Robin Joseph Thomas (FK-2055)

Embed Size (px)

Citation preview

  • 8/8/2019 Robin Joseph Thomas (FK-2055)

    1/18

    1 | P a g e

    ITBM

    ASSIGNMENT

    Submitted byRobin Joseph Thomas

    FK-2055

    PGDM 19-B

  • 8/8/2019 Robin Joseph Thomas (FK-2055)

    2/18

    2 | P a g e

    1) Supply chain management

    SCM is the process of effectively managing the components of an extended

    value chain--from suppliers, through manufacturing and distribution chain, and

    to the consumers. SCM information systems use technology to more effectivelymanage supply chains.

    TYPES OF SCM SYSTEM SOFTWARE

    The two basic types of SCM system software are:

    1. Supply Chain Planning software (SCP): It uses mathematical models to predictinventory levels based on the efficient flow of resources into the supply chain

    2. Supply Chain Execution software (SCE): It is used to automate differentsteps in the supply chain such as automatically sending purchase orders to

    vendors when inventories reach specified levels.

    2) 3G

    International Mobile Telecommunications-2000 (IMT 2000), better

    known as 3G or 3rd Generation, is a generation of standards for mobile phones

    and mobile telecommunications services fulfilling specifications by the

    International Telecommunication Union. Application services include wide-area

    wireless voice telephone, mobile Internet access, video calls and mobile TV, all ina mobile environment. A 3G system must allow simultaneous use of speech and

    data services, and provide peak data rates of at least 200 kbit/s according to the

    IMT-2000 specification.

    In 2008, India entered the 3G arena with the launch of 3G enabled Mobile and

    Data services by Government owned Bharat Sanchar Nigam Ltd. (BSNL). Later,

    MTNL launched 3G in Delhi and Mumbai. Nationwide auction of 3G wireless

    spectrum was announced in April 2010. The first Private-sector service provider

    that launched 3G services is Tata Docomo, on November 5 2010. And the second

    is by Airtel in the middle of the same month. Other providers like Vodafone, Idea

    and Aircel are expected to launch 3G services by January 2011.

  • 8/8/2019 Robin Joseph Thomas (FK-2055)

    3/18

    3 | P a g e

    3) .NETThe Microsoft .NET Framework is a software framework for Microsoft

    Windows operating systems. It includes a large library, and it supports several

    programming languages which allows language interoperability (each languagecan utilize code written in other languages.) The .NET library is available to all the

    programming languages that .NET supports. The framework's Base Class Library

    provides user interface, data access, database connectivity, cryptography, web

    application development, numeric algorithms, and network communications.

    The class library is used by programmers, who combine it with their own code to

    produce applications

    Microsoft started development on the .NET Framework in the late 1990s

    originally under the name of Next Generation Windows Services (NGWS). By late2000 the first beta versions of .NET 1.0 were released. Version 3.0 of the .NET

    Framework is included with Windows Server 2008 and Windows Vista. Version

    3.5 is included with Windows 7, and can also be installed on Windows XP and the

    Windows Server 2003 family of operating systems. On April 12, 2010, .NET

    Framework 4 was released alongside Visual Studio 2010.

    4) SERVICE ORIENTED ARCHITECTUREA service-oriented architecture is essentially a collection of services. These

    services communicate with each other. Service-oriented architecture (SOA) is a

    flexible set of design principles used during the phases of systems development

    and integration in computing. Service Provider creates a service for interaction

    and exposes the services description for consumers and may decide to register

    this service with registry of choice. The Service consumer discovers the service

    from register or directly from service provider and send messages in well defined

    XML format

    The eight specific service-orientation principles:

    Standardized Service Contract Service loose coupling

  • 8/8/2019 Robin Joseph Thomas (FK-2055)

    4/18

    4 | P a g e

    Service Abstraction Service Reusability Service Autonomy Service Statelessness Service Discoverability Service Composability

    REQUIREMENTS

    Interoperability among different systems and programming languages thatprovides the basis for integration between applications on different

    platforms through a communication protocol

    Desire to create a federation of resources.

