You are on page 1of 48

Table of Contents

Business and Information Technology.................................................................................................. 3


Characteristics of Business Environment ............................................................................. 3
Business Process Outsourcing .................................................................................................... 4
Emerging Trends........................................................................................................................... 4
Components of information systems ..................................................................................... 4
Classification of Information System .................................................................................................... 4
Information Systems vs Information Technology ................................................................................. 5
Information System ....................................................................................................................... 5
Information Technology ................................................................................................................ 6
Comparison of Information System and Information Technology .................................... 6
Future of Information System and Information Technology .............................................. 6
Perils and Consequences of Information Overload and Drowning in a Sea of Information .................... 6
What is Information Overload ? ................................................................................................... 6
The Consequences of Information Overload .............................................................................. 7
Present Shock and Generation Y and their Impact on Society and Businesses ..................... 7
Managing Information Overload .................................................................................................. 7
Emerging Trends in Information Technology ........................................................................................ 7
Introduction .................................................................................................................................... 7
Cloud Computing ............................................................................................................................. 8
Mobile Application .......................................................................................................................... 8
User Interfaces ................................................................................................................................ 8
Analytics .......................................................................................................................................... 8
Information Technology as Driving Force for Innovation ...................................................................... 9
Introduction .................................................................................................................................... 9
Innovation in Last Decades .............................................................................................................. 9
Function of Information Technology ................................................................................................ 9
Innovation and Information Technology ........................................................................................ 10
7S Framework ................................................................................................................................... 10
Usage of 7S Framework........................................................................................................... 10
Technology and 7S Framework ............................................................................................. 10
DBMS: ............................................................................................................................................... 11
Two types of database structure .................................................................................................... 11
What Is a Data Mart? ......................................................................................................................... 14
What are the 5 layers of TCP IP? ........................................................................................................ 14
TELNET (Telecommunication Network) and FTP (File Transfer Protocol) ............................................ 14
What does it mean to be an ISP? ....................................................................................................... 15
What Is SEO? ..................................................................................................................................... 16
Big data ............................................................................................................................................. 16
NETWORK.......................................................................................................................................... 17
The main data security aspects that you would consider when enterprise is deployed into cloud base
.......................................................................................................................................................... 20
The steps/processes required in building a web portal are as follows: ............................................... 21
“Big Data” problem when: ................................................................................................................. 22
Defining Augmented Reality (AR) and Virtual Reality (VR)................................................................ 23
What is Quantum Computing?........................................................................................................... 27
What is virtualization? ....................................................................................................................... 29
enterprise resource planning (ERP) .................................................................................................... 33
What is an ERP system?................................................................................................................ 33
The business value of ERP ........................................................................................................... 34
7 reasons to move to an ERP cloud solution ....................................................................................... 34
SUPPLY CHAIN MANAGEMENT .......................................................................................................... 35
Objectives of SCM ........................................................................................................................... 36
SCM Processes ................................................................................................................................. 36
Advantages of SCM ......................................................................................................................... 36
CUSTOMER RELATIONSHIP MANAGEMENT ........................................................................................ 37
Why CRM? ...................................................................................................................................... 38
Advantages of CRM ........................................................................................................................ 38
Disadvantages of CRM .................................................................................................................... 38
Types of Computers ........................................................................................................................... 38
Classification of Computers by Size ................................................................................................. 38
Supercomputers .............................................................................................................................. 39
RFID................................................................................................................................................... 42
RFID Tags vs. Barcode Labels for Inventory Management ............................................................... 43
Structured Query Language (SQL) ...................................................................................................... 44
Why to Learn SQL? ........................................................................................................................ 45
Applications of SQL ........................................................................................................................ 45
MySQL............................................................................................................................................. 45
Features ......................................................................................................................................... 45
MS ACCESS .................................................................................................................................... 46
Features ......................................................................................................................................... 46
EMERGING TRENDS IN INFORMATION TECHNOLOGY......................................................................... 46
 Robotics: ................................................................................................................................ 46
 Virtual Reality /Augmented Reality:........................................................................................ 47
 Big data analytics: .................................................................................................................. 47
 Quantum computing: ............................................................................................................. 47
 5G Networks .......................................................................................................................... 47
 IOT: ........................................................................................................................................ 47
 CYBER SECURITY:.................................................................................................................... 48
 BLOCK CHAIN: ........................................................................................................................ 48

1.IT vs IS
information technology is a subset of information systems. Information systems consist of
people, processes, machines and information technology.

Business and Information Technology

Current global and competitive business environment constantly asks for innovation, existing knowledge
base is getting obsolete, continuously thriving for advancement in process improvement. The learning
curve is always put to test, and every company is striving to remain ahead of the curve. Due to this shift in
the way business is getting conducted has thrown out new reality of ever shortening product and service
life cycle. More and more companies are coming out with customized products and finding ways to
differentiate from competition.

A recent survey conducted has highlighted that the change in the business environment can be
summarized with following:

 Globalization and opening up of markets has not only increased competition but also has allowed
companies to operate in markets previously considered forbidden.
 Inclusion of information technology as integral part of business environment has ensured that
companies are able to process, store and retrieve the huge amount of data at ever dwindling
costs.
 Globalization has encouraged free movement of capital, goods and service across countries

Characteristics of Business Environment


To understand business environment and drivers of change, it is first important to study its characteristics.
They are as follows.

 Business environments are complex in nature as well as dynamic because they are dependent
upon factors like political, economic, legal, technological, social, etc. for sustenance.
 Business environment affects companies in different industries in its own unique way. For
example, importers may favor lower exchange rate while exporters may favor higher exchange
rate.
 With change in the business environment, some fundamental effects are short term in nature
while some are felt over a period of time.

Business Process Outsourcing


Business Process Outsourcing involves contracting one or many front end (customer related) or back end
(finance, HR, accounting, etc.) activities within a company to a third party service provider. The number of
jobs within BPO industry has increased exponentially in last decade. BPO is one of the new faces in
business environment.

Outsourcing has help companies reduce their overhead expenses, improve productivity, shorten
innovation cycles, encourage new market penetration and also improving customer experience. India has
seen tremendous growth in BPO industry within function like customer care, finance/accounts, payroll,
high end financial services, human-resource, etc.

Emerging Trends
The recent explosion of information technology has seen few but significant emerging trends, for
example, mobile platform for doing business, cloud computing, technology to handle a large volume of
data, etc.

These fresh technologies and platforms are offering numerous opportunities for companies to drive
strategic business advantage and stay ahead of the competition. Companies need to work on new plans
as to maintain flexibility and deliver customer satisfying products and services.

Components of information systems


An information system is essentially made up of five components hardware, software, database, network
and people. These five components integrate to perform input, process, output, feedback and control.

Hardware consists of input/output device, processor, operating system and media devices. Software
consists of various programs and procedures. Database consists of data organized in the required
structure. Network consists of hubs, communication media and network devices. People consist of device
operators, network administrators and system specialist.

Information processing consists of input; data process, data storage, output and control. During input
stage data instructions are fed to the systems which during process stage are worked upon by software
programs and other queries. During output stage, data is presented in structured format and reports.

Classification of Information System

In any given organization information system can be classified based on the usage of the information.
Therefore, an information system in an organization can be divided into operations support system and
management support system.

 Operations support system


In an organization, data input is done by the end user which is processed to generate information
products i.e. reports, which are utilized by internal and or external users. Such a system is called
operation support system.

The purpose of the operation support system is to facilitate business transaction, control
production, support internal as well as external communication and update organization central
database. The operation support system is further divided into a transaction-processing system,
processing control system and enterprise collaboration system.

 Transaction Processing System (TPS)

In manufacturing organization, there are several types of transaction across department. Typical
organizational departments are Sales, Account, Finance, Plant, Engineering, Human Resource
and Marketing. Across which following transaction may occur sales order, sales return, cash
receipts, credit sales; credit slips, material accounting, inventory management, depreciation
accounting, etc.

These transactions can be categorized into batch transaction processing, single transaction
processing and real time transaction processing.

 Process Control System

In a manufacturing organization, certain decisions are made by a computer system without any
manual intervention. In this type of system, critical information is fed to the system on a real-time
basis thereby enabling process control. This kind of systems is referred as process control
systems.

 Enterprise Collaboration System

In recent times, there is more stress on team effort or collaboration across different functional
teams. A system which enables collaborative effort by improving communication and sharing of
data is referred to as an enterprise collaboration system.

 Management Support System

Managers require precise information in a specific format to undertake an organizational decision.


A system which facilitates an efficient decision making process for managers is called
management support system.

Management support systems are essentially categorized as management information system,


decision support system, expert system and accounting information system.

Information Systems vs Information Technology


Information System
An information system can be defined as set of coordinated network of components, which act together
towards producing, distributing and or processing information. An important characteristic of computer-
based information systems information is precision, which may not apply to other types.

In any given organization information system can be classified based on the usage of the information.
Therefore, information systems in business can be divided into operations support system and
management support system.
Information Technology
Everyday knowingly or unknowingly, everyone is utilizing information technology. It has grown rapidly and
covers many areas of our day to day life like movies, mobile phones, the internet, etc.

Information technology can be broadly defined as integration of computer with telecommunication


equipment for storing, retrieving, manipulating and storage of data. According to Information Technology
Association of America, information technology is defined as “the study, design, development, application,
implementation, support or management of computer-based information systems.”

Information technology greatly enhances the performance of economy; it provides edge in solving social
issues as well as making information system affordable and user friendly.

Information technology has brought big change in our daily life be it education, life at home, work place,
communication and even in function of government.

Comparison of Information System and Information Technology


Information system and information technology are similar in many ways but at the same time they are
different. Following are some aspects about information system as well as information technology.

 Origin: Information systems have been in existence since pre-mechanical era in form of books,
drawings, etc. However, the origin of information technology is mostly associated with invention of
computers.
 Development: Information systems have undergone great deal of evolution, i.e. from manual
record keeping to the current cloud storage system. Similarly, information technology is seeing
constant changes with evermore faster processor and constantly shrinking size of storage
devices.
 Business Application: Businesses have been using information systems for example in form of
manual books of accounts to modern TALLY. The mode of communication has also gone under
big change, for example, from a letter to email. Information technology has helped drive efficiency
across organization with improved productivity and precision manufacturing.

Future of Information System and Information Technology


Information technology has shown exponential growth in the last decade, leading to more sophisticated
information systems. Today’s information technology has tremendously improved quality of life. Modern
medicine has benefited the most with better information system using the latest information technology.

Information systems have been known to mankind in one form or the other as a resource for decision
making. However, with the advent of information technology information systems have become
sophisticated, and their usage proliferated across all walks of life. Information technology has helped
managed large amount of data into useful and valuable information.

Perils and Consequences of Information Overload and Drowning in a Sea of Information


What is Information Overload ?
We are drowning in a sea of information. We are inundated with news, views, opinions, facts, and
information every time we log in to the internet or turn on the TV. This constant barrage of information
thrown at us nonstop in a 24/7 cycle makes us weary and lost in this never-ending repetitive world.
Therefore, it is very important for professionals, students, and anyone who wants to focus and
concentrate to learn the art of separating the wheat from the chaff and to lead productive lives that are
meaningful and deep.

