Company LOGO COMPANY LOGO ICTACT has organized its 9th edition of ICTACT BRIDGE in Coimbatore Titled “Envisioning the Future Technology” with the theme “What’s next is here now”. This conference held on Wednesday the 26th June 2013 at Hotel Le Meridien Coimbatore. COMPANY LOGO 1 Session – 1 : Inaugural 2 Session – 2 : Impact of Technologies on Institution, Teachers & Students 3 Session – 3 : Game Changers in Industry impacting Higher Education COMPANY LOGO Impact of Technologies on Institution, Teachers & Students An important part of building an effective learning environment is to establish a structure for each day — a structure that results in the predictable use of time. With the entry of newer technologies reality has changed the way the industry works and also makes a impact on the institutions, the Teachers and students. The session focused and addressed on the greater understanding of recently emerged technologies and their impact on education and deep insights into thoughtful technology integration which will pave the foundation for future learning’s. Focus : •Technology Infrastructure – Bring Your Own Device (BYOD) •Technology in learning – A global perspective •Appropriate use of Social Media in education •Engaging learners and developing teachers through gaming •Impact of emerging Social, Cloud, Mobile and Analytics in Industry. COMPANY LOGO Impact of Technologies on Institution, Teachers & Students COMPANY LOGO Game Changers in Industry impacting Higher Education The higher education sector is in the midst of significant change. Multiple factors like new technological innovation, increasing cost, shrinking budgets, growth of online education, Massive Open Online Courses (MOOC), rise of competitors, sudden spurt of new educational business model have combined to alter the level playing ground of colleges and universities. This session shall have eminent industry experts discussing on how institutions will have an impact based on the game changers in the industry. Focus : • Technology Enablement of Institutions • Capitalizing the future tech enabled workforce • Changing landscape of learning with emerging technologies • MOOC • Virtual learning and Mobile Learning COMPANY LOGO COMPANY LOGO COMPANY LOGO Focus On • Innovations • Cloud Computing • Sensors Envisioning the future technologyWhat’s next is here now COMPANY LOGO Topics highlighted in the ICTACT Bridge conference: – Business Intelligence – Analytics (Business, Predictive ) – Enterprise Content Management, Knowledge Management – Big Data (Hadoop, Data-deduplication, Data Loss Protection (DLP), Data Scientist, Thin Provisioning) – Cloud Computing (Hybrid Cloud,Infrastructure-as-aService(IaaS),Software-as-a-Service(SaaS), Multitenancy) – Crowd Sourcing – Gamification – Massive Open Online Course(MOOC) COMPANY LOGO – – – – – – – – – – Mobile App Network Virtualization Visualization Open Source (Spring Framework) Micro Blogging Social Media Fraud Detection Biometrics Scalability Personal Digital Assistant (Bring Your Own Device (BYOD) Business Intelligence-BI • Business intelligence, or BI, is an umbrella term that refers to a variety of software applications used to analyze an organization’s raw data. BI as a discipline is made up of several related activities, including data mining, online analytical processing, querying and reporting. BI can handle large amounts of information to help identify and develop new opportunities. COMPANY LOGO Analytics COMPANY LOGO Analytics has emerged as a catch-all term for a variety of different Business Intelligence and application related initiatives COMPANY LOGO Analytics Business Analytics • Business analytics is comprised of solutions used to build analysis models and simulations to create scenarios, understand realities and predict future states. • Business analytics includes data mining, predictive analytics, applied analytics and statics and is delivered as an application suitable for a business user. Predictive Analytics Predictive analytics describes any approach to data mining with four attributes: Prediction Rapid analysis Business relevance Tools accessible to users Enterprise Content Management Enterprise content management(ECM) is used to create, store, distribute, discover, archive and manage unstructured content (scanned documents, email, reports, medical images etc) and analyze and deliver relevant content to users COMPANY LOGO Knowledge Management(KM) KM promotes a collaborative and integrative approach to the creation, capture, organization, access and use of information assets, including the tacit, un-captured knowledge of people. COMPANY LOGO Big Data Big data is a general term used to describe the voluminous amount of unstructured and semi-structured data a company createspetabytes and exabytes-billions and trillions of bytes COMPANY LOGO COMPANY LOGO Hadoop takes care of running one’s code across a cluster of machines. It chunks up the input data, sends it to each machine, runs the code on each chunk, checks and passes any results either for further processing or to the final output location. Data deduplication Data deduplication is a form of compression that eliminates redundant data on a subfile level, improving storage utilization. It can significantly reduce disk space, since only the unique data is stored. COMPANY LOGO Data Loss Protection (DLP) Data Loss Protection (DLP) describes a set of technologies and inspection techniques used to classify information content contained within an object-such as a file, email, packet, application or data store-while at rest(in storage), in use (during an operation) or in transit across a network) COMPANY LOGO Data Scientist A data scientist is an individual, organization or application that performs statistical analysis, data mining and retrieval processes on a large amount of data to identify trends, figures and other