    5) WIPRO

    Wipro Technologies Limited is a giant information technology services

    corporation headquartered at Bangalore, business spans India, Asia Pacific and

    the Middle East.It has interests varying from Information technology, consumer

    care, lighting, Engineering and health care businesses.

    Azim Premji is the Chairman of the Board, WIPRO started as a vegetable oil

    trading company in 1947 from an old mill at Amalner, Maharastra, India founded

    by M.H. Premji .In 1979, WIPRO began developing its own computers and in 1981

    started selling the finished product.Wipro Limited, which dealt in hydrogenated

    cooking fats along with consumer products, grew from a company of US $2.5

    million to a giant of $1.4 billion under Premji's leadership. Its main divisions

    include IT Services,Product Engineering Solutions,Technology Infrastructure

    Services and Business Process Outsourcing. IT details of the company include

    Database: MS SQL 2000/2005,OS: Windows 2003 enterprise edition,Application:

    Alpha petrol, Enabler Management, Enabler Configuration, Fuel

    Rconciliation,Reporting Tool: Jasper Report and Controller Hardware: Enabler

  • 8/8/2019 Robin Joseph Thomas (FK-2055)

    5/18

    5 | P a g e

    from Integration Technologies from New Zealand. WIPRO mainly deals with

    SystemSoftwareDevelopment, Operating System, Device Driver Development.

    6) Cloud computingCloud computing is a style of computing that characterizes a model in

    which providers deliver a variety of IT-enabled capabilities to consumers. Cloud-

    based services can be exploited in a variety of ways to develop an application or

    a solution. Using cloud resources does not eliminate the costs of IT solutions, but

    does re-arrange some and reduce others. In addition, consuming cloud services

    enterprises will increasingly act as cloud providers and deliver application,

    information or business process services to customers and business partners.

    ADVANTAGES DISADVANTAGES

    Increasingly associated with SMEs. Requires a constant Internet

    connection.

    Cloud computing users avoid capital

    expenditure

    Does not work well with low-speed

    connections.

    Reduced implementation and

    maintenance costs.

    Can be slow.

    Increased storage on demand / Flexible

    and scalable infrastructures.

    Features might be limited.

    Greening of the data center / Reduced

    Energy costs

    Stored data might not be secure.

    Highly automated. Stored data can be lost

    Greater mobility to workforce.

  • 8/8/2019 Robin Joseph Thomas (FK-2055)

    6/18

    6 | P a g e

    7) CUSTOMER RELATIONSHIP MANAGEMENT

    Customer relationship management is a comprehensive strategy. It is the

    process of acquiring, retaining and partnering with selective customers to create

    superior value for the company and the customer. It involves integration ofmarketing, sales, customer service and supply chain functions of the

    organization. The purpose of CRM is to improve marketing productivity. Effective

    CRM implementation requires a frontline information system that shares

    relevant customer information across all interface units.CRM tools are meant to

    supplement a companys strategy for building effective customer relationships.

    FACTORS CONTRIBUTING TO DEVELOPMENT AND EVOLUTION OF CRM

    Advent of sophisticated computer and telecommunication technologies thatallow producers to directly interact with end customers. For e.g. in Airline,

    Banking, the de-intermediation process is fast changing the nature of marketing

    and consequently making relationship more popular. The de-intermediation

    process and consequent prevalence of CRM is also due to the growth of the

    service economy. Between the service provider and the service user and the

    service user an emotional bond also develops creating the need for maintaining

    and enhancing the relationship

    Another force driving the adoption of CRM has been the total quality movement.

    When companies embraced the TQM philosophy to improve quality and reduce

    costs, it became necessary to involve suppliers and customers in implementing

    the program at all levels of the value chain. Thus several companies, such as

    Motorola, IBM, Xerox formed partnering relationships with suppliers and

    customers to practice TQM .Marketers are forced to be more concerned with

    customer retention & loyalty. On the supply side it pays more to develop closer

    relationships with a few suppliers than to work with more vendors.