The Consequences of Information Overload


Many companies have banned social media sites and even internet sites in an attempt to make the
employees focus on the work. Despite these measures, many employees still find ways and means to
get updated and to log in to other sites much like addicts who would do anything for a fix. While we are
not against getting facts and information from diverse sources in a bid to stay ahead of the curve, what
we are advocating is the trend of being constantly on the move by surfing continuously which can have
adverse side effects. It must be remembered that this trend when it goes out of control is as bad as
getting hooked on to psychotropic substances and much like that it can lead to shorter attention spans,
need for instant gratification, and a general sense of being frazzled.

The truly productive employees are those who do not multitask nor spend endless hours watching the big
game scores or news and event updates from around the world. Indeed, one of the reasons investment
bankers and consultants are much sought after is that they have learnt to distinguish between short term
and ephemeral trends and instead, detect longer-term trends and extrapolations from existing information
that is meaningful and makes business sense.

Present Shock and Generation Y and their Impact on Society and


Businesses
The present generation Y has grown up not knowing what it is like to live without the internet or the TV.
This means that their attention to detail is as short as the cryptic SMS (Short Messaging Service) or the
Tweet and therefore, many occupational and lifestyle experts are worried that this aspect would lead us to
a situation where we lose sight of the longer and deeper narrative and instead, settle for the fleeting
moment that leads us to a “Present Shock” where the immediacy is more important than the longer term
and where the present overwhelms us leading to a general sense of disorientation. This is not the way
businesses and institutions have been built in earlier decades and this constantly changing and ever flux-
filled times are proving to be a challenge for marketers, policymakers, and business leaders.

Managing Information Overload


Apart from this the crux of the issue is that when we are inundated with information overload, there is a
danger that we might lose the essential information and instead, pick up drivel and nonsense from the
information sources which would lead to situations where businesses make the wrong decisions based on
faulty information and wrong assumptions. This is the danger that information overload poses to us and it
is better sooner than later that we as individuals learn to “switch off” when needed and to master the art of
managing too much information and develop the skill of finding the right data instead of paying attention
to meaningless data.

Emerging Trends in Information Technology


Introduction
21st century has been defined by application of and advancement in information technology. Information
technology has become an integral part of our daily life. According to Information Technology Association
of America, information technology is defined as “the study, design, development, application,
implementation, support or management of computer-based information systems.”

Cloud Computing
One of the most talked about concept in information technology is the cloud computing. Clouding
computing is defined as utilization of computing services, i.e. software as well as hardware as a service
over a network. Typically, this network is the internet.

Cloud computing offers 3 types of broad services mainly Infrastructure as a Service (IaaS), Platform as a
Service (PaaS) and Software as a Service (SaaS).

Some of the benefit of cloud computing is as follows:

 Cloud computing reduces IT infrastructure cost of the company.


 Cloud computing promotes the concept of virtualization, which enables server and storage device
to be utilized across organization.
 Cloud computing makes maintenance of software and hardware easier as installation is not
required on each end user’s computer.

Some issues concerning cloud computing are privacy, compliance, security, legal, abuse, IT governance,
etc

Mobile Application
Another emerging trend within information technology is mobile applications (software application
on Smart phone, tablet, etc.)

Mobile application or mobile app has become a success since its introduction. They are designed
to run on Smartphone, tablets and other mobile devices. They are available as a download from
various mobile operating systems like Apple, Blackberry, Nokia, etc. Some of the mobile app are
available free where as some involve download cost. The revenue collected is shared between
app distributor and app developer.

User Interfaces
User interface has undergone a revolution since introduction of touch screen. The touch screen
capability has revolutionized way end users interact with application. Touch screen enables the
user to directly interact with what is displayed and also removes any intermediate hand-held
device like the mouse.

Touch screen capability is utilized in smart phones, tablet, information kiosks and other
information appliances.

Analytics
The field of analytics has grown many folds in recent years. Analytics is a process which helps in
discovering the informational patterns with data. The field of analytics is a combination of
statistics, computer programming and operations research.

The field of analytics has shown growth in the field of data analytics, predictive analytics and
social analytics.
Data analytics is tool used to support decision-making process. It converts raw data into
meaningful information.

Predictive analytics is tool used to predict future events based on current and historical
information.

Social media analytics is tool used by companies to understand and accommodate customer
needs.

Information Technology as Driving Force for Innovation


Introduction
Last two decades have seen great stride in information technology. The development in information
technology has changed the way business is getting conducted. One of the striking points about
information technology is innovation. Information technology has been a driving force for product, service
and process innovation.

Innovation in Last Decades


It has brought forward capabilities, which previously were only considered as fiction novel material.
Information technology has supported miniaturization of electronic circuits’ making many products’
portable, for example, computers, phones, etc. Information technology has helped development in
communication technology by making it affordable. Penetration rate of mobile phone is higher than ever
before with greater coverage and with ever lowering cost.

The concept of big data has become reality, with development of high memory storage devices.

Function of Information Technology


Information technology is a network of devices, which are connected with each other, which process data
into useful and meaningful information. Information technology, therefore, has six broad functions around
which innovation is driven. The six broad functions are as follows:

 Capture: it is defined as a process to obtain information in a form which can be further


manipulated. This input of information may be through keyboard, mouse, picture, etc.
 Transmit: it is defined as a process through which captured information is sent from one system
to another. This system could be within same geographical boundary or otherwise. For example,
Radio, TV, email, telephone, fax, etc.
 Store: it is defined as a process through which captured information is kept in safe and secure
manner and, which can be further accessed when required. For example, hard disk, USB, etc.
 Retrieval: it is defined as a process through which stored information can be called upon when
required. For example, RAM, hard disk, USB, etc.
 Manipulation: it is defined as a process through which captured and stored information can be
transformed. This transformation could be the arrangement of data, calculation, presentation,
etc., For example, computer software.
 Display: it is defined as a process of projecting the information. For example, computer screen,
printer, etc.
Innovation and Information Technology
The last two decades of development and evolution in information technology is around six functions. The
innovation driven by information technology has been the by-product of the six functions. Some of the
significant development which has been achieved is as follows:

 Portability: advances in information technology have made portability of all electronic gadgets
possible.
 Speed: computing is now done at speed at which earlier generations of super computer were
working.
 Miniaturization: another innovation is in form of hand-held computing devices as well as an
information system, like GPS, Smartphone, IPad etc.
 Connectivity: information technology has transformed communication capability.
 Entertainment: proliferation of multimedia and digital information has been tremendous.
 User Interface: advancement in information technology has changed way users interact with
computing devices. The advent of touch screen has made computing intuitive and interactive.

7S Framework

The 7S framework constitutes of 7 factors, which affect organizational effectiveness. These 7 factors are
strategy, organizational structure, IT systems, shared values, employee skills, management style and
staff. These 7 factors can be broadly categorized into Hard Elements-Strategy, Structure, Systems and
Soft Elements-Shared Values, Skills, Style and Staff. Hard elements highlighted above are the ones
which are under direct control of management. Soft elements are not in direct control of management and
are driven by internal culture.

The 7 factors as per the framework can be defined as follows:

1. Strategy: It is defined as an action plan working towards the organizational defined objective.
2. Structure: It is defined as design of organization-employees interaction to meet defined
objective.
3. Systems: It is defined as information systems in which organization has invested to fulfill its
defined objective.
4. Staff: It is defined as workers employed by the organization.
5. Style: It is defined as the approach adopted by the leadership to interact with employees,
supplier and customers.
6. Skills: It is defined as characteristics of employees associated with the organization.
7. Shared Values: It is the central piece of the whole 7S framework. It is a concept based on which
organization has decided to achieve its objective.

Usage of 7S Framework
The basis of the 7S framework is that for organization to meet its objective it is essential all the seven
elements are in sync and mutually balancing. The model is used to identify which out of 7 factors need to
be balanced as to align with change in organization.

7S framework is helpful in identifying the pain points which are creating a hurdle in organization growth.

Technology and 7S Framework


In digital age, technology and technology-driven information systems both are game changer as far as
meeting objective for organization is concerned. Companies are moving towards automation, cloud
computing, etc. This has led to technology as central nervous system of the organization.
The 7S framework is applicable across all industries and companies. It is one of the premier models used
to measure organizational effectiveness. In this challenging environment, strategy of organization is
constantly evolving. In such an environ

DBMS:
A database management system (or DBMS) is essentially nothing more than a computerized
data-keeping system. Users of the system are given facilities to perform several kinds of
operations on such a system for either manipulation of the data in the database or the
management of the database structure itself.
Stands for "Database Management System." In short, a DBMS is a database program. ... Some
DBMS examples include MySQL, PostgreSQL, Microsoft Access, SQL Server, FileMaker, Oracle,
RDBMS, dBase, Clipper, and FoxPro
Two types of database structure
Databases typically have one of two basic forms:

 single-file or flat file database


A flat file database stores data in a plain text file, with each line of text typically holding one
record.
 multi-file relational or structured database
A relational database contains multiple tables of data with rows and columns that relate to each
other through special key fields.

Document management system (DMS


A document management system (DMS) is a system used to receive, track, manage and store
documents and reduce paper. Most can keep a record of the various versions created and modified
by different users (history tracking). In the case of the management of digital documents such
systems are based on computer programs. The term has some overlap with the concepts of content
management systems. It is often viewed as a component of enterprise content management (ECM)
systems and related to digital asset management, document imaging, workflow systems and records
management systems.

 Consists of hardware and software that manage and archive electronic documents and also
convert paper documents into e-documents.
 DMS, besides capturing and storing the documents takes care of indexing which facilitates
searching of documents from the repository.

Transaction data always has a time dimension, a numerical value and refers to one or more
objects (i.e., the reference data).
Typical transactions are:
 Financial: orders, invoices, payments
 Work: plans, activity records
 Logistics: deliveries, storage records, travel records, etc.

Disadvantages of Conventional file system

• Redundancy

• Inconsistency

• Security issues

Keys used in DBMS:

https://www.guru99.com/dbms-keys.html

 Super Key – A super key is a group of single or multiple keys which identifies rows in a table.
 Primary Key – is a column or group of columns in a table that uniquely identify every row in that
table.
 Candidate Key – is a set of attributes that uniquely identify tuples in a table. Candidate Key is a
super key with no repeated attributes.
 Alternate Key – is a column or group of columns in a table that uniquely identify every row in that
table.
 Foreign Key – is a column that creates a relationship between two tables. The purpose of Foreign
keys is to maintain data integrity and allow navigation between two different instances of an
entity.
 Compound Key – has two or more attributes that allow you to uniquely recognize a specific
record. It is possible that each column may not be unique by itself within the database.
 Composite Key – is a combination of two or more columns that uniquely identify rows in a table.
The combination of columns guarantees uniqueness, though individual uniqueness is not
guaranteed.

Data Models are fundamental entities to introduce abstraction in a DBMS. Data models define how
data is connected to each other and how they are processed and stored inside the system. The very first
data model could be flat data-models, where all the data used are to be kept in the same plane.

