Technical Talks (August 2015- November-2016)
Topic: “Bigdata and Machine Learning & Demo for building an Android App”
Date and Time: Saturday, 05 November 2016 AT 11:00AM
Resource Person: Mr. Chandrashekhar Naik, Product manager at Gwynnie Bee, Bengaluru
The talk began with the importance of Aadhaar concept which involvs huge amount of data stored related to the people of India. Unique Identification Authority of India (UIDAI) is a central government agency of India whose objective was to collect the biometric and demographic data of residents, store them in a centralised database, and issue a 12-digit unique identity number called Aadhaar to each resident. This is very important as less privileged people do get their valid identity as Indians and very useful for verifying address proof and identity of the individual.
The reason why Aadhaar concept discussed in the talk was to show how machine learning and big data analysis forms the basis for maintain and analysing of the huge amount of data that needs to be searched efficiently whenever querying of any specific data about any individual or group of individuals is done. The software used is OpenCV which is a cross platform open source computer vision and machine learning software library aimed at real-time computer vision applications such as imagining, video processing, image processing, HDR imaging etc. OpenCV contains more than 2500 optimized algorithms including state - of-the-art computer vision and machine learning algorithms.
The afternoon session involved how to build an android app by using Android Studio. The various advantages of Android Studio over Eclipse were also highlighted. The main motivation to develop an interest in developing any app is to identify the problem to cater without which it is not interesting to go about developing apps. The various stages of designing, identifying the various functionalities taking healthcare app as an example were dealt in detail. The sessions provided students to get motivated about the importance of data analytics and app development for their future career development.
Topic: “Security Issues in Wireless Sensor Networks”
Date and Time:Tuesay, 15 November 2016 at 02:00PM
Resource Person:Dr. Shivmurthy G, HOD & Assoc. Professor of MCA, Center for PG Studies VTU, Bengaluru
The Speaker initiated the talk with the overview of wireless sensor networks, and then he discussed the security issues in wireless sensor networks such as identification of compromised node and key distribution in wireless sensor networks. The speaker has explained how the Compromised nodes plant an attack in the network by manipulating the data packets received from the network and various malicious acts performed to paralyze the network.
The speaker has also discussed the various scenarios relating to the transmission of the messages securely between two non-compromised nodes in the presence of compromised node in the wireless sensor networks. Key distribution in wireless sensor networks using bootstrap protocol and how single key is used to encrypt and decrypt the messages being exchanged among the nodes in the network and its limitations were emphasized in detail. He also discussed Random Key distribution protocol for a wireless sensor network, which overcomes the limitations of bootstrap protocol. At the end of the talk, he has demonstrated a simulation of key distribution among 10,000 nodes from the Key pool prepared by the base station. This talk has proven to be very informative to the students.
Topic: “Protect Your Digital Enterprise”
Date and Time: Saturday, 15 October 2016 at 10:00AM
Resource Person: Mr. Shakeer Hussain, R&D Engineer,Nokia, Bengaluru.
Software is eating the world, powering business operations and accelerating value creation. Enterprises operate in extended ecosystems and compete in borderless markets. Risks, threats and vulnerabilities are growing in both variety and volume. How do we know?. Because, Enterprise security solutions protect eight of the world's 10 largest companies. Nine of the world’s 10 biggest financial service brands rely on High Performance Enterprise(HPE) to safeguard their data. How do you protect your organization and unleash the creativity of your employees? You need the right security and risk management regime. You need robust compliance and continuity plans. In addition,
you need expert partners to help you put it all into place. Protecting your operations, customers, data, and reputation are all fundamental when creating a broad security program. You connect with suppliers, vendors, and partners from anywhere around the globe—on cloud-enabled and mobile systems that have custom requirements for securing shared information.