    Finally, many large internationally oriented companies are today trying to

    become global by integrating their worldwide operations. Since CRM

    implementation comprises a significant IT component, these companies have

    often handed over the responsibility of CRM implementation to IT departments.

  • 8/8/2019 Robin Joseph Thomas (FK-2055)

    7/18

    7 | P a g e

    8) LINUX

    It is a Unix-like Operating System. Linux is a famous open source project. It

    is free to use, distribute, modify under a compatible licence. Linux is produced by

    a large developer and user community.it is a combination of many projects. Thecost of commercial development of this is estimated at USD 7 billion. Linux was a

    Unix-based OS. UNIX was developed in 1970 by AT&T Lab (Later known as Bell

    Lab. Linux is created in 1991 by Linus Torvalds.

    Version 1of Linux is released in 1994. Initially it was developed for 80x86

    processors (IA32 or i386 architecture processors. Today it supports various

    processors such as- AMD, Motorola 6800, Power PC, etc. People can improve and

    add things in LINUX. Some WINDOWS programs can be run under LINUX using

    emulator.

    9) GREEN COMPUTING

    The study and practice of using computing resources efficiently. The goals

    are similar to green chemistry; that is reduce the use of hazardous materials,

    maximize energy efficiency during the products lifetime and promote

    recyclability or biodegradability of defunct products and factory waste.

    Virtualization is the process of running two or more logical computer systems onone set of physical hardware; it is one of the most approaches of the green

    computing. Other approaches are Power management, Power supply, Storage,

    Video card, Material recycling.

    It is estimated that out of $250 billion per year spent on powering computers

    worldwide, only about 15% of that power is spent computing-the rest is wasted.

    In order to achieve the energy efficiency target IT Cos. will have to learn to use

    less electricity in just the same the way, using green computing to save money.

    This will demand major changes in IT uses and policies. An industry initiative

    called 80 PLUS certificates PSUs that are at least 80% efficient.

  • 8/8/2019 Robin Joseph Thomas (FK-2055)

    8/18

  • 8/8/2019 Robin Joseph Thomas (FK-2055)

    9/18

    9 | P a g e

    them to Internet services more commonly accessed on desktop or notebook

    computers or help them by making it easier to use the Internet on

    their portable devices. Mobile application development is a important concept in

    the field of mobile applications, it is defined as, the process by

    which applications are developed for small low-power handheld devices such

    as persona digital assistants, enterprise digital assistants or mobile phones. These

    applications are either pre-installed on phones during manufacture, or

    downloaded by customers from app stores and other mobile software

    distribution platforms.

    Mobile applications development mainly consists of two platforms, one which

    supports multiple manufacturers and one which does supports only one

    platform. Multiple supporting platforms include Java-me, Symbian, Android and

    Windows mobile. Single manufacturer platforms include Blackberry and Apple.

    Business market for Mobile applications is huge as much as $1.7 billion.

    12) Social Networking Sites

    Social networking is the interaction of people who share common

    interest. Social Networking Sites is the online service or platform that builds

    social relations among people

    BLOG

    A blog is basically an online journal that can be either public or private. If your

    blog is private, only specific users that you invite can read your blog. You can blog

    about anything, personal experiences, travel, or on a particular topic. To

    subscribe to a blog, you will need to sign up for a Google reader account or other

    RSS feed reader.

    ORKUT

    Orkut is an online community that connects people through a network of trusted

    friends

    FACEBOOK

    It allows user search for new and old friends. It makes less awkward when

    communicating with strangers. It is easier to join group having similar interest. It

  • 8/8/2019 Robin Joseph Thomas (FK-2055)

    10/18

    10 | P a g e

    is free and easy to use. The level of customization makes it stand out from other

    networking sites.

    13) APPLE.INCSteve Jobs, Steve Wozniak, and Mike Markkula formed Apple Computer onApril 1, 1976, after taking out a $250,000 loan. Steve Wozniak built a computer

    to run on the 6502 chip from MOS technology, but Jobs had the idea to sell it.

    The different Apple includes Apple I, Apple II, and Macintoshetc. In 1991, Apple

    Computer, IBM, and Motorola joined to create the PowerPC processors.