Types of database models:


https://www.lucidchart.com/pages/database-diagram/database-models/#section_1
 Hierarchical database model.
 Relational model.
 Network model.
 Object-oriented database model.
 Entity-relationship model.
 Document model.
 Entity-attribute-value model.
 Star schema.

Transactional vs. Analytical Data Processing


Transactional processing takes place in operational systems (TPS) that provide the organization with the
capability to perform business transactions and produce transaction reports. The data are organized
mainly in a hierarchical structure and are centrally processed. This is done primarily for fast and efficient
processing of routine, repetitive data.

Analytical processing involves the analysis of accumulated data. Analytical processing, sometimes
referred to as business intelligence, includes data mining, decision support systems (DSS), querying, and
other analysis activities. These analyses place strategic information in the hands of decision makers to
enhance productivity and make better decisions, leading to greater competitive advantage.

Data Warehousing: also known as enterprise data warehouse (EDW)


A data warehouse is a type of data management system that is designed to enable and support business
intelligence (BI) activities, especially analytics. Data warehouses are solely intended to perform queries
and analysis and often contain large amounts of historical data. ... A relational database to store and
manage data.
A Data warehouse is typically used to connect and analyze business data from heterogeneous sources.
The data warehouse is the core of the BI system which is built for data analysis and reporting. It is a blend
of technologies and components which aids the strategic use of data.
Applies to: SQL Server (all supported versions) The management data warehouse is a relational database that
contains the data that is collected from a server that is a data collection target. This data is used to generate
the reports for the System Data collection sets, and can also be used to create custom reports.
There are three prominent data warehouse characteristics:
 Integrated: The way data is extracted and transformed is uniform, regardless of the
original source.
 Time-variant: Data is organized via time-periods (weekly, monthly, annually, etc.).
 Non-volatile: A data warehouse is not updated in real-time.
Tools used for data warehousing:
 Amazon Redshift.
 Microsoft Azure.
 Google BigQuery.
 Snowflake.
 Micro Focus Vertica.
 Teradata.
 Amazon DynamoDB.
PostgreSQL
Data warehousing entails an ETL (Extract Transform Load) process:
 Extracting data from various sources
 Transforming it to fit operational needs
 Loading it into the end target (data marts)

Metadata has been identified as a key success factor in data warehouse projects. It captures all kinds
of information necessary to extract, transform and load data from source systems into the data
warehouse, and afterwards to use and interpret the data warehouse contents.

What Is a Data Mart?


A data mart is a simple form of a data warehouse that is focused on a single subject (or functional
area)

TCP/IP stands for Transmission Control Protocol/Internet Protocol and is a suite of communication
protocols used to interconnect network devices on the internet. TCP/IP is also used as a
communications protocol in a private computer network (an intranet or extranet).
TCP/IP is a two-layered program: the higher layer (TCP) disassembles message content into small "data
packets"

What are the 5 layers of TCP IP?


The TCP/IP model is based on a five-layer model for networking. From bottom (the link) to top (the user
application), these are the physical, data link, net- work, transport, and application layers. Not all layers are
completely defined by the model, so these layers are “filled in” by external standards and protocols.

TELNET (Telecommunication Network) and FTP (File Transfer Protocol)


both are the application layer protocol. They are connection-oriented protocols as they create a
connection between remote host and a server. AS name File Transfer Protocol, FTP is used for
transferring the files from one system to another system. and TELNET is used for remote login for a
system.

S.NO TELNET FTP

TELNET stands for TELecommunication


1. NETwork. FTP stands for File Transfer Protocol.

2. TELNET is also used for chat operation. FTP is used for downloading the files.

The Port number in which TELNET is work


3. is 23. The Port number in which FTP is work is 20 and 21.
FTP establish two connections, one is for control
4. TELNET uses only one connection. command and another is for data transfer.

5. Remote Login is necessary in TELNET. Remote Login does not necessary in FTP.

It does not provide high security, it


6. provides only general security. It provides high security than TELNET.

It is used for transferring the files from one system to


7. It is used for remote login for a system. another system.

8. It is a connection oriented protocol. It is also a connection oriented protocol.

What does it mean to be an ISP?


ISP is an acronym that stands for Internet Service Provider. An Internet Service Provider is a company that
provides Internet access to organizations and home users. What exactly do ISPs do? In short, an ISP
provides you with Internet access, usually for a fee.

There is various type of connectivity to get hook on to Internet. They all can be broadly classified into following category:
(i) Gateway Access
(ii) Dial-up Connection
(iii) Leased Connection
(iv) DSL
(v) Cable Modem Connection
(vi) VSAT

Web Presence – Life Cycle

• Domain Registration • Identifying the web site hosting provider • Website software and content
development • Deployment of website on the hosting server • Promotion of the website • Maintenance

Web Hosting – Check points


• Hosting in-house vs Outsourced • Selection of the hosting platform based on the technology. • Easy
Maintenance • Security • Support

What Is SEO?
Search engine optimization (SEO) is the practice of getting targeted traffic to a website from a search
engine’s organic rankings. Common tasks associated with SEO include creating high-quality content,
optimizing content around specific keywords, and building backlinks.

SEO is all about improving a site’s rankings in the organic (non-paid) section of the search results. As
an Internet marketing strategy, SEO considers how search engines work, the computer-
programmed algorithms that dictate search engine behavior, what people search for, the actual search
terms or keywords typed into search engines, and which search engines are preferred by their targeted
audience..

Google AdWords and Google adsense

Search engine marketing (SEM) is a form of Internet marketing that involves the promotion
of websites by increasing their visibility in search engine results pages (SERPs) primarily through paid
advertising. Search engine marketing gives you the framework, tools, and processes to gain more visibility
in search engines either by getting higher positions in organic results or better positions for your ads. The
two main types of SEM, SEO, and PPC can work together in harmony and maximize your results.

Big data
is a term that describes large, hard-to-manage volumes of data – both structured and
unstructured – that inundate businesses on a day-to-day basis. ... Big data can be analyzed for
insights that improve decisions and give confidence for making strategic business moves.

Why Big Data?

 When big data is distilled and analyzed in combination with traditional enterprise data,
enterprises can develop a more thorough and insightful understanding of their business.
 It leads to enhanced productivity, a stronger competitive position and greater innovation.

What size of data is considered big data?


The term Big Data implies a large amount of information (terabytes and petabytes). It is important to
understand that to solve a particular business case, the value usually does not have the entire volume, but only
a small part. However, in advance this valuable component cannot be determined without analysis

The 4 V’s of Big Data:


https://www.dummies.com/careers/find-a-job/the-4-vs-of-big-data/
 Volume
 Velocity
 Variety
 Value

NETWORK
In the today world, Two devices are in network if a process in one device is able to
exchange information with a process in another device. Networks are known as a medium of connections
between nodes (set of devices) or computers. A network is consist of group of computer systems,
servers, networking devices are linked together to share resources, including a printer or a file server. The
connections is established by using either cable media or wireless media.

LAN (Local Area Network)

A Local Area Network is a privately owned computer network covering a small Networks geographical
area, like a home, office, or groups of buildings e.g. a school Network. A LAN is used to connect the
computers and other network devices so that the devices can communicate with each other to share the
resources. The resources to be shared can be a hardware device like printer, software like an application
program or data. The size of LAN is usually small. The various devices in LAN are connected to central
devices called Hub or Switch using a cable. Now-a-days LANs are being installed using wireless
technologies. Such a system makes use of access point or APs to transmit and receive data. One of the
computers in a network can become a server serving all the remaining computers called Clients.

MAN (Metropolitan Area Networks)

MAN stands for Metropolitan Area Networks is one of a number of types of networks. A MAN is a
relatively new class of network. MAN is larger than a local area network and as its name implies, covers
the area of a single city. MANs rarely extend beyond 100 KM and frequently comprise a combination of
different hardware and transmission media. It can be single network such as a cable TV network, or it is a
means of connecting several LANs into a larger network so that resources can be shared LAN to LAN as
well as device to device.

WAN (Wide Area Networks)

A wide area network (WAN) is a telecommunication network. A wide area network is simply a LAN of
LANs or Network of Networks. WANs connect LANs that may be on opposite sides of a building, across
the country or around the world. WANS are characterized by the slowest data communication rates and
the largest distances. WANs can be of two types: an enterprise WAN and Global WAN.

Hubs

A hub is a physical layer networking device which is used to connect multiple devices in a network. They
are generally used to connect computers in a LAN.

A hub has many ports in it. A computer which intends to be connected to the network is plugged in to
one of these ports. When a data frame arrives at a port, it is broadcast to every other port, without
considering whether it is destined for a particular destination or not.
Switches

A switch is a data link layer networking device which connects devices in a network and uses packet
switching to send and receive data over the network. Like a hub, a switch also has many ports, to which
computers are plugged in. However, when a data frame arrives at any port of a network switch, it
examines the destination address and sends the frame to the corresponding device(s). Thus, it supports
both unicast and multicast communications.

What is a network protocol?

A network protocol is a set of established rules that dictate how to format, transmit and receive data so
that computer network devices -- from servers and routers to endpoints -- can communicate, regardless
of the differences in their underlying infrastructures, designs or standards. To successfully send and
receive information, devices on both sides of a communication exchange must accept and follow protocol
conventions. In networking, support for protocols can be built into software, hardware or both. Without
computing protocols, computers and other devices would not know how to engage with each other. As a
result, except for specialty networks built around a specific architecture, few networks would be able to
function, and the internet as we know it wouldn't exist. Virtually all network end users rely on network
protocols for connectivity.

set of cooperating network protocols is called a protocol suite. The Transmission Control
Protocol/Internet Protocol (TCP/IP) suite, which is typically used in client-server models, includes
numerous protocols across layers -- such as the data, network, transport and application layers -- working
together to enable internet connectivity. These include the following:

TCP, which uses a set of rules to exchange messages with other internet points at the information packet
level.

