SlideShare uma empresa Scribd logo
1 de 33
tech next . By  PARTH THAKAR For KES College. On 29/07/2010 KANDIVALI
Agenda Need  for Future Technologies. Why Tech Next Technologies. Benefits for the students Technologies of the future. Q & A  KANDIVALI
Need  for  Future Technologies …? KANDIVALI
KANDIVALI
Technologies of the future. KANDIVALI
 
[object Object],KANDIVALI
KANDIVALI
Why Tech Next Technologies.
KANDIVALI
KANDIVALI
KANDIVALI Hardware Virtualization Storage Virtualization Data Center  Web/SSL External Partner Orgs – Branch Offices  CORP OFFICE Remote Workers Secure access  ,[object Object],[object Object],[object Object],[object Object],[object Object],Server  Virtualization Solution - Virtualization
KANDIVALI
System Workload (Operating System, Applications, Data) KANDIVALI
KANDIVALI
KANDIVALI
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],KANDIVALI
KANDIVALI
KANDIVALI
KANDIVALI
A nightmare for every individual… Is their network Secure? It really depends on the methods used to secure it KANDIVALI
[object Object],[object Object],[object Object],[object Object],[object Object],KANDIVALI
[object Object],[object Object],[object Object],[object Object],[object Object],KANDIVALI
 
KANDIVALI
NIIT …..
 
 
 
472 297 131 225 279 801
 
KANDIVALI ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object]

Mais conteúdo relacionado

Destaque

Dia de la mujer
Dia de la mujerDia de la mujer
Dia de la mujerbejerez
 
Tics por micael
Tics por micaelTics por micael
Tics por micaelmikae123
 
Anunci cervesa heineken
Anunci cervesa heinekenAnunci cervesa heineken
Anunci cervesa heinekencosminneitor
 
Albert Einstein
Albert EinsteinAlbert Einstein
Albert EinsteinNarohim
 
Modelo padrão de cálculo do capital adicional baseado no risco de subscrição...
Modelo padrão de cálculo do capital adicional baseado no  risco de subscrição...Modelo padrão de cálculo do capital adicional baseado no  risco de subscrição...
Modelo padrão de cálculo do capital adicional baseado no risco de subscrição...Universidade Federal Fluminense
 
Sales line company_profile_candidati
Sales line company_profile_candidatiSales line company_profile_candidati
Sales line company_profile_candidatiSales Line srl
 
F1 professional growth plan 9.23.09
F1 professional growth plan 9.23.09F1 professional growth plan 9.23.09
F1 professional growth plan 9.23.09gnonewleaders
 
Securing online services by combining smart cards and web-based applications
Securing online services by combining smart cards and web-based applicationsSecuring online services by combining smart cards and web-based applications
Securing online services by combining smart cards and web-based applicationsOlivier Potonniée
 
DOCTRINA MONROE Y DESTINO MANIFIESTO.
DOCTRINA MONROE Y DESTINO MANIFIESTO.DOCTRINA MONROE Y DESTINO MANIFIESTO.
DOCTRINA MONROE Y DESTINO MANIFIESTO.armando1957
 
Life insurance 101- Basics for Beginners
Life insurance 101- Basics for BeginnersLife insurance 101- Basics for Beginners
Life insurance 101- Basics for BeginnersJoan Mullally
 

Destaque (14)

Dia de la mujer
Dia de la mujerDia de la mujer
Dia de la mujer
 
Tics por micael
Tics por micaelTics por micael
Tics por micael
 
Barcelona
BarcelonaBarcelona
Barcelona
 
Anunci cervesa heineken
Anunci cervesa heinekenAnunci cervesa heineken
Anunci cervesa heineken
 
Albert Einstein
Albert EinsteinAlbert Einstein
Albert Einstein
 
100 Ideer
100 Ideer100 Ideer
100 Ideer
 
LAUKSVA Presentation
LAUKSVA PresentationLAUKSVA Presentation
LAUKSVA Presentation
 
Modelo padrão de cálculo do capital adicional baseado no risco de subscrição...
Modelo padrão de cálculo do capital adicional baseado no  risco de subscrição...Modelo padrão de cálculo do capital adicional baseado no  risco de subscrição...
Modelo padrão de cálculo do capital adicional baseado no risco de subscrição...
 
