company logo - Coimbatore Institute of Engineering and Technology
Download
Report
Transcript company logo - Coimbatore Institute of Engineering and Technology
Company LOGO
COMPANY
LOGO
ICTACT has organized its 9th edition of ICTACT BRIDGE in Coimbatore
Titled
“Envisioning the Future Technology” with the theme
“What’s next is here now”.
This conference held on Wednesday the 26th June 2013 at
Hotel Le Meridien Coimbatore.
COMPANY
LOGO
1
Session – 1 : Inaugural
2
Session – 2 : Impact of Technologies on Institution, Teachers & Students
3
Session – 3 : Game Changers in Industry impacting Higher Education
COMPANY
LOGO
Impact of Technologies on Institution, Teachers & Students
An important part of building an effective learning environment is to establish a
structure for each day — a structure that results in the predictable use of time.
With the entry of newer technologies reality has changed the way the industry
works and also makes a impact on the institutions, the Teachers and students.
The session focused and addressed on the greater understanding of recently
emerged technologies and their impact on education and deep insights into
thoughtful technology integration which will pave the foundation for future
learning’s.
Focus :
•Technology Infrastructure – Bring Your Own Device (BYOD)
•Technology in learning – A global perspective
•Appropriate use of Social Media in education
•Engaging learners and developing teachers through gaming
•Impact of emerging Social, Cloud, Mobile and Analytics in Industry.
COMPANY
LOGO
Impact of Technologies on Institution, Teachers & Students
COMPANY
LOGO
Game Changers in Industry impacting Higher Education
The higher education sector is in the midst of significant change. Multiple factors
like new technological innovation, increasing cost, shrinking budgets, growth of
online education, Massive Open Online Courses (MOOC), rise of competitors,
sudden spurt of new educational business model have combined to alter the
level playing ground of colleges and universities. This session shall have
eminent industry experts discussing on how institutions will have an impact
based on the game changers in the industry.
Focus :
• Technology Enablement of Institutions
• Capitalizing the future tech enabled workforce
• Changing landscape of learning with emerging technologies
• MOOC
• Virtual learning and Mobile Learning
COMPANY
LOGO
COMPANY
LOGO
COMPANY
LOGO
Focus On
• Innovations
• Cloud Computing
• Sensors
Envisioning the future technologyWhat’s next is here now
COMPANY
LOGO
Topics highlighted in the ICTACT Bridge conference:
– Business Intelligence
– Analytics (Business, Predictive )
– Enterprise Content Management, Knowledge
Management
– Big Data (Hadoop, Data-deduplication, Data Loss
Protection (DLP), Data Scientist, Thin Provisioning)
– Cloud Computing (Hybrid Cloud,Infrastructure-as-aService(IaaS),Software-as-a-Service(SaaS),
Multitenancy)
– Crowd Sourcing
– Gamification
– Massive Open Online Course(MOOC)
COMPANY
LOGO
–
–
–
–
–
–
–
–
–
–
Mobile App
Network Virtualization
Visualization
Open Source (Spring Framework)
Micro Blogging
Social Media
Fraud Detection
Biometrics
Scalability
Personal Digital Assistant (Bring Your Own Device
(BYOD)
Business Intelligence-BI
• Business intelligence, or BI,
is an umbrella term that
refers to a variety of
software applications used
to analyze an organization’s
raw data. BI as a discipline
is made up of several
related activities, including
data mining, online
analytical processing,
querying and reporting. BI
can handle large amounts
of information to help
identify and develop new
opportunities.
COMPANY
LOGO
Analytics
COMPANY
LOGO
Analytics has emerged as a catch-all term
for a variety of different Business
Intelligence and application related
initiatives
COMPANY
LOGO
Analytics
Business Analytics
• Business analytics is
comprised of solutions
used to build analysis
models and simulations
to create scenarios,
understand realities and
predict future states.
• Business analytics
includes data mining,
predictive analytics,
applied analytics and
statics and is delivered
as an application
suitable for a business
user.
Predictive Analytics
Predictive analytics
describes any
approach to data
mining with four
attributes:
Prediction
Rapid analysis
Business relevance
Tools accessible to users
Enterprise Content Management
Enterprise content
management(ECM) is
used to create, store,
distribute, discover,
archive and manage
unstructured content
(scanned documents,
email, reports, medical
images etc) and analyze
and deliver relevant
content to users
COMPANY
LOGO
Knowledge Management(KM)
KM promotes a
collaborative and
integrative approach to
the creation, capture,
organization, access and
use of information
assets, including the
tacit, un-captured
knowledge of people.
COMPANY
LOGO
Big Data
Big data is a general
term used to describe
the voluminous amount
of unstructured and
semi-structured data a
company createspetabytes and
exabytes-billions and
trillions of bytes
COMPANY
LOGO
COMPANY
LOGO
Hadoop takes care of
running one’s code
across a cluster of
machines. It chunks
up the input data,
sends it to each
machine, runs the
code on each chunk,
checks and passes
any results either for
further processing or
to the final output
location.
Data deduplication
Data deduplication is a
form of compression that
eliminates redundant data
on a subfile level,
improving storage
utilization.
It can significantly reduce
disk space, since only the
unique data is stored.
COMPANY
LOGO
Data Loss Protection (DLP)
Data Loss Protection
(DLP) describes a set
of technologies and
inspection techniques
used to classify
information content
contained within an
object-such as a file,
email, packet,
application or data
store-while at rest(in
storage), in use
(during an operation)
or in transit across a
network)
COMPANY
LOGO
Data Scientist
A data scientist is an
individual, organization or
application that performs
statistical analysis, data
mining
and
retrieval
processes on a large
amount of data to identify
trends, figures and other
relevant information. A
data scientist performs
data analysis on data
stored in data warehouses
or data centers to solve a
variety
of
business
problems,
optimize
performance and gather
business intelligence.
