Information Technology: Past, Present and Future: February 2015

Download as pdf or txt
Download as pdf or txt
You are on page 1of 8

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/280383111

Information Technology : Past, Present and Future

Conference Paper · February 2015

CITATIONS READS
0 17,198

1 author:

Ashish Agrawal
SRMS College of Engineering and Technology
15 PUBLICATIONS   22 CITATIONS   

SEE PROFILE

Some of the authors of this publication are also working on these related projects:

COVID 19 View project

All content following this page was uploaded by Ashish Agrawal on 04 March 2016.

The user has requested enhancement of the downloaded file.


Bilingual International Conference on Information Technology: Yesterday, Toady, and Tomorrow, 19-21 Feburary 2015, pp. 14-20
© DESIDOC, 2015

lwpuk çks|ksfxdh % vrhr] orZeku vkSj Hkfo’;


Information Technology : Past, Present and Future
Sadhana Singh*, Ashish Agrawal, and Manvi Mishra
SRMS CET, Bareilly, India
*
E-mail:[email protected]

lkjka”k
lwpuk çkS|ksfxdh ¼vkbZVh½ ,d ,slh çkS|ksfxdh gSa tks dEi;wVj }kjk lwpuk dks bdëk djuk] çlaLdj.k djuk]
Hk.Mkju djuk vkSj tkudkjh nsuk gSA ge ,d yack jkLrk vlk/kkj.k le; esa r; djds ok;jysl ds bfrgkl esa
igq¡p x;s gSA fiNys ;qx esa ok;jysl çkS|ksfxfd;ksa esa Hkkjh o`f) ntZ dh xbZ gSA vkbZVh dk fodkl daI;wVj dh
ih<+h ij vk/kkfjr gS] tksfd 0 ih<h ls ikapoh ih<h rd igq¡p x;k gSaA lwpuk çkS|ksfxd us ,dh—r mís”; ^çn”kZu
vkSj dk;Zdq”kyrk* dks iwjk djus ds fy, fofHkUu fodkloknh ekxksaZ dk ikyu fd;k gSA lwpuk çkS|ksfxdh lwpuk
ds fofHkUu :i dks n”kkZrk gSa ftudk fofHkUu mís”;ksa tSls lEesyuksa] vuqla/kku vkSj v‚fM;ks] ohfM;ks] pSV vkfn ds
fy, gksrk gSA ;g vkys[k vkbZVh ds vrhr] orZeku vkSj Hkfo’; dks ij[krk gSA ;g vkys[k lwpuk çkS|ksfxdh ds
vrhr ls “kq: djrk gSA bl vkys[k esa lwpuk çkS|ksfxdh ds fodkl vkSj fodkl Øe dks n”kkZrs gSaA ;g lwpuk
vkSj lapkj çkS|ksfxdh ¼vkbZlhVh½ ls lacaf/kr gSA lwpuk çkS|ksfxdh nqfu;k esa orZeku “krkCnh esa vU; rduhdksa dh
rqyuk esa rsth ls c<us okyh çkS|ksfxdh gSaA
Abstract
Information technology (IT) is the technology which uses the computer to gather, process, store and
precede information. A long way in an extraordinarily undersized time has been reached in the history
of wireless. Over the past era, wireless technologies have undergone massive growth. Evolution of IT
is based on the generation about the computer, reached it’s about 0G to 5G. Looking past, Information
technologies have followed different evolutionary routes targeted to unified objective: performance and
efficiency. IT represent different form of information used for different purpose like, conferences, research,
and video, audio, chats, etc. This paper examines the past, present and future of IT. This paper begins
with the past of the information technology. In this paper we also show the evolution and development
of Information technology. It is related to the information and communication technology (ICT). IT
extends around the world faster than most other technologies in current centuries.
Keywords: Information technology, information and communication technology, generations of computer,
social networking sites, information technology infrastructure library (ITIL)

1. Introduction need to develop, maintain, operate, support a portfolio


Information Technology is study of skills. Modern of information systems never disappears. The past
world is characterized by rapid growth and development decade has seen the regular appearance of information
of information technology (IT) resulting in more technology as a new computing discipline in educational
dependence of the society, in a wider sense, on the institutions. In the past, the time between introducing
individual knowledge and competence of a person in and using new technologies was somewhat long.
the IT area. Although this addiction grows on day after The introduction of new Information technologies
day basis, the human right to education and information alters the parameters of the staffing decisions constantly.
is not extended to IT area. IT has great potential to Despite economic down streams, down turns and
improve excellence, quality, efficiency and effectiveness. downsizing trends, the demand for new IT professionals
Supervision IT, human resources present a demanding is expected to grow over the coming years [1][2].
task for executives. As organizations jumble up between The introduction of new IT in organizations makes
positions involving in-house employment, to agile the staffing dilemma more demanding, given the lack
employment, and to outsourced support for IT, the need of acquaintance with the expertise, the education
to efficiently obtain, supervise and raise appropriate curve connected with its incorporation, the qualified
IT human resources assumes greater significance. The scarcity of experienced human resources. With hurried
Singh et al.: Information Technology : Past, Present and Future

