SlideShare uma empresa Scribd logo
1 de 23
Information Technology
The study and use of systems (mainly computers
and telecommunications) for
− capturing
− processing
− storing
− retrieving
− communicating
IT and the World
Mobile phones
Computer games
Streaming media
Satellite navigation
IT and the World
Internet and the World Wide Web
Internet
A global network of networks.
Connecting billions of computers together.
World Wide Web
A system of linking and displaying documents
stored in computers connected to the Internet.
Browsers used to display documents (web pages)
and to access those linked.
Did we forget computers?
IT of the future
IT of the future
What is not Information Technology
− Data entry
− Typing reports
− Drawing or manipulating images and pictures
− Video and audio editing
Famous Tech Personalities
Steve Jobs
Mark Zuckerberg
Sir Tim Berners Lee
Bill Gates
Larry Page
Famous Women in Technology
Augusta Ada King Sara Haider Heather Payne
Grace Hooper
Parisa Tabriz
Lisa Falzone
Rachel Haot
Techie Celebs
Pop Quiz 
You pass by naming them.
You get an A by telling me why
they are mentioned here.
Careers in IT – Programmers
Computers do not have any intelligence.
They need to be programmed to perform
any operation of any value or significance.
Programs are lists of instructions in a
languages that computers understand.
Programmers are professionals who can
design and then write these programs.
Careers in IT – Business Analysts
Computer programs solve real world problems.
Business analysts or systems analysts
communicate with all stake holders and clarify
the requirements to programmers.
This allows developing programs that fulfil user
requirements as closely as possible.
The objective is to deliver systems and services
that add value.
Careers in IT – Tech Support
IT systems can be elaborate and under certain circumstances may not operate as desired.
Tech support staff monitor the operation of all components of a system.
Proactively rectify faults to ensure smooth operation.
React swiftly to faults and failures to ensue continuity of operation.
Careers in IT – Infrastructure
Engineering
Build and administer data centres.
Layout networks and provide interconnectivity to business.
Provide computational and storage capacity to their clients.
Careers in IT – Cyber Security
Secure businesses and individuals against hacking and denial of service attacks.
Not entirely a technological issue, many breaches of security happen through phishing and
social engineering.
IT in Banks
Transparent, accurate, reliable, timely and secure operation.
Failures, business as well as technical are costly. Result in financial loss, reputational loss
and loss of credibility.
Automation of business relieves the business from mundane and repetitive tasks to focus on
value generation.
Technology ensures all business complies with regulation.
IT in an Investment Bank
Technology
Banking, Sales
and Trading
OperationsFinanceAdministration
Development,
Support,
Infrastructure,
Security
Trading
Venues,
Clients,
Exchanges
Connectivity,
Security Rest of the
World (WWW,
Emails etc.)
Connectivity,
Security
Road to a Tech Career
• Relevant degree
• HNC and HND
• NVQs
• Professional and technical certifications
• Professional qualifications (BCS, IET)
• Work experience
• Internships
• Volunteering in tech related
charities.
Tech Job Security
• Off shoring and outsourcing risk
• Usually labour intensive jobs moved to
alternative locations with cheaper staff.
• High valued and business strategic roles largely
remain close to business.
• Opportunities
• Redefinition
• Elevation
• Relocation
Tech Job Security
• Obsolescence risk
• Technology moves very fast.
• Even evolution is revolutionary.
• Any tech qualification loses half its relevance shortly after
it is gained.
• Significant opportunities to remain skilled in new
technologies.
• Opportunities to continue to specialise or progress.
• Specialists have significant consulting and contracting
opportunities locally and overseas.
• Career progression allows taking on roles with greater
responsibilities.
The only limitation is imagination
Be Simple
Be Innovative
Be Inventive

Mais conteúdo relacionado

Mais procurados

Information Technology
Information TechnologyInformation Technology
Information Technologyshehzadbilal
 
Data Communication & Computer Network
Data Communication & Computer Network Data Communication & Computer Network
Data Communication & Computer Network Faraz Ahmed
 
