Sie sind auf Seite 1von 10

Information Technology :

Information technology (IT) is a branch of engineering dealing with the use of computers and telecommunications equipment to store, retrieve, transmit and manipulate data. It can also be defined as "the study, design, development, application, implementation, support or management of computerbased information systems". The term is commonly used as a synonym for computers and computer networks, but it also encompasses other information distribution technologies such as television and telephones.

Computers :
A computer is a general purpose device that can be programmed to carry out a finite set of arithmetic or logical operations. Since a sequence of operations can be readily changed, the computer can solve more than one kind of problem. Computer consists of at least one processing element and some form of memory. The processing element carries out arithmetic and logic operations, and a sequencing and control unit that can change the order of operations based on stored information. Peripheral devices allow information to be retrieved from an external source, and the result of operations saved and retrieved. Modern computers based on integrated circuits are millions to billions of times more capable than the arly machines, and occupy a fraction of the space. The first use of the word "computer" was recorded in 1613, referring to a person who carried out calculations, or computations, and the word continued with the same meaning until the middle of the 20th century. From the end of the 19th century the word began to take on its more familiar meaning, a machine that carries out computations. Computer has various components such as CPU, RAM, Motherboard, Speakers, Keyboard and a Mouse. The present global age is the consequence of the computer age. A computer is an electronic device that stores and processes data, according o a list of instructions. It allows a user to manipulate data cery easily. The speed of performance of a computer is incomparable. The computer and internet have affected our way of learning, communicating , working storing information, communicating, playing and also writing . In fact, computers are used in every sphere of life today.

Emails :
Electronic mail, also known as email or e-mail, is a method of exchanging digital messages from an author to one or more recipients. Modern email operates across the Internet or other computer networks. Some early email systems required that the author and the recipient both be online at the same time, in common with instant messaging. Today's email systems are based on a store-and-forward model. Email servers accept, forward, deliver and store messages. Neither the users nor their computers are required to be online simultaneously; they need connect only briefly, typically to an email server, for as long as it takes to send or receive messages. Advantages of emails

Emails are easy to use. You can organize your daily correspondence, send and receive electronic messages and save them on computers. Emails are fast. They are delivered at once around the world. No other form of written communication is as fast as an email. The language used in emails is simple and informal. When you reply to an email you can attach the original message so that when you answer therecipient knows what you are talking about. This is important if you get hundreds of emails a day.

It is possible to send automated emails with a certain text. In such a way it is possible to tell the sender that you are on vacation. These emails are called auto responders. Emails do not use paper. They are environment friendly and save a lot of trees from being cut down. Emails can also have pictures in them. You can send birthday cards or newsletters as emails. Products can be advertised with emails. Companies can reach a lot of people and inform them in a short time.

Disadvantages of emails Emails may carry viruses. These are small programs that harm your computer system. They can read out your email address book and send themselves to a number of people around the world. Many people send unwanted emails to others. These are called spam mails. It takes a lot of time to filter out the unwanted emails from those that are really important. Emails cannot really be used for official business documents. They may be lost and you cannot signthem. Your mailbox may get flooded with emails after a certain time so you have to empty it from time to time.

Intranet :
An intranet is a computer network that uses Internet Protocol technology to share information, operational systems, or computing services within an organization. It refers only to the organization's internal website, but may be a more extensive part of the organization's information technology infrastructure, and may be composed of multiple local area networks. The objective is to organize each individual's desktop with minimal cost, time and effort to be more productive, cost efficient, timely, and competitive. An intranet may host multiple private websites and constitute an important component and focal point of internal communication and collaboration.

An intranet can be understood as a private analog of the Internet, or as a private extension of the Internet confined to an organization. The first intranet websites and home pages began to appear in organizations in 1996-1997. Although not officially noted, the term intranet first became common-place among early adopters, such as universities and technology corporations, in 1992. In many organizations, intranets are protected from unauthorized external access by means of a network gateway and firewall. Increasingly, intranets are being used to deliver tools and applications, e.g., collaboration (to facilitate working in groups and teleconferencing) or sophisticated corporate directories, sales and customer relationship management tools, project management etc., to advance productivity. Intranets are also being used as corporate culture-change platforms. For example, large numbers of employees discussing key issues in an intranet forum application could lead to new ideas in management, productivity, quality, and other corporate issues. Benefits of Intranet: Workforce Productivity Time Easy Communication Business Operations & Management Cost Effective Enhance Collaboration Promote Common Corporate Culture Helps in Planning.

