Sie sind auf Seite 1von 58

IT Training Module

The Types of Technology

 Mechanical.
 Electronic.
 Industrial and manufacturing.
 Medical.
 Communications.
INFORMATION TECHNOLOGY

 Information technology (IT) is the use of computers to store, retrieve,


transmit, and manipulate data, or information, often in the context of a
business or other enterprise. IT is considered to be a subset of information
and communications technology (ICT). An information technology system (IT
system) is generally an information system, a communications system or,
more specifically speaking, a computer system – including all hardware,
software and peripheral equipment – operated by a limited group of users.
 What is information technology simple definition?
Definition of information technology: the technology involving the
development, maintenance, and use of computer systems, software, and
networks for the processing and distribution of data.
What is the importance of IT?

 The Importance of Information Technology in Business. Using information


technology, businesses can view changes in the global markets far faster than
they usually do. They purchase software packages and hardware that helps
them get their job done.
 Information technology (IT) is a term that encompasses all forms
of technology used to create, store, exchange, and use information in its
various forms (business data, voice conversations, still images, motion
pictures, photos, multimedia presentations, and other forms, including those
not yet conceived).
What are examples of information
technology?

 Examples of Information Technology. Telephone and radio equipment and


switches used for voice communications. Traditional computer applications
that include data storage and programs to input, process, and output the
data.
 Several products or services within an economy are associated with
information technology, including computer hardware, software, electronics,
semiconductors, internet, telecom equipment, and e-commerce
What is the work of an information
technology?

 Regardless of the sector they work in, IT specialists usually provide similar
services related to software, hardware, databases, Web resources, networks
and enterprise systems. Duties of an information technology specialist can
include network management, software development and database
administration.
IT INFRASTRUCTURE:

 The term infrastructure in an information technology (IT) context refers to


an enterprise's entire collection of hardware, software, networks, data
centers, facilities and related equipment used to develop, test, operate,
monitor, manage and/or support information technology services.
TYPES OF IT PRODUCTS:

 1.SOFTWARE
 2.HARDWARE (INFRASTRUCTURE)
 3.NETWORKS
 4.DATA CENTERS
 5.FACILITIES AND RELATED EQUIPMENTS
1.WHAT IS SOFTWARE?

 Software is built prior to client requests and same software is used for
multiple clients. A product-based company builds a software and sells it to a
wide variety of customers. So, the software is practically built before a
customer approaches the company. When, a software product is built once it
is sold to thousands of customers in the same form i.e. a software is built in
prior to the clients request and the same software is used for multiple clients.
SOFTWARE COMPANIES:

 Software product companies Business model is different from that of software


services companies. The Product based Software companies focus on their Core
Product unlike Service based software firms. Product Companies focus on a single
technology and they spend years to develop new technologies. People in SPCs
work in more collaborative mode. In other words, Product companies believe
people are one of their major assets.
 Product and Service companies vary in different parameters such as the work
culture, communication, hierarchy, measuring individual performance, targets,
responsibilities and interview process. Global software product companies like
Microsoft, Google, Oracle, SAP, Salesforce have their development
centers/research centers in India.
 Some of the Top Software Product Companies (SPCs) in India - Adobe, Amazon,
Amdocs, BMC Software, Cisco Systems, Dell EMC, Google, Hewlett-Packard (HP),
IBM, Intel, Microsoft Corporation, Oracle, Paypal, Pegasystems, Red Hat Software,
Salesforce, SAP SE, Symantec Software company, VMware Inc
 Product based Companies work for years keeping one technology/product in mind.
The software product companies (SPCs) focus on depth of the technology i.e. it
requires abundant knowledge technology, hence one can become master of single
technology. SPCs, requires domain expertise rather than just technical skill set in
the longer run. The depth of domain and technical skills overrides all other
expertise requirements as it helps in sticking to a product or product line.
 Software development is often about a series of choices and tradeoffs. The end
results of a product are an outcome of a series of choices the development team
makes about how the product is implemented. Quality is critical since it is going
from Product based companies to an end-customer. It is required to maintain
expertise on the latest technical developments in a domain. Nonetheless, Product
based companies provide a challenging environment to the employees.
 Technologies focused by SPCs:
 Software Development Programming languages: Java, Dot Net, C, C++, PHP, Ruby
on Rails, Python, Scripting languages, iOS/Swift and Android development.
 Testing: Automation, Manual, etc
 Database technologies such as MySQL, PostgreSQL and Microsoft SQL
 Networking: CCNA, CCNP
 Packages: SAP (Mostly all modules), Peoplesoft, IBM WebSphere packages, Oracle
SOA, Team Center, Informatica
Software Types

