{"id":358,"date":"2018-09-22T19:40:38","date_gmt":"2018-09-22T14:10:38","guid":{"rendered":"https:\/\/www.techandtrain.com\/blog\/?p=358"},"modified":"2025-10-22T14:55:34","modified_gmt":"2025-10-22T09:25:34","slug":"history-future-of-information-technology","status":"publish","type":"post","link":"https:\/\/www.techandtrain.com\/blog\/2018\/09\/history-future-of-information-technology\/","title":{"rendered":"History &#038; Future of Information Technology"},"content":{"rendered":"<p>Late 1970s &#8211; Ethernet<\/p>\n<p>Late 1980s &amp; Early 1990s &#8211; Internet<\/p>\n<p>Late 1990s &#8211; Y2K was the trend and revolution of easy operating systems like Windows with word processing and spreadsheets happened. Also, LINUX. ERP, CRM, BPM, HRM and similar software pick up in market.<\/p>\n<p>Early 2000s &#8211; Internet boom, Email, Browsers, Dot Com, Start of E-Commerce, Java, boom in Portals, Scanning solutions, Enterprise Content Management, Search and associated technologies<\/p>\n<p>Post 2011- Shift to Mobiles, GPS, Location tracking, cameras, virtual \/ augmented reality on mobiles and so on. Lot of growth for companies like Google \/ Apple.<\/p>\n<p>Post Mobiles &#8211; Cloud, Machine Learning, Artificial Intelligence, Analytics, IoT, Beacons, Business Intelligence &amp; BigData<\/p>\n<p>2010\/11 onwards &#8211; RPA, SAAS\/PAAS\/IAAS, Facebook, Social Media, Agile, DevOps, Crypto currency, Focus on Internet, Network &amp; Cloud security<\/p>\n<p>Time is now right to have an AI \/ ML based System in Enterprise IT ecosystem that can create and manage systems on it&#8217;s own or at least most of it at Enterprise \/ Technical &amp; Solution Architecture level along with automated creation, deployment and maintenance of software systems using Cloud<\/p>\n<p>Reach out to me at\u00a0<a href=\"http:\/\/mailto:neil@techandtrain.com\/\" target=\"_blank\" rel=\"nofollow noopener\">neil@techandtrain.com<\/a>\u00a0if you want to discuss Data Science \/ R \/ Java \/ etc. or want to conduct a training for MBA \/ BE \/ MCA \/ MSc students or are interested in having a workshop for your managers \/ executives on Data Science \/ R \/ Java \/ AWS \/ Excel \/ etc.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Late 1970s &#8211; Ethernet Late 1980s &amp; Early 1990s &#8211; Internet Late 1990s &#8211; Y2K was the trend and revolution [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":359,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"nf_dc_page":"","site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[24,3,36],"tags":[81,80],"class_list":["post-358","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-internet","category-software","category-trends","tag-future-of-it","tag-history-of-it"],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2018\/09\/Dream.jpg?fit=1920%2C1152&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p7do02-5M","jetpack-related-posts":[{"id":141,"url":"https:\/\/www.techandtrain.com\/blog\/2018\/03\/information-security-tips-while-working-with-digital-sources-and-internet\/","url_meta":{"origin":358,"position":0},"title":"Information security tips while working with digital sources and internet","author":"Neil Harwani","date":"March 30, 2018","format":false,"excerpt":"Setup OTP and recovery emails for all your accounts Check permissions that various apps have on your phone When you get an option - TRUST THIS DEVICE in Gmail or similar accounts, only select this option on your personal devices not public devices Keep your desktop, laptop & mobiles password\u2026","rel":"","context":"In &quot;Cyber Security&quot;","block_context":{"text":"Cyber Security","link":"https:\/\/www.techandtrain.com\/blog\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2018\/03\/Security.png?fit=991%2C720&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2018\/03\/Security.png?fit=991%2C720&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2018\/03\/Security.png?fit=991%2C720&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2018\/03\/Security.png?fit=991%2C720&ssl=1&resize=700%2C400 2x"},"classes":[]},{"id":12,"url":"https:\/\/www.techandtrain.com\/blog\/2015\/08\/mobile-sensors-with-iot-world\/","url_meta":{"origin":358,"position":1},"title":"Mobile  &#038; Sensors in IoT world","author":"Neil Harwani","date":"August 3, 2015","format":false,"excerpt":"In this world of IOT, iBeacons, Eddystone, Mobiles with 3+ GB RAM, light\/gesture control sensors, GPS, accelerometer, compass and quad\/octa core processors with cameras an upgrade for all of this would be to have sensors like: 1. Temperature, 2. Movement\/motion, 3. Smell, 4. Pollution, etc. onto the mobiles and then\u2026","rel":"","context":"In &quot;Disaster relief&quot;","block_context":{"text":"Disaster relief","link":"https:\/\/www.techandtrain.com\/blog\/category\/disaster-relief\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2015\/08\/Mobility.jpg?fit=1200%2C800&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2015\/08\/Mobility.jpg?fit=1200%2C800&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2015\/08\/Mobility.jpg?fit=1200%2C800&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2015\/08\/Mobility.jpg?fit=1200%2C800&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2015\/08\/Mobility.jpg?fit=1200%2C800&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":44,"url":"https:\/\/www.techandtrain.com\/blog\/2015\/11\/software-innovation-around-physical-profile-of-a-person\/","url_meta":{"origin":358,"position":2},"title":"Software innovation around physical profile of a person","author":"Neil Harwani","date":"November 18, 2015","format":false,"excerpt":"With