SlideShare una empresa de Scribd logo
1 de 20
Descargar para leer sin conexión
EMERGING TRENDS IN
INFORMATION TECHNOLOGY
PRESENTED TO YOU BY :
MR. SHIV KUMAR
BCA 5TH SEM.
1822562
WHAT IS INFORMATION TECHNOLOGY ?
ITAA (Information Technology
Association of America) defined
information technology as being the
study, design, development,
implementation, support and/or
management of any computer based
information system.
TOP INFORMATION TECHNOLOGY TRENDS FOR 2020
Artificial Intelligence (AI)
Machine Learning
Robotic Process Automation or RPA
Edge Computing
Virtual Reality and Augmented Reality
Cybersecurity
Blockchain
Internet of Things (IoT)
ARTIFICIAL INTELLIGENCE (AI)
AI refers to computer systems built to mimic human intelligence and
perform tasks such as
• recognition of images,
• speech or patterns,
• decision making,
• and many more…
AI can do these tasks faster and more accurate than humans.
AI is used in
• Navigation apps
• Streaming services
• Smartphone personal assistants
• Ride-sharing apps
• Home personal assistants
• Smart home devices
• Schedule trains
• Assess business risks
• Predict maintenance
• Improve energy efficiency, among many other money-
saving tasks
• and lots of more.
MACHINE LEARNING : A SUBSET OF AI
• With Machine Learning, computers are programmed to learn to do
something they are not programmed to do: they learn by
discovering patterns and insights from data.
• It is achieved by historic data, statistics and sophisticated
algorithms.
• In general, we have two types of learning, supervised and
unsupervised.
Subsets of Machine Learning are:
• Neural networks
• Natural language processing (NLP)
• Deep learning
Each of these subsets offers an opportunity for
specializing in a career field that will only grow.
Machine Learning powers:
• Web search results
• Real-time ads
• Network Intrusion Detection
• And lots of more…
ROBOTIC PROCESS AUTOMATION OR RPA
RPA is the use of software to automate business processes such as:
• Interpreting applications
• Processing transactions
• Dealing with data
• and even Replying to emails.
Primary focus of RPA is to automate repetitive tasks that people
used to do.
RPA career opportunities in RPA:
• Developer
• Project Manager
• Business Analyst
• Solution Architect
• Consultant.
EDGE COMPUTING
• Edge computing is a distributed, open IT architecture that features
decentralised processing power, enabling mobile computing
and Internet of Things (IoT) technologies.
• In edge computing, data is processed by the device itself or by a local
computer or server, rather than being transmitted to a data centre.
Edge computing allows
• Efficient data processing near the source
• Reducing Internet bandwidth usage.
It eliminates costs and ensures that
applications can be used effectively in remote
locations.
The ability to process data without ever
putting it into a public cloud adds a useful
layer of security for sensitive data.
VIRTUAL REALITY AND AUGMENTED REALITY
• Virtual Reality (VR) immerses the user in an environment while
Augment Reality (AR) enhances their environment.
• VR has primarily been used for gaming thus far, it has also been used for
training, as with VirtualShip, a simulation software used to train U.S.
Navy, Army, and Coast Guard ship captains.
• The popular Pokemon Go is an example of AR.
Uses of VR and AR :
• Training
• Entertainment
• Education
• Marketing
• Offers museum-goers a deeper
experience
• Enhance theme parks
CYBERSECURITY
• Cybersecurity is evolving just as other technologies are. That’s in part
because threats are constantly new.
• The mean hackers who are trying to illegally access data are not going to
give up any time soon, and they will continue to find ways to get through
even the toughest security measures.
• It’s also in part because new technology is being adapted to enhance
security.
• As long as we have hackers, we will have cyber security as an emerging
technology because it will constantly evolve to defend against those
hackers.
There is strong need for cybersecurity
professionals, So the number of
cybersecurity jobs is growing three times
faster than other tech jobs.
Roles in Cybersecurity:
• Ethical Hacker
• Security Engineer
• Chief Security Officer
BLOCKCHAIN
• Blockchain can be described as data you can only add to, not take
away from or change. Hence the term “chain” because we’re
making a chain of data.
• Blockchains are consensus-driven, so no one entity can take
control of the data.
• With blockchain, we don’t need a trusted third-party to oversee or
validate transactions.
• Most people think of blockchain
technology in relation to cryptocurrencies
such as Bitcoin, Ethereum, Litecoin are
blockchain, but it is a part of blockchain.
• A blockchain developer specializes in
developing and implementing architecture
and solutions using blockchain technology
INTERNET OF THINGS (IOT)
• IOT is an Intelligent interactivity between human and smart devices to
exchange information and knowledge for new value creation.
• Many “smart devices” are now being built with WiFi or bluetooth
connectivity, meaning they can be connected to the Internet or other
source and to each other.
• The IoT enable better safety, efficiency, and decision making for
businesses as data is collected and analysed.
• It enable predictive maintenance, speed up medical care, improve
customer service, and offer benefits we haven’t even imagined yet.
The Internet of Things is used in
• Connected appliances
• Smart home security systems
• Smart Vehicles
• Autonomous farming equipment
• Wearable health monitors
• Smart factory equipments
• Wireless inventory trackers
• Ultra-high speed wireless internet
• Biometric cybersecurity scanners
We’re only in the beginning stages of IOT.
THANK YOU!
INFORMATION GATHERED FROM : SIMPLILEARN.COM
GOOGLE