 The term 'software' refers to the set of electronic program instructions or data a
computer processor reads in order to perform a task or operation. In contrast, the
term 'hardware' refers to the physical components that you can see and touch,
such as the computer hard drive, mouse, and keyboard.
 Software can be categorized according to what it is designed to accomplish. There
are two main types of software: systems software and application software.
 Application software (application software: office suites, word processors,
spreadsheets, etc.)
 System software (system software: operating systems, device drivers, desktop
environments, etc.)
 Computer programming tools (programming tools: assemblers, compilers, linkers,
etc.)
 The first two of these are classified for running software on computers (i.e.,
using the computers), while the last one is about developing the software in the
first place.
Applications Software

 Application software, or simply applications, are often called productivity


programs or end-user programs because they enable the user to complete
tasks, such as creating documents, spreadsheets, databases and publications,
doing online research, sending email, designing graphics, running businesses,
and even playing games! Application software is specific to the task it is
designed for and can be as simple as a calculator application or as complex as
a word processing application. When you begin creating a document, the
word processing software has already set the margins, font style and size, and
the line spacing for you. But you can change these settings, and you have
many more formatting options available. For example, the word processor
application makes it easy to add color, headings, and pictures or delete, copy,
move, and change the document's appearance to suit your needs.
Functions of Application Software AND
Examples of Application Software

 Application software programs are created to facilitate a variety of functions,


including but not limited to:
 managing information, manipulating data, constructing visuals, coordinating
resources, calculating figures

 The most common application software programs are used by millions every
day and include:
 Microsoft suite of products (Office, Excel, Word, PowerPoint, Outlook, etc.)
 Internet browsers like Firefox, Safari, and Chrome
 mobile pieces of software such as Pandora (for music appreciation), Skype
(for real-time online communication), and Slack (for team collaboration)
Business Application Software

 Business application software is a subset of the application software. These


programs are built to facilitate certain business functions, improving the
accuracy, efficiency, and effectiveness of operations. Business application
software programs achieve measurable objectives such as saving work time
and enhancing productivity.
Examples of business applications that are
commonly used by organizations:
 Business Intelligence
 Business intelligence comprises the strategies and technologies used by enterprises for the data analysis of business
information. BI technologies provide historical, current and predictive views of business operations. BI is a technology-driven
process for analyzing data and presenting actionable information to help executives, managers and other corporate end users
make informed business decisions.

 Enterprise Resource Planning


 Enterprise resource planning (ERP) is a type of business software used by companies – usually via a bundle of integrated
applications – to solicit, review, store, manipulate, and analyze data derived from a variety of business operations.

 Customer Relationship Management


 Customer relationship management (CRM) is a type of business software used by companies – usually via a bundle of integrated
applications – to solicit, review, store, and analyze customer data, and also to manage customer interaction and facilitate the
sales process and relevant partner relationships.

 Project Management Software


 Project management (PM) software is a type of business software designed to plan and execute projects, and to manage the
resources associated with those projects. PM software assists users with functions such as scheduling, assigning tasks, manag ing
budgets and costs, documenting progress, and reporting results.
 Business Process Management Software- Business process management (BPM) software is a
type of business software designed to facilitate the rapid development and automation of
strategic processes. It often uses web-based modeling, rule creation, and a simple interface
to enable the user to perform business functions more quickly. Usually optimized for mobile
devices and offering total visibility into operations, BPM software is helpful in managing and
analyzing complex data, content, and processes across the enterprise.
 Database-A database is an electronic arsenal of data that a user builds in order to later
access, review, and update particular pieces of information in a rapid and coherent manner.
 Resource Management Software -Resource management is a type of business software that
facilitates the management of multiple projects and resources and ensures that everything is
allocated effectively in real time.
 Productivity Software- Productivity software is a type of business software that helps users do
their jobs more efficiently and complete work-related tasks in a timely manner. Categories of
productivity software include: document creation, database management, Accounting,
Collaboration, Applications that an organization uses for overall productivity are sometimes
referred to together as a software or application stack.
 Time Management Software - Time management software is a type of business software that
tracks how an individual’s digital systems are used, including how long the user spends
working in certain applications.
 Educational Software- Educational software is a type of software that facilitates the teaching
and learning of new content, concepts, or processes.
What is the difference between an app and
an application?

