SlideShare uma empresa Scribd logo
1 de 16
INFORMATION
TECHNOLOGIES
USED IN
“SWORDFISH”
By – Kevin Joseph
MBA (Energy Trading)
500026236
Plot :
 Swordfish is a 2001 American thriller film

starring John Travolta, Hugh Jackman, Halle
Berry.
 The film centers around Stanley Jobson, an

ex-con computer hacker who is targeted for
recruitment into a bank robbery conspiracy
because of his formidable hacking skills.
Multiscreen systems
 It is the use of multiple

physical display devices, such
as monitors, televisions, and
projectors, in order to
increase the area available for
computer programs running
on a single computer system.

 The system can be run by a

single CPU or multiple CPUs

 Multi-head may increase the

productivity by up to 40-50%.
Super Computers


A supercomputer is a computer which
increases processing capacityparticularly speed of calculation.

These systems work in two ways :
 In one approach is a large number of
computers distributed across a
network devote some or all of their
time to solving a common problem
each individual computer receives and
completes many small
tasks, reporting the results to a
central server which integrates the
task results into the overall solution.
 In another approach, a large number
of dedicated processors are placed in
close proximity to each other; this
saves considerable time moving data
around and makes it possible for the
processors to work together, for
example in mesh architectures.

Cray Titan – 17.59 PetaFLOPS
Supercomputers are used
for a wide range of
computationally
intensive tasks in various
fields.
 Quantum mechanics.
 Weather forecasting
 Climate research
 Oil and gas exploration
 Molecular modeling
 Aerodynamics
 Counter-cryptography.

NUDT Tianha – 33.86 PetaFLOPS
Radio dog collar
 Used for tracking
 Works on radio waves
of particular frequency
 Has to be in Line of
sight
 Can be used as a

communication means
also.
Servers
 A server is a system that

responds to requests across a
computer network to provide a
network service.

 Servers are computer

programs running to serve the
requests of other
programs, the clients.
Thus, the server performs
some task on behalf of clients.

 Servers can be run on a

dedicated computer, which is
also often referred to as "the
server", but many networked
computers are capable of
hosting servers.

Typical computing servers are
• Database server
• File server
• Mail server
• Print server
• Web server
• Gaming server, etc.
Internet
 It is a global system of

interconnected computer
networks that use the
standard Internet protocol
suite (TCP/IP) to serve several
billion users worldwide.

 It is a network of networks
 Consists of millions of

private, public, academic, bus
iness, and government
networks, of local to global
scope, that are linked by a
broad array of
electronic, wireless and
optical networking
technologies.
Ciphering technology
 Cryptography
 Encoding and
Decoding of
Information
 Military
 Banks
 Educational
sectors(Exams)
Computer worms
 A worm is designed to

tunnel into your system
and allow malicious users
to control your computer
remotely.

 Does not require an

action to spread

 Can make multiple copies

of itself. (E-mail)

 Slows down computers n

networks significantly.
Transatlantic Telecommunication Cable
 A transatlantic
telecommunications
cable is a submarine
communications
cable running under

the Atlantic Ocean.
 All modern cables

use fiber
optic technology.
 Most such cables

connect London, Englan
d to New York City, USA

 Built mainly for high-

speed requirements of
international financial
transactions.

 Financial trading firms

spend billions of dollars
annually to get an edge
on trading
THANK YOU

Mais conteúdo relacionado

Mais procurados

Computer networking
Computer networkingComputer networking
Computer networkingJayVerma35
 
types of networks
types of networkstypes of networks
types of networksrdacs14
 
Computer Applications - The Basic Computer Networking
Computer Applications - The Basic Computer NetworkingComputer Applications - The Basic Computer Networking
Computer Applications - The Basic Computer NetworkingFaindra Jabbar
 
Chapter 4 computer networks
Chapter 4   computer networksChapter 4   computer networks
Chapter 4 computer networksPratik Gupta
 
Introduction to computer networks & it’s usage
Introduction to computer networks & it’s usageIntroduction to computer networks & it’s usage
Introduction to computer networks & it’s usageRahul Sharma
 
Computer network note
Computer network noteComputer network note
Computer network noteMdAnikKhan
 
File sharing technlogies
File sharing technlogiesFile sharing technlogies
File sharing technlogiesMary May Porto
 
Itc lec 11 Network , Uses , Types
Itc lec 11 Network , Uses , Types                                  Itc lec 11 Network , Uses , Types
Itc lec 11 Network , Uses , Types AnzaDar3
 
