Article Looking Back: Alan Turing- The Father of Computer Science

` 50/ISSN 0970-647X | Volume No. 36 | Issue No. 10 | January 2013
Cover Story
Web 2.0: New Collaborative
Tools for Business Excellence 5
Article
Looking Back: Alan
Turing- The Father of
Computer Science 8
Article
The Online Identity
Crisis 10
www.csi-india.org
Article
Genesis of
Aakash 2 21
Security Corner
Information Security »
Can You Keep Your Emails
Secret?
Lawfully?
| January26
CSI
Communications
2013 | A
TM
Join The Open Group Events
How does Enterprise Architecture
(EA) Transform an Enterprise?
Mumbai
February 18-19, 2013
New Delhi
February 21-22, 2013
Industry Verticals & Topics
Learn what organizations in these industry verticals are doing to stay progressive and relevant:
‡ Banking, Financial Services, Insurance
‡ Retail/Manufacturing
‡ Telecom, Media, and Entertainment
‡ Travel, Tourism, and Hospitality
‡ Government
Topics include: Enterprise Architecture, TOGAF®, ArchiMate®, Cybersceurity, Security Architecture,
Cloud, Big Data, Professional Development.
At these events, you will learn:
‡ About business solutions, best practices, case studies, and current trends
‡ How EA facilitates Enterprise Transformation within IT
‡ How EA can create a foundation for Enterprise Transformation which business managers can
understand and use to their advantage
‡ How EA can help the enterprise successfully adapt to “disruptive technologies” like Cloud
Computing and ubiquitous mobile access
‡ About transformation management principles – making the whole process more a matter of
design than chance
Visit the event web sites for further details
and to register:
www.opengroup.org/mumbai2013
www.opengroup.org/newdelhi2013
Use promotion code YMMOVA for
preferential rates to attend these events.
Leading the development of open,
YHQGRUQHXWUDO,7VWDQGDUGVDQGFHUWL¿FDWLRQV
CSI Communications
Contents
Volume No. 36 • Issue No. 10 • January 2013
Editorial Board
Chief Editor
Dr. R M Sonar
5
Cover Story
Web 2.0: New Collaborative
Tools for Business Excellence
Dr. Sudhanshu Joshi and
Dr. Manu Sharma
Editors
Dr. Debasish Jana
Dr. Achuthsankar Nair
Resident Editor
Mrs. Jayshree Dhere
Published by
Executive Secretary
Mr. Suchit Gogwekar
For Computer Society of India
Design, Print and
Dispatch by
CyberMedia Services Limited
Please note:
CSI Communications is published by Computer
Society of India, a non-profit organization.
Views and opinions expressed in the CSI
Communications are those of individual authors,
contributors and advertisers and they may
differ from policies and official statements of
CSI. These should not be construed as legal or
professional advice. The CSI, the publisher, the
editors and the contributors are not responsible
for any decisions taken by readers on the basis of
these views and opinions.
Although every care is being taken to ensure
genuineness of the writings in this publication,
CSI Communications does not attest to the
originality of the respective authors’ content.
© 2012 CSI. All rights reserved.
Instructors are permitted to photocopy isolated
articles for non-commercial classroom use
without fee. For any other copying, reprint or
republication, permission must be obtained
in writing from the Society. Copying for other
than personal use or internal reference, or of
articles or columns not owned by the Society
without explicit permission of the Society or the
copyright owner is strictly prohibited.
8
Articles
Looking Back: Alan TuringThe Father of Computer Science
Vivek Kulkarni
10
16
The Online Identity Crisis
Viraat Kothare
18
Making Big Data Work to
Solve Big Problems
Suryateja Tadigadapa
21
What Do You Need to Know to Be a
Cybersecurity Professional?
Avinash Kadam
Genesis of Aakash 2
Kannan M Moudgalya &
D B Phatak and
N K Sinha & Pradeep Varma
Practitioner Workbench
24
Programming.Tips() »
Fun with ‘C’ Programs
25
Programming.Learn (“Python”) »
‘Regular Expression’ of Python
26
Information Security »
Can You Keep Your Emails
Secret? Lawfully?
Wallace Jacob
Umesh P
Security Corner
Adv. Prashant Mali
27
IT Act 2000 »
Prof. IT Law in Conversation with
Mr. IT Executive – How policies,
implementation mechanisms, and
training bridge the gap between the
law and technology Issue No. 10
Mr. Subramaniam Vutha
28
HR
Job Satisfaction: What Is It?
Dr. Manish Godse
PLUS
IT.Yesterday(): CSI – The Early Days
30
Sarwottam Thakur
Brain Teaser
32
Dr. Debasish Jana
Ask an Expert
33
Dr. Debasish Jana
Happenings@ICT: ICT News Briefs in December 2012
34
H R Mohan
On the Shelf! Book Review »
35
Mrs Jayshree A Dhere
CSI Report
36
R K Bagga
CSI Report
Ranga Rajagopal
37
CSI News
41
Published by Suchit Gogwekar for Computer Society of India at Unit No. 3, 4th Floor, Samruddhi Venture Park, MIDC, Andheri (E), Mumbai-400 093.
Tel. : 022-2926 1700 • Fax : 022-2830 2133 • Email : [email protected] Printed at GP Offset Pvt. Ltd., Mumbai 400 059.
CSI Communications | January 2013 | 1
Know Your CSI
Executive Committee (2012-13/14)
»
President
Mr. Satish Babu
[email protected]
Vice-President
Prof. S V Raghavan
[email protected]
Hon. Treasurer
Mr. V L Mehta
[email protected]
Immd. Past President
Mr. M D Agrawal
[email protected]
Hon. Secretary
Mr. S Ramanathan
[email protected]
Nomination Committee (2012-2013)
Dr. D D Sarma
Mr. Bipin V Mehta
Mr. Subimal Kundu
Region - I
Mr. R K Vyas
Delhi, Punjab, Haryana, Himachal
Pradesh, Jammu & Kashmir,
Uttar Pradesh, Uttaranchal and
other areas in Northern India.
[email protected]
Region - II
Prof. Dipti Prasad Mukherjee
Assam, Bihar, West Bengal,
North Eastern States
and other areas in
East & North East India
[email protected]
Region - III
Mr. Anil Srivastava
Gujarat, Madhya Pradesh,
Rajasthan and other areas
in Western India
[email protected]
Region - IV
Mr. Sanjeev Kumar
Jharkhand, Chattisgarh,
Orissa and other areas in
Central & South
Eastern India
[email protected]
Region - V
Prof. D B V Sarma
Karnataka and Andhra Pradesh
[email protected]
Region - VI
Mr. C G Sahasrabudhe
Maharashtra and Goa
[email protected]
Region - VII
Mr. Ramasamy S
Tamil Nadu, Pondicherry,
Andaman and Nicobar,
Kerala, Lakshadweep
[email protected]
Region - VIII
Mr. Pramit Makoday
International Members
[email protected]
Regional Vice-Presidents
Division Chairpersons, National Student Coordinator & Publication Committee Chairman
Division-I : Hardware (2011-13)
Dr. C R Chakravarthy
[email protected]
Division-II : Software (2012-14)
Dr. T V Gopal
[email protected]
Division-IV : Communications
(2012-14)
Mr. Sanjay Mohapatra
[email protected]
Division-V : Education and Research
(2011-13)
Prof. R P Soni
[email protected]
Division-III : Applications (2011-13)
Dr. Debesh Das
[email protected]
National Student Coordinator
Mr. Ranga Raj Gopal
Publication Committee
Chairman
Prof. R K Shyamsundar
Important links on CSI website »
Structure & Organisation
National, Regional &
State Students Coordinators
Statutory Committees
Collaborations
Join Now Renew Membership
Member Eligibility
Member Benefits
Subscription Fees
Forms Download
BABA Scheme
Publications
CSI Communications*
Adhyayan*
R & D Projects
Technical Papers
Tutorials
Course Curriculum
Training Program
(CSI Education Products)
eNewsletter*
Current Issue
Archives
Policy Guidelines
Events
President’s Desk
http://www.csi-india.org/web/csi/structure
http://www.csi-india.org/web/csi/structure/nsc
http://www.csi-india.org/web/csi/statutory-committees
http://www.csi-india.org/web/csi/collaborations
http://www.csi-india.org/web/csi/join
http://www.csi-india.org/web/csi/renew
http://www.csi-india.org/web/csi/eligibility
http://www.csi-india.org/web/csi/benifits
http://www.csi-india.org/web/csi/subscription-fees
http://www.csi-india.org/web/csi/forms-download
http://www.csi-india.org/web/csi/baba-scheme
http://www.csi-india.org/web/csi/publications
http://www.csi-india.org/web/csi/info-center/communications
http://www.csi-india.org/web/csi/adhyayan
http://csi-india.org/web/csi/1204
http://csi-india.org/web/csi/technical-papers
http://csi-india.org/web/csi/tutorials
http://csi-india.org/web/csi/course-curriculum
http://csi-india.org/web/csi/training-programs
http://www.csi-india.org/web/csi/enewsletter
http://www.csi-india.org/web/csi/current-issue
http://www.csi-india.org/web/csi/archives
http://www.csi-india.org/web/csi/helpdesk
http://www.csi-india.org/web/csi/events1
http://www.csi-india.org/web/csi/infocenter/president-s-desk
CSI Divisions and their respective web links
Division-Hardware
http://www.csi-india.org/web/csi/division1
Division Software
http://www.csi-india.org/web/csi/division2
Division Application
http://www.csi-india.org/web/csi/division3
Division Communications
http://www.csi-india.org/web/csi/division4
Division Education and Research http://www.csi-india.org/web/csi/division5
List of SIGs and their respective web links
SIG-Artificial Intelligence
http://www.csi-india.org/web/csi/csi-sig-ai
SIG-eGovernance
http://www.csi-india.org/web/csi/csi-sig-egov
SIG-FOSS
http://www.csi-india.org/web/csi/csi-sig-foss
SIG-Software Engineering
http://www.csi-india.org/web/csi/csi-sig-se
SIG-DATA
http://www.csi-india.org/web/csi/csi-sigdata
SIG-Distributed Systems
http://www.csi-india.org/web/csi/csi-sig-ds
SIG-Humane Computing
http://www.csi-india.org/web/csi/csi-sig-humane
SIG-Information Security
http://www.csi-india.org/web/csi/csi-sig-is
SIG-Web 2.0 and SNS
http://www.csi-india.org/web/csi/sig-web-2.0
SIG-BVIT
http://www.csi-india.org/web/csi/sig-bvit
SIG-WNs
http://www.csi-india.org/web/csi/sig-fwns
SIG-Green IT
http://www.csi-india.org/web/csi/sig-green-it
SIG-HPC
http://www.csi-india.org/web/csi/sig-hpc
SIG-TSSR
http://www.csi-india.org/web/csi/sig-tssr
Other Links Forums
http://www.csi-india.org/web/csi/discuss-share/forums
Blogs
http://www.csi-india.org/web/csi/discuss-share/blogs
Communities*
http://www.csi-india.org/web/csi/discuss-share/communities
CSI Chapters
http://www.csi-india.org/web/csi/chapters
Calendar of Events
http://www.csi-india.org/web/csi/csi-eventcalendar
* Access is for CSI members only.
Important Contact Details »
For queries, correspondence regarding Membership, contact [email protected]
CSI Communications | January 2013 | 2
www.csi-india.org
President’s Message
Satish Babu
From
: [email protected]
Subject : President’s Desk
Date
: 1st January, 2013
Dear Members
At the outset, I wish you the very best for 2013!
As we enter the last quarter of the year, it’s perhaps time to
take stock of our progress so far, and take corrective action, if
necessary, to achieve our targets. It is also a time to plan for the
major events of the next financial year.
We have had a very successful CSI Annual Convention last month
at Kolkata. It is my pleasure to inform you that the 2013 Annual
Convention has been awarded to CSI Vishakhapatnam Chapter.
Since it is the first time that the Chapter will be organizing the
Annual Convention, I wish the chapter leaders success in this
endeavor and also commit that all the necessary assistance from
the CSI HQ will be forthcoming.
I had the pleasure of attending the 9th International Conference
on e-Governance (ICEG 2012) co-organized by the Special
Interest Group on e-Governance (CSI-SIG-eGov) at SCMS, Kochi,
during 29-30 Dec. The Conference brought out the challenges
facing e-Governance today in different parts of the country after
over a decade of focused efforts. I would like to congratulate the
host institution as well as the organizers, in particular the leaders
of CSI-SIG-eGov, for organizing an excellent event.
At the international level, December was a much-awaited
month on account of the World Conference on International
Telecommunications (WCIT 2012), organized by the International
Telecommunications Union (ITU) at Dubai. The conference had
the objective of reviewing the International Telecommunication
Regulations (ITRs), which serve as the binding global legal
instrument designed to facilitate international inter-operations
of information and communication services. With the last review
of ITRs taking place in 1988, and the intervening years have
seen a revolution in ICTs, the conference attracted a significant
amount of attention.
However, the most compelling reason why civil society groups
across the world were anxiously awaiting the event was related
to the efforts by some Governments to bring in new regulations
that would impose Governmental controls over the Internet.
There were protests and widespread debates in different parts
of the world on what was commonly perceived to be threats to
the freedom of the Internet by this move. On the other hand,
some also perceived the control of some of the Critical Internet
Resources—a name applied to a set of resources such as the
Domain Name System, IP addresses and root servers—by the
US Government, as unnecessary and inequitable, especially as
Internet evolves into a global information infrastructure of utility
to all countries.
As the dust settles on the event, it is far from clear as to what
it has achieved. Some countries led by the US walked out
of the last part of the Conference citing their irreconcilable
differences with the outcome document of the conference, for
several reasons such as the need for protection of Freedom
of Expression on the Internet. Out of the total 193 attending
countries, over 50 countries, including India and the US, have
not signed the conference outcome document. The proposals to
bring in more controls over the functioning of the Internet have
been shelved (at least temporarily), much to the relief of civil
society organizations across the world.
An important consideration in the governance of a global
infrastructure such as the Internet is that there are multiple
stakeholders, such as civil society, business, the technical &
engineering community, as well as Governments, who need to be
consulted. For this, a multistakeholder consultative approach, as
promoted by the Internet Governance Forum (IGF) for the last 6
years, seems to be most appropriate, in comparison with purely
legalistic approaches.
This brings us to another related question that has already been
raised earlier in this column: is it time to think of a brand new, outof-the-box piece of legislation such as a Universal Declaration
of Internet Rights? Although it sounds somewhat far-fetched
at this time, it is important for the international community to
attempt a consensus on this matter.
Interestingly, I am back in the great city of Kolkata again, a
month after the CSI Annual Convention, to deliver the Platinum
Jubilee Keynote of the ICT track at the 100th Indian Science
Congress. I will be speaking on “Innovation and Open Source:
Future Directions for India”, wherein I propose to present
the need for an innovation-friendly approach for the future,
and how Open Source can stimulate and support innovation,
both in computational technologies as well for broader social
innovation. I believe that a uniquely Indian model of innovationdriven, socially responsible enterprise can be developed by
leveraging the power of Open Source thinking. I believe this to be
an important component of an equitable employment model for
India in the 21st Century.
Jai Hind!
Satish Babu
President
CSI Communications | January 2013 | 3
Editorial
Rajendra M Sonar, Achuthsankar S Nair, Debasish Jana and Jayshree Dhere
Editors
Dear Fellow CSI Members,
Very warm welcome to all of you to CSI Communications – Knowledge
Digest for IT Community - January 2013 issue. At the outset, we wish
you a very happy and prosperous new year 2013 ahead. The new year’s
first issue was announced to have Enterprise 2.0 as the cover theme.
In recent years we have witnessed that Web has evolved from more of
static and one-way communication form of early 1990s to a more of
people-web form, which is a shared and collaborative web. Emergence
of social networking websites like Facebook and Linkedin, collaborative
efforts like Wikipedia made people change the name of Web to Web
2.0. Web has become world’s knowledge-sharing, collaborative, and
computing platform. Firms are trying to take advantage of Web 2.0
and related technologies within the organization called Enterprise 2.0.
Hence, Enterprise 2.0 was planned as cover story theme for this issue.
However, we have hardly received any articles on this theme.
In recent years we have witnessed that Web has evolved
from more of static and one-way communication form
of early 1990s to a more of people-web form, which is
a shared and collaborative web. Emergence of social
networking websites like Facebook and Linkedin,
collaborative efforts like Wikipedia made people change
the name of Web to Web 2.0.
We begin this issue with cover story by Dr. Sudhanshu Joshi, Incharge
– Information Technology, Doon University, Dehradun and Dr. Manu
Sharma, Assistant Professor, School of Management, Institute of
Management Studies, Dehradun on “Web 2.0: New Collaborative
Tools for Business Excellence”. They discuss and focus on Web 2.0
technologies and social media, how these have become topic of interest
for many firms, why it is essential for the firms to understand how social
media can be used in a business context and what benefits it brings
in, how social media impacts the way firms operate and how the firms
need to have Web 2.0 strategies in dynamic business environment.
We have five articles in the article section, starting with article on
Alan Turing titled ‘Looking Back: Alan Turing-The Father of Computer
Science’ by Vivek Kulkarni, Principal Architect - LABS, Persistent
Systems. Mr. Vivek has taken great amount of efforts in compiling this
article on Alan Turing from many sources.
Akash tablet has been in news for few months now, and Prof. Kannan
M Moudgalya & Prof. D B Phatak of IIT Bombay, Narendra K Sinha
(IAS) & Pradeep Varma (IT Professional and Entrepreneur) of
National Mission on Education Through ICT, MHRD have written an
article on Genesis of Aakash 2. They mention that IIT Bombay has
demonstrated that the idea of Aakash is eminently viable, and IIT
Bombay has been playing significant role in creating a large number
of educational applications locally and also by co-opting students and
faculty members of many colleges from all over the country. Towards
the end they mention about Aakash 3 likely to come out in about a
year’s time after Aakash 2 and that it will be a much bigger order
(expected to be of the 5 million) compared to Akash 2 and is expected
to deliver a lot more for the same price.
In Practitioner Work Bench section we have two articles, first one: Fun
with ‘C’ Programs under Programming.Tips() by Prof. Wallace Jacob,
Sr. Asst. Prof. at Tolani Maritime Institute and second one: ‘Regular
Expression’ of Python by Prof. Umesh P, Department of Computational
Biology and Bioinformatics, University of Kerala under Programming.
Learn (“Python”) .