 An app is a piece of software designed for a single purpose or a single


function. An application, however, is a piece of software that performs a
variety of related functions. Typically, if an app breaks, life goes on, while
applications are considered critical to normal business function and are
therefore considered to be of higher value.
 Additionally, apps are typically associated with mobile personal-use, whereas
applications are associated with use on all devices and typically serve
personal and business needs.

App Application
single purpose Performs a variety of related functions
Not critical for business function Critical for business function
Mobile First Can be used with full features across many device types
Typically associated to with personal use only Typically associated with personal and business use
What is the difference between on premise
and hosted (on cloud) application software?

 On premise application software is implemented at an organization’s physical


location, leveraging the hardware, IT infrastructure, and support of that
organization. The company’s IT department typically maintains and solves
problems related to the software.
 Hosted application software (on cloud), also called software-as-a-service
(SaaS), is software that is owned, delivered, and managed remotely via the
cloud by a provider separate from the purchasing organization. Many
organizations license these programs at the same time, and organizations
typically pay per user or via a subscription. One advantage of on-premise
software is that it can be customized to the individual company’s needs more
easily. However, hosted application software programs generally allow users
to scale up more quickly.
How does cloud application work?

 Information and data are stored on physical or virtual servers, which are
maintained and controlled by a cloud computing provider, such as Amazon
and their AWS product. As a personal or business cloud computing user, you
access your stored information on the 'cloud', via an Internet connection.

On Premise Hosted (On Cloud)


Managed at organizations physical location Delivered Remotely
Pay for license Pay per user via subscription
More customizable Scales more quickly
What is the difference between application
software and an application platform?

 Application software is an end-user program typically divided into two


classes; applications software and systems software. Systems software
provides an operating system and utilities that enable applications software
such as database programs, spreadsheets, web browsers, and more to run.
 An application platform provides services to an application and is comprised
of the set of tools an application relies on to run. Virtually every application
relies on other software to run, from database management software to the
cloud. This group of software together is what we call an application
platform. An application platform should support an application in every
style, from single-user applications on a device to thousand-user applications
in the cloud. Application platforms typically include the following services: an
operating system, execution services (such as libraries for running software),
data services, cloud services and development tools.
System Software

 System software is a computer program that runs a computer's hardware as well as


application programs and interfaces between actual hardware and applications. An
example of systems software is an operating system, which manages all other
programs on a computer.
 Systems software includes the programs that are dedicated to managing the
computer itself, such as the operating system, file management utilities, and disk
operating system (or DOS). The operating system manages the computer hardware
resources in addition to applications and data. Without systems software installed
in our computers we would have to type the instructions for everything we wanted
the computer to do!
 System software is software designed to provide a platform to other software.
Examples of system software include operating systems like macOS, Ubuntu and
Microsoft Windows, computational science software, game engines, industrial
automation, and software as a service application.
 System software includes:
 Operating systems - An operating system is system software that manages computer hardware and
software resources and provides common services for computer programs
 There are a few common operating systems available:
 Mac OS X, Linux, Windows, Android (based on Linux), iOS.
 Device drivers - In computing, a device driver is a computer program that operates or controls a
device that is attached to a computer
 Middleware - Middleware is computer software that provides services to software applications
beyond those available from the operating system. It can be described as "software glue".
Middleware is software which is in the middle of an operating system and the applications working
on it. It permits communication and data management for distributed applications by operating as a
hidden translation layer. The term is considered vague since it is used to link two separate
applications together.
 Utility software - Utility software is system software designed to help to analyze, configure,
optimize or maintain a computer. It is used to support the computer infrastructure - in contrast to
application software, which is aimed at directly performing tasks that benefit ordinary users. E.g.
Antivirus
 Shells and windowing systems -
 In computing, a shell is a user interface for access to an operating system's services. In general,
operating system shells use either a command-line interface (CLI) or graphical user interface (GUI),
depending on a computer's role and operation.
 In computing, a windowing system (or window system) is software that manages separately
different parts of display screens. It is a type of graphical user interface (GUI) which implements the
WIMP (windows, icons, menus, pointer) paradigm for a user interface. ... Usually
a window decoration is drawn around each window.
HARDWARE – (INFRASTRUCTURE)
1. NETWORKING –
 A Network is defined as a group of two or more computer systems linked together. Network
Technology is the technology that helps us networking with other people via a network of
computer and connected electric devices. Communication devices: From Cable to
Wireless technology, all are discussed in network technology such as router, modem, adapter, etc.
 LAN - A local-area network (LAN) is a computer network that spans a relatively small area. Most
often, a LAN is confined to a single room, building or group of buildings, however, one LAN can be
connected to other LANs over any distance via telephone lines and radio waves.
 WAN - A wide-area network is any telecommunications network or computer network that extends
over a large geographical distance/place. Wide-area networks are often established with leased
telecommunication circuits
 A LAN (local area network) is a group of computers and network devices connected, usually within
the same building. A WAN connects several LANs and may be limited to an enterprise (a corporation
or an organization) or accessible to the public.
 Personal Area Network (PAN), Local Area Network (LAN), Wireless Local Area Network (WLAN),
Campus Area Network (CAN), Metropolitan Area Network (MAN), Wide Area Network (WAN), Storage-
Area Network (SAN), System-Area Network (also known as SAN)
2. INTERNET