COMPANY
LOGO
Thin Provisioning
Thin
provisioning
allocates
physical
capacity
from
a
virtualized
pool
of
storage
to
logical
volumes on a just-intime basis. This is a
mechanism
that
applied to large-scale
centralized
computer
disk storage systems,
SANS
and
storage
virtualization systems ,
thus allowing space to
be easily allocated to
servers, on a justenough and just-intime basis.
COMPANY
LOGO
Cloud Computing
Cloud computing
is an approach to
computing that
uses a shared
resource to
deliver computing
that is consumed
as a service.
COMPANY
LOGO
Hybrid Cloud
Hybrid cloud is a
composition of two or
more clouds (private,
community or public)
that remain unique
entities but are bound
together, offering the
benefits of multiple
deployment models.
Companies and
individuals are able to
obtain degrees of fault
tolerance combined with
locally immediate
usability without
dependency on internet
connectivity.
COMPANY
LOGO
IaaS, PaaS, SaaS
1. IaaS - Cloud
Management, Storage,
Virtualization, Content
Delivery Networks,
Networking, Computing
2. PaaS - Development &
Testing, Integration,
Database, Application
Platform, General
3. SaaS - Business
Management, Vertical
Apps, Tools, Cloud
Security, CRM
COMPANY
LOGO
Multitenancy
Multitenancy is a
reference to the mode
of operation of
software where
multiple independent
instances of one or
multiple application
operate in a shared
environment. The
instances (tenants) are
logically isolated, but
physically integrated
COMPANY
LOGO
Crowdsourcing
Crowdsourcing
describes
the processes for sourcing
a task or challenge to a
broad distributed set of
contributors using the Web
and
social
collaboration
techniques.
COMPANY
LOGO
Gamification
Gamification is the
use
of
game
mechanics to drive
engagement
in
non-game business
scenarios
and
to
change behaviors in
a target audience to
achieve
business
outcomes.
COMPANY
LOGO
Massive Open Online Course(MOOC)
MOOC is an online
phenomenon made possible
by social networking
facilitation, freely accessible
online resources, hundreds
and thousands of registered
users(students). Students
self-organize their
participation in a MOOC.
COMPANY
LOGO
Mobile App
The recent years have
shown greatest
competition in creating
mobile application.
Application software is
developed for Personal
Digital Assistants,
Enterprise Digital
Assistants or mobile
phones.
COMPANY
LOGO
Network Virtualization
Network
virtualization(combining
hardware and software
resources into a singly
virtual network) offers
access to routing features
and data streams which
can
provide
newer,
service-aware,
resilient
solutions; newer security
services that are native
within network elements;
real time session control
for converged voice and
video applications etc.,
COMPANY
LOGO
Visualization
Visualization is
illustration of
information objects
and their
relationships on a
display. Advanced
technologies help
users’ ability to
interfere to large
knowledge
repositories.
COMPANY
LOGO
Open Source
Open source
describes software
that comes with
permission to use,
copy and distribute
either as is or with
modifications, and
that may be offered
either free of with
a charge.
COMPANY
LOGO
Spring Network
Spring network is
an open source
application
framework
and
inversion
of
control container
for
the
Java
platform.
COMPANY
LOGO
Micro-blogging
COMPANY
LOGO
Microblogging is short messages that
are delivered to consumers who have
chosen to follow or subscribe to a
given microblogging feed. (Twitter,
Plurk, Tumblr, Weibo etc., ).These
services focus on consumers but can
be used by retailers, as opposed to
enterprise-centric
microblogging
sites(Yammer and Socialcast) which
focus
on
collaboration
in
the
enterprise.
Social Media
Social media is an online
environment in which content
is
created,
consumed,
promoted,
distributed
or
shared for purposes that are
primarily
related
to
communities
and
social
activities,
rather
that
functional,
task
oriented
objectives.
Social
media
technologies take on many
different
forms
including
internet
blogs,
microblogging, wikis, social
networks, podcasts, social
bookmarking etc.,
COMPANY
LOGO
Fraud Detection
Fraud detection uses
background server
based processes that
examine users’ and
other defined entities’
access and behavior
patterns to protect
customer and
enterprise information,
assets, accounts and
transactions through a
real time, near real
time or batch analysis
of activities.
COMPANY
LOGO
Bio Metrics
Biometrics
refers
to
the
identification of human by their
characteristics traits.
In IT,, biometrics refers to
technologies that measure and
analyze
human
body
characteristics, such as DNA,
fingerprints, eye retinas and
irises, voice patterns, facial
patterns
and
hand
measurements
for
augmentations purposes.
In
computer
security,
biometrics
refers
to
authentication techniques that
rely on measurable physical
characteristics that can be
automatically checked.
COMPANY
LOGO
Scalability
COMPANY
LOGO
Scalability is the measure of a
system’s
ability
to
increase
or
decrease in performance and cost in
response to changes in application
and system processing demands
Personal Digital Assistant(PDA)
COMPANY
LOGO
A Personal Digital Assistant (PDA),
also known as a palmtop computer, or
personal data assistant, is a mobile
device that functions as a personal
information manager. A PDA can
function as a cellular phone, web
browser and personal organizer.
Bring Your Own Device(BYOD)
COMPANY
LOGO
Bring your own device, bring your own
PC, bring your own phone, bring your
own phone are policies that may
permit employees (or students) to
bring their laptops, tablets, mobile
phones to access, share, learn and
distribute knowledge with integrity
and ethics.
COMPANY
LOGO
Thank you