Vous êtes sur la page 1sur 7

Bilingual International Conference on Information Technology: Yesterday, Toady, and Tomorrow, 19-21 Feburary 2015, pp.

14-20
DESIDOC, 2015

lwpuk ks|ksfxdh % vrhr] orZeku vkSj Hkfo;


Information Technology : Past, Present and Future
Sadhana Singh*, Ashish Agrawal, and Manvi Mishra
SRMS CET, Bareilly, India
*

E-mail:ssadhana2008@gmail.com

lkjkak
lwpuk kS|ksfxdh vkbZVh ,d ,slh kS|ksfxdh gSa tks dEi;wVj }kjk lwpuk dks bdk djuk] laLdj.k djuk]
Hk.Mkju djuk vkSj tkudkjh nsuk gSA ge ,d yack jkLrk vlk/kkj.k le; esa r; djds ok;jysl ds bfrgkl esa
igqp x;s gSA fiNys ;qx esa ok;jysl kS|ksfxfd;ksa esa Hkkjh o`f) ntZ dh xbZ gSA vkbZVh dk fodkl daI;wVj dh
ih<+h ij vk/kkfjr gS] tksfd 0 ih<h ls ikapoh ih<h rd igqp x;k gSaA lwpuk kS|ksfxd us ,dhr ms; ^nkZu
vkSj dk;Zdqkyrk* dks iwjk djus ds fy, fofHkUu fodkloknh ekxksaZ dk ikyu fd;k gSA lwpuk kS|ksfxdh lwpuk
ds fofHkUu :i dks nkkZrk gSa ftudk fofHkUu ms;ksa tSls lEesyuksa] vuqla/kku vkSj vfM;ks] ohfM;ks] pSV vkfn ds
fy, gksrk gSA ;g vkys[k vkbZVh ds vrhr] orZeku vkSj Hkfo; dks ij[krk gSA ;g vkys[k lwpuk kS|ksfxdh ds
vrhr ls kq: djrk gSA bl vkys[k esa lwpuk kS|ksfxdh ds fodkl vkSj fodkl e dks nkkZrs gSaA ;g lwpuk
vkSj lapkj kS|ksfxdh vkbZlhVh ls lacaf/kr gSA lwpuk kS|ksfxdh nqfu;k esa orZeku krkCnh esa vU; rduhdksa dh
rqyuk esa rsth ls c<us okyh kS|ksfxdh gSaA
AbsTrAcT
Information technology (IT) is the technology which uses the computer to gather, process, store and
precede information. A long way in an extraordinarily undersized time has been reached in the history
of wireless. Over the past era, wireless technologies have undergone massive growth. Evolution of IT
is based on the generation about the computer, reached its about 0G to 5G. Looking past, Information
technologies have followed different evolutionary routes targeted to uniied objective: performance and
eficiency. IT represent different form of information used for different purpose like, conferences, research,
and video, audio, chats, etc. This paper examines the past, present and future of IT. This paper begins
with the past of the information technology. In this paper we also show the evolution and development
of Information technology. It is related to the information and communication technology (ICT). IT
extends around the world faster than most other technologies in current centuries.
Keywords: Information technology, information and communication technology, generations of computer,
social networking sites, information technology infrastructure library (ITIL)

1.

InTroducTIon
Information Technology is study of skills. Modern
world is characterized by rapid growth and development
of information technology (IT) resulting in more
dependence of the society, in a wider sense, on the
individual knowledge and competence of a person in
the IT area. Although this addiction grows on day after
day basis, the human right to education and information
is not extended to IT area. IT has great potential to
improve excellence, quality, efficiency and effectiveness.
Supervision IT, human resources present a demanding
task for executives. As organizations jumble up between
positions involving in-house employment, to agile
employment, and to outsourced support for IT, the need
to efficiently obtain, supervise and raise appropriate
IT human resources assumes greater significance. The

need to develop, maintain, operate, support a portfolio


of information systems never disappears. The past
decade has seen the regular appearance of information
technology as a new computing discipline in educational
institutions. In the past, the time between introducing
and using new technologies was somewhat long.
The introduction of new Information technologies
alters the parameters of the staffing decisions constantly.
Despite economic down streams, down turns and
downsizing trends, the demand for new IT professionals
is expected to grow over the coming years [1][2].
The introduction of new IT in organizations makes
the staffing dilemma more demanding, given the lack
of acquaintance with the expertise, the education
curve connected with its incorporation, the qualified
scarcity of experienced human resources. With hurried

