Revolution in Information Technology

In this article, we look at the impact of IT industry on our lives.

Artificial Intelligence (AI)

Artificial Intelligence (AI) is concerned with designing and programming machines to accomplish tasks that when performed by humans are considered to represent intelligent behavior. Intelligent programs employ complex sets of rules and databases to process and arrive at the desired solution to the problem. They are said to be concerned with the manipulation of knowledge rather than mere data. AI is in wide use in range of applications in industry, business and defence. One of the most active Artificial Intelligence research areas is that of understanding how to program computers for learning and discovery.

What is the future of Information Technology
Revolution in IT

Expert Systems

Expert systems have been described as the most important and practical project to emerge from 30 years of reassert in AI. These systems attempt to mimic the problem-solving  activities and performance of expert. Typically they are used to problems dealing with complex diagnosis, scheduling, forecasting , monitoring and control or data analysis and interpretation.

Thousands of expert systems now in existence share certain  characteristics in common:

  • They perform at level equivalent to that of human expert
  • They can explain their reasoning and
  • They can provide a range of alternative solutions in conditions of uncertainty

Speech Recognition

Main aim of this project is to teach computers to understand spoken communication. Current devices range from those which recognize only isolated words, and as a result impose unnatural patterns of  speech upon the user , to those which permit continuous conversation -style speech where words may run together. The size of the vocabulary of words, sounds and phrases that can be recognised depend on the system can use. 

Current speech recognition system could be:

Speaker Dependent - These recognize only the voices of trained users operating from database containing templates of user voices.

Speaker Independent - These system understand specific words regardless of the identity of the speaker 

Speaker Adaptive System - These system operate not on the basis of stored templates of the voice patterns of trained users, but rather they build up their database as users interact with the system. 

Virtual Reality

How would you feel, if you could simulate the new air traffic control system, that you have just implemented, before putting it into pract6ice to get the best results. This way you could avoid a lot of mishaps, that can occur by minor design faults. Virtual reality is a way for humans to visualize manipulates and interact with complex data. The visualization part refers to the computer generating visual, auditory or other sense outputs to the user of a world within the computer. This world may be a CAD model, a scientific simulation, or a view into a database. The user can interact with the world and directly manipulate objects within the world. The applications being developed for VR run a wide spectrum, from games to architectural and business planning. Many applications provide ways that are very similar to our own, like CAD or architectural modeling. Some applications provide ways of viewing from an advantageous perspective not possible with the real world, like scientific simulators and telepresence systems, air traffic, control systems. 

Other applications are much different from anything we have ever directly experienced before. These latter applications may be the hardest, and most interesting systems, visualizing the ebb and flow of the worlds financial markets. Navigating a large corporate information base, etc. other terms that have been used for VR are Synthetic Environments, Cyberspaces, Artificial Reality, Simulator Technology. etc. 

Cloud Computing 

Nowadays, very popular and safe online data storage technique or service called Cloud Computing. The term is generally used to describe data centers available to many users over the Internet.

The MNC company takes cloud rental to secure its data. Maintaining this cloud is called cloud computing. In this work, the computing infrastructure of the service provider company can be used as per the requirement. In a way, you can secure your interface without adding any hardware or software to the computer. The entire game of cloud computing is based on the Internet. The biggest advantage of this is that it takes a lot of work and can be accessed from any server as desired. Cloud Computing market is unlimited in India, Bengaluru (Karnataka) is its largest center in the country.

Multimedia Computing

The use of computer graphics is a powerful aid to making data elements more intelligible and enhancing the user - friendliness of computers.  This has led to the development of multimedia computing. This combines animated, high resolution graphics and video, hi-fi sound, computer data, communications and most important of all, interaction between the system and the user.  The basic multimedia system consists of a desktop computer,  a high-quality display subsystem, a CD-ROM drive and an audio system, usually played back through a viewer software program on desktop computer.

There are two families of multimedia program, authoring packages, which allow architects, marketing executives, advertising directors and many others to prepare sales presentations and brochures, edit videotapes, create animation's and prepare color advertisement, and reference, in which huge number of words, pictures and sounds are stored on a compact disk.

Computer Animation

Animation can be defined in a number ways, John Hales, one of the world's  most famous animators say 'movement is the essence of animation',  On similar lines, animation can also be defined as 'art in movement'.

In this computer era, applications of animation are not confined to cartoons alone that you see on TV. It has now become an excellent method of mass communication. Be it acrobatic logos, that you see in advertisements, or the shimmering backgrounds that kick off the show, or the 3D effects of your house/ office that your architect  might slow you on his computer,  while discussing the design of your building.  Computer animation can also be a great boon in the field of education, where the fundamental concepts can be explained to students using visual effects involving motion. 

Computer plays a variety of role in animation

  • First of all, create drawings in animation. especially the complex drawings can be constructed in computers, using advances graphics tolls available or by programming.
  • Secondly, in the creation of motion. The computer is capable to precisely indicate the intermediate points of the process to create an illusion of motion.
  • Thirdly, in the process of paintings, excellent painting and precise coloring with the help of shading can be very easily generated through computers. 
  •  Fourthly, in actual shooting of animation. Computers can be programmed to control cameras.
  • And lastly, the post production stage. Here the most important creative objectives of editing and that of synchronization can be controlled by the computer.

Thus we see that computers can be used in a variety of ways and at different stages in the production of computer animated films.

