SlideShare uma empresa Scribd logo
1 de 33
tech next . By  PARTH THAKAR For KES College. On 29/07/2010 KANDIVALI
Agenda Need  for Future Technologies. Why Tech Next Technologies. Benefits for the students Technologies of the future. Q & A  KANDIVALI
Need  for  Future Technologies …? KANDIVALI
KANDIVALI
Technologies of the future. KANDIVALI
 
[object Object],KANDIVALI
KANDIVALI
Why Tech Next Technologies.
KANDIVALI
KANDIVALI
KANDIVALI Hardware Virtualization Storage Virtualization Data Center  Web/SSL External Partner Orgs – Branch Offices  CORP OFFICE Remote Workers Secure access  ,[object Object],[object Object],[object Object],[object Object],[object Object],Server  Virtualization Solution - Virtualization
KANDIVALI
System Workload (Operating System, Applications, Data) KANDIVALI
KANDIVALI
KANDIVALI
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],KANDIVALI
KANDIVALI
KANDIVALI
KANDIVALI
A nightmare for every individual… Is their network Secure? It really depends on the methods used to secure it KANDIVALI
[object Object],[object Object],[object Object],[object Object],[object Object],KANDIVALI
[object Object],[object Object],[object Object],[object Object],[object Object],KANDIVALI
 
KANDIVALI
NIIT …..
 
 
 
472 297 131 225 279 801
 
KANDIVALI ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object]

Mais conteúdo relacionado

Destaque

Dia de la mujer
Dia de la mujerDia de la mujer
Dia de la mujer
bejerez
 
Tics por micael
Tics por micaelTics por micael
Tics por micael
mikae123
 
Anunci cervesa heineken
Anunci cervesa heinekenAnunci cervesa heineken
Anunci cervesa heineken
cosminneitor
 
Sales line company_profile_candidati
Sales line company_profile_candidatiSales line company_profile_candidati
Sales line company_profile_candidati
Sales Line srl
 
F1 professional growth plan 9.23.09
F1 professional growth plan 9.23.09F1 professional growth plan 9.23.09
F1 professional growth plan 9.23.09
gnonewleaders
 
Securing online services by combining smart cards and web-based applications
Securing online services by combining smart cards and web-based applicationsSecuring online services by combining smart cards and web-based applications
Securing online services by combining smart cards and web-based applications
Olivier Potonniée
 

Destaque (14)

Dia de la mujer
Dia de la mujerDia de la mujer
Dia de la mujer
 
Tics por micael
Tics por micaelTics por micael
Tics por micael
 
Barcelona
BarcelonaBarcelona
Barcelona
 
Anunci cervesa heineken
Anunci cervesa heinekenAnunci cervesa heineken
Anunci cervesa heineken
 
Albert Einstein
Albert EinsteinAlbert Einstein
Albert Einstein
 
100 Ideer
100 Ideer100 Ideer
100 Ideer
 
LAUKSVA Presentation
LAUKSVA PresentationLAUKSVA Presentation
LAUKSVA Presentation
 
Modelo padrão de cálculo do capital adicional baseado no risco de subscrição...
Modelo padrão de cálculo do capital adicional baseado no  risco de subscrição...Modelo padrão de cálculo do capital adicional baseado no  risco de subscrição...
Modelo padrão de cálculo do capital adicional baseado no risco de subscrição...
 
Sales line company_profile_candidati
Sales line company_profile_candidatiSales line company_profile_candidati
Sales line company_profile_candidati
 
Arter Kan Gazları
Arter Kan  Gazları Arter Kan  Gazları
Arter Kan Gazları
 
F1 professional growth plan 9.23.09
F1 professional growth plan 9.23.09F1 professional growth plan 9.23.09
F1 professional growth plan 9.23.09
 
Securing online services by combining smart cards and web-based applications
Securing online services by combining smart cards and web-based applicationsSecuring online services by combining smart cards and web-based applications
Securing online services by combining smart cards and web-based applications
 
DOCTRINA MONROE Y DESTINO MANIFIESTO.
DOCTRINA MONROE Y DESTINO MANIFIESTO.DOCTRINA MONROE Y DESTINO MANIFIESTO.
DOCTRINA MONROE Y DESTINO MANIFIESTO.
 
