rdit lecture#01

23
Lecture#01 Recent Developments in IT

Upload: hammad155

Post on 24-Apr-2017

213 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: RDIT Lecture#01

Lecture#01

Recent Developments in IT

Page 2: RDIT Lecture#01

Ever Changing Field of IT More Paced Changes in Recent Times Many Topics can be covered including:1. 3D Internet2. 3D Password3. Blue Gene4. Brain Gate5. Camera Pill6. Cyborgs7. DNA Computing8. Ethical Hacking9. Gi Fi

Course Contents

Page 3: RDIT Lecture#01

10.Green Cloud11.Intelligent RAM12.Palm Vein Technology13.Quantum Cryptography14.Visible Communication15.Virtual Private Networks16.Smart Quill17.Spam Assassin18.Google Glass19.Mind Reading Computer20.Gesture Recognition Technology

Course Contents

Page 4: RDIT Lecture#01

Complete Virtual Environment in 3D Countless Possibilities Demo Sites Available3D Internet

Page 5: RDIT Lecture#01

1. Recall2. Recognition3. Biometric3D Password

Page 6: RDIT Lecture#01

The Blue Gene/Q system, shown below is the third-generation computer architecture in the Blue Gene family of supercomputersBlue Gene

Page 7: RDIT Lecture#01

Brain Gate

Page 8: RDIT Lecture#01

Capsule Endoscopy involves swallowing a small (the size of the large vitamin pill) capsule, which contains a color camera, battery, light source and transmitter. The camera takes two pictures every second for eight hours, transmitting images to a data recorder about the size of a portable CD player that patients wear around the waist.

Camera Pill

Page 9: RDIT Lecture#01

Minds, Technologies, and the Future of Human IntelligenceCyborgs

Page 10: RDIT Lecture#01

The main idea behind DNA computing is to adopt a biological (wet) techniques an efficient computing vehicle, where data are represented using strands of DNADNA molecules can act as elementary logic gates analogous to the silicon-based gates of ordinary computers. Short strands of DNA serve as the gates’ inputs and outputs. Ultimately, such gates could serve as dissolved “doctors”—sensing molecules such as markers on cells and jointly choosing how to respond.

DNA Computing

Page 11: RDIT Lecture#01

Can hacking be ethical?Ethical hackers are usually security professionals or network penetration testers who use their hacking skills and toolsets for defensive and protective purposesEthical hackers who are security professionals test their network and systems security for vulnerabilities using the same tools that a hacker might use to compromise the networkAny computer professional can learn the skills of ethical hacking

Ethical Hacking

Page 12: RDIT Lecture#01

Multi-gigabit wireless technology that removes the need for cables between consumer electronic devicesMore than 100 times faster than current short-range wireless technologiesAllows wireless streaming of uncompressed high-definition contentOperates over a range of 10 meters without interferenceEntire transmission system can be built on a cost effective single silicon chipOperates in the unlicensed, 57-64 GHz spectrum band.

Gi Fi

Page 13: RDIT Lecture#01

Green Clo

ud

Page 14: RDIT Lecture#01

Intelligent RAM

Page 15: RDIT Lecture#01

Palm Vein Technology

Page 16: RDIT Lecture#01

Quantum Cryptography

Page 17: RDIT Lecture#01

Visible Communication

Page 18: RDIT Lecture#01

10.Virtual Private Networks11.Smart Quill12.Spam AssassinVPN

Page 19: RDIT Lecture#01

Smart Quill

Page 20: RDIT Lecture#01

Spam Assassin

Page 21: RDIT Lecture#01

10.Google Glass11.Mind Reading Computer12.Gesture Recognition TechnologyGoogle Glass

Page 22: RDIT Lecture#01

Mind Reading Computer

Page 23: RDIT Lecture#01

Gesture Recognition System