Extranet
An extranet is a computer network that allows controlled access from the outside, for specific business or educational purposes. In abusiness-to-business context, an extranet can be viewed as an extension of an organization's intranet that is extended to users outside the organization, usually partners, vendors, and suppliers, in isolation from all other Internet users. In contrast, business-to-consumer(B2C) models involve known servers of one or more companies, communicating with previously unknown consumer users. An extranet is similar to a DMZ in that it provides access to needed services for channel partners, without granting access to an organization's entire network. An extranet can be understood as an intranet mapped onto the public Internet or some other transmission system not accessible to the general public, but managed by more than one company's administrator(s). For example, military networks of different security levels may map onto a common military radio transmission system that never connects to the Internet. Any private network mapped onto a public one is a virtual private network (VPN), often using special security protocols.

Advantages : Exchange large volumes of data using Electronic Data Interchange (EDI) Share product catalogs exclusively with trade partners. Collaborate with other companies on joint development efforts. Jointly develop and use training programs with other companies. Provide or access services provided by one company to a group of other companies, such as an online banking application managed by one company on behalf of affiliated banks.

Disadvantages : Extranets can be expensive to implement and maintain within an organization (e.g., hardware, software, employee training costs), if hosted internally rather than by an application service provider. Security of extranets can be a concern when hosting valuable or proprietary information.

Scanner :
In computing, an image scanneroften abbreviated to just scanneris a device that optically scans images, printed text, handwriting, or an object, and converts it to a digital image. Common examples found in offices are variations of the desktop (or flatbed) scannerwhere the document is placed on a glass window for scanning. Hand-held scanners, where the device is moved by hand, have evolved from text scanning "wands" to 3D scanners used for industrial design, reverse engineering, test and measurement, orthotics, gaming and other applications. Mechanically driven scanners that move the document are typically used for large-format documents, where a flatbed design would be impractical.

Modern scanners typically use a charge-coupled device (CCD) or a Contact Image Sensor(CIS) as the image sensor Scanners typically read red-green-blue color (RGB) data from the array. This data is then processed with some proprietary algorithm to correct for different exposure conditions, and sent to the computer via the device's input/output interface (usually USB, previous to which was SCSI or bidirectional parallel port in older units). Color depth varies depending on the scanning array characteristics, but is usually at least 24 bits. High quality models have 36-48 bits of color depth.

Fax :

Fax (short for facsimile), sometimes called telecopying, is the telephonic transmission of scanned printed material (both text and images), normally to a telephone number connected to a printer or other output device. The original document is scanned with a fax machine (or a telecopier), which processes the contents (text or images) as a single fixed graphic image, converting it into a bitmap, and then transmitting it through the telephone system. The receiving fax machine reconverts the coded image, printing a paper copy. Although businesses usually maintain some kind of fax capability, the technology has faced increasing competition from Internet-based alternatives. Fax machines still retain some advantages, particularly in the transmission of sensitive material which, if sent over the Internet unencrypted, may be vulnerable to interception, without the need for telephone tapping. In some countries, because electronic signatures on contracts are not recognized by law while faxed contracts with copies of signatures are, fax machines enjoy continuing support in business. In many corporate environments, standalone fax machines have been replaced by fax servers and other computerized systems capable of receiving and storing incoming faxes electronically, and then routing them to users on paper or via an email (which may be secured). Such systems have the advantage of reducing costs by eliminating unnecessary printouts and reducing the number of inbound analog phone lines needed by an office.

Mobile :
A mobile phone (also known as a cellular phone, cell phone and a hand phone) is a device that can make and receive telephone calls over a radio link whilst moving around a wide geographic area. It does so by connecting to a cellular network provided by a mobile phone operator, allowing access to the public telephone network. mobile phones also support a wide variety of other servicessuch as text messaging, MMS, email, Internet access, short-range wireless communications (infrared, Bluetooth), business applications, gaming and photography. Mobile phones that offer these and more general computing capabilities are referred to as smartphones. All mobile phones have a number of features in common, but manufacturers also try to differentiate their own products by implementing additional functions to make them more attractive to consumers. This has led to great innovation in mobile phone development over the past 20 years. The United Nations reported that mobile phones have spread faster than any other technology and can improve the livelihood of the poorest people in developing countries by providing access to information in places where landlines or the Internet are not available, especially in the least developed countries. parts of the world, mobile phone sharing is common. It is prevalent in urban India, as families and groups of friends often share one or more mobiles among their members. There are obvious economic benefits, but often familial customs and traditional gender roles play a part.

