SlideShare una empresa de Scribd logo
1 de 16
INFORMATION
TECHNOLOGIES
USED IN
“SWORDFISH”
By – Kevin Joseph
MBA (Energy Trading)
500026236
Plot :
 Swordfish is a 2001 American thriller film

starring John Travolta, Hugh Jackman, Halle
Berry.
 The film centers around Stanley Jobson, an

ex-con computer hacker who is targeted for
recruitment into a bank robbery conspiracy
because of his formidable hacking skills.
Multiscreen systems
 It is the use of multiple

physical display devices, such
as monitors, televisions, and
projectors, in order to
increase the area available for
computer programs running
on a single computer system.

 The system can be run by a

single CPU or multiple CPUs

 Multi-head may increase the

productivity by up to 40-50%.
Super Computers


A supercomputer is a computer which
increases processing capacityparticularly speed of calculation.

These systems work in two ways :
 In one approach is a large number of
computers distributed across a
network devote some or all of their
time to solving a common problem
each individual computer receives and
completes many small
tasks, reporting the results to a
central server which integrates the
task results into the overall solution.
 In another approach, a large number
of dedicated processors are placed in
close proximity to each other; this
saves considerable time moving data
around and makes it possible for the
processors to work together, for
example in mesh architectures.

Cray Titan – 17.59 PetaFLOPS
Supercomputers are used
for a wide range of
computationally
intensive tasks in various
fields.
 Quantum mechanics.
 Weather forecasting
 Climate research
 Oil and gas exploration
 Molecular modeling
 Aerodynamics
 Counter-cryptography.

NUDT Tianha – 33.86 PetaFLOPS
Radio dog collar
 Used for tracking
 Works on radio waves
of particular frequency
 Has to be in Line of
sight
 Can be used as a

communication means
also.
Servers
 A server is a system that

responds to requests across a
computer network to provide a
network service.

 Servers are computer

programs running to serve the
requests of other
programs, the clients.
Thus, the server performs
some task on behalf of clients.

 Servers can be run on a

dedicated computer, which is
also often referred to as "the
server", but many networked
computers are capable of
hosting servers.

Typical computing servers are
• Database server
• File server
• Mail server
• Print server
• Web server
• Gaming server, etc.
Internet
 It is a global system of

interconnected computer
networks that use the
standard Internet protocol
suite (TCP/IP) to serve several
billion users worldwide.

 It is a network of networks
 Consists of millions of

private, public, academic, bus
iness, and government
networks, of local to global
scope, that are linked by a
broad array of
electronic, wireless and
optical networking
technologies.
Ciphering technology
 Cryptography
 Encoding and
Decoding of
Information
 Military
 Banks
 Educational
sectors(Exams)
Computer worms
 A worm is designed to

tunnel into your system
and allow malicious users
to control your computer
remotely.

 Does not require an

action to spread

 Can make multiple copies

of itself. (E-mail)

 Slows down computers n

networks significantly.
Transatlantic Telecommunication Cable
 A transatlantic
telecommunications
cable is a submarine
communications
cable running under

the Atlantic Ocean.
 All modern cables

use fiber
optic technology.
 Most such cables

connect London, Englan
d to New York City, USA

 Built mainly for high-

speed requirements of
international financial
transactions.

 Financial trading firms

spend billions of dollars
annually to get an edge
on trading
THANK YOU

Más contenido relacionado

La actualidad más candente

Chapter 4 computer networks
Chapter 4   computer networksChapter 4   computer networks
Chapter 4 computer networks
Pratik Gupta
 
Types of network
Types of networkTypes of network
Types of network
99111
 
Arpanet
ArpanetArpanet
Arpanet
smithz
 

La actualidad más candente (20)

Understanding Computer
Understanding ComputerUnderstanding Computer
Understanding Computer
 
Computer networking
Computer networkingComputer networking
Computer networking
 
types of networks
types of networkstypes of networks
types of networks
 
Lan and wan
Lan and wanLan and wan
Lan and wan
 
Computer Applications - The Basic Computer Networking
Computer Applications - The Basic Computer NetworkingComputer Applications - The Basic Computer Networking
Computer Applications - The Basic Computer Networking
 
Chapter 4 computer networks
Chapter 4   computer networksChapter 4   computer networks
Chapter 4 computer networks
 
Introduction to computer networks & it’s usage
Introduction to computer networks & it’s usageIntroduction to computer networks & it’s usage
Introduction to computer networks & it’s usage
 
Computer network note
Computer network noteComputer network note
Computer network note
 
File & Printer Sharing
File & Printer SharingFile & Printer Sharing
File & Printer Sharing
 
File sharing technlogies
File sharing technlogiesFile sharing technlogies
File sharing technlogies
 
Itc lec 11 Network , Uses , Types
Itc lec 11 Network , Uses , Types                                  Itc lec 11 Network , Uses , Types
Itc lec 11 Network , Uses , Types
 
Network and it's Uses
Network and it's UsesNetwork and it's Uses
Network and it's Uses
 
Communication
CommunicationCommunication
Communication
 
What is a computer network
What is a computer networkWhat is a computer network
What is a computer network
 