Sales line company_profile_candidati
Sales line company_profile_candidatiSales line company_profile_candidati
Sales line company_profile_candidati
 
Arter Kan Gazları
Arter Kan  Gazları Arter Kan  Gazları
Arter Kan Gazları
 
F1 professional growth plan 9.23.09
F1 professional growth plan 9.23.09F1 professional growth plan 9.23.09
F1 professional growth plan 9.23.09
 
Securing online services by combining smart cards and web-based applications
Securing online services by combining smart cards and web-based applicationsSecuring online services by combining smart cards and web-based applications
Securing online services by combining smart cards and web-based applications
 
DOCTRINA MONROE Y DESTINO MANIFIESTO.
DOCTRINA MONROE Y DESTINO MANIFIESTO.DOCTRINA MONROE Y DESTINO MANIFIESTO.
DOCTRINA MONROE Y DESTINO MANIFIESTO.
 
Life insurance 101- Basics for Beginners
Life insurance 101- Basics for BeginnersLife insurance 101- Basics for Beginners
Life insurance 101- Basics for Beginners
 

Semelhante a Technext presentation

Networkshop42 2014 by Kelly Scott
Networkshop42 2014 by Kelly Scott Networkshop42 2014 by Kelly Scott
Networkshop42 2014 by Kelly Scott DataIntegration
 
iPads on your network? Take Control with Unified Policy and Management
iPads on your network? Take Control with Unified Policy and ManagementiPads on your network? Take Control with Unified Policy and Management
iPads on your network? Take Control with Unified Policy and ManagementCisco Mobility
 
Goodbye CLI, hello API: Leveraging network programmability in security incid...
Goodbye CLI, hello API:  Leveraging network programmability in security incid...Goodbye CLI, hello API:  Leveraging network programmability in security incid...
Goodbye CLI, hello API: Leveraging network programmability in security incid...Joel W. King
 
The next generation ethernet gangster (part 3)
The next generation ethernet gangster (part 3)The next generation ethernet gangster (part 3)
The next generation ethernet gangster (part 3)Jeff Green
 
Enabling Cloud Computing
Enabling Cloud ComputingEnabling Cloud Computing
Enabling Cloud Computingtntsa1972
 
Neudesic IoT HIMSS Healthcare
Neudesic IoT HIMSS HealthcareNeudesic IoT HIMSS Healthcare
Neudesic IoT HIMSS HealthcareMike Rossi
 
LinuxCon North America 2013: Why Lease When You Can Buy Your Cloud
LinuxCon North America 2013: Why Lease When You Can Buy Your CloudLinuxCon North America 2013: Why Lease When You Can Buy Your Cloud
LinuxCon North America 2013: Why Lease When You Can Buy Your CloudMark Hinkle
 
Six things to take into account when choosing cloud solutions
Six things to take into account when choosing cloud solutionsSix things to take into account when choosing cloud solutions
Six things to take into account when choosing cloud solutionsF-Secure Corporation
 
Palo alto networks next generation firewalls
Palo alto networks next generation firewallsPalo alto networks next generation firewalls
Palo alto networks next generation firewallsCastleforce
 
Infrastructure Strategy Plan
Infrastructure Strategy Plan Infrastructure Strategy Plan
Infrastructure Strategy Plan Tarry Singh
 
WSO2Con EU 2015: IoT in Finance
WSO2Con EU 2015: IoT in FinanceWSO2Con EU 2015: IoT in Finance
WSO2Con EU 2015: IoT in FinanceWSO2
 
TIBCO Silver at the SOA Forum in Paris Oct 6 2009
TIBCO Silver at the SOA Forum in Paris Oct 6 2009TIBCO Silver at the SOA Forum in Paris Oct 6 2009
TIBCO Silver at the SOA Forum in Paris Oct 6 2009sfarestam
 
QA in Cloud world & DevOps
QA in Cloud world & DevOpsQA in Cloud world & DevOps
QA in Cloud world & DevOpsDudi Vaanunu
 
Dell NVIDIA AI Roadshow - South Western Ontario
Dell NVIDIA AI Roadshow - South Western OntarioDell NVIDIA AI Roadshow - South Western Ontario
Dell NVIDIA AI Roadshow - South Western OntarioBill Wong
 