    In July 2005, iPods U.S. market share was estimated at 74% January 2007; Apple

    reported record annual earnings of $7.1 billion. In January, Steve Jobs announced

    the company would change its name to Apple, Inc. to incorporate their manyendeavors. On January 27, 2010, Apple introduced their much-anticipated media

    tablet, the iPod running a modified version of iOS.

    14) GENPACT

    Traces its beginnings to 1997, when under the name of GECIS; it was

    established as an independent business unit of GE Capital. Genpact became an

    independent company in January 2005, enabling faster growth by reaching downto clients outside the GE family. The company was listed on the NYSE in August

    2007 under the trading symbol G. Genpact has its head quarters at Hamilton,

    Bermuda.

    MAJOR CLIENTS OF GENPACT

    GlaxoSmithKline Penske Genworth Nissan Air Canada Linde Wachovia

  • 8/8/2019 Robin Joseph Thomas (FK-2055)

    11/18

    11 | P a g e

    15) Business analytics

    Business intelligence (BI) refers to computer-based techniques used in

    spotting, digging-out, and analyzing business data, refers to the use of

    technology to collect and effectively use information to improve businesseffectiveness. Common functions of Business intelligence are Reporting,Online

    analytical processing, data mining, Business management and predictive

    analytics. In 1958 Hans peter was the first person to use the term Business

    intelligence. Its applications include gaining new insight, to support business

    decisions, Continuous monitoring processes.

    Before implementing a BI solution, it is worth taking different factors into

    consideration before proceeding. According to Kimball et al. These are the three

    critical areas that you need to assess within your organization before gettingready to do a BI project,

    1. The level of commitment and sponsorship of the project from seniormanagement

    2. The level of business need for creating a BI implementation3. The amount and quality of business data available

    Future of BI: By 2012, business units will control at least 40 percent of the

    total budget for business intelligence.

    By 2010, 20 percent of organizations will have an industry-specific analytic

    application delivered via (SaaS) as a standard component of their business

    intelligence portfolio.

    16) FLASH MEMORY

    Flash memory is not new, but it is moving up to a new tier in the

    storage echelon. Flash memory is a semiconductor memory device, familiar from

    its use in USB memory sticks and digital camera cards. It is much faster than

    rotating disk, but considerably more expensive, however this differential is

    shrinking. At the rate of price declines, the technology will enjoy more than a 100

    percent compound annual growth rate during the new few years and become

    strategic in many IT areas including consumer devices, entertainment equipment

  • 8/8/2019 Robin Joseph Thomas (FK-2055)

    12/18

    12 | P a g e

    and other embedded IT systems. In addition, it offers a new layer of the storage

    hierarchy in servers and client computers that has key advantages including

    space, heat, performance and ruggedness.Two technologies used in flash

    memory are

    NAND technology NOR technology

    CHARACTERISTICS

    Flash memories are non-volatile; they do not require power to retainmemory content.

    They can be programmed (erased and written to) and can be accessed(read) at high speed.

    Longer time periods are required for erasing and writing. The development of flash memories is lagging behind the development of

    DRAMs because of the need for high internal voltages for writing and

    erasing.

    Flash memories are beginning to be widely used in the commercial marketwhere they are showing up in applications such as solid state disks.

    Flash memories do have a limited life of about 104

    to 10

    6

    erase and writeoperations but this is sufficient for many applications.

    17) ONLINE BANKING

    Online banking is the practice of making bank transactions or paying bills

    via the Internet. One can shop online, communicate online, and now, one can

    even do ones banking online. Online banking allows us to make deposits,

    withdrawals and pay bills all with the click of a mouse. One can check the balance

    every day just by logging on to one's account. Since bills are paid online, the

    necessity of writing checks, affixing postage and posting the payment in the mail

    is eliminated. Once the amount is entered and the payee is checked off, the

    funds are automatically deducted from the payer's choice of account. At the

  • 8/8/2019 Robin Joseph Thomas (FK-2055)

    13/18

    13 | P a g e

    same time the setting up an account may take time and there are learning

    difficulties also because the site changes and upgrades.