Firstly, design of a cyber resilient and compliant environment by building protection into the fabric of enterprise. Later you can build it then Stop it and Recover it Fast, Rapidly detect & manage breaches, Monitor critical digital assets regardless of location or device. Execute flawless recoveries and Safeguard continuity with minimal downtime and no damage or loss Prevent Detect & Respond. HPE Security has a comprehensive set of services and technologies to support your security operations build out Security Technology Security Consulting Managed Security Services Offerings to strengthen security posture, proactively manage incidents, and extend security capabilities Expertise to help clients understand, manage and reduce business and security risks HPE and vendor security solutions help clients disrupt their adversaries. The lot of network related and security issues were dealt in detail.
Topic: “How to Carry out Projects in the DOT NET Frameworks”
Date and Time: Saturday, 17 September 2016 at 10:00AM
Resource Person: Mr. Rahul Prabhulingaswamy, Senior Software Engineer, Stanley Black & Decker Pvt. Ltd., Bengaluru.
Technical Talk started by the introduction to C# and .NET technologies in detail. Dot NET is a programming framework consisting of Common Language Runtime (CLR), API classes, client and server tools and supports multiple programming languages. CLR is a Virtual Machine (Java-like) on which any (supported) language can run. Some of the responsibility consists of memory management, cross-language support, thread support etc. Languages compile to Microsoft Intermediate Language (MSIL). MSIL is shipped into portable executable units.
An application here consists of assemblies. C# is rich in UI support, object-oriented language backed up with lots of APIs interoperable with various other languages and excellent for Windows based machines.
.NET supports two types of form-based apps, WinForms and WebForms. WinForms are the traditional, desktop GUI apps. The great news is that Visual Studio .NET enables quick, drag-and-drop construction of form-based applications. The event driven applications form a main part in .Net based projects. The GUI based events contains mouse click, key press, button click and so on. Events are handled by methods that live behind visual interface known as "code-behind". Visual Studio .NET (VS.NET) is a single IDE for all forms of .NET development from class libraries to form-based apps to web services and are built using C#, VB, C++, J#, etc. Forms are the first step in GUI design-each form represents a window on the screen form designer enables drag-and-drop GUI construction. Users interact primarily with form's controls labels, text boxes, buttons, etc. implies that GUI programming is control programming. The session was attended by the third year students who were keen in noting down some important points required for their mini-project implementation.
Topic: “SMAC (Social, Mobile , Analytics, and Cloud) Technologies”
Date and Time: Friday, 2nd September 2016 at 11:30AM
Resource Person: Mr. AJAY DESHPANDE, CTO, Rakya Technologies, Pvt. Ltd, Pune, India.
Technical Talk was a very interesting session where in our honoured guest gave brief explanation about “SMAC Technologies”. It also turned out to be an interactive session where the students got attracted towards the topic as they wanted to know more about the topic. Later he also cleared all the doubts of the students. SMAC (social, mobile, analytics and cloud) is the concept that four technologies are currently driving business innovation. SMAC creates an ecosystem that allows a business to improve its operations and get closer to the customer with minimal overhead and maximum reach. The proliferation of structured and unstructured data that is being created by mobile devices, sensors, social media, loyalty card programs and website browsing is creating new business models built upon customer-generated data. While each of the four technologies can impact a business individually, their convergence is proving to be a disruptive force that is creating entirely new business models for service providers.
The integration of the technologies requires clear policies and guidelines as well as management tools that can automate business processes. The media company Netflix is often cited as an example of a business that has successfully harnessed the power of SMAC. For example, when a Netflix member streams a TV show from the Netflix cloud to their iPad, they are given the option of signing into Netflix with Facebook's social login. After viewing a show, members are given multiple ways to provide social feedback. They can rate content with stars, write reviews and/or share what they just watched with friends on Facebook or Twitter.
The session was very interesting and it was very useful for the students and staffs of CSE to upgrade their knowledge.
