Piedad Villavicencio @jeanprodriguezg ESPIONAJE INFORMATICO Y SISTEMA PRISM.
Prism presentation
-
Upload
lakshmi- -
Category
Data & Analytics
-
view
164 -
download
0
Transcript of Prism presentation
![Page 1: Prism presentation](https://reader030.fdocumento.com/reader030/viewer/2022012320/58d14c1f1a28ab41128b492f/html5/thumbnails/1.jpg)
PRISM Informatics
We Drive
![Page 2: Prism presentation](https://reader030.fdocumento.com/reader030/viewer/2022012320/58d14c1f1a28ab41128b492f/html5/thumbnails/2.jpg)
Devisions• SAP HANA • Hardware• Predictive Analytics• Mobile Application• Cyber Security
![Page 3: Prism presentation](https://reader030.fdocumento.com/reader030/viewer/2022012320/58d14c1f1a28ab41128b492f/html5/thumbnails/3.jpg)
SAP HANA
1. License Sale2. Implementation Support3. Application Support
![Page 4: Prism presentation](https://reader030.fdocumento.com/reader030/viewer/2022012320/58d14c1f1a28ab41128b492f/html5/thumbnails/4.jpg)
SAP HANA
• HANA stands for High Performance Analytic Appliance
• Let us see one by one what is High Performance, Analytic and Appliance separately
![Page 5: Prism presentation](https://reader030.fdocumento.com/reader030/viewer/2022012320/58d14c1f1a28ab41128b492f/html5/thumbnails/5.jpg)
SAP HANA
High Performance• High performance is achieved by moving
the Data Base from slow Hard Disk to fast RAM memory
• High Performance is achieved by changing the table structure from row to columns for faster search
![Page 6: Prism presentation](https://reader030.fdocumento.com/reader030/viewer/2022012320/58d14c1f1a28ab41128b492f/html5/thumbnails/6.jpg)
SAP HANA
Analytics• OLAP is an acronym for Online Analytical
Processing. OLAP performs multidimensional analysis of business data and provides the capability for complex calculations, trend analysis, and sophisticated data modeling.
![Page 7: Prism presentation](https://reader030.fdocumento.com/reader030/viewer/2022012320/58d14c1f1a28ab41128b492f/html5/thumbnails/7.jpg)
SAP HANA
Online Transaction Processing
• OLTP is a class of software programs capable of supporting transaction-oriented applications on the Internet. Typically, OLTP systems are used for order entry, financial transactions, customer relationship management (CRM) and retail sales.
![Page 8: Prism presentation](https://reader030.fdocumento.com/reader030/viewer/2022012320/58d14c1f1a28ab41128b492f/html5/thumbnails/8.jpg)
SAP HANA
Appliance• SAP HANA is available with pre-
configured servers, with all software, securities and industry best practice reports and dash boards. This reduces the implementation time from months to weeks
![Page 9: Prism presentation](https://reader030.fdocumento.com/reader030/viewer/2022012320/58d14c1f1a28ab41128b492f/html5/thumbnails/9.jpg)
SAP HANA
• All the reports and dash boards can be viewed on personal devices like Smart phones and tabs on the go.