    BASIC REQUIREMENT

    Administrator Rights

    Browser Settings

    Certified Versions of Sun Java Software for CitiDirect

    Cookies

    Internet Explorer 7.0 - Browser Settings

    Internet Security Options

    Java Scripts

    Proxy ServerRequired Hardware

    .Required Software

    .Secure Sockets Layer Protocol (SSL)

    18) Firewall

    It is a logical barrier designed to prevent unauthorized or unwantedcommunications between sections of a computer network. Firewalls are used to

    prevent unauthorized Internet users from accessing private networks

    connected to the Internet, especially intranets. All messages entering or leaving

    the intranet pass through the firewall, which examines each message and blocks

    those that do not meet the specified security criteria.

    PLATFORMS OF FIREWALL

    DESKTOP FIREWALL

    Any software installed on an operating system to protect a single computer is

    called a desktop or personal firewall. This type of firewall is designed to protect

    a single desktop computer.

    NETWORK LEVEL FIREWALL

    https://www.citidirectonline1.citidirect.citicorp.com/web/cda/systemrequirement/detail.jsp?systemRequirementId=1239https://www.citidirectonline1.citidirect.citicorp.com/web/cda/systemrequirement/detail.jsp?systemRequirementId=420https://www.citidirectonline1.citidirect.citicorp.com/web/cda/systemrequirement/detail.jsp?systemRequirementId=1660https://www.citidirectonline1.citidirect.citicorp.com/web/cda/systemrequirement/detail.jsp?systemRequirementId=486https://www.citidirectonline1.citidirect.citicorp.com/web/cda/systemrequirement/detail.jsp?systemRequirementId=1870https://www.citidirectonline1.citidirect.citicorp.com/web/cda/systemrequirement/detail.jsp?systemRequirementId=421https://www.citidirectonline1.citidirect.citicorp.com/web/cda/systemrequirement/detail.jsp?systemRequirementId=419https://www.citidirectonline1.citidirect.citicorp.com/web/cda/systemrequirement/detail.jsp?systemRequirementId=422https://www.citidirectonline1.citidirect.citicorp.com/web/cda/systemrequirement/detail.jsp?systemRequirementId=1288https://www.citidirectonline1.citidirect.citicorp.com/web/cda/systemrequirement/detail.jsp?systemRequirementId=1289https://www.citidirectonline1.citidirect.citicorp.com/web/cda/systemrequirement/detail.jsp?systemRequirementId=1289https://www.citidirectonline1.citidirect.citicorp.com/web/cda/systemrequirement/detail.jsp?systemRequirementId=1289https://www.citidirectonline1.citidirect.citicorp.com/web/cda/systemrequirement/detail.jsp?systemRequirementId=424https://www.citidirectonline1.citidirect.citicorp.com/web/cda/systemrequirement/detail.jsp?systemRequirementId=424https://www.citidirectonline1.citidirect.citicorp.com/web/cda/systemrequirement/detail.jsp?systemRequirementId=424https://www.citidirectonline1.citidirect.citicorp.com/web/cda/systemrequirement/detail.jsp?systemRequirementId=424https://www.citidirectonline1.citidirect.citicorp.com/web/cda/systemrequirement/detail.jsp?systemRequirementId=424https://www.citidirectonline1.citidirect.citicorp.com/web/cda/systemrequirement/detail.jsp?systemRequirementId=1289https://www.citidirectonline1.citidirect.citicorp.com/web/cda/systemrequirement/detail.jsp?systemRequirementId=1288https://www.citidirectonline1.citidirect.citicorp.com/web/cda/systemrequirement/detail.jsp?systemRequirementId=422https://www.citidirectonline1.citidirect.citicorp.com/web/cda/systemrequirement/detail.jsp?systemRequirementId=419https://www.citidirectonline1.citidirect.citicorp.com/web/cda/systemrequirement/detail.jsp?systemRequirementId=421https://www.citidirectonline1.citidirect.citicorp.com/web/cda/systemrequirement/detail.jsp?systemRequirementId=1870https://www.citidirectonline1.citidirect.citicorp.com/web/cda/systemrequirement/detail.jsp?systemRequirementId=486https://www.citidirectonline1.citidirect.citicorp.com/web/cda/systemrequirement/detail.jsp?systemRequirementId=1660https://www.citidirectonline1.citidirect.citicorp.com/web/cda/systemrequirement/detail.jsp?systemRequirementId=420https://www.citidirectonline1.citidirect.citicorp.com/web/cda/systemrequirement/detail.jsp?systemRequirementId=420https://www.citidirectonline1.citidirect.citicorp.com/web/cda/systemrequirement/detail.jsp?systemRequirementId=1239
  • 8/8/2019 Robin Joseph Thomas (FK-2055)