Topic: “Project Guidance”
Date and Time: Friday, 2nd September 2016 at 09:30AM
Resource Person: Dr. S. F. RODD, Prof. & Head, Computer Science and Engineering, Belagavi.
he technical talk was mainly an interactive session where our honored guest spoke about how to start with a project. He pointed out some of the examples of large projects such as the construction of dams, construction of bridges, etc. which requires different factors like man power, money, requirements, planning, etc. Later he turned toward his research areas, and he also cleared many of the doubts which students had, indeed it was an interactive session. The resource person actually pointed about the need that needs to be tackled that exists in and around us. This must be the primary motive in order to carry out any kind of projects. Then the aim and objective must be thoroughly analyzed once the requirements are gathered. A proper methodology to solve the problem must be well designed followed by solving the problem by proper implementation using methods or by making use of new tools or software’s which offer more options or security.
Finally the system must be tested with the whole system point of view in order to guarantee that the solution is actually ready to deploy.
The session was excellent and it was very useful for the students and staffs of CSE to upgrade their knowledge.
Topic: “IBM-The Great Mind Challenge”
Date and Time: Thursday, 10 March 2016 at 11 am
The IBM TGMC (The Great Mind College) is the national level project challenge by IBM which is held every year, involves lakhs of engineering students from different colleges and universities belonging to different branches, take part to showcase their innovative mobile applications. The platform or the Integrated Development Environment used to develop the apps is IBM-Bluemix. The completion generally starts in the month of November and will be open until the end of March. The maximum number of students in a group can be up to three. The apps that the students develop must involve a social cause where in which; the app must be very beneficial to the common person in the society. Coming to the IBM-Bluemix software, it’s a cloud-based platform provided by the IBM in order to develop the apps. The participants whoever registers for this completion gets a free 1-month subscription for Bluemix.
The username and password is mailed to the email provided, using that one can log in to Bluemix and start developing apps. Firstly, after logging in, the user gets some sample apps developed by IBM to learn better and compare while developing apps. There are many resources related to Bluemix available in the IBM website as well as in the Internet. The time needed to learn this software is very less and it supports many existing languages such as java, .Net and so on to develop the apps. The advantage of this IBM-TGMC for students is that they gain a lot of knowledge and confidence related to project development and can highlight their achievement in the curriculum vitae. Overall, it is very useful for the pre-final and final year students to take part in such competitions to get more awareness but current issues and trends involving society and computer technology.
Topic: “Introduction to Parallelism and MPI Programming”
Date and Time: Tuesday, 23 February 2016 at 10 am
Resource Person: N. Gopalakrishna Kini, Professor of CSE Dept., MIT, Manipal
Parallel computing is now as much a part of everyone's life as personal computers, smart phones, and other technologies are. Whether you are taking a class about parallel programming, learning for work, or simply learning it because its fun, you need to learn a skill that will remain incredibly valuable for years to come. One must also take the right path to expanding your knowledge about parallel programming - by learning the Message Passing Interface (MPI).
Although MPI is lower level than most parallel programming libraries (for example, Hadoop), it is a great foundation on which to build your knowledge of parallel programming.
The resource person firstly covered a couple of the classic concepts behind MPI's design of the message passing model of parallel programming. The first concept is the notion of a communicator.
A communicator defines a group of processes that have the ability to communicate with one another. In this group of processes, each is assigned a unique rank, and they explicitly communicate with one another by their ranks. The foundation of communication is built upon send and receives operations among processes. A process may send a message to another process by providing the rank of the process and a unique tag to identify the message. The receiver can then post receive for a message with a given tag (or it may not even care about the tag), and then handle the data accordingly. Communications such as this which involve one sender and receiver are known as point-to-point communications. The MPI Programming is very useful for future development of efficient algorithms and programs to fully utilize the power of processors. The talk was very interesting and interactive.
Topic: “Machine Learning – Introduction and Applications”
Date and Time: Friday, 19 February 2016 at 11 am
Resource Person: Dr. Jagadish S Kallimani, Assoc. Professor of CSE Dept., MSRIT, Bengaluru.
