SlideShare ist ein Scribd-Unternehmen logo
1 von 16
INFORMATION
TECHNOLOGIES
USED IN
“SWORDFISH”
By – Kevin Joseph
MBA (Energy Trading)
500026236
Plot :
 Swordfish is a 2001 American thriller film

starring John Travolta, Hugh Jackman, Halle
Berry.
 The film centers around Stanley Jobson, an

ex-con computer hacker who is targeted for
recruitment into a bank robbery conspiracy
because of his formidable hacking skills.
Multiscreen systems
 It is the use of multiple

physical display devices, such
as monitors, televisions, and
projectors, in order to
increase the area available for
computer programs running
on a single computer system.

 The system can be run by a

single CPU or multiple CPUs

 Multi-head may increase the

productivity by up to 40-50%.
Super Computers


A supercomputer is a computer which
increases processing capacityparticularly speed of calculation.

These systems work in two ways :
 In one approach is a large number of
computers distributed across a
network devote some or all of their
time to solving a common problem
each individual computer receives and
completes many small
tasks, reporting the results to a
central server which integrates the
task results into the overall solution.
 In another approach, a large number
of dedicated processors are placed in
close proximity to each other; this
saves considerable time moving data
around and makes it possible for the
processors to work together, for
example in mesh architectures.

Cray Titan – 17.59 PetaFLOPS
Supercomputers are used
for a wide range of
computationally
intensive tasks in various
fields.
 Quantum mechanics.
 Weather forecasting
 Climate research
 Oil and gas exploration
 Molecular modeling
 Aerodynamics
 Counter-cryptography.

NUDT Tianha – 33.86 PetaFLOPS
Radio dog collar
 Used for tracking
 Works on radio waves
of particular frequency
 Has to be in Line of
sight
 Can be used as a

communication means
also.
Servers
 A server is a system that

responds to requests across a
computer network to provide a
network service.

 Servers are computer

programs running to serve the
requests of other
programs, the clients.
Thus, the server performs
some task on behalf of clients.

 Servers can be run on a

dedicated computer, which is
also often referred to as "the
server", but many networked
computers are capable of
hosting servers.

Typical computing servers are
• Database server
• File server
• Mail server
• Print server
• Web server
• Gaming server, etc.
Internet
 It is a global system of

interconnected computer
networks that use the
standard Internet protocol
suite (TCP/IP) to serve several
billion users worldwide.

 It is a network of networks
 Consists of millions of

private, public, academic, bus
iness, and government
networks, of local to global
scope, that are linked by a
broad array of
electronic, wireless and
optical networking
technologies.
Ciphering technology
 Cryptography
 Encoding and
Decoding of
Information
 Military
 Banks
 Educational
sectors(Exams)
Computer worms
 A worm is designed to

tunnel into your system
and allow malicious users
to control your computer
remotely.

 Does not require an

action to spread

 Can make multiple copies

of itself. (E-mail)

 Slows down computers n

networks significantly.
Transatlantic Telecommunication Cable
 A transatlantic
telecommunications
cable is a submarine
communications
cable running under

the Atlantic Ocean.
 All modern cables

use fiber
optic technology.
 Most such cables

connect London, Englan
d to New York City, USA

 Built mainly for high-

speed requirements of
international financial
transactions.

 Financial trading firms

spend billions of dollars
annually to get an edge
on trading
THANK YOU

Weitere ähnliche Inhalte

Was ist angesagt?