Changes made by Information Technology (IT) in our Society
Changes made by Information Technology (IT) in our SocietyChanges made by Information Technology (IT) in our Society
Changes made by Information Technology (IT) in our SocietyJigyasa Singh
 
Chap1 introducing today's technologies
Chap1 introducing today's technologiesChap1 introducing today's technologies
Chap1 introducing today's technologiesLeslynBonachita1
 
The classification of computer
The classification of computerThe classification of computer
The classification of computermarkgernale24
 
Introduction to information technology lecture 1
Introduction to information technology   lecture 1Introduction to information technology   lecture 1
Introduction to information technology lecture 1CBAKhan
 
INFORMATION TECHNOLOGY (Animated PPT ):- Sreedevi V.S, LIBRARIAN, Holygrcae ...
INFORMATION TECHNOLOGY  (Animated PPT ):- Sreedevi V.S, LIBRARIAN, Holygrcae ...INFORMATION TECHNOLOGY  (Animated PPT ):- Sreedevi V.S, LIBRARIAN, Holygrcae ...
INFORMATION TECHNOLOGY (Animated PPT ):- Sreedevi V.S, LIBRARIAN, Holygrcae ...Sreedevi Santhosh
 
Introduction to Information Technology
Introduction to Information TechnologyIntroduction to Information Technology
Introduction to Information TechnologyRa'Fat Al-Msie'deen
 
Computer Applications - The Information and Communication Technology in the w...
Computer Applications - The Information and Communication Technology in the w...Computer Applications - The Information and Communication Technology in the w...
Computer Applications - The Information and Communication Technology in the w...Faindra Jabbar
 
Advantages, disadvantages and limitations of Computer and Multimedia in Learning
Advantages, disadvantages and limitations of Computer and Multimedia in LearningAdvantages, disadvantages and limitations of Computer and Multimedia in Learning
Advantages, disadvantages and limitations of Computer and Multimedia in Learningmailyn0729
 
April 3 Springfield Cleared Job Fair, Security Clearance Briefings, Resume Re...
April 3 Springfield Cleared Job Fair, Security Clearance Briefings, Resume Re...April 3 Springfield Cleared Job Fair, Security Clearance Briefings, Resume Re...
April 3 Springfield Cleared Job Fair, Security Clearance Briefings, Resume Re...ClearedJobs.Net
 
Information Technology
Information TechnologyInformation Technology
Information TechnologyAman Purohit
 

Mais procurados (20)

Information Technology
Information TechnologyInformation Technology
Information Technology
 
Data Communication & Computer Network
Data Communication & Computer Network Data Communication & Computer Network
Data Communication & Computer Network
 
Introduction of it by wikki verma - Wikki Verma
Introduction of it by wikki verma - Wikki VermaIntroduction of it by wikki verma - Wikki Verma
Introduction of it by wikki verma - Wikki Verma
 
Use of ICT in daily life
Use of ICT in daily lifeUse of ICT in daily life
Use of ICT in daily life
 
1 ICT in Society
1 ICT in Society1 ICT in Society
1 ICT in Society
 
Changes made by Information Technology (IT) in our Society
Changes made by Information Technology (IT) in our SocietyChanges made by Information Technology (IT) in our Society
Changes made by Information Technology (IT) in our Society
 
Role of IT in Business
Role of IT in BusinessRole of IT in Business
Role of IT in Business
 
Application of IT
Application of ITApplication of IT
Application of IT
 
Computer concept
Computer conceptComputer concept
Computer concept
 
Chap1 introducing today's technologies
Chap1 introducing today's technologiesChap1 introducing today's technologies
Chap1 introducing today's technologies
 
The classification of computer
The classification of computerThe classification of computer
The classification of computer
 
Introduction to information technology lecture 1
Introduction to information technology   lecture 1Introduction to information technology   lecture 1
Introduction to information technology lecture 1
 
INFORMATION TECHNOLOGY (Animated PPT ):- Sreedevi V.S, LIBRARIAN, Holygrcae ...
INFORMATION TECHNOLOGY  (Animated PPT ):- Sreedevi V.S, LIBRARIAN, Holygrcae ...INFORMATION TECHNOLOGY  (Animated PPT ):- Sreedevi V.S, LIBRARIAN, Holygrcae ...
INFORMATION TECHNOLOGY (Animated PPT ):- Sreedevi V.S, LIBRARIAN, Holygrcae ...
 