SInGh et al.: InformATIon TeChnologY : PAsT, PresenT And fuTure

development of IT and further deepening of information


production, more and more enterprises have realized
the tactical value of IT and made great reserves in it.
however, during IT implementation procedure, decisionmaking, conversion degree, and IT performance is
often substandard to the expectation. IT has became
full-fledged quickly and gratitude to a tremendously
dynamic and tight-knit academic group of people,
undergone an evolution unlike any other computing
regulation.
Information and Communication Technology including
issues related to reliability, usability, performance
and trust. ICT has the potential to connection the
information gap in terms of civilizing excellence
of education, increasing the magnitude of quality
educational opportunities, making knowledge building
probable through borderless and unlimited accessibility
to resources and people, and getting populations in
inaccessible areas to satisfy their basic right to education.
As various ICTs become increasingly reasonable,
reachable, and interactive, their role at all levels of
education is likely to be all the more significant in
making didactic outcomes relevant to the labour market,
in revolutionizing educational pleased and release, and
in encouragement information literacy.

2.

LITerATure revIew
We followed a procedure for a systematic review,
described in review paper 3 (based on the Cochrane
handbook for systematic reviews of Interventions
[4]
, the university of Yorks Centre for reviews and
Disseminations guidance for those carrying out or
commissioning reviews[5], and consultation with software
engineering specialists on the topic and methods.) This
procedure specifies the research questions, inclusion
and exclusion criteria, quality criteria, data extraction,
etc.
2.1 data sources and data collection
The data searching strategy included online electronic
data searches and manual searches of various national
and international conference proceedings. In this context,
following online journals databases were searched

AsQ digital library

Ieee explore

springer link and Journals

Academia.edu

research gate

science direct elsevier


In addition we also searched volumes of various
conference proceedings
ICrTes 2013

ICrTes 2014

ConfluenCe 2013

ICAeT 2014

ACsITeeT 2014
ICACeA 2014
ICrTC 2013
sACTA 2014
sAVoIr mAnTrnA 2014
IC3 2013

2.2 Acceptance and rejection criteria


The studies which presented quality data on
Information Technology or Information and Communication
Technology were accepted. Some very old studies were
rejected if they were not up to the mark. The authors
main focus was to accept qualitative and quantitative
methods based research studies.
2.3 search strategy
For searching research papers, we used Google
search engine and MSn search engine. For this
activity, we made some combinations from the area
of information technology. Some of those combinations
are as follows
Information technology

Information and communication technology

evolution of information technology

Past of information technology

generation of information technology


2.4 Quality Assessment
For doing quality assessment, the authors did
follow the criteria defined in [c]. The three main
issues defined in [6] are as follows
Rigor-has a thorough and appropriate approach
been applied to key research methods in the
study?

Credibility- Are the findings well-presented and


meaningful?

Relevance.-how useful are the findings to the


software industry and the research community?
2.5 data extraction
At this final stage, data was extracted from each
of the study. The data was extracted on the basis of
parameters like the research method used, domain,
publication etcThe extracted data will be used in
several phases of this research work.
2.6 data extracted
While some of these positions will, no doubt, be
filled by overseas providers, a sizeable demand still
exists. Projections from forester research suggest
that the u.s. shortfall will reach more than 6 million
jobs by 2015. In a survey of the top concerns of IT
executives in 2006, IT human resources were rated
the second most important issue 7. As organizations
15

mAnAgIng InformATIon TeChnologY

seek new efficiencies and as technology permits the


incorporation of alternative sources of human resources,
new creative staffing options are being added to
the traditional options of recruitment, training, and
temporary contracting 2.
In the past, the time between introducing and using
new technology was quite long. Today, however, new
technology is used immediately after it is introduced, and
because we are not always sure about the technologys
utility or potential adverse effects, the associated risk
analysis is conducted much later. This is a major reason
that many companies face monetary and technical
risks. Furthermore, companies that have never used
software in their products or operation or developed
products with in-house software are now dependent
on software. This emerging interconnectedness with
the software industry is adding to many companies
complexity and their vulnerability to intruders and
terrorism 13.

In fig. 1 8, one sees the growth of information


technology services on basis year wise of. In this
figure we find that number of people in India is high
relative to the people in whole world. Dashed line
shows the growth of IT services in the World and
Solid line shows the growth of IT in India.
Figure 2 9, shows the difference between online
categories with the help of percentage in India or
World.
Information technology security task forces are
shown in Table 1. here we define the forces as on
today and tomorrow.
Table 1. IT security task forces
s.
no.

