SlideShare ist ein Scribd-Unternehmen logo
1 von 3
Downloaden Sie, um offline zu lesen
Which Specialization Would You Prefer in Your B. Tech.?
Any of us who went for a B. Tech. in Computer Science and Engineering faced this
dilemma. We decide about pursuing B. Tech. after 10+2 with computer science as
the main subject but get confused about which specialization to choose. We have
ample number of options to go with. Whether we should opt for cloud computing
and virtualization technology, oil and gas informatics or cyber security and forensics?
Make a Choice for Admission in 2016
It is easier to make a choice if we at least know something about them. If the concept
is clear, choices become much easier and simpler. The question has come to haunt us
again as the admission in B. Tech. 2016 has opened. There would be students
flocking the admission section with their marks and contemplating about the best
career option for them. It all depends upon the marks scored at the 10+2 level and
the weightage given by the entrance test results as well as personal interview or
orientation.
Cloud Computing and Virtualization
Let us step-by-step go through each of them to get a clearer picture about these
specializations offered for engineering aspirants at the undergraduate level. If we
talk about B. Tech. in Computer Science with specialization in cloud computing and
virtualization technology, we get to learn that this program explains the cloud
phenomenon. It includes the key technologies involved, the cloud history and its
roots in Utility Computing and Service Oriented Architecture keeping with the
changing models.
Oil and Gas Informatics
Moving to computer science with B. Tech. in Oil and Gas Informatics, we find that it
basically deals with the concerned domain itself along with its entire value chain. The
value chain covers exploration, refining, petrochemicals, reservoir and production
engineering as well as the supply chain. Students learn about the whole value chain
along with the significant computer science, engineering concepts like database,
networks, application development, business intelligence, security, open standards
and data warehousing. After completing this course, aspirants are ready to serve in
the oil and gas production and marketing companies with thorough domain
knowledge and computing skills acquired over the four year duration.
Cyber Security and Forensics
Such future professionals are absorbed in the industry to carry out the data analysis
and handling work for the entire value chain. Last but not the least, computer
science with B. Tech. in Cyber Security offers a study of cyber forensics. Cyber
forensics is a part of digital forensic science that deals with the legal evidence in
digital storage media and cyberspace. As the demand for cyber experts has shot up
suddenly due to internet explosion, the area of e-banking, e-commerce, social media
and e-governance has grown considerably.
Also, our critical installations are vulnerable to attacks, making us face threats from
cyber-terrorism. This has given rise to the requirement of around five lakh
professionals in the information security market. Therefore, the universities have
started introducing this subject in their curriculum to meet the rising talent demand.
Article Reference - http://www.sooperarticles.com/careers-articles/career-management-
articles/specialization-would-you-prefer-your-b-tech-1472727.html

Weitere ähnliche Inhalte

Andere mochten auch

Andere mochten auch (9)

T.I.C.
T.I.C.T.I.C.
T.I.C.
 
Concepto de funcion
Concepto de funcionConcepto de funcion
Concepto de funcion
 
Seguridad Social Responsable
Seguridad Social ResponsableSeguridad Social Responsable
Seguridad Social Responsable
 
AMBIENTES DE APRENDIZAJE VIRTUALES
AMBIENTES DE APRENDIZAJE VIRTUALESAMBIENTES DE APRENDIZAJE VIRTUALES
AMBIENTES DE APRENDIZAJE VIRTUALES
 
Formato asignatura
Formato asignaturaFormato asignatura
Formato asignatura
 
Bcp
BcpBcp
Bcp
 
Vectores en el plano cartesiano
Vectores en el plano cartesianoVectores en el plano cartesiano
Vectores en el plano cartesiano
 
Estimular la memoria 1
Estimular la memoria   1Estimular la memoria   1
Estimular la memoria 1
 
บทที่ 2 นามศัพท์
บทที่ 2 นามศัพท์บทที่ 2 นามศัพท์
บทที่ 2 นามศัพท์
 

Kürzlich hochgeladen

What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catcherssdickerson1
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
Comparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization TechniquesComparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization Techniquesugginaramesh
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
computer application and construction management
computer application and construction managementcomputer application and construction management
computer application and construction managementMariconPadriquez1
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHC Sai Kiran
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitterShivangiSharma879191
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 

Kürzlich hochgeladen (20)

What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
Comparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization TechniquesComparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization Techniques
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
computer application and construction management
computer application and construction managementcomputer application and construction management
computer application and construction management
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 

Which specialisation would you prefer in your btech

  • 1. Which Specialization Would You Prefer in Your B. Tech.? Any of us who went for a B. Tech. in Computer Science and Engineering faced this dilemma. We decide about pursuing B. Tech. after 10+2 with computer science as the main subject but get confused about which specialization to choose. We have ample number of options to go with. Whether we should opt for cloud computing and virtualization technology, oil and gas informatics or cyber security and forensics? Make a Choice for Admission in 2016 It is easier to make a choice if we at least know something about them. If the concept is clear, choices become much easier and simpler. The question has come to haunt us again as the admission in B. Tech. 2016 has opened. There would be students flocking the admission section with their marks and contemplating about the best career option for them. It all depends upon the marks scored at the 10+2 level and the weightage given by the entrance test results as well as personal interview or orientation. Cloud Computing and Virtualization Let us step-by-step go through each of them to get a clearer picture about these specializations offered for engineering aspirants at the undergraduate level. If we talk about B. Tech. in Computer Science with specialization in cloud computing and virtualization technology, we get to learn that this program explains the cloud
  • 2. phenomenon. It includes the key technologies involved, the cloud history and its roots in Utility Computing and Service Oriented Architecture keeping with the changing models. Oil and Gas Informatics Moving to computer science with B. Tech. in Oil and Gas Informatics, we find that it basically deals with the concerned domain itself along with its entire value chain. The value chain covers exploration, refining, petrochemicals, reservoir and production engineering as well as the supply chain. Students learn about the whole value chain along with the significant computer science, engineering concepts like database, networks, application development, business intelligence, security, open standards and data warehousing. After completing this course, aspirants are ready to serve in the oil and gas production and marketing companies with thorough domain knowledge and computing skills acquired over the four year duration.
  • 3. Cyber Security and Forensics Such future professionals are absorbed in the industry to carry out the data analysis and handling work for the entire value chain. Last but not the least, computer science with B. Tech. in Cyber Security offers a study of cyber forensics. Cyber forensics is a part of digital forensic science that deals with the legal evidence in digital storage media and cyberspace. As the demand for cyber experts has shot up suddenly due to internet explosion, the area of e-banking, e-commerce, social media and e-governance has grown considerably. Also, our critical installations are vulnerable to attacks, making us face threats from cyber-terrorism. This has given rise to the requirement of around five lakh professionals in the information security market. Therefore, the universities have started introducing this subject in their curriculum to meet the rising talent demand. Article Reference - http://www.sooperarticles.com/careers-articles/career-management- articles/specialization-would-you-prefer-your-b-tech-1472727.html