Introduction to Information Technology
Introduction to Information TechnologyIntroduction to Information Technology
Introduction to Information Technology
 
Computer Applications - The Information and Communication Technology in the w...
Computer Applications - The Information and Communication Technology in the w...Computer Applications - The Information and Communication Technology in the w...
Computer Applications - The Information and Communication Technology in the w...
 
Pace IT - Network Devices (part 2)
Pace IT - Network Devices (part 2)Pace IT - Network Devices (part 2)
Pace IT - Network Devices (part 2)
 
Advantages, disadvantages and limitations of Computer and Multimedia in Learning
Advantages, disadvantages and limitations of Computer and Multimedia in LearningAdvantages, disadvantages and limitations of Computer and Multimedia in Learning
Advantages, disadvantages and limitations of Computer and Multimedia in Learning
 
April 3 Springfield Cleared Job Fair, Security Clearance Briefings, Resume Re...
April 3 Springfield Cleared Job Fair, Security Clearance Briefings, Resume Re...April 3 Springfield Cleared Job Fair, Security Clearance Briefings, Resume Re...
April 3 Springfield Cleared Job Fair, Security Clearance Briefings, Resume Re...
 
Information Technology
Information TechnologyInformation Technology
Information Technology
 
Botany Software
Botany SoftwareBotany Software
Botany Software
 

Semelhante a IT in 40

MTC FDP @ Bangalore on 02.02.2014 PPT-1
MTC FDP @ Bangalore on 02.02.2014 PPT-1MTC FDP @ Bangalore on 02.02.2014 PPT-1
MTC FDP @ Bangalore on 02.02.2014 PPT-1Prof. Bholanath Dutta
 
The infrastructure and the Security Essentials of Information Technology in a...
The infrastructure and the Security Essentials of Information Technology in a...The infrastructure and the Security Essentials of Information Technology in a...
The infrastructure and the Security Essentials of Information Technology in a...adeel hamid
 
Information Technology
Information TechnologyInformation Technology
Information TechnologyDivyank Jindal
 
INFORMATION & TECHNOLOGY.pptx
INFORMATION & TECHNOLOGY.pptxINFORMATION & TECHNOLOGY.pptx
INFORMATION & TECHNOLOGY.pptxSushmitaSah5
 
ITC Capabilities Brief 2012
ITC Capabilities Brief 2012ITC Capabilities Brief 2012
ITC Capabilities Brief 2012prdunn
 
Introduction to Information and Education Technology 1
Introduction to Information and Education Technology 1Introduction to Information and Education Technology 1
Introduction to Information and Education Technology 1Mohamed EL Zayat
 
Insight into IT Strategic Challenges
Insight into IT Strategic ChallengesInsight into IT Strategic Challenges
Insight into IT Strategic ChallengesJorge Sebastiao
 
Career guidance talk it makaut_ppt_sabyasachi mukhopadhyay
Career guidance talk it makaut_ppt_sabyasachi mukhopadhyayCareer guidance talk it makaut_ppt_sabyasachi mukhopadhyay
Career guidance talk it makaut_ppt_sabyasachi mukhopadhyaySabyasachi Mukhopadhyay
 
Technology Trends & Your Career (Y4IT 2012)
Technology Trends & Your Career (Y4IT 2012)Technology Trends & Your Career (Y4IT 2012)
Technology Trends & Your Career (Y4IT 2012)Calen Legaspi
 
The future work force in the ICT industry and why you need to act now
The future work force in the ICT industry and why you need to act nowThe future work force in the ICT industry and why you need to act now
The future work force in the ICT industry and why you need to act nowJoshua Nomwesigwa
 