so many IoT, mobile, computer, industrial, etc. sensors around us and the number only increasing on daily basis there could be innovative things we could do to solve some of the big problems we face today. There are law and order problems around missing people, criminals, fugitives, finding people\u2026","rel":"","context":"In &quot;Disaster relief&quot;","block_context":{"text":"Disaster relief","link":"https:\/\/www.techandtrain.com\/blog\/category\/disaster-relief\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2015\/11\/Profile.png?fit=1200%2C675&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2015\/11\/Profile.png?fit=1200%2C675&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2015\/11\/Profile.png?fit=1200%2C675&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2015\/11\/Profile.png?fit=1200%2C675&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2015\/11\/Profile.png?fit=1200%2C675&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":458,"url":"https:\/\/www.techandtrain.com\/blog\/2019\/06\/my-journey-on-social-media-internet\/","url_meta":{"origin":358,"position":3},"title":"My journey on Social Media &#038; Internet","author":"Neil Harwani","date":"June 6, 2019","format":false,"excerpt":"Internet is the greatest enabler of work and education in human history as per me and the opportunities it opens up in terms of what we can study, learn and work on are amazing. My suggestion to all youngsters in school, college and who recently have started their career in\u2026","rel":"","context":"In &quot;Internet&quot;","block_context":{"text":"Internet","link":"https:\/\/www.techandtrain.com\/blog\/category\/internet\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2019\/06\/Human-Observer-1.jpg?fit=960%2C503&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2019\/06\/Human-Observer-1.jpg?fit=960%2C503&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2019\/06\/Human-Observer-1.jpg?fit=960%2C503&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2019\/06\/Human-Observer-1.jpg?fit=960%2C503&ssl=1&resize=700%2C400 2x"},"classes":[]},{"id":131,"url":"https:\/\/www.techandtrain.com\/blog\/2017\/11\/bpm-business-process-management-and-trends\/","url_meta":{"origin":358,"position":4},"title":"BPM (Business Process Management) and trends","author":"Neil Harwani","date":"November 6, 2017","format":false,"excerpt":"Business process management from 1990s \/ 2000s in simplest terms is a set of activities (automated or manual) with breaks for events and interactions with external systems \/ human beings along with notifications \/ rules \/ filters \/ etc. Traditional BPM \/ Workflows included manual and automated tasks, integrations (mainly\u2026","rel":"","context":"In &quot;Enterprise Content Management&quot;","block_context":{"text":"Enterprise Content Management","link":"https:\/\/www.techandtrain.com\/blog\/category\/enterprise-content-management\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2017\/11\/BPM.jpg?fit=1080%2C720&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2017\/11\/BPM.jpg?fit=1080%2C720&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2017\/11\/BPM.jpg?fit=1080%2C720&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2017\/11\/BPM.jpg?fit=1080%2C720&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2017\/11\/BPM.jpg?fit=1080%2C720&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":1213,"url":"https:\/\/www.techandtrain.com\/blog\/2024\/02\/notes-on-telecom-mobile-network-technologies-enterprise-software-for-telecom-networks-generated-by-chatgpt\/","url_meta":{"origin":358,"position":5},"title":"Notes on Telecom &amp; Mobile Network Technologies &amp; Enterprise Software for Telecom Networks &#8211; Generated by ChatGPT","author":"Neil Harwani","date":"February 4, 2024","format":false,"excerpt":"Modern telecommunications networks employ a wide range of protocols and technologies to provide seamless and efficient communication services. These technologies encompass everything from basic infrastructure to advanced networking protocols, ensuring connectivity across diverse platforms and devices. Here's an overview of some of the major protocols and technologies used in modern\u2026","rel":"","context":"In &quot;Computer Network&quot;","block_context":{"text":"Computer Network","link":"https:\/\/www.techandtrain.com\/blog\/category\/computer-network\/"},"img":{"alt_text":"Credits: www.Pixabay.com","src":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2024\/02\/Antenna.jpg?fit=1200%2C900&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2024\/02\/Antenna.jpg?fit=1200%2C900&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2024\/02\/Antenna.jpg?fit=1200%2C900&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2024\/02\/Antenna.jpg?fit=1200%2C900&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2024\/02\/Antenna.jpg?fit=1200%2C900&ssl=1&resize=1050%2C600 3x"},"classes":[]}],"jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/posts\/358","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/comments?post=358"}],"version-history":[{"count":3,"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/posts\/358\/revisions"}],"predecessor-version":[{"id":362,"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/posts\/358\/revisions\/362"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/media\/359"}],"wp:attachment":[{"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/media?parent=358"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/categories?post=358"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/tags?post=358"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}