 User Datagram Protocol, or UDP, which acts as an alternative communication protocol to TCP and
is used to establish low-latency and loss-tolerating connections between applications and the
internet.
 IP, which uses a set of rules to send and receive messages at the level of IP addresses.
1stAnswer:
In general, business analysts must create reports and communicate project findings to business
stakeholders and clients in order to get a better understanding.
Here, IHH plans to provide pocket-size wireless tablet devices to all its doctors for data access,
entry, and communication where the collected data is sent and stored in data base management
system. Here multi-file relational or structured database which help in collecting relational
database contains multiple tables of data with rows and columns that relate to each other
through special key fields.
With a tablet-based system, IHH hospitals can relocate devices wherever they are required,
whether at the usual check-in desk, pre-stage areas, or pop-up temporary hospital tents and
drive-thru screening locations. The mobility of tablet-based systems allows hospitals to flexibly
reconfigure fast as needs change, with the added benefit of having a solution that can be
disinfected between patients
Many mobile (tablet) apps are now available to help hospitals with a variety of important tasks,
including: information and time management; health record maintenance and access;
communications and consulting; reference and information gathering; patient management and
monitoring; clinical decision-making; and medical education and training. Here, Ideally, IHHs
require access to many types of resources in a clinical setting, including:
 Paperless Check In: Paper registration forms can be frustrating for hospital staff. Making
sure they are filled out completely, scanning them, manually entering the data into the
EMR … dealing with these types of forms is a time and labor-intensive process that is
prone to error and takes valuable time away from patient.
 Faster Insurance Verification: Insurance ID, coverage and required co-pay details comes
next. Manual scanning and entry of insurance cards is time consuming, prone to error
and tedious.
 Electronic Record Keeping: A patient checking in can experience check-in delays simply
due to searching for misfiled paper-based records. Scanning, barcoding, and data entry
consume a lot of your time when using paper forms.
 Communication capabilities—voice calling, video conferencing, text, and e-mail
 Hospital information systems (HISs)—electronic health records (EHRs), electronic medical
records (EMRs), clinical decision support systems (CDSSs), picture archiving and
communication systems (PACSs), and laboratory information systems
 Informational resources—textbooks, guidelines, medical literature, drug references
 Clinical software applications—disease diagnosis aids, medical calculators.
Five Ways to Improve Access to Care:
 See your own patients. Good care comes from access to the same person or team who
knows a patient's history. ...
 Make it easy to schedule an appointment. ...
 Offer to see patients the day they call. ...
 Manage patient demand. ...
 Use e-mail with patients.
RFID technology enables hundreds of healthcare applications to improve patient safety, control
surgical instruments, assist staff and patient workflow, automate restocking and invoicing,
authenticate quality and sterilising procedures, and maintain medical records.
After logging into the doctor's account, the patient ID may be retrieved by scanning the RFID
card. The doctor has access to and may update the patient's medical information and
medications. This method helps emergency departments enhance efficiency while also
improving patient care.

3rdAnswer:
As the central focus of HIPAA is data security and privacy the main rules and regulations consists
of three major components,
 HIPAA Privacy rules
 Security rules,
 Breach Notification rules.
The main data security aspects that you would consider when enterprise is deployed into
cloud base
 Data Breaches: A data breach is a security violation in which sensitive, protected or
confidential data is copied, transmitted, viewed, stolen or used by an individual
unauthorized to do so.
 Hijacking of Accounts : The growth and implementation of the cloud in many
organizations has opened a whole new set of issues in account hijacking.
Attackers now have the ability to use your (or your employees’) login information to
remotely access sensitive data stored on the cloud; additionally, attackers can falsify and
manipulate information through hijacked credentials
 Insider Threat: An attack from inside your organization may seem unlikely, but the insider
threat does exist. Employees can use their authorized access to an organization’s cloud-
based services to misuse or access information such as customer accounts, financial
forms, and other sensitive information.
 Malware Injection: Malware injections are scripts or code embedded into cloud services
that act as “valid instances” and run as SaaS to cloud servers. This means that malicious
code can be injected into cloud services and viewed as part of the software or service
that is running within the cloud servers themselves.
 Abuse of Cloud Services:The expansion of cloud-based services has made it possible
for both small and enterprise-level organizations to host vast amounts of data easily.
However, the cloud’s unprecedented storage capacity has also allowed both hackers and
authorized users to easily host and spread malware, illegal software, and other digital
properties.
 Insecure APIs: Application Programming Interfaces (API) give users the opportunity to
customize their cloud experience. Here any access one can edit
 Denial of Service Attacks
 Insufficient Due Diligence
 Shared Vulnerabilities
 Cloud security is a shared responsibility between the provider and the client.
This partnership between client and provider requires the client to take preventative
actions to protect their data. While major providers like Box, Dropbox, Microsoft, and
Google do have standardized procedures to secure their side, fine grain control
is up to you, the client.
 Data Loss:Data on cloud services can be lost through a malicious attack, natural disaster,
or a data wipe by the service provider. Losing vital information can be devastating to
businesses that don’t have a recovery plan.

TCP/IP stands for Transmission Control Protocol/Internet Protocol and is a suite of


communication protocols used to interconnect network devices on the internet. TCP/IP is also
used as a communications protocol in a private computer network (an intranet or extranet).
TCP/IP is a two-layered program: the higher layer (TCP) disassembles message content into small
"data packets"
TCP/IP also uses point-to-point communication, which means that data is sent from one host
computer to another inside a predefined network border.
Finally, TCP/IP is considered to be stateless since each request is unique and unconnected to all
prior ones, allowing network paths to be utilized indefinitely by all.

2nd

Authorized users can access a web-based solution with customized content. IHH intends to launch a new
online page to give information about its enhanced products as part of its IT renovation strategy. For
Creating any web portal the main important thing is to maintain web host and web presence after creation.
Web Hosting – Check points
• Hosting in-house vs Outsourced • Selection of the hosting platform based on the technology. • Easy
Maintenance • Security • Support
Web Presence – Life Cycle
• Domain Registration • Identifying the web site hosting provider • Website software and content
development • Deployment of website on the hosting server • Promotion of the website • Maintenance

The steps/processes required in building a web portal are as follows:

 Preparation: Determining the target audience, analyzing competitors, defining the main goals
 Planning: it’s necessary to outline requirements for every element of the platform
 Design: You should the visual style of the web portal
 Content writing: you try to define the topics that may be interesting to your consumers
 Coding: here all the previous are combined into a completely functional web portal
 Testing and Launching: It is important to make sure your code is valid
 Maintenance and Updating: Adding new features, updating content, processing feedback, etc.
SEO is all about improving a site’s rankings in the organic (non-paid) section of the search results.
As an Internet marketing strategy, SEO considers how search engines work, the computer-
programmed algorithms that dictate search engine behavior, what people search for, the actual
search terms or keywords typed into search engines, and which search engines are preferred by
their targeted audience.

Search engine marketing (SEM) is a form of Internet marketing that involves the promotion
of websites by increasing their visibility in search engine results pages (SERPs) primarily through
paid advertising. Search engine marketing gives you the framework, tools, and processes to gain
more visibility in search engines either by getting higher positions in organic results or better
positions for your ads. The two main types of SEM, SEO, and PPC can work together in harmony
and maximize your results.

Here SEO and SEM is important as

4th
Considering the typical operations of IHH and the specific technical changes it is planning, the
proposed project can be regarded as a "Big Data" problem. It can be justified by the following
A project is considered as a

“Big Data” problem when:

Lack of knowledge Professionals: To run these modern technologies and large Data tools,
companies need skilled data professionals. These professionals will include data scientists, data
analysts, and data engineers to work with the tools and make sense of giant data sets.
Lack of proper understanding of Massive Data: Companies struggle to succeed in their Big Data
projects due to a lack of knowledge. Employees may not understand what data is, how it is
stored, processed, and where it comes from. Others may not have a clear picture of what's going
on, even if data specialists do.

Data Growth Issues: The appropriate storage of these large collections of knowledge is one of
the most serious issues of big data. The amount of data being kept in data centers and company
databases are continuously rising.
Confusion while Big Data Tool selection: Companies frequently become perplexed while deciding
on the most basic instrument for large-scale data analysis and storage. They are prone to making
bad judgments and utilizing ineffective technology.
Integrating Data from a Spread of Sources: In a company, data comes from a variety of places,
including social media sites, ERP systems, customer logs, financial reports, e-mails,
presentations, and employee-created reports. Combining all of this information to create reports
may be a difficult process.
Securing Data: One of the biggest difficulties of large data is securing these massive amounts of
knowledge. Companies are frequently so preoccupied with comprehending, preserving, and
analysing their data sets that data security is pushed to the back burner.

IHH might encounter the following challenges too while making specific technical changes

 Enhance the efficiency of diagnoses.


 Prescribing Preventive medicine and health.
 Providing results to doctors in a digital form.
 Using predictive analysis to uncovers patterns that couldn’t be previously revealed.

Providing Real-Time monitoring RFID technology enables hundreds of healthcare applications to


improve patient safety, control surgical instruments, assist staff and patient workflow, automate
restocking and invoicing, authenticate quality and sterilising procedures, and maintain medical
records.
After logging into the doctor's account, the patient ID may be retrieved by scanning the RFID
card. The doctor has access to and may update the patient's medical information and
medications. This method helps emergency departments enhance efficiency while

Defining Augmented Reality (AR) and Virtual Reality (VR)


AR and VR technologies are revitalizing the new normal for businesses. The AR hype had first found
ground back in 2018, and since then, it is being widely used to improve the overall employee
performances and customer experiences.

PwC predicts that AR and VR will positively impact 23 million jobs by 2030. The technology finds
applicability in training, meetings, and even business functions such as customer service.

Both AR and VR technologies are among the most exciting trends today for various reasons. On the one
hand, AR applications let you explore superimpose digital content in real-world locations, such as
images, text, and sounds.

And on the other, VR transforms your vision into a simulated experience that can be similar or
completely different from the real world — only limited by your imagination.

AR/VR usage booms in the workplace amid the pandemic

The pandemic has disrupted business operations across industries, leading to changes such as remote
working. It made collaboration among teams tougher than ever, especially in roles like operations,
finance and IT where security is paramount.
The adoption of digital approaches, including the implementation of AR, has helped businesses improve
the productivity of their workforces.

Specific use cases include real-time interaction among teams worldwide, real-time access to
information, and a controlled training environment — a necessity to execute change management
during the pandemic.

The technologies have successfully come together — from recruitment and prototyping to creating an
Extended Reality (XR) environment, thus boosting your organization’s resilience.

Benefits of AR/VR in the workplace

When you check out the five pros mentioned below, you will realize how AR and VR have helped
implement change management, enabling employees to learn faster and retain the information for
longer. Here is how offices can benefit from the two technologies:

1. Accessing real-time information

AR devices such as smart goggles can help your workforce access crucial data in real-time. This is
extremely useful in the case of manufacturing units where handling equipment on assembly lines or
other critical spots across the factory floor has to be done properly.

Smart goggles can quickly spot any issues and fix them in time, thus avoiding accidents. Easy access to
real-time data during meetings can help in informed decision-making. This improves productivity by
ensuring the relevant data is used while framing policies or designing solutions.

2. Keeping workplaces safe

The use of Augmented Reality in the workplace can be beneficial for the safety of workers and
equipment at the workplace. It provides them with a realistic training scenario that they would face if an
emergency arose.

For instance, there is nothing better than using virtual simulations of a live wire obstruction or fire
breakout. It allows the employees to practice handling possible hazards before things actually go wrong.

AR also allows employees to access relevant information even from critical places like near a boiler or on
top of machinery.

3. Reducing the skills gap

Companies are adopting newer processes across functions, thereby increasing the skills gap. HR
managers often face the challenge of finding the right people for a complex task. AR helps them train
new hires through interactive training sessions.

The learning curve is shortened for the new employees, thereby saving training time. The recruits can
also be guided step-by-step through non-repetitive tasks.

4. Virtual prototyping to develop products faster


The traditional product development process typically involves building a physical prototype and taking
it to the lab for testing. The tests will likely reveal several design flaws that require re-design or
reconfiguration, but this is an unnecessary expense in many cases.

Virtual prototyping speeds up the process by eliminating unnecessary steps. Virtual testing allows
optimization of the design, reducing the cost and time of product development.

5. Improving collaboration

Collaboration among remote teams has been the most significant challenge during the pandemic.
Deploying AR technology allows each teammate to be a part of the experience while saving travel costs
and keeping all safe. Visuals and data can also be shared in an easily consumable fashion with
employees for fruitful discussions.

