Trajectory Of Zoom Calls & Google Meet In Pandemic
’Ping’ - you receive a WhatsApp notification, ‘ tomorrow meeting at 3 pm’. The meeting link gets shared within 30 minutes and you start brushing up on your presentation that is supposed to be appearing on a screen-share, in front of 10 more people. The system (lifestyle) has gone through a series of unprecedented changes by the sudden and shockingly sustaining blow of coronavirus. The changes cascaded very easily into our lives are showing no sign of returning to the previous normal. With the system of life, the system of work had to be renewed on a different level, where the laptop or desktop screen is your only mode to work. No car, no bus, no metro, no bike to work, only your device.
Zoom calls are not just for work but also online classes, it is all that they can depend upon when the globe is tucked inside a blanket of uncertainty. But everyone has to find a way to work-from-home and earn their daily bread and butter and revive the economy from a state of paralysis.
Amidst the pandemic, the demand for video conferencing has increased drastically and the calls went up to 1,000% in March. Microsoft said in a statement that the proportion of meetings and calls that included video ballooned to 43% from 21% over March.
Many IT companies have already announced their preference for remote working after acknowledging its cost-efficiency, and besides, learning new tools and various online courses have experienced rapid growth.
As the market widens with what seems a perpetually increased demand, more competitors join the race, creating challenges for Zoom and hence requiring a shift in the trajectory of facilities and upgrading its security. As there have been several reports of hijacking meetings and leakage of confidential information or meeting details.
As the security flaws get fixed from their side, let us ‘zoom in’ a few applications that get slipped into the developing process of Zoom Calls, Google Meet etc..
There is a strong usage of cryptography here, which comes from probability and extensive calculations. To cipher your usernames and passwords data structures and algorithms are used which is again based on linear algebra and calculus.
Furthermore, there are a ton of basic math applications involved in the initial developing process.. such as set theory, prime numbers, sieve algorithms etc.
Hence, our work-life might have been disintegrated by several zoom calls or google meet, just like the math applications getting secretly disintegrated in their developing process.