Information Technology – Volume 5 – Issue 3


On behalf of the editorial team of Exponent Group of Journals – Information Technology, I would like to welcome all our readers to our 3rd volume of this year (and 5th year overall). In this volume, our focus has been to provide deeper understanding on some of the core topics that have been initiated in the previous volumes.We start this volume by sharing some of the latest and interesting news and trends in the I.T. sector, for example news related to 5G network spectrum, augmented reality (AR), Google I/O 2017, etc. After this primer, we move on to a topic endeared by most IT professionals that is Jobs Opportunity in “IT” in India. The article gives a brief background of the current situation in the job market and the skills and personality traits necessary for aspiring individuals. The article also mentions about the current roles in IT industry and caps it off by highlighting the future of IT industry.

The next two articles are related to one of the biggest I.T. companies and giants in the ERP world which is SAP. The first of the 2 articles “Company Profile – SAP Part 2” is a continuation of the company profile series and covers SAP’s product and series portfolio in different market categories such as applications, analytics, mobile, database and technology and cloud. The second of the 2 articles is an introductory article about SAP ISU (Industry Service Utilities), a sales and information system that supports business processes of companies in the utilities industry. The article touches upon the integration of IS-U with SAP’s core R/3 technology, modules of SAP ISU as well as workflows and processes.

Following the SAP related articles we continue our journey into intricacies of computer networks and security. In the first of the 2 articles “Computer Networks Part 5”, we explore the checksum error detection in detail. Error detection, as we have seen in the articles in previous volumes, enables reliable delivery of digital data over unreliable communication channels. Here, “checksum”is transmitted along with every block of data and is used to detect errors in the data. In this article, we also explore Cyclic Redundancy Check (CRC), its intricate working and its advantages.




Leave a Reply

Your email address will not be published. Required fields are marked *