RFID :

Radio-frequency identification (RFID) is the use of a wireless non-contact system that uses radiofrequency electromagnetic fields to transfer data from a tag attached to an object, for the purposes of automatic identification and tracking. Some tags require no battery and are powered by the electromagnetic fields used to read them. Others use a local power source and emit radio waves (electromagnetic radiation at radio frequencies). The tag contains electronically stored information which can be read from up to several meters (yards) away. RFID tags are used in many industries. An RFID tag attached to an automobile during production can be used to track its progress through the assembly line. Pharmaceuticals can be tracked through warehouses. Livestock and pets may have tags injected, allowing positive identification of the animal. Since RFID tags can be attached to clothing, possessions, or even implanted within people, the possibility of reading personally-linked information without consent has raised privacy concerns. The RFID tag can be affixed to an object and used to track and manage inventory, assets, people, etc. For example, it can be affixed to cars, computer equipment, books, mobile phones, etc. RFID offers advantages over manual systems or use of bar codes. The tag can be read if passed near a reader, even if it is covered by the object or not visible. The tag can be read inside a case, carton, box or other container, and unlike barcodes, RFID tags can be read hundreds at a time. Bar codes can only be read one at a time. RFID can be used in a variety of applications, such as: Access management Tracking of goods Tracking of persons and animals Toll collection and contactless payment Machine readable travel documents Tracking sports memorabilia to verify authenticity Airport baggage tracking logistics
[

Advantages RFID technology has a number of advantages. RFID tags are very simple to install/inject inside the body of animals, thus helping to keep a track on them. This is useful in animal husbandry and on poultry farms. The installed RFID tags give information the by managing updates of stocks, transportation and logistics of the about the age, vaccinations and health of the animals. product. product. It is better than bar codes as it cannot be easily replicated and therefore, it increases the security of Supply chain management forms the major part of retail business and RFID systems play a key role Barcode scanners have repeatedly failed in providing security to gems and jewelry in shops. But nowadays, RFID tags are placed inside jewelry items and an alarm is installed at the exit doors. The RFID tags can store data up to 2 KB whereas, the bar code has the ability to read just 10-12 digits.

Disadvantages Though it is very beneficial, it quite is expensive to install. Small and medium scale enterprises find it costly to use it in their firms and offices. It is difficult for an RFID reader to read the information in case of RFID tags installed in liquids and metal products. The problem is that the liquid and metal surfaces tend to reflect the radio waves, which makes the tags unreadable. The tags have to be placed in various alignments and angles for taking proper reading. This is a tedious task when the work involves big firms. Interference has been observed if devices such as forklifts and walkies-talkies are in the vicinity of the distribution centers. The presence of mobile phone towers has been found to interfere with RFID radio waves. Wal-Mart, the retail sector giant, has installed billions of RFID tags in their products throughout the world and they have encountered such problems. The USA and Europe, for instance, have different range of frequencies that allow RFID tags to function. This makes it mandatory for international shipping companies and other organizations to be aware of the working pattern of other nations also, which can be very time-consuming. It has been referred to as invasive technology. Consumers are apprehensive about their privacy when they purchase products with RFID tags. Once the radio chips are installed in the product, the customer can be tracked and his personal information can be collected by the RFID reader. However, many stores have a facility that deactivates the RFID tags after the product has been purchased.

FTP :
File Transfer Protocol (FTP) is a standard network protocol used to transfer files from one host or to another host over a TCP-based network, such as the Internet. FTP is built on a client-server architecture and uses separate control and data connections between the [1] client and the server. FTP users may authenticate themselves using aclear-text sign-in protocol, normally in the form of a username and password, but can connect anonymously if the server is configured to allow it. For secure transmission that hides (encrypts) the username and password, and encrypts the content, FTP is oftensecured with SSL/TLS ("FTPS"). SSH File Transfer Protocol ("SFTP") is sometimes also used instead. The first FTP client applications were command-line applications developed before operating systems had graphical user interfaces, and are still shipped with most Windows,Unix, and Linux operating [2][3] systems . Dozens of FTP clients and automation utilities have since been developed for desktops, servers, mobile devices, and hardware, and FTP has been incorporated into hundreds of productivity applications, such as web page editors.

