Академический Документы
Профессиональный Документы
Культура Документы
ITBM
ASSIGNMENT
Submitted by
Robin Joseph Thomas
FK-2055
PGDM 19-B
2|Page
2) 3G
International Mobile Telecommunications-2000 (IMT — 2000), better
known as 3G or 3rd Generation, is a generation of standards for mobile phones
and mobile telecommunications services fulfilling specifications by the
International Telecommunication Union. Application services include wide-area
wireless voice telephone, mobile Internet access, video calls and mobile TV, all in
a mobile environment. A 3G system must allow simultaneous use of speech and
data services, and provide peak data rates of at least 200 kbit/s according to the
IMT-2000 specification.
In 2008, India entered the 3G arena with the launch of 3G enabled Mobile and
Data services by Government owned Bharat Sanchar Nigam Ltd. (BSNL). Later,
MTNL launched 3G in Delhi and Mumbai. Nationwide auction of 3G wireless
spectrum was announced in April 2010. The first Private-sector service provider
that launched 3G services is Tata Docomo, on November 5 2010. And the second
is by Airtel in the middle of the same month. Other providers like Vodafone, Idea
and Aircel are expected to launch 3G services by January 2011.
3|Page
3) .NET
The Microsoft .NET Framework is a software framework for Microsoft
Windows operating systems. It includes a large library, and it supports several
programming languages which allows language interoperability (each language
can utilize code written in other languages.) The .NET library is available to all the
programming languages that .NET supports. The framework's Base Class Library
provides user interface, data access, database connectivity, cryptography, web
application development, numeric algorithms, and network communications.
The class library is used by programmers, who combine it with their own code to
produce applications
Microsoft started development on the .NET Framework in the late 1990s
originally under the name of Next Generation Windows Services (NGWS). By late
2000 the first beta versions of .NET 1.0 were released. Version 3.0 of the .NET
Framework is included with Windows Server 2008 and Windows Vista. Version
3.5 is included with Windows 7, and can also be installed on Windows XP and the
Windows Server 2003 family of operating systems. On April 12, 2010, .NET
Framework 4 was released alongside Visual Studio 2010.
Service Abstraction
Service Reusability
Service Autonomy
Service Statelessness
Service Discoverability
Service Composability
REQUIREMENTS
Interoperability among different systems and programming languages that
provides the basis for integration between applications on different
platforms through a communication protocol
5) WIPRO
Wipro Technologies Limited is a giant information technology services
corporation headquartered at Bangalore, business spans India, Asia Pacific and
the Middle East.It has interests varying from Information technology, consumer
care, lighting, Engineering and health care businesses.
Azim Premji is the Chairman of the Board, WIPRO started as a vegetable oil
trading company in 1947 from an old mill at Amalner, Maharastra, India founded
by M.H. Premji .In 1979, WIPRO began developing its own computers and in 1981
started selling the finished product.Wipro Limited, which dealt in hydrogenated
cooking fats along with consumer products, grew from a company of US $2.5
million to a giant of $1.4 billion under Premji's leadership. Its main divisions
include IT Services,Product Engineering Solutions,Technology Infrastructure
Services and Business Process Outsourcing. IT details of the company include
Database: MS SQL 2000/2005,OS: Windows 2003 enterprise edition,Application:
Alpha petrol, Enabler Management, Enabler Configuration, Fuel
Réconciliation,Reporting Tool: Jasper Report and Controller Hardware: Enabler
5|Page
from Integration Technologies from New Zealand. WIPRO mainly deals with
System Software Development, Operating System, Device Driver Development.
6) Cloud computing
Cloud computing is a style of computing that characterizes a model in
which providers deliver a variety of IT-enabled capabilities to consumers. Cloud-
based services can be exploited in a variety of ways to develop an application or
a solution. Using cloud resources does not eliminate the costs of IT solutions, but
does re-arrange some and reduce others. In addition, consuming cloud services
enterprises will increasingly act as cloud providers and deliver application,
information or business process services to customers and business partners.
ADVANTAGES DISADVANTAGES
Cloud computing users avoid capital Does not work well with low-speed
expenditure connections.
“Greening” of the data center / Reduced Stored data might not be secure.
Energy costs
Highly automated. Stored data can be lost
8) LINUX
It is a Unix-like Operating System. Linux is a famous open source project. It
is free to use, distribute, modify under a compatible licence. Linux is produced by
a large developer and user community.it is a combination of many projects. The
cost of commercial development of this is estimated at USD 7 billion. Linux was a
Unix-based OS. UNIX was developed in 1970 by AT&T Lab (Later known as Bell
Lab. Linux is created in 1991 by Linus Torvalds.
Version 1of Linux is released in 1994. Initially it was developed for 80x86
processors (IA32 or i386 architecture processors. Today it supports various
processors such as- AMD, Motorola 6800, Power PC, etc. People can improve and
add things in LINUX. Some WINDOWS programs can be run under LINUX using
emulator.