 The Internet (contraction of interconnected network) is the global system of


interconnected computer networks that use the Internet protocol suite
(TCP/IP) to link devices worldwide. It is a network of networks that consists
of private, public, academic, business, and government networks of local to
global scope, linked by a broad array of electronic, wireless, and optical
networking technologies.
 The Internet carries a vast range of information resources and services, such
as the inter-linked hypertext documents and applications of the World Wide
Web (WWW), electronic mail, telephony, and file sharing. A means of
connecting a computer to any other computer anywhere in the world via
dedicated routers and servers. When two computers are connected over the
Internet, they can send and receive all kinds of information such as text,
graphics, voice, video, and computer programs.
STORAGE SYSTEM
 Storage is the process of storing and recalling information that was previously acquired.
 Storage occurs through three fundamental stages: encoding, storage, and retrieval. Storing
refers to the process of placing newly acquired information into memory, which is modified in
the brain for easier storage. Encoding this information makes the process of retrieval easier
for the brain where it can be recalled and brought into conscious thinking.
 A storage device is any computing hardware that is used for storing, porting and extracting
data files and objects. It can hold and store information both temporarily and permanently,
and can be internal or external to a computer, server or any similar computing device.
 Computer data storage, often called storage or memory, is a technology consisting of
computer components and recording media that are used to retain digital data. The central
processing unit (CPU) of a computer is what manipulates data by performing computations.
 A storage device is a piece of hardware that holds the storage medium, sends data to the
medium, and retrieves data from the medium. Floppy disk drives, hard drives, CD-ROM
and DVD-ROM drives, and tape drives are all examples of storage devices.
 Primary storage typically refers to random access memory (RAM), while
secondary storage refers to the computer's internal hard drive. RAM, commonly called
"memory," is considered primary storage, since it stores data that is directly accessible by
the computer's CPU.
 Types of data storage devices/mediums. ... These include cache memory,
dynamic RAM (DRAM) or main memory; magnetic tape and magnetic disk;
optical disc, such as CDs, DVDs and Blu-ray disks; flash memory and various
iterations of in-memorystorage; and cache memory.
 THE DIFFERENCE BETWEEN MEMORY AND STORAGE. People often confuse
the terms memory and storage, especially when describing the amount they
have of each. The term memory refers to the amount of RAM installed in
the computer, whereas the term storage refers to the capacity of the
computer's hard disk.
SERVER
 In computing, a server is a computer program or a device that provides
functionality for other programs or devices, called "clients". This architecture
is called the client–server model, and a single overall computation is
distributed across multiple processes or devices.
 A server is a computer that serves many kinds of information to user or client
machines. A server can also host internet games, share files, and give access
to peripheral equipment such as printers. In simple words, the individual
computers are connected to some powerful computers called servers.
 Servers are computers set aside specifically to store data or manage network
connections. Any type of computer can be converted into a server, although
most servers do not use a keyboard or monitor the way a typical desktop
would.
 Types of servers. Servers are often categorized in terms of their purpose. A
Webserver, for example, is a computer program that serves requested HTML
pages or files. The program that is requesting web content is called a client.
Each blade is a server, often dedicated to a single application.
 There are several different types of servers, including Web servers, mail
servers, and file servers. A web server serves Web pages to computers that
connect to it. It also can parse scripting languages such as PHP, ASP, and JSP. A
mail server stores users' e-mail accounts and sends and receives e-mail
messages. File server: a computer and storage device dedicated to storing
files. Print server: a computer that manages one or more printers, and a
network server is a computer that manages network traffic. Database server:
a computer system that processes database queries.
 In simplest form, a server is a connection point for several clients, that will
handle their requests. A client is software that (usually) connects to
the server to perform actions. The client provides a user interface that
allows users to carry out actions.
DATA CENTER