Quick tips to support AR and VR adoption for change management

Now that you know the benefits the two technologies bring to the table, let us see how your business
can support their deployment for addressing a change:

1. Identify stakeholders who can help with the adoption

Introducing innovative technologies such as visual assistance requires a smooth roll-out for a quick
return on your investment. By adopting established change management strategies, you empower your
employees to leverage the new tech quickly.

A crucial step of change management is identifying leaders and change agents. Identifying key
individuals and teams help create an environment that makes others comfortable with the change as it
is easy to resist it.

Leaders can communicate changes internally and motivate teams. They help to reduce resistance to
new processes. It would be best if you shared the benefits of adopting AR/VR support to make your
employees realize how using it will help them every day.

Acceptance to change increases once the employees relate to how it eliminates mundane tasks and
achieves faster results. You can consider stakeholder feedback to determine the best ways to
communicate change and its benefits.

It can range from creating video tutorials demonstrating how to use the software or having face-to-face
interactions to explain how the adoption of AR/VR will reduce common pain points and make work
easier for employees.

2. Educate systematically via different modes

Teams respond to rewards and recognition with quicker adoption of the change. Healthy competition
works best to gear up teams to change. Take help from leaders and change agents to set clear
expectations of the new process.

More resistant teams can be paired up with established champions to motivate them and unfreeze
acceptance behavior. Gamification also helps in boosting employees to use new processes and tools.
You can reward them by setting up different levels of the process as challenges and tallying performance
on a leaderboard. Take the challenge up by rewarding achievers with gift cards, lunches, or personalized
accessories.

Companies can use various tactics to drive the adoption of new technologies, like enforcing clear
expectations and forced compliance with targets. Though formal processes of withholding bonuses or
promotion upon non-adherence add pressure onto an already sensitive situation.

3. Connect the tech to existing processes

Your employees are already aligned with your business processes, so you must connect the new
technology with existing ones. Instead of redefining the entire process, you can integrate visual
assistance into them.

It is vital to ensure that the AR/VR technology you plan to use is easily embedded into your
infrastructure. A new interface or duplication of work can lead to resistance from teams.

Easy deployment is another benefit of identifying where visual assistance fits your existing business
processes. Identify where the new technology fits and how it can improve existing processes. Identify
common problems and resolve them to reduce employee frustration.

Create documentation for the change management process steps and decide how and when to initiate
the adoption. Plan training and support sessions to minimize repetition.

4. Prioritize dynamic training


Research shows that it takes around two months for someone to develop confidence and self-efficacy in
their ability to use something new. If users are given this opportunity early on, there is a much higher
chance of success.

You have the capacity to plan your roll-out strategy well. A successful and lasting implementation starts
with confident training on using the tools at hand.

When you are looking to train your team on a new system, it is best not just to provide them with the
tool. Instead, it would be best if you eased their minds about why the change is happening and what will
happen at each stage.

Set a clear path to adoption of the new technology and easier enablement. When your team arrives for
training, they should know why the organization has invested in visual support and how they will be
trained.

Send them introductory videos, so they turn up for the training well-prepared. Allow time during
sessions to experiment with the technology with friends or family members to put users at ease with the
technology.

It provides new users a hands-on experience while they learn how it works. Discuss their experience and
even point them to the correct person for any queries they might have later
What is Quantum Computing?
This non-classical model of computation uses quantum mechanical principles like quantum
entanglement and superposition. Quantum computers can perform certain tasks that classical
computers cannot within a reasonable timeline. The world of quantum is indeed mysterious. Unlike the
classical ones, they can store information as zero or one or the superposition of both.

Several tech giants like IBM, Intel, Microsoft, and Google (along with NASA and USRA) have already
started investing tons of money into this field.

Computational chemistry, financial applications, optimizations, quantum machine learning, etc. are
generally good targets of quantum computing applications. However, Quantum computing has spread
its roots far and wide from insurance to agriculture.

Quantum Computing in Insurance

Quantum computing is a rising phenomenon in the Gartner Hype Cycle. The hype cycle is a graphical
representation of technologies’ maturity, adoption & applications across industries, and the benefits
they bring to the businesses. It is expected to become one of the greatest disruptions of the age.
Quantum computing can process huge datasets in a fraction of a second that would have previously
taken days and weeks. It can also calculate almost any kind of risks, such as the impact of an
approaching hurricane.

Mitch Wein and Tom Kramer offer various use cases of quantum computing in “Quantum Computing
and Insurance: Overview and Potential Players.” However, this technology isn’t yet available for
commercial use, unlike AI.

The insurance industry is simplifying many of its back and front-office operations through AI, it is still
restricted by barriers of binary computing. Quantum computing can unlock and change the entire
dynamics of how insurance companies carry out complex calculations. Insurtech companies are creating
and testing solutions around this approach and its effects will soon be visible.

Quantum Computing in Retail


In the future, Quantum computing will remould our economic, industrial, academic, and societal
landscape. A quantum computer can solve complex problems much faster than a classical computer in a
given time frame. The retail sector generates a huge amount of data which is analyzed to study
shoppers’ demographics & preferences and manage the supply chains efficiently.

With the introduction of quantum computers, the process of analyzing the data will become much faster
and easier- hence making it easy to deliver a highly personalized experience to the customers. Microsoft
envisions a future where quantum computing is available to a broad audience, scaling as needed to
solve some of the world’s toughest challenges.

The quantum approach in retail begins within a tool we are acquainted with- such as Visual Studio. It
provides development resources to build and promote quantum solutions, and it continues with
deployment through Azure for a streamlined combination of both quantum and classical processing.

Quantum Computing in Gaming


Being a very new technology in itself, quantum computing can take game development experience to a
whole new level. In the future, one can implement it into game development in interesting ways such as
procedural generations, random generation of content, and many more. But today it’s hampered by the
fact that you need to make a game decisively solvable and this is going to be a lot easier with a quantum
computer.

Quantum Computing in Healthcare

Quantum computing could provide unprecedented power and speed of processing as well as novel and
fundamentally different algorithmic search and data homogenization strategies.

From the healthcare perspective, quantum computing technology can lead to “dramatic” accelerations
in speed and performance.

With increased computing available, clinicians could easily review CT scans over time and quickly
identify changes and anomalies. Similarly, it can accelerate precision medicine. With quantum
computing’s enhanced data processing abilities, medical practitioners can quickly identify targeted
chemotherapy protocols and with more customization.

Quantum Computing in Agriculture

A Quantum computer in agriculture could help in detecting weed through an invasive weed optimization
algorithm. Farmers can hence, effectively craft fertilizers.

Almost all the fertilizers contain ammonia. Therefore efficient manufacturing of ammonia or its
substitute will result in cheaper and less energy-intensive fertilizer generation. However, there hasn’t
been substantial progress because the number of possible catalyst combinations to do so is infinite. A
Quantum computer can quickly analyze and come up with a catalytic combination, which is beyond the
abilities of our largest supercomputers.

Is Disruption ‘Near’ for Quantum Computing?

In the past few years, governments worldwide and giant tech companies such as Google, IBM,
Microsoft, Alibaba, and many others have been investing heavily in quantum computing.

With quantum supremacy, a quantum computer can perform operations that a classical computer
practically cannot. Despite the far-reaching goal, tremendous progress significant technical barriers
must be surmounted before achieving its potential. This would require stable hardware, a commercial
platform for software development and development of cloud computing capabilities to unleash the
ultimate quantum supremacy

IDE: What is different about quantum computing now, as we enter 2022, and why should business
take notice? Is there urgency?

Ruane: There is a wide gap between understanding the complexities of quantum computing and
harnessing the physical capabilities. Researchers have been working on this for decades, and we
shouldn’t expect 2022 to be the year it is seen everywhere; it’s an evolution. It is slowly emerging, and
we hope substantial progress will follow. Even so, businesses need to take note now.
One sign that things are heating up is the huge amount of resources being applied. Tremendous levels of
investment, private-sector competition, and scientific talent are focused on quantum research. Venture
capital funding grew by 500% from 2015 to 2020, according to CB Insights. Research and development
heavyweights Google, Amazon, Honeywell, IBM, and Intel are also in the race to deliver the next
quantum breakthrough.

When we see the public sector, academia, and industry getting involved and investing in a technology at
this rate, breakthroughs often happen. There is no physics-based reason why quantum progress is not
achievable. Many of the processes we are trying to harness already exist in the natural world – that’s
why it is such an exciting space.

Executives need to think about how new computing models will spur digital investment, reshape
industries, and spark innovation. A solid understanding of quantum applications today is crucial for
positioning a company to reap the benefits—and avoid potential catastrophe—during the next decade.

IDE: Discuss the cybersecurity gains and risks posed by quantum computing and the timeframe for
implementation.

Ruane: Today, most encrypted data–whether at rest or in transit — would be useless if a nefarious third
party got access to it. Data safety is ensured because it would take an unfeasible amount of time to
break the security protocols using classical computers, not because it is theoretically impossible to break
them. Quantum computers, on the other hand, have the potential to break important elements of
current cryptography. Even though quantum machines of requisite scale are a long way off, any data
that is captured today could be stored and eventually unencrypted once quantum computers are widely
used.

An end to our current infrastructure for ensuring

IDE: What should business leaders consider today? Can you offer some specific recommendations?

Ruane: Quantum computers won’t be widely available this decade, but it takes time to realize the
impact of a new paradigm like this and how it will be used. Businesses can start building teams to
understand what data changes will be needed and how new architecture will work with current data,
systems, and computers. One immediate approach is to run small internal experiments and to build
relationships with quantum cloud providers.

There is already a shortage of talent. Up-skilling of data scientists to be quantum-capable is a great way
to address this within an organization. Application developers will have to be retrained, too, and
executive buy-in is needed. Advocates must get the conversation started while speaking realistically
about the benefits.

What is virtualization?
Virtualization is the creation of a virtual -- rather than actual -- version of something, such as an
operating system (OS), a server, a storage device or network resources.

Virtualization uses software that simulates hardware functionality to create a virtual system. This
practice allows IT organizations to operate multiple operating systems, more than one virtual system and
various applications on a single server. The benefits of virtualization include greater efficiencies and
economies of scale.
OS virtualization is the use of software to allow a piece of hardware to run multiple operating system
images at the same time. The technology got its start on mainframes decades ago, allowing
administrators to avoid wasting expensive processing power.

How virtualization works

Virtualization describes a technology in which an application, guest OS or data storage is abstracted


away from the true underlying hardware or software.

A key use of virtualization technology is server virtualization, which uses a software layer -- called
a hypervisor</a -- to emulate the underlying hardware. This often includes the CPU's memory,
input/output (I/O) and network traffic.

Hypervisors take the physical resources and separate them so they can be utilized by the virtual
environment. They can sit on top of an OS or they can be directly installed onto the hardware. The latter
is how most enterprises virtualize their systems.

The Xen hypervisor is an open source software program that is responsible for managing the low-level
interactions that occur between virtual machines (VMs) and the physical hardware. In other words, the
Xen hypervisor enables the simultaneous creation, execution and management of various virtual
machines in one physical environment.