Security Corner column has two sections one on Information Security
and the other on IT Act 200 we have two articles from our regular
contributors. The first section contains an article on “Can You Keep
Your Emails Secret? Lawfully?” by Adv Prashant Mali, Cyber Security
& Cyber Law Expert. In the second section we have an article written
by Adv Subramaniam Vutha in the form a dialogue between professor
Web has become world’s knowledge-sharing,
collaborative, and computing platform. Firms are trying
to take advantage of Web 2.0 and related technologies
within the organization called Enterprise 2.0.
of IT Law and an IT executive, and this time the dialogue topic is “How
policies, implementation mechanisms, and training bridge the gap
between the law and technology”.
In HR section, Dr. Manish Godse writes about ‘Job Satisfaction: What
Is It?’ In the article, he explains job satisfaction, factors contributing
to that and how to measure it. He mentions what path an employee
follows when he or she is not satisfied.
Second article we have by Viraat Kothare, Director, Deluxe Elite Info
Solutions Pvt Ltd, Mumbai: “The Online Identity Crisis” introduces the
readers to virtual online identities, its current scenarios, and the pain
points of an end user. He discusses case studies created through their
own research, who are the current market players who have created
few niche apps around online identities, provide a solution through
research that takes care of various pain points, and also talk about
related technology and revenue models and business strategies.
In IT.Yesterday(), we have an interesting write-up on ‘CSI – The Early
Days’ which takes the readers almost 50 years back by Dr. Sarwottam
Thakur, Former Hon. Secretary of CSI. He mentions that when CSI
was formed it had members who were mainly “Computer Scientists”
from academic and government institutions and there were hardly ten
computers in India. The write-up narrates a lot of stories about CSI, its
evolution and various people who had been and have been associated
with the same.
We are beginning article series on career opportunities in computer
security domain that can help the budding computing professionals
and students, who want to make their career in this field. We have the
first article in this series by CSI-C regular contributor Avinash Kadam,
Advisor to the ISACA India Task Force. He has written on “What Do
You Need to Know to Be a Cybersecurity Professional? He starts with
introduction to who is hacker/attacker and mentions about various
job profiles of cyber security professionals and how one can prepare
himself or herself for such career.
There are other regular features such as Brain Teaser, Ask an Expert and
ICT News Brief in December 2012 in Happening@ICT and CSI reports,
chapter and student branch news, CSI reports and various calls.
There is also an article titled ‘Making Big Data Work to Solve Big
Problems’ by Suryateja Tadigadapa, who is interestingly a junior
college student. He highlights how the nature of data has changed
in today’s computing world and what technologies are useful for
handling it.
CSI Communications | January 2013 | 4
We have received a book titled: Practical Apache Struts2 Web 2.0
Projects and it is reviewed by Jayshree Dhere, resident editor CSI-C
under ‘On the Shelf!’ section.
Remember we look forward to receiving your feedback, contributions
and replies as usual at [email protected].
With warm regards,
Rajendra M Sonar, Achuthsankar S Nair,
Debasish Jana and Jayshree Dhere
Editors
www.csi-india.org
Cover
Story
Dr. Sudhanshu Joshi* and Dr. Manu Sharma**
*Incharge – Information Technology, Doon University, Dehradun
**Assistant Professor, School of Management, Institute of Management Studies, Dehradun
Web 2.0: New Collaborative
Tools for Business Excellence
Introduction
In the era of knowledge economy,
the emergence of information and
communication technologies are crucial
for the success of the organization.
Business models have started shifting
towards collaboration and community
involvement. Organizations create scope
to allow information and knowledge to
flow in and out of the organization, which
would stimulate creation of knowledge and
innovation. This approach is effectively
gained through web 2.0 technologies and
their underlying concepts, which values
collective intelligence and collaboration.
Web 2.0 technologies can help improve
collaboration and communication within
most companies. The companies are
increasingly recognizing the potential
value in related to usage of Web 2.0 in
a business context, however, research
on using Web 2.0 in organization is still
in its infancy (Saldanha and Krishna,
2010). Considering the impact of using
social media, both internal and external
implications for company operations is
required to explore. Our discussion in this
article will be on how social media used to
enable innovation practices in company
internal operations as well as external
stakeholders. Social Media tools are being
used for content generation, community
building and harnessing information
(Vuori, 2012). Social media can be used
within employees and among supply chain
partners (Chui et al., 2009). Essential
Web 2.0 technologies include blogs, wikis
and interactive platforms (Ahlqvist et al.,
2010). Blogs and Wikis enable exchange
of information and facilitate collaborative
authoring and information exchange
(Kaplan and Haenlein, 2010; Majchrzak
et al., 2006). In 2006, Howe (Howe,
2006) coined the term “Crowdsourcing”
to describe company efforts to outsource
an activity to the crowds, representing an
entirely new business model, The premise
in crowd sourcing is using collective
intelligence, i.e., the wisdom of the crowds
(Surowiecki, 2004). Crowdsourcing
can be regarded as a practice of open
innovation where a company regards its
customer and end-users as source of
innovation, tapping into their innovative,
tapping into their innovative capabilities in
a systematic way (Leimeister et al., 2009).
At firm level, social media has
become a perspective set of tools that can
be use for evaluating the performance of
existing business processes, to evaluate
the state of internally focused as well
externally focused processes and their
applications (Vuori, 2012) [Table 1]. As
per McKinsey Quarterly, in global survey
(McKinsey, 2011), companies worldwide
are implementing these tools for a wide
range of purposes, the most common area
of application being internal operations
and their reengineering followed by
interfacing with customers and business
partners in the supply chain or supply
chain redesign.
In recent past, Web technology has
gained strategic importance; it is evidently
proved that the traditional firms feel
difficult to adopt the new business growth
model based on disruptive innovations
through web technologies. Rather, they
don’t know how to build a new business
model to remain competitive in the market
place (Johnson et al., 2008). The internet
and digital technologies have created
new opportunities for firms to create
value (Lumpkin and Dess, 2004). The
phenomenon of web 2.0 technologies has
led many traditional as well digital firms to
successfully adjust their web-strategy by
adopting web 2.0 concept for sustainable
competitive advantage and to reach
their objectives. Traditional firms as well,
blend their business model in obtain the
benefits of web 2.0 services. An effective
web-strategy must be the right alignment
between organization’s business strategy,
objectives, resources and capabilities
as well as with the industry trends and
technological changes.
High Velocity Business Environment
and Web 2.0 as Strategy
Web-enabled business models comes
under ‘high velocity environment’, due to
dynamic nature of markets, which are very
sensitive towards changes in demand,
competition, regulation and technology.
With recent technological changes and
phenomenal emergence of ‘Web 2.0
and its applications’, firms are now more
inclined towards incorporating Web 2.0
in to their business model or developing a
new business model to keep pace with the
changes in the ‘high velocity environment’.
Considering web 2.0 involvement in high
velocity business environment along with
customer intimacy, level of operations and
product/ process leadership, a framework
was being developed (Vijay et al, 2011).
There exist four forces behind ‘web 2.0
Phenomenon’ including Social Networking;
Interaction Orientation; Personalization/
Customization and User- Added Value
(M.S. Yadav, and Varadarajan, P.R., 2005)
[Fig. 1]. With the evolvement of technology
and changes in customer preferences,
Web 2.0 forces become inevitable, closely
linked and contribute to the evolvement
of activities for successful business firm.
[Table 2]
Discussion
As web 2.0 technologies and social
media have become topic of interest
for many companies, it is essential to
understand how social media can be used
in a business context. Due to emergence
of Web2.0 tools in to the business
Internally focused applications Externally focused applications
Communication
Blogs, Discussion Forums
Blogs, micro blogging, social
networking, online broadcasting
Collaboration
Internal idea crowd-sourcing
service
External idea crowd-sourcing
service
Connecting
Internal networking site,
corporate wikis
Customer forums, on-line
communities, virtual worlds
(Source: Vuori, 2012)
Table 1: Internal and external focused business applicaƟons
CSI Communications | January 2013 | 5
INTERACTION
O R I E N TAT I O N
Customer
centricity
Interaction
configuration
Customer
response
Social
identity
Web 2.0
C U S TO M I Z AT I O N /
P E R S O N A L I Z AT I O N
Group
customization
E-word of
mouth
Customer
power
Personal
customization
Social
customization
Social trust
SOCIAL NETWORKING
Cooperative
value
User generated
content
User generated
creativity
User generated
innovation
User generated
revenue/contract
U S E R A D D E D VA LU E
Fig. 1: Business scenario for Web 2.0
processes; it also affects the business
model and leads to its restructuring.
The Classification of social media use
is deployed to highlight the possible
implications for company operations, and
the human factor is emphasized in system
adoption and use. Challenge related to
social media implementation (Vuori, M.,
2012). Many fortune 500 companies are
now actively embracing Web 2.0 tools,
among the major benefits; they cite
increased collaboration, a democracy
of talents, and a corporate culture of
trust and potential productivity gains.
Out of the past academic research and
business practices, the following Critical
success factors (CSF) are identified and
reviewed, for effective and easy adoption
of new business model by a global
firm, including: (1) Devising strategy for
blending social tools into business Process:
Develop a strategic, evidence-based
approach, integrating existing activities
and communications strategies. (2)
Awareness generation: Educate managers
by raising awareness of what Web
2.0 technologies are available, the
opportunities they offer and the risks they
raise. (3) Inculcating Social Technology
in the mind of users: Develop a code of
conduct and toolkit for the use of Web
2.0, proving a clear steer to employees
and managers on the use of social media
for work and personal use. (4) Evaluation
of the action plans: Learn to listen by
adopting focused and sustained efforts
to understand, map and track the use of
relevant Web 2.0 technologies. Regularly
evaluate the use and effectiveness of
Web 2.0 technologies in the firm. (5)
Learn by experience: Set out a business
case for using Web 2.0 technologies,
including a phased implementation of
access to social media tools. (6) Unique
technology selection: Avoid replication
by engaging with existing technologies
before developing in-house ones.
Factor
Activity
Social Networking
Build social networking site- e.g., by creating blogs, forums and chats for your website activity.
Check and comment on postings on networks (e.g., review platforms)
Present your company on relevant social networking platforms.
Interaction Orientation
Be highly responsive and available 24 hours.
Provide users a reward for interaction social status
Encourage positive and negative feedback.
User-added value
Integrate the following tools on your website: user reviews, user-generated information (wikis),
media uploads (video etc.)
Offer incentives
User metadata that track clicks, recommendations, behaviour etc.
Customization/Personalization
Make good use of available user information as a base for customization efforts (e.g., build track
profiles based on customer history)
Focus on making customization/personalization easy to use.
(Source: Wirtz, 2010)
Table 2: Web 2.0 factors and acƟviƟes involved
CSI Communications | January 2013 | 6
www.csi-india.org
1
Web 2.0 based
technology selection
and incorporation
into Product/services
5
2
Extending benefits from technology to
customers
Design mechanism to
capture value
3
Identify market segments to be targeted
4
Confirm available
revenue streams
Value Creation and Profit Maximization and
Competitive Advantage
Fig. 2: Business model redesign and Web 2.0 integraƟon
The broad adoption of social media
tools has the potential to unleashed a
huge transformation in the way companies
operate, resulting in a wide range of
benefits, such as enhanced collective
knowledge,
increased
productivity,
sharpened strategic focus and greater
innovation. Web 2.0 adoption can
transform the way companies operate.
It may leads to different benefits to the
business in global marketplace, so that
internal resistance can be reduced at
operation as well firm level, including:
(a) Increased Collaboration: Mckinsey
(McKinsey, 2011) found that when
companies incorporate social media across
their organizations information is shared
more readily. For example, Cisco recently
learned this through its deployment of a
social networking product called Quad,
which integrates with business and
Internet content management systems
and features instant messaging, Facebook
style status updates and a task manager,
The company is using social networks to
build product and project management
teams. (b) A Democracy of Talents: Web
2.0 software constructs open-ended
platforms on which in theory m everybody
is equal. Employees working in such a
setting are much more likely to openly
share ideas and information exclusively
for the benefits of the organizational as a
whole- something very rare in hierarchical
organizations. Social media tools, such
as Wikis, have the potential to open up
the process beyond the usual cronies
and favorites who regularly get invited
to closed-door meetings. (c) Corporate
culture with Trust: With the rise of Web 2.0
corporations, workers at all levels of the
organization have a much greater say in the
day-to-day running of the company, while
also enjoying the benefits of a corporate
culture of openness and transparency.
(d) Potential Productivity Gains: while
many companies view social media as
a time sink, the reality is that tools such
as blogs, wikis, mashups and RSS feeds
offer the potential to significantly increase
productivity. (e) Recruitment: Through
their social media peer groups on sites
such as Facebook, Twitter and LinkedIn,
employees can access more information
to assess candidates for a vacant post. By
encouraging employees to connect with
their social media peer groups, companies
will find recruiting not only an easier and
cheaper task, but one that more often
leads to a successful long-term hire.
(f) Customer Relationships: Externally
networked companies better understand
what their customers want and are
forging a dialogue with their customers
throughout a product’s life span. Building
strong links with customer via social media
can also sharpen a company’s innovation
and product development processes by
allowing new ideas to be explored and
tried out directly with customers. (g)
Channeling the Best expertise: Sites such
as LinkedIn and Twitter enable employees
to draw on intellectual capital from both
within and, vitally, outside their company.
Twitter is particularly useful, as members
of a network are often willing to retweet
a request until it reaches someone in the
know. (h) Channeling the best expertise:
Sites such as LinkedIn and Twitter enable
employees to draw on intellectual capital
from both within and, vitally, outside their
company. Twitter is particularly useful, as
members of a network are often willing to
retweet a request until it reach someone
in the know. (i) Competitive Intelligence:
Externally connected employees can use
social networks.
The web 2.0 revolution promises
to become as important as driver of
productivity growth as automation was
in the 19th and 20th Centuries. Web 2.0
revolution will be about harassing social
technologies to drive cultural changes
within organizations.
Conclusion
Due to the increasing convergence
of
information
technology,
telecommunication and media has been
one such significant change, business
environmental disruption can cause
fundamental changes in the business
model landscape status quo, and
particularly in Internet based businesses
(Wijaya, 2011).
The main use of social media were
identified and conceptualized based on the
past research. Internally, social media was
used to for internal communication and
knowledge transfer, to reach personnel
and to conduct internal data idea crowd
sourcing. Externally, social media can
be use for enhancing communications
related to the company brand, strengthen
its competitive strength. By integrating
web 2.0 into their day-to-day activities,
companies can promote higher levels
of collaboration, breaking down the
organizational barrier that impedes
information flows.
As companies are exploring the
various social media related applications
and considering the related implications
for their mainstream businesses, there are
various opportunities for further research.
Continued on Page 14
CSI Communications | January 2013 | 7
Article
Vivek Kulkarni
Principal Architect - LABS, Persistent Systems
Looking Back: Alan TuringThe Father of Computer Science
Computers: We use them every dayfrom
education to games, offices, homes, banks,
movie theaters and more.Our ability to
incorporate computers in our everyday
lives is largely due to the contributions of
one individual, Alan Turning.V
Alan Turing, the founder of
Computer Science, a mathematician,
philosopher, code-breaker, was an
extraordinary visionary of his time. His
invention, the Universal Turing Machine
laid the foundation for today’s digital
computers. We would not be where we
are today without his contributions in
computability theory.
We often take for granted
technological advances that make our
day to day lives easier. Most times we
attribute these contributions to people like
Steve Jobs and Steve Wozniak; however,
before the invention of the computer, it
was necessary for someone needed to
introduce the idea of the computer.
On June 23, 1912 Alan Mathison
Turing was born in an upper-middle class
british family in Paddington, London[1]. In
school, Turing’s scientific talents were
not appreciated by more conservative
teachers, leading him to make science
ashis extra-curricular passion. Often
absorbed in his own ideas, Turing was
criticized for his handwriting, struggled
with English, and even in mathematics.
Despite being an unconventional student,
Turing won almost every possible prize
for mathematics in addition to being
amazing athlete.
Two years after his graduation in
1936, Turing published his most important
paper, On Computable Numbers, with an
Application to the Entscheidungsproblem[2].
Entscheidungsproblem is the German
word meaning decision problem, a
challenge posed by David Hilbert in
1.
2.
3.
4.
5.
6.
7.
8.
1928, a proposition for an algorithm that
decides whether a given mathematical
statement is provable from the axioms
using the rules of logic[3]. In this paper,
Turing introduced what later became
known as Turing machine, a hypothetical
device capable of performing any
mathematical function, ultimately laying
the foundation for the concept of an
algorithm (a set of instructions for the
machine to follow). The most striking
positive result concerning the capabilities
of Turing Machines is the existence of
Universal Turing Machines (UTM)[4]. The
UTM is the machine capable of simulating
any other Turing Machine; in essence a
programmable computer. When a UTM is
given a program (a description of another
machine), it makes itself behave as if it is
that machine while processing the input.
Alonzo Church, whose work on
Lambda Calculus intertwined with Turing's
work in a formal theory of computation,
also accepted Turing's claim in what is
known as the Church’s Turing Thesis. The
basic idea is that Turing Machines capture
the informal notion of effective method
in logic and mathematics, and provide
a precise definition of an algorithm or
'mechanical procedure'. Turing also
put forth the concept of an unsolvable
problem[5]. According to Turing,it is
impossible to decide whether a Turing
machine with a given table of instructions
will output an infinite sequence of
numbers[6]. This problem is referred as
the Halting Problem and is incomputable.
Subsequently, the concept of the Turing
machine has become the foundation of the
modern Theory of Computation, a theory
central to Computer Science.In principle,
Turing created the theoretical framework
for computers in his paper, much before
the first digital computer was built.
Turing's 1945 report entitled
"Proposed Electronic Calculator" gave
the first relatively complete specification
of an electronic stored-program generalpurpose digital computer[7]. His idea
of a machine was called the Automatic
Computing Engine (ACE).In the U.S., the
first electronic stored-program digital
computer was proposed by von Neumann
in his report titled "First Draft of a Report
on the EDVAC" in May 1945[8]. EDVAC
stands for Electronic Discrete Variable
Automatic Computer. This paper achieved
greater circulation and the computer
architecture it outlined became known as
the "von Neumann architecture" though it
contained a little engineering detail.Many
people have acclaimed von Neumann as
the "father of the computer" but he was
well aware of the fundamental importance
of Turing's paper of 1936.
During the Second World War,
Turingworked at Bletchley Park. It was the
Britain’s code-breaking centerwhere the
brightest minds in the country including
Gordon Welchman and Harold Keen
collaborating to crack German ciphers.