Chapter 4 computer networks
Chapter 4   computer networksChapter 4   computer networks
Chapter 4 computer networks
Pratik Gupta
 
Types of network
Types of networkTypes of network
Types of network
99111
 
Arpanet
ArpanetArpanet
Arpanet
smithz
 

Was ist angesagt? (20)

Understanding Computer
Understanding ComputerUnderstanding Computer
Understanding Computer
 
Computer networking
Computer networkingComputer networking
Computer networking
 
types of networks
types of networkstypes of networks
types of networks
 
Lan and wan
Lan and wanLan and wan
Lan and wan
 
Computer Applications - The Basic Computer Networking
Computer Applications - The Basic Computer NetworkingComputer Applications - The Basic Computer Networking
Computer Applications - The Basic Computer Networking
 
Chapter 4 computer networks
Chapter 4   computer networksChapter 4   computer networks
Chapter 4 computer networks
 
Introduction to computer networks & it’s usage
Introduction to computer networks & it’s usageIntroduction to computer networks & it’s usage
Introduction to computer networks & it’s usage
 
Computer network note
Computer network noteComputer network note
Computer network note
 
File & Printer Sharing
File & Printer SharingFile & Printer Sharing
File & Printer Sharing
 
File sharing technlogies
File sharing technlogiesFile sharing technlogies
File sharing technlogies
 
Itc lec 11 Network , Uses , Types
Itc lec 11 Network , Uses , Types                                  Itc lec 11 Network , Uses , Types
Itc lec 11 Network , Uses , Types
 
Network and it's Uses
Network and it's UsesNetwork and it's Uses
Network and it's Uses
 
Communication
CommunicationCommunication
Communication
 
What is a computer network
What is a computer networkWhat is a computer network
What is a computer network
 
Types of network
Types of networkTypes of network
Types of network
 
NETWORK,INTERNET & WWW ppt
NETWORK,INTERNET & WWW pptNETWORK,INTERNET & WWW ppt
NETWORK,INTERNET & WWW ppt
 
Designing A LAN WAN MAN Sollution
Designing A LAN WAN MAN SollutionDesigning A LAN WAN MAN Sollution
Designing A LAN WAN MAN Sollution
 
FUNDAMENTAL OF NETWORK
FUNDAMENTAL OF NETWORKFUNDAMENTAL OF NETWORK
FUNDAMENTAL OF NETWORK
 
Arpanet
ArpanetArpanet
Arpanet
 
PROFESSIONAL SLIDES
PROFESSIONAL SLIDESPROFESSIONAL SLIDES
PROFESSIONAL SLIDES
 

Ähnlich wie Information technologies used in “swordfish”

L25 network fundamentals
L25   network fundamentalsL25   network fundamentals
L25 network fundamentals
heidirobison
 
1. What is IT infrastructure and what are its components2.What ar.pdf
1. What is IT infrastructure and what are its components2.What ar.pdf1. What is IT infrastructure and what are its components2.What ar.pdf
1. What is IT infrastructure and what are its components2.What ar.pdf
expressionnoveltiesk
 
Connecting Hardware Peripherals Level 1 Ver 2 - Copy.pdf
Connecting Hardware Peripherals Level 1 Ver 2 - Copy.pdfConnecting Hardware Peripherals Level 1 Ver 2 - Copy.pdf
Connecting Hardware Peripherals Level 1 Ver 2 - Copy.pdf
EYOHAICTMEDIA
 

Ähnlich wie Information technologies used in “swordfish” (20)

Notes for banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationxNotes for  banking railway opsc psc preparationx
Notes for banking railway opsc psc preparationx
 
Modules1
Modules1Modules1
Modules1
 
L25 network fundamentals
L25   network fundamentalsL25   network fundamentals
L25 network fundamentals
 
1. What is IT infrastructure and what are its components2.What ar.pdf
1. What is IT infrastructure and what are its components2.What ar.pdf1. What is IT infrastructure and what are its components2.What ar.pdf
1. What is IT infrastructure and what are its components2.What ar.pdf
 
Komputasi Awan
Komputasi AwanKomputasi Awan
Komputasi Awan
 
top LLB university in Delhi NCR.pdf
top LLB university in Delhi NCR.pdftop LLB university in Delhi NCR.pdf
top LLB university in Delhi NCR.pdf
 