Advantages: 1.FTP is the fast and efficient way of tranferring bulks of data across the internet. 2. It has an automatic backup .Whenever you edit your files in your local system you can update the same by copying it to the host system in your site. So in cases where your site has crashed and all the data is lost you have a copy of it in your own local system. It also works the other way round. 3. FTP gives you control over transfer. That is, you can choose the mode in which the data is

transferred over the network. The data can be transferred either in the ASCII mode (for text files) or in the Binary mode(for executables or compressed files). 4. You can work with the directories on the remote systems, delete or rename the remote files while transferring data between two hosts. 5. While using FTP, tools like macros can also be used to make your work more efficient and easier.
Disadvantages: 1.FTP was not designed to be a secure protocol. 2. User name protection 3. Encryption of data is not done in FTP.

Live Streaming :
Streaming media is multimedia that is constantly received by and presented to an end-user while being delivered by a provider. Its verb form, "to stream", refers to the process of delivering media in this manner; the term refers to the delivery method of the medium rather than the medium itself. A client media player can begin playing the data (such as a movie) before the entire file has been transmitted. Distinguishing delivery method from the media distributed applies specifically to telecommunications networks, as most other delivery systems are either inherently streaming (e.g., radio, television) or inherently nonstreaming (e.g., books, video cassettes, audio CDs). For example, in the 1930s, muzak was among the earliest popularly available streaming media; nowadays Internet television is a common form of streamed media. The term "streaming media" can apply to media other than video and audio such as live closed captioning, stock ticker, and real-time text, which are all considered "streaming text". Live streaming, delivering live over the Internet, involves a camera for the media, an encoder to digitize the content, a media publisher, and a content delivery network to distribute and deliver the content.

ERP :
Enterprise resource planning (ERP) systems integrate internal and external management information across an entire organization, embracing finance/accounting, manufacturing, sales and service, customer relationship management, etc. ERP systems automate this activity with an integrated software application. The purpose of ERP is to facilitate the flow of information between all business functions inside the boundaries of the organization and manage the connections to outside stakeholders. ERP systems can run on a variety of computer hardware and network configurations, typically employing a database as a repository for information. ERP (Enterprise Resource Planning) systems typically include the following characteristics:

An integrated system that operates in real time (or next to real time), without relying on periodic updates. A common database, which supports all applications. A consistent look and feel throughout each module. Installation of the system without elaborate application/data integration by the Information Technology (IT) department

CRM :
Customer relationship management (CRM) is a widely implemented model for managing a companys interactions with customers, clients, and sales prospects. It involves using technology to organize, automate, and synchronize business processesprincipallysales activities, but also those for marketing, customer service, and technical support. The overall goals are to find, attract, and win new clients, nurture and retain those the company already has, entice former clients to return, and reduce the costs of marketing and client service. Customer relationship management describes a company-wide business strategy including customer-interface departments as well as other departments. Measuring and valuing customer relationships is critical to implementing this strategy.

Benefits of Customer Relationship Management


A Customer Relationship Management system may be chosen because it is thought to provide the following advantages: Quality and efficiency Decrease in overall costs Increase Profitability

Paperless Offices :
A paperless office is a work environment in which the use of paper is eliminated or greatly reduced. This is done by converting documents and other papers into digital form. Proponents claim that "going paperless" can save money, boost productivity, save space, make documentation and information sharing easier, keep personal information more secure, and help the environment. The concept can also be extended to communications outside the office. The need for paper is eliminated by using online systems, such as replacing index cards and rolodexes with databases, typed letters and faxes with email, and reference books with the internet. Another way to eliminate paper is to automate paper-based processes that rely on forms, applications and surveys to capture and share data. This method is referred to as "Enterprise Forms Automation" and is typically accomplished by using existing print-perfect documents in electronic format to allow for pre-

filling of existing data, capturing data manually entered online by end-users, providing secure methods to submit form data to processing systems, and digitally signing the electronic documents without printing. Another key aspect of the paperless office philosophy is the conversion of paper documents, photos, engineering plans, microfiche and all the other paper based systems to digital documents. Technologies that may be used for this include scanners, digital mail solutions, book copiers, wide format scanners (for engineering drawings), microfiche scanners, fax to PDF conversion, online post offices,multifunction printers and document management systems.

Das könnte Ihnen auch gefallen