Together they invented the Bombe - a
machine designed to break Enigma, the
Turing’s Biography -http://www-groups.dcs.st-and.ac.uk/history/Biographies/Turing.html
http://en.wikipedia.org/wiki/Entscheidungsproblem
Formal system -http://en.wikipedia.org/wiki/Logical_system
UTM is the machine capable of simulating any other Turing Machine. That means, it can simulate any algorithm possible.
Unsolvable problem is the one for which no algorithmic solution exists.
Halting problem - http://en.wikipedia.org/wiki/Halting_Problem
Proposed Electronic Calculator - http://www.alanturing.net/turing_archive/archive/p/p01/p01.php
http://www.fh-jena.de/~kleine/history/machines/Godfrey-VonNeumannComputerPlan.pdf
CSI Communications | January 2013 | 8
www.csi-india.org
German’s primary method of encryption.
It is believed that these efforts shortened
the warby at least two years[9].
Turingbegan to consider the issue
of artificial intelligence, formulating the
famous Turing Test[10]. Introduced by
Alan Turing in his 1950 paper, Computing
Machinery and Intelligence, The Turing Test
is anassessment of a machine's ability to
exhibit intelligent behavior which opens
with the words: "I propose to consider
the question, 'Can machines think?'"[11]
Since "thinking" is difficult to define,
Turing chooses to replace the question by
another, which is closely related to it and
is expressed in relatively unambiguous
words. Turing's new question was: "Are
there imaginable digital computers which
would do well in the imitation game?"In
the years since 1950, the test has proven
to be both highly influential and widely
criticized, and it is an essential concept in
the philosophy of artificial intelligence.
Alan Turing died in 1954 at the age
of forty-one, after which his work became
forefront identifying him as the founder of
Computer Science[12].
Main achievements of Alan Turing:
•
•
•
•
•
•
•
Designed the paper model of the
world's first digitalcomputer
Discoverer of Turing Machine, 1935
Accepted as the inventor of Artificial
Intelligence
Awarded in 1945 for his wartime
services
He was one of the core team
members who built The Bombe.
Decoding the Enigma in 1942
He was the key team member which
decoded the 'Fish' cipher
The A. M. Turing Award is an annual
prize given by the Association for
Computing Machinery (ACM) to "an
individual selected for contributions of a
About the Author
9.
10.
11.
12.
technical nature made to the computing
community". It is stipulated that "The
contributions should be of lasting and
major technical importance to the
computer field". The Turing Award is
recognized as the highest distinction in
Computer Science and considered as the
Computer Science equivalent of a Nobel
Prize. 2012 will always be remembered
as the “Turing year” as ACM A.M. Turing
Award Winners came together for the
first time, to honor the 100th Anniversary
of Alan Turing and reflect on his
contributions, as well as on the past and
future of computing.
As we look back on Alan Turning’s
contributions to the fields of Mathematics
and Computer Science, it is hard not to
think about his hypothetical reaction to our
current lifestyle. Sure he may be thrilled
with the computational capabilities of
computers today, but he may as well be
horrified with our personal dependence
on mobile computing technologies. Was
his love for artificial intelligence purely
fantasy or are we beginning to push the
ethical boundaries? It would have been
magnificent for Turing to see his ideas
become something tangible; we can only
hope he would have embraced these
advances.
References / Sources:
[1] http://www-groups.dcs.st-and.
ac.uk/history/Biographies/Turing.
html
[2] h t t p : //e n .w i k i p e d i a . o r g /w i k i /
Entscheidungsproblem
[3] http://www.alanturing.net/turing_
archive/archive/p/p01/p01.php
[4] http://www.fh-jena.de/~kleine/
h i s t o r y /m a c h i n e s / G o d f r e y VonNeumannComputerPlan.pdf
[5] h t t p : // w w w . e l l s b u r y . c o m /
enigmabombe.htm
[6] http://en.wikipedia.org/wiki/Turing_
test
[7] http://www.loebner.net /Prizef/
TuringArticle.html
[8] http://en.wikipedia.org/wiki/Alan_
Turing
[9] http://www-groups.dcs.st-and.
ac.uk/history/Biographies/Turing.
html
[10] http://www.turing.org.uk/
[11] http://www.turing.org.uk/turing /
scrapbook/computer.html
[12] http://www.turing.org.uk/sources/
vonneumann.html
[13] http://plato.stanford.edu/entries/
turing-machine/
[14] http://plato.stanford.edu/entries/
computing-history/
[15] h t t p : //w w w. b b c . c o . u k /n e w s /
technology-17662585
[16] http://plato.stanford.edu/entries/
turing-machine/#5.2
[17] http://skepchick.org /2012/05/
alan-turing-computing-pioneercodebreaker-gay-icon/
[18] http://historysheroes.e2bn.org /
hero/achievements/91/print
[19] http://skepchick.org /2012/05/
alan-turing-computing-pioneercodebreaker-gay-icon/
[20] h t t p : //e n .w i k i p e d i a . o r g /w i k i /
Universal_Turing_machine
[21] h t t p : // w w w . s c r i b d . c o m /
d o c / 1 5 3 2 9 1 0/ Vo n - N e u m a n n Computer-Architecture
[22] http://people.ee.ethz.ch/~ballisti/
computer_topics/neumann.vs.turing.
html
[23] http://turing100.acm.org /index.
cfm?p=awardees
[24] http://en.wikipedia.org/wiki/Von_
Neumann_architecture
[25] h t t p : //w w w. b b c . c o . u k /n e w s /
technology-17662585
n
The Enigma and the Bombe - http://www.ellsbury.com/enigmabombe.htm
Turing test - http://en.wikipedia.org/wiki/Turing_test
COMPUTING MACHINERY AND INTELLIGENCE -http://www.loebner.net/Prizef/TuringArticle.html
Turing – the father of computer science - http://en.wikipedia.org/wiki/Alan_Turing
Vivek Kulkarni is currently working as Principal Architect in Persistent Systems Ltd. He has a total experience
of 18+ years in academia and software industry. He has served as a subject chairman for multiple subjects
for the Board of Computer Engineering, University of Pune. He has written multiple books on “Theory of
Computation’’.
He has also worked in organizations such as BMC Software, Symantec Corporation, and Tech-Mahindra.
He is also one of the inventors for System and Method of Universal Programming Language Conversion, which
has been internationally recognized and patented
CSI Communications | January 2013 | 9
Article
Viraat Kothare
Director, Deluxe Elite Info Solutions Pvt Ltd, Mumbai India
The Online Identity Crisis
“If you are not embarrassed by the first version of your product, you’ve launched too late.”
Reid Hoffman
Founder, LinkedIn
Abstract: In this article, we will illustrate
an introduction to virtual online identities,
its current scenarios, and the pain points
of an end user. The role of online virtual
identities in today’s world plays a major
role in our real lives, as it identifies us being
a part of a large advancing society, where
we are bound to be a part of a popular
community or channel in order to keep up
with the latest trends and advancements
in technology. Currently new startups,
developers are more focused on building
latest apps and platforms, thinking it
would be an exciting platform for users,
but sadly not much research & interest
have really been focused on working
around the existing apps & platforms
wherein their content and its popularity
is huge. Our objective is to showcase how
we can take control & manage our vast
ever growing online identities & resolve
the current issues. We will also discuss
the business models and strategies which
can we worked around the online identity
space along with scenarios.
Keywords: Profiles; Aggregation; Social;
Identity; Information.
Introduction
Since pre-historic times, we humans,
have been socializing through different
mediums such as; through meetings and
gatherings at various events, seminars,
public places, and recreational activities to
share our joys, issues, current happenings
in and around us, and exchange of thoughts
that takes place through comments and
feedback and as time passes by we tend
to be part of a group or community whose
ideas and thoughts are as same as ours,
& we stick on to those group of people
and interests clubs in terms of business
or group activities and events which
would help increase our knowledge both
professionally and personally. At a point
in time,. there were bath-houses and local
community gatherings and public parks
where people used to play various sports
and events use to happen, but today all
that has diminsihed.
CSI Communications | January 2013 | 10
Role of Online Identities and
Its Importance
With the advent of the internet, improved
communication, all these activities and
socialization have taken a back seat,
including offline activity of mingling
with people visiting malls rather going
to parks. People can now access any
information at their fingertips or connect
with anyone simply in a few minutes.
Eventually, people have now started
reinventing the term socialization, by
working on methods which can save
time and energy, and things which could
be done manually offline; the same
work can be achieved virtually within a
matter of minutes. People have started to
connect to other peers of same ideas and
interests through online communities,
started writing own feelings and expert
information through blogs, expressing
themselves
with
digital
photos,
uploading special moments, and events
through online videos, shout what they
did today or experience through status
updates and wall messages which have
become a recent fad and a addiction by
being hooked on to these all sort of online
activities. All these activities have to be
achieved by accessing different places
and locations, due to which people have
created multiple identities of themselves
in the virtual world which segregates
them and other people in each place
& location, as each location provides a
different purpose and action for the user
which lets them get connected to offline
world scenarios in one form or the other.
It’s importance is that it allows to
define who you are, what do you do, what
are your feeling/thoughts, what are your
expertize, sharing your emotions apart
from the face there are % of people who
are fake and provide information which
they aren’t related to, and that leads to
further issues. There are some things
which we are unable to express to people
openly and share things, but by these
new online platforms, each new platform
allows people to create a distinguished
identity to express themselves to their
peers and to the world, about what they
are good at and what they are doing.
But all these activities, aren’t at
a single place, people have developed
innumerable platforms with over the years
for people to express themselves in any
format which was available, due to which
people started registering by creation
of multiple user accounts for different
purpose and work over the web, which
we can see is a issue, wherein at some
point of time due to time crunch, people
are unable to manage all these activities
in different mediums effectively over the
time, as people are finding it difficult to
keep a balance between both the online
and offline world which we will discuss in
detail in the next topic.
Figure 1: Traditional and online interaction
h t t p : //w w w . f l i c k r. c o m /p h o t o s /
3 4 41 9 1 8 2 @ N 0 8 / 74 8 47 3 8 0 1 6 /i n /
photostream
Issues Faced Currently with
Online Identities in Our Findings
As discussed above, that people have
been registering themselves with many
new and upcoming sites and platforms,
it’s very difficult to remember all online
credentials unless the user is able to store
all data at a central point, apart from
it there’s also possibility of data theft
and online credentials can be accessed
easily by 3rd party Apps/vendors..Users
should not reveal too much information
over the net about themselves and stick
to only the information needed for that
website/application as there are many
stalkers, & people and marketers looking
forward in getting sensitive and people
data and use it for their own purpose.
Another issue faced, is nowadays with
many sites coming up with their own
different purpose and feature, people
need to remember the website names
also, therefore due to website like Digg
(http://digg.com/) Stumble upon (http://
www.stumbleupon.com/) allow users
to bookmark site for quick reference
afterwards, but what the people
actually missing is the accessibility and
www.csi-india.org
time consumption is increased as the
bookmarks start getting increased.
In the early days of the web in web 1.0
era, there used be a 1 way communication
and expression of content and data
exchange, people used to post and
upload information for their peers to see
and interact, but with the advent of web
2.0, people are now interested in a 2
way communication, wherein they share
content and information with their peers
and the world like photos, videos, music,
and documents, so sharing has become
a major part of the web and people also
like to receive ratings and comments
and likes and analyze data of how other
people perceive their information and
media content over the web. Over time,
data and information has been increased
and people have accumulated and created
innumerable content over the web,
therefore people have shared content
across to multiple locations managing
data separately in different formats, due
to which information and media content
has been scattered all over the web,
and people are unable to share content
seamlessly, also people are now interested
in collaboration of data and content
with other peers of their interest which
is only a possibility if we bring the data
and information connectivity seamlessly
across multiple locations.
Now when, we talk about
communications, people communicate
through different forms be it SMS, Email,
IM, Chat, Blog, Forums, and Networking,
people have created separate identities
for each mode of communication & apart
from it people have multiple accounts in
the same mode of communication divided
into family, friends, business, and groups
,which further makes managing contacts
and communication more complex, with
different people in different modes at a
single point of time, as most of time would
be spent in writing to different people in
different modes separately which leads
to decrease in productivity and effective
communication.
One of the other key major issues in
online identities space, each tech company
is having its separate identity service of its
own, but there’s not one online identity
to rule them all, apart from the OPENID
(http://openid.net/) project, which has
recently allowed participation from top
web companies to be a part of this project
to help & allow users to seamlessly access
multiple accounts and information, but
limit to only those websites, providers
supporting Open ID. It is a good concept
from the privacy point of view but also
direct access to spammers, hackers, who
access all user data across all networks,
impersonation, and hide identities.
Offline Identity Crisis in Mobiles
With the increase usage of smart phones,
we now have users identities connected to
their mobile devices, the landline no’s were
shared with multiple groups of people;
mobile phones tend to be more private and
personal, with each member of the family
and relations having their own phone
numbers. At ones own personal level,
mobile phones have come with managing
multiple sim cards facility, so now users
can share separate no’s with different
people of their level of relationship
where in there’s a need to organize
and personalize contacts Recently the
portability across mobile carriers has
come into place, wherein people are able
to retain the same number, even if they
change devices or providers. Also, there
should be some security measures to be
taken into account to prevent criminals
from accessing stolen/lost phones to steal
identity and personal information, strong
encryption and identity logon needs to be
put in place for authentication like digital
uid or fingerprint scan etc.
Figure 2: Types of online identities
h t t p : //w w w . f l i c k r. c o m /p h o t o s /
3 4 41 9 1 8 2 @ N 0 8 / 74 8 474 0 6 6 2 /i n /
photostream
Case Studies Examples
We will showcase and explain some of the
case studies created in our research i.e.:
(Names taken for demo purpose)
Mia has received lot of comments
on one of her wall posts/blog, but she
also received lots of emails also, so Mia
is confused which one to handle first,
the mails received or to view and reply to
comments received, managing a single
task at a time separately, increases her
time and energy in accomplishment of her
communications information received,
therefore all types of communications
needs to be centralized.
John is a avid consumer of latest
gadgets news, goes to several sites related
to latest gadgets but also wants to view
similar information and content elsewhere
related to latest gadgets, so John needs
to search more content related to tech
gadgets, so if we enable integration
of multiple platforms related to same
medium like an eg- Picasa and flickr for
photos, daily motion, and YouTube for
videos, it will be simpler in accessing
content rather searching for similar
content.
Mike needs to share & view his
content and its updates to import and
export his data, Mike needs to login to
each platform separately to access his
data, after accessing his data from each
site, Mike has to wait for push and pull
his content which would again be a loss
of time in getting his information and
content. Therefore, a single sign on needs
to be created, wherein Mike can connect
to all his accounts through a single login
and create settings to import and export
of data on each site with just a couple of
steps.
Amanda found something interesting
on the net, and would like to share her
thoughts, share and store in her online
profile account on some platform, she
has to copy that information to local pc/
laptop then post to her online account,
and her followers and peers would like to
see her what she is doing or recently done
there is a universal app/niche platform to
be created in order for Amanda to snyc
data and showcase it anywhere on the
web plus also seamlessly allow Amanda
to pull any content or information across
the web to her online identities from any
place on the web with a single touch. So
the role of data portability and push and
pull of content to one own online identity
needs to come in place across the web.
Coca Cola wants to promote and
market its products effectively to reach a
larger audience in the shortest possible
time, Coca Cola has to create a mailing list
and collect data, create fan pages to gather
fans, create a community and network to
share about its product launch, if we create
and develop effective marketing tools
around each platform, Coca Cola would
save time and investment in hiring a expert
to do all the marketing activities online at
a manual level, with just a couple of clicks
Coca Cola can manage their marketing
activities across various platforms of social
media and networks in a jiffy, so we can
see a separate niche can be created around
marketing across separate platforms
CSI Communications | January 2013 | 11
keeping in mind push of content can be
executed seamlessly across all platform
with a single point of action.
In the case of social network services
such as Facebook, companies are even
proposing to sell 'friends' as a way to
increase a user's visibility, calling into
question even more the reliability of a
person's 'social identity'.[3] Reference
-Wikipedia
More Case Studies
http://networkconference.netstudies.
org/2010/04/perceptions-of-identityin-social-networking-controlling-youronline-presence/
Current Market Solutions
There are few players in the market who
have created few niche apps around online
identities, but have not exponentially
grown to a full extent providing all round
performance both in feature wise and
productivity. Only a few users who have
known these players use it for a particular
period but that just it, not engagement
driven plus providing limited access to just
a few platforms. Some of the few market
players who have ventured in the online
identity space for instance:
Profilactic
(http://www.profilactic.
com/): allows people to maintain an
online directory of all accounts, wherein
other people can view by clicking on
the hyperlinks of the online identities, it
should have worked upon accessing data
seamless rather than redirecting content
to separate URL.
Friend feed (http://friendfeed.com/):
allow people to manage and view personal
and friend’s activity feeds to those
platforms supported by friend feed to stay
in touch and being updated of daily and
monthly activities through xml feeds.
Retaggr.com now closed was also an
interesting site, where in users could
create a virtual id card and display all
online identities on it and were able to
share it across the web. Though they
could not generate much attention,
probably should have provided some
more features and seamless integrations
to it. So the current market scenario in the
online identity space is, each one is having
its own set of niche based applications
built around it , but they have not really
combined together as a whole to provide
the user a rich complete experience in
CSI Communications | January 2013 | 12
all aspects of online identities, and as
for monetization is concerned, they have
mostly relied on advertisements, not
worked wholly on a proper good revenue
model like premium services, managed
services etc, which would have provided
some value and attraction to user to at
least get that experience. They have not
much plans of scaling up/expansion plans
or any marketing strategy, due to which
the popularity of these niche apps is slowly
diminishing, as again the same issue
faced by user of even managing online
identity again needs to register with
separate vendors to get access to online
identities features so its further creation
of more complexities & issues around it.
Also the fact is they have worked around
with those platforms that are popular
in their respective domains and are not
able to capture other platforms those are
mid-popular, even though people have
connections in that platform.
The problem hasn’t been solved
till date, rather not executed well, as
companies are wary about its future and
whether it will really work out, but an entity,
or an individual needs to experiment and
start working around it at least we should
not stop experimenting if it’s going to help
people in making life easier and simpler.