Machine learning is a subfield of computer science that evolved from the study of pattern recognition and computational learning theory in artificial intelligence. In 1959, Arthur Samuel defined machine learning as a "Field of study that gives computers the ability to learn without being explicitly programmed". Machine Learning is a first-class ticket to the most exciting careers in data analysis today. As data sources proliferate along with the computing power to process them, going straight to the data is one of the most straightforward ways to quickly gain insights and make predictions. It’s a must-have skill for all aspiring data analysts and data scientists, or anyone else who wants to wrestle all that raw data into refined trends and predictions. The resource person taught the end-to-end process of investigating data through a machine learning lens. He also showed how to extract and identify useful features that best represent your data, a few of the most important machine learning algorithms, and how to evaluate the performance of your machine learning algorithms. The process of machine learning is similar to that of data mining. Both systems search through data to look for patterns. However, instead of extracting data for human comprehension - as is the case in data mining applications - machine learning uses that data to detect patterns in data and adjust program actions accordingly. Machine learning algorithms are often categorized as being supervised or unsupervised. Supervised algorithms can apply what has been learned in the past to new data. Unsupervised algorithms can draw inferences from datasets. Thus, the introduction to machine learning was very useful for students to learn theory concepts better and analyze data patterns and develop algorithms accordingly.
Topic: Share the Secret and be Secure
Date and Time: Tuesday, 16th February 2016 at 3 pm
Resource Person: Dr. Vasudeva, Professor and HOD of CSE, SMVITM, Bantakal, Udupi.
The resource person gave the complete scenario about how secure we are during online transactions or other online activities performed by user. He also discussed the many aspects to security and many applications, ranging from secure commerce and payments to private communications and protecting passwords. One essential aspect for secure communications is that of cryptography. However, it is important to note that while cryptography is necessary for secure communications, it is not by itself sufficient. The audience was advised, then, that the topics covered by him only describe the first of many steps necessary for better security in any number of situations. Within the context of any application-to-application communication,there are some specific security requirements, including Authentication: The process of proving one's identity. (The primary forms of host-to-host sauthentication on the Internet today are name-based or address-based, both of which are notoriously weak.) Privacy/confidentiality: Ensuring that no one can read the message except the intended receiver. Integrity: Assuring the receiver that the received message has not been altered in any way from the original. Non-repudiation: A mechanism to prove that the sender really sent this message.
The three types of algorithms discussed such as, Secret Key Cryptography (SKC): Uses a single key for both encryption and decryption, Public Key Cryptography (PKC): Uses one key for encryption and another for decryption, Hash Functions: Uses a mathematical transformation to irreversibly "encrypt" information. RSA, the first, and still most common, PKC implementation, named for the three MIT mathematicians who developed it — Ronald Rivest, Adi Shamir, and Leonard Adleman. RSA today is used in hundreds of software products and can be used for key exchange, digital signatures, or encryption of small blocks of data. The talk improved the knowledge about the various algorithms for securing our data.
Topic: Mathematica and Wolfram Language
Date and Time: Wednesday, 10th February 2016 at 2 pm
Resource Person: Mr. Aravind Hanasoge, Wolfram consultant, Wolfram Alpha LLC, Bangalore.