Communication
CommunicationCommunication
CommunicationUtchi
 
Types of network
Types of networkTypes of network
Types of network99111
 
NETWORK,INTERNET & WWW ppt
NETWORK,INTERNET & WWW pptNETWORK,INTERNET & WWW ppt
NETWORK,INTERNET & WWW pptNalinSinha3
 
Designing A LAN WAN MAN Sollution
Designing A LAN WAN MAN SollutionDesigning A LAN WAN MAN Sollution
Designing A LAN WAN MAN SollutionKosala Sandaruwan
 
Arpanet
ArpanetArpanet
Arpanetsmithz
 

Mais procurados (20)

Understanding Computer
Understanding ComputerUnderstanding Computer
Understanding Computer
 
Computer networking
Computer networkingComputer networking
Computer networking
 
types of networks
types of networkstypes of networks
types of networks
 
Lan and wan
Lan and wanLan and wan
Lan and wan
 
Computer Applications - The Basic Computer Networking
Computer Applications - The Basic Computer NetworkingComputer Applications - The Basic Computer Networking
Computer Applications - The Basic Computer Networking
 
Chapter 4 computer networks
Chapter 4   computer networksChapter 4   computer networks
Chapter 4 computer networks
 
Introduction to computer networks & it’s usage
Introduction to computer networks & it’s usageIntroduction to computer networks & it’s usage
Introduction to computer networks & it’s usage
 
Computer network note
Computer network noteComputer network note
Computer network note
 
File & Printer Sharing
File & Printer SharingFile & Printer Sharing
File & Printer Sharing
 
File sharing technlogies
File sharing technlogiesFile sharing technlogies
File sharing technlogies
 
Itc lec 11 Network , Uses , Types
Itc lec 11 Network , Uses , Types                                  Itc lec 11 Network , Uses , Types
Itc lec 11 Network , Uses , Types
 
Network and it's Uses
Network and it's UsesNetwork and it's Uses
Network and it's Uses
 
Communication
CommunicationCommunication
Communication
 
What is a computer network
What is a computer networkWhat is a computer network
What is a computer network
 
Types of network
Types of networkTypes of network
Types of network
 
NETWORK,INTERNET & WWW ppt
NETWORK,INTERNET & WWW pptNETWORK,INTERNET & WWW ppt
NETWORK,INTERNET & WWW ppt
 
Designing A LAN WAN MAN Sollution
Designing A LAN WAN MAN SollutionDesigning A LAN WAN MAN Sollution
Designing A LAN WAN MAN Sollution
 
FUNDAMENTAL OF NETWORK
FUNDAMENTAL OF NETWORKFUNDAMENTAL OF NETWORK
FUNDAMENTAL OF NETWORK
 
Arpanet
ArpanetArpanet
Arpanet
 
PROFESSIONAL SLIDES
PROFESSIONAL SLIDESPROFESSIONAL SLIDES
PROFESSIONAL SLIDES
 

Semelhante a Technologies Used in Swordfish Hacking Film

Notes for banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationxNotes for  banking railway opsc psc preparationx
Notes for banking railway opsc psc preparationxRAJSEKHAR PEDINA
 
L25 network fundamentals
L25   network fundamentalsL25   network fundamentals
L25 network fundamentalsheidirobison
 
1. What is IT infrastructure and what are its components2.What ar.pdf
1. What is IT infrastructure and what are its components2.What ar.pdf1. What is IT infrastructure and what are its components2.What ar.pdf
1. What is IT infrastructure and what are its components2.What ar.pdfexpressionnoveltiesk
 
top LLB university in Delhi NCR.pdf
top LLB university in Delhi NCR.pdftop LLB university in Delhi NCR.pdf
top LLB university in Delhi NCR.pdfOpjsuniversity1
 
Knowledge on IT Infrastructure
Knowledge on IT InfrastructureKnowledge on IT Infrastructure
Knowledge on IT InfrastructureLopamudra Das
 
Distributed Computing system
Distributed Computing system Distributed Computing system
Distributed Computing system Sarvesh Meena
 
00 - BigData-Chapter_01-PDC.pdf
00 - BigData-Chapter_01-PDC.pdf00 - BigData-Chapter_01-PDC.pdf
00 - BigData-Chapter_01-PDC.pdfaminnezarat
 
CloudComputing_UNIT1.pdf
CloudComputing_UNIT1.pdfCloudComputing_UNIT1.pdf
CloudComputing_UNIT1.pdfkhan593595
 
CloudComputing_UNIT1.pdf
CloudComputing_UNIT1.pdfCloudComputing_UNIT1.pdf
CloudComputing_UNIT1.pdfkhan593595
 
Computer Networking Theory Assignment 1
Computer Networking Theory Assignment 1Computer Networking Theory Assignment 1
Computer Networking Theory Assignment 1Hasibul Islam Nirob
 
