Documente Academic
Documente Profesional
Documente Cultură
for
Joint Collaborative R and D Activities
for
Technology Development with Microsoft
Technical Issues
A.B. Patki
Scientist G
Department of Information Technology
Ministry of Communications & Information Technology
Government of India, New Delhi 110003
January 2004
OUTLINE OF THE TECHNICAL ISSUES
1. INTRODUCTION
ISSUES
ACTIVITIES
7. REFERENCES
1. INTRODUCTION
Usage of Information Technology’s power in industries,
corporate houses, private companies and Government establishments has
been viewed in the form of IT as a resource for productivity
enhancements. Nicholas Carr has indicated that if IT as resource is
viewed as infrastructure technologies, the competitive advantage ceases
with time [1]. It is argued that pattern of corporate IT spending indicate
that greater IT expenditures rarely provide superior financial results. As
brought out by Carr, the new rules for IT management for the future
emphasize on -
i) Spend less
Carr has not focused on the primary cause of not recognizing the
limited success. Deeper insight into the study of such initiatives, indicate
REVOLUTION
window systems. The latest boom brought out by TCP/IP and in Internet
information modeling
modeling
language
Second (MIPS). The better metric for the computer speed can be in the
origin) will have its MIQ ratings. The problem in the Information
do not mean the insufficient storage capacity on the hard disk, or other
Cyber Cafe users in India have very little (or practically nil) idea about
the existence of UNIX and the Internet growth arrived through UNIX
cycle:
(i) A product for engineering & scientific community
UNIX programs) began its life as the project of a single man, Linus
Torvalds. Linux is completely open i.e. you get the source code for the
Linux operating system and you can make changes to the operating
hardware, the role of OS is to provide support only & OS itself does not
get further evolved over a period of its life cycle on the ‘installed
– Windows)
hardware [5]
‘cognitive off-loading’
twentieth century viz. like Neural networks, Fuzzy Logic, Rough Set
important to carefully study the observation made by Carr viz. “Let the
provided for the subject matter of this paper. However, the important
[9,10] type interface for Internet Browsers. Fuzzy Logic based solutions
for IT Security including virus problems are likely to emerge soon [11].
7. REFERENCES