Más contenido relacionado

La actualidad más candente

Cybersecurity Issues and Challenges
Cybersecurity Issues and ChallengesCybersecurity Issues and Challenges
Cybersecurity Issues and Challenges
Tam Nguyen
 
Internet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An IcebergInternet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An Iceberg
Dr. Mazlan Abbas
 
INTRODUCTION TO ICT
INTRODUCTION TO ICTINTRODUCTION TO ICT
INTRODUCTION TO ICT
Kak Yong
 
1.1 introduction to it and development of it
1.1 introduction to it and development of it1.1 introduction to it and development of it
1.1 introduction to it and development of it
KMJ Science Computer
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
Jagan Nath
 

La actualidad más candente (20)

E commerce ppt
E commerce pptE commerce ppt
E commerce ppt
 
Cybersecurity Issues and Challenges
Cybersecurity Issues and ChallengesCybersecurity Issues and Challenges
Cybersecurity Issues and Challenges
 
Internet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An IcebergInternet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An Iceberg
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
 
INTRODUCTION TO ICT
INTRODUCTION TO ICTINTRODUCTION TO ICT
INTRODUCTION TO ICT
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
information technology
information technology information technology
information technology
 
Cyber security
Cyber securityCyber security
Cyber security
 
1.1 introduction to it and development of it
1.1 introduction to it and development of it1.1 introduction to it and development of it
1.1 introduction to it and development of it
 
ppt on WIFI
ppt on WIFIppt on WIFI
ppt on WIFI
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Software Agents & Their Taxonomy | Ecommerce BBA Handout
Software Agents & Their Taxonomy | Ecommerce BBA HandoutSoftware Agents & Their Taxonomy | Ecommerce BBA Handout
Software Agents & Their Taxonomy | Ecommerce BBA Handout
 
Cyber law-it-act-2000
Cyber law-it-act-2000Cyber law-it-act-2000
Cyber law-it-act-2000
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Hygiene
Cyber HygieneCyber Hygiene
Cyber Hygiene
 
Internet of Things(IOT)_Seminar_Dr.G.Rajeshkumar
Internet of Things(IOT)_Seminar_Dr.G.RajeshkumarInternet of Things(IOT)_Seminar_Dr.G.Rajeshkumar
Internet of Things(IOT)_Seminar_Dr.G.Rajeshkumar
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Latest trends in information technology
Latest trends in information technologyLatest trends in information technology
Latest trends in information technology
 

Similar a Emerging trends in information technology

Iot-Internet-of-Things-ppt.pptx
Iot-Internet-of-Things-ppt.pptxIot-Internet-of-Things-ppt.pptx
Iot-Internet-of-Things-ppt.pptx
Selva914004
 

Similar a Emerging trends in information technology (20)

Deep dive in to modern it technology
Deep dive in to modern it technologyDeep dive in to modern it technology
Deep dive in to modern it technology
 