IT security Task
Force

Today

Tomorrow

Education and
Training

Awareness,
SAnS

Certiications

Policy

Acceptable use

IT security Policy

Identity
Management

Id/Password,
Moderate
Assurance
Level

Digital
Certiicates, high
Assurance Level

Applications, Data
and DB

Central DBA
(database
administrator),
hosting

data Classiication

Physical security

Control, Some
upgrades,
Biometric Entry networked
Biometrics

Desktop

Prescriptive
Guidance

Proactive defense

Server

Secure Central
Servers

End to end
Security for
Services Campus
wide

network

Web based
Wireless
Authn, Device
redundancy

Strong
Authentication,
Physical Path
redundancy

Storage and
Backups

Tape, SAn
(storage area
network),
nAS (network
attached
storage).

Backup to disk

10

Communication

Ad hoc

Systematic

Figure 1. Growth of information technology: India vs world.

Figure 2. reach of key online categories: India vs worldwide.

16

IT security forces is based on the confidentiality,


integrity and availability. Confidentiality, integrity
and availability are the sources which represent the
security for information.
In the past few decades, mobile wireless technologies
have experienced 4 or 5 generations of technology
revolution and evolution, namely from 0G to 4G.
The cellular concept was introduced in the 1G
technology which made the large scale mobile wireless
communication possible. Digital communication has
replaced the analogy technology in the 2G which

SInGh et al.: InformATIon TeChnologY : PAsT, PresenT And fuTure

significantly improved the wireless communication


quality. Data communication, in addition to the voice
communication, has been the main focus in the 3G
technologies and a converged network for both voice
and data communication is emerging. With continued
r&d, there are many killer application opportunities
for the 4G as well as technological challenges [8].

5G- In this generation WWWW (World Wide


Wireless Web) is developed, start from 2015.
Techniques of 0G to 5G is shown in Table 2. In
this table we simply show the techniques which is
used in the various generations 10,11,12.
Table 2. Techniques used in Generations
Generations Techniques

3.

socIAL neTworKInG sITes


Social networking sites are very wide in todays
scenario. In present time the social networking sites
are very good for some reasons like these quickly tell
about the current news. All friends are close to each
other through social networking sites like facebook,
whatsapp, we chat, line, chat, hike, etc.

4.

InFormATIon TechnoLoGy
InFrAsTrucTure LIbrAry
Information technology infrastructure library is
also very common in present time. This is used to
capture all the related information regarding IT. In this
we also perform the availability management, service
level management, risk management, etc.
PAsT, PresenT, And FuTure
The past of IT is shown in figures 1 and 2.
In both figures we see that the past of IT in India
versus World. Social networking sites, ITIL, etc are
the parts which show the presence of IT. The future
is based on the generation of IT which comes to the
Computer generation.

0G

PTT (Push to Talk), mTs (mobile Telephone


System), IMTS (Improved Mobile Telephone
Service), AMTS (Advanced Mobile Telephone
System), OLT (norwegian for Offentlig
landmobil Telefoni, Public land mobile
Telephony) and MTD (Swedish abbreviation
for Mobilelefonisystem D, or Mobile telephony
system D).

1G

Mobile Telephone System (MTS), Advanced


Mobile Telephone System (AMTS),
Improved Mobile Telephone Service (IMTS), and
Push to Talk (PTT).

2G

Time Division Multiple Access (TDMA) based


and Code Division Multiple Access (CDMA).

2.5G

Wireless Application Protocol (WAP) access,


multimedia messaging service (mms), WAP,
MMS, SMS mobile games, and search and
directory.

5.

5.1 Generation of IT
The generation of IT starts from the 0G and till
now this is 7G.
0G- This generation is simply based on the wireless
technology. 0G refers to the pre-call technique of
mobile phones (1970).
1G- In this generation worlds first cellular system
was launched in Saudi Arabia based on the Analog signals
nMT-450 (nordic Mobile Telephone) (1981).
2G- In this generation Digital Cellular system was
launched named as GSM (Global system for mobile
communication) Service (1991).
2.5g- In this generation gPrs (general Packet
radio service) service is launched under the gsm
environment (1997).
2.75G- In this generation EDGE (Enhanced Data
rates for GSM Evolution) service is launched under
the GSM environment in 1999.
3g- In this generation umTs (universal mobile
Telecommunications System) service was launched
in 2003.
4G- In this generation LTE (Long Term Evolution)
advanced WiMAX was launched.

2.75G

edge is a superset to gPrs

3G

Make use of TDMA and CDMA. Services like


mobile television, gPs (global positioning system)
and video conferencing.