    14/18

    14 | P a g e

    It inspects packet headers and filtering traffic based on the IP address. The port

    and the service cant validate user inputs or detect maliciously modified

    parameters in an URL request. It leaves your network vulnerable to a number of

    serious threats.

    STATEFUL MULTI LEVEL FIREWALL

    It filters packets at the network level and recognize and process application-

    level data, but since it doesn't employ proxies, it deliver reasonably good

    performance in spite of the deep packet analysis. It is not cheap, and it can be

    difficult to configure and administer.

    19) TELECOM INDUSTRYIndian telecom industry is the world fastest growing telecommunication

    industry. It is the second largest telecommunication network in the world in

    terms of number of wireless connection after china. The mobile tariffs in India

    have also become lowest in the world. Indian telecommunication system is

    governed by the Indian telegraph act, 1885 (ITA 1885) and the Indian wireless

    act, 1933. The department of telecommunications (dot) governs the Indian

    telecom industry. Dot, in co- ordination with its arm, telecom commission, looksafter licensing, policy making, and frequency management. Dot established the

    telecom regulatory authority of India (TRAI) in 1997. The telecom disputes

    settlement and appellate tribunal (TDSAT) were also established at the same

    time. Another regulatory body is the wireless planning commission (WPC) under

    the ministry of communications. In June 2009, the government of India banned

    the import of several mobile phones manufactured in china. In April 2010, the

    government was also reported to be blocking Indian service providers from

    purchasing Chinese mobile technology. India will start using ipv6 (internetprotocol version 6) from March 2012, according to a new roadmap released by

    the Indian government. Indian telecom sector has shown tremendous growth in

    past few years on the back of increasing demand and policy initiatives taken by

    the government.

  • 8/8/2019 Robin Joseph Thomas (FK-2055)

    15/18

    15 | P a g e

    20) ORACLE

    Oracle Corporation was founded in 1977 by Larry Ellison, Bob Miner and

    Ed Oates. Over 65,000 customers worldwide rely on Oracle's complete

    application solutions to achieve superior results. Oracle Applications also providecomplete choice and a secure path for customers to benefit from the latest

    technology advances. Oracle Applications Unlimited is Oracle's commitment to

    customer choice through continuous investment and innovation in current

    applications offerings. The powerful combination of complete solutions and

    complete choice drive better business performance and help customers.

    21) FINANCIAL PACKAGES

    The most commonly used financial packages are:

    ORACLE ERP: Oracle ERP Software is the most comprehensive software system at

    present that integrates all the business functions most effectively, featuring a

    unique combination of hardware and software. This software is engineered to

    cater the requirements of different types of industries and business processes

    and has fast gained popularity across the globe.

    TALLY: Tally an accounting Software is one of the simplest softwares to use, it is

    very user friendly and even a person having the basic knowledge of accounts and

    computers can easily learn this package on his own.

    SAP: SAP is one of the top Enterprise Resource Planning (ERP) software in the

    world. SAP is the brainchild of five IBM engineers who broke off from IBM and

    founded SAP AG in 1992. It drives efficiency and value to the bottom line of

    large, mid-size and now smaller organizations by redefining how business shouldbe done. SAP solutions deliver real-time visibility across the entire enterprise and

    are not limited to top management, control engineers or the IT team.

