International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064

Research Paper | Computer Science & Engineering | India | Volume 9 Issue 3, March 2020

Information Technology for India in the New Millennium: Scaling Up the Technology

Dr. Sanjay Arora

The paper describes how Information Technology (with reference to Indian Context) can be harnessed for re- skilling and re-training of the existing work force to make them more productive and use the technology and creativity for better product design w

Keywords: Fire Walls, HTTP, TCP/IP, WAP, XML, PKI, DSL, IT

Edition: Volume 9 Issue 3, March 2020

Pages: 709 - 713


How to Cite this Article?

Dr. Sanjay Arora, "Information Technology for India in the New Millennium: Scaling Up the Technology", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SR20312095206, Volume 9 Issue 3, March 2020, 709 - 713

35 PDF Views | 33 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'HTTP'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1887 - 1991

Analysis of Application Level Traffics and Routing Protocols in Mobile Ad Hoc Network

Rawendra Pratap Singh, Savita Shiwani

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1628 - 1631

A Survey On XML-Injection Attack Detection Systems

Swati Ramesh Kesharwani, Aarti Deshpande

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 239 - 244

The Survey Paper on ASP2P: An Advanced Botnet Based on Social Networks over Hybrid P2P

Saloni Shah, Vina M. Lomte

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 878 - 881

Detection of Malicious Client based HTTP/DoS Attack on Web Server

Dhanya Jayan, Pretty Babu

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2982 - 2984

Protection of Server from Proxy Based HTTP Attacks

Poonam Uttam Patil, Y. V. Chavan

Share this article

Similar Articles with Keyword 'TCP/IP'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1253 - 1257

A Trust System for SCADA Network Using Wireless Sensor Based on Node Behaviors

B.Padmini, N. Chandra Shekar Reddy, Ch. Mukunda Reddy

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2508 - 2514

Lock and Forward Hierarchical Routing Algorithm in MANET

Vikrant Verma, Dr. Manoj Kumar

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2646 - 2649

Improving the Security of SMPP Protocol using TLS

Akash R. Kotecha, H. P. Channe

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 514 - 521

A Comparative Evaluation of OSI and TCP/IP Models

P. Ravali

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1356 - 1359

A Survey of Optimizing the Performance of iSCSI

Shruti Kulkarni, Dr. K. N. Narasimha Murthy

Share this article

Similar Articles with Keyword 'WAP'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1422 - 1426

Incremental CFP-Tree Optimization For Efficient Representative Pattern Set Mining

Vivek Satpute, Prof. Digambar Padulkar

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 1743 - 1745

A Survey Paper on Wireless Transport Layer Security

Parmar Paresh B., Ketan Patel

Share this article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1374 - 1377

Group Formation with Neighbour Similarity Trust in P2P E-Commerce

M. Robin Rutherford, V. Dheepa

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1957 - 1961

A Cloud Service Measure Index Framework to Evaluate Efficient Candidate with Ranked Technology

Shruthi Shirur, Annappa Swamy D. R.

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 12, December 2016

Pages: 578 - 584

Analysis of Various Page Replacement Algorithms in Operating System

Bhagyashree A. Tingare, Vaishali L. Kolhe

Share this article

Similar Articles with Keyword 'XML'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 3021 - 3028

Smart Type-Ahead Search in XML

Supriya. N. Chaudhari, Vaishali M. Deshmukh

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2676 - 2680

Effective and Efficient XML Duplicate Detection Using Levenshtein Distance Algorithm

Shital Gaikwad, Nagaraju Bogiri

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2094 - 2098

An Improved Web Mining Technique to Fetch Web Data Using Apriori and Decision Tree

Rupinder Kaur, Kamaljit Kaur

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2751 - 2756

User-Friendly Keyword Based Search on XML Data

Jeetendra G.Kapase, Sharmila M. Shinde

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1628 - 1631

A Survey On XML-Injection Attack Detection Systems

Swati Ramesh Kesharwani, Aarti Deshpande

Share this article

Similar Articles with Keyword 'PKI'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 3, March 2014

Pages: 597 - 601

A Novel Anonymous and Certificate Less Public Key Infrastructure for MANETs

G. Anandhi, S. K. Srivatsa

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1419 - 1424

Detection of Node Replication Attack in MSN Based On PKI

Hemlata B Kadam, Rahul Kulkarni

Share this article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 1314 - 1316

Pseudonym Generation with Combining the Identity Based and Attribute Based Encryption with Outsourced Revocation in Cloud Computing

Kirti Patil, Sonali Patil

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1709 - 1712

A Business Framework for Securing Data Storage over Cloud Environment using ECC Crypto System

Nara Venkata Surendra Reddy, DLS Reddy

Share this article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 1441 - 1443

A Novel Approach on Multi Factor Authentication

Shivagupta Chandakavathe, Rekha B. S., Sampath Kumar C

Share this article

Similar Articles with Keyword 'DSL'

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1071 - 1074

A Literature Survey on ?Disaster Monitoring & Alarming System for Mountain Foothills?

Pallavi T. Dhotre

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 449 - 451

A Survey on MANETs in Disaster Rescue Operations

C Ramakristanaiah, R. Praveen Sam

Share this article

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 3, March 2020

Pages: 709 - 713

Information Technology for India in the New Millennium: Scaling Up the Technology

Dr. Sanjay Arora

Share this article

Similar Articles with Keyword 'IT'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1789 - 1791

The Survey Paper on Importance of Integration of Knowledge Management and Business Intelligence

Vina Lomte, Saloni Shah

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1884 - 1886

Performance Analysis of Clustal W Algorithm on Linux Cluster

Swati Jasrotia, Salam Din

Share this article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2623 - 2629

Object Detection and Pose Tracking In Augmented Reality

Vipul P.Chauhan, Dr. Manish M. Kayasth

Share this article

Top