3.5G

high-speed downlink Packet Access (hsdPA) is


a mobile telephony protocol. Adaptive Modulation
and Coding (AMC), Multiple-Input Multipleoutput (mImo), hybrid Automatic request
(hArQ), fast cell search, and advanced receiver
design.

3.75G

high speed uplink Packet Access (hsuPA) is a


umTs / WCdmA uplink evolution technology.

4G

MAGIC also refers to 4G wireless technology


which stands for Mobile multimedia, Any-where,
Global mobility solutions over, integrated wireless
and Customized services.

5G

Pervasive networks, Cognitive radio technology


and Smart antennas.

6.

resuLTs, AnALysIs And dIscussIon


In this paper, we have focused on the trends of
IT in different areas. In figure 3, we define the trends
of IT related to the different keywords. In this figure
we see that computer generation is never used from
2004 to December 2014.

17

mAnAgIng InformATIon TeChnologY

Figure 3. Findings from Google trends through various keywords related to IT: worldwide.

We also see that in 2004 we used all things


related to IT is like Information Technology is 96%,
Information and Communication Technology is 44%,
Information Technology Infrastructure Library is 11%,
Computing is 42% and Computer generations is 0%.
But in this figure shows the partial data till December
2014 like Information Technology is 33%, Information
and Communication Technology is 20%, Information
Technology Infrastructure Library is 10%, Computing
is 21% and Computer generations is 0%. This is
calculated on the basis of worldwide data.
In Figure 4, we define the trends of IT related
to different keywords. In this figure we see that

computer generation is never used from 2004 to


December 2014.
We also see that in 2004 we used all things
related to IT like Information Technology is 98%,
Information and Communication Technology is 46%,
Information Technology Infrastructure Library is 15%,
Computing is 0% and Computer generations is 0%.
But this figure shows partial data till December
2014 like Information Technology is 8%, Information
and Communication Technology is 3%, Information
Technology Infrastructure Library is 3%, Computing
is 12% and Computer generations is 0%. This is
calculated on the basis of data gathered for India.

Figure 4. Findings from Google Trends through various keywords related to IT: India.

Figure 5. Findings from Google Trends through various keywords related to IT Techniques: worldwide.

18

SInGh et al.: InformATIon TeChnologY : PAsT, PresenT And fuTure

Figure 6. Findings from Google Trends through various keywords related to IT Techniques: India.

Figure 7. Findings from Google Trends through various keywords related to IT with generations: worldwide.

Figure 5 defines the relationship among techniques


used in IT. In this figure we see that in 2004 the
users used the WWW 16%, Andriod 0%, Smartphone
is 5%, Wi-Fi 6% and Bluetooth 10%. But this figure
shows the partial data till December 2014 like WWW
55%, Android 91%, Smartphone 12%, Wi-Fi 24%
and Bluetooth 11. This figure shows the relation
Worldwide.
Figure 6 defines the relationship among techniques
used in IT. In this figure we see that in 2004 the
users used the WWW 8%, Andriod 0%, Smartphone
is 8%, Wi-Fi 3% and Bluetooth 8%. But in this figure
shows the partial data till December 2014 like WWW
87%, Android 82%, Smartphone 12%, Wi-Fi 14% and
Bluetooth 5. This figure shows the relation India.
In figure 7, we define the trends of IT related
to the different generations. We see that in 2004 we
used different generations related to IT is like 1G
is 1%, 2G is 1%, 3G is 9%, 4G is 1% and 5G is
0%. But we also show the partial data till December
2014 like 1G is 2%, 2G is 6%, 3G is 40%, 4G is
41% and 5G is 2%. This is calculated on the basis
of worldwide.
In Figure 8, we define the trends of IT related
to the different areas. We see that in 2004 we used
different areas related to IT is like Internet access is

97%, Expert System is 44%, Artificial Intelligence is


34%, Image Processing is 12% and neural network is
8%. But we also show the partial data till December
2014 like Internet access is 55%, Expert System is
1%, Artificial Intelligence is 16%, Image Processing
is 3% and neural network is 2%. This is calculated
on the basis of data for usage worldwide.

7.

concLusIons And FuTure scoPe


In this paper we focus on the past, present and
future of Information Technology. We see that the
relationship of different techniques, different areas are
related to IT. We also describe the past, present and
future on the basis of different analyses Worldwide
or India wide. Information technology is used in the
world like 33%, but in India it is 8%. Information
technology is the part which gives all the information
regarding all fields. Information technologies are used
in Television, Telephones, etc. Information Technology
is used in different research areas.
In future we use IT in all the fields related to
Image Processing, neural networks, etc. In future
Information Technology were play a vital role in all
fields like medical, generation. 6G and 7G are also
planned.

