Introduction to ITBM
Transcript of Introduction to ITBM
-
8/13/2019 Introduction to ITBM
1/25
Introduction to IT
-
8/13/2019 Introduction to ITBM
2/25
Course Outline
Module 1 Current trends in IT
Module 1I Basics of MS-Excel
Module III Basics of DBMS
Module 1V Internet, www, IT
Module V Student presentations
-
8/13/2019 Introduction to ITBM
3/25
Indias strategic advantage
Indias fundamental advantages abundant talentand cost are sustainable over the long term.
Young demographic profile and over 3.5 milliongraduates and postgraduates that are addedannually to the talent base.
No other country offers a similar mix and scale ofhuman resources.
India has transformed from a rural and agriculture-based economy to a knowledge based economy.
-
8/13/2019 Introduction to ITBM
4/25
IT-BPO SECTOR
The IT-BPO sector has become one of the mostsignificant growth catalysts for the Indian economy.
The sector is estimated to aggregate revenues of USD
88.1 billion in FY2011, with the IT software and servicessector (excluding hardware) accounting for USD 76.1billion of revenues. - NASSCOM
Indian IT-BPO revenues may touch US$ 225 billion by2020. - NASSCOM
-
8/13/2019 Introduction to ITBM
5/25
The BPO sector continues to be the fastest growingsegment of the industry and is expected to have reachedUS$ 14.1 billion in 2010-11, growing at 14 per cent
Indias domestic market for BPO is projected to growover 23 per cent to touch US$ 1.4 billion in 2011. -Gartner
Indias domestic BPO market would reach US$ 1.69billion in 2012 and increase to US$ 2.47 billion by 2014. -Gartner
-
8/13/2019 Introduction to ITBM
6/25
-
8/13/2019 Introduction to ITBM
7/25
IT/ITES-BPO - Verticals
Banking, financial services and insurance (BFSI) (41per cent),Hi-Tech/ Telecom (20 per cent)Manufacturing (17 per cent)
Retail (8 per cent)Smaller contributions coming from media, publishingand entertainment, construction and utilities,healthcare and airlines and transportation.
-
8/13/2019 Introduction to ITBM
8/25
Topics for presentation
1. Mobile Applications2. 3G Services3. BPO4. KPO5. IT Software Services6. Social Networking7. Search Engines
8. IT Security
-
8/13/2019 Introduction to ITBM
9/25
9. UID Project10. Cloud Computing11. Banking Applications12. ERP13. CRM14. SCM15. Apple Products (iPod,iPad etc.)
16. Open Source Software17. Firewalls
-
8/13/2019 Introduction to ITBM
10/25
19. Financial Accounting Softwares20. Spectrum Allocations21. Financial/Banking Frauds22. Business Networking
-
8/13/2019 Introduction to ITBM
11/25
Mobile Applications & 3G services
-
8/13/2019 Introduction to ITBM
12/25
Global Smartphone Vendor Market Share
Q2 '10
Q2 '11
AppleSamsung
NokiaOthers
010
20
30
40
50
M a r k e t
S h a r e
Apple Samsung Nokia OthersQ2 '10 13.5 5 38.1 43.4Q2 '11 18.5 17.5 15.2 48.9
Source : Strategy Analytics
-
8/13/2019 Introduction to ITBM
13/25
Social Networking
Facebook overtakesOrkut to be theleading socialnetworking site in
India.
Source : ComScore
-
8/13/2019 Introduction to ITBM
14/25
Search Engines
Source : StatCounter
-
8/13/2019 Introduction to ITBM
15/25
IT Security
Cybercrime is experiencing unprecedented growth.
What started with disparate hackers seekingnotoriety evolved rapidly into specialized, organized
businesses that steal sensitive information for profit.
Yearly losses run into billions of dollars.
-
8/13/2019 Introduction to ITBM
16/25
f k d h h
-
8/13/2019 Introduction to ITBM
17/25
Types of Attacks Experienced During the Past 12 MonthsPercentage of Companies Reporting an Attack
-
8/13/2019 Introduction to ITBM
18/25
UID Unique Identification Number
Brand name of the Unique Identification number(UID) Aadhaar.
Aadhaar is a 12-digit unique number which the
Unique Identification Authority of India (UIDAI) willissue for all residents. The number will be stored in acentralised database and linked to the basicdemographics and biometric information
photograph, ten fingerprints and iris of eachindividual.They can use Aadhar to identify themselvesanywhere in India, and to access a host of benefits
and services.
-
8/13/2019 Introduction to ITBM
19/25
UID - Authentication
The process through which the Aadhaar number of aresident , along with other attributes (includingbiometrics) are submitted to the Central Identities
Data Repository for its verification and suchRepository verifies the correctness thereof on thebasis of information or data or documents availablewith it.
-
8/13/2019 Introduction to ITBM
20/25
The response from the CIDR to a authenticationquery will only be a positive or a negative response,the UIDAI shall not give out the demographic or
biometric information of a resident in response to anauthentication query.
-
8/13/2019 Introduction to ITBM
21/25
Cloud Computing
Cloud computing, broadly defined, is the ability fororganizations to share critical computinginfrastructure (e.g. servers, storage, etc.) and relatedservices over the internet.
Global revenues from cloud services will grow from$29 billion to over $70 billion - IDC
-
8/13/2019 Introduction to ITBM
22/25
Enterprise Applications
ERP : Enterprise Resource PlanningThe techniques and concepts for integrated managementof businesses as a whole from the viewpoint of theeffective use of management resources to improve theefficiency of enterprise management.
CRM : Customer Relationship ManagementCRM is an information industry term for methodologies,software, and usually Internet capabilities that help anenterprise manage customer relationships in anorganized way.
SCM : Supply Chain ManagementSupply chain management (SCM) is the process ofplanning, implementing, and controlling the operations ofthe supply chain as efficiently as possible.
-
8/13/2019 Introduction to ITBM
23/25
Open Source
A radically nontraditional approach to building anddistributing intellectual property. Rather thanprotecting, constraining, and charging a fee for theright to distribute ideas.
Open source mandates that the knowledge inquestion must be openly available and widelydistributed to the general public, more or less free of
charge.
-
8/13/2019 Introduction to ITBM
24/25
Open-source software (OSS)
Computer software that is available in source codeform; the source code and certain other rights normallyreserved for copyright holders are provided under asoftware license that permits users to study, change,
improve and at times also to distribute the software.Eg: Linux, Apache
-
8/13/2019 Introduction to ITBM
25/25
Thank You