development of IT and further deepening of information • ACSITEET 2014


production, more and more enterprises have realized • ICACEA 2014
the tactical value of IT and made great reserves in it. • ICRTC 2013
However, during IT implementation procedure, decision- • SACTA 2014
making, conversion degree, and IT performance is • SAVOIR MANTRNA 2014
often substandard to the expectation. IT has became • IC3 2013
full-fledged quickly and gratitude to a tremendously
dynamic and tight-knit academic group of people, 2.2 Acceptance and Rejection Criteria
undergone an evolution unlike any other computing The studies which presented quality data on
regulation. Information Technology or Information and Communication
Information and Communication Technology including Technology were accepted. Some very old studies were
issues related to reliability, usability, performance rejected if they were not up to the mark. The author’s
and trust. ICT has the potential to “connection the main focus was to accept qualitative and quantitative
information gap” in terms of civilizing excellence methods based research studies.
of education, increasing the magnitude of quality
educational opportunities, making knowledge building 2.3 Search Strategy
probable through borderless and unlimited accessibility For searching research papers, we used Google
to resources and people, and getting populations in search engine and MSN search engine. For this
inaccessible areas to satisfy their basic right to education. activity, we made some combinations from the area
As various ICTs become increasingly reasonable, of information technology. Some of those combinations
reachable, and interactive, their role at all levels of are as follows-
education is likely to be all the more significant in • Information technology
making didactic outcomes relevant to the labour market, • Information and communication technology
in revolutionizing educational pleased and release, and • Evolution of information technology
in encouragement “information literacy.” • Past of information technology
• Generation of information technology
2. Literature Review
We followed a procedure for a systematic review, 2.4 Quality Assessment
described in review paper 3 (based on the Cochrane For doing quality assessment, the authors did
Handbook for Systematic Reviews of Interventions follow the criteria defined in [c]. The three main
[4]
, the University of York’s Centre for Reviews and issues defined in [6] are as follows-
Dissemination’s guidance for those carrying out or • Rigor-Has a thorough and appropriate approach
commissioning reviews[5], and consultation with software been applied to key research methods in the
engineering specialists on the topic and methods.) This study?
procedure specifies the research questions, inclusion • Credibility- Are the findings well-presented and
and exclusion criteria, quality criteria, data extraction, meaningful?
etc. • Relevance.-How useful are the findings to the
software industry and the research community?
2.1 Data Sources and Data Collection
The data searching strategy included online electronic 2.5 Data Extraction
data searches and manual searches of various national At this final stage, data was extracted from each
and international conference proceedings. In this context, of the study. The data was extracted on the basis of
following online journals databases were searched parameters like the research method used, domain,
• ASQ Digital Library publication etc…The extracted data will be used in
• IEEE Explore several phases of this research work.
• Springer Link and Journals
• Academia.edu 2.6 Data Extracted
• Research Gate While some of these positions will, no doubt, be
• Science Direct –Elsevier filled by overseas providers, a sizeable demand still
In addition we also searched volumes of various exists. Projections from Forester Research suggest
conference proceedings- that the U.S. shortfall will reach more than 6 million
• ICRTES 2013 jobs by 2015. In a survey of the top concerns of IT
• ICRTES 2014 executives in 2006, IT human resources were rated
• CONFLUENCE 2013 the second most important issue 7. As organizations
• ICAET 2014