Computer
ComputerComputer
Computer
 
1.intro. to distributed system
1.intro. to distributed system1.intro. to distributed system
1.intro. to distributed system
 
Knowledge on IT Infrastructure
Knowledge on IT InfrastructureKnowledge on IT Infrastructure
Knowledge on IT Infrastructure
 
Distributed Computing system
Distributed Computing system Distributed Computing system
Distributed Computing system
 
COMPUTER NETWORK.pptx
COMPUTER NETWORK.pptxCOMPUTER NETWORK.pptx
COMPUTER NETWORK.pptx
 
Presentation-1.ppt
Presentation-1.pptPresentation-1.ppt
Presentation-1.ppt
 
2_Virtualization.pptx
2_Virtualization.pptx2_Virtualization.pptx
2_Virtualization.pptx
 
00 - BigData-Chapter_01-PDC.pdf
00 - BigData-Chapter_01-PDC.pdf00 - BigData-Chapter_01-PDC.pdf
00 - BigData-Chapter_01-PDC.pdf
 
CloudComputing_UNIT1.pdf
CloudComputing_UNIT1.pdfCloudComputing_UNIT1.pdf
CloudComputing_UNIT1.pdf
 
CloudComputing_UNIT1.pdf
CloudComputing_UNIT1.pdfCloudComputing_UNIT1.pdf
CloudComputing_UNIT1.pdf
 
Computer Networking Theory Assignment 1
Computer Networking Theory Assignment 1Computer Networking Theory Assignment 1
Computer Networking Theory Assignment 1
 
Connecting Hardware Peripherals Level 1 Ver 2 - Copy.pdf
Connecting Hardware Peripherals Level 1 Ver 2 - Copy.pdfConnecting Hardware Peripherals Level 1 Ver 2 - Copy.pdf
Connecting Hardware Peripherals Level 1 Ver 2 - Copy.pdf
 
Internet.pdf
Internet.pdfInternet.pdf
Internet.pdf
 
10 New Web Application and Security.pptx
10 New Web Application and Security.pptx10 New Web Application and Security.pptx
10 New Web Application and Security.pptx
 

Mehr von Kevin Philip Joseph

The role of information technologies & information system in business
The role of information technologies & information system in businessThe role of information technologies & information system in business
The role of information technologies & information system in business
Kevin Philip Joseph
 
Ship terminologies – organizations & chartering
Ship terminologies – organizations & charteringShip terminologies – organizations & chartering
Ship terminologies – organizations & chartering
Kevin Philip Joseph
 
Information systems used in barista briggo
Information systems used in barista   briggoInformation systems used in barista   briggo
Information systems used in barista briggo
Kevin Philip Joseph
 
Competing information systems used in emirates
Competing information systems used in emiratesCompeting information systems used in emirates
Competing information systems used in emirates
Kevin Philip Joseph
 
Causes and consequences of managerial failure in rapidly changing organizations
Causes and consequences of managerial failure in rapidly changing organizations Causes and consequences of managerial failure in rapidly changing organizations
Causes and consequences of managerial failure in rapidly changing organizations
Kevin Philip Joseph
 
Storage devices in computer systems
Storage devices in computer systemsStorage devices in computer systems
Storage devices in computer systems
Kevin Philip Joseph
 

Mehr von Kevin Philip Joseph (10)

The role of information technologies & information system in business
The role of information technologies & information system in businessThe role of information technologies & information system in business
The role of information technologies & information system in business
 
Solar energy
Solar energySolar energy
Solar energy
 
Shipping terminologies
Shipping terminologiesShipping terminologies
Shipping terminologies
 
Ship terminologies – organizations & chartering
Ship terminologies – organizations & charteringShip terminologies – organizations & chartering
Ship terminologies – organizations & chartering
 
Opec to affect future
Opec to affect futureOpec to affect future
Opec to affect future
 
Maritime - Practitioners
Maritime - PractitionersMaritime - Practitioners
Maritime - Practitioners
 