A data center consists of three major data components - compute, network, and
storage. There are other elements, of course, such as power, cooling, etc., but from the
actual data perspective these are the three main elements.
A Data Center keeps the primary information on site, or also known as “on premises.”
Applications are run on compute resources, while the data is kept in the storage arrays.
Sometimes, however, it makes sense to have data outside of the Data Center. It could
be for backup and recovery purposes, in case of disasters, or sometimes you want to be
able to have a temporary storage location:
What is the difference between data center
and cloud?

 A Data center can be defined as a facility which incorporates components


such as servers, communication media and data storage facilities. Along with
this it also contains various components which are essential to run a data
center like power supply, backup systems, redundant communication
connection, HVAC systems, security devices etc. It’s an on-premise hardware
solution where all the resources are locally present at access which is
typically run and maintained by in-house.
 On the other hand, a Cloud is a virtual infrastructure that is accessed or
delivered with a local network or accessing the remote location through
internet. The cloud services can be accessed on-demand whenever the user
requires on a pay per use basis or a dedicated resource, this model is known
as Infrastructure as a Service (IaaS). Within this environment, the user can
access computing resources, networking services and storage which the users
can access on-demand without any requirement of physical infrastructure. It
is an Off-premise form of computing which can be accessed from the
internet, it’s maintenance and updates is maintained and controlled by
the third-party.
 Sometimes, people and companies don’t even need to have their own data
centers. They just pay the Cloud companies to use their systems. Different
companies, such as Amazon Web Services, Microsoft’s Azure, Google, and
others, have created different levels of compute, networking, and storage
that you can buy for a period of time at different prices.
VIRTUALIZATION

 In computing, virtualization refers to the act of creating a virtual (rather


than actual) version of something, including virtual computer hardware
platforms, storage devices, and computer network resources
 The main types include application, desktop, user, storage and hardware.
Application virtualization allows the user to access the application, not from
their workstation, but from a remotely located server. ... Users can basically
log into their “desktop” from different types of devices like smartphones and
tablets.
 Virtualization can increase IT agility, flexibility and scalability while creating
significant cost savings. Greater workload mobility, increased performance
and availability of resources, automated operations – they're all benefits of
virtualization that make IT simpler to manage and less costly to own and
operate.
BACKUP
 In information technology, a backup, or data backup, or the process of
backing up, refers to the copying into an archive file of computer data that is
already in secondary storage—so that it may be used to restore the original
after a data loss event.
 Computer hardware can fail, data can be corrupted, computers can be lost,
stolen, or destroyed. You may be able to reinstall operating systems and
applications, but your original data could be lost forever. Data backup
software can help you protect and restore your data when something goes
wrong.
 The Four Methods of Server Backup
 Full Backups. A full backup stores a copy of all files and typically occurs
automatically according to a pre-set schedule. ...
 Incremental Backups. Incremental backups save space by backing up only the files
that have been created or changed since the last backup. ...
 Differential Backups. ...
 Virtual Full Backups.

 Database backup is the process of backing up the operational state, architecture


and stored data of database software. It enables the creation of a duplicate
instance or copy of a database in case the primary database crashes, is corrupted
or is lost.
 Disaster Recovery vs. Data Backup. Data backup is the act of storing a copy of
files or data to a separate storage location so that in the event those files are lost
or damaged, they can be restored. Disaster recovery is the act of restoring those
files and data.
8.INFORMATION SECURITY
 Information security, sometimes shortened to InfoSec, is the practice of preventing
unauthorized access, use, disclosure, disruption, modification, inspection, recording or
destruction of information. The information or data may take any form, e.g. electronic or
physical.
 Information security's primary focus is the balanced protection of the confidentiality,
integrity and availability of data while maintaining a focus on efficient policy
implementation, all without hampering organization productivity. This is largely achieved
through a multi-step risk management process that identifies assets, threat sources,
vulnerabilities, potential impacts, and possible controls, followed by assessment of the
effectiveness of the risk management plan.