• Real time reports can be viewed and decisions can be taken on the spot
• No more waiting for any critical reports
![Page 10: Prism presentation](https://reader030.fdocumento.com/reader030/viewer/2022012320/58d14c1f1a28ab41128b492f/html5/thumbnails/10.jpg)
Hardware
• Servers• Data Centre• Back up Servers• Disaster Recovery• Cloud Solution• Network • Firewall • Cloud Security• Routers•
![Page 11: Prism presentation](https://reader030.fdocumento.com/reader030/viewer/2022012320/58d14c1f1a28ab41128b492f/html5/thumbnails/11.jpg)
Hardware
•Office Access Control•Big Data Security•Video Surveillance•
![Page 12: Prism presentation](https://reader030.fdocumento.com/reader030/viewer/2022012320/58d14c1f1a28ab41128b492f/html5/thumbnails/12.jpg)
Cyber Security
• Information is Power• Power is Money• So information is stolen to make quick
money or create damages• So it becomes necessary to protect our
data • Here comes our Cyber Security division •
![Page 13: Prism presentation](https://reader030.fdocumento.com/reader030/viewer/2022012320/58d14c1f1a28ab41128b492f/html5/thumbnails/13.jpg)
Cyber Security
• Computer security is critical in almost any industry which uses computers. Currently, most electronic devices such as computers, laptops and cellphones come with built in firewall security software, but despite this, computers are not 100 percent secure and dependable to protect our data – Wikipedia
••
![Page 14: Prism presentation](https://reader030.fdocumento.com/reader030/viewer/2022012320/58d14c1f1a28ab41128b492f/html5/thumbnails/14.jpg)
Cyber Security
• There are many different ways of hacking into computers. It can be done through a network system, clicking into unknown links, connecting to unfamiliar Wi-Fi, downloading software and files from unsafe sites, electromagnetic radiation waves, and many more – Wikipedia
• .•
![Page 15: Prism presentation](https://reader030.fdocumento.com/reader030/viewer/2022012320/58d14c1f1a28ab41128b492f/html5/thumbnails/15.jpg)
Cyber Security
• However, computers can be protected through well built software and hardware, by having strong internal interactions of properties, software complexity and prevent software crash and security failure - Wikipedia
![Page 16: Prism presentation](https://reader030.fdocumento.com/reader030/viewer/2022012320/58d14c1f1a28ab41128b492f/html5/thumbnails/16.jpg)
Cyber Security• Red Team Consulting• Application Security• Security Operation Center• Testing and Validation – FIPS 140-2• Threat Analytics and Predictive Modeling• Cyber Forensic and e-Discovery• Cyber Security Culture Building• Cyber Security Capacity Building• Industrial Control System and SCADA
Security
![Page 17: Prism presentation](https://reader030.fdocumento.com/reader030/viewer/2022012320/58d14c1f1a28ab41128b492f/html5/thumbnails/17.jpg)
Predictive Analytics
• Predictive analytic is an upcoming technology which processes historical data and gives a lot of insights, understanding and guides us towards future course of action in all the aspects of enterprise
![Page 18: Prism presentation](https://reader030.fdocumento.com/reader030/viewer/2022012320/58d14c1f1a28ab41128b492f/html5/thumbnails/18.jpg)
Predictive Analytic
Predictive analytic encompasses a variety of statistical techniques from predictive
modeling, machine learning, and data mining that analyze current and historical facts to make predictions about future or otherwise
unknown events
![Page 19: Prism presentation](https://reader030.fdocumento.com/reader030/viewer/2022012320/58d14c1f1a28ab41128b492f/html5/thumbnails/19.jpg)
Predictive Analytic
• In business, predictive models exploit patterns found in historical and
transactional data to identify risks and opportunities. Models capture relationships among many factors to allow assessment
of risk or potential associated with a particular set of conditions, guiding decision
making for candidate transactions
![Page 20: Prism presentation](https://reader030.fdocumento.com/reader030/viewer/2022012320/58d14c1f1a28ab41128b492f/html5/thumbnails/20.jpg)
Predictive Analytic
• Predictive analytics is used in actuarial science, marketing, financial services, insurance, telecommunications, retail, travel, healthcare, child protection, pharmaceuticals, capacity planning
• and other fields.
![Page 21: Prism presentation](https://reader030.fdocumento.com/reader030/viewer/2022012320/58d14c1f1a28ab41128b492f/html5/thumbnails/21.jpg)
Predictive Analytics
• One of the best-known applications is credit scoring, which is used throughout financial services. Scoring models process a customer's credit history, loan application, customer data, etc., in order to rank-order individuals by their likelihood of making future credit payments on time.
![Page 22: Prism presentation](https://reader030.fdocumento.com/reader030/viewer/2022012320/58d14c1f1a28ab41128b492f/html5/thumbnails/22.jpg)
Predictive Analytic
• In future industrial systems, the value of predictive analytics will be to predict and prevent potential issues to achieve near-zero break-down and further be integrated into prescriptive analytics for decision optimization. Furthermore, the converted data can be used for closed-loop product life cycle improvement which is the vision of the Industrial Internet Consortium.
![Page 23: Prism presentation](https://reader030.fdocumento.com/reader030/viewer/2022012320/58d14c1f1a28ab41128b492f/html5/thumbnails/23.jpg)
Mobile Application
• Mobile devices have become part of parcel of human life. We use them in day to day environment for communication, entertainment and in profession too. So customers look for new application to suit their personal and profession requirement. We develop such apps in all platforms