1 / 42

ICTACT Bridge – A Large Industry Institute Interaction Initiative

ICTACT Bridge – A Large Industry Institute Interaction Initiative. ICTACT has organized its 9th edition of ICTACT BRIDGE in Coimbatore Titled “Envisioning the Future Technology” with the theme “What’s next is here now”.

helia
Download Presentation

ICTACT Bridge – A Large Industry Institute Interaction Initiative

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. ICTACT Bridge – A Large Industry Institute Interaction Initiative ICTACT has organized its 9th edition of ICTACT BRIDGE in Coimbatore Titled “Envisioning the Future Technology” with the theme “What’s next is here now”. This conference held on Wednesday the 26th June 2013 at Hotel Le Meridien Coimbatore.

  2. Session – 1 : Inaugural Session – 2 : Impact of Technologies on Institution, Teachers & Students 1 2 3 Session – 3 : Game Changers in Industry impacting Higher Education

  3. Impact of Technologies on Institution, Teachers & Students • An important part of building an effective learning environment is to establish a structure for each day — a structure that results in the predictable use of time. With the entry of newer technologies reality has changed the way the industry works and also makes a impact on the institutions, the Teachers and students. • The session focused and addressed on the greater understanding of recently emerged technologies and their impact on education and deep insights into thoughtful technology integration which will pave the foundation for future learning’s. Focus : • Technology Infrastructure – Bring Your Own Device (BYOD) • Technology in learning – A global perspective • Appropriate use of Social Media in education • Engaging learners and developing teachers through gaming • Impact of emerging Social, Cloud, Mobile and Analytics in Industry.

  4. Impact of Technologies on Institution, Teachers & Students

  5. Game Changers in Industry impacting Higher Education • The higher education sector is in the midst of significant change. Multiple factors like new technological innovation, increasing cost, shrinking budgets, growth of online education, Massive Open Online Courses (MOOC), rise of competitors, sudden spurt of new educational business model have combined to alter the level playing ground of colleges and universities. This session shall have eminent industry experts discussing on how institutions will have an impact based on the game changers in the industry. Focus : • Technology Enablement of Institutions • Capitalizing the future tech enabled workforce • Changing landscape of learning with emerging technologies • MOOC • Virtual learning and Mobile Learning

  6. Focus On • Innovations • Cloud Computing • Sensors

  7. Envisioning the future technology-What’s next is here now Topics highlighted in the ICTACT Bridge conference: • Business Intelligence • Analytics (Business, Predictive ) • Enterprise Content Management, Knowledge Management • Big Data (Hadoop, Data-deduplication, Data Loss Protection (DLP), Data Scientist, Thin Provisioning) • Cloud Computing (Hybrid Cloud,Infrastructure-as-a-Service(IaaS),Software-as-a-Service(SaaS), Multitenancy) • Crowd Sourcing • Gamification • Massive Open Online Course(MOOC)

  8. Mobile App • Network Virtualization • Visualization • Open Source (Spring Framework) • Micro Blogging • Social Media • Fraud Detection • Biometrics • Scalability • Personal Digital Assistant (Bring Your Own Device (BYOD)

  9. Business Intelligence-BI • Business intelligence, or BI, is an umbrella term that refers to a variety of software applications used to analyze an organization’s raw data. BI as a discipline is made up of several related activities, including data mining, online analytical processing, querying and reporting. BI can handle large amounts of information to help identify and develop new opportunities.

  10. Analytics • Analytics has emerged as a catch-all term for a variety of different Business Intelligence and application related initiatives

  11. Analytics Business Analytics Predictive Analytics Predictive analytics describes any approach to data mining with four attributes: Prediction Rapid analysis Business relevance Tools accessible to users • Business analytics is comprised of solutions used to build analysis models and simulations to create scenarios, understand realities and predict future states. • Business analytics includes data mining, predictive analytics, applied analytics and statics and is delivered as an application suitable for a business user.

  12. Enterprise Content Management • Enterprise content management(ECM) is used to create, store, distribute, discover, archive and manage unstructured content (scanned documents, email, reports, medical images etc) and analyze and deliver relevant content to users

  13. Knowledge Management(KM) • KM promotes a collaborative and integrative approach to the creation, capture, organization, access and use of information assets, including the tacit, un-captured knowledge of people.

  14. Big Data • Big data is a general term used to describe the voluminous amount of unstructured and semi-structured data a company creates-petabytes and exabytes-billions and trillions of bytes

  15. Hadoop takes care of running one’s code across a cluster of machines. It chunks up the input data, sends it to each machine, runs the code on each chunk, checks and passes any results either for further processing or to the final output location.

  16. Data deduplication • Data deduplication is a form of compression that eliminates redundant data on a subfile level, improving storage utilization. • It can significantly reduce disk space, since only the unique data is stored.