Types of network
Types of networkTypes of network
Types of network
 
NETWORK,INTERNET & WWW ppt
NETWORK,INTERNET & WWW pptNETWORK,INTERNET & WWW ppt
NETWORK,INTERNET & WWW ppt
 
Designing A LAN WAN MAN Sollution
Designing A LAN WAN MAN SollutionDesigning A LAN WAN MAN Sollution
Designing A LAN WAN MAN Sollution
 
FUNDAMENTAL OF NETWORK
FUNDAMENTAL OF NETWORKFUNDAMENTAL OF NETWORK
FUNDAMENTAL OF NETWORK
 
Arpanet
ArpanetArpanet
Arpanet
 
PROFESSIONAL SLIDES
PROFESSIONAL SLIDESPROFESSIONAL SLIDES
PROFESSIONAL SLIDES
 

Similar a Information technologies used in “swordfish”

L25 network fundamentals
L25   network fundamentalsL25   network fundamentals
L25 network fundamentals
heidirobison
 
1. What is IT infrastructure and what are its components2.What ar.pdf
1. What is IT infrastructure and what are its components2.What ar.pdf1. What is IT infrastructure and what are its components2.What ar.pdf
1. What is IT infrastructure and what are its components2.What ar.pdf
expressionnoveltiesk
 
Connecting Hardware Peripherals Level 1 Ver 2 - Copy.pdf
Connecting Hardware Peripherals Level 1 Ver 2 - Copy.pdfConnecting Hardware Peripherals Level 1 Ver 2 - Copy.pdf
Connecting Hardware Peripherals Level 1 Ver 2 - Copy.pdf
EYOHAICTMEDIA
 

Similar a Information technologies used in “swordfish” (20)

Notes for banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationxNotes for  banking railway opsc psc preparationx
Notes for banking railway opsc psc preparationx
 
Modules1
Modules1Modules1
Modules1
 
L25 network fundamentals
L25   network fundamentalsL25   network fundamentals
L25 network fundamentals
 
1. What is IT infrastructure and what are its components2.What ar.pdf
1. What is IT infrastructure and what are its components2.What ar.pdf1. What is IT infrastructure and what are its components2.What ar.pdf
1. What is IT infrastructure and what are its components2.What ar.pdf
 
Komputasi Awan
Komputasi AwanKomputasi Awan
Komputasi Awan
 
top LLB university in Delhi NCR.pdf
top LLB university in Delhi NCR.pdftop LLB university in Delhi NCR.pdf
top LLB university in Delhi NCR.pdf
 
Computer
ComputerComputer
Computer
 
1.intro. to distributed system
1.intro. to distributed system1.intro. to distributed system
1.intro. to distributed system
 
Knowledge on IT Infrastructure
Knowledge on IT InfrastructureKnowledge on IT Infrastructure
Knowledge on IT Infrastructure
 
Distributed Computing system
Distributed Computing system Distributed Computing system
Distributed Computing system
 
COMPUTER NETWORK.pptx
COMPUTER NETWORK.pptxCOMPUTER NETWORK.pptx
COMPUTER NETWORK.pptx
 
Presentation-1.ppt
Presentation-1.pptPresentation-1.ppt
Presentation-1.ppt
 
2_Virtualization.pptx
2_Virtualization.pptx2_Virtualization.pptx
2_Virtualization.pptx
 
00 - BigData-Chapter_01-PDC.pdf
00 - BigData-Chapter_01-PDC.pdf00 - BigData-Chapter_01-PDC.pdf
00 - BigData-Chapter_01-PDC.pdf
 
CloudComputing_UNIT1.pdf
CloudComputing_UNIT1.pdfCloudComputing_UNIT1.pdf
CloudComputing_UNIT1.pdf
 
CloudComputing_UNIT1.pdf
CloudComputing_UNIT1.pdfCloudComputing_UNIT1.pdf
CloudComputing_UNIT1.pdf
 
Computer Networking Theory Assignment 1
Computer Networking Theory Assignment 1Computer Networking Theory Assignment 1
Computer Networking Theory Assignment 1
 
Connecting Hardware Peripherals Level 1 Ver 2 - Copy.pdf
Connecting Hardware Peripherals Level 1 Ver 2 - Copy.pdfConnecting Hardware Peripherals Level 1 Ver 2 - Copy.pdf
Connecting Hardware Peripherals Level 1 Ver 2 - Copy.pdf
 
Internet.pdf
Internet.pdfInternet.pdf
Internet.pdf
 
10 New Web Application and Security.pptx
10 New Web Application and Security.pptx10 New Web Application and Security.pptx
10 New Web Application and Security.pptx
 

Más de Kevin Philip Joseph

The role of information technologies & information system in business
The role of information technologies & information system in businessThe role of information technologies & information system in business
The role of information technologies & information system in business
Kevin Philip Joseph
 
Ship terminologies – organizations & chartering
Ship terminologies – organizations & charteringShip terminologies – organizations & chartering
Ship terminologies – organizations & chartering
Kevin Philip Joseph
 
Information systems used in barista briggo
Information systems used in barista   briggoInformation systems used in barista   briggo
Information systems used in barista briggo
Kevin Philip Joseph
 