The best Definition of the IT updated 2023 document 5.docx
The best Definition of the IT updated 2023 document 5.docxThe best Definition of the IT updated 2023 document 5.docx
The best Definition of the IT updated 2023 document 5.docxintel-writers.com
 
It presentation final1
It presentation final1It presentation final1
It presentation final1wakhale
 
What are the Main Obstacles in Composing an IT Assignment.pptx
What are the Main Obstacles in Composing an IT Assignment.pptxWhat are the Main Obstacles in Composing an IT Assignment.pptx
What are the Main Obstacles in Composing an IT Assignment.pptxDesta Diallo
 

Semelhante a IT in 40 (20)

MTC FDP @ Bangalore on 02.02.2014 PPT-1
MTC FDP @ Bangalore on 02.02.2014 PPT-1MTC FDP @ Bangalore on 02.02.2014 PPT-1
MTC FDP @ Bangalore on 02.02.2014 PPT-1
 
The infrastructure and the Security Essentials of Information Technology in a...
The infrastructure and the Security Essentials of Information Technology in a...The infrastructure and the Security Essentials of Information Technology in a...
The infrastructure and the Security Essentials of Information Technology in a...
 
Information Technology
Information TechnologyInformation Technology
Information Technology
 
INFORMATION & TECHNOLOGY.pptx
INFORMATION & TECHNOLOGY.pptxINFORMATION & TECHNOLOGY.pptx
INFORMATION & TECHNOLOGY.pptx
 
Mohamed original
Mohamed originalMohamed original
Mohamed original
 
ITC Capabilities Brief 2012
ITC Capabilities Brief 2012ITC Capabilities Brief 2012
ITC Capabilities Brief 2012
 
TAIWOOCV
TAIWOOCVTAIWOOCV
TAIWOOCV
 
MoResume2015
MoResume2015MoResume2015
MoResume2015
 
Mohamed original(1)
Mohamed original(1)Mohamed original(1)
Mohamed original(1)
 
Introduction to Information and Education Technology 1
Introduction to Information and Education Technology 1Introduction to Information and Education Technology 1
Introduction to Information and Education Technology 1
 
Insight into IT Strategic Challenges
Insight into IT Strategic ChallengesInsight into IT Strategic Challenges
Insight into IT Strategic Challenges
 
Career guidance talk it makaut_ppt_sabyasachi mukhopadhyay
Career guidance talk it makaut_ppt_sabyasachi mukhopadhyayCareer guidance talk it makaut_ppt_sabyasachi mukhopadhyay
Career guidance talk it makaut_ppt_sabyasachi mukhopadhyay
 
Technology Trends & Your Career (Y4IT 2012)
Technology Trends & Your Career (Y4IT 2012)Technology Trends & Your Career (Y4IT 2012)
Technology Trends & Your Career (Y4IT 2012)
 
Means of ict
Means of ictMeans of ict
Means of ict
 
updatepdf16
updatepdf16updatepdf16
updatepdf16
 
The future work force in the ICT industry and why you need to act now
The future work force in the ICT industry and why you need to act nowThe future work force in the ICT industry and why you need to act now
The future work force in the ICT industry and why you need to act now
 
The best Definition of the IT updated 2023 document 5.docx
The best Definition of the IT updated 2023 document 5.docxThe best Definition of the IT updated 2023 document 5.docx
The best Definition of the IT updated 2023 document 5.docx
 
It presentation final1
It presentation final1It presentation final1
It presentation final1
 
System support engineer
System support engineerSystem support engineer
System support engineer
 
What are the Main Obstacles in Composing an IT Assignment.pptx
What are the Main Obstacles in Composing an IT Assignment.pptxWhat are the Main Obstacles in Composing an IT Assignment.pptx
What are the Main Obstacles in Composing an IT Assignment.pptx
 

Mais de Omar Bashir

Cloud migration challenges london ct os
Cloud migration challenges   london ct osCloud migration challenges   london ct os
Cloud migration challenges london ct osOmar Bashir
 
5 Software Development Lessons From a Mountaineer
5 Software Development Lessons From a Mountaineer5 Software Development Lessons From a Mountaineer
5 Software Development Lessons From a MountaineerOmar Bashir
 