Cloud Expo Silicon Valley 2013 | Why Lease When You Can Buy Your Cloud
Cloud Expo Silicon Valley 2013 | Why Lease When You Can Buy Your CloudCloud Expo Silicon Valley 2013 | Why Lease When You Can Buy Your Cloud
Cloud Expo Silicon Valley 2013 | Why Lease When You Can Buy Your CloudMark Hinkle
 
The next generation ethernet gangster (part 3)
The next generation ethernet gangster (part 3)The next generation ethernet gangster (part 3)
The next generation ethernet gangster (part 3)Jeff Green
 
Embracing Failure - AzureDay Rome
Embracing Failure - AzureDay RomeEmbracing Failure - AzureDay Rome
Embracing Failure - AzureDay RomeAlberto Acerbis
 

Semelhante a Technext presentation (20)

Networkshop42 2014 by Kelly Scott
Networkshop42 2014 by Kelly Scott Networkshop42 2014 by Kelly Scott
Networkshop42 2014 by Kelly Scott
 
iPads on your network? Take Control with Unified Policy and Management
iPads on your network? Take Control with Unified Policy and ManagementiPads on your network? Take Control with Unified Policy and Management
iPads on your network? Take Control with Unified Policy and Management
 
Goodbye CLI, hello API: Leveraging network programmability in security incid...
Goodbye CLI, hello API:  Leveraging network programmability in security incid...Goodbye CLI, hello API:  Leveraging network programmability in security incid...
Goodbye CLI, hello API: Leveraging network programmability in security incid...
 
The next generation ethernet gangster (part 3)
The next generation ethernet gangster (part 3)The next generation ethernet gangster (part 3)
The next generation ethernet gangster (part 3)
 
Enabling Cloud Computing
Enabling Cloud ComputingEnabling Cloud Computing
Enabling Cloud Computing
 
Neudesic IoT HIMSS Healthcare
Neudesic IoT HIMSS HealthcareNeudesic IoT HIMSS Healthcare
Neudesic IoT HIMSS Healthcare
 
LinuxCon North America 2013: Why Lease When You Can Buy Your Cloud
LinuxCon North America 2013: Why Lease When You Can Buy Your CloudLinuxCon North America 2013: Why Lease When You Can Buy Your Cloud
LinuxCon North America 2013: Why Lease When You Can Buy Your Cloud
 
Six things to take into account when choosing cloud solutions
Six things to take into account when choosing cloud solutionsSix things to take into account when choosing cloud solutions
Six things to take into account when choosing cloud solutions
 
Palo alto networks next generation firewalls
Palo alto networks next generation firewallsPalo alto networks next generation firewalls
Palo alto networks next generation firewalls
 
Integra presentation
Integra presentationIntegra presentation
Integra presentation
 
Infrastructure Strategy Plan
Infrastructure Strategy Plan Infrastructure Strategy Plan
Infrastructure Strategy Plan
 
WSO2Con EU 2015: IoT in Finance
WSO2Con EU 2015: IoT in FinanceWSO2Con EU 2015: IoT in Finance
WSO2Con EU 2015: IoT in Finance
 
Cloud ID
Cloud IDCloud ID
Cloud ID
 
TIBCO Silver at the SOA Forum in Paris Oct 6 2009
TIBCO Silver at the SOA Forum in Paris Oct 6 2009TIBCO Silver at the SOA Forum in Paris Oct 6 2009
TIBCO Silver at the SOA Forum in Paris Oct 6 2009
 
QA in Cloud world & DevOps
QA in Cloud world & DevOpsQA in Cloud world & DevOps
QA in Cloud world & DevOps
 
Dell NVIDIA AI Roadshow - South Western Ontario
Dell NVIDIA AI Roadshow - South Western OntarioDell NVIDIA AI Roadshow - South Western Ontario
Dell NVIDIA AI Roadshow - South Western Ontario
 
Cloud Expo Silicon Valley 2013 | Why Lease When You Can Buy Your Cloud
Cloud Expo Silicon Valley 2013 | Why Lease When You Can Buy Your CloudCloud Expo Silicon Valley 2013 | Why Lease When You Can Buy Your Cloud
Cloud Expo Silicon Valley 2013 | Why Lease When You Can Buy Your Cloud
 
The next generation ethernet gangster (part 3)
The next generation ethernet gangster (part 3)The next generation ethernet gangster (part 3)
The next generation ethernet gangster (part 3)
 