Competing information systems used in emirates
Competing information systems used in emiratesCompeting information systems used in emirates
Competing information systems used in emirates
Kevin Philip Joseph
 
Causes and consequences of managerial failure in rapidly changing organizations
Causes and consequences of managerial failure in rapidly changing organizations Causes and consequences of managerial failure in rapidly changing organizations
Causes and consequences of managerial failure in rapidly changing organizations
Kevin Philip Joseph
 
Storage devices in computer systems
Storage devices in computer systemsStorage devices in computer systems
Storage devices in computer systems
Kevin Philip Joseph
 

Más de Kevin Philip Joseph (10)

The role of information technologies & information system in business
The role of information technologies & information system in businessThe role of information technologies & information system in business
The role of information technologies & information system in business
 
Solar energy
Solar energySolar energy
Solar energy
 
Shipping terminologies
Shipping terminologiesShipping terminologies
Shipping terminologies
 
Ship terminologies – organizations & chartering
Ship terminologies – organizations & charteringShip terminologies – organizations & chartering
Ship terminologies – organizations & chartering
 
Opec to affect future
Opec to affect futureOpec to affect future
Opec to affect future
 
Maritime - Practitioners
Maritime - PractitionersMaritime - Practitioners
Maritime - Practitioners
 
Information systems used in barista briggo
Information systems used in barista   briggoInformation systems used in barista   briggo
Information systems used in barista briggo
 
Competing information systems used in emirates
Competing information systems used in emiratesCompeting information systems used in emirates
Competing information systems used in emirates
 
Causes and consequences of managerial failure in rapidly changing organizations
Causes and consequences of managerial failure in rapidly changing organizations Causes and consequences of managerial failure in rapidly changing organizations
Causes and consequences of managerial failure in rapidly changing organizations
 
Storage devices in computer systems
Storage devices in computer systemsStorage devices in computer systems
Storage devices in computer systems
 

Último

Último (20)

Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 

Information technologies used in “swordfish”

  • 1. INFORMATION TECHNOLOGIES USED IN “SWORDFISH” By – Kevin Joseph MBA (Energy Trading) 500026236
  • 2. Plot :  Swordfish is a 2001 American thriller film starring John Travolta, Hugh Jackman, Halle Berry.  The film centers around Stanley Jobson, an ex-con computer hacker who is targeted for recruitment into a bank robbery conspiracy because of his formidable hacking skills.
  • 3.
  • 4. Multiscreen systems  It is the use of multiple physical display devices, such as monitors, televisions, and projectors, in order to increase the area available for computer programs running on a single computer system.  The system can be run by a single CPU or multiple CPUs  Multi-head may increase the productivity by up to 40-50%.
  • 5. Super Computers  A supercomputer is a computer which increases processing capacityparticularly speed of calculation. These systems work in two ways :  In one approach is a large number of computers distributed across a network devote some or all of their time to solving a common problem each individual computer receives and completes many small tasks, reporting the results to a central server which integrates the task results into the overall solution.  In another approach, a large number of dedicated processors are placed in close proximity to each other; this saves considerable time moving data around and makes it possible for the processors to work together, for example in mesh architectures. Cray Titan – 17.59 PetaFLOPS
  • 6. Supercomputers are used for a wide range of computationally intensive tasks in various fields.  Quantum mechanics.  Weather forecasting  Climate research  Oil and gas exploration  Molecular modeling  Aerodynamics  Counter-cryptography. NUDT Tianha – 33.86 PetaFLOPS
  • 7. Radio dog collar  Used for tracking  Works on radio waves of particular frequency  Has to be in Line of sight  Can be used as a communication means also.
  • 8. Servers  A server is a system that responds to requests across a computer network to provide a network service.  Servers are computer programs running to serve the requests of other programs, the clients. Thus, the server performs some task on behalf of clients.  Servers can be run on a dedicated computer, which is also often referred to as "the server", but many networked computers are capable of hosting servers. Typical computing servers are • Database server • File server • Mail server • Print server • Web server • Gaming server, etc.
  • 9. Internet  It is a global system of interconnected computer networks that use the standard Internet protocol suite (TCP/IP) to serve several billion users worldwide.  It is a network of networks  Consists of millions of private, public, academic, bus iness, and government networks, of local to global scope, that are linked by a broad array of electronic, wireless and optical networking technologies.
  • 10.
  • 11. Ciphering technology  Cryptography  Encoding and Decoding of Information  Military  Banks  Educational sectors(Exams)
  • 12. Computer worms  A worm is designed to tunnel into your system and allow malicious users to control your computer remotely.  Does not require an action to spread  Can make multiple copies of itself. (E-mail)  Slows down computers n networks significantly.
  • 13. Transatlantic Telecommunication Cable  A transatlantic telecommunications cable is a submarine communications cable running under the Atlantic Ocean.  All modern cables use fiber optic technology.
  • 14.  Most such cables connect London, Englan d to New York City, USA  Built mainly for high- speed requirements of international financial transactions.  Financial trading firms spend billions of dollars annually to get an edge on trading
  • 15.