42
Company LOGO

Company LOGO. COMPANY LOGO ICTACT has organized its 9th edition of ICTACT BRIDGE in Coimbatore Titled “Envisioning the Future Technology” with the theme

Embed Size (px)

Citation preview

Company LOGO

COMPANYLOGO

ICTACT has organized its 9th edition of ICTACT BRIDGE in Coimbatore

Titled

“Envisioning the Future Technology” with the theme “What’s next is here now”.

This conference held on Wednesday the 26th June 2013 at Hotel Le Meridien Coimbatore.

COMPANYLOGO

Session – 1 : Inaugural1

Session – 2 : Impact of Technologies on Institution, Teachers & Students2

Session – 3 : Game Changers in Industry impacting Higher Education3

COMPANYLOGO

An important part of building an effective learning environment is to establish a structure for each day — a structure that results in the predictable use of time. With the entry of newer technologies reality has changed the way the industry works and also makes a impact on the institutions, the Teachers and students.

The session focused and addressed on the greater understanding of recently emerged technologies and their impact on education and deep insights into thoughtful technology integration which will pave the foundation for future learning’s.

 Focus : •Technology Infrastructure – Bring Your Own Device (BYOD) •Technology in learning – A global perspective •Appropriate use of Social Media in education •Engaging learners and developing teachers through gaming •Impact of emerging Social, Cloud, Mobile and Analytics in Industry.

Impact of Technologies on Institution, Teachers & Students

COMPANYLOGO

Impact of Technologies on Institution, Teachers & Students

COMPANYLOGO

The higher education sector is in the midst of significant change. Multiple factors like new technological innovation, increasing cost, shrinking budgets, growth of online education, Massive Open Online Courses (MOOC), rise of competitors, sudden spurt of new educational business model have combined to alter the level playing ground of colleges and universities. This session shall have eminent industry experts discussing on how institutions will have an impact based on the game changers in the industry.

 Focus :

• Technology Enablement of Institutions • Capitalizing the future tech enabled workforce • Changing landscape of learning with emerging technologies • MOOC • Virtual learning and Mobile Learning

Game Changers in Industry impacting Higher Education

COMPANYLOGO

COMPANYLOGO

COMPANYLOGO

Focus On

• Innovations• Cloud Computing• Sensors

COMPANYLOGO

Envisioning the future technology-What’s next is here now

Topics highlighted in the ICTACT Bridge conference:– Business Intelligence– Analytics (Business, Predictive )– Enterprise Content Management, Knowledge

Management– Big Data (Hadoop, Data-deduplication, Data Loss

Protection (DLP), Data Scientist, Thin Provisioning)– Cloud Computing (Hybrid Cloud,Infrastructure-as-a-

Service(IaaS),Software-as-a-Service(SaaS), Multitenancy)

– Crowd Sourcing– Gamification– Massive Open Online Course(MOOC)

COMPANYLOGO

– Mobile App– Network Virtualization– Visualization– Open Source (Spring Framework)– Micro Blogging– Social Media– Fraud Detection– Biometrics– Scalability– Personal Digital Assistant (Bring Your Own Device

(BYOD)

COMPANYLOGOBusiness Intelligence-BI

• Business intelligence, or BI, is an umbrella term that refers to a variety of software applications used to analyze an organization’s raw data. BI as a discipline is made up of several related activities, including data mining, online analytical processing, querying and reporting. BI can handle large amounts of information to help identify and develop new opportunities.

COMPANYLOGOAnalytics

Analytics has emerged as a catch-all term for a variety of different Business Intelligence and application related initiatives

COMPANYLOGOAnalytics

Business Analytics

• Business analytics is comprised of solutions used to build analysis models and simulations to create scenarios, understand realities and predict future states.

• Business analytics includes data mining, predictive analytics, applied analytics and statics and is delivered as an application suitable for a business user.

Predictive Analytics Predictive analytics

describes any approach to data mining with four attributes: Prediction Rapid analysis Business relevance Tools accessible to users

COMPANYLOGOEnterprise Content Management

Enterprise content management(ECM) is used to create, store, distribute, discover, archive and manage unstructured content (scanned documents, email, reports, medical images etc) and analyze and deliver relevant content to users

COMPANYLOGOKnowledge Management(KM)

KM promotes a collaborative and integrative approach to the creation, capture, organization, access and use of information assets, including the tacit, un-captured knowledge of people.

COMPANYLOGOBig Data

Big data is a general term used to describe the voluminous amount of unstructured and semi-structured data a company creates-petabytes and exabytes-billions and trillions of bytes

COMPANYLOGO

Hadoop takes care of running one’s code across a cluster of machines. It chunks up the input data, sends it to each machine, runs the code on each chunk, checks and passes any results either for further processing or to the final output location.

COMPANYLOGOData deduplication

Data deduplication is a form of compression that eliminates redundant data on a subfile level, improving storage utilization.

It can significantly reduce disk space, since only the unique data is stored.

