society 3.0 en impact hiervan op het onderwijs - Ronald van den Hoff
OWD2011 - Society 3.0 en impact hiervan op het onderwijs - Ronald van den Hoff
 
Transforming Sociotech Design (TSD) Tutorial
Transforming Sociotech Design (TSD) TutorialTransforming Sociotech Design (TSD) Tutorial
Transforming Sociotech Design (TSD) Tutorial
 
Insights & More model for Context Research
Insights & More model for Context ResearchInsights & More model for Context Research
Insights & More model for Context Research
 
THEORIES OF TECHNOLOGY.pptx
THEORIES OF TECHNOLOGY.pptxTHEORIES OF TECHNOLOGY.pptx
THEORIES OF TECHNOLOGY.pptx
 
MelissaJarquin_Portfolio extract_compressed
MelissaJarquin_Portfolio extract_compressedMelissaJarquin_Portfolio extract_compressed
MelissaJarquin_Portfolio extract_compressed
 
Cognitive Computing in Cyber Physical Systems Transformative Integration for ...
Cognitive Computing in Cyber Physical Systems Transformative Integration for ...Cognitive Computing in Cyber Physical Systems Transformative Integration for ...
Cognitive Computing in Cyber Physical Systems Transformative Integration for ...
 
How to Build a Culture of Innovation
How to Build a Culture of InnovationHow to Build a Culture of Innovation
How to Build a Culture of Innovation
 
Truth, Trust and The Future of Commerce
Truth, Trust and The Future of CommerceTruth, Trust and The Future of Commerce
Truth, Trust and The Future of Commerce
 
Exploratory theory network_society_castells
Exploratory theory network_society_castellsExploratory theory network_society_castells
Exploratory theory network_society_castells
 
Transformational Sociotech Design for Urban Mobility and Sustainable Wellbein...
Transformational Sociotech Design for Urban Mobility and Sustainable Wellbein...Transformational Sociotech Design for Urban Mobility and Sustainable Wellbein...
Transformational Sociotech Design for Urban Mobility and Sustainable Wellbein...
 
Knowledge management
Knowledge managementKnowledge management
Knowledge management
 
What PLN's, PLC's, and 21st Century Literacies mean to us
What PLN's, PLC's, and 21st Century Literacies mean to usWhat PLN's, PLC's, and 21st Century Literacies mean to us
What PLN's, PLC's, and 21st Century Literacies mean to us
 
Burnham Social Engineering
Burnham Social EngineeringBurnham Social Engineering
Burnham Social Engineering
 
Icm501 vasquez
Icm501 vasquezIcm501 vasquez
Icm501 vasquez
 
Civilization Progression
Civilization ProgressionCivilization Progression
Civilization Progression
 
(2002) roberts the role of info and comm tech in knowledge transfer
(2002) roberts the role of info and comm tech in knowledge transfer(2002) roberts the role of info and comm tech in knowledge transfer
(2002) roberts the role of info and comm tech in knowledge transfer
 
Smart Cities, Smart Citizens and Smart Decisions
Smart Cities, Smart Citizens and Smart DecisionsSmart Cities, Smart Citizens and Smart Decisions
Smart Cities, Smart Citizens and Smart Decisions
 
El inventario de activos del conocimiento
El inventario de activos del conocimientoEl inventario de activos del conocimiento
El inventario de activos del conocimiento
 

More from Naresh Kumar

RAS 2012 MAINS TIME TABLE
RAS 2012 MAINS TIME TABLERAS 2012 MAINS TIME TABLE
RAS 2012 MAINS TIME TABLENaresh Kumar
 
RAS 2008
RAS 2008RAS 2008
RAS 2008
Naresh Kumar
 
RPS 2008
RPS 2008RPS 2008
RPS 2008
Naresh Kumar
 
Second grade teacher
Second grade teacherSecond grade teacher
Second grade teacher
Naresh Kumar
 
RAS 2010 Press Note
RAS 2010 Press NoteRAS 2010 Press Note
RAS 2010 Press Note
Naresh Kumar
 
RAS Mains Result and Cut Off
RAS Mains Result and Cut OffRAS Mains Result and Cut Off
RAS Mains Result and Cut Off
Naresh Kumar
 
Class X Exam Results 2011
Class X Exam Results 2011Class X Exam Results 2011
Class X Exam Results 2011
Naresh Kumar
 
AIPMT 2011 Counselling
AIPMT 2011 CounsellingAIPMT 2011 Counselling
AIPMT 2011 Counselling
Naresh Kumar
 

More from Naresh Kumar (9)

RAS 2012 MAINS TIME TABLE
RAS 2012 MAINS TIME TABLERAS 2012 MAINS TIME TABLE
RAS 2012 MAINS TIME TABLE
 
RAS 2008
RAS 2008RAS 2008
RAS 2008
 
RPS 2008
RPS 2008RPS 2008
RPS 2008
 
Second grade teacher
Second grade teacherSecond grade teacher
Second grade teacher
 
RAS 2010 Press Note
RAS 2010 Press NoteRAS 2010 Press Note
RAS 2010 Press Note
 
RAS Mains Result and Cut Off
RAS Mains Result and Cut OffRAS Mains Result and Cut Off
RAS Mains Result and Cut Off
 
Class X Exam Results 2011
Class X Exam Results 2011Class X Exam Results 2011
Class X Exam Results 2011
 
AIPMT 2011 Counselling
AIPMT 2011 CounsellingAIPMT 2011 Counselling
AIPMT 2011 Counselling
 
RAS New Pattern
RAS New PatternRAS New Pattern
RAS New Pattern
 

Recently uploaded

Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Zilliz
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 

Recently uploaded (20)

Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 

Value Building Through M-Technology

  • 1. VALUE BUILDING THROUGH M-TECHNOLOGY BY PROF.SANGEETA SHARMA, UNIVERSITY OF RAJASTHAN,INDIA WEB-VISIT www. sangeetasharma .in
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14. HOW MT AFFECTS? WHEN GOVERNMENT HAS ETHICAL CONTENT (POWER/ AUTHORITY ) PEOPLE TO PEOPLE WILL HAVE ETHICAL BONDS AT SUBLIMINAL LEVEL SOCIAL STRUCTURE GENERATE BUOYANCY FORCE TO ENABLE TO SUSTAIN PRESSURES
  • 15.