Mathematica offers a complete environment for teaching and research that seamlessly combines a powerful calculation and dynamic visualization engine with an intuitive user interface that makes it easy for anyone get started. Moreover, because Mathematica also includes built-in documentation and presentation tools, it is perfect for creating course and project materials. There is no need to jump between different programs to get the work done.Once you are ready to explore all that Mathematica has to offer, you will have access to thousands of built-in functions covering all areas of technical computing-all carefully integrated so they work perfectly together. Mathematica provides robust, efficient algorithms across all areas, including networks, images, geometry, data science, visualization, machine learning and much more, making it the ideal software for advanced level courses and academic research. The Wolfram Language, available in Mathematica, offers the largest collection of computable knowledge and algorithms ever assembled. It supports many programming paradigms such as procedural, functional, rule-based, pattern-based, object-oriented, and even free form linguistic. It includes automated probability and statistics super functions, parameter estimation also with dozens of image-processing algorithms for real-time image acquisition, filtering, segmentation, shape analysis, feature tracking, face detection and more. Mathematica is the most powerful software for function plotting, calculus, 3D model design, etc., to achieve fast algorithmic implementation. It provides data handling and big data support along with interfacing easily with existing data and programs. Thus, the Mathemtica tool discussed was very useful for students to learn theory concepts better and create presentations and conference papers easily on the go.
Dr. Aravind highlighted on Wolfram Mathematica and its functionalities. Further, he has illustrated the capabilities of Mathematica in Academics , Research also few other different fields such as:-
- Mathematics(numerical and symbolic computing)
- Control systems
- Image processing
- Probability and statistics
- Wavelet analysis
Topic: Human Factors in Decision Making and User Interface Design
Date and Time: Monday, 01 February 2016 at 2 pm
Resource Person: Mr. Dashrathraj K Shetty, Senior Assistant Professor, Dept. of CSE, MIT, Manipal
The ever smiling and dynamic Mr.Dashrathraj started the presentation with a brief introduction to what exactly a UI (User Interface) means. The designing of the UI isn’t just limited to the technical factors but also involves various human factors such as emotions and arousing of human 5 senses in order to give a pleasant and enjoying feel to the end user. The various senses such as touch, taste, smell, look and aroma of human beings do make a big impact on the development of successful and beautiful UI. The best example of a music company was demonstrated that how it did change its font colors of the web page to bring a change in mood of the human beings and thus it started generate more revenue because of it. Human–computer interaction is the main contributor to user experience design because of its emphasis on human performance rather than mere usability. It provides key research findings which inform the improvement of systems for the people. Human-computer interaction extends its study towards more integrated interactions, such as tangible interactions, which is generally not covered in the practice of user experience. User experience cannot be manufactured or designed; it has to be incorporated in the design.
Understanding the user's emotional quotient plays a key role while designing a user experience. The first step while designing the user experience is determining the reason a visitor will be visiting the website or use the application in question. Then the user experience can be designed accordingly. The talk was well received and appreciated by the students and faculty members and was very interactive.
Topic: TCP/IP- Curse or Boon for the Future of Internet
Date and Time: Wednesday, 21 October 2015 at 11 am
Resource Person: Dr. A P Manu, Professor, Dept. of ISE, SCEM, Mangaluru
The TCP/IP-based architecture of the Internet today was built with the intent to connect devices to other devices in a way that satisfies several key invariants, especially: network redundancy, ease of connection, and global network interoperability. TCP/IP was built with a focus on where machines are and how to talk to them, rather than what their content is. The three main issues that arise from the TCP/IP architecture of the web are availability, security, and location-dependence. For content to be highly available i.e. accessible quickly and reliably for a diverse set of users across the networks' topology, current TCP/IP-based networks require content-delivery-networks (CDNs) or Peer-to-Peer networks to be overlaid on top of existing infrastructure. In addition, the current web architecture allows for pipe security rather than the more-important data security. Professor Manu highlighted the fact that the way we have built security on top of the TCP/IP protocol encrypts entire connections, rather than just the data transferred across those connections. Therefore, services like caching and availability are affected. In addition to this, the current verification scheme relies upon the certificate-authority structure, which has been shown to have significant trust issues. Finally, the TCP/IP system as optimized for locating a machine rather than locating content means that those content consumers located topologically closer to the machine that contains the desired content experience a much higher Quality of Service (QoS) than those further away. Packets must be sent through a much larger number of intervening nodes to deliver content from one connected sub graph of the Internet to another sub graph with few connections to the source network.
