Upload
prasant-patro
View
591
Download
2
Tags:
Embed Size (px)
DESCRIPTION
This contains evolution, law changes and future aspect of technology
Citation preview
TECHNOLOGY
Group – Rebels• Achintya P R• Arun K S• Aviral Agarwal• Avishek Bhattacharyya• Jerin George• Madhurima• Manish Wattharkar• Nandana S S• Pallavi Belani• Prashant Patro• Shrusti Shah• Shubham Mukharya
TECHNOLOGY
TIME
EDUCATION
GLOBE
LAW
OASIS
CULTURE
NATURE
HEALTH
YES
OMNI
TECHNOLOGY
Technology is the application of scientific knowledge for practical purposes, especially in industry: advances in computer technology.
Techne Logia Technology
The Evolution of the term Technology
Before 20th Century
•Technology referred to the description or study of the useful arts.
1930s
•In 1937, the American sociologist Read Bain wrote that "technology includes all tools, machines, utensils, weapons, instruments, housing, clothing, communicating and transporting devices and the skills by which we produce and use them.”
21st Century
•Technology as applied science, especially among scientists and engineers.
Evolution of TechnologyInvention of ramp to aid construction processes.•City planning and sanitation technologies in
Indus Valley Civilization•Seafaring technology
Bronze technology used in Mesopotamia•Early Seismic detectors by Chinese Civilization•Magnetic compass
Water Lifting Technologies•Wheel Technology•Metallurgical Technology
Ancient Technology
Evolution of Technology
Medieval Technology
• Mechanical Clocks
• Vertical Windmill
• Dry Compass
• Communication Technology
• Paper making Technology
Textile manufacturing
• Steam Engine• Railway
Transportation
Evolution of Technology
Modern Technology•Bro
adband Internet Access
•Quantum Computers
•Nanotechnology
•Biotechnology
•Whole genome sequencing
•Scramjets and Drones
Evolution of Technology
What is Cloud Computing?Cloud Computing is a general term used to describe a new class of network based computing that takes place over the Internet,
Basically a step on from Utility Computing A collection/group of integrated and networked hardware, software and Internet infrastructure (called a platform). Using the Internet for communication and transport provides hardware, software and networking services to clients
These platforms hide the complexity and details of the underlying infrastructure from users and applications by providing very simple graphical interface or API (Applications Programming Interface).
What is Cloud Computing
COMPUTER NETWORK
STORAGE (DATABASE)
SERVERS
SERVICESAPPLICATIONS
Advantages of Cloud Computing
• Lower computer costs• Improved performance• Reduced software costs• Instant software updates• Improved document format compatibility• Unlimited storage capacity• Increased data reliability• Universal document access• Latest version availability• Easier group collaboration• Device independence
Opportunities • The use of the cloud provides a number of
opportunities: – It enables services to be used without any understanding
of their infrastructure.– Cloud computing works using economies of scale:
• It potentially lowers the outlay expense for start up companies, as they would no longer need to buy their own software or servers.
• Cost would be by on-demand pricing. • Vendors and Service providers claim costs by establishing an
ongoing revenue stream.
– Data and services are stored remotely but accessible from “anywhere”.
Challenges• In parallel there has been backlash against cloud computing:
– Use of cloud computing means dependence on others and that could possibly limit flexibility and innovation:• The others are likely become the bigger Internet companies like Google
and IBM, who may monopolise the market. • Some argue that this use of supercomputers is a return to the time of
mainframe computing that the PC was a reaction against.– Security could prove to be a big issue:
• It is still unclear how safe out-sourced data is and when using these services ownership of data is not always clear.
– There are also issues relating to policy and access: • If your data is stored abroad whose policy do you adhere to? • What happens if the remote server goes down? • How will you then access files? • There have been cases of users being locked out of accounts and losing
access to data.
TELECOMMUNICATION
EVOLUTION of the TELECOM SECTOR
Post Pager Services
Mobile Communication
Broadband Communication
Telecom Sector Laws Indian Telegraph Act, 1885• Provides the legal basis for the government as the sovereign to
provide the telecommunication services in the country either directly or through licensing of operators
• Empowers the Government to issue rules and regulations for governance of the sector from time to time without requiring a reference back to the Parliament for amendment of the Act
• The latest amendment was made in 2003
Indian Wireless Act, 1933• This was meant to regulate the possession and use of wireless
telegraphy apparatus, defined as any apparatus, appliance, instrument or material used or capable of use in wireless communication
• Spectrum issues are governed under the wireless act
Department of Telecommunications (DoT)
• Formulating developmental policies for the accelerated growth of the telecommunication services.