COMPANYLOGOData Loss Protection (DLP)

Data Loss Protection (DLP) describes a set of technologies and inspection techniques used to classify information content contained within an object-such as a file, email, packet, application or data store-while at rest(in storage), in use (during an operation) or in transit across a network)

COMPANYLOGOData Scientist

A data scientist is an individual, organization or application that performs statistical analysis, data mining and retrieval processes on a large amount of data to identify trends, figures and other relevant information. A data scientist performs data analysis on data stored in data warehouses or data centers to solve a variety of business problems, optimize performance and gather business intelligence.

COMPANYLOGOThin Provisioning

Thin provisioning allocates physical capacity from a virtualized pool of storage to logical volumes on a just-in-time basis. This is a mechanism that applied to large-scale centralized computer disk storage systems, SANS and storage virtualization systems , thus allowing space to be easily allocated to servers, on a just-enough and just-in-time basis.

COMPANYLOGOCloud Computing

Cloud computing is an approach to computing that uses a shared resource to deliver computing that is consumed as a service.

COMPANYLOGOHybrid Cloud

Hybrid cloud is a composition of two or more clouds (private, community or public) that remain unique entities but are bound together, offering the benefits of multiple deployment models. Companies and individuals are able to obtain degrees of fault tolerance combined with locally immediate usability without dependency on internet connectivity.

COMPANYLOGOIaaS, PaaS, SaaS

1. IaaS - Cloud Management, Storage, Virtualization, Content Delivery Networks, Networking, Computing2. PaaS - Development & Testing, Integration, Database, Application Platform, General3. SaaS - Business Management, Vertical Apps, Tools, Cloud Security, CRM

COMPANYLOGOMultitenancy

Multitenancy is a reference to the mode of operation of software where multiple independent instances of one or multiple application operate in a shared environment. The instances (tenants) are logically isolated, but physically integrated

COMPANYLOGOCrowdsourcing

Crowdsourcing describes the processes for sourcing a task or challenge to a broad distributed set of contributors using the Web and social collaboration techniques.

COMPANYLOGOGamification

Gamification is the use of game mechanics to drive engagement in non-game business scenarios and to change behaviors in a target audience to achieve business outcomes.

COMPANYLOGOMassive Open Online Course(MOOC)

MOOC is an online phenomenon made possible by social networking facilitation, freely accessible online resources, hundreds and thousands of registered users(students). Students self-organize their participation in a MOOC.

COMPANYLOGOMobile App

The recent years have shown greatest competition in creating mobile application. Application software is developed for Personal Digital Assistants, Enterprise Digital Assistants or mobile phones.

COMPANYLOGONetwork Virtualization

Network virtualization(combining hardware and software resources into a singly virtual network) offers access to routing features and data streams which can provide newer, service-aware, resilient solutions; newer security services that are native within network elements; real time session control for converged voice and video applications etc.,

COMPANYLOGOVisualization

Visualization is illustration of information objects and their relationships on a display. Advanced technologies help users’ ability to interfere to large knowledge repositories.

COMPANYLOGOOpen Source

Open source describes software that comes with permission to use, copy and distribute either as is or with modifications, and that may be offered either free of with a charge.

COMPANYLOGOSpring Network

Spring network is an open source application framework and inversion of control container for the Java platform.

COMPANYLOGOMicro-blogging

Microblogging is short messages that are delivered to consumers who have chosen to follow or subscribe to a given microblogging feed. (Twitter, Plurk, Tumblr, Weibo etc., ).These services focus on consumers but can be used by retailers, as opposed to enterprise-centric microblogging sites(Yammer and Socialcast) which focus on collaboration in the enterprise.

COMPANYLOGOSocial Media

Social media is an online environment in which content is created, consumed, promoted, distributed or shared for purposes that are primarily related to communities and social activities, rather that functional, task oriented objectives. Social media technologies take on many different forms including internet blogs, microblogging, wikis, social networks, podcasts, social bookmarking etc.,

COMPANYLOGOFraud Detection

Fraud detection uses background server based processes that examine users’ and other defined entities’ access and behavior patterns to protect customer and enterprise information, assets, accounts and transactions through a real time, near real time or batch analysis of activities.

COMPANYLOGOBio Metrics

Biometrics refers to the identification of human by their characteristics traits.

In IT,, biometrics refers to technologies that measure and analyze human body characteristics, such as DNA, fingerprints, eye retinas and irises, voice patterns, facial patterns and hand measurements for augmentations purposes.

In computer security, biometrics refers to authentication techniques that rely on measurable physical characteristics that can be automatically checked.

COMPANYLOGOScalability

Scalability is the measure of a system’s ability to increase or decrease in performance and cost in response to changes in application and system processing demands

COMPANYLOGOPersonal Digital Assistant(PDA)

A Personal Digital Assistant (PDA), also known as a palmtop computer, or personal data assistant, is a mobile device that functions as a personal information manager. A PDA can function as a cellular phone, web browser and personal organizer.

COMPANYLOGOBring Your Own Device(BYOD)

Bring your own device, bring your own PC, bring your own phone, bring your own phone are policies that may permit employees (or students) to bring their laptops, tablets, mobile phones to access, share, learn and distribute knowledge with integrity and ethics.

COMPANYLOGO

Thank you