Topic: Practical Approach on System Modeling and Simulation
Date and Time: Monday, 19 October 2015 at 3 pm
Resource Person: Dr. S Suresh, Associate Professor, Dept. of CS, ACE, Hosur
The talk began by first exploring exactly what and why the simulation is important and what is modeling actually means was explained. Simulation modeling is becoming increasingly popular as a technique for evaluating the performance of resource allocation and alternate operating policies. It is a cost-effective method for improving process performance and can be used to evaluate the performance of capital equipment before making an investment. The resource person showed practical systematic procedures for conducting simulation studies that help decision-makers find the optimal courses of action. His presentation was independent of any particular simulation software, allowing the audience to use any commercial package or general-purpose programming language. Queues (waiting lines) affect people every day. The primary goal is finding the best level of service. Analytical modeling (using formulas) can be used for many queues or for situations that are more complex, computer simulation is needed. The queuing system is determined by: Arrival characteristics, Queue characteristics and Service facility characteristics. The Poisson distribution and Exponential distribution are few established queuing models. The Kendall’s notation for queuing model was dealt in detail and it is very essential in analyzing a queuing system. The students asked few questions regarding the various simulator tools available as well the use of simulation models in various applications such as telecommunications and defense systems. The session was interactive and a lot of new concepts were learnt by the audience.
Topic: MVC Software Development Architecture Design
Date and Time: Saturday, 17 October 2015 at 11:10 am
Resource Person: Mr. Sushan, Infosys, Bangalore
Technical talk began by explaining what exactly the term MVC really means. MVC Pattern stands for Model-View-Controller Pattern. This pattern is used to separate application's concerns. The Model represents an object carrying data. It can also have logic to update controller if its data changes. The View represents the visualization of the data that model contains. The Controller acts on both model and view. It controls the data flow into model object and updates the view whenever data changes. It keeps view and model separate.
When all three components are instantiated, the view and the model will both register with the controller. Once a user interacts with the view, the events are nearly identical:
The view recognizes that a GUI action, for example, pushing a button or dragging a scroll bar has occurred, using a listener method that is registered to be called when such an action occurs. The view calls the appropriate method on the controller. The controller accesses the model, possibly updating it in a way appropriate to the user's action. If the model has been altered, it notifies interested listeners of the change. However, in this case, the change is sent to the controller.
Why adopt this design? Using the MVC helps to more completely decouple the model from the view. In this case, the controller can dictate the model properties that it expects to find in one or more models registered with the controller. In addition, it can also provide the methods that effect the model's property changes for one or more views that are registered with it. The session was interactive and the resource person cleared student’s doubts.
Topic: Internet of Things (IoT)
Date and Time: Thursday, 10 September 2015 at 11:10 am
Resource Person: Mr. Mahesha Padyana, CloudE, Mysuru
Technical talk began by explaining in simple terms what exactly is Internet of Things(IoT). The Internet of Things (IoT) provides the opportunity to enable and extend digital business scenarios, helping better connect people, processes, devices. IoT helps growth in analytics and cloud computing, increasing interconnectivity of machines and personal smart devices.
A thing, in the Internet of Things, can be a person with a heart monitor implant, a farm animal with a biochip transponder, an automobile that has built-in sensors to alert the driver when tire pressure is low or any other natural or man-made object that can be assigned an IP address and provided with the ability to transfer data over a network. So far, the Internet of Things has been most closely associated with machine-to-machine (M2M) communication in manufacturing and power, oil and gas utilities. Products built with M2M communication capabilities are often referred to as being smart. IoT enables remote monitoring for millions of patients, analyze trends to create delightful shopping experiences, or save millions by pro-actively managing the critical machineries. IoT uses technology to enhance our comfort, improve our energy efficiency, and simplify the tasks that consume our home and work life and give us greater control over our lives.