• Grant of licenses for various telecom services like Unified Access Service Internet and VSAT service.
• Responsible for frequency management in the field of radio communication in close coordination with the international bodies.
• Enforces wireless regulatory measures by monitoring wireless transmission of all users in the country.
Telecom Regulatory Authority of India (TRAI)
• Established with effect from 20th February 1997 by an Act of Parliament, called the Telecom Regulatory Authority of India Act, 1997
• To regulate telecom services, including fixation/revision of tariffs for telecom services which were earlier vested in the Central Government.
INDUSTRY PLAYERS
State-owned Companies
BSNL
MTNL
Indian Owned Private
Companies
Reliance Communications
Ltd.
Tata Teleservices Ltd.
Foreign Invested Indian
Companies
Bharati Airtel Ltd.
Vodafone Essar
• About 2G• What is the 2G
spectrum scam?• Who were
involved?• Media Response• Market Response• Steps taken by the
Government• Political Response
2G Spectrum Scam
IMPACT OF TECHNOLOGY
IMPACT OF TECHNOLOGY• British Virgin Islands data theft stumps Indian tax authorities;
offenders could take advantage – The Economic Times
• Blackberry Vs Uncle Sam
• Prime minister being the Primus inter pares takes time to implement
• Facebook 8 different types of facebook-62 million mobile user’s in India
• Arab spring – Google maps.
IMPACT OF LAWS ON TECHNOLOGY
Arab NationsIndia U.S China
Capitalist Economy MonarchMixed economy Communist party
Senate Congress
Ban on Social Networking
sitesArab Spring
Prime Minister Premier Monarch
Facebook, Orkut & Google banned
40,000 IT Professionals hired to block the
websites
Increase in Interest Rate
Unemployment at peak
Fiscal DeficitRecession Social media being held as
responsible for this
Industrial &Economic
Growth
Glass - Steagall Act, 1932
OF TECHNOLOGY
MEDICINE
Ultrasound/X ray Technology Laser Technology Biotechnology Stem cell transplantation I.V.F. Technology Chemotherapy
Female Foeticide Cloning Plastic Surgery Side-effects of drugs
DEFENCE Advanced Armory RADAR Weapon engineering Robotics
Nuclear Weapons Bio-weapons Cyber attacks
INFRASTRUCTURE Transportation Industrialization Education
(E-books, projectors) Sky-scrappers, Flyovers High Living Standards
Increase in Pollution(P.U.C., JN nurms)
Plagiarism De-forestation Diseases due to current
life-style
CRIME-CONTROL C.C.T.V. Camera D.N.A. Test Biometric Passwords Lie-Detector Test Breathe analyzer
Spying Cyber – bullying Forgery of government
documents, currency notes
Telecommunication
Computer Television Satellites Fibre optics Mobile phones Internet
Social Networking Sites
Adverse effects on teenagers
Socially Detached Radiations are harmful Cyber crime Information can be misused Phishing/ Vishing Piracy Hacking
ENVIRONMENT• Weather forecast• More emphasis on
Renewable energy sources• Reduction of paper usage• Disaster Management
• Global Warming• Reduction of natural
resource reserve• Ozone layer depletion• Water pollution• Acid Rain• Mining
STATUS OF INFORMATION TECHNOLOGY IN INDIAN COURTS
• List of Business Information System(LBIS) It is about scheduling of cases to be heard by the court on following day.
These database contain details of fresh cases, disposed cases and pending cases.
• Filing Counter Computerization In the Supreme court of India and High courts fresh cases are filed before computerized filing counter. Filing process is made easy and helps to save the time of advocates and court officials.
• CourtnicThis is about providing supreme courts’ pending cases information to litigants, advocates Nicnet. Courtnic answers queries of 200 applicants per day from all over the country. It is available at nominal charges. Response to COURTNIC is overwhelming as previously litigants would come to Delhi. Now the information is available at District court.
• Interactive Voice Response(IVR) Interested litigants and advocates can find the status of their cases on IVR free of cost.
• JudisNIC has brought out Judgment Information System(JUDIS) consisting of complete text of all reported judgment of Supreme court of India from 1950 to till date.
CYBER LAWS
Cyber bullyingCyber stalkingWorm attacks
HackingCyber terrorism
PornographyCredit card frauds
are
CRIMES
AMANDA TODDAGE: 15
CAROLINA PICCHIOAGE: 14
“Forgive me if I’m not strong. I cannot take it any longer.”
…..…says 14 year old Carolina Picchio, before she jumps out of her bedroom window.