  • 8/8/2019 Robin Joseph Thomas (FK-2055)

    16/18

    16 | P a g e

    22) AMAZON.COM

    Amazon.com is a public company founded in 1994 by Jeffery P Bezos. Its

    headquarters is in Seattle, Washington, USA. It is available worldwide.

    Its products include books, music CDs, consumer electronics among others andservices include compute, content delivery, database, E-Commerce, messaging

    and monitoring, networking, payments and billing, storage...etc.

    There were a few controversies related with this site such as differential pricing

    competition, product availability, kindle content removal, sale of Wikipedias

    material as books and collection of sales tax.

    23) IT SECURITY

    IT Security is eliminating the disruption of business operations and

    reducing the exposure to cyber attacks. Another term for this is IT Security

    Assurance. It is protecting information or data in whatever form. Cyber crime

    and terrorism has escalated during recent years. It is well-organized. It is

    advanced technically. It is well-financed. It has adopted a new view. The

    legal/regulatory risks are disclosure of customer relationship, damage claims,

    taxation/customs aspects, national/international restrictions of inter- and intra-

    business financial transactions and rules imposed by regulators. Basic researchhas created sufficiently good encryption algorithms. Vendors have integrated

    encryption into some of their products. As part of the Internet growth,

    encryption issues are gaining public attention. More than ever, IT Security needs

    strong support from basic and applied research. The shortcomings in adapting

    research results to business/industry must be overcome. The demand for skilled,

    interdisciplinary IT Security experts is growing quickly.

    24) UIDUID project is known as AADHAAR. It means 'support' or 'foundation.

    Aadhaar is the new name of the Multipurpose National Identity Card program of

    the Unique Identification Authority of India. The purpose of UID is to ensure

    inclusive growth by providing a form of identity to those who do not have any

  • 8/8/2019 Robin Joseph Thomas (FK-2055)

    17/18

    17 | P a g e

    identity. It seeks to provide Aadhaar numbers to the marginalised sections of

    society and thus would strengthen equity. The Aadhaar number will enable

    better delivery of services and effective governance. Public and private agencies

    can build services and applications that benefit residents across India. It enables

    uniqueness and centralized online identity verification and gives the power to

    access anywhere.

    25) IT IN SPORTS

    Technology is found in everything we do and everything we watch. It aids

    in the healing process of athletes. It allows athletes on teams to improve their

    skills, as well as connects your everyday coaches to referees on the field.

    Technology has made many peoples lives much easier and has opened up the

    horizon for millions of jobs. The technologies used in Baseball are Sabermetrics,

    Scouting Software, Sports Betting, Dartfish, Yellow Line and Omega Wave.

    Satyam Computer Services Ltd, Indias fourth biggest software firm, has blazed

    the trail, signing a seven-year agreement to be FIFAs official IT services provider

    and its first major sponsor from cricket-mad India. IT used in cricket are Hawkeye

    and Hotspot. The story of Indian Information Technology is now on rails! Six

    coaches of the Commonwealth Express train now traversing the country aredevoted to telling the success story of IT in India. It is also appropriate to briefly

    examine how the web will change the sale and distribution of sporting goods

    which is central to running sport programs. Wide Area Networks (WANs) can link

    together sports administrators located throughout a country.

    26) KNOWLEDGE PROCESS OUTSOURCING

    KPO is one step extension of Business Processing Outsourcing (BPO) .KPOis emerging as a new sector that promises to provide long-term jobs for

    intellectual, analytical and knowledgeable people with a pay scales much higher

    than the BPO sector.KPO can be defined as high added value processes chain

    where the achievement of objectives is highly dependent on the skills, domain

    knowledge and experience of the people carrying out the activity.

  • 8/8/2019 Robin Joseph Thomas (FK-2055)

    18/18

    18 | P a g e

    KPO services that can be outsourced to India are

    a.) Research & Development,

    b.) Business and Technical Analysis,

    c.) Learning Solutions,d.) Animation & Design,

    e.) Business & Market Research,

    f.) Pharmaceuticals and Biotechnology

    MAJOR KPO COMPANIES

    Genpact Evalueserve Ugam Solutions WNS 24/7 Customer