Connecting Hardware Peripherals Level 1 Ver 2 - Copy.pdf
Connecting Hardware Peripherals Level 1 Ver 2 - Copy.pdfConnecting Hardware Peripherals Level 1 Ver 2 - Copy.pdf
Connecting Hardware Peripherals Level 1 Ver 2 - Copy.pdfEYOHAICTMEDIA
 
10 New Web Application and Security.pptx
10 New Web Application and Security.pptx10 New Web Application and Security.pptx
10 New Web Application and Security.pptxAkshayIngole17
 

Semelhante a Technologies Used in Swordfish Hacking Film (20)

Notes for banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationxNotes for  banking railway opsc psc preparationx
Notes for banking railway opsc psc preparationx
 
Modules1
Modules1Modules1
Modules1
 
L25 network fundamentals
L25   network fundamentalsL25   network fundamentals
L25 network fundamentals
 
1. What is IT infrastructure and what are its components2.What ar.pdf
1. What is IT infrastructure and what are its components2.What ar.pdf1. What is IT infrastructure and what are its components2.What ar.pdf
1. What is IT infrastructure and what are its components2.What ar.pdf
 
Komputasi Awan
Komputasi AwanKomputasi Awan
Komputasi Awan
 
top LLB university in Delhi NCR.pdf
top LLB university in Delhi NCR.pdftop LLB university in Delhi NCR.pdf
top LLB university in Delhi NCR.pdf
 
Computer
ComputerComputer
Computer
 
1.intro. to distributed system
1.intro. to distributed system1.intro. to distributed system
1.intro. to distributed system
 
Knowledge on IT Infrastructure
Knowledge on IT InfrastructureKnowledge on IT Infrastructure
Knowledge on IT Infrastructure
 
Distributed Computing system
Distributed Computing system Distributed Computing system
Distributed Computing system
 
COMPUTER NETWORK.pptx
COMPUTER NETWORK.pptxCOMPUTER NETWORK.pptx
COMPUTER NETWORK.pptx
 
Presentation-1.ppt
Presentation-1.pptPresentation-1.ppt
Presentation-1.ppt
 
2_Virtualization.pptx
2_Virtualization.pptx2_Virtualization.pptx
2_Virtualization.pptx
 
00 - BigData-Chapter_01-PDC.pdf
00 - BigData-Chapter_01-PDC.pdf00 - BigData-Chapter_01-PDC.pdf
00 - BigData-Chapter_01-PDC.pdf
 
CloudComputing_UNIT1.pdf
CloudComputing_UNIT1.pdfCloudComputing_UNIT1.pdf
CloudComputing_UNIT1.pdf
 
CloudComputing_UNIT1.pdf
CloudComputing_UNIT1.pdfCloudComputing_UNIT1.pdf
CloudComputing_UNIT1.pdf
 
Computer Networking Theory Assignment 1
Computer Networking Theory Assignment 1Computer Networking Theory Assignment 1
Computer Networking Theory Assignment 1
 
Connecting Hardware Peripherals Level 1 Ver 2 - Copy.pdf
Connecting Hardware Peripherals Level 1 Ver 2 - Copy.pdfConnecting Hardware Peripherals Level 1 Ver 2 - Copy.pdf
Connecting Hardware Peripherals Level 1 Ver 2 - Copy.pdf
 
Internet.pdf
Internet.pdfInternet.pdf
Internet.pdf
 
10 New Web Application and Security.pptx
10 New Web Application and Security.pptx10 New Web Application and Security.pptx
10 New Web Application and Security.pptx
 

Mais de Kevin Philip Joseph

The role of information technologies & information system in business
The role of information technologies & information system in businessThe role of information technologies & information system in business
The role of information technologies & information system in businessKevin Philip Joseph
 
Ship terminologies – organizations & chartering
Ship terminologies – organizations & charteringShip terminologies – organizations & chartering
Ship terminologies – organizations & charteringKevin Philip Joseph
 
Information systems used in barista briggo
Information systems used in barista   briggoInformation systems used in barista   briggo
Information systems used in barista briggoKevin Philip Joseph
 
Competing information systems used in emirates
Competing information systems used in emiratesCompeting information systems used in emirates
Competing information systems used in emiratesKevin Philip Joseph
 
Causes and consequences of managerial failure in rapidly changing organizations
Causes and consequences of managerial failure in rapidly changing organizations Causes and consequences of managerial failure in rapidly changing organizations
Causes and consequences of managerial failure in rapidly changing organizations Kevin Philip Joseph
 