Information security related security categories


 Internet security
 Cyberwarfare
 Computer security
 Mobile security
 Network security
Internet Security

 Internet security is a branch of computer security specifically related to not


only the Internet, often involving browser security and the World Wide Web,
but also network security as it applies to other applications or operating
systems as a whole. Its objective is to establish rules and measures to use
against attacks over the Internet. The Internet represents an insecure
channel for exchanging information, which leads to a high risk of intrusion or
fraud, such as phishing, online viruses, trojans, worms and more.
 Many methods are used to protect the transfer of data,
including encryption and from-the-ground-up engineering. The current focus
is on prevention as much as on real time protection against well known and
new threats.
 Products – Antivirus, Password Managers, Security Suites contain a suite of
Firewalls, Anti-virus, Anti-Spyware, Theft Protection, Portable Storage device
safety check, private internet browsing, cloud anti-spam, etc
Cyberwarfare
 Cyberwarfare is the use or targeting in a battlespace or warfare context of
computers, online control systems and networks. It involves both offensive
and defensive operations pertaining to the threat of cyberattacks, espionage
and sabotage. There has been controversy over whether such operations can
be called "war". Nevertheless, powers have been developing cyber capabilities
and engaged in cyberwarfare, both offensively and defensively, including the
United States, China, Russia, Israel and the United Kingdom. Two other
notable players are Iran and North Korea.
 Cyber warfare can present a multitude of threats towards a nation. At the
most basic level, cyber attacks can be used to support traditional warfare.
For example, tampering with the operation of air defences via cyber means in
order to facilitate an air attack. [16] Aside from these "hard" threats, cyber
warfare can also contribute towards "soft" threats such as espionage and
propaganda.
Computer Security
 Computer security, cybersecurity or information technology security (IT
security) is the protection of computer systems from theft or damage to their
hardware, software or electronic data, as well as from disruption or
misdirection of the services they provide.

 The field is growing in importance due to increasing reliance on computer


systems, the Internet and wireless networks such as Bluetooth and Wi-Fi, and
due to the growth of "smart" devices, including smartphones, televisions and
the various tiny devices that constitute the Internet of things. Due to its
complexity, both in terms of politics and technology, it is also one of the
major challenges of the contemporary world.
Mobile Security
 Mobile security, or more specifically mobile device security, has become
increasingly important in mobile computing. Of particular concern is the
security of personal and business information now stored on smartphones.
 All smartphones, as computers, are preferred targets of attacks. These
attacks exploit weaknesses inherent in smartphones that can come from the
communication mode—like Short Message Service (SMS, aka text messaging),
Multimedia Messaging Service (MMS), WiFi, Bluetooth and GSM, the de facto
global standard for mobile communications. There are also exploits that
target software vulnerabilities in the browser or operating system. And some
malicious software relies on the weak knowledge of an average user.
Network Security
 Network security consists of the policies and practices adopted to prevent and
monitor unauthorized access, misuse, modification, or denial of a computer
network and network-accessible resources. Network security involves the
authorization of access to data in a network, which is controlled by the
network administrator. Users choose or are assigned an ID and password or
other authenticating information that allows them access to information and
programs within their authority.
 Network security covers a variety of computer networks, both public and
private, that are used in everyday jobs; conducting transactions and
communications among businesses, government agencies and individuals.
Networks can be private, such as within a company, and others which might
be open to public access. Network security is involved in organizations,
enterprises, and other types of institutions. It does as its title explains: It
secures the network, as well as protecting and overseeing operations being
done. The most common and simple way of protecting a network resource is
by assigning it a unique name and a corresponding password.
AI – Artificial Intelligence
 In computer science, artificial intelligence, sometimes called machine intelligence, is
intelligence demonstrated by machines, in contrast to the natural intelligence displayed by
humans and other animals.
 Definition - What does Artificial Intelligence (AI) Artificial intelligence (AI) is an area of
computer science that emphasizes the creation of intelligent machines that work and react
like humans. Some of the activities computers with artificial intelligence are designed for
include: Speech recognition, problem-solving, learning and planning.
 Machine learning, or ML, is an application of AI that provides computer systems with the
ability to automatically learn and improve from experience without being explicitly
programmed. ML focuses on the development of algorithms that can analyze data and make
predictions.
 Different Types of Artificial Intelligence...
 Reactive Machines AI. ...
 Limited Memory AI. ...
 Theory of Mind AI. ...
 Self-aware AI. ...
 Artificial Narrow Intelligence (ANI) ...
 Artificial General Intelligence (AGI) ...
 Artificial Superhuman Intelligence (ASI)
 10 Careers AI Will Replace
 1) Telemarketers. Likelihood: 99% ...
 2) Bookkeeping clerks. Likelihood: 98% ...
 3) Compensation and Benefits Managers. Likelihood: 96% ...
 4) Receptionists. Likelihood: 96% ...
 5) Couriers. Likelihood: 94% ...
 6) Proofreaders. ...
 7) Computer Support Specialists. ...
 8) Market Research Analysts.
 9) Advertising Salespeople
 10) Retail Salespeople
 10 That Are Safe Most Likely to Be Safe (For Now)
 1) Human Resources Managers
 2) Sales Managers
 3) Marketing Managers
 3) Marketing Managers
 5) Chief Executives
 6) Event Planners
 7) Writers
 8) Software Developers
 9) Editors
 10) Graphic Designers
IOT – Internet of Things