Also the fact is that integration of
each platform system access to one own
system is a tedious and time consuming
process but the advantage for the people
is that people can work and access
on existing data centrally rather again
pushing and pulling of content all over
again, thus save time and able to achieve
the task in a much organized manner.Not
many players currently really want to do
much experimentation in this field, not
finding it much lucrative about taking it
forward, but it’s also a good opportunity
to venture out since not many players are
trying to compete.
If any company/individual wants
to enter in this field and create ground
breaking innovations, they should
keep in mind the long term goals and
revenue model and scalability, eager to
experiment, and resolve this issue in a
simpler effective level.
The Solutions (Our Research)
Based on the above scenarios we are
researching and working to create and
develop in resolving issues in a step wise
manner currently as a web based project,
making things easier and simpler some of
the areas we are working on are, taking the
pain points into consideration i.e.:
•
No need to remember site names
anymore.
•
Single login required to access all
other online accounts.
•
Time consumption less in accessing
site seamlessly.
•
Easy communicate and collaborate
with peers.
•
Broad content, multiple sources,
open environment.
•
Save user time and energy &
completion of tasks.
•
Complete end-to-end marketing
solutions in various verticals.
Remembrance, Hassle Free Access &
Manage Accounts Seamlessly
We are in the process of creation of a
single online account management system
wherein the user can encrypt all online
credentials of all his accounts online, and
provide them at later stages to sync data
seamlessly through a single id, rather
than remembering separate accounts
separately for each individual platform be
with photos, videos, friend feeds etc.
Collection of Data and Sharing
We will allow users to import and export
online data and media content through
their various accounts scattered online
into a centralized platform allowing both
push & pull facilities through API calls,
each separately for each platform, so
that users can organize data and media
in folders and also allow ways to backup
and collaborate with peers and providing
them to promote content through a mash
up platform rather for user to upload
information y or read/access data for each
platform separately for which we are in
process of receiving patent for the same
in real-time.
Aggregation Based Info Services
Across Multiple Platforms
We will allow users to aggregate their
content and media content related to
same medium across multiple platforms
related to their interests and likes and
also as a marketing strategy of cross
promotion of information across multiple
platforms.eg-user can search topic as
animals and select which medium to
fetch information be it photos or videos
etc and then select from which platform
www.csi-india.org
he wants to receive data be it Picasa for
photos or YouTube for videos.
Technology
We will be able to achieve the above goals
technically, by first maintaining an online
directory of all platforms related to different
medium and content in our main director
Then we will start creating and managing
the API keys and calls provided by the
platforms for integration. After which
we will create a centralized platform to
allow users to feed credentials that will be
encrypted by default and also integrating
open auth and oauth standards when user
starts synchronization data Over a period
of time, we will keep upgrading the more
features and enhancements on top of our
platform.
Figure 3: Our Research
h t t p : //w w w . f l i c k r. c o m /p h o t o s /
3 4 41 9 1 8 2 @ N 0 8 / 74 8 4741 2 24 / i n /
photostream
Revenue Models & Business
Strategies Which Can Be Created
•
Logins/password managements:
We can develop unique key strong
credential management system wherein
users can store and manage online
accounts information in a secured manner
to sync data from one website to another.
It can further be created for managing
offline accounts and internal intranet
systems.
•
Enhanced communications:
We can create subscription based
premium
enhanced
features
like
scheduling, reports, backup services,
blacklist, contact organization, and get
activity feed reports of our peers etc
across all platforms.
•
Collaboration of data:
We can create premium services built
around data and information of user
generated content of own and others
in order to deliver better output in
redesigning, changes in content, updates,
received feedback, and work together
to provide more interesting content,
accomplish tasks together be it with photo
change, video cuttings, music content,
document changes etc. as an individual
and as a company.
•
Backup solutions:
We can provide backup solutions based
on space and volume of all your virtual
identity information and content, incase
if account gets compromised, or if data is
lost due to mistaken deletions by providing
users to sync data from any location and
backup all data in a centralized location.
A new scope of online data portability can
come into place.
•
Analytics & Reporting solutions:
We can provide detailed premium analysis
reports to individuals and companies,
based on the actions done by users
and individuals and the latest trends
happening, daily consumption of user
data, sharing of information, popularity,
ratings etc.
•
Reputation management:
We can provide reputation management
services wherein, we can create tools
to manage what people say about as an
individual or company in various content
sharing locations. We can collect feedback
and negative data and provide expert
solutions in keeping online reputation
clean, as its keeps a healthy image at both
online & offline levels.
•
App platform/marketplace:
We can create and build standalone tools
and applications based around each online
identity account, which can provide better
accessibility and showcasing content
and information. It would also bring
enhancements, creativity features which
can be divided as free and premium apps
to users. Morever help in engagement and
promotion of each online identity.
•
Advertising/marketing solutions:
We can provide advertising solutions and
marketing solutions wherein the user can
select which platform to advertise and
also manage and track his ads, spends
and reports. We can also create in line
text based advertising solutions platform
for users to share along with their content
or in built advertise types. In marketing
we can provide push and pull system,
wherein the consumer can push content
related to single medium across multiple
platforms related to that same medium
which would help in better reach and
visibility and can also promote premium
content in multiple locations.
•
Expert management solutions:
We can create an online agency, where
in we provide expert management
solutions, which can helpindividuals/
companies generate leads, reach a large
userbase,larger fanbase,effective writing
to attract other people, creation and
development of professional content and
information, andmaintaining of complete
online portfolios.
•
Security and verification solutions:
We can create innovative security and
verification solutions at both online
and intranet networks based on online
identities verification services, secured
data transfer, copyright and infringement
of data, data encryption services, creation
of user roles and permission based
systems etc.
•
Offline solutions :
We can utilize the same concept in offline
methods like in company intranet centre,
by creation of roles and permission based
access, in mobile phones; manage all
separate contacts of different allotted
numbers. Parental controls on devices
based on children age group and what
they can access and view content, how
long they can stay online and so forth.
These are some of the avenues, in which
we can build & market business around it.
Figure 4: Services can be created:
h t t p : //w w w . f l i c k r. c o m /p h o t o s /
3 4 41 9 1 8 2 @ N 0 8 / 74 8 4741 6 2 2 /i n /
photostream
Conclusion
We hereby bring in a conclusion, until and
unless a centralized organized system
would not be created with an overall
perspective of a users likes and interests
in separate domains, the existing players
would have an impact in retainer ship of
users plus unable to predict the market
cum user growth with upcoming new
players in the future, by showcasing
some examples and scenarios we have
portrayed current issues faced by the end
user in accomplishment of tasks In this
age and time, we need to communicate,
collaborate and co-exist together in order
to avoid this identity crisis. We consider
and note that time is being a very critical
factor in one own life, as half our day is
hooked on the virtual web. We should
move ahead to EaaS (Everything as a
service).It must be consolidated to provide
a seamless, on demand, quick sync, rich
user experience. App developers and
IT companies should take the initiative
in developing key simpler methods
and solutions and provide services
and solutions around online identities
which can greatly impact and help both
companies and platforms share profit and
grow together for both existing and new
CSI Communications | January 2013 | 13
users to make the online a more simple
and easier accessible, rather make things
complicated and confusing. We look
forward in big leaps ground-breaking and
innovating apps around online identities
in the coming future through our work and
development. Making the web simpler
and safer place.
References
[1]
Online Identities
http://en.wikipedia.org /wiki/Online
identity
[2] Who owns your online identity?
http://mashable.com/2011/11/04/
identity-live-blog/
[3] How Many Social Network Identities Is
Too Many?
h t t p : // w w w . n p r . o r g / 2 0 1 1 /
01/14/132934030/how-many-socialnetwork-identities-is-too-many
n
About the Author
Viraat Kothare (BSc Comp, MCTS) is one of the directors at Deluxe Elite Info Solutions Pvt Ltd, Mumbai India. He
is a serial entrepreneur, running a travel firm & IT Solutions Company working on software as service solutions
(SaaS) & Platform as service solutions (Paas) offerings in multiple domains on a single platform. His work is
focused on areas of communication, social media, digitalization, value added services. E-commerce and mainly
into aggregation space.
Continued from Page 7
In general, companies should develop
their understanding of the potential
implications of web 2.0 technologies
and social media for the creation of
competitive advantages. [Fig. 2]
Biblography
About the Authors
[1] Amit, R and Zott, C (2001), “Value
creation in E-business”, Strategic
Management Journal, 22 (6–7), pp.
493–520.
[2] Chesbrough, H “Business Model
Innovation:
Opportunities
and
Barriers”, Long Range Planning, Vol.
43, Issues 2–3, April–June 2010, pp.
354-363.
[3] Cummings, T G and. Worley, C G
(2008), “Organization Development
and
Change”,
South-Western
Cengage Learning, Mason.
[4] Hippel, E V, “Successful industrial
products from customer ideas”, The
Journal of Marketing, 42 (1) (1978),
pp. 39–49.
[5] Huston, L and Sakkab, N (2006)
“Connect and develop”, Harvard
Business Review, 84 (3) (2, pp. 58–66.
[6] Johanson, M W, Christensen,
C C, and Kagermann, H (2008),
“Reinventing your business model”,
Harvard Business Review, Vol. 86,
Iss. 12.
[7] Johnson, M W, Christensen, C M,
Kagermann, H, “Reinventing your
business model”, Harvard Business
Review, 86 (12) (2008), pp. 51–59.
[8] Katz, R and Allen, T J (1982),
“Investigating the Not Invented
Here (NIH) syndrome: A look
at the performance, tenure, and
communication patterns of 50
R and D Project Groups”, R&D
Management, 12 (1), pp. 7–20.
[9] Lumpkin, G T and Dess, G G,
“E-Business Strategies and Internet
Business Models: How the Internet
Adds
Value”,
Organizational
Dynamics, Vol. 33, Iss. 2, May 2004,
pp. 161–173.
[10] McKinsey
Quarterly
(2007),
Mckinsey Quarterly survey of business
executive, “How companies are
marketing online: A McKinsey Global
Survey”.
[11] McKinsey Quarterly (2011), How
Social technologies are extending the
organizations.
[12] Miles, R E, Snow, C C, and Miles,
G (2000), ”The Future.org”, Long
Range Planning, 33(3), pp. 300-321.
[13] Prahalad, C K and Ramaswamy, V
(2004), “Co-creating unique value
with customers”, Strategy and
Leadership, 32 (3), pp. 4–9.
[14] Schneider, B, Brief, A P, and Guzzo,
R A (1996), “Creating a climate and
culture for sustainable organizational
change”, Organizational Dynamics,
24 (4), pp. 6–19.
[15] Teece, D J (2010), “Business models,
business strategy and innovation”,
Long Range Planning, 43 (2–3)
(2010), pp. 172–194.
[16] Wirtz, B W, Schike, O, and Ullrich, S
(2010),”Strategic Development of
Business Models: Implications of the
Web 2.0 for Creating Value on the
Internet”, Long Range Planning, Vol.
43, Iss. 2–3, pp. 272–290.
[17] Yadav, M S and Varadarajan, P R
(2005), “Understanding Product
Migration
to
the
Electronic
Marketplace:
A
Conceptual
Framework”, Journal of Retailing, 81
(2) (2005), pp. 125–140.
[18] Vuori, M (2012), “Exploring use of
social media in a global corporation,
Journal of Systems and Information
Technology, 14 (2), pp. 155-170. n
Dr. Sudhanshu Joshi is the Incharge – Information Technology, Doon University, Dehradun, He has taught in
academic programs in Indian Institute of Technology, Roorkee, University of Petroleum and Energy Studies,
Dehradun and Gurukul Kangri University, Haridwar. He is author of 35 International Research papers and
five books on Technology Management. He has served CSI in various capacities in its Haridwar and
Dehradun Chapter. He is a lifetime member of CSI.
Dr. Manu Sharma is presently serving school of management Institute of Management Studies, Dehradun. She
has vast academic experience in teaching strategic and technology management, her research and academic
interest is web 2.0 and its implications on business revenue.
CSI Communications | January 2013 | 14
www.csi-india.org
I AM
BUILDING
for my future
UPCOMING EXAM DATE
FINAL REGISTRATION DEADLINE: 12 April 2013
8 JUNE 2013
For more information and to register for an ISACA
exam, visit www.isaca.org/myfuture-CSI.
Register by 13 February 2013 and save US $50!
CSI Communications | January 2013 | 15
Article
Avinash Kadam [CISA, CISM, CGEIT, CRISC]
Advisor to the ISACA India Task Force
What Do You Need to Know to Be a
Cybersecurity Professional?
A professional hacker will definitely be an expert in some technical aspects
but will not hesitate to attack anything that is vulnerable, including people
defending the information.
In the October 2011 issue of CSI
Communications, I wrote an article titled,
“Introduction to Information Security –
Defense-in-Depth”. The seven layers that
constituted a strategy for Defense-indepth were described as:
1.
2.
3.
4.
5.
6.
7.
Hardware Security
Operating System Security
Database Security
Application Security
Network Security
Physical Security
Personnel Security
In this article you are reading now, I
will outline the broad areas of expertise
required to become a cybersecurity
professional. Subsequent articles will
explain, in greater details, the areas of
specific knowledge required for specific
jobs in this rapidly developing field.
physical attacker/thief. The only difference
is that the target is critical information
rather than a physical entity. This critical
information could be vital information
operating a critical infrastructure, like
a power grid; or sensitive financial
information, which may ruin a company or
an individual; or even sensitive information
related to national defense.
The Changing Profile of a
Cyberattacker
We have observed a gradual shift in the
cyberattacker’s profile. The earlier image
was that of a geek, who was out to prove
his/her technical prowess. Today, attackers
appear to belong to organized gangs of
criminals, who are after high stakes. The
stakes might be in the form of large amounts
of money held by banks or individuals,
trade secrets or top secret information
Today, attackers appear to belong to organized gangs of criminals, who are
after high stakes.
Who Is a Hacker/Attacker?
An attacker will try to exploit weaknesses
in any of these seven layers. A popular
image of a hacker is someone who is
a technical wizard. However, to quote
the famous cryptographer and security
expert Bruce Schneier: “Always remember:
amateurs hack systems, professionals
hack people”. A professional hacker will
definitely be an expert in some technical
aspects but will not hesitate to attack
anything that is vulnerable, including
people defending the information. An
attacker can be good at just one layer, but a
cybersecurity professional, whose job is to
defend against every attack, needs to have
working knowledge of each of these seven
layers. A cyberattacker is essentially a thief,
robber or enemy, who is after some critical
information, either to steal it, maliciously
tamper with it or outright destroy it. So, a
cyberattacker/thief is no different than a
CSI Communications | January 2013 | 16
of commercial or defense importance.
These may be sold to the highest bidders.
The attackers might be mercenaries on
contract from rival companies. They
could even be state-sponsored attackers
backed by enemy governments. Defending
against such attackers cannot be done by
amateurs. There has to be a well thoughtout plan of action. We need to create a
large pool of well-trained professionals,
who need to either be well-versed across
all the seven layers to provide real and indepth defense or at least have expertise in
one or more layers.
Job Profile of Cybersecurity
Professionals
Hindu mythology believes in the concept
of “Trimurti”. There are three facets of life
– Creation, Preservation and Destruction
– represented by the three gods: Brahma,
Vishnu and Mahesh. Similarly, for cyber
security, we need three different types
of persons with different skill sets. I
have modified the last facet to meet the
cybersecurity profession’s needs:
1.
2.
3.
Planners (Creation)
Defenders (Preservation)
Investigators (Finding the cause of
Destruction)
Planners
These are the professionals who
thoroughly understand the business
aspects and also the information security
or cybersecurity requirements. A “planner”
managing cybersecurity for the nation
will have a national defense perspective.
A “planner” directing cybersecurity
for a large organization will have a
thorough understanding of the business
requirements and its security needs. If
security is implemented without proper
business direction, it will not be effective
and may even be wasteful. So, a planner
needs to know what the business is and
why security is important. The planner has
to be well-informed about all the potential
risks, including the information security
risks that the business may be exposed to.
In addition to business knowledge,
the planner should also be thoroughly
familiar with the seven layers of defense.
It is also highly desirable that the planner
has actual hands-on experience in working
within other security roles; such as being
a defender or an investigator. Having
practical experience will help the planner
identify any weaknesses. Security is
expensive, but lack of security is even more
expensive. There always is a temptation to
cut costs, where security is concerned.
For example, within network security,
the planner will have to understand the
complete extent of the corporate network,
including remote locations connecting via
the Internet; various wireless networks,
including mobile communications; and
To protect against a network attack that could be launched at any time by
anyone from anywhere, a 24/7 vigil is a must.
www.csi-india.org
World War II saw the defeat of the Nazis because their Enigma code was
cracked by a brilliant team of Allies cryptographers and cryptanalysts, led by
Alan Turing.
every entry and exit point to the corporate
network. These entry and exit points need
to be guarded against attacks, including the
denial-of-service attacks. The extensive
deployment of network security devices,
such as firewalls and IDS/IPS, need to be
planned. Logs of all these devices need to
be securely recorded and scrutinized on a
regular basis. The organization needs to
hire and train network security personnel.
Network administrators responsible for
configuring the networks should know all
the loopholes and plug them. To protect
against a network attack that could be
launched at any time by anyone from
anywhere, a 24/7 vigil is a must. Thus the
list of tasks is endless. One single failure
could be disastrous. If nothing happens
for a couple of months, the planner may
be asked to review the security plans and
reduce the vigil. This is where the planner’s
conviction, knowledge and experience will
be tested in making the right decisions.
A planner should also have the
responsibility of implementation and
operation of the cybersecurity initiatives.
Thereby, there will be no passing of
the buck.
Defenders
Defenders are the foot soldiers, who are
in the thick and thin of cyberwarfare. A
defender has to be an exceptionally welltrained person. The defender should be
able to quickly defend if there is an attack
on any of the security layers. The response
time will be very crucial. Only a skilled
defender with a thorough knowledge and
excellent practical experience can provide
adequate defense.
Training should be provided to
defend all the seven layers. However,
though desirable, it is not practical to
expect expertise in all the seven layers
from one person. The defenders may
specialize in one or more layers. For
example, a defender may be well-trained
in the network security layer, but you
may need to hire other defenders for the
application security layer. Since there
are a very large number of programming
languages, this will require very narrow
specialization. A defender who can review
Java code may not be equally good at .Net.
Similar requirements will be there for the
database security layer. Cryptographers
and cryptanalysts will also be part of the
defender team. World War II saw the
defeat of the Nazis because their Enigma
code was cracked by a brilliant team of
Allies cryptographers and cryptanalysts,
led by Alan Turing.