15
managing information technology

seek new efficiencies and as technology permits the In fig. 1 8, one sees the growth of information
incorporation of alternative sources of human resources, technology services on basis year wise of. In this
new creative staffing options are being added to figure we find that number of people in India is high
the traditional options of recruitment, training, and relative to the people in whole world. Dashed line
temporary contracting 2. shows the growth of IT services in the World and
In the past, the time between introducing and using Solid line shows the growth of IT in India.
new technology was quite long. Today, however, new Figure 2 9, shows the difference between online
technology is used immediately after it is introduced, and categories with the help of percentage in India or
because we are not always sure about the technology’s World.
utility or potential adverse effects, the associated risk Information technology security task forces are
analysis is conducted much later. This is a major reason shown in Table 1. Here we define the forces as on
that many companies face monetary and technical today and tomorrow.
risks. Furthermore, companies that have never used Table 1. IT security task forces
software in their products or operation or developed
products with in-house software are now dependent S. IT Security Task Today Tomorrow
on software. This emerging interconnectedness with No. Force
the software industry is adding to many companies’ 1 Education and Awareness, Certifications
complexity and their vulnerability to intruders and Training SANS
terrorism 13. 2 Policy Acceptable use IT Security Policy
3 Identity ID/Password, Digital
Management Moderate Certificates, High
Assurance Assurance Level
Level
4 Applications, Data Central DBA Data Classification
and DB (database
administrator),
Hosting
5 Physical Security Control, Some Upgrades,
Biometric Entry Networked
Biometrics
6 Desktop Prescriptive Proactive Defense
Guidance
7 Server Secure Central End to end
Servers Security for
Figure 1. Growth of information technology: India Vs world. Services Campus
wide
8 Network Web based Strong
Wireless Authentication,
AuthN, Device Physical Path
Redundancy Redundancy
9 Storage and Tape, SAN Backup to disk
Backups (storage area
network),
NAS (network
attached
storage).
10 Communication Ad hoc Systematic

IT security forces is based on the confidentiality,


integrity and availability. Confidentiality, integrity
and availability are the sources which represent the
security for information.
In the past few decades, mobile wireless technologies
have experienced 4 or 5 generations of technology
revolution and evolution, namely from 0G to 4G.
The cellular concept was introduced in the 1G
technology which made the large scale mobile wireless
communication possible. Digital communication has
Figure 2. Reach of key online categories: India Vs worldwide. replaced the analogy technology in the 2G which

16
Singh et al.: Information Technology : Past, Present and Future

significantly improved the wireless communication 5G- In this generation WWWW (World Wide
quality. Data communication, in addition to the voice Wireless Web) is developed, start from 2015.
communication, has been the main focus in the 3G Techniques of 0G to 5G is shown in Table 2. In
technologies and a converged network for both voice this table we simply show the techniques which is
and data communication is emerging. With continued used in the various generations 10,11,12.
R&D, there are many killer application opportunities Table 2. Techniques used in Generations
for the 4G as well as technological challenges [8].
Generations Techniques
3. Social Networking Sites 0G PTT (Push to Talk), MTS (Mobile Telephone
Social networking sites are very wide in today’s System), IMTS (Improved Mobile Telephone
scenario. In present time the social networking sites Service), AMTS (Advanced Mobile Telephone
are very good for some reasons like these quickly tell System), OLT (Norwegian for Offentlig
about the current news. All friends are close to each Landmobil Telefoni, Public Land Mobile
other through social networking sites like facebook, Telephony) and MTD (Swedish abbreviation
whatsapp, we chat, line, chat, hike, etc. for Mobilelefonisystem D, or Mobile telephony
system D).
4. Information Technology 1G Mobile Telephone System (MTS), Advanced
Infrastructure Library
Mobile Telephone System (AMTS),
Information technology infrastructure library is
Improved Mobile Telephone Service (IMTS), and
also very common in present time. This is used to
Push to Talk (PTT).
capture all the related information regarding IT. In this
we also perform the availability management, service 2G Time Division Multiple Access (TDMA) based
level management, risk management, etc. and Code Division Multiple Access (CDMA).
2.5G Wireless Application Protocol (WAP) access,
5. Past, Present, and Future Multimedia Messaging Service (MMS), WAP,
The past of IT is shown in figures 1 and 2. MMS, SMS mobile games, and search and
In both figures we see that the past of IT in India directory.
versus World. Social networking sites, ITIL, etc are 2.75G EDGE is a superset to GPRS
the parts which show the presence of IT. The future 3G Make use of TDMA and CDMA. Services like
is based on the generation of IT which comes to the mobile television, GPS (global positioning system)
Computer generation.
and video conferencing.
3.5G High-Speed Downlink Packet Access (HSDPA) is
5.1 Generation of IT
a mobile telephony protocol. Adaptive Modulation
The generation of IT starts from the 0G and till
now this is 7G. and Coding (AMC), Multiple-Input Multiple-
0G- This generation is simply based on the wireless Output (MIMO), Hybrid Automatic Request
technology. 0G refers to the pre-call technique of (HARQ), fast cell search, and advanced receiver
mobile phones (1970). design.
1G- In this generation world’s first cellular system 3.75G High Speed Uplink Packet Access (HSUPA) is a
was launched in Saudi Arabia based on the Analog signals UMTS / WCDMA uplink evolution technology.
NMT-450 (Nordic Mobile Telephone) (1981). 4G “MAGIC” also refers to 4G wireless technology
2G- In this generation Digital Cellular system was which stands for Mobile multimedia, Any-where,
launched named as GSM (Global system for mobile Global mobility solutions over, integrated wireless
communication) Service (1991).
and Customized services.
2.5G- In this generation GPRS (General Packet
5G Pervasive networks, Cognitive radio technology
Radio Service) service is launched under the GSM
environment (1997). and Smart antennas.
2.75G- In this generation EDGE (Enhanced Data
rates for GSM Evolution) service is launched under 6. Results, Analysis and Discussion
the GSM environment in 1999. In this paper, we have focused on the trends of
3G- In this generation UMTS (Universal Mobile IT in different areas. In figure 3, we define the trends
Telecommunications System) service was launched of IT related to the different keywords. In this figure
in 2003. we see that computer generation is never used from
4G- In this generation LTE (Long Term Evolution) 2004 to December 2014.
advanced WiMAX was launched.