Amanda Todd Case
INTERNET CRIMES
INTERNET CRIMES As technology changes at a rapid pace, consumer rights and business e-commerce rights may be challenged in new and
unusual ways.
Internet crimes includes
1. Cyber terrorism2. Cyber pornography 3. Defamation 4. Cyber stalking (section 509
IPC)5. Sale of illegal articles-
narcotics, weapons, wildlife6. Online gambling7. Email spoofing
8. Intellectual Property crimes- software piracy, copyright infringement, trademarks violations, theft of computer source code
9. Forgery10.Phishing 11.Credit card frauds12.Data theft
Internet Law/Cyber Law
• Cyber law or Internet law is a term that encapsulates the legal issues related to use of the Internet.
• Cyber laws can protect consumers and enforce regulations regarding Internet crime, Internet fraud, Internet business practices, Internet marketing and more
The Information Technology Act, 2000 (ITA-2000)
• Enacted on 17th May 2000.• IT Act is based on Model law on e-commerce adopted by UNCITRAL (United
Nations Commission on International Trade Law).
• Objectives of IT Act 2000:– To provide legal recognition for transactions carried out by means of electronic
data interchange, and other means of electronic communication, commonly referred to as "electronic commerce” which involve the use of alternatives to paper based methods of communication and storage of information.
– To facilitate electronic filing of documents with Government agencies and E-Payments
– to amend the Indian Penal Code, Indian Evidence Act,1872, the Banker’s Books Evidence Act 1891,Reserve Bank of India Act ,1934 .
• Facts: 24-year-old Nadeem Hamid Kashmiri employee of HSBC BPO allegedly accessed personal information, security information and debit card information of some customers and these details were passed on to the fraudsters who diverted £233,000 (approx Rs. 2 crores) from the clients' accounts.
• Actions: A case has been registered under Sections 66 and 72 of the IT Act and 408, 468 and 420 of the Indian Penal Code
DATA THEFT
Tampering with computer source code (also a Copyright Infringement)
Syed Asifuddin & Ors. v State of Andhra Pradesh & another -2005• Reliance Infocomm launched a famous scheme wherein this company was
giving an expensive hand-set at a very low cost but with a lock-in period of 3 years in which the mobile subscriber has to pay a fixed monthly rental and a premium call charge to such mobile services company.
• A special computer program / technology was used by this mobile services company wherein the hand-set can only be used with this mobile services and not with other mobile services.
• Employees of a competing mobile services company, Tata Indicom lured the customers of the above company to alter / tamper with the special (locking) computer program / technology so that the hand-set can be used with the competing mobile services.
• Held: Such tampering is an offence u/s 65 of IT Act as well as Copyright infringement u/s63 of Copyrights Act.
• Action :Tata Indicom employees were arrested for manipulation of the electronic 32-bit number (ESN) programmed into cell phones that were exclusively franchised to Reliance Infocomm.
• The court held that such manipulation amounted to tampering with computer source code as envisaged by section 65 of the Information Technology Act, 2000.
Cyber Stalking
• The word stalking was not commonly known until various instances happened. The legal definition of stalking varies from country to country. Various definitions are available in several books, out of which it can be stated that the common elements are:
• Repeated and unwanted behaviours whereby one individual attempts to contact another individual, and
• The behaviour causes the victim to feel threatened or harassed.
India’s First Case of Cyber stalking• Mrs. Ritu Kohli complained to the police against the a person who was
using her identity to chat over the Internet at the website, www.mirc.com
• Mrs. Kohli further complained that the person was chatting on the Net, using her name and giving her address and was talking obscene language. The same person was also deliberately giving her telephone number to other chatters encouraging them to call Ritu Kohli at odd hours.
• Consequently, the IP addresses were traced and the police investigated the entire matter and ultimately arrested Manish Kathuria on the said complaint.
• A case was registered under section 509, of the Indian Penal Code (IPC).
An alarm to the Government
• Discussing about the legal regime in India, then there were no provisions regarding cyber stalking until 2008. The Information Technology Act, 2000 did not contain any provisions regarding this heinous crime.
• The Information Technology Act, 2000 did not recognise the term but due to Ritu Kohli’s case the amended Act of 2008 recognised Cyber Stalking via Section 66A.
FUTURE TECHNOLOGY
Primary Sector: Agriculture• Telematics: This technology allows navigation,
prescription application, location and other data to be transferred easily to and from farm machinery to help farmers improve efficiencies on expensive equipment.