 The Internet of things is the extension of Internet connectivity into physical


devices and everyday objects. Embedded with electronics, Internet
connectivity, and other forms of hardware, these devices can communicate
and interact with others over the Internet, and they can be remotely
monitored and controlled.
 Consumer connected devices include smart TVs, smart speakers, toys,
wearables and smart appliances. Smart meters, commercial security systems
and smart city technologies -- such as those used to monitor traffic and
weather conditions -- are examples of industrial and enterprise IoT devices.
 How the Internet of Things Works. ... The Internet of Things (IoT), also
sometimes referred to as the Internet of Everything (IoE), consists of all the
web-enabled devices that collect, send and act on data they acquire from
their surrounding environments using embedded sensors, processors and
communication hardware.
 Top 10 IoT Platforms To Watch For In 2018
 Microsoft Azure IoT. Developed by Microsoft to deliver a scalable and
upgraded platform for IoT, Microsoft Azure is one of the topmost IoT
platforms. ...
 Amazon Web Services or AWS. ...
 Google Cloud Platform. ...
 ThingWorx. ...
 Cisco IoT Cloud Connect. ...
 HP's Universal of Things. ...
 SAP Cloud Platform. ...
 Oracle Internet of Things.
Advantages of IoT:

 1. Data: The more the information, the easier it is to make the right decision.
Knowing what to get from the grocery while you are out, without having to
check on your own, not only saves time but is convenient as well.
 2. Tracking: The computers keep a track both on the quality and the viability
of things at home. Knowing the expiration date of products before one
consumes them improves safety and quality of life. Also, you will never run
out of anything when you need it at the last moment.
 3. Time: The amount of time saved in monitoring and the number of trips
done otherwise would be tremendous.
 4. Money: The financial aspect is the best advantage. This technology could
replace humans who are in charge of monitoring and maintaining supplies.
Disadvantages of IoT:

 1. Compatibility: As of now, there is no standard for tagging and monitoring with


sensors. A uniform concept like the USB or Bluetooth is required which should not
be that difficult to do.
 2. Complexity: There are several opportunities for failure with complex systems.
For example, both you and your spouse may receive messages that the milk is over
and both of you may end up buying the same. That leaves you with double the
quantity required. Or there is a software bug causing the printer to order ink
multiple times when it requires a single cartridge.
 3. Privacy/Security: Privacy is a big issue with IoT. All the data must be encrypted
so that data about your financial status or how much milk you consume isn’t
common knowledge at the work place or with your friends.
 4. Safety: There is a chance that the software can be hacked and your personal
information misused. The possibilities are endless. Your prescription being changed
or your account details being hacked could put you at risk. Hence, all the safety
risks become the consumer’s responsibility.
Analytics