Embracing Failure - AzureDay Rome
Embracing Failure - AzureDay RomeEmbracing Failure - AzureDay Rome
Embracing Failure - AzureDay Rome
 
To cloud or not to cloud
To cloud or not to cloudTo cloud or not to cloud
To cloud or not to cloud
 

Mais de PARTH THAKAR

Cmc tech hne v2 for college seminar
Cmc tech hne v2 for college seminar Cmc tech hne v2 for college seminar
Cmc tech hne v2 for college seminar PARTH THAKAR
 
EDGE for students (india)
EDGE for students (india)EDGE for students (india)
EDGE for students (india)PARTH THAKAR
 
5min social networ/media marketing..
5min social networ/media marketing..5min social networ/media marketing..
5min social networ/media marketing..PARTH THAKAR
 
Use Of I.T. In Agriculture
Use Of I.T. In AgricultureUse Of I.T. In Agriculture
Use Of I.T. In AgriculturePARTH THAKAR
 
Use Of I.T. In Agriculture
Use Of I.T. In AgricultureUse Of I.T. In Agriculture
Use Of I.T. In AgriculturePARTH THAKAR
 

Mais de PARTH THAKAR (6)

Cmc tech hne v2 for college seminar
Cmc tech hne v2 for college seminar Cmc tech hne v2 for college seminar
Cmc tech hne v2 for college seminar
 
EDGE for students (india)
EDGE for students (india)EDGE for students (india)
EDGE for students (india)
 
CMC Ltd. CJET
CMC Ltd. CJETCMC Ltd. CJET
CMC Ltd. CJET
 
5min social networ/media marketing..
5min social networ/media marketing..5min social networ/media marketing..
5min social networ/media marketing..
 
Use Of I.T. In Agriculture
Use Of I.T. In AgricultureUse Of I.T. In Agriculture
Use Of I.T. In Agriculture
 
Use Of I.T. In Agriculture
Use Of I.T. In AgricultureUse Of I.T. In Agriculture
Use Of I.T. In Agriculture
 

Último

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 

Último (20)

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 

Technext presentation

Notas do Editor

  1. As there can be many reasons but the major is GLOBAL WARMING and global resesion. Third Is INTERNET (show Internet States)
  2. Before we start let me ask you Is technology is in your DNA. (This will help to find out the mood of the audience if they are tech savvy) i.e. Have you heard about the new technologies which are ready to rule the WORLD !
  3. So these are the six technologies of the future and we will discuss of these technologies today.
  4. The biggest concern area for organizations these days is how they can optimize the performance of their IT resources but by implementing less IT resources. More over, there are multiple/different requirements of different work force regarding operating system/
  5. OS – Operating system Apps - Applications
  6. Reduction in IT infrastructure leads to reduction in overall IT infrastructure costs. Since less infrastructure is used there is less utilization of energy which leads to Greener IT deployment. Since there is less infrastructure to manage so proper and enhanced disaster management systems like backup/data mirroring techniques can be implemented. Organizations need not implement multiple servers as workload can be shared using centralized server architecture with enhanced processing/storage capabilities. Since most of the data resides on same host so security is better. Maintenance of the resources is also easy. Since there is less IT infrastructure so Migration from one system to another can be easily done if required and also better disaster management capabilities can be build.
  7. Cloud computing is the provision of dynamically scalable and often virtualized resources as a service over the Internet . Users need not have knowledge of, expertise in, or control over the technology infrastructure in the "cloud" that supports them. Cloud computing services often provide common business applications online that are accessed from a web browser , while the software and data are stored on the servers . Some of the live examples of cloud computing is google apps, google docs etc where we use application over the cloud (internet)
  8. Cloud computing customers do not generally own the physical infrastructure serving as host to the software platform in question. Instead, they avoid capital expenditure by renting usage from a third-party provider. They consume resources as a service and pay only for resources that they use. Many cloud-computing offerings employ the utility computing model, which is analogous to how traditional utility services (such as electricity ) are consumed, while others bill on a subscription basis.
  9. Since most of our business/personal data travels over the network so most of the organizations are worried about the misuse of this important data if it is taken away by someone through hacking. Organizations are implementing many methods to make their network secure and ethical hacking has a big role to play in this
  10. Ethical Hacker Legal attempt to break into a company’s network to find its weakest link More than an attempt to break in; also includes analyzing company’s security policy and procedures Tester offers solutions to secure or protect the network