Can the defender become an
attacker? If it is a question of national
defense, the military plays both roles,
depending on the national defense
requirements. But, the same is not the case
with corporations. Business organizations
cannot carry out an attack. They have to
follow the law. However tempting it might
be to fight back, organizations must resist
the urge.
Investigators
This is the third and independent group
of cybersecurity professionals required
by every organization. The cybersecurity
plans may not always be perfect. There
could be lacunae that may be exploited by
the attacker. The planner or the defender
may have overlooked some vital piece of
information. The cyberattacker may have
exploited this weakness. Investigators are
not fault finders. They are expert analysts,
who try to find the root cause for every
incident. The investigators need to have
enough experience as defenders to be
able to do their job well. The investigator’s
job is to bring out the lessons learned
from every attack and help defenders and
planners strengthen their preparation.
An investigator should also carry
out the role of an information assurance
professional. In this role, the investigator
will have to reassure management that
the design of the particular security layer
meets the planned requirements and the
preparedness of the defenders is of the
An investigator should also carry out the role of an information assurance
professional. In this role, the investigator will have to reassure management that
the design of the particular security layer meets the planned requirements and
the preparedness of the defenders is of the requisite quality.
requisite quality. I have deliberately merged
the two roles, again, to prevent buckpassing. If an information assurance person
has given a clean chit, as an investigator,
the same person has to identify why some
aspect of security was overlooked.
Investigators
also
have
the
responsibility to conduct a criminal
investigation of every incident suspected
to be caused by some criminal activity.
Such investigations will require knowledge
of cyber forensics. The investigator will
have to trace the perpetrator of the criminal
activity and capture all the evidence
required to prove the criminal act.
How Does One Prepare for
These Careers?
Skill sets and knowledge areas for a
planner’s, defender’s or investigator’s
job will be discussed in future articles.
Currently, cybersecurity is not a focus of
regular courses offerings in colleges and
universities. Most of the cybersecurity
professionals are either self-taught or they
have learned on the job. This situation
needs to be urgently corrected.
Furthermore, some courses that are offered
on cybersecurity are excessively focused
on hacking. At the most, one can become
proficient in using a hacking tool; which is an
offensive tool, not a defensive tool. Learning
hacking techniques does not prepare one
to become a good defender. Learning to
use a sword is not the same as learning to
use a shield. In fact, a good defender should
learn both. To become a cybersecurity
professional, one has to understand the
defense-in-depth approach.
The cybersecurity field is forever
changing at a superfast pace and so is the
technology associated with it. Therefore,
a good cybersecurity professional has to
constantly upgrade his/her knowledge
and skills. Cyberattackers are constantly
changing their tactics. Cybersecurity
professional have to be at least equal
in competence, if not ahead of the
cyberattackers.
Avinash Kadam, CISA, CISM, CGEIT,
CRISC, CISSP, CSSLP, GSEC, GCIH,
CBCP, MBCI, PMP, CCSK, is an advisor
to ISACA’s India Task Force. ISACA is a
global association for IT professionals.
Opinions expressed in the blog are
Kadam’s personal opinions and do not
necessarily reflect the views of ISACA.
He can be contacted via e-mail avinash@
awkadam.com n
CSI Communications | January 2013 | 17
Article
Suryateja Tadigadapa
12th Grade student of Pace Junior College
Making Big Data Work to Solve Big Problems
With the advent of social media, we have a platform to share our
thoughts with many people, share videos, do instant messaging as
well as seek response of thousands of friends and relatives.
Few years back as a kid, my opinion
about phones was that they are used
only for a specific purpose of conversing
with people, living far away as well as
nearby. Even a thought of using of phone
makes me amazed by the fact that
while sitting at my own house I could
talk to someone thousands of miles
away. It was the flexibility and instant
information that made me excited in
those days. Now when I look at the world
around me and compare it to the world
in those days ( about 8 years ago), one
thing that has a significant relevance
company to position its products, plan
and structure for education system
based on preferences of people, enabling
preventive health care in rural etc.
I personally feel that with the
proliferation of the devices, social
networking and data collection is leading
to challenges of using these unstructured
data and presenting opportunities to find
information that can lead to efficiencies
and new inventions.
If I look at the characteristics of these new
data, there are three things that are of
critical importance:
Usage of data can be multi fold and offer enormous opportunities,
e.g. new fashion trends that can help a consumer company to position
its products, plan and structure for education system based on
preferences of people, enabling preventive health care in rural etc.
is the tremendous amount of data and
information flow on the Internet. Now,
the same phone is able to provide us not
only voice but Internet capabilities to
search a requisite piece of information.
With the advent of social media, we have
a platform to share our thoughts with
many people, share videos, do instant
messaging as well as seek response
of thousands of friends and relatives.
One thing that strikes me is that the
whole flow of information and data that
is gathered has the ability to deduce
information that can help to make
products, which can arrange from soaps
to complex products such as a tablet or
even new generation computing device.
Usage of data can be multi fold and
offer enormous opportunities, e.g. new
fashion trends that can help a consumer
1.
2.
Volume: Now, I understand that every
day we create 2.5 quintillion bytes of
data - so much that 90% of the data
in the world today has been created
in the last two years alone! This data
comes from everywhere: sensors
used to gather climate information,
posts to social media sites, digital
pictures and videos, purchase
transaction records, and cell phone
GPS signals to name a few. Now with
data coming from different sources
like social networking and video on
Internet the data is becoming more
unstructured.
Second is Velocity: The rate of flow
of information is very high whether
it is instant messaging, tweets or
millions of videos on the Internet and
this data is also changing constantly.
I personally feel that with the proliferation of the devices, social
networking and data collection is leading to challenges of using
these unstructured data and presenting opportunities to find
information that can lead to efficiencies and new inventions.
CSI Communications | January 2013 | 18
Sometimes a few seconds is too late.
For time-sensitive processes such
as catching fraud, data needs to be
analyzed as it streams in order to
maximize its value.
3. Variety: Data is getting originated
not only from the data residing on
the computer, but from multiple
sources such as social networking
sites, sensors that register power,
temperature, video files and many
more.
For a very long time barring last few
years, structured data was available in
digital format within the boundaries of
an entity, be it a corporate, a research
institution, or a service provider. Hence,
the technologies required to analyze these
data are technologies needed to be based
on structured, repeatable tasks based
relational database systems.
Now given the three dimensional view of
the data like Volume, Velocity, and Variety
we need new technologies to deduce
information from these vast amounts
of unstructured data to make decisions.
The reason is that data sets are just not
numeric, they can be alphanumeric,
images, audio, video, scanned form etc.
This leads to the challenge of managing
larger and complex data sets, which is
now known as Big Data.
I sincerely feel that Big Data is an
opportunity to solve big problems facing
the world, especially in developing
countries today.
•
For example, I was traveling to Odisha
to visit the famous Konark temple.
My aunt lives in a taluk in Nayagarh
district near Bhubaneswar and my
uncle, a state agriculture officer told
me that the small farmers in that
area are able to improve agriculture
productivity and grow more crops by
simply having access to soil testing
parameters through a service being
provided by an entrepreneur owning a
computer with soil-testing machine.
Imagine the benefits of mapping the
entire agriculture land in India and
sharing best practices from the good
work done by research institutes,
NGOs, and Government throughout
the country through a common data
www.csi-india.org
For a very long time barring last few years, structured data was
available in digital format within the boundaries of an entity, be it
a corporate, a research institution, or a service provider. Hence,
the technologies required to analyze these data are technologies
needed to be based on structured, repeatable tasks based relational
database systems.
hub. Our country has 700 million
small farmers contributing to 18%
of GDP and we can well imagine the
benefits.
Another application area for Big Data
is renewable energy. Making wind a
reliable source of energy depends
greatly on the placement of the wind
turbines used to produce electricity.
We can determine the optimal
turbine placement using weather
forecasts and data from operational
wind power plants to create hourly
and daily predictions regarding
energy production. Similarly a wind
library, which incorporates data from
global weather systems with data
collected from existing turbines helps
us to choose the best site for turbine
placement, help forecast wind and
power production.
We daily hear thousands getting
affected by viruses across the
country. By collecting, consolidating,
•
•
•
•
and analyzing health data from
diverse collection points across
primary health centers, clinics and
data collected by Auxiliary nurse mid
wives (ANMs) we can discover, track,
and assess disease trends early and
then make operational adjustments
in resources, capacities and target
our health programs to address them.
For medical researchers, data can
help surface subtle relationships
between symptom and ailment,
between patient and predisposition,
between actual predictive indicators,
and reactive symptoms.
Big data technology also provides
law enforcement opportunities the ability to analyze data from a
multiplicity of data sources and
correlate and vector activities to
provide an overview of activities.
Apply data and text analytics and
the ability to see activities whose
relationships may multiple degrees
There are technologies that meet these capabilities which can be
deployed to manage the constantly evolving data which we call Big
Data. There are challenges as well in ensuring data integrity and
effort needed to collect these data, but it will be worth investing to
enable the country to solve the big problems in energy, education,
and health.
of separation. The technology is
providing law enforcement the
capability to employ predictive
analytics - and thus the ability
to make “intelligent predictions”
based on criminal activity. This
unprecedented ability gives law
enforcement the potential to become
proactive in their efforts by possible
prevention of criminal activity before
its occurrence.
However, to implement systems to dissect
such data poses challenges. These data
sets are very large and complex that
they become difficult to work with using
existing on-hand database management
tools. The system to handle these data
which is constantly evolving and growing
rapidly needs core capabilities such as:
Data processing: processes and analyzes
any data type across server clusters that
are scalable.
Data Warehousing: delivers deep
operational insight and analytics.
Information Integration: understand,
cleanse, and deliver trusted information.
The fourth one is the ability to process
data as it streams in real time.
There are technologies that meet these
capabilities which can be deployed to
manage the constantly evolving data which
we call Big Data. There are challenges as
well in ensuring data integrity and effort
needed to collect these data, but it will
be worth investing to enable the country
to solve the big problems in energy,
n
education, and health.
Kind Attention: Prospective Contributors of CSI Communications Please note that cover themes of future issues of CSI Communications are as follows •
•
February 2013 – Programming Language Paradigms
March 2013 - e-Libraries
The articles and contributions may be submitted in the following categories: Cover Story, Research Front, Technical Trends,
and Article.
For detailed instructions regarding submission of articles, please refer to CSI Communications April 2012 and/ or CSI
Communications September 2012 issue.
[Issued on behalf of Editors of CSI Communications]
CSI Communications | January 2013 | 19
Software Development Competition
on
Tablet
All are welcome to participate...
Android experts are welcome
We also invite Linux Enthusiasts
For more information, please visit
http://AakashLabs.org/compete
Aakash is an initiative of
National Mission on Education through ICT,
MHRD, Government of India,
Currently being executed by IIT Bombay
CSI Communications | January 2013 | 20
IIT Bombay
www.csi-india.org
Article
Kannan M Moudgalya & D B Phatak* and N K Sinha & Pradeep Varma**
*Indian Institute of Technology Bombay
**National Mission on Education Through ICT, MHRD
Genesis of Aakash 2
On 2 Feb. 2009, the then Human
Resource Development Minister Shri
Arjun Singh inaugurated at Tirupati the
National Mission on Education through
ICT (NMEICT) with an outlay of Rs. 4,612
crore, equivalent to one billion US$ at the
prevailing exchange rates. Out of this sum,
about 60% was allocated to provide good
bandwidth to universities and colleges
and the remaining was meant for content
development and a low cost access
and computing device. The objective
of this mission was to raise the levels of
education in India. It was an initiative
of the Department of Higher Education,
MHRD, Government of India.
The National Programme on
Technology Enhanced Learning (NPTEL)
had just completed the first phase with
instructional material on 240 courses.
This success had demonstrated that it was
possible for the educational institutions
to work together to deliver products of
common good.
The team behind NMEICT believed
that a lot could be done for education
using information and communication
technologies. There was a need to
develop NPTEL like courses for all subject
areas: science, arts, social sciences
and commerce, by the best people
from all universities and colleges. To
support theory, and to increase the
motivation levels, virtual labs and robotic
devices were proposed. In order that
the technologies and the content are
accessible to everyone, use and promotion
of open source software was mandated.
To stream the content, extensive plans
were drawn up to provide bandwidth. A
low cost access device was proposed as
the delivery vehicle.
Statistics revealed that a large
number of college going students spent
two hours or more in travelling to the
place of study every day. At least a few
of them would be interested in using that
time for learning purposes. If recorded
educational videos were available on a
tablet device, the students could listen
to them while travelling between their
homes and colleges.
It was not necessary to spend money
on software development specific to the
device, such as a unique operating system
- Android or Linux should do. The operating
cost could also be kept low by avoiding the
use of proprietary software packages. A
rich software ecosystem could be provided
through the promotion of open source
software. Necessary funding to train the
students and faculty on the use and creation
of open source software could be provided
separately through the content development
budget head.
Having a computing system on the go
would allow students to try out their ideas
even while on the move or during a group
discussion, etc. Such a device should allow
students to validate their ideas through
small programs, which if worked, could be
transferred through a cloud to a high-end
computing system.
It should be possible to use this
instrument as an access device, for
getting on to the Internet, for browsing
and for writing emails. It should be
possible to open and read documents
created
in
standard format,
such as pdf, odt
and doc. It should
be possible to use
this device for
entertainment:
to play games or
watch videos.
S u b j e c t
to
the
above
requirements, the
device should be
at the lowest cost
possible, so that
a large number of
students could easily be accommodated,
in case of subsidized distribution
programs.
It was felt that a tablet based on a low
cost ARM processor could meet all the
above mentioned requirements. Instead
of going to the latest, one could profitably
use the components that were just past
their prime, as these provide the best
performance to price ratio.
Experts from IITs, IISc and the
industry helped the government arrive at
the specifications for the proposed low
cost access and computing device. It was
estimated that the bill of materials for the
absolute minimum configuration required
to meet the above capabilities would be
about $35. It should be possible to get
such a device for sub $50 to start with and
eventually to sub $20 levels. The already
existing solutions like the one laptop per
child would have cost in excess of $150
and hence would have been prohibitively
expensive, given the hundreds of millions
of students in India.
The task would be entrusted to a group
of educational or research institutions,
led by an Indian Institute of Technology.
This IIT would place an order for 100,000
devices based on a global tender. It would
verify whether the proposed hardware
configuration was sufficient to make
the instrument a reasonable computing
and access device. It would arrive at this
conclusion by testing this device at a large
number of educational institutions. In
this process, this IIT would also establish
a huge ecosystem in many colleges and
universities, required to port and support
the software that would eventually run in
the device.
Unfortunately, almost no one
believed that the proposed low cost model
was viable. The then prevailing high costs
of tablets made many to disbelieve the
proposed approach. Some even went to the
extent of casting aspersions on the people
behind this project. Vested interested
groups that stood to lose by the success
of this project were the other adversaries.
As it involved mostly developmental work
and not basic research, most institutions
were reluctant to lead this project. Even
those who had the necessary background
and interest in such a project were busy
CSI Communications | January 2013 | 21
with prior commitments.
IIT Rajasthan was the only institution
that was ready to give this project a try. IIT
Rajasthan followed an open tender process.
A three step process was followed to
evaluate the bids that were received. First,
a committee scanned all bids to check
their eligibility based on the conditions
specified in the tender. Next, a technical
evaluation committee comprising eminent
academics and industry experts evaluated
the eligible bids. In the third stage, the
bids that were found technically suitable
underwent financial scrutiny to identify
the lowest bidder. The company Datawind
emerged as the lowest cost bidder. On
further negotiations, Datawind agreed to
supply these devices at a landed price of
$49.98. Custom and excise duties would
be waived.
The device that Datawind agreed to
supply had the following specifications:
366 MHz Conexant ARM 11 processor, 7”
resistive touch screen, 256 MB RAM, two
USB ports and wifi.
Many criticized the Government for
holding on to the price point of $50 when
the idea of low cost access device was
contemplated. It should be pointed out
that there is no correlation between the
selling price and the cost of production
in the electronics industry. If the Government were not stubborn, the price would
easily have escalated. The sub $50 order
resulted in a saving of at least $50 per
device and hence a net saving of about
Rs. 25 crore, even on an order of 100,000
units. The savings would be a lot more
when millions of students are covered.
CSI Communications | January 2013 | 22
It should be pointed out that no
established manufacturer in the field of
computer tablets or CPUs was willing to
participate in this activity either directly
or indirectly. There were two reasons: if
the project went awry, their reputation
would take a hit. If on the other hand it
was a success, the margins in their other
product lines could be severely affected.
On the other hand, for a new or a
first generation entrepreneur, the loss of
profitability of an existing product line was
not applicable. They would also go for the
most efficient way to produce the goods
as the margins were small. The possible
establishment of their brand would be the
driving force to take the necessary risks.
The low cost access and computing
device was christened Aakash and was
launched on 5 Oct. 2011 by the then
Human Resource Development Minister,
Shri Kapil Sibal.
Unfortunately, however, differences
between Aakash and what people
expected it to be arose. The public
compared this device with the ones
available in the market, which were
several times more expensive. On the flip
side, the latter, although expensive, were
only access devices, but not computing
instruments.
In order to bring Aakash closer to
people’s expectations, the specifications
were redrawn in a meeting held between
MHRD, IIT Rajasthan and Datawind in Nov.
2011. In this meeting, Datawind agreed to
provide a capacitive touch screen in lieu
of the resistive screen. They also agreed
to provide the tablet at Rs. 2,276, the
rupee equivalent of $49.98 on the day the
purchase order was placed. This would
more correctly account for the delays,
while protecting against the fluctuations
in the exchange rates. This new improved
device was christened as Aakash 2.
In Feb. 2012, IIT Rajasthan informed
MHRD that they would like to withdraw
from the project. We have already
explained the kind of work expected of
IIT Rajasthan. Being a new IIT without
sufficient faculty strength and with
a temporary campus, it was possibly
proving to be difficult to handle this
project. Expectation management was an
unexpected, additional, headache.
By that time, several NMEICT
projects were functioning very successfully
at IIT Bombay. The e-Yantra project had
produced several versions of educational
www.csi-india.org
robots and had trained many college
teachers and students. The OSCAR team
came up with several 3D animations that
could be used for instructional purposes.