19

mAnAgIng InformATIon TeChnologY

Figure 8. Findings from Google Trends through various keywords related to different areas of IT: worldwide.

fu"d"kZ
bl vkys[k esa ge lwpuk kS|ksfxdh ds vrhr] orZeku
vkSj Hkfo; ij /;ku dsafr dj jgs gSaA bl vkys[k esa ge
ns[krs gSa fd fofHkUu rduhdsa] fofHkUu {ks=] lwpuk kS|ksfxdh ls
lEcfU/kr gSaA ge nqfu;k Hkj ;k Hkkjr Hkj ds fofHkUu foysk.k ds
vk/kkj ij Hkh vrhr] orZeku vkSj Hkfo; dk o.kZu djrs gaSA lwpuk
kS|ksfxdh dk nqfu;k esa 33 frkr bLrseky fd;k tk jgk gS] ysfdu
Hkkjr esa dsoy 8 frkr gSA ;g vkys[k gesa lwpuk kS|ksfxdh
ds lHkh {ks=ksa ds ckjs esa tkudkjh nsrk gSA lwpuk kS|ksfxfd;k dk
Vsyhfotu] VsyhQksu] esa mi;ksx fd;k tkrk gSA lwpuk kS|ksfxdh
dk fofHkUu vuqla/kku {ks=ksa esa ;ksx fd;k tkrk gSA
Hkfo; esa ge lwpuk kS|ksfxdh dk best kslsflax] raf=dk
usVodZ] ls lacaf/kr lHkh {ks=ksa esa bLrseky djsaxsA Hkfo; esa lwpuk
kS|ksfxdh fpfdRlk tSls lHkh {ks=ksa esa ,d egRoiw.kZ Hkwfedk
fuHkk,xkA 6oha vkSj 7oha ih<h dh Hkh ;kstuk cukbZ xbZ gSA
reFerences
1. Sapphire and IBM, Survey on the Demand for IT
Professionals, 2009.
2. Choi, Jae; nazareth, derek l. & Jain, hemant
K. Information Technology Skill Management
strategies for Implementing new Technologies:
A Case of Service-Oriented Architecture. IEEE
Transactions on systems, man, and cyberneticspart
a: systems and humans, 2012, 42(4).
3. Tore dy ba & Torgeir din gsy r. empirical
studies of agile software development: A systematic
review. Elsevier publications, 2008.
4. Ami, marowka. Think Parallel: Teaching Parallel
Programming Today. Ieee distributed systems online
9(8), art. no. 0808-mds2008080001, 2008.
5. Khan, K.s.; riet, g. Ter; glanville, J.; sowden,
A.J. & Kleijnen, J. undertaking systematic review
of research on effectiveness, Crdsguidance for
those Carrying out or Commissioning reviews.
Crd report number 4, second ed., nhs Centre
for reviews and dissemination, university of
York, 2001.
6. Paulk, mark C. A scrum Adoption survey,
20

7.
8.
9.
10.

11.

12.

13.

software Quality Professionals, AsQ, 2013, 15(2),


pp 27-34.
luftman, J.; Kempaiah, r. & nash, e. Key issues
for IT executives 2005. mIs Quart. executive,
2006, 5(2), pp. 2745.
http://www.yourarticlelibrary.com/industries/
growth-of-information-technology-it-industry-inindia/19668/
http://www.digitalstrategyconsulting.com/india/2012/05/
india_reach_of_key_online_categories.php
sarmistha mondal, Anindita sinha & Jayati routh.
A Survey on Evolution of Wireless Generations
0G to 7G. Int. J. Adv. Res. Sci. Eng. IJArse,
1(2).
Churi, Jay r.; surendran, T. sudhish; Tigdi shreyas
Ajay & Yewale, sanket. evolutions of network
(2G-5G). International Conference on Advances
in Communication and Computing Technologies
(ICACACT) 2012 Proceedings published by Int.
J. Comput. Applications (IJCA).
Bhalla, mudit ratana & Bhalla, Anand Vardhan.
generations of mobile Wireless Technology: A survey.
International Journal of Computer Applications
(0975 8887), 2010, 5(4).
longstaff, Thomas A.; Chittister, Clyde; Pethia,
rich & haimes, Yacov Y. Are We forgetting the
risks of Information Technology?. Ieee dec
2000.

Vous aimerez peut-être aussi