 Analytics is the discovery, interpretation, and communication of meaningful


patterns in data; and the process of applying those patterns towards effective
decision making. In other words, analytics can be understood as the
connective tissue between data and effective decision making, within an
organization.
 Especially valuable in areas rich with recorded information, analytics relies on
the simultaneous application of statistics, computer programming and
operations research to quantify performance. Organizations may apply
analytics to business data to describe, predict, and improve business
performance.
Data Analytics
 Data analysis is a process of inspecting, cleansing, transforming, and modeling data with the
goal of discovering useful information, informing conclusions, and supporting decision-
making.
 Data analytics (DA) is the process of examining data sets in order to draw conclusions about
the information they contain, increasingly with the aid of specialized systems and software.
Data analytics technologies and techniques are widely used in commercial industries to
enable organizations to make more-informed business decisions and by scientists and
researchers to verify or disprove scientific models, theories and hypotheses.
 As a term, data analytics predominantly refers to an assortment of applications, from
basic business intelligence (BI), reporting and online analytical processing (OLAP) to various
forms of advanced analytics. In that sense, it's similar in nature to business analytics, another
umbrella term for approaches to analyzing data -- with the difference that the latter is
oriented to business uses, while data analytics has a broader focus. The expansive view of the
term isn't universal, though: In some cases, people use data analytics specifically to mean
advanced analytics, treating BI as a separate category.
 Data analytics initiatives can help businesses increase revenues, improve operational
efficiency, optimize marketing campaigns and customer service efforts, respond more quickly
to emerging market trends and gain a competitive edge over rivals -- all with the ultimate
goal of boosting business performance. Depending on the particular application, the data
that's analyzed can consist of either historical records or new information that has been
processed for real-time analytics uses. In addition, it can come from a mix of internal systems
and external data sources.
Big Data

 Big data is a field that treats ways to analyze, systematically extract


information from, or otherwise deal with data sets that are too large or
complex to be dealt with by traditional data-processing application software.
 Big data is a term that describes the large volume of data – both structured
and unstructured – that inundates a business on a day-to-day basis. But it's not
the amount of data that's important. It's what organizations do with
the data that matters.
 An example of big data might be petabytes (1,024 terabytes) or exabytes
(1,024 petabytes) of data consisting of billions to trillions of records of
millions of people—all from different sources (e.g. Web, sales, customer
contact center, social media, mobile data and so on).
Unified Communication
What is the difference between an IT
product and IT service company?

 There is a difference between product based and service based company. Product
based companies are those which create their own product and sell it in the
market. Like Google, Oracle, Microsoft.
 On the other hand , Service based companies only work on the products and
provide service to clients. Like Infosys, Wipro , Cognizant etc.
 Let me first say briefly what these two terms mean. If you want a simpler view,
imagine the first type (service based) as a restaurant where you go, order and
then the food is prepared and served to you. Imagine the second type (product
based) as an ice cream parlor, where you go and pick a flavor of ice cream
which they already have made.
 Service based software company is a company which builds software only when
a customer approaches it and asks to author software for his needs. The software
which it builds for a customer most probably will not be shared with another
customer. But, a product based company builds a software and sells it to a wide
variety of customers (with or without customizations). So, the software is
practically built before a customer approaches the company.
 Facebook, Google, Quora, Instagram, Whatsapp, Candy Crush Saga, Flipkart,
Amazon, Swiggy, OLA App, Teamviewer, VLC Media player, Avast Antivirus & etc..
are IT products. Those can be used by anyone & those are not designed for specific
people. It’s globalized.
 Services can be given by any companies to only for specific people, they may be a
company or business people. Those services can be given by the vendors like TCS,
Tech Mahindra, Zoho Corp, Infosys, Big A Solutions, Mind Tree & etc.
 Some Mid-level startup companies are providing both, Services as well as products.
To increase the fund to make a product, they’re doing the services and make
money.
 Products like Flipkart, Amazon, OLA, PayTM, Swiggy, Zomato are successfully
reached among the people. Also, many startup entrepreneurs have the interest to
build & brand their own IT products than giving IT services.

 Service is using people to do something. In this case, IT service is using IT


professionals to do something, it can be making IT strategy, building IT products,
corporate IT training, providing contract IT labor and so on.
 Product is one which people use. In this case, IT product can be attendance
system, payroll system, internal employee portal, CRM (customer relationship
management) product and so on.
FUNCTIONS

 SALES- DIRECT SALES, CHANNEL SALES, SOLUTION SALES


 PRESALES- FUNCTIONAL PRESALES, TECHNICAL PRESALES
 SOLUTION ARCHITECTS
*************************************************************************************
 IT CATERS TO ALL INDUSTRIES, AT ALL LEVELS

Das könnte Ihnen auch gefallen