With the help of the hypervisor, the guest OS, normally interacting with true hardware, is now doing so
with a software emulation of that hardware; often, the guest OS has no idea it's on virtualized hardware.

While the performance of this virtual system is not equal to the performance of the operating system
running on true hardware, the concept of virtualization works because most guest operating systems
and applications don't need the full use of the underlying hardware.

This allows for greater flexibility, control and isolation by removing the dependency on a given hardware
platform. While initially meant for server virtualization, the concept of virtualization has spread to
applications, networks, data and desktops.

Types of virtualization

You probably know a little about virtualization if you have ever divided your hard drive into different
partitions. A partition is the logical division of a hard disk drive to create, in effect, two separate hard
drives.

There are six areas of IT where virtualization is making headway:

1. Network virtualization is a method of combining the available resources in a network by


splitting up the available bandwidth into channels, each of which is independent from the others
and can be assigned -- or reassigned -- to a particular server or device in real time. The idea is
that virtualization disguises the true complexity of the network by separating it into manageable
parts, much like your partitioned hard drive makes it easier to manage your files.
2. Storage virtualization is the pooling of physical storage from multiple network storage devices
into what appears to be a single storage device that is managed from a central console. Storage
virtualization is commonly used in storage area networks.

3. Server virtualization is the masking of server resources -- including the number and identity of
individual physical servers, processors and operating systems -- from server users. The intention
is to spare the user from having to understand and manage complicated details of server
resources while increasing resource sharing and utilization and maintaining the capacity to
expand later.

4. Data virtualization is abstracting the traditional technical details of data and data management,
such as location, performance or format, in favor of broader access and more resiliency tied to
business needs.

5. Desktop virtualization is virtualizing a workstation load rather than a server. This allows the user
to access the desktop remotely, typically using a thin client at the desk. Since the workstation is
essentially running in a data center server, access to it can be both more secure and portable.
The operating system license does still need to be accounted for as well as the infrastructure.

6. Application virtualization is abstracting the application layer away from the operating system.
This way, the application can run in an encapsulated form without being depended upon on by
the operating system underneath. This can allow a Windows application to run on Linux and vice
versa, in addition to adding a level of isolation.

Advantages of virtualization

The advantages of utilizing a virtualized environment include the following:

 Lower costs. Virtualization reduces the amount of hardware servers necessary within a company
and data center. This lowers the overall cost of buying and maintaining large amounts of
hardware.

 Easier disaster recovery. Disaster recovery is very simple in a virtualized environment. Regular
snapshots provide up-to-date data, allowing virtual machines to be feasibly backed up and
recovered. Even in an emergency, a virtual machine can be migrated to a new location within
minutes.

 Easier testing. Testing is less complicated in a virtual environment. Even if a large mistake is
made, the test does not need to stop and go back to the beginning. It can simply return to the
previous snapshot and proceed with the test.

 Quicker backups. Backups can be taken of both the virtual server and the virtual
machine. Automatic snapshots are taken throughout the day to guarantee that all data is up-to-
date. Furthermore, the virtual machines can be easily migrated between each other and
efficiently redeployed.

 Improved productivity. Fewer physical resources result in less time spent managing and
maintaining the servers. Tasks that can take days or weeks in a physical environment can be
done in minutes. This allows staff members to spend the majority of their time on more
productive tasks, such as raising revenue and fostering business initiatives.

Benefits of virtualization

Virtualization provides companies with the benefit of maximizing their output. Additional benefit for
both businesses and data centers include the following:

 Single-minded servers. Virtualization provides a cost-effective way to separate email, database


and web servers, creating a more comprehensive and dependable system.

 Expedited deployment and redeployment. When a physical server crashes, the backup server
may not always be ready or up to date. There also may not be an image or clone of the server
available. If this is the case, then the redeployment process can be time-consuming and tedious.
However, if the data center is virtualized, then the process is quick and fairly simple. Virtual
backup tools can expedite the process to minutes.

 Reduced heat and improved energy savings. Companies that use a lot of hardware servers risk
overheating their physical resources. The best way to prevent this from happening is to decrease
the number of servers used for data management, and the best way to do this is through
virtualization.

 Better for the environment. Companies and data centers that utilize copious amounts of
hardware leave a large carbon footprint; they must take responsibility for the pollution they are
generating. Virtualization can help reduce these effects by significantly decreasing the necessary
amounts of cooling and power, thus helping clean the air and the atmosphere. As a result,
companies and data centers that virtualize will improve their reputation while also enhancing
the quality of their relationship with customers and the planet.

 Easier migration to the cloud. Virtualization brings companies closer to experiencing a


completely cloud-based environment. Virtual machines may even be deployed from the data
center in order to build a cloud-based infrastructure. The ability to embrace a cloud-based
mindset with virtualization makes migrating to the cloud even easier.
 Lack of vendor dependency. Virtual machines are agnostic in hardware configuration. As a
result, virtualizing hardware and software means that a company does not need to depend on a
vendor for these physical resources.

Limitations of virtualization

Before converting to a virtualized environment, it is important to consider the various upfront costs. The
necessary investment in virtualization software, as well as hardware that might be required to make the
virtualization possible, can be costly. If the existing infrastructure is more than five years old, an initial
renewal budget will have to be considered.

Fortunately, many businesses have the capacity to accommodate virtualization without spending large
amounts of cash. Furthermore, the costs can be offset by collaborating with a managed service
provider that provides monthly leasing or purchase options.
There are also software licensing considerations that must be considered when creating a virtualized
environment. Companies must ensure that they have a clear understanding of how their vendors view
software use within a virtualized environment. This is becoming less of a limitation as more software
providers adapt to the increased use of virtualization.

Converting to virtualization takes time and may come with a learning curve. Implementing and
controlling a virtualized environment demands each IT staff member to be trained and possess expertise
in virtualization. Furthermore, some applications do not adapt well when brought into a virtual
environment. The IT staff will need to be prepared to face these challenges and should address them
prior to converting.

There are also security risks involved with virtualization. Data is crucial to the success of a business and,
therefore, is a common target for attacks. The chances of experiencing a data breach significantly
increase while using virtualization.

Finally, in a virtual environment, users lose control of what they can do because there are several links
that must collaborate to perform the same task. If any part is not working, then the entire operation will
fail.

enterprise resource planning (ERP)


Enterprise resource planning (ERP) refers to a type of software that organizations use to manage
day-to-day business activities such as accounting, procurement, project management, risk
management and compliance, and supply chain operations. A complete ERP suite also
includes enterprise performance management, software that helps plan, budget, predict, and
report on an organization’s financial results.
ERP systems tie together a multitude of business processes and enable the flow of data between
them. By collecting an organization’s shared transactional data from multiple sources, ERP
systems eliminate data duplication and provide data integrity with a single source of truth.

Today, ERP systems are critical for managing thousands of businesses of all sizes and in all
industries. To these companies, ERP is as indispensable as the electricity that keeps the lights on.
What is an ERP system?
How can these solutions manage organizations day-to-day business activities, such as
accounting, finance, procurement, project management, supply chain, and manufacturing.

Enterprise resource planning systems are complete, integrated platforms, either on-premises or
in the cloud, managing all aspects of a production-based or distribution business. Furthermore,
ERP systems support all aspects of financial management, human resources, supply chain
management, and manufacturing with your core accounting function.

ERP systems will also provide transparency into your complete business process by tracking all
aspects of production, logistics, and financials. These integrated systems act as a business's
central hub for end-to-end workflow and data, allowing a variety of departments to access.

ERP Systems and software support multiple functions across the enterprise, mid-sized, or small
businesses, including customizations for your industry.
ERP fundamentals
ERP systems are designed around a single, defined data structure (schema) that typically has a
common database. This helps ensure that the information used across the enterprise is
normalized and based on common definitions and user experiences. These core constructs are
then interconnected with business processes driven by workflows across business departments
(e.g. finance, human resources, engineering, marketing, and operations), connecting systems
and the people who use them. Simply put, ERP is the vehicle for integrating people, processes,
and technologies across a modern enterprise.

The business value of ERP


It’s impossible to ignore the impact of ERP in today’s business world. As enterprise data and
processes are corralled into ERP systems, businesses can align separate departments and
improve workflows, resulting in significant bottom-line savings. Examples of specific business
benefits include:

 Improved business insight from real-time information generated by reports


 Lower operational costs through streamlined business processes and best practices
 Enhanced collaboration from users sharing data in contracts, requisitions, and
purchase orders
 Improved efficiency through a common user experience across many business
functions and well-defined business processes
 Consistent infrastructure from the back office to the front office, with all business
activities having the same look and feel
 Higher user-adoption rates from a common user experience and design
 Reduced risk through improved data integrity and financial controls
 Lower management and operational costs through uniform and integrated systems
7 reasons to move to an ERP cloud solution
For businesses of all sizes, including enterprise and small to midsize, retiring on-premises systems and
moving entirely to the cloud all at once isn’t possible. Or, at the very least, it’s not something they’re
comfortable doing within a short development window. Meanwhile, staying the course with an on-
premises ERP, ignoring all the advantages of enterprise resource planning as a cloud solution, is no
longer an ideal path, either. Why should you consider using cloud applications to replace or augment
your on-premises system?

1. Readily adopt new and evolving SaaS technologies


Next-generation technologies, like artificial intelligence (AI), help cloud-based systems rapidly improve
their capabilities with no need for periodic updates, unlike your legacy system. Now, with no additional
or new input from the end-user, ERP systems continually become significantly easier to manage and use.

2. Extend the value of your existing ERP System


Augmenting and integrating legacy software with cloud applications can complement, enhance, and
supplement important tasks. This approach can breathe new life into legacy ERP systems, giving
businesses a great opportunity to start adopting cloud capabilities.
3. Access new technologies
Finding cloud applications that complement your legacy ERP software modules lets you immediately
take advantage of rapidly advancing new technologies and improving user paradigms. These provide
complimentary systems that deliver immediate business capabilities and value without a fundamental
change in your operations.

4. Reduce third-party dependencies


Reporting and analytics for legacy systems typically require involvement from a third-party vendor to
generate operational business intelligence. Using cloud applications from your legacy ERP vendor often
produces the same or better intelligence without needing an additional vendor relationship.

5. Evolve your financial systems


Legacy systems were never meant to be modern reporting engines. Cloud-based technology was born in
the last decade and developed, as a core principle, with an entirely different mindset and understanding
of not only what was possible but what was needed to be successful for ERP platforms.

6. More robust security resources


Cloud solution service providers have large, full-time teams that are exclusively dedicated to proactively
monitoring and staying current with cloud security issues and threats, 24 hours a day.

7. Attract in-demand talent


The next generation of young workers have grown up with seamless technology that is mobile, easy to
use, and always-on. No company that continues to rely purely with on-premises technology will be able
to recruit top talent, regardless of age.