Storage devices in computer systems
Storage devices in computer systemsStorage devices in computer systems
Storage devices in computer systemsKevin Philip Joseph
 

Mais de Kevin Philip Joseph (10)

The role of information technologies & information system in business
The role of information technologies & information system in businessThe role of information technologies & information system in business
The role of information technologies & information system in business
 
Solar energy
Solar energySolar energy
Solar energy
 
Shipping terminologies
Shipping terminologiesShipping terminologies
Shipping terminologies
 
Ship terminologies – organizations & chartering
Ship terminologies – organizations & charteringShip terminologies – organizations & chartering
Ship terminologies – organizations & chartering
 
Opec to affect future
Opec to affect futureOpec to affect future
Opec to affect future
 
Maritime - Practitioners
Maritime - PractitionersMaritime - Practitioners
Maritime - Practitioners
 
Information systems used in barista briggo
Information systems used in barista   briggoInformation systems used in barista   briggo
Information systems used in barista briggo
 
Competing information systems used in emirates
Competing information systems used in emiratesCompeting information systems used in emirates
Competing information systems used in emirates
 
Causes and consequences of managerial failure in rapidly changing organizations
Causes and consequences of managerial failure in rapidly changing organizations Causes and consequences of managerial failure in rapidly changing organizations
Causes and consequences of managerial failure in rapidly changing organizations
 
Storage devices in computer systems
Storage devices in computer systemsStorage devices in computer systems
Storage devices in computer systems
 

Último

Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 

Último (20)

Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 

Technologies Used in Swordfish Hacking Film

  • 1. INFORMATION TECHNOLOGIES USED IN “SWORDFISH” By – Kevin Joseph MBA (Energy Trading) 500026236
  • 2. Plot :  Swordfish is a 2001 American thriller film starring John Travolta, Hugh Jackman, Halle Berry.  The film centers around Stanley Jobson, an ex-con computer hacker who is targeted for recruitment into a bank robbery conspiracy because of his formidable hacking skills.
  • 3.
  • 4. Multiscreen systems  It is the use of multiple physical display devices, such as monitors, televisions, and projectors, in order to increase the area available for computer programs running on a single computer system.  The system can be run by a single CPU or multiple CPUs  Multi-head may increase the productivity by up to 40-50%.
  • 5. Super Computers  A supercomputer is a computer which increases processing capacityparticularly speed of calculation. These systems work in two ways :  In one approach is a large number of computers distributed across a network devote some or all of their time to solving a common problem each individual computer receives and completes many small tasks, reporting the results to a central server which integrates the task results into the overall solution.  In another approach, a large number of dedicated processors are placed in close proximity to each other; this saves considerable time moving data around and makes it possible for the processors to work together, for example in mesh architectures. Cray Titan – 17.59 PetaFLOPS
  • 6. Supercomputers are used for a wide range of computationally intensive tasks in various fields.  Quantum mechanics.  Weather forecasting  Climate research  Oil and gas exploration  Molecular modeling  Aerodynamics  Counter-cryptography. NUDT Tianha – 33.86 PetaFLOPS
  • 7. Radio dog collar  Used for tracking  Works on radio waves of particular frequency  Has to be in Line of sight  Can be used as a communication means also.
  • 8. Servers  A server is a system that responds to requests across a computer network to provide a network service.  Servers are computer programs running to serve the requests of other programs, the clients. Thus, the server performs some task on behalf of clients.  Servers can be run on a dedicated computer, which is also often referred to as "the server", but many networked computers are capable of hosting servers. Typical computing servers are • Database server • File server • Mail server • Print server • Web server • Gaming server, etc.
  • 9. Internet  It is a global system of interconnected computer networks that use the standard Internet protocol suite (TCP/IP) to serve several billion users worldwide.  It is a network of networks  Consists of millions of private, public, academic, bus iness, and government networks, of local to global scope, that are linked by a broad array of electronic, wireless and optical networking technologies.
  • 10.
  • 11. Ciphering technology  Cryptography  Encoding and Decoding of Information  Military  Banks  Educational sectors(Exams)
  • 12. Computer worms  A worm is designed to tunnel into your system and allow malicious users to control your computer remotely.  Does not require an action to spread  Can make multiple copies of itself. (E-mail)  Slows down computers n networks significantly.
  • 13. Transatlantic Telecommunication Cable  A transatlantic telecommunications cable is a submarine communications cable running under the Atlantic Ocean.  All modern cables use fiber optic technology.
  • 14.  Most such cables connect London, Englan d to New York City, USA  Built mainly for high- speed requirements of international financial transactions.  Financial trading firms spend billions of dollars annually to get an edge on trading
  • 15.