• Drought-resistance traits: The next round of drought hybrids will include genetically modified traits. Scientists are currently using biotechnology to alter one of the many different factors involved in a plant’s growth during water-restricted and high-heat conditions.
• Soil and crop sensors: More farm equipment is being outfitted with smart sensors that can read everything from plant health and water needs in the crop to nitrogen levels in the soil. The sensors then enable on-the-go application of inputs based on real-time field conditions.
• Biologicals: More biological pest control and growth enhancements are expected as farmers look for more environmentally friendly and cost-efficient crop inputs. Advanced technologies like high-throughput screening are helping companies to quickly multiply beneficial organisms, thus driving development of new biologicals.
• Weather satellite accuracy: Surprisingly, I think this technology has probably done as much for agriculture in the last decade as anything,” Catlett states. “We've started getting a new level of forecasting, especially on potential freeze dates and higher levels of forecasting accuracy
Secondary Market: Finished Goods
Technological change leads to improved production of goods and services due to:
• Computer-aided manufacturing ( CAM) this reduces labor costs, is more accurate and faster and can work at any hour of the day. The computer controls the machinery.
• Computer-integrated manufacturing (CIM) here, computers control the whole production line. Best example is in car production where robots undertake much of the work, reducing the need for labor to perform boring, routine tasks.
• Computer-aided design (CAD) Computers are used to help design products using computer generated models and 3D drawings. Reduces the need to build physical models to test certain conditions, known as prototypes. This can be expensive to produce just for testing purposes (e.g. aircraft or new cars.)
Automobile Industry:Google Driverless Car
• Powered by artificial intelligence • Mimic the human
intelligence in a car• You can count on one hand
the number of years it will take before ordinary people can experience this.• Google currently face the
challenge to forge the system into an affordable gem that every worker with an average salary could benefit from.
Autonomous Vehicles• By 2014, Volvo expects vehicles that can be autonomous at up to 31 miles (50 km) per
hour, with expected use in heavy traffic.• By 2014, Israeli company Mobileye expects to release semi-autonomous car
technology.• By 2015, Audi plans to market vehicles that can autonomously steer, accelerate and
brake at lower speeds, such as in traffic jams.• By 2015, Cadillac plans vehicles with "super cruise": autonomous steering, braking
and lane guidance.• By 2015, Nissan expects to release commercial vehicles with autonomous steering,
braking, lane guidance, throttle, gear shifting, and, as permitted by law, unoccupied self-parking after passengers exit.
• By 2016, Mobileye expects to release fully autonomous car technology.• By 2018, Google expects to release their autonomous car technology.• By 2020, Volvo expects accident-free cars,[and "road trains" in which individual cars
are electronically guided by a driver in a lead vehicle.• By 2020, GM, Audi, Nissan and BMW all expect commercially available driverless cars.
3D Printer
• Just as the term suggests, 3D printing is the technology that could forge your digital design into a solid real-life product. It’s nothing new for the advanced mechanical industry, but a personal 3D printer is definitely a revolutionary idea.
• Everybody can create their own physical product based on their custom design, and no approval needed from any giant manufacturer! Even the James Bond’s Aston Martin which was crashed in the movie was a 3D printed product!
• Form 1 is one such personal 3D printer which can be yours at just $2799. It may sound like a high price but to have the luxury of getting producing your own prototypes, that’s a reasonable price.
• Imagine a future where every individual professional has the capability to mass produce their own creative physical products without limitation. This is the future where personal productivity and creativity are maximized.
Tertiary Market: Service Industry
Banking• Internationally recognized
currency,• Smaller Units: Satoshis• Easily carry thousands of
bitcoins.• Cannot be stolen.• No restriction to use on age or
country.• Highly volatile.
Telecom• The iPhone 6 will finally do NFC• The iPhone 6 will run iOS 7• iPhone 6 storage• iPhone 6 home button• iPhone 6 screen• iPhone 6 processor• iPhone 6 camera: • iPhone 6 eye tracking• iPhone 6 fingerprint sensor• The new iPhone will have
better 4G LTE• iPhone 6 Wi-Fi may be 802.11ac• iPhone 6 wireless charging
IT: 1.Google Glass
• Social media feeds• Text• Google Maps• Navigate with GPS• Click photos
Quaternary Sector: Intellectual Activities
Stick Talk• Help to communicate with
people having hearing and visual disabilities.
• Speak to device it will display what you said.
• Write the sentence on your palm using the device, it will interpret the sentence and display it.
• This device will make conversation possible between visually and hearing impaired people.
Sixth-Sense
PRANAV MISTRY – SIXTH SENSE