Life insurance 101- Basics for Beginners
Life insurance 101- Basics for BeginnersLife insurance 101- Basics for Beginners
Life insurance 101- Basics for Beginners
 

Semelhante a Technext presentation

Palo alto networks next generation firewalls
Palo alto networks next generation firewallsPalo alto networks next generation firewalls
Palo alto networks next generation firewalls
Castleforce
 

Semelhante a Technext presentation (20)

Networkshop42 2014 by Kelly Scott
Networkshop42 2014 by Kelly Scott Networkshop42 2014 by Kelly Scott
Networkshop42 2014 by Kelly Scott
 
iPads on your network? Take Control with Unified Policy and Management
iPads on your network? Take Control with Unified Policy and ManagementiPads on your network? Take Control with Unified Policy and Management
iPads on your network? Take Control with Unified Policy and Management
 
Goodbye CLI, hello API: Leveraging network programmability in security incid...
Goodbye CLI, hello API:  Leveraging network programmability in security incid...Goodbye CLI, hello API:  Leveraging network programmability in security incid...
Goodbye CLI, hello API: Leveraging network programmability in security incid...
 
The next generation ethernet gangster (part 3)
The next generation ethernet gangster (part 3)The next generation ethernet gangster (part 3)
The next generation ethernet gangster (part 3)
 
Enabling Cloud Computing
Enabling Cloud ComputingEnabling Cloud Computing
Enabling Cloud Computing
 
Neudesic IoT HIMSS Healthcare
Neudesic IoT HIMSS HealthcareNeudesic IoT HIMSS Healthcare
Neudesic IoT HIMSS Healthcare
 
LinuxCon North America 2013: Why Lease When You Can Buy Your Cloud
LinuxCon North America 2013: Why Lease When You Can Buy Your CloudLinuxCon North America 2013: Why Lease When You Can Buy Your Cloud
LinuxCon North America 2013: Why Lease When You Can Buy Your Cloud
 
Six things to take into account when choosing cloud solutions
Six things to take into account when choosing cloud solutionsSix things to take into account when choosing cloud solutions
Six things to take into account when choosing cloud solutions
 
Palo alto networks next generation firewalls
Palo alto networks next generation firewallsPalo alto networks next generation firewalls
Palo alto networks next generation firewalls
 
Integra presentation
Integra presentationIntegra presentation
Integra presentation
 
Infrastructure Strategy Plan
Infrastructure Strategy Plan Infrastructure Strategy Plan
Infrastructure Strategy Plan
 
WSO2Con EU 2015: IoT in Finance
WSO2Con EU 2015: IoT in FinanceWSO2Con EU 2015: IoT in Finance
WSO2Con EU 2015: IoT in Finance
 
Cloud ID
Cloud IDCloud ID
Cloud ID
 
TIBCO Silver at the SOA Forum in Paris Oct 6 2009
TIBCO Silver at the SOA Forum in Paris Oct 6 2009TIBCO Silver at the SOA Forum in Paris Oct 6 2009
TIBCO Silver at the SOA Forum in Paris Oct 6 2009
 
QA in Cloud world & DevOps
QA in Cloud world & DevOpsQA in Cloud world & DevOps
QA in Cloud world & DevOps
 
Dell NVIDIA AI Roadshow - South Western Ontario
Dell NVIDIA AI Roadshow - South Western OntarioDell NVIDIA AI Roadshow - South Western Ontario
Dell NVIDIA AI Roadshow - South Western Ontario
 