Information systems used in barista briggo
Information systems used in barista   briggoInformation systems used in barista   briggo
Information systems used in barista briggo
 
Competing information systems used in emirates
Competing information systems used in emiratesCompeting information systems used in emirates
Competing information systems used in emirates
 
Causes and consequences of managerial failure in rapidly changing organizations
Causes and consequences of managerial failure in rapidly changing organizations Causes and consequences of managerial failure in rapidly changing organizations
Causes and consequences of managerial failure in rapidly changing organizations
 
Storage devices in computer systems
Storage devices in computer systemsStorage devices in computer systems
Storage devices in computer systems
 

Kürzlich hochgeladen

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Kürzlich hochgeladen (20)

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 

Information technologies used in “swordfish”

  • 1. INFORMATION TECHNOLOGIES USED IN “SWORDFISH” By – Kevin Joseph MBA (Energy Trading) 500026236
  • 2. Plot :  Swordfish is a 2001 American thriller film starring John Travolta, Hugh Jackman, Halle Berry.  The film centers around Stanley Jobson, an ex-con computer hacker who is targeted for recruitment into a bank robbery conspiracy because of his formidable hacking skills.
  • 3.
  • 4. Multiscreen systems  It is the use of multiple physical display devices, such as monitors, televisions, and projectors, in order to increase the area available for computer programs running on a single computer system.  The system can be run by a single CPU or multiple CPUs  Multi-head may increase the productivity by up to 40-50%.
  • 5. Super Computers  A supercomputer is a computer which increases processing capacityparticularly speed of calculation. These systems work in two ways :  In one approach is a large number of computers distributed across a network devote some or all of their time to solving a common problem each individual computer receives and completes many small tasks, reporting the results to a central server which integrates the task results into the overall solution.  In another approach, a large number of dedicated processors are placed in close proximity to each other; this saves considerable time moving data around and makes it possible for the processors to work together, for example in mesh architectures. Cray Titan – 17.59 PetaFLOPS
  • 6. Supercomputers are used for a wide range of computationally intensive tasks in various fields.  Quantum mechanics.  Weather forecasting  Climate research  Oil and gas exploration  Molecular modeling  Aerodynamics  Counter-cryptography. NUDT Tianha – 33.86 PetaFLOPS
  • 7. Radio dog collar  Used for tracking  Works on radio waves of particular frequency  Has to be in Line of sight  Can be used as a communication means also.
  • 8. Servers  A server is a system that responds to requests across a computer network to provide a network service.  Servers are computer programs running to serve the requests of other programs, the clients. Thus, the server performs some task on behalf of clients.  Servers can be run on a dedicated computer, which is also often referred to as "the server", but many networked computers are capable of hosting servers. Typical computing servers are • Database server • File server • Mail server • Print server • Web server • Gaming server, etc.
  • 9. Internet  It is a global system of interconnected computer networks that use the standard Internet protocol suite (TCP/IP) to serve several billion users worldwide.  It is a network of networks  Consists of millions of private, public, academic, bus iness, and government networks, of local to global scope, that are linked by a broad array of electronic, wireless and optical networking technologies.
  • 10.
  • 11. Ciphering technology  Cryptography  Encoding and Decoding of Information  Military  Banks  Educational sectors(Exams)
  • 12. Computer worms  A worm is designed to tunnel into your system and allow malicious users to control your computer remotely.  Does not require an action to spread  Can make multiple copies of itself. (E-mail)  Slows down computers n networks significantly.
  • 13. Transatlantic Telecommunication Cable  A transatlantic telecommunications cable is a submarine communications cable running under the Atlantic Ocean.  All modern cables use fiber optic technology.
  • 14.  Most such cables connect London, Englan d to New York City, USA  Built mainly for high- speed requirements of international financial transactions.  Financial trading firms spend billions of dollars annually to get an edge on trading
  • 15.