Career Domain 2022-23.pptx
Career Domain 2022-23.pptxCareer Domain 2022-23.pptx
Career Domain 2022-23.pptx
 
it was the handout about AI hand out ppt.pptx
it was the handout about AI hand out ppt.pptxit was the handout about AI hand out ppt.pptx
it was the handout about AI hand out ppt.pptx
 
Technology Introduction Series: Edge Computing tutorial.pdf
Technology Introduction Series: Edge Computing tutorial.pdfTechnology Introduction Series: Edge Computing tutorial.pdf
Technology Introduction Series: Edge Computing tutorial.pdf
 
fields of technology and computer .pptx
fields of technology and computer  .pptxfields of technology and computer  .pptx
fields of technology and computer .pptx
 
Hac IT 4. Emerging Technologies (1).pdf
Hac IT 4. Emerging Technologies  (1).pdfHac IT 4. Emerging Technologies  (1).pdf
Hac IT 4. Emerging Technologies (1).pdf
 
Introduction to Azure IoT Suite
Introduction to Azure IoT SuiteIntroduction to Azure IoT Suite
Introduction to Azure IoT Suite
 
IoT Development - Opportunities and Challenges
IoT Development - Opportunities and ChallengesIoT Development - Opportunities and Challenges
IoT Development - Opportunities and Challenges
 
Iot-Internet-of-Things-ppt.pptx
Iot-Internet-of-Things-ppt.pptxIot-Internet-of-Things-ppt.pptx
Iot-Internet-of-Things-ppt.pptx
 
Modern computer network technologies
Modern computer network technologies Modern computer network technologies
Modern computer network technologies
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Dell AI Telecom Webinar
Dell AI Telecom WebinarDell AI Telecom Webinar
Dell AI Telecom Webinar
 
Developing your IoT Solutions with Intel
Developing your IoT Solutions with IntelDeveloping your IoT Solutions with Intel
Developing your IoT Solutions with Intel
 
Ultimate list of 50 Best IoT platforms of 2019
Ultimate list of 50 Best  IoT platforms of 2019Ultimate list of 50 Best  IoT platforms of 2019
Ultimate list of 50 Best IoT platforms of 2019
 
Internet of Things (IoT)
Internet of Things (IoT)Internet of Things (IoT)
Internet of Things (IoT)
 
FinalPPT-StJoseph (3).pptx
FinalPPT-StJoseph (3).pptxFinalPPT-StJoseph (3).pptx
FinalPPT-StJoseph (3).pptx
 
Blockchain and AI
Blockchain and AIBlockchain and AI
Blockchain and AI
 
A Guide to Edge Computing Technology For Business Operations
A Guide to Edge Computing Technology For Business OperationsA Guide to Edge Computing Technology For Business Operations
A Guide to Edge Computing Technology For Business Operations
 
The future work force in the ICT industry and why you need to act now
The future work force in the ICT industry and why you need to act nowThe future work force in the ICT industry and why you need to act now
The future work force in the ICT industry and why you need to act now
 
CHAPTER 1-Introduction of Advanced Network Technology and Facilities.pptx
CHAPTER 1-Introduction of Advanced Network Technology and Facilities.pptxCHAPTER 1-Introduction of Advanced Network Technology and Facilities.pptx
CHAPTER 1-Introduction of Advanced Network Technology and Facilities.pptx
 

Último

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Último (20)