9) GREEN COMPUTING
The study and practice of using computing resources efficiently. The goals
are similar to green chemistry; that is reduce the use of hazardous materials,
maximize energy efficiency during the product’s lifetime and promote
recyclability or biodegradability of defunct products and factory waste.
Virtualization is the process of running two or more logical computer systems on
one set of physical hardware; it is one of the most approaches of the green
computing. Other approaches are Power management, Power supply, Storage,
Video card, Material recycling.
It is estimated that out of $250 billion per year spent on powering computers
worldwide, only about 15% of that power is spent computing-the rest is wasted.
In order to achieve the energy efficiency target IT Cos. will have to learn to use
less electricity in just the same the way, using green computing to save money.
This will demand major changes in IT uses and policies. An industry initiative
called 80 PLUS certificates PSUs that are at least 80% efficient.
8|Page
GREEN IT
The problem: Rising energy cost will have an impact.
The solution: A fresh approach to IT and power is now needed, putting power
consumption at the force in all aspects of IT.
Strategies of change: IT Cos. will have to learn to use less electricity in just the
same the way, using green computing to save money. This will demand major
changes in IT uses and policies.
The features of a green computer of tomorrow would be like: efficiency,
manufacturing and materials recyclability, server model, self-powering and other
trends.
10) EBAY
Ebay is one of the finest example for E-commerce, It consists of the buying
and selling of products or services over electronic systems such as the Internet
and other computer networks. The amount of trade conducted electronically has
grown extraordinarily with widespread Internet usage, Online retailers are
sometimes known as e-tailers and Online retail is sometimes known as e-tail.
Online shopping is a form of electronic commerce where the buyer is directly
online to the seller's computer usually via the internet, Electronic commerce that
is conducted between businesses is referred to as business-to-business or B2B.
It is an American Internet company that manages eBay.com, an online auction
and shopping website in which people and businesses buy and sell a broad
variety of goods and services worldwide, Founded in 1995 by Pierre Omidyar, a
computer programmer and its present CEO is John Donahoe. There are different
models used in such E-commerce applications and they include Brokerage model,
Advertising model, Infomediary model, Direct model, Manufacturer model,
community model and finally subscription model.
FACEBOOK
It allows user search for new and old friends. It makes less awkward when
communicating with strangers. It is easier to join group having similar interest. It
10 | P a g e
is free and easy to use. The level of customization makes it stand out from other
networking sites.
13) APPLE.INC
Steve Jobs, Steve Wozniak, and Mike Markkula formed Apple Computer on
April 1, 1976, after taking out a $250,000 loan. Steve Wozniak built a computer
to run on the 6502 chip from MOS technology, but Jobs had the idea to sell it.
The different Apple includes Apple I, Apple II, and Macintosh…etc. In 1991, Apple
Computer, IBM, and Motorola joined to create the PowerPC processors.
In July 2005, iPod’s U.S. market share was estimated at 74% January 2007; Apple
reported record annual earnings of $7.1 billion. In January, Steve Jobs announced
the company would change its name to Apple, Inc. to incorporate their many
endeavors. On January 27, 2010, Apple introduced their much-anticipated media
tablet, the iPod running a modified version of iOS.
14) GENPACT
Traces its beginnings to 1997, when under the name of GECIS; it was
established as an independent business unit of GE Capital. Genpact became an
independent company in January 2005, enabling faster growth by reaching down
to clients outside the GE family. The company was listed on the NYSE in August
2007 under the trading symbol “G”. Genpact has its head quarters at Hamilton,
Bermuda.
MAJOR CLIENTS OF GENPACT
GlaxoSmithKline
Penske
Genworth
Nissan
Air Canada
Linde
Wachovia
11 | P a g e
and other embedded IT systems. In addition, it offers a new layer of the storage
hierarchy in servers and client computers that has key advantages including
space, heat, performance and ruggedness.Two technologies used in flash
memory are
NAND technology
NOR technology
CHARACTERISTICS
Flash memories are non-volatile; they do not require power to retain
memory content.
They can be programmed (erased and written to) and can be accessed
(read) at high speed.
Longer time periods are required for erasing and writing.
The development of flash memories is lagging behind the development of
DRAMs because of the need for high internal voltages for writing and
erasing.
Flash memories are beginning to be widely used in the commercial market
where they are showing up in applications such as solid state disks.
Flash memories do have a limited life of about 104 to 106 erase and write
operations but this is sufficient for many applications.
same time the setting up an account may take time and there are learning
difficulties also because the site changes and upgrades.