SUPPLY CHAIN MANAGEMENT


Supply chain management is the systemic, strategic coordination of the traditional business functions
and tactics across these business functions - both within a particular company and across businesses
within the supply chain- all coordinated to improve the long-term performance of the individual
companies and the supply chain as a whole.
In a traditional manufacturing environment, supply chain management meant managing movement
and storage of raw materials, work-in-progress inventory, and finished goods from point of origin
to point of consumption.
It involves managing the network of interconnected smaller business units, networks of channels
that take part in producing a merchandise of a service package required by the end users or
customers.
With businesses crossing the barriers of local markets and reaching out to a global scenario, SCM
is now defined as −
Design, planning, execution, control, and monitoring of supply chain activities with the objective of
creating net value, building a competitive infrastructure, leveraging worldwide logistics,
synchronizing supply with demand and measuring performance globally.
SCM consists of −
 operations management
 logistics
 procurement
 information technology
 integrated business operations
Objectives of SCM
 To decrease inventory cost by more accurately predicting demand and scheduling
production to match it.
 To reduce overall production cost by streamlining production and by improving
information flow.
 To improve customer satisfaction.
Features of SCM
 Integrated behaviour
 Mutually sharing information
 Mutually sharing channel and risk and reward
 Focusing on serving customer
 Co-operation
 Partnership to build and maintain long term relationships
 Integration of process
Scope of SCM
 Supplier management
 Inventory management
 Distribution management
 Channel management
 Payment management
 Financial management
 Sales force management
SCM Processes
 Customer Relationship Management
 Customer Service Management
 Demand Management
 Customer Order Fulfillment
 Manufacturing Flow Management
 Procurement Management
 Product Development and Commercialization
 Returns Management
Advantages of SCM
SCM have multi-dimensional advantages −

 To the suppliers −
o Help in giving clear-cut instruction
o Online data transfer reduce paper work
 Inventory Economy −
o Low cost of handling inventory
o Low cost of stock outage by deciding optimum size of replenishment
orders
o Achieve excellent logistical performance such as just in time
 Distribution Point −
o Satisfied distributor and whole seller ensure that the right products
reach the right place at right time
o Clear business processes subject to fewer errors
o Easy accounting of stock and cost of stock
 Channel Management −
o Reduce total number of transactions required to provide product
assortment
o Organization is logically capable of performing customization
requirements
 Financial management −
o Low cost
o Realistic analysis
 Operational performance −
o It involves delivery speed and consistency.
 External customer −
o Conformance of product and services to their requirements
o Competitive prices
o Quality and reliability
o Delivery
o After sales services
 To employees and internal customers −
o Teamwork and cooperation
o Efficient structure and system
o Quality work
o Delivery
CUSTOMER RELATIONSHIP MANAGEMENT
CRM is an enterprise application module that manages a company's interactions with current and
future customers by organizing and coordinating, sales and marketing, and providing better
customer services along with technical support.
Atul Parvatiyar and Jagdish N. Sheth provide an excellent definition for customer relationship
management in their work titled - 'Customer Relationship Management: Emerging Practice,
Process, and Discipline' −
Customer Relationship Management is a comprehensive strategy and process of acquiring, retaining,
and partnering with selective customers to create superior value for the company and the customer. It
involves the integration of marketing, sales, customer service, and the supply-chain functions of the
organization to achieve greater efficiencies and effectiveness in delivering customer value.

Why CRM?
 To keep track of all present and future customers.
 To identify and target the best customers.
 To let the customers know about the existing as well as the new products and
services.
 To provide real-time and personalized services based on the needs and habits of the
existing customers.
 To provide superior service and consistent customer experience.
 To implement a feedback system.

SCOPE OF CRM
 Marketing and fulfillment
 Customer service and support
 Retention and loyalty
 Store front and field service
 Sales : cross sales , tele sales , up sales

Advantages of CRM
 Provides better customer service and increases customer revenues.
 Discovers new customers.
 Cross-sells and up-sells products more effectively.
 Helps sales staff to close deals faster.
 Makes call centers more efficient.
 Simplifies marketing and sales processes.
Disadvantages of CRM
 Some times record loss is a major problem.
 Overhead costs.
 Giving training to employees is an issue in small organizations.

Types of Computers

Classification of Computers by Size

 Supercomputers
 Mainframe computers
 Minicomputers
 Personal computers (PCs) or microcomputers

Supercomputers

– a powerful computer that can process large amounts of data and do a great amount of
computation very quickly.

Supercomputers are used for areas related to:

 Science
 Engineering
 Education
 Defence
 Aerospace

Supercomputers are useful for applications involving very large databases or that require a great
amount of computation.

Supercomputers are used for complex tasks, such as:

 Weather forecasting
 Climate research
 Scientific simulation
 Oil and gas exploration
 Quantum mechanics
 Cryptanalysis

Mainframe computer – a high-performance computer used for large information processing


jobs.

Mainframe computers are primarily used in :

 Institutions
 Research
 Academics
 Health care
 Libraries
 Large businesses
 Financial institutions
 Stock brokerage firms
 Insurance agencies

Mainframe computers are useful for tasks related to:

 Census taking
 Industry and consumer statistics
 Enterprise resource planning
 Transaction processing
 e-business and e-commerce

Minicomputer – a mid-range computer that is intermediate in size, power, speed, storage


capacity, etc., between a mainframe and a microcomputer.

 Minicomputers are used by small organizations.

 “Minicomputer” is a term that is no longer used much. In recent years, minicomputers are
often referred to as small or midsize servers (a server is a central computer that provides
information to other computers).

Personal computer (PC) – a small computer designed for use by a single user at a time.

 A PC or microcomputer uses a single chip (microprocessor) for its central processing unit
(CPU).

 “Microcomputer” is now primarily used to mean a PC, but it can refer to any kind of
small computer, such as a desktop computer, laptop computer, tablet, smartphone, or
wearable

RACK SERVER

A rack server, or rack-mounted server, is any server that is built specifically to be mounted within a
server rack. Rack servers are a general-purpose machine that can be configured to support a wide range
of requirements. They are most commonly found in data center environments but can also be used in
smaller computer closets. Unlike traditional servers that look much like a PC, a rack server is wider. So it
can be secured into the rack using mounting screws or rails, depending on the design. If you only require
a small number of servers, they are the best choice economically due to the lower upfront costs.
The height, or the amount of rack units the system might take up, can vary quite a bit. Depending on
what is required from the system. Larger servers allow for additional CPUs, memory, or other
components. The servers themselves are mounted one on top of the other within a rack. To help
minimize the amount of space used.

Benefits of a Rack Server


While which type of server you use largely depends on the scenario, there are several advantages of
using a smaller rack server over a blade server:

 Power – Rack servers are typically built with all the needed components to operate as a stand-
alone system. They can be very powerful and are used to run high end applications.

 Convenience – Having the ability to easily mount a server within a rack is convenient and saves a
lot of space, especially when compared to a traditional tower style server.

 Cooling – Cooling a rack server is easier than most others. They are usually equipped with
internal fans and placing them in a rack increases airflow.

 Ideal for Lower Quantity – Rack servers are best suited when you need more than one server
(but less than about 10) because they don’t require a massive chassis

BLADE SERVER(virtualization)
A blade server is a modular server that allows multiple servers to be housed in a smaller area. These
servers are physically thin and typically only have CPUs, memory, integrated network controllers, and
sometimes storage drives built in. Any video cards or other components that are needed will be
facilitated by the server chassis. Which is where the blades slide into. Blade servers are often seen in
large data centers. Due to their ability to fit so many servers into one single rack and their ability to
provide a high processing power.

In most cases, one large chassis such as HPE’s BladeSystem will be mounted into a server rack and then
multiple blade servers slide into the chassis. The chassis can then provide the power, manage
networking, and more. This allows each blade server to operate more efficiently and requires fewer
internal components.

Blade servers are generally used when there is a high computing requirement with some type of
Enterprise Storage System: Network Attached Storage (NAS) or a Storage Area Network (SAN). They
maximize available space by providing the highest processor per RU availability. Blade Servers also
provide rapid serviceability by allowing components to be swapped out without taking the machine
offline. You will be able to scale to a much higher processor density using the Blade architecture. The
facility will need to support a much higher thermal and electrical load per square foot.

Benefits of a Blade Server


 Power Consumption – In many cases the chassis for the Blade Server will supply the power to
multiple servers, reducing total consumption.

 Hot Swappable – Blade servers can be configured to be hot swappable so if one blade has a
problem, it can be pulled and replaced much more easily. This helps to facilitate redundancy.

 Less Need for Cables – Rather than having to run individual cables for each server, blade servers
can have one cable (often fiber) run to the chassis, thus reducing the total cable requirements.

 Processing Power – Blade Servers can provide an extremely high processing power while taking
up minimal space

RFID
The use of RFID for inventory management requires a scanner that uses radio waves to
communicate with an RFID tag. The tag itself contains a microchip that allows the reader to read
data and also write data to the tag for real-time updating in place. Each tag is wrapped in a
material like plastic or paper for protection and can be affixed to a variety of surfaces for
tracking. Most tags used for inventory tracking are passive RFID tags, meaning they contain no
battery and are powered by the waves from the readers. Active tags are powered, come at a
higher cost, and are used for long-range tracking of machineries such as trucks and railway cars.

Pros in Using RFID Tags for Inventory Management

Using RFID tags for inventory management offers several benefits, such as reduced labor costs
and faster scanning. Here’s a look at how RFID tags can be a benefit in the inventory
management process.

 Improved visibility and faster scanning. Since RFID tags do not require a “line-of-
sight” scan like barcodes, it is possible to read them at a distance for fast inventory
processing. They can also be read in any orientation and give you improved
visibility into your inventory with the potential for more frequent updates and scanning
locations.
 Reduced labor costs. With labor costs accounting for as much as 50-80% of
distribution center costs, RFID offers potential benefits in this area. Inventory check-in,
counting, and shipment verification can be done very quickly and automatically in a few
scans without the need for multiple employees to process them. These savings must be
weighed against the cost of investing in an RFID inventory solution, which we’ll discuss
in more detail below.
 Tracking of returnable assets. For those companies that utilize a returnable fleet of
assets such as containers and pallets, there is often a significant capital investment to
protect. Utilizing RFID allows you to track these assets through the entire supply chain
loop and provide increased visibility on inventory locations. This has the added benefit of
improving returns and reducing theft or neglect.

Cons in Using RFID Tags for Inventory Management

While there are some benefits of using RFID tags for inventory management, the technology also
comes with several disadvantages that hinder usability and introduce other concerns, such as
security. Here’s a look at the distinct disadvantages of using RFID tags for inventory
management.

 Inability to use cell phones as scanners. Even though there are fixed and remote RFID
readers available, it is not possible to use a phone to scan them, as can be done with
barcodes. This is especially limiting as it requires drivers or employees in the field to
carry specific RFID readers to do any scans, and phones cannot be used as a backup if the
provided readers fail.
 Prohibitive costs when scaling. RFID tags cost significantly more than barcode labels.
In addition, they utilize specific readers that must be purchased from the limited number
of RFID equipment manufacturers. This can add significant costs when scaling these
solutions with the requirement for additional specialized scanners and RFID tags.
 Demanding infrastructure needs. Setup for these systems requires the integration of the
readers, tags, inventory management system, network, and building wiring that can take a
significant amount of time and resources to set up. In some cases, companies may need
to update their inventory management system entirely, as some software platforms do not
support RFID. Also, if real-time asset tracking is required, the RFID-enabled system will
need to utilize GPS and cellular data to communicate, which can put a significant burden
on your system.
 Security concerns. While RFID systems continue to update and improve their data
security, they can still be vulnerable to hacking. Remote devices, including cell phones,
can sometimes be used to scan tags at close range and copy tag data. This could later be
used to create a cloned tag or copy the information to another tag, a risk of particular
concern in the retail industry.