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 

Emerging trends in information technology

  • 1. EMERGING TRENDS IN INFORMATION TECHNOLOGY PRESENTED TO YOU BY : MR. SHIV KUMAR BCA 5TH SEM. 1822562
  • 2. WHAT IS INFORMATION TECHNOLOGY ? ITAA (Information Technology Association of America) defined information technology as being the study, design, development, implementation, support and/or management of any computer based information system.
  • 3. TOP INFORMATION TECHNOLOGY TRENDS FOR 2020 Artificial Intelligence (AI) Machine Learning Robotic Process Automation or RPA Edge Computing Virtual Reality and Augmented Reality Cybersecurity Blockchain Internet of Things (IoT)
  • 4. ARTIFICIAL INTELLIGENCE (AI) AI refers to computer systems built to mimic human intelligence and perform tasks such as • recognition of images, • speech or patterns, • decision making, • and many more… AI can do these tasks faster and more accurate than humans.
  • 5. AI is used in • Navigation apps • Streaming services • Smartphone personal assistants • Ride-sharing apps • Home personal assistants • Smart home devices • Schedule trains • Assess business risks • Predict maintenance • Improve energy efficiency, among many other money- saving tasks • and lots of more.
  • 6. MACHINE LEARNING : A SUBSET OF AI • With Machine Learning, computers are programmed to learn to do something they are not programmed to do: they learn by discovering patterns and insights from data. • It is achieved by historic data, statistics and sophisticated algorithms. • In general, we have two types of learning, supervised and unsupervised.
  • 7. Subsets of Machine Learning are: • Neural networks • Natural language processing (NLP) • Deep learning Each of these subsets offers an opportunity for specializing in a career field that will only grow. Machine Learning powers: • Web search results • Real-time ads • Network Intrusion Detection • And lots of more…
  • 8. ROBOTIC PROCESS AUTOMATION OR RPA RPA is the use of software to automate business processes such as: • Interpreting applications • Processing transactions • Dealing with data • and even Replying to emails. Primary focus of RPA is to automate repetitive tasks that people used to do.
  • 9. RPA career opportunities in RPA: • Developer • Project Manager • Business Analyst • Solution Architect • Consultant.
  • 10. EDGE COMPUTING • Edge computing is a distributed, open IT architecture that features decentralised processing power, enabling mobile computing and Internet of Things (IoT) technologies. • In edge computing, data is processed by the device itself or by a local computer or server, rather than being transmitted to a data centre.
  • 11. Edge computing allows • Efficient data processing near the source • Reducing Internet bandwidth usage. It eliminates costs and ensures that applications can be used effectively in remote locations. The ability to process data without ever putting it into a public cloud adds a useful layer of security for sensitive data.
  • 12. VIRTUAL REALITY AND AUGMENTED REALITY • Virtual Reality (VR) immerses the user in an environment while Augment Reality (AR) enhances their environment. • VR has primarily been used for gaming thus far, it has also been used for training, as with VirtualShip, a simulation software used to train U.S. Navy, Army, and Coast Guard ship captains. • The popular Pokemon Go is an example of AR.
  • 13. Uses of VR and AR : • Training • Entertainment • Education • Marketing • Offers museum-goers a deeper experience • Enhance theme parks
  • 14. CYBERSECURITY • Cybersecurity is evolving just as other technologies are. That’s in part because threats are constantly new. • The mean hackers who are trying to illegally access data are not going to give up any time soon, and they will continue to find ways to get through even the toughest security measures. • It’s also in part because new technology is being adapted to enhance security. • As long as we have hackers, we will have cyber security as an emerging technology because it will constantly evolve to defend against those hackers.
  • 15. There is strong need for cybersecurity professionals, So the number of cybersecurity jobs is growing three times faster than other tech jobs. Roles in Cybersecurity: • Ethical Hacker • Security Engineer • Chief Security Officer
  • 16. BLOCKCHAIN • Blockchain can be described as data you can only add to, not take away from or change. Hence the term “chain” because we’re making a chain of data. • Blockchains are consensus-driven, so no one entity can take control of the data. • With blockchain, we don’t need a trusted third-party to oversee or validate transactions.
  • 17. • Most people think of blockchain technology in relation to cryptocurrencies such as Bitcoin, Ethereum, Litecoin are blockchain, but it is a part of blockchain. • A blockchain developer specializes in developing and implementing architecture and solutions using blockchain technology
  • 18. INTERNET OF THINGS (IOT) • IOT is an Intelligent interactivity between human and smart devices to exchange information and knowledge for new value creation. • Many “smart devices” are now being built with WiFi or bluetooth connectivity, meaning they can be connected to the Internet or other source and to each other. • The IoT enable better safety, efficiency, and decision making for businesses as data is collected and analysed. • It enable predictive maintenance, speed up medical care, improve customer service, and offer benefits we haven’t even imagined yet.
  • 19. The Internet of Things is used in • Connected appliances • Smart home security systems • Smart Vehicles • Autonomous farming equipment • Wearable health monitors • Smart factory equipments • Wireless inventory trackers • Ultra-high speed wireless internet • Biometric cybersecurity scanners We’re only in the beginning stages of IOT.
  • 20. THANK YOU! INFORMATION GATHERED FROM : SIMPLILEARN.COM GOOGLE