The design content creation project of
the Industrial Design Centre created a lot
of the state of the art content in the area
of design. The virtual labs project had
many simulation and remote triggered
experiments. The FOSSEE project had
created good eco-systems for open source
software, such as Scilab, Python, Open
FOAM for computational fluid dynamics,
OSCAD for electronic circuit simulation
and GNUKhata for accounting. The live
recording of regular courses of IIT Bombay
was ready to be delivered through a web
portal. The Spoken Tutorial project was
training tens of thousands of students
through open source software workshops
in hundreds of colleges, free of cost. Many
high quality spoken tutorials were also
created by this project. The benefits of
all of these projects could be delivered
through Aakash.
The
1,000
teacher
training
programme
activity,
also
funded
through NMEICT, was possibly the most
appropriate one to test Aakash. The
Remote Centres of this programme would
be the natural testing ground for Aakash.
It would be possible to teach thousands
of teachers simultaneously on the use
of Aakash, software development and
support. All the thousands of teachers
trained through this programme could be
called upon to test Aakash and to give
their feedback. Many students in these
colleges could be encouraged to carry out
their final year project using Aakash.
More than 200 staff members were
working in all the NMEICT projects at IIT
Bombay. As all the NMEICT projects at
IIT Bombay had achieved a substantial
part of their targets, they could be
called upon to transfer the fruits of their
projects to Aakash.
In March 2012, the Aakash project
was transferred to IIT Bombay, with CDAC
as its testing partner.
As IIT Rajasthan selected Datawind
through due diligence, following all
CAG norms, IIT Bombay decided
to procure Aakash 2 from the same
vendor. Starting a new tender would
have delayed the project by six months
to one year. IIT Bombay negotiated with
Datawind once again and froze the prices
at Rs. 2,263. The specifications of this
device are given below: 800 MHz ARM
Cortex A8, 256 MB RAM, 2GB NAND
flash, 2GB SD card, 7” display with
800x480 resolution, four point multitouch projective capacitive touch panel,
Android 2.3 or later. The purchase order
was issued on 4 May 2012. Datawind
was supposed to complete the delivery
of 100,000 units by 31 October 2012.
On testing the devices supplied by
Datawind, it was found that the CPU of
the device and the Android 2.3 OS that
ran on it were not stable. It was required to
reset the system very often. The 256 MB
RAM that came with the device was not
sufficient to port many applications.
In July 2012, Datawind agreed to
upgrade the device to a better one without
any cost escalation. The new device would
have 512 MB RAM, 1GHz ARM Cortex A8
processor, Android 4.0 operating system
and a gravity sensor, all upgrades over the
purchase order issued by IIT Bombay in
May 2012. On testing, it was found that
the new device was a lot more stable than
the previous one, because of the upgrades
in the hardware and the software. The
software team at IIT Bombay also found
this device to be a lot easier to port
software on to.
The extra time that Datawind had
between Aakash 1 and the improved
Aakash 2 helped it iron out the raw edges
and to give a much better product. This
is true of any new product development
project: there are always a lot of
shortcomings during the learning curve
and once the problems are rectified, the
product becomes a much better one.
Datawind was also given an extension as
this was a completely different tablet and
hence, tooling, etc., had to be re-done.
During the past six months, a lot of
software development work around
Aakash has taken place at IIT Bombay
and its remote centres. This work can be
classified into five categories:
1. Porting of instructional videos and
associated ecosystem: NPTEL videos
and the video recordings of class
room lectures at IIT Bombay are
now available on Aakash. The 3-D
educational animations created by
OSCAR and the spoken tutorials
are also available on Aakash. While
watching a video, one can “ask a
question”, which gets lodged in a
2.
3.
4.
5.
forum and gets answered during a
one hour live session every week.
IIT Bombay has been running this
AAQ activity for more than two years
in electrical engineering. An open
source software PROXIMITY that
helps access videos on the basis of
tags is also available on Aakash.
Porting of text books and research
monographs in e-pub format to
Aakash: Work is underway to port
NCERT textbooks on to Aakash. As
the screen size of Aakash is small,
one may have to zoom the contents,
which would make page width exceed
the size of the screen, resulting in
scrolling to read every line. The e-pub
format re-flows the lines so that the
entire text fits within the width of the
screen. The current plan is to port
the textbooks of all school boards.
The same activity can be extended to
college level textbooks and research
monographs that are freely available,
an example being the IGNOU
content.
Programming
and
simulation
environments: C, C++, Python,
Scientific Python, PHP, Perl, R and
Scilab have been ported to Aakash.
Accessing external hardware from
Aakash: Aakash has been used to
control robots developed through
the e-Yantra project. We have been
able to access virtual labs and the
physics experimental kit expeyes.
Work is underway to build a low cost
alternative to ECG systems using an
Aakash based sensor system. Work
is also underway to build a low cost
microscope using Aakash and an USB
web camera.
Porting of Linux: We have been
successful in porting different
flavors of Linux to Aakash. We
have Ubuntu 12.0 running in native
mode on Aakash. The performance
of some applications is better in
Linux, compared to Android. For
example, the Scilab port on Android
is through a chroot environment, with
associated communication delays
between the operating systems. On
the Linux side, however, Scilab runs
in native mode, resulting in a much
better performance.
We will describe these in a future article. It
should be pointed out that the philosophy
Continued on Page 29
CSI Communications | January 2013 | 23
Practitioner
Workbench
Wallace Jacob
Sr. Asst. Prof. at Tolani Maritime Institute
[email protected]
Programming.Tips() »
Fun with ‘C’ Programs
The article attempts to dwell on the concept
of union in ‘C’ language.
A declaration like:
union ex
{
int num1;
char c1[4];
char x;
} var1;
implies that four bytes will be reserved for
the variable var1 (assuming that an integer
is being stored in four bytes and a character
requires one byte for storage).
For simplicity, let us assume that the
four bytes have been allocated as depicted
in Fig. 1 below:
3215172627
3215172626
3215172625
3215172624
⇑
Cell
⇑
Cell addresses
(implementation dependent)
If an integer is assigned to var1.num1, then
it will be stored in these four bytes, if a
character is assigned to var1.x then it will be
stored in one of these four bytes, and the array
elements of the single dimensional array var1.
c1 will also be stored in the same four bytes
which have been reserved for num1. So how
are the values actually stored? The program
and its output below answer the aforesaid
question (the lines have been numbered for
easy readability):
Program listing one
1 #include<stdio.h>
2
3 union ex
4 {
5 int num1;
6 char c1[4];
7 char x;
8 };
9
10 main()
11 {
12 union ex var1;
13
14 printf(“\nsizeof(char)=%d”, sizeof(char));
15 printf(“\nsizeof(int)=%d”, sizeof(int));
16 printf(“\nsizeof(var1)=%d”, sizeof(var1));
17
18 var1.num1=1145258561;
19
20 printf(“\nvar1.num1=%d”, var1.num1);
21 printf(“\nvar1.c1[0]=%c”, var1.c1[0]);
22 printf(“\nvar1.c1[1]=%c”, var1.c1[1]);
23 printf(“\nvar1.c1[2]=%c”, var1.c1[2]);
24 printf(“\nvar1.c1[3]=%c”, var1.c1[3]);
25 printf(“\nvar1.x=%d”, var1.x);
CSI Communications | January 2013 | 24
26
27 var1.c1[0]=’Z’;
28 printf(“\nvar1.num1=%d”, var1.num1);
29 printf(“\nvar1.c1[0]=%c”, var1.c1[0]);
30 printf(“\nvar1.c1[1]=%c”, var1.c1[1]);
31 printf(“\nvar1.c1[2]=%c”, var1.c1[2]);
32 printf(“\nvar1.c1[3]=%c”, var1.c1[3]);
33 printf(“\nvar1.x=%d”, var1.x);
34
35 var1.c1[0]=’a’;
36 var1.c1[1]=’b’;
37 var1.c1[2]=’c’;
38 var1.c1[3]=’d’;
39 printf(“\nvar1.num1=%d”, var1.num1);
40 printf(“\nvar1.c1[0]=%c”, var1.c1[0]);
41 printf(“\nvar1.c1[1]=%c”, var1.c1[1]);
42 printf(“\nvar1.c1[2]=%c”, var1.c1[2]);
43 printf(“\nvar1.c1[3]=%c”, var1.c1[3]);
44 printf(“\nvar1.x=%d”, var1.x);
45
46 printf(“\n&var1.num1=%u”, &var1.num1);
47 printf(“\n&var1.c1[0]=%u”, &var1.c1[0]);
48 printf(“\n&var1.c1[1]=%u”, &var1.c1[1]);
49 printf(“\n&var1.c1[2]=%u”, &var1.c1[2]);
50 printf(“\n&var1.c1[3]=%u”, &var1.
c1[3]);
51 printf(“\n&var1.x=%u”, &var1.x);
52
53 return 0;
54}
A
sample
output
(implementation
dependent) of the program is given below:
sizeof(char)=1
sizeof(int)=4
sizeof(var1)=4
var1.num1=1145258561
var1.c1[0]=A
var1.c1[1]=B
var1.c1[2]=C
var1.c1[3]=D
var1.x=65
var1.num1=1145258586
var1.c1[0]=Z
var1.c1[1]=B
var1.c1[2]=C
var1.c1[3]=D
var1.x=90
var1.num1=1684234849
var1.c1[0]=a
var1.c1[1]=b
var1.c1[2]=c
var1.c1[3]=d
var1.x=97
&var1.num1=3215172624
&var1.c1[0]=3215172624
&var1.c1[1]=3215172625
&var1.c1[2]=3215172626
&var1.c1[3]=3215172627
&var1.x=3215172624
Statements 14 to 16 have been included only
to ascertain the amount of storage space (in
bytes) which few of the different data types
(basic and user-defined data types in this
program) may require. In line no. 18 when the
integer 1145258561 is being stored in var1.
num1, one possible internal representation
(out of several possible representations)
might be as follows:
68
3215172627
67
3215172626
66
3215172625
65
3215172624
When var1.num1 is being printed the
following computation is being performed:
65 + (66 * 256) + (67 * 65536) + (68 *
16777216) which yields 1145258561.
Since this program has been executed on
a machine which is using ASCII codes,
therefore when the values of the character
array var1.c1 are being printed the characters
whose ASCII codes are 65, 66, 67, and 68 are
printed.
The effect of statement number 27
when ‘Z’ is being assigned to var1.c1[0],
might be visualized as follows:
68
3215172627
67
3215172626
66
3215172625
90
3215172624
Thus, when var1.num1 is being printed through
statement 28, the output is 1145258586
[=90 + (66 * 256) + (67 * 65536) + (68 *
16777216)].
The effect of statements 35 to 38
wherein ‘a’, ‘b’, ‘c’, and ‘d’ are being assigned
to var1.c1[0], var1.c1[1], var1.c1[2], var1.c1[3]
respectively, might be visualized as follows:
100
3215172627
99
3215172626
98
3215172625
97
3215172624
Thus, when var1.num1 is being printed through
statement 39, the output is 1684234849
[=97 + (98 * 256) + (99 * 65536) + (100
* 16777216)]. For a deeper understanding
of how the members of union variable var1
are being stored, their addresses are printed
through statements 46 to 51.
[A word of caution: In general, a member of
a union should be examined/worked on only
if the union has been assigned a value using
the same member.]
n
www.csi-india.org
Practitioner
Workbench
Umesh P
Department of Computational Biology and Bioinformatics, University of Kerala
Programming.Learn (“Python”) »
‘Regular Expression’ of Python
If you are working with text you may need to search or identify a specific
string or particular pattern. In programming, this is usually done by regular
expression commands. The term ‘regular’ is borrowed from the definition
of formal language. Some of the problems like validating email and/or
password, extracting some specific section from HTML or XML file, Parsing
a text and saving in a database, replace a specific pattern with another text,
etc. can easily and effectively be tackled by regular expression commands.
Python is excellent in manipulating textual data. There are many built
in functions to manipulate text in Python. Let us see some of them.
str1='cell'
str1.replace('c', 's')
## To replace ‘c’ with ‘s’
str1[:2]
## To print first two letters
str1[1:]
## To print letters after first letter
str1.count('l')
## To count letter ‘l’
str1.find(‘l’)
## To find letter ‘l’
str1.lower()
## To convert all letters into small letters
str1.upper()
## To convert all letters into capital letters
str1.title()
## To convert all letters into title case letters
str1.rjust ( 20 )
## To move string to 20 pt right
str1.ljust ( 20 )
## To move string to 20 pt left
Python also supports format strings, by which you can pass a number by
using operator %. This is called formatting operator. %s is used to pass
string and %d is used to pass a digit.
"Today is %s January, of %d" % (‘first’, 2013)
Regular expression module in Python adds much more functionality to
Python.The regular expression module can be imported in Python by using
the command ‘import re’
import re
pattern = 'Year'
text = 'Happy New Year'
match = re.search(pattern, text)
s = match.start()
e = match.end()
print 'Found "%s" in "%s" from %d to %d ("%s")' % (match.
re.pattern, match.string, s, e, text[s:e])
Program 1
The output of the above program is
Found "Year" in "Happy New Year" from 10 to 14 ("Year")
Here match.re.pattern refers to the pattern which is to be matched
and match.string refers to the match obtained after the search. The
commands - match.start() and match.end() gives the start and end
position of the string where the match is found. Also we can easily extract
the string from the text by using the syntax text[s:e]
Now let us see how a pattern from a long text can be found by using
the Python regular expression.Try the following program:
import re
text = 'abbabababbbbaaaaa'
pattern = 'ab'
for match in re.findall(pattern, text):
print 'Found "%s"' % match
Program 2
See another program which finds wherever the symbol percentage (%) is
present
This program [Program4] searches the text ‘abc’ or ‘cde’or ‘fgh’ or
‘ijk’ or ‘ml’ in the string which you would like to search using the regular
expression pattern match.
In each of the above examples, we have used different regular expression
commands- re.match, re.search(), re.findall, and re.compile.
There is some difference between these commands. For a given string
and a pattern re.match checks if there is some matching pattern in the
string from the beginning of the string, whereas re.search() checks for a
match anywhere in the string. The expression, re.findall returns a list of
matches, from the documentation.
The power of regular expression is you can do complicated search
and string processing by using two or three lines of codes. The very basic
application of regular expression is matching a single character, which is the
simplest of the kind. That is to find whether a particular letter is present in
a sentence. We can also match particular set of alphabets by using square
brackets (For example, [a-z], this is called matching "character classes.")
We can compare with more complex pattern by using particular
symbols and operators. Also grouping of strings by using braces are done
for better abstraction. The regular expression for zero or more is “*”; and
one or more is denoted by "+"; zero or one is indicated by “?”
string= "hello66666666world"
ifre.search("hello([d-w]*\d\d?)+world", string): print "Match!"
Program 5
In the above program, we are interested only on the first and last part of
the string
To validate an email ID, different methods have been used. Let us use
regular expression to find whether a particular Email ID is valid or not.
import re
def validate(email):
if
re.match("^.+\\@(\\[?)[a-zA-Z0-9\\-\\.]+\\.([a-zA-Z]
{2,3}|[0-9]{1,3})(\\]?)$", email):
return "This is a correct E-mail ID"
return "This is not a correct E-mail ID"
Program 6
Regular expressions can be extended to find a particular string in a huge
text file, or find pattern of text. Linguists and Bioinformaticians (regular
users of regular expression) can exploit the potential of Python and regular
expression modules.
Regular
expression
Usage
^
To match the beginning of a string
$
To match the end of a string
*
To match whether the pattern is repeated zero or more
+
To match whether the pattern is repeated one or more
\b
To match a word boundary
\d
To match any numeric digit
\D
To match any non-numeric character
\s
To match anywhitespace character (blank space, tab, etc.)
import re
data= 'Reservation is 30% not in 13%'
find_percentage = re.compile('\S+%')
printfind_percentage.findall(data)
Program 3
\S
To matchany non-whitespace character
\w
To match any alphanumeric character and the underscore
(a|b|c)
To match exactly one of a, b or c
In program3, re.compile, compiles the regular expression pattern into a
regular expression object, which can be used for matching pattern by ‘
match()’, ‘search ()’ and ‘findall()’methods.
{n}
Match Exactly n times
x{n,m}
To match character x, at least n times, but not more than
m times.
data='abc’
## Try different values for data
‘cde’,‘fgh’etc
Regex1 = re.compile('^(abc|cde|fgh|ijk|ml)+$')
print Regex1.findall(data)
Program 4
Table 1: Some of the regular expression symbols
n
CSI Communications | January 2013 | 25
Security Corner
Adv. Prashant Mali [BSc (Physics), MSc (Comp Science), LLB]
Cyber Security & Cyber Law Expert
Email: [email protected]
Information Security »
Can You Keep Your Emails Secret? Lawfully?
I can give this to you, most people don’t
have the CBI/RAW/IB sniffing through
their personal e-mails, but people grossly
underestimate how transparent their
digital communications have become.
Anyone can read your e-mails because it’s
so easy to do.
What people don’t realize is that
hacking and spying went mainstream a
decade ago, They think hacking is some
difficult thing. Meanwhile, everyone is
reading everyone else’s e-mails girlfriends
are reading boyfriends, bosses are reading
employees, Parents re reading children’s or
vice versa because it’s just so easy to do.
True fact is no matter what you are
trying to hide in your e-mail in-box or text
message folder be it an extramarital affair
or company trade secrets it is possible
that someone will find out. If it involves
criminal activity or litigation, the odds
increase because the government has
search and IT Act, 2000 powers that can
be used to get any and all information,
whether it is stored on your laptop or, as is
more likely these days, stored in the cloud.
There are legitimate reasons that
people want to keep private all types of
information and communications that
are not suspicious (like old letters. the
contents of will, or a chronic illness). In
that case, here are your best shots at
hiding the skeletons in your digital closet.
Understanding the threat is always
the most difficult part of security
technology, for example in the US army
officer case, If he had believed the threat
to be a government with the ability to get
his login records from a service provider,
not just their spouse, he might have acted
differently.
To hide their affair from their
spouses, the two reportedly limited their
digital communications to a shared Gmail
account. They did not send e-mails,
but saved messages to the draft folder
instead, ostensibly to avoid a digital trail.
It is unlikely either of their spouses would
have seen it.
But neither took necessary steps to
hide their computer’s I.P. addresses
HIDE YOUR LOCATION: You can mask
your I.P. addresses using TOR, a popular
privacy tool that allows anonymous Web
browsing. You can also use a virtual private
network, which adds a layer of security to
CSI Communications | January 2013 | 26
public Wi-Fi networks like the one in your
hotel room.
E-mail providers like Google and
Yahoo keep login records, which reveal I.P.
addresses, for 18 months, during which
they can easily be asked for data legally. A
letter on the letterhead of DCP / SP of the
police to network service providers can
reveal lot of individual data.