17
managing information technology

Figure 3. Findings from Google trends through various keywords related to IT: Worldwide.

We also see that in 2004 we used all things computer generation is never used from 2004 to
related to IT is like Information Technology is 96%, December 2014.
Information and Communication Technology is 44%, We also see that in 2004 we used all things
Information Technology Infrastructure Library is 11%, related to IT like Information Technology is 98%,
Computing is 42% and Computer generations is 0%. Information and Communication Technology is 46%,
But in this figure shows the partial data till December Information Technology Infrastructure Library is 15%,
2014 like Information Technology is 33%, Information Computing is 0% and Computer generations is 0%.
and Communication Technology is 20%, Information But this figure shows partial data till December
Technology Infrastructure Library is 10%, Computing 2014 like Information Technology is 8%, Information
is 21% and Computer generations is 0%. This is and Communication Technology is 3%, Information
calculated on the basis of worldwide data. Technology Infrastructure Library is 3%, Computing
In Figure 4, we define the trends of IT related is 12% and Computer generations is 0%. This is
to different keywords. In this figure we see that calculated on the basis of data gathered for India.

Figure 4. Findings from Google Trends through various keywords related to IT: India.

Figure 5. Findings from Google Trends through various keywords related to IT Techniques: Worldwide.

18
Singh et al.: Information Technology : Past, Present and Future

Figure 6. Findings from Google Trends through various keywords related to IT Techniques: India.

Figure 7. Findings from Google Trends through various keywords related to IT with generations: Worldwide.

Figure 5 defines the relationship among techniques 97%, Expert System is 44%, Artificial Intelligence is
used in IT. In this figure we see that in 2004 the 34%, Image Processing is 12% and Neural network is
users used the WWW 16%, Andriod 0%, Smartphone 8%. But we also show the partial data till December
is 5%, Wi-Fi 6% and Bluetooth 10%. But this figure 2014 like Internet access is 55%, Expert System is
shows the partial data till December 2014 like WWW 1%, Artificial Intelligence is 16%, Image Processing
55%, Android 91%, Smartphone 12%, Wi-Fi 24% is 3% and Neural network is 2%. This is calculated
and Bluetooth 11. This figure shows the relation on the basis of data for usage worldwide.
Worldwide.
Figure 6 defines the relationship among techniques 7. Conclusions and Future Scope
used in IT. In this figure we see that in 2004 the In this paper we focus on the past, present and
users used the WWW 8%, Andriod 0%, Smartphone future of Information Technology. We see that the
is 8%, Wi-Fi 3% and Bluetooth 8%. But in this figure relationship of different techniques, different areas are
shows the partial data till December 2014 like WWW related to IT. We also describe the past, present and
87%, Android 82%, Smartphone 12%, Wi-Fi 14% and future on the basis of different analyses Worldwide
Bluetooth 5. This figure shows the relation India. or India wide. Information technology is used in the
In figure 7, we define the trends of IT related world like 33%, but in India it is 8%. Information
to the different generations. We see that in 2004 we technology is the part which gives all the information
used different generations related to IT is like 1G regarding all fields. Information technologies are used
is 1%, 2G is 1%, 3G is 9%, 4G is 1% and 5G is in Television, Telephones, etc. Information Technology
0%. But we also show the partial data till December is used in different research areas.
2014 like 1G is 2%, 2G is 6%, 3G is 40%, 4G is In future we use IT in all the fields related to
41% and 5G is 2%. This is calculated on the basis Image Processing, Neural Networks, etc. In future
of worldwide. Information Technology were play a vital role in all
In Figure 8, we define the trends of IT related fields like medical, generation. 6G and 7G are also
to the different areas. We see that in 2004 we used planned.
different areas related to IT is like Internet access is