Cloud Expo Silicon Valley 2013 | Why Lease When You Can Buy Your Cloud
Cloud Expo Silicon Valley 2013 | Why Lease When You Can Buy Your CloudCloud Expo Silicon Valley 2013 | Why Lease When You Can Buy Your Cloud
Cloud Expo Silicon Valley 2013 | Why Lease When You Can Buy Your Cloud
 
The next generation ethernet gangster (part 3)
The next generation ethernet gangster (part 3)The next generation ethernet gangster (part 3)
The next generation ethernet gangster (part 3)
 
Embracing Failure - AzureDay Rome
Embracing Failure - AzureDay RomeEmbracing Failure - AzureDay Rome
Embracing Failure - AzureDay Rome
 
To cloud or not to cloud
To cloud or not to cloudTo cloud or not to cloud
To cloud or not to cloud
 

Mais de PARTH THAKAR

Mais de PARTH THAKAR (6)

Cmc tech hne v2 for college seminar
Cmc tech hne v2 for college seminar Cmc tech hne v2 for college seminar
Cmc tech hne v2 for college seminar
 
EDGE for students (india)
EDGE for students (india)EDGE for students (india)
EDGE for students (india)
 
CMC Ltd. CJET
CMC Ltd. CJETCMC Ltd. CJET
CMC Ltd. CJET
 
5min social networ/media marketing..
5min social networ/media marketing..5min social networ/media marketing..
5min social networ/media marketing..
 
Use Of I.T. In Agriculture
Use Of I.T. In AgricultureUse Of I.T. In Agriculture
Use Of I.T. In Agriculture
 
Use Of I.T. In Agriculture
Use Of I.T. In AgricultureUse Of I.T. In Agriculture
Use Of I.T. In Agriculture
 

Último

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Último (20)

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 

Technext presentation

Notas do Editor

  1. As there can be many reasons but the major is GLOBAL WARMING and global resesion. Third Is INTERNET (show Internet States)
  2. Before we start let me ask you Is technology is in your DNA. (This will help to find out the mood of the audience if they are tech savvy) i.e. Have you heard about the new technologies which are ready to rule the WORLD !
  3. So these are the six technologies of the future and we will discuss of these technologies today.
  4. The biggest concern area for organizations these days is how they can optimize the performance of their IT resources but by implementing less IT resources. More over, there are multiple/different requirements of different work force regarding operating system/
  5. OS – Operating system Apps - Applications
  6. Reduction in IT infrastructure leads to reduction in overall IT infrastructure costs. Since less infrastructure is used there is less utilization of energy which leads to Greener IT deployment. Since there is less infrastructure to manage so proper and enhanced disaster management systems like backup/data mirroring techniques can be implemented. Organizations need not implement multiple servers as workload can be shared using centralized server architecture with enhanced processing/storage capabilities. Since most of the data resides on same host so security is better. Maintenance of the resources is also easy. Since there is less IT infrastructure so Migration from one system to another can be easily done if required and also better disaster management capabilities can be build.
  7. Cloud computing is the provision of dynamically scalable and often virtualized resources as a service over the Internet . Users need not have knowledge of, expertise in, or control over the technology infrastructure in the "cloud" that supports them. Cloud computing services often provide common business applications online that are accessed from a web browser , while the software and data are stored on the servers . Some of the live examples of cloud computing is google apps, google docs etc where we use application over the cloud (internet)
  8. Cloud computing customers do not generally own the physical infrastructure serving as host to the software platform in question. Instead, they avoid capital expenditure by renting usage from a third-party provider. They consume resources as a service and pay only for resources that they use. Many cloud-computing offerings employ the utility computing model, which is analogous to how traditional utility services (such as electricity ) are consumed, while others bill on a subscription basis.
  9. Since most of our business/personal data travels over the network so most of the organizations are worried about the misuse of this important data if it is taken away by someone through hacking. Organizations are implementing many methods to make their network secure and ethical hacking has a big role to play in this
  10. Ethical Hacker Legal attempt to break into a company’s network to find its weakest link More than an attempt to break in; also includes analyzing company’s security policy and procedures Tester offers solutions to secure or protect the network