Requests for Google to hand over
user info from governments around the
world grew from 18,257 in the last half of
2011, to 20,938 in the first half of 2012.
Those requests have been rising steadily
since Google introduced the Transparency
Report back in 2009, but it’s beginning
to look like the growth rate of requests is
accelerating.
disappears. But there is always the chance
that your recipient captured screenshots.
GO OFF THE RECORD: At bare minimum,
choose the “off the record” feature on
Google Talk, Google’s instant messaging
client, which ensures that nothing typed
is saved or searchable in either person’s
Gmail account.
PLEA OF ALIBI: Under Section 11 of The
Indian Evidence Act, then there is the
obvious problem of having to explain to
someone why you are carrying a cell phone
or suddenly so knowledgeable about
encryption technologies. Sometimes the
sneakier you are, the weirder you look.
ENCRYPT YOUR MESSAGES: E-mail
encryption services, like GPG(GNU
Privacy Guard), help protect digital
secrets from eavesdroppers. Without an
encryption key, any message stored in
an in-box, or reached from the cloud, will
look like gibberish. The sender must get
a key from the recipient to send them an
encrypted message. The drawback is that
managing those keys can be cumbersome.
And ultimately, even though a message’s
contents are unreadable, the frequency of
communication is not. That is bound to
arouse suspicions.
Wickr, a mobile app, performs
a similar service for smart phones,
encrypting video, photos, and text and
erasing deleted files for good. Typically,
metadata for deleted files remains on
a phone’s hard drive, where forensics
specialists and skilled hackers can piece it
back together. Wickr erases those files by
writing gibberish over the metadata.
SET YOUR SELF-DESTRUCT TIMER:
Services like 10 Minute Mail allow users
to open an e-mail address and send a
message, and the address self-destructs
10 minutes later. Wickr also allows users
to set a self-destruct timer for mobile
communications so they can control how
long a recipient can view a file before it
DROP THE DRAFT FOLDER IDEA: It may
sound clever, but saving e-mails in a shared
draft folder is no safer than transmitting
them. This tactic had long been used by
terrorists Khalid Sheikh Mohammed,
the mastermind of the 9/11 attacks and
terrorist groups in India, but now it doesn’t
work. E-mails saved to the draft folder are
still stored in the cloud. Even if they are
deleted, e-mail service providers can be
compelled to provide copies.
USE ONLY A DESIGNATED DEVICE:
One should use a separate, designated
device for sensitive communications like a
second cell phone or a tablet.
DON’T MESS UP: It is hard to pull off one
of these steps, let alone all of them all the
time. It takes just one mistake forgetting
to use TOR, leaving your encryption keys
where someone can find them, connecting
to an airport Wi-Fi just once to ruin you.
Robust tools for privacy and
anonymity exist, but they are not well
integrated in a way that makes us easy
to use, we’ve all made the mistake of
accidentally hitting Reply All. Well, if you’re
trying to hide your e-mails or account or
I.P. address, there are a thousand other
mistakes you can make.
If the Law and enforcement is after
your e-mails, it will find a way to read
them. In that case, any attempt to stand in
its way may just lull you into a false sense
of security.
Some people think that if something
is difficult to do, it has security benefits,
but that’s all fake everything is logged and
you are profiled. The reality is if you don’t
want something to show up on the front
page of The Times of India, then don’t
say it. In this networked world filled with
netizen’s and data harping companies
providing mind boggling apps and services
virtually free, I feel the user should be also
aware his data or usage data is being used
covertly when the law says so.
n
www.csi-india.org
Security Corner
Mr. Subramaniam Vutha
Advocate
Email: [email protected]
IT Act 2000 »
Prof. IT Law in Conversation with Mr. IT
Executive – How policies, implementation
mechanisms, and training bridge the gap
between the law and technology Issue No. 10
IT Executive: Hi Prof. IT Law! In our
last session you talked to me about the
challenges of “authenticity”, “integrity” and
“non-repudiation” in electronic commerce.
And how digital signatures address these
challenges. What will we discuss today?
Prof. IT Law: Today, we will examine why
people like you, who engage in electronic
commerce or I T functions should know a
little about the law.
IT Executive: I guess anyone who engages in
commerce of any type should know the basics
of the law – such as how contracts are formed
and so on.
Prof. IT Law: True. But in the case of
electronic commerce and the Internet,
some knowledge of the law is even more
crucial than for people who engage in
commerce in the “real” world.
IT Executive: Why do you say so?
Prof. IT Law: Because, the velocity of
commerce on the Internet is so high that
mistakes can be very costly and there is
much less time to retract errors or remedy
mistakes. For example, if you have made
an offer on your website that mistakenly
indicates a much lower price than you
intended, you could be flooded with orders
that you cannot refuse.
IT Executive: Quite right. Any other reasons
why knowledge of the law is more important
for those engaged in e-commerce as
compared to those in “regular” commerce?
Prof. IT Law: Yes. Consider the reach of
the Internet. Apart from the velocity of
transactions, the Internet permits a global
reach across countries, continents and
varying judicial systems. That must be
borne in mind too.
IT Executive: So that make e-commerce
easier doesn’t it?
Prof. IT Law: True. But it also makes
e-commerce more risky in some ways.
Both speed and reach are accelerated
and magnified. So, that raises new issues,
some of which we discussed in the past 9
sessions.
IT Executive: For example, the challenges of
identifying the other party to a transaction?
And the challenge of ensuring that documents
transmitted are not tampered with?
Prof. IT Law: Yes. And the fact that most
work has moved to the Net. And a lot of
entertainment and social interaction as
well.
IT Executive: I see what you mean. Like
Facebook, Youtube and other popular
Internet based offerings!
Prof. IT Law: Precisely. These have aided
the stupendous growth of the use of the
Internet for work, entertainment and social
interaction. All of these have presented
new challenges to the legal system that
the legal system is struggling to address.
IT Executive: I see. So what is the remedy?
Prof. IT Law: For every company engaged
in e-commerce it is important to have in
place 3 very important things. The first of
these requirements is a policy relating to
electronic interaction.
IT Executive: That is easy. Every company has
a website policy and so on.
Prof. IT Law: Yet, many companies do
not have the mechanisms to ensure
compliance with their own electronic
policies. This brings me to the second
requirement, which is, internal guidelines
and checklists to handle issues and
transgressions of the policy.
IT Executive: I agree. Not having
implementation mechanisms nullifies the
value of having a policy.
Prof. IT Law: Yes. And the 3rd requirement
is training and periodic updates on such
training.
IT Executive: You are right Prof I T Law. Given
the fact that errors in e-commerce can be very
expensive and difficult to remedy, prevention
is a superior option.
Prof IT Law: You are absolutely right.
Policies, implementation mechanisms and
trained people are the 3 underpinnings
of any risk mitigation plan relating to
e-commerce. Such investments will
obviate very expensive and painful legal
liabilities and almost always, be much
cheaper than litigation.
IT Executive: I suppose that is because the
law lags technology.
Prof IT Law: Yes. And that will always be
the case. That’s why electronic contracts,
policies, implementation mechanisms,
and training will help to bridge the gap
between the law and technology.
IT Executive: It sounds so logical now that
you have explained it to me.
Prof IT Law: I am glad you concur. We
cannot keep knowledge of the law to
lawyers alone. Those in technology and
business [especially e-commerce] will
need to keep abreast of technology law
developments too. And we will do that
through these series of discussions. Bye
n
for now.
CSI Communications | January 2013 | 27
HR
Dr. Manish Godse
[email protected]
Job Satisfaction: What Is It?
Introduction
Every day, I question myself: Am I
happy to go to my work place? Do I
have a negative attitude at workplace?
Do I believe in managers and peers?
Do I have a positive opinion about the
organization? Is the work exciting to
me? Am I encouraging my friends to
join the organization? If answer to most
of these questions is positive then my
feeling about job is satisfactory, however
if I have negative reaction about these
questions then I have to find out the
reasons for job dissatisfaction.
Every individual has certain values
in his or her life which are established
and nurtured since childhood by parents,
teachers, friends, and family relatives.
Values are the end-state of existence
which individual wants to achieve
during their lifetime, and the essential
behavior to reach the end-state of
existence. The need of existence can
be like self-respect, family security,
freedom, prosperity, happiness and
many more. The necessary behaviors to
achieve these end-states are: honesty,
capability, responsibility, ambitious,
open-mindedness etc.
Values influence behavior and attitude
of individuals in a positive or negative way
depending upon the situation he or she is
facing. Every individual has to be careful
at work place because values may affect
their work and finally job satisfaction.
Job Satisfaction
Job satisfaction is employee’s prerequisite
to be happy at the work place, whereas
it is essential for organization to achieve
organization’s vision and objectives. Job
satisfaction is expressed as collective
feeling of individual towards a job.
A person having high positive feeling
about the job is highly satisfied and viceversa. Studies show that high esteem
individuals are more satisfied with their
job rather than individuals who have
low esteem. Research has shown that
there is a positive correlation between
job satisfaction and age. Job satisfaction
also increases as individual rises up the
hierarchy of the organization.
CSI Communications | January 2013 | 28
Factors Contributing to
Job Satisfaction
Factors affecting the job satisfaction
are mainly driven by industry sector,
individual’s aspiration, and behavior. Some
of the factors which affect job satisfaction
are:
•
Compensation and benefits: It is the
major requirement of any person
to reach the end-state of existence.
Compensation has the positive
correlation with job satisfaction.
There is no end for the desire for
compensation hence individuals have
to decide their limit to be satisfied.
•
Career development: It is always linked
with power, compensation, and
benefits. Organization has to provide
necessary training and opportunities
to use skills of employee so that
employee can progress on his or
her career. If an employee is aware
of career development plan and
necessary efforts required to achieve
it then they can be happy.
•
Working environment: Organization’s
values, ethics, policies, social
responsibility, financial conditions,
working hours, leave policies, and
transparency covers the basic
working environment. If working
environment is supportive to
employees then loyalty of employee
towards the organization increases
and hence positively impacts job
satisfaction.
•
Work itself: Work should be
interesting, challenging, dynamic,
and matching to skills of individual.
Work has to be aligned with career
aspiration
and
compensation.
Some kind of reward program is
necessary to acknowledge the work
of employee. If all this is true for work
then employee is more satisfied.
•
Job security: It’s important for every
individual to have a feeling of job
security, however in professional jobs
there isn’t any security. It is thus the
responsibility of the organization and
management to create the sense of
job security.
•
Relationship with management and
•
immediate supervisor: Relationship
with immediate supervisor has to
be healthy and transparent such
that employee should believe in
the supervisor. The relationship
with supervisor should be like
mentor-mentee rather than masterslave. There is a necessity of
regular communication between
management and employee. This
communication should express
the organizations strategy, goals,
customers, financial status, and
employee policies. Healthy relations
with supervisor and management
enriches bond between employee
and organization.
Relationship with peers: This is vital
for the survival of an employee
within an organization. A manager
has to ensure enrichment of peer
relationship through various group
activities.
How to Measure Job Satisfaction?
•
•
Ask a single question to employee
about their job satisfaction and
allow them to rate on certain scale
ranging from ‘Least satisfied’ to ‘Highly
satisfied’. However this method isn’t
perfect as the employee won’t be
able to provide collective opinion of
job satisfaction.
Set of questions can be asked on
various parameters to measure
collective job satisfaction on certain
scale.
What If Dissatisfied?
If an individual is dissatisfied about his or
her work then they may follow some of the
following paths:
•
Low
performance:
Individual’s
performance or productivity gets
reduced if they are dissatisfied with
their job.
•
Absenteeism: Satisfied individuals
have positive attitude towards job,
hence will avoid being absent from
work.
•
Passive job involvement: Dissatisfied
employees may avoid responsibilities,
reduce concrete efforts towards
work, and may commit more errors
in work.
www.csi-india.org
•
•
About the Author
•
Destructive: Dissatisfied employees
may express their dissatisfaction
in destructive ways such as:
complaining
nature,
stealing
organization property, wasteful use
of organization facilities and many
more.
Life dissatisfaction: Job satisfaction
also affects life satisfaction. More
the job satisfaction more is the life
satisfaction and vice-versa.
Possibility of exit: If individual isn’t
satisfied then there are high chances
of their exit from the organization.
Conclusion
Each employee is unique in the sense of
values and end-state of existence; hence
it is difficult to meet the aspirations of
every individual by the organization.
In many cases state-of existence may
be unrealistic and out of reach of the
individual due to lack of skills. To tackle
such odd situations, organization can
have various programs to develop
culture of self realization, self-esteem,
and support in defining end-state of
existence which may be more realistic
and aligned with employee skills.
Effective feedback mechanism,
training
programs,
and
learning
opportunities has to be created by the
organization for effective development
of the employee. This creates positive
impact on employees and increases their
loyalty towards the organization.
Reference
[1] Stephen P. Robbins and Seema
Sanghi, “Organization Bahavior”,
Pearson Education, 2005.
n
Manish has two decades of experience, which spans as Business Leader, Entrepreneur, and Academician.
His functional experience is focused on strategy, customer relationship management, pre-sales, product
management, costing, psychometric testing, assessment, and counseling. He holds Ph.D. in management from
SJM School of Management, Indian Institute of Technology Bombay.
Continued from Page 23
of NMEICT that all the instructional
material should be made available free
of cost to the learner would apply to the
above explained resources as well.
When IIT Bombay started the
Aakash work six months ago, there were
three specific tasks: To confirm whether
the idea of Aakash was viable. This is an
important question to answer as not many
people believed in this concept until as
recently as six months ago. IIT Bombay
has demonstrated that the idea of Aakash
is eminently viable.
The second mandate to IIT Bombay
was to create a large number of educational
applications locally and also by co-opting
students and faculty members of many
colleges from all over the country. IIT
Bombay is making a lot of progress in this
as well. In order to publicize this intent, IIT
Bombay is spearheading two competitions
on application development for Aakash,
one for Android and the other for Linux.
Depending on the number of entries,
there could be different tracks, such as
school applications, home automation,
etc., in each of Linux and Android, with
corresponding number of sets of prices.
An advertisement for this appears
elsewhere in this issue.
Several other parallel efforts are also
underway to develop applications suitable
for Aakash. CDAC is working on providing
Indian language support to Aakash. IIT
Madras is leading a software development
effort by collaborating with several other
IITs, including some recently established
IITs.
The third task assigned to IIT Bombay
was to carryout extensive testing and to
get sufficient feedback required to arrive
at the specifications of Aakash 3. This
work is also in full swing. IIT Madras is
coordinating the task of coming up with
the specifications for Aakash 3.
One can see that the Aakash
project is progressing well. There have
been controversies, such as the origin of
manufacture, poor hardware quality and
delivery schedule. Such problems do arise
in any such ambitious project. We are glad
that through sheer determination and
grit of the Aakash Team, most of these
problems have been overcome. We are
also glad that Aakash has had a role in
lowering the price of tablets all over the
world: reasonable quality devices that
were available only in the $200-300
range a year ago are now available for
less than $100. No top of the line tablet
device can match Aakash even today in
the computing area.
The Aakash 3 order is expected to be
of the order of 5 million. As it will come
out about a year after Aakash 2 and as it
will be a much larger order, Aakash 3 is
expected to deliver a lot more for the same
price. Development of a system on a chip,
exclusively for Aakash, will be a long term
goal of this project, as it will help achieve
much lower prices, while simultaneously
n
improving the performance levels.
About the Authors
Dr Kannan M. Moudgalya has degrees in Chemical Engg. and Electrical Engg. from IIT Madras and Rice University. He has been a
professor at IIT Bombay for 25 years. Through the Spoken Tutorial project, he promotes IT literacy.
Dr Deepak Phatak is a teacher. He has been working with IIT Bombay for over 40 years. He is currently engaged in NMEICT
projects to scale quality education using ICT. He is a fellow of CSI.
Mr Narendra K. Sinha, IAS, graduated in electrical engineering with a gold medal and distinction from IT BHU and IISc and an MBA
from Southern Cross University, Australia. As Chief Electoral Officer, District Magistrate and Collector, and Transport Secretary
and Transport Commissioner in Bihar, he implemented IT solutions to streamline the operations. Mr. Sinha is the Additional
Secretary (TEL) MHRD and Director of NMEICT. He conceptualised NMEICT in general and Aakash in particular.
Mr Pradeep Varma is an IT professional and entrepreneur. After a distinguished career in the corporate sector, he has devoted his
time to teaching and to serving the National Mission on Education through ICT of the Govt. of India.
CSI Communications | January 2013 | 29
IT.Yesterday()
Sarwottam Thakur
Former Hon. Secretary CSI
CSI – The Early Days
It is about 50 years now since the mid1960s. Computers were very uncommon
in India that time, and a small group of
computer users, may be about twenty,
had formed an association to address
their common interests, problems, and for
sharing mutual experiences.
At that time IBM had established its
South-East Asia Regional Education Centre
at the Holiday Inn Hotel in Faridabad near
Delhi, and I was in charge of this centre.
We invited this group to visit us at our
centre. Some ten to fifteen members of
this association, mostly non-Industrial
users, came to Faridabad, and I hosted
their stay there. We did not want the
impression that this was an IBM sponsored
association created for its own benefit, so
I did not take any part in their discussion. I
just attended the sessions. In this meeting,
the “All India Computer Users Group” was
formed, which was later renamed as the
Computer Society of India. By this time,
the need for such an All-India Society was
becoming imperative by the day.
Actually the CDC-3600 computer
installed at the Tata Institute of
Fundamental Research in Mumbai in
June 1964 was considered one of the
fastest computers in the world that time.
Thus, a very good beginning was made
to usher the computer age in India. But
due to government apathy this first step
remained the last step for quite some
time. So, an organization to defend the
further use of computers was a necessity.
And thus the CSI was born.
The initial members were mainly
“Computer Scientists” from academic
and government institutions. There were
hardly ten computers in India in the
private sector organizations, all with wellknown MNCs. I do not know whether they
were approached while forming that first
group, but when the CSI was formed, it
was mainly the “Computer Scientists”
who ran the show.
For the first few years, CSI had no
employees, no office, and no formal
constitution, not even a type-writer and
the group operated from the residence of
the Honorary Secretary. Naturally, there
were hardly any regular activities, as
there were no funds. When I left IBM and
became an active member of CSI, I wrote
to the IBM Country Manager requesting
a grant of Rs. 10,000 for our activities.