Technology Agility
Technology AgilityTechnology Agility
Technology AgilityOmar Bashir
 
Quality Loopback
Quality LoopbackQuality Loopback
Quality LoopbackOmar Bashir
 
Achieving Technological Agility
Achieving Technological AgilityAchieving Technological Agility
Achieving Technological AgilityOmar Bashir
 
Technical Debt: Measured and Implied
Technical Debt: Measured and ImpliedTechnical Debt: Measured and Implied
Technical Debt: Measured and ImpliedOmar Bashir
 
Distilling Agile for Effective Execution
Distilling Agile for Effective ExecutionDistilling Agile for Effective Execution
Distilling Agile for Effective ExecutionOmar Bashir
 
Authorisation: Concepts and Implementation
Authorisation: Concepts and ImplementationAuthorisation: Concepts and Implementation
Authorisation: Concepts and ImplementationOmar Bashir
 
Coding for 11 Year Olds
Coding for 11 Year OldsCoding for 11 Year Olds
Coding for 11 Year OldsOmar Bashir
 
High Speed Networks - Applications in Finance
High Speed Networks - Applications in FinanceHigh Speed Networks - Applications in Finance
High Speed Networks - Applications in FinanceOmar Bashir
 
Functional Programming in Java 8
Functional Programming in Java 8Functional Programming in Java 8
Functional Programming in Java 8Omar Bashir
 
An Introduction to Java Compiler and Runtime
An Introduction to Java Compiler and RuntimeAn Introduction to Java Compiler and Runtime
An Introduction to Java Compiler and RuntimeOmar Bashir
 
Computing at Schools: A Guide to Parents
Computing at Schools: A Guide to ParentsComputing at Schools: A Guide to Parents
Computing at Schools: A Guide to ParentsOmar Bashir
 
Maths with Programming
Maths with ProgrammingMaths with Programming
Maths with ProgrammingOmar Bashir
 
Code Club Talk 2014
Code Club Talk 2014Code Club Talk 2014
Code Club Talk 2014Omar Bashir
 

Mais de Omar Bashir (17)

Cloud migration challenges london ct os
Cloud migration challenges   london ct osCloud migration challenges   london ct os
Cloud migration challenges london ct os
 
5 Software Development Lessons From a Mountaineer
5 Software Development Lessons From a Mountaineer5 Software Development Lessons From a Mountaineer
5 Software Development Lessons From a Mountaineer
 
Why Java ?
Why Java ?Why Java ?
Why Java ?
 
Technology Agility
Technology AgilityTechnology Agility
Technology Agility
 
Quality Loopback
Quality LoopbackQuality Loopback
Quality Loopback
 
Achieving Technological Agility
Achieving Technological AgilityAchieving Technological Agility
Achieving Technological Agility
 
Technical Debt: Measured and Implied
Technical Debt: Measured and ImpliedTechnical Debt: Measured and Implied
Technical Debt: Measured and Implied
 
Distilling Agile for Effective Execution
Distilling Agile for Effective ExecutionDistilling Agile for Effective Execution
Distilling Agile for Effective Execution
 
Authorisation: Concepts and Implementation
Authorisation: Concepts and ImplementationAuthorisation: Concepts and Implementation
Authorisation: Concepts and Implementation
 
SOLID Java Code
SOLID Java CodeSOLID Java Code
SOLID Java Code
 
Coding for 11 Year Olds
Coding for 11 Year OldsCoding for 11 Year Olds
Coding for 11 Year Olds
 
High Speed Networks - Applications in Finance
High Speed Networks - Applications in FinanceHigh Speed Networks - Applications in Finance
High Speed Networks - Applications in Finance
 
Functional Programming in Java 8
Functional Programming in Java 8Functional Programming in Java 8
Functional Programming in Java 8
 
An Introduction to Java Compiler and Runtime
An Introduction to Java Compiler and RuntimeAn Introduction to Java Compiler and Runtime
An Introduction to Java Compiler and Runtime
 