  17. Data Loss Protection (DLP) • Data Loss Protection (DLP) describes a set of technologies and inspection techniques used to classify information content contained within an object-such as a file, email, packet, application or data store-while at rest(in storage), in use (during an operation) or in transit across a network)

  18. Data Scientist • A data scientist is an individual, organization or application that performs statistical analysis, data mining and retrieval processes on a large amount of data to identify trends, figures and other relevant information. A data scientist performs data analysis on data stored in data warehouses or data centers to solve a variety of business problems, optimize performance and gather business intelligence.

  19. Thin Provisioning • Thin provisioning allocates physical capacity from a virtualized pool of storage to logical volumes on a just-in-time basis. This is a mechanism that applied to large-scale centralized computer disk storage systems, SANS and storage virtualization systems , thus allowing space to be easily allocated to servers, on a just-enough and just-in-time basis.

  20. Cloud Computing • Cloud computing is an approach to computing that uses a shared resource to deliver computing that is consumed as a service.

  21. Hybrid Cloud • Hybrid cloud is a composition of two or more clouds (private, community or public) that remain unique entities but are bound together, offering the benefits of multiple deployment models. Companies and individuals are able to obtain degrees of fault tolerance combined with locally immediate usability without dependency on internet connectivity.

  22. IaaS, PaaS, SaaS • 1. IaaS - Cloud Management, Storage, Virtualization, Content Delivery Networks, Networking, Computing2. PaaS - Development & Testing, Integration, Database, Application Platform, General3. SaaS - Business Management, Vertical Apps, Tools, Cloud Security, CRM

  23. Multitenancy • Multitenancy is a reference to the mode of operation of software where multiple independent instances of one or multiple application operate in a shared environment. The instances (tenants) are logically isolated, but physically integrated

  24. Crowdsourcing • Crowdsourcing describes the processes for sourcing a task or challenge to a broad distributed set of contributors using the Web and social collaboration techniques.

  25. Gamification • Gamification is the use of game mechanics to drive engagement in non-game business scenarios and to change behaviors in a target audience to achieve business outcomes.

  26. Massive Open Online Course(MOOC) • MOOC is an online phenomenon made possible by social networking facilitation, freely accessible online resources, hundreds and thousands of registered users(students). Students self-organize their participation in a MOOC.

  27. Mobile App • The recent years have shown greatest competition in creating mobile application. Application software is developed for Personal Digital Assistants, Enterprise Digital Assistants or mobile phones.

  28. Network Virtualization • Network virtualization(combining hardware and software resources into a singly virtual network) offers access to routing features and data streams which can provide newer, service-aware, resilient solutions; newer security services that are native within network elements; real time session control for converged voice and video applications etc.,

  29. Visualization • Visualization is illustration of information objects and their relationships on a display. Advanced technologies help users’ ability to interfere to large knowledge repositories.

  30. Open Source • Open source describes software that comes with permission to use, copy and distribute either as is or with modifications, and that may be offered either free of with a charge.

  31. Spring Network • Spring network is an open source application framework and inversion of control container for the Java platform.

  32. Micro-blogging • Microblogging is short messages that are delivered to consumers who have chosen to follow or subscribe to a given microblogging feed. (Twitter, Plurk, Tumblr, Weibo etc., ).These services focus on consumers but can be used by retailers, as opposed to enterprise-centric microblogging sites(Yammer and Socialcast) which focus on collaboration in the enterprise.

  33. Social Media • Social media is an online environment in which content is created, consumed, promoted, distributed or shared for purposes that are primarily related to communities and social activities, rather that functional, task oriented objectives. Social media technologies take on many different forms including internet blogs, microblogging, wikis, social networks, podcasts, social bookmarking etc.,

  34. Fraud Detection • Fraud detection uses background server based processes that examine users’ and other defined entities’ access and behavior patterns to protect customer and enterprise information, assets, accounts and transactions through a real time, near real time or batch analysis of activities.

  35. Bio Metrics • Biometrics refers to the identification of human by their characteristics traits. • In IT,, biometrics refers to technologies that measure and analyze human body characteristics, such as DNA, fingerprints, eye retinas and irises, voice patterns, facial patterns and hand measurements for augmentations purposes. • In computer security, biometrics refers to authentication techniques that rely on measurable physical characteristics that can be automatically checked.

  36. Scalability • Scalability is the measure of a system’s ability to increase or decrease in performance and cost in response to changes in application and system processing demands

  37. Personal Digital Assistant(PDA) • A Personal Digital Assistant (PDA), also known as a palmtop computer, or personal data assistant, is a mobile device that functions as a personal information manager. A PDA can function as a cellular phone, web browser and personal organizer.

  38. Bring Your Own Device(BYOD) • Bring your own device, bring your own PC, bring your own phone, bring your own phone are policies that may permit employees (or students) to bring their laptops, tablets, mobile phones to access, share, learn and distribute knowledge with integrity and ethics.

  39. Thank you

More Related