He started asking students to ask questions regarding new ideas involving use of IoT to address the everyday problems and he cleared many of the doubts, which students had, indeed, it was an interactive session.
Topic: Data Storage Technology Learning Objective
Date and Time: Monday, 24 August 2015 at 11:10 am
Resource Person: Mr. Manjunath H R , Data Life Cycle Pvt. Ltd, B’lore
This Technical talk was slightly different from other technical talks as there were practical demonstrations. It was an interactive session. The resource person is a part of a company named data lifecycle where they provide assistance to students in their projects. He started the talk with the final year projects based on SAN, the various fields in SAN where the students can focus. Their focus is on system integration in data storage and providing solutions in that domain from past many years. He showed the various facilities provided by their company. It was really helpful for us.
He then explained about the DAS-Direct attach storage technology. The session began with the definition of data storage. It is the integral part of modern Infrastructure. He explained the evolution of data storage. From 1985- Information Technology Infrastructure structure to 2015 in Cloud computing. He explained the scopes of SAN and advances of SAN. He explained about primary storage and secondary storage. Primary storage is known as power on state. It is online access of data. It is reliable and high performance and expensive. Secondary Storage is also known as offline. Copies of data from primary are stored. Data tapes are also stored.
He then gave a brief introduction about types of interfaces. There are three types of interfaces. They are SATA, SAS, and Fiber channels. DAS is directly attached to the server. Raid is method of combining several drives into a single Logical Unit. It can offer fault tolerance and higher performance than a single individual at hard drive. Redundancy is reduced and capacity and performance is improved.
He showed the structure of storage in power point presentation. He then explained about SAN and NAS. NAS enable users to store and share data in the form of files. They are file servers. Benefits of NAS are storage consolidation with network server. There are two types of SAN. First one is FC SAN. It uses FC network and FCP protocol. Second one is IP SAN. It uses IP network and ISCSI protocol. Unified storage is a combination of SAN and NAS.
He explained about the benefits of SAN and data protection and few of them were better scalability, Better Resource Sharing high performance and dedicated network of storage and server.
The presentation was made very interesting with many diagrams. He gave satisfactory answers to questions asked by the students. He ended this beautiful session by demonstrating Infrartrend Raid Watch software and its explanation. He asked the students to voluntarily get up and give feedback.
He also gave a booklet which contained all the necessary details about SAN which will surely help the final year students in their SAN exam.
Topic: Emerging technologies in IT
Date and Time: Tuesday, 11 August 2015 at 11:10 am
Resource Person: Mr. Vishnu Bhat, Infosys Technologies, Bengaluru
Technical talk was mainly an interactive session where our honored guest spoke about VARIOUS TECHNOLOGIES. He did not directly start with the topic. He started asking students to ask questions regarding job opportunities and various other fields and also he cleared many of the doubts, which students had, indeed, it was an interactive session.
The session started by several motivational quotes and then he explained about his career experiences, about the various scopes of jobs. He made us think. He then explained about virtual reality and augmented reality. He made us understand why new technology has been developing.
Traditional data construct are replaced by Hadoop (Big data).It changed the IT work. Through Hadoop, creation of information and money system is made easier and faster as time taken to calculate mass data is reduced. Global Delivery Model is divided into parts sent to different people. Internet has reduced the distance between business and customer. The examples he gave was simple and satisfactory. He also gave the information about traditional data system and its drawbacks in terms of costs & maintenance. He mentioned about the Amazon server and about the thousands of data, which is generated every minute.
He told about icloud/ and then he even asked us to create an account in icloud. With icloud you can block your transaction at any time. The Google car was the best possible example of icloud computing. He then explained about IOT (Internet of things) and how this technology has a influence in the area of agriculture. He explained the disadvantages in cloud computing and the main disadvantage is security.
He has cleared the doubts of more than 20 students. The session was excellent and it was very useful for the students and staffs of CSE to upgrade their knowledge.