While the use of RFID tags in inventory management offers some compelling and tangible
benefits, there is a great deal of work to be done to streamline these systems. Much of the
challenge involves scaling this solution in a cost-effective way while updating infrastructure
enough to be able to capitalize on its greatest benefits.

RFID Tags vs. Barcode Labels for Inventory Management

RFID can be useful for some applications, but for most companies looking for an accurate, user-
friendly, and cost-effective solution for inventory management, barcode labels are a proven and
trusted solution. Some barcode labels, such as Camcode’s Metalphoto® inventory tags, are
durable enough to withstand harsh environments in both indoor and outdoor applications and
offer excellent resistance to chemicals, solvents, and abrasion.
Compared to RFID tags, barcodes are just as accurate – if not better, and they can be affixed to
any surface material without impacting accuracy. In contrast, materials like metal can interfere
with an RFID tag’s ability to transmit data, and liquid can hinder an RFID tag’s signal. While it’s
possible to use RFID tags on metal surfaces or items, it requires the use of a special type of tag
with an RFID block to prevent interference, adding to the overall cost.

How Does RFID Work in a Warehouse?

The main difference between an active and passive RFID inventory system is the way in which
the tags are powered during operation, but the basic workflow in a warehouse is the same for
both configurations. Before a shipment is sent to the warehouse it will have had an RFID tag, or
chip, attached to individual items or an entire pallet. This RFID tag stores important information
about the item.

When the shipment arrives at the destination, each RFID tag will transmit its information to
readers installed within the warehouse. These readers will have been placed in strategic locations
within the receiving and storage areas to pick up the best possible signal. The data is transmitted
via electromagnetic waves and is relayed from the readers to a central warehouse management
system. From there, information can be modified and sent back to the RFID tags for later recall
at any time. This gives warehouse operators the ability to perform tasks such as real-time asset
counts and advanced inventory transactions.

Does RFID Increase Inventory Accuracy?

Using an RFID inventory system has been shown to improve inventory accuracy by up to
13% compared to traditional inventory tracking methods and manual inventory checks in some
situations. Particularly in the retail industry, where maintaining inventory accuracy is an ongoing
challenge, there are some benefits to implementing a more automated system. In a warehouse
environment, the implementation costs may outweigh the benefits in some cases. It can be
beneficial in situations where a very high inventory accuracy rate is required, but there is always
a balance between hardware and labor costs that should be considered.

For companies looking to adopt an inventory tracking solution, it’s important to conduct a
thorough analysis of the differences between established technologies such as barcode labels
and tags designed for inventory control and newer solutions like RFID to ensure that you will
achieve a desirable ROI for your investment. For most companies, barcode labels are smart and
practical choices for inventory management.

Structured Query Language (SQL)


SQL is a database computer language designed for the retrieval and management of data in a
relational database. SQL stands for Structured Query Language. This tutorial will give you a
quick start to SQL. It covers most of the topics required for a basic understanding of SQL and to
get a feel of how it works.

Why to Learn SQL?


SQL is Structured Query Language, which is a computer language for storing, manipulating and
retrieving data stored in a relational database.
SQL is the standard language for Relational Database System. All the Relational Database
Management Systems (RDMS) like MySQL, MS Access, Oracle, Sybase, Informix, Postgres and
SQL Server use SQL as their standard database language.
Also, they are using different dialects, such as −

 MS SQL Server using T-SQL,

 Oracle using PL/SQL,

 MS Access version of SQL is called JET SQL (native format) etc.

Applications of SQL
As mentioned before, SQL is one of the most widely used query language over the databases. I'm
going to list few of them here:
 Allows users to access data in the relational database management systems.
 Allows users to describe the data.
 Allows users to define the data in a database and manipulate that data.
 Allows to embed within other languages using SQL modules, libraries & pre-
compilers.
 Allows users to create and drop databases and tables.
 Allows users to create view, stored procedure, functions in a database.
 Allows users to set permissions on tables, procedures and views
MySQL
MySQL is an open source SQL database, which is developed by a Swedish company – MySQL
AB. MySQL is pronounced as "my ess-que-ell," in contrast with SQL, pronounced "sequel."
MySQL is supporting many different platforms including Microsoft Windows, the major Linux
distributions, UNIX, and Mac OS X.
MySQL has free and paid versions, depending on its usage (non-commercial/commercial) and
features. MySQL comes with a very fast, multi-threaded, multi-user and robust SQL database
server.
Features
 High Performance.
 High Availability.
 Scalability and Flexibility Run anything.
 Robust Transactional Support.
 Web and Data Warehouse Strengths.
 Strong Data Protection.
 Comprehensive Application Development.
 Management Ease.
 Open Source Freedom and 24 x 7 Support.
 Lowest Total Cost of Ownership.
MS ACCESS
This is one of the most popular Microsoft products. Microsoft Access is an entry-level database
management software. MS Access database is not only inexpensive but also a powerful database
for small-scale projects.
MS Access uses the Jet database engine, which utilizes a specific SQL language dialect (sometimes
referred to as Jet SQL).
MS Access comes with the professional edition of MS Office package. MS Access has easyto-use
intuitive graphical interface.
Features
 Users can create tables, queries, forms and reports and connect them together with
macros.
 Option of importing and exporting the data to many formats including Excel,
Outlook, ASCII, dBase, Paradox, FoxPro, SQL Server, Oracle, ODBC, etc.
 There is also the Jet Database format (MDB or ACCDB in Access 2007), which can
contain the application and data in one file. This makes it very convenient to
distribute the entire application to another user, who can run it in disconnected
environments.
 Microsoft Access offers parameterized queries. These queries and Access tables can
be referenced from other programs like VB6 and .NET through DAO or ADO.
 The desktop editions of Microsoft SQL Server can be used with Access as an
alternative to the Jet Database Engine.
 Microsoft Access is a file server-based database. Unlike the client-server relational
database management systems (RDBMS), Microsoft Access does not implement
database triggers, stored procedures or transaction logging.
EMERGING TRENDS IN INFORMATION TECHNOLOGY
 Due to several impacts of pandemic and changing business environments, we can see
substantial growth in technological transformations in Information Technology field.
 Robotics: it is a significant industry that is gaining momentum with time. Field of
robotics offers a lot to world. Among them, it offers smart factories, agile robotics, cobots
(Cobots are robots that can work together with humans). Companies using are Boston
Dynamics and Universal Robots. Global robots are market valued at 27.73 billion dollars
in 2020 and projected to reach 74.1 billion dollars.
 Real life example -South Korea's top wireless carrier SK Telecom has introduced virtual
human model to promote its AI assistant-based platform. The female virtual model is
named as SUA. Sua will make a debut as an SK telecom model in commercials for
company A.it operates around 10 channels for movie drama, series.
 Virtual Reality /Augmented Reality: Augmented reality blends real world
elements with virtual ones. VR creates an environment which is fully virtual. It does not
stop with entertainment industry it continues to grow in military, sports, medicine,
education. Top companies using AR and VR is Microsoft, apple, google, QUALCOMM,
Samsung.
 Real life example – lens kart and aviation training and maintenance.
 Big data analytics: it is a collection of data and helps us to store, process, analyse and
make sense of cutting-edge technologies that help in every sector be like quality of health
care, detecting fraud.
 Companies using this tool Netflix, Amazon.
 Quantum computing: it uses the properties of quantum physics to perform
calculations and simulation that would not be possible on traditional machine. Tools help
in biology and climate change. Companies using this are IBM and Intel.
 Real life example -The most beneficial impact of quantum computing on human life
may be in healthcare. Better internal imaging simulations will detect and diagnose the
early stages of cancer and other diseases. And the other, Quantum computing has the
potential to play a crucial role in national security where Quantum computers can be used
for Défense such as developing superior materials for military vehicles.
 5G Networks: we live in a world where massive amount of data should be transmitted
quickly. With increasing in conference reliable connectivity and better band width it
estimated that by 2025 it will have more than 1.7 billion subscribers across globe. Its all
about better connectivity with super-fast and low latency (delay between sending of
information and response) and it will power new service to wide range of verticals.
 Real life example - Nearly five years after India embarked on the road to launching the
next generation of mobile telephony, Prime Minister Narendra Modi on 1 Oct,2022
launched 5G services in select cities, ushering in what promises to be an era of ultra-high-
speed Internet on mobile phones and devices.
 Telecom companies launching the services are Bharati Airtel and Reliance Jio and
Vodafone India.
 IOT: IOT is fast becoming integral part of our lives. It is a futuristic technology
recognised for its social and technological marvels. It means accessing and controlling
daily usable equipment’s and devices using Internet. The most important features of IoT
on which it works are connectivity, analysing, integrating, active engagement. Companies
using are IBM, Verizon.
 Real life example - Smart appliances (stoves, refrigerators, washers and dryers, coffee
machines, slow cookers), Smart security systems, smart locks, and smart doorbells, Smart
home hubs (that control lighting, home heating and cooling, etc.), Smart assistants (like
Amazon Alexa or Apple’s Siri), Fitness trackers, sleep trackers, and smart scales.
 Whereas in business industry it gives businesses a real-time glimpse into the inner
workings of their company’s systems. From the factory floor to the customer’s door, IoT
delivers insights into everything from machine performance to supply chain and
logistics operations.
 CYBER SECURITY: several organisations fallen prey to cyber-attacks including
big names like linked in and Facebook. Few of the cyber security companies are cisco,
mc A fee, IBM. Cyber security is a potential activity by which information and other
communication systems are protected from and/or defended against the unauthorized use
or modification or exploitation or even theft.
 BLOCK CHAIN: A blockchain is a growing list of records, called blocks, which are
linked using cryptography. Each block contains a cryptographic hash of the previous
block, a timestamp, and transaction data. Blockchain has been in a lot of buzz these days.
And that is mainly because it is backbone of the very famous cryptocurrency in the world
- the Bitcoin. Many Governments and leading Banks have decided to bring many of their
conventional transactions based on Blockchain concept. The applications and potential of
this framework is huge and is changing the way transactions are made in various
domains.
 Real life example - Supply chain management: The blockchain promotes overall
efficiency in supply chain management. And in Healthcare Patients have the right to get
accurate information and this makes security and privacy of patient health data crucial.
You can track batch numbers of drugs using a blockchain. Digital IDs Microsoft, for
instance, is focused on creating digital identification for thousands of refugees and
impoverished people. This is to link connect them to the financial sector through an app.
Digital voting: Voting frauds are commonplace but with the blockchain, these will no
longer be a cause for concern. The blockchain helps governments by making votes
transparent. Any change to this network will immediately be detected by regulators.
Royalty protection is one of the biggest benefits of the blockchain technology. Ownership
laws on blogs, music, videos, etc are necessary and should only be stored in a blockchain.
This protects the artist or content creator’s rights and ensures that he gets a fair share of
the profits.

You might also like