BASIC REQUIREMENT
1. Administrator Rights
2. Browser Settings
3. Certified Versions of Sun Java Software for CitiDirect
4. Cookies
5. Internet Explorer 7.0 - Browser Settings
6. Internet Security Options
7. Java Scripts
8. Proxy Server
9. Required Hardware
10.Required Software
11.Secure Sockets Layer Protocol (SSL)
18) Firewall
It is a logical barrier designed to prevent unauthorized or unwanted
communications between sections of a computer network. Firewalls are used to
prevent unauthorized Internet users from accessing private networks
connected to the Internet, especially intranets. All messages entering or leaving
the intranet pass through the firewall, which examines each message and blocks
those that do not meet the specified security criteria.
PLATFORMS OF FIREWALL
DESKTOP FIREWALL
Any software installed on an operating system to protect a single computer is
called a desktop or personal firewall. This type of firewall is designed to protect
a single desktop computer.
NETWORK LEVEL FIREWALL
14 | P a g e
It inspects packet headers and filtering traffic based on the IP address. The port
and the service can’t validate user inputs or detect maliciously modified
parameters in an URL request. It leaves your network vulnerable to a number of
serious threats.
20) ORACLE
Oracle Corporation was founded in 1977 by Larry Ellison, Bob Miner and
Ed Oates. Over 65,000 customers worldwide rely on Oracle's complete
application solutions to achieve superior results. Oracle Applications also provide
complete choice and a secure path for customers to benefit from the latest
technology advances. Oracle Applications Unlimited is Oracle's commitment to
customer choice through continuous investment and innovation in current
applications offerings. The powerful combination of complete solutions and
complete choice drive better business performance and help customers.
ORACLE ERP: Oracle ERP Software is the most comprehensive software system at
present that integrates all the business functions most effectively, featuring a
unique combination of hardware and software. This software is engineered to
cater the requirements of different types of industries and business processes
and has fast gained popularity across the globe.
SAP: SAP is one of the top Enterprise Resource Planning (ERP) software in the
world. SAP is the brainchild of five IBM engineers who broke off from IBM and
founded SAP AG in 1992. It drives efficiency and value to the bottom line of
large, mid-size and now smaller organizations by redefining how business should
be done. SAP solutions deliver real-time visibility across the entire enterprise and
are not limited to top management, control engineers or the IT team.
16 | P a g e
22) AMAZON.COM
Amazon.com is a public company founded in 1994 by Jeffery P Bezos. Its
headquarters is in Seattle, Washington, USA. It is available worldwide.
Its products include books, music CDs, consumer electronics among others and
services include compute, content delivery, database, E-Commerce, messaging
and monitoring, networking, payments and billing, storage...etc.
There were a few controversies related with this site such as differential pricing
competition, product availability, kindle content removal, sale of Wikipedia’s
material as books and collection of sales tax.
23) IT SECURITY
IT Security is eliminating the disruption of business operations and
reducing the exposure to cyber attacks. Another term for this is IT Security
Assurance. It is protecting information or data in whatever form. Cyber crime
and terrorism has escalated during recent years. It is well-organized. It is
advanced technically. It is well-financed. It has adopted a new view. The
legal/regulatory risks are disclosure of customer relationship, damage claims,
taxation/customs aspects, national/international restrictions of inter- and intra-
business financial transactions and rules imposed by regulators. Basic research
has created sufficiently good encryption algorithms. Vendors have integrated
encryption into some of their products. As part of the Internet growth,
encryption issues are gaining public attention. More than ever, IT Security needs
strong support from basic and applied research. The shortcomings in adapting
research results to business/industry must be overcome. The demand for skilled,
interdisciplinary IT Security experts is growing quickly.
24) UID
UID project is known as AADHAAR. It means 'support' or 'foundation’.
Aadhaar is the new name of the Multipurpose National Identity Card program of
the Unique Identification Authority of India. The purpose of UID is to ensure
inclusive growth by providing a form of identity to those who do not have any
17 | P a g e
25) IT IN SPORTS
Technology is found in everything we do and everything we watch. It aids
in the healing process of athletes. It allows athletes on teams to improve their
skills, as well as connects your everyday coaches to referees on the field.
Technology has made many people’s lives much easier and has opened up the
horizon for millions of jobs. The technologies used in Baseball are Sabermetrics,
Scouting Software, Sports Betting, Dartfish, Yellow Line and Omega Wave.
Satyam Computer Services Ltd, India’s fourth biggest software firm, has blazed
the trail, signing a seven-year agreement to be FIFA’s official IT services provider
and its first major sponsor from cricket-mad India. IT used in cricket are Hawkeye
and Hotspot. The story of Indian Information Technology is now on rails! Six
coaches of the Commonwealth Express train now traversing the country are
devoted to telling the success story of IT in India. It is also appropriate to briefly
examine how the web will change the sale and distribution of sporting goods
which is central to running sport programs. Wide Area Networks (WANs) can link
together sports administrators located throughout a country.