relevant information. A data scientist performs data analysis on data stored in data warehouses or data centers to solve a variety of business problems, optimize performance and gather business intelligence. COMPANY LOGO Thin Provisioning Thin provisioning allocates physical capacity from a virtualized pool of storage to logical volumes on a just-intime basis. This is a mechanism that applied to large-scale centralized computer disk storage systems, SANS and storage virtualization systems , thus allowing space to be easily allocated to servers, on a justenough and just-intime basis. COMPANY LOGO Cloud Computing Cloud computing is an approach to computing that uses a shared resource to deliver computing that is consumed as a service. COMPANY LOGO Hybrid Cloud Hybrid cloud is a composition of two or more clouds (private, community or public) that remain unique entities but are bound together, offering the benefits of multiple deployment models. Companies and individuals are able to obtain degrees of fault tolerance combined with locally immediate usability without dependency on internet connectivity. COMPANY LOGO IaaS, PaaS, SaaS 1. IaaS - Cloud Management, Storage, Virtualization, Content Delivery Networks, Networking, Computing 2. PaaS - Development & Testing, Integration, Database, Application Platform, General 3. SaaS - Business Management, Vertical Apps, Tools, Cloud Security, CRM COMPANY LOGO Multitenancy Multitenancy is a reference to the mode of operation of software where multiple independent instances of one or multiple application operate in a shared environment. The instances (tenants) are logically isolated, but physically integrated COMPANY LOGO Crowdsourcing Crowdsourcing describes the processes for sourcing a task or challenge to a broad distributed set of contributors using the Web and social collaboration techniques. COMPANY LOGO Gamification Gamification is the use of game mechanics to drive engagement in non-game business scenarios and to change behaviors in a target audience to achieve business outcomes. COMPANY LOGO Massive Open Online Course(MOOC) MOOC is an online phenomenon made possible by social networking facilitation, freely accessible online resources, hundreds and thousands of registered users(students). Students self-organize their participation in a MOOC. COMPANY LOGO Mobile App The recent years have shown greatest competition in creating mobile application. Application software is developed for Personal Digital Assistants, Enterprise Digital Assistants or mobile phones. COMPANY LOGO Network Virtualization Network virtualization(combining hardware and software resources into a singly virtual network) offers access to routing features and data streams which can provide newer, service-aware, resilient solutions; newer security services that are native within network elements; real time session control for converged voice and video applications etc., COMPANY LOGO Visualization Visualization is illustration of information objects and their relationships on a display. Advanced technologies help users’ ability to interfere to large knowledge repositories. COMPANY LOGO Open Source Open source describes software that comes with permission to use, copy and distribute either as is or with modifications, and that may be offered either free of with a charge. COMPANY LOGO Spring Network Spring network is an open source application framework and inversion of control container for the Java platform. COMPANY LOGO Micro-blogging COMPANY LOGO Microblogging is short messages that are delivered to consumers who have chosen to follow or subscribe to a given microblogging feed. (Twitter, Plurk, Tumblr, Weibo etc., ).These services focus on consumers but can be used by retailers, as opposed to enterprise-centric microblogging sites(Yammer and Socialcast) which focus on collaboration in the enterprise. Social Media Social media is an online environment in which content is created, consumed, promoted, distributed or shared for purposes that are primarily related to communities and social activities, rather that functional, task oriented objectives. Social media technologies take on many different forms including internet blogs, microblogging, wikis, social networks, podcasts, social bookmarking etc., COMPANY LOGO Fraud Detection Fraud detection uses background server based processes that examine users’ and other defined entities’ access and behavior patterns to protect customer and enterprise information, assets, accounts and transactions through a real time, near real time or batch analysis of activities. COMPANY LOGO Bio Metrics Biometrics refers to the identification of human by their characteristics traits. In IT,, biometrics refers to technologies that measure and analyze human body characteristics, such as DNA, fingerprints, eye retinas and irises, voice patterns, facial patterns and hand measurements for augmentations purposes. In computer security, biometrics refers to authentication techniques that rely on measurable physical characteristics that can be automatically checked. COMPANY LOGO Scalability COMPANY LOGO Scalability is the measure of a system’s ability to increase or decrease in performance and cost in response to changes in application and system processing demands Personal Digital Assistant(PDA) COMPANY LOGO A Personal Digital Assistant (PDA), also known as a palmtop computer, or personal data assistant, is a mobile device that functions as a personal information manager. A PDA can function as a cellular phone, web browser and personal organizer. Bring Your Own Device(BYOD) COMPANY LOGO Bring your own device, bring your own PC, bring your own phone, bring your own phone are policies that may permit employees (or students) to bring their laptops, tablets, mobile phones to access, share, learn and distribute knowledge with integrity and ethics. COMPANY LOGO Thank you