On behalf of the editorial team, I would like to welcome all our readers to the current volume of Exponent Group of Journals – Information Technology. We first share with you some handpicked news articles covering a gamut of topics ranging from technology advancement such as artificial intelligence, neural networks and blockchain to issues related to security and data loss as well as ethical concerns.
Our first article of the series of four articles is related to a technology advancement that is a cornerstone of the fourth industrial revolution. Most of us must already know (and some could have also experienced) the impact that Internet of Things (IoT) will bring about in our daily lives. In order to streamline the effort to connect various devices, Microsoft research team has built an Internet of Things research platform called “Lab of Things (LoT)”. The LoT platform is a flexible platform geared towards connecting home devices and appliances, but with the ability to scale to towns and cities. Application developers usually face a lot of problems when building applications for connected devices as different devices follow different protocols. The LoT platform helps researchers, students and application developers to leverage APIs rather than work with different protocols of the underlying devices. It is this platform that the author expounds in the article titled “LoT (Lab of Things)”. The article illustrates the LoT architecture, the services provided by LoT as well as some of the application of LoT. The article also describes how a platform such as LoT can be leveraged to build smart cities and villages as part of “Digital India” initiative.
Post the LoT article, we move on to the 2nd topic, which is not only related to connected devices but also very prevalent in today’s corporate world – Bring Your Own Device (BYOD). In the earlier days, employees would only use desktops and laptops provided by their companies for their office work. But, with the advent of smart phones and tablets, things started to change. With smart devices, people now had an option to access their work files from any part of the world as long as they had an internet connection. At the same time, corporates also started realizing the need of their employees to work from any place and using any device. This amalgamation resulted in companies allowing employees to bring their own devices to workplace. The article “Bring Your Own Device (BYOD)” explores the beginnings of this concept, the advantages and disadvantages of BYOD, types of BYOD and its usage in different industries and sectors and finally how such a practice can be implemented by a company.
The next article that we look into is the profile of a well-known social media company – Twitter. Who would have thought that a text message 140 characters long would make such a difference in people’s lives? In 2017, Twitter increased the character limit to 280, but for nearly a decade users could share messages (known as tweets) of utmost 140 characters. Hashtag – one of the most well-known words in today’s vocabulary came into effect because of Twitter. Today, hashtags are a common occurrence on all social media and microblogging sites. As per statista.com (https://www.statista.com/statistics/282087/number-of-monthly-active-twitter-users/), there were on an average 335 million monthly active users on twitter as of Q2 (April – June) of 2018. In this article, we explore the technology on which the twitter platform is built, the business model of twitter and how it earns revenue as well as some of the security and privacy issues that it had to face.
In the 4th and final article of this volume, we share with you the career path from a tester to a business analyst. In this article titled “Tester to Business Analyst”, the author first sets the stage by explaining the role of a business analyst and why there is a great scope for a tester in business analysis role. Subsequently, the article delves into the journey of a tester into business analysis role by leveraging and improving both the hard and soft skills required for that role.
We hope that you enjoy this volume of Exponent Group of Journals – Information Technology and wish you happy reading!