Computing at Schools: A Guide to Parents
Computing at Schools: A Guide to ParentsComputing at Schools: A Guide to Parents
Computing at Schools: A Guide to Parents
 
Maths with Programming
Maths with ProgrammingMaths with Programming
Maths with Programming
 
Code Club Talk 2014
Code Club Talk 2014Code Club Talk 2014
Code Club Talk 2014
 

Último

Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 

Último (20)

Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 

IT in 40

  • 2. The study and use of systems (mainly computers and telecommunications) for − capturing − processing − storing − retrieving − communicating
  • 3. IT and the World Mobile phones Computer games Streaming media Satellite navigation
  • 4. IT and the World
  • 5. Internet and the World Wide Web Internet A global network of networks. Connecting billions of computers together. World Wide Web A system of linking and displaying documents stored in computers connected to the Internet. Browsers used to display documents (web pages) and to access those linked.
  • 6. Did we forget computers?
  • 7. IT of the future
  • 8. IT of the future
  • 9. What is not Information Technology − Data entry − Typing reports − Drawing or manipulating images and pictures − Video and audio editing
  • 10. Famous Tech Personalities Steve Jobs Mark Zuckerberg Sir Tim Berners Lee Bill Gates Larry Page
  • 11. Famous Women in Technology Augusta Ada King Sara Haider Heather Payne Grace Hooper Parisa Tabriz Lisa Falzone Rachel Haot
  • 12. Techie Celebs Pop Quiz  You pass by naming them. You get an A by telling me why they are mentioned here.
  • 13. Careers in IT – Programmers Computers do not have any intelligence. They need to be programmed to perform any operation of any value or significance. Programs are lists of instructions in a languages that computers understand. Programmers are professionals who can design and then write these programs.
  • 14. Careers in IT – Business Analysts Computer programs solve real world problems. Business analysts or systems analysts communicate with all stake holders and clarify the requirements to programmers. This allows developing programs that fulfil user requirements as closely as possible. The objective is to deliver systems and services that add value.
  • 15. Careers in IT – Tech Support IT systems can be elaborate and under certain circumstances may not operate as desired. Tech support staff monitor the operation of all components of a system. Proactively rectify faults to ensure smooth operation. React swiftly to faults and failures to ensue continuity of operation.
  • 16. Careers in IT – Infrastructure Engineering Build and administer data centres. Layout networks and provide interconnectivity to business. Provide computational and storage capacity to their clients.
  • 17. Careers in IT – Cyber Security Secure businesses and individuals against hacking and denial of service attacks. Not entirely a technological issue, many breaches of security happen through phishing and social engineering.
  • 18. IT in Banks Transparent, accurate, reliable, timely and secure operation. Failures, business as well as technical are costly. Result in financial loss, reputational loss and loss of credibility. Automation of business relieves the business from mundane and repetitive tasks to focus on value generation. Technology ensures all business complies with regulation.
  • 19. IT in an Investment Bank Technology Banking, Sales and Trading OperationsFinanceAdministration Development, Support, Infrastructure, Security Trading Venues, Clients, Exchanges Connectivity, Security Rest of the World (WWW, Emails etc.) Connectivity, Security
  • 20. Road to a Tech Career • Relevant degree • HNC and HND • NVQs • Professional and technical certifications • Professional qualifications (BCS, IET) • Work experience • Internships • Volunteering in tech related charities.
  • 21. Tech Job Security • Off shoring and outsourcing risk • Usually labour intensive jobs moved to alternative locations with cheaper staff. • High valued and business strategic roles largely remain close to business. • Opportunities • Redefinition • Elevation • Relocation
  • 22. Tech Job Security • Obsolescence risk • Technology moves very fast. • Even evolution is revolutionary. • Any tech qualification loses half its relevance shortly after it is gained. • Significant opportunities to remain skilled in new technologies. • Opportunities to continue to specialise or progress. • Specialists have significant consulting and contracting opportunities locally and overseas. • Career progression allows taking on roles with greater responsibilities.
  • 23. The only limitation is imagination Be Simple Be Innovative Be Inventive