19
managing information technology

Figure 8. Findings from Google Trends through various keywords related to different areas of IT: Worldwide.

fu"d"kZ Software Quality Professionals, ASQ, 2013, 15(2),


pp 27-34.
bl vkys[k esa ge lwpuk çkS|ksfxdh ds vrhr] orZeku
7. Luftman, J.; Kempaiah, R. & Nash, E. Key issues
vkSj Hkfo’; ij /;ku dsafær dj jgs gSaA bl vkys[k esa ge for IT executives 2005. MIS Quart. Executive,
ns[krs gSa fd fofHkUu rduhdsa] fofHkUu {ks=] lwpuk çkS|ksfxdh ls 2006, 5(2), pp. 27–45.
lEcfU/kr gSaA ge nqfu;k Hkj ;k Hkkjr Hkj ds fofHkUu fo”ys’k.k ds 8. http://www.yourarticlelibrary.com/industries/
vk/kkj ij Hkh vrhr] orZeku vkSj Hkfo’; dk o.kZu djrs gaSA lwpuk growth-of-information-technology-it-industry-in-
india/19668/
çkS|ksfxdh dk nqfu;k esa 33 çfr”kr bLrseky fd;k tk jgk gS] ysfdu
9. http://www.digitalstrategyconsulting.com/india/2012/05/
Hkkjr esa dsoy 8 çfr”kr gSA ;g vkys[k gesa lwpuk çkS|ksfxdh india_reach_of_key_online_categories.php
ds lHkh {ks=ksa ds ckjs esa tkudkjh nsrk gSA lwpuk çkS|ksfxfd;k¡ dk 10. Sarmistha Mondal, Anindita Sinha & Jayati Routh.
Vsyhfotu] VsyhQksu] esa mi;ksx fd;k tkrk gSA lwpuk çkS|ksfxdh A Survey on Evolution of Wireless Generations
dk fofHkUu vuqla/kku {ks=ksa esa ç;ksx fd;k tkrk gSA 0G to 7G. Int. J. Adv. Res. Sci. Eng. IJARSE,
Hkfo’; esa ge lwpuk çkS|ksfxdh dk best çkslsflax] raf=dk 1(2).
11. Churi, Jay R.; Surendran, T. Sudhish; Tigdi Shreyas
usVodZ] ls lacaf/kr lHkh {ks=ksa esa bLrseky djsaxsA Hkfo’; esa lwpuk Ajay & Yewale, Sanket. Evolutions of network
çkS|ksfxdh fpfdRlk tSls lHkh {ks=ksa esa ,d egRoiw.kZ Hkwfedk (2G-5G). International Conference on Advances
fuHkk,xkA 6oha vkSj 7oha ih<h dh Hkh ;kstuk cukbZ xbZ gSA in Communication and Computing Technologies
(ICACACT) 2012 Proceedings published by Int.
References J. Comput. Applications (IJCA).
1. Sapphire and IBM, Survey on the Demand for IT 12. Bhalla, Mudit Ratana & Bhalla, Anand Vardhan.
Professionals, 2009. Generations of Mobile Wireless Technology: A Survey.
2. Choi, Jae; Nazareth, Derek L. & Jain, Hemant International Journal of Computer Applications
K. Information Technology Skill Management (0975 – 8887), 2010, 5(4).
Strategies for Implementing New Technologies: 13. Longstaff, Thomas A.; Chittister, Clyde; Pethia,
A Case of Service-Oriented Architecture. IEEE Rich & Haimes, Yacov Y. Are We Forgetting the
Transactions on systems, man, and cybernetics—part Risks of Information Technology?. IEEE Dec
a: systems and humans, 2012, 42(4). 2000.
3. Tore Dy ba˚ & Torgeir Din gsøy R. Empirical
studies of agile software development: A systematic
review. Elsevier publications, 2008.
4. Ami, Marowka. Think Parallel: Teaching Parallel
Programming Today. IEEE Distributed Systems Online
9(8), art. no. 0808-mds2008080001, 2008.
5. Khan, K.S.; Riet, G. Ter; Glanville, J.; Sowden,
A.J. & Kleijnen, J. Undertaking Systematic Review
of Research on Effectiveness, CRD’sGuidance for
those Carrying Out or Commissioning Reviews.
CRD Report Number 4, second ed., NHS Centre
for Reviews and Dissemination, University of
York, 2001.
6. Paulk, Mark C. A Scrum Adoption Survey”,

20

View publication stats

You might also like