 Fuzzy Logic

We have seen till now, that computers function with two numbers 1 and 0. Looking at it from logical point of view, the result of a computer generated query is either true or false. The inputs to the query are also expected to be very precise without any vagueness in them. Say for example, you ask a question - is the color of the sky black? to obtain an answer, the computer might ask you question like - what time of the day is it? If it is night time you can expect the computer to give you answer 'Yes' . While actually the sky could be dark gray, with patches of light gray - if it is cloudy,  or not very dark, if it is a full moon night. Hence we see  that in real life, it might not be always possible to give answers in black and white. This is where Fuzzy  Logic  comes in. Fuzzy logic is a superset of conventional  (Boolean) logic that has been extended to handle the concept of partial truth - truth values between " completely true" and "completely false".  Fuzzy logic is used directly in very few applications. The Sony palmtop apparently uses a fuzzy logic to perform handwritten  (well, computer light pen) character recognition.

Future with IT

As we have already said, it is not possible to look at the impact of IT on our lives from all angles. We shall consider only the main ones, and see how they are going to be affected in future.

Work

Nowadays, debate has broadened take into account not just technological change but such significant social and political factors as gender, the control and organization of work and the social design of systems.  However, it is not possible to give a black and white picture of impact of computerization. Different people, different workplaces and organizations might respond differently to the application of similar technologies.

one of the optimistic forecasts for the impact of computers in the workplace is of Telework  (the official website of the Federal Government's telework program!). Instead of people commuting to work, the opportunity would exist for them to work at home or in telecottages or in other community centers. This would become possible because of high-speed, and reliable communication technology and relatively cheap computing power.

In the United  States and the European Union, Teleworking has been adopted in a wide range of sectors including telecommunications, computer hardware and software, banking and insurance, national and local government, printing and publishing and retail trade.

Click Here For Online/Offline Work

Networking 

Although emerging for use by individual organisations such as airlines and banks or by communities of researchers in various countries, large wide area networks still have an immense unexplored potential. All networking activities are now focused on Internet. Millions of Internet users worldwide. While predominantly academics and research based, the Internet has an increasing proportion of commercial and industrial users. In many ways, Internet is also serving as a forum for open exchanges of idea and information, ranging from the frankly trivial to fairly serious, from movies to the protection of environment.

One of the major concerns of this development is data security and privacy. This issue becomes more prominent because of the growing interest being shown by commercial organizations in using the  Internet. Its size, diversity, and dynamic nature is making the internet a difficult environment to handle problems of data security and privacy, but these need to be tackled more seriously nevertheless.

 

Computer Crime/ Cyber Crime

Cybercrime*, or computer-oriented crime, is a crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target. Cyber crime may threaten a person, company or a nation's security and financial health.

Cyber crime, also called computer crime, the use of a computer as an instrument to further illegal ends, such as committing fraud, trafficking in child pornography and intellectual property, stealing identities, or violating privacy.

 Top 5 Cyber Crimes?

  Popular Cyber crimes to effortlessly protect your Computer and Data against its impact

  •    Phishing scams. Phishing is a practice of a cyber criminal or hacker attempting to obtain sensitive or personal information from a computer user.
  •     Identity Theft scams
  •     Online Harassment
  •     Cyberstalking
  •     Invasion of privacy 

Do you know the most common types of Cyber Crime?

  •    Phishing Attack. In a phishing attack, cyber criminals use email or malicious websites to solicit personal information from an individual or company by posing as a trustworthy organization.
  •     Malware 
  •     Online Credential Breach (user names and passwords)
  •     Debit or Credit Card Fraud
  •     Identity Theft

*Source: Wikipedia 

Indian Govt. Helpline Number For Cyber Crime - 155260 (09:00 AM To 06:00 PM)

Click Here for more detail  https://cybercrime.gov.in/

Nowadays, computer crime/ cyber crime  can be broadly defined as criminal act either aimed at a computer or carried out with its assistance. This includes the unauthorized use of, or access to, information system, or the modification of programs either for profit or for malicious intent. There are a variety of ways of gaining illegal entry from the same site or frequently from a remote location. Prominent among methods of intrusion from remote locations are viruses, worms, and Trojan horses.

Viruses are programs that modify other programs and reproduce endlessly, infecting other programs. Just like biological viruses, computer viruses invade the system by means of infected programs, which then replicates by instructing the host program to insert fragments of code into other programs. The infected programs proceed to pass on virus until the point is reached at which with the infection sufficiently spread, the viruses destroy data and software on the system.

Worms are programs that replicate themselves and spread from one computer to another. A worm is a standalone  program.  It 'sneaks' from one computer site to another.  Once the worm has spread into the target computer system, it may leak the information on it to the outside world, destroy the system or simply become a nuisance and slow the computer down to a sluggish pace. This kind of an intrusion is quite unlikely to be detected and is usually written with an intent to leak out sensitive information.

Trojan horse is a program that will appear to perform its intended purposes, and under this guise also perform unauthorized functions. For example, someone who wants to destroy a database may send its owner an application program which, when run, will do some useful processing for the owner of the database, and side by side also silently destroy the database.

Although it may, on occasions, have promised more than it has apparently been able to deliver, information and computer technology has changed the life all around us phenomenally. The degree to which computers have penetrated daily life can truly be depicted as ubiquitous, and promises to mark a real turning point in the way we live, work and play.

 

Thank you so much for visit my site. If you find this article informative, please share the post to your friends.

 
******************
 
 
 

Thanks a lot for reading.
Neel Kamal

Revolution in Information Technology Revolution in Information Technology Reviewed by Neel Kamal on September 25, 2020 Rating: 5

No comments:

For More Details Subscribe & Comment..!

Powered by Blogger.