CSI Communications | January 2013 | 30
He immediately sent the cheque as a
donation-probably the first time CSI got
some substantial amount. Those days, for
CSI it was really a substantial amount. The
yearly salary of most computer personnel
was less than that in the early 1960s.
Even with such rickety infrastructure,
CSI gained in stature. This I experienced
during our Annual Convention (that
time called the AGM) at Trivandrum.
The ISRO or some such organization had
planned their space–rocket launch from
the Thumba launch pad around that time.
When we reached Trivandrum for the
meeting, some of the computer people
from there, who had come to receive us,
mentioned about this Rocket Launching
Program. We just mentioned that if the
CSI delegates can watch the launch, it
will be a lifelong memory, but they will
miss it just by a day. The local delegates
conveyed this to their superiors, and to
our utter surprise and delight, the launch
was postponed by two days so that CSI
members could watch the rocket-lift-off.
This we thought was recognition of the
work that CSI was doing for the computer
field, in those days.
As CSI grew, though very slowly,
private sector organizations were
persuaded to join it, and the AGMs
got converted into conventions. By this
time, opposition to computer usage was
growing in the working class and also in
the government circles. They vehemently
refused to believe in the bright future
or helpful usage of computers. It was
considered a useless device meant mainly
to increase unemployment in the country.
In 1972, the Govt. of India appointed
“Committee on Automation” stating …… it
will be farfetched and wrong to attribute
changes in financial working, profits etc.
to the introduction of computer”. Such
opposition also prompted computer users
to join and strengthen the CSI.
In 1965 the Bhabha Committee
estimated that by the year 1975, India
would need about 5500 computers. But
due to anti-computer policies of the Indian
Government at that time; by the end of
1974, only 233 computers were installed
in India. A vast majority of these were
with government related organizations. In
passing, it may be mentioned that Indian
govt. was not alone in underestimating
computer growth. Prof. Peter F. Drucker
mentions in his article “Business and
Technology: Partners in Progress”, an
extensive market research study in1950
concluded that by the year 2000, the
world would need 1000 computers while
there were over 150,000 computers in use
in early 1970”.
It will be interesting to know the
background and history of the anticomputer wave in India, because it
affected the working of the CSI. Those
were the days when organizations
were run (or paralyzed) not by Board
of Directors, but by the Leaders of the
employees unions (This continues today
also, but on a considerably lesser scale
than in the 1960s and 1970s). The Life
Insurance Corporation of India installed a
computer in its Mumbai office. The L.I.C.
union objected that their consent was not
taken before installing the machine. The
L.I.C. management agreed and said that
for all future expansion they would consult
the unions. But the unions were objecting
to the machine already installed. Mr.
George Fernandes, the fiery Union Leader
of those days (and later much sobered
Minister in the Atal Behari Bajpai Govt.)
was the main leader of such protests.
He had a commanding influence on the
Mumbai labor unions. This started the
anti-computer wave in India and continued
for twenty years. The enviable position
which indian computer personnel occupy
in the world computer scene today, was
delayed by at least twenty years by this
union opposition and we lost more than
fifteen unrecoverable years in this battle.
As a result of this, if an organization
wanted to setup a computer installation,
it had to secure an approval from its
recognized union. A difficult hurdle,
because the union thought there will be
staff reductions. If the Organizations
guaranteed no retrenchment, the
union wanted a guarantee for future
generations’ jobs - something impossible
to understand. Today I.T. industry is not
a job reducer but one of the largest job
creators. But this objection continued.
When that hurdle was crossed, next the
consent of the state government was
needed. And finally, an approval from the
central government was required. The
C.S.I was directly or indirectly involved in
helping computer-desiring organizations
in crossing these hurdles.
www.csi-india.org
About the Author
The government
objections did
help some ingenuous individuals who
imported used computers with their own
foreign exchange, set up their personal
installations thus creating (and not
retrenching) new jobs (only five or six,
but new jobs), and rented out time on
these machines to various organizations,
making a decent profit.
Around this time, Mr. F. C. Kohli
(justifiably considered the father of
computer growth in India) of Tata
Consultancy Services, was elected
President of the C.S.I, and I as the
Honorary Secretary. Mr. Kohli and I
had excellent rapport since the time he
attended a course that I conducted at the
IBM Education Centre. The responsibilities
on the C.S.I were increasing considerably
- defending the use of computers and
proving its potential being the topmost
priorities. We still had no staff, no office.
We were in a hurry to change this and give
CSI an international standing.
That time, Col. Ranji, a very sincere
retired Army officer was appointed, the
first full time employee of C.S.I., and we
acquired a small full time office for him.
Before this, one Mr. Aranha, an excellent
steno, used to come to my office after
his office hours, to take dictation for the
C.S.I. correspondence. He would type the
letters immediately, and take the signed
letters for mailing. He also helped me in
allotting numerical identification numbers
to our members. This we did with some
logic but randomly. Thus, I was not CSI
member number 0001, but 1835. I do not
remember how I came to this odd number
for me, but CSI continued my membership
number as 1835 even after 40 years.
Thank you C.S.I
With the establishment of an office
and staff (though just one, and later his
assistant), we set out to add one more
essentials to the CSI image. For the
Registered Office of the society, there
were two firm suggestions. One some
place in Chennai (or, was it Hyderabad)
and the other of Nehru Centre in Mumbai.
Mumbai had the largest number of
members from the Managing Committee,
Mr. Kohli, i, the treasurer, and one or two
other members were from Mumbai. But
I thought there was no point in further
crowding an already over-crowded
Mumbai, and suggested Chennai. I think
this resolution was later passed in the
Bangalore convention. But either way,
Mumbai or Chennai would not make any
difference to the day-to-day working of
the CSI or to its public image.
Then in the executive committee
meeting, we discussed the creation of a
logo. There were many suggestions such
as - punch cards, magnetic tapes, and
other paraphernalia used with computers
those days. But the computer field was
changing so fast that we discarded all these
and decided to ask the National Institute
of Design in Ahmedabad to handle the
project. We also briefed them about the
very fast changing computer concepts.
We accepted the logo they suggested,
the one being used now. Only question
was the color of the logo. But for ease of
reproduction on all literature and other
products, we chose black & white. Those
were the days of National Emergency
declared by Mrs. Indira Gandhi. So there
was a discussion on whether the two
arrows, one pointing right and the other
left, would indicate our leftist or rightist
inclinations - some fun!
The major task still pending was
drafting of a model constitution. Mr. Kohli
readily agreed to devote whatever time
needed for this and in a few months, after
detailed discussions in the Managing
Committee, prepared the final draft.
We were now a full-fledged All India
Organization representing the Computer
Community.
Then we applied to the International
Federation of Information Processing
for membership and established our
presence on the International scene.
We also helped and took lead in forming
the South East Asia Regional Computer
Conference or SEARCC. A large Indian
delegation attended the first SEARC
convention held in Singapore in 1976.
The Singapore television devoted
considerable time to air the interview of
the CSI chairman, Mr. F.C. Kohli.
With the CSI expanding rapidly
despite government apathy towards
computers, and only the annual convention
to meet, city chapters of CSI were started,
the first being Mumbai chapter. I think
Mr. Shrikhande of Philips was the first
chairman. Then student membership
and student chapters followed. CSI had
now come of age. It was now a well-knit
organization standing firmly on its own in
the then turbulent Indian computer scene.
Before I close these reminiscences of
the early days of CSI, I must mention one
stormy episode, which had threatened to
break the CSI.
The CSI was initially formed by
computer scientists. By now, business
users had joined and so, membership was
substantially from industry and business
application users. Some of them thought that
the “computer scientists” were dominating
the CSI, and not giving adequate importance
to business use, which was the future of the
industry. Most of the sessions of the annual
conventions discussed technical issues. In
fact, no business-oriented paper was ever
rejected for presentation, but the feeling
was growing in private discussions. And in
one convention (I do not recollect where)
a strong group of members indicated that
they would like to break away and start an
independent business computer society.
Membership wise they were in majority.
We had lengthy closed-door discussions
on this issue. This group finally agreed that
when the government itself was against the
whole computer industry, we must keep
aside our mutual differences, and put up a
united front to put forth our views. A viamedia solution was reached, the rebel group
withdrew their protests, and the Business
and Industry Group (B.I.G) was established.
A vertical split of the CSI was averted. The
CSI continued as a single united body. I do
not know whether the group, called the B. I.
G. is still functioning the way it was at least
for the first few years.
Chak De CSI!
Dr Sarwottam Thakur has master degree in science and also master in art from USA. He has done his doctorate in management. He was
Hon. Secretary of the CSI in the “early days” when Mr. Kohli was the president. He was also present when the computer users first met
at Faridabad in 1964. Having seen CSI right since its birth till it stood on its legs, he has written about these early days and how CSI grew.
E-mail: [email protected]
Sarwottam Thakur taught mathematics In American Universities and while serving in the corporate field, he was invited faculty in
Management Institutes. A founder member of the Computer Society of India and later its Honorary General Secretary, he is considered as one
of the pioneers in introducing the Computer Age in India. For some years he headed IBM’s Computer Education Center for South East Asia.
Actively engaged in social work, he was the Secretary to Acharya Vinoba Bhave during his Bhoodan and Gramadan Padayatra in Maharashtra.
CSI Communications | January 2013 | 31
Brain Teaser
Dr. Debasish Jana
Editor, CSI Communications
Crossword »
On popular demand, Crossword is back again for our enthusiastic readers.
Send your comments and feedback on this column to CSI Communications at email address [email protected] with subject: Crossword Feedback.
Test your Knowledge on Enterprise 2.0
Solution to the crossword with name of first all correct solution provider(s) will appear in the next issue. Send your answers to CSI
Communications at email address [email protected] with subject: Crossword Solution - CSIC January 2013
1
2
3
CLUES
4
ACROSS
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
25
24
26
27
28
29
30
31
2. An important element in Web 2.0 as web oriented
architecture (3)
3. Language used for extensible hypertext markups (5)
5. A social photo sharing website (6)
6. A popular blogging platform (7)
9. A Rich Internet Application (RIA) framework (11)
11. A social networking site (8)
15. A Rich Internet Application (RIA) framework (4)
17. Someone almost constantly chatting (7)
18. A text-based data interchange format (4)
19. Google’s search advertising program for web publishers (7)
24. A protocol for information exchange using web services (4)
25. Facilitates searching (3)
26. Voice services over the Internet (4)
27. The digital representation of a person in virtual world (6)
29. Mobile weblog (6)
30. A social networking site (8)
31. Blogging from mobile devices (10)
DOWN
1.
2.
4.
5.
7.
8.
10.
12.
13.
14.
16.
20.
21.
22.
23.
Blogs as a social network (11)
Markup language used in wireless medium (3)
XML based web service description language (4)
An open source web browser (7)
An XML based web content format of newsfeed (3)
Folk taxonomies (12)
Inventor of the wiki (4,10)
Language used to describe presentation of web document (3)
Semantic Web technology used for organizing data (3)
Forms the basic framework of Enterprise 2.0 (6)
A form of audio broadcasting over the Internet (10)
An open source modular JavaScript library (4)
A storage area network (3)
Permanent URLs to your individual weblog posts (9)
Virtual private networks used by remote users as if they are
on internal LAN (3)
26. Blog that includes video medium (4)
28. Enables devices to be connected to networks without special
device drivers (4)
Solution to December 2012 crossword
1
3
U
F
Z
Z
Y
L
O
G
I
5
C
6
I
Did you know importance of Blogging?
N
S
8
Ha ve yo u n otic ed th at bl ogs
ha ve no w bec ome an essential
ingr e die nt o f online c u ltu re? Many
p eo p le r ea d bl ogs, many people
p o st o n the m too. E arlier people
use d to k e ep personal d iaries, now
p eo p le wr ite on walls of peopl e (wh ic h a re shared areas
o n the we b), as wel l as post on pu blic bl o g s, peo ple read
the se a nd comment on th em. Th e tre n d has chan g ed
fr o m p e r so na l d iary to web d iary in terms o f b lo g s.
4
12
D
9
S
D
E
P
H
F
I
P
C
N
R
I
V
13
E
S
V
I
15
K
N
K
I
N
N
O W
E
D
G
2
O
U
R
A
L
N
11
P
R
O
7
Y
L
L
L
A
O
G
G
14
B
A
Y
E
S
E
E
B
A
S
C
O
10
J
S
O
S
H
I
A
F
E
N
M
I
C
W
T
C
C
N
L
F
A
A
E
T
D
R
16
G
E
N
E
R
U
T
T
I
C
I
D
18
C
O
G
N
E
I
H
T
A
B
T
N
L
20
I
V
E
S
21
S
R
A
T
M
A
B
E
O
D
U
S
P
O
N
E
N
T
A
K
N
O W
L
E
T
E
O
H
U
N
Y
P
E
T
R
I
O
R
M
A
T
A
C
N
E
T
I
O
N
S
25
I
N
F
S
I
27
C
E
R
I
R
24
E
T
H
17
R
19
E
M
O
T
T
R
28
L
N
O
F
M
CSI Communications | January 2013 | 32
C
I
22
26
No ALL correct answers to December 2012 month’s crossword received at our Editorial Office.
T
S
E
T
E
S
O
E
23
R
E
E
N
A
T
U
R
A
R
F
D
G
T
E
www.csi-india.org
Ask an Expert
Dr. Debasish Jana
Editor, CSI Communications
Your Question, Our Answer
“The foolish man seeks happiness in the distance, the wise grows it under his feet.”
~ James Oppenheim
From: V Keerthika
Assistant professor, Dept of CSE, SBC / CSI, Er. Perumal
Manimekalai College of Engineering, Hosur, Tamilnadu
16777217 is an odd number
Approach (iii)
16777217 is odd number
[cse68@osscse ~]$.
Sir,
This is about finding if the entered number is odd or even without
using mod function. I have been observing discussions on this
for last three months in CSI Communications (Oct, Nov and
Dec 2012). Since integer data type in 32-bit machine occupies
32-bits with the range -2147483648 to 2147483647, it needs to
be changed to datatype long instead of int and double for float
datatype. Accordingly, the dividend should not be 2 as an integer
rather needs to be float as 2.0. These corrections make all the
three approaches work correctly for any number.
[We appreciate all views, including the current one, from our
readers expressed on this topic. Many thanks for the analysis
and explanation. – Editors, CSIC]
Regards,
V Keerthika
Program:
#include<stdio.h>
int main() {
long numtotest=16777217;
//Approach (i)
printf("Testing with Approach (i) \n");
long a;
double b, no=numtotest;
a = no/2;
b = no/2.0;
if (a==b)
printf("%ld is even Number",(long)no);
else
printf("%ld is odd Number ",(long)no);
//Approach (ii)
printf("\nTesting with approach(ii)\n");
double no1 = numtotest,no2,no3;
no2=no1/2;
no3=no2-(int)no2;
if(no3>0)
printf("%d is an odd number\n",(int)no1);
else
printf("%d is an even number\n",(int)no1);
//Approach (iii)
printf("Testing with Approach (iii) \n");
int x = numtotest;
if(x & 1)
printf("%d is odd number ",x);
else
printf(“%d is even number “,x);
printf(“\n”);
return 0;
}
Output:
[cse68@osscse ~]$ cc Pro1.c
[cse68@osscse ~]$. /a.out
Testing with Approach (i)
16777217 is odd Number
Testing with approach (ii)
From: K Sivanaadhbaazi,
M.Tech, Vignan's Lara Institute of Technology, Guntur
I have lot of doubts about this programming language "SemiDefinite Programming". Why this programming language is
used? What is the purpose? What is the relation between semidefinite programming and convex optimization? Are there any
other optimizers like convex optimizer?
This is what Wikipedia says on semi-definite programming:
A
“Semidefinite programming (SDP) is a subfield of convex
optimization concerned with the optimization of a linear objective
function (that is, a function to be maximized or minimized) over
the intersection of the cone of positive semidefinite matrices with
an affine space, i.e., a spectrahedron.” (Ref: http://en.wikipedia.
org/wiki/Semidefinite_programming).
As you can observe from this definition that this is not at all a
programming language. This is a mathematical term, as we learn
terms like say, linear programming. This is an optimization technique
applied for combinatorial optimization problems and alike.
There are many books on semidefinite programming,
one reference could be book titled “Aspects of Semidefinite
programming” by Klerk, E. de, Springer (2002), URL: http://www.
springer.com/mathematics/book/978-1-4020-0547-3
Experts claim that “In broad terms, a semidefinite program
is a convex optimization problem that is solved over a convex
cone that is the positive semidefinite cone.” (Ref: http://www.
convexoptimization.com/dattorro/semidefinite_programming.
html)
A popular C library is available for Semidefinite programming,
it’s called CSDP. Currently, CSDP is available as part of the Debian
and Ubuntu distributions. CSDP is also available for many other
operating systems, for example, Mac OS, Windows family, Linux
etc. A python interface to CSDP is also going to be available. For
further reference, you may refer to this URL: https://projects.coinor.org/Csdp/
To access the most recent development version of CSDP,
you need to first install subversion tool (you may download from
http://subversion.apache.org/packages.html), then, you can run
subversion (svn) command as below to get a copy of the latest
version.
svn co https://projects.coin-or.org/svn/Csdp/trunk
n
Send your questions to CSI Communications with subject line ‘Ask an Expert’ at email address [email protected]
CSI Communications | January 2013 | 33
Happenings@ICT
H R Mohan
AVP (Systems), The Hindu, Chennai
Email: [email protected]
ICT News Briefs in December 2012
The following are the ICT news and headlines
of interest in December 2012. They have been
compiled from various news & Internet sources
including the dailies - The Hindu, Business Line,
and Economic Times.
Voices & Views
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
Big data market is expected to grow more
than two-fold to $ 153.1 million (around
Rs 840 crore) by 2014 – IDC.
Last year, about 220 crore accessed the
Internet and 460 crore people remaining
out of the Web. Half of those who don’t
have the Web live in India, China, Indonesia,
Pakistan, and Bangladesh - Google.
Only 2% of 13 crore small businesses in
emerging markets have online presence
- Nelson Mattos, Vice-President, Product
and Engineering, Europe and Emerging
Products, Google.
Globally, there are 2.4 billion Internet users
with 8% y-o-y growth and a population
penetration rate of 35%. China continues
to dominate with 538 million users. 13%
of global Internet traffic is estimated from
mobile devices. The mobile apps and
advertising industry combined has made
$19 billion in revenue in 2012.
Under National Policy on Information
Technology 2012, the government has set
target to make at least one person in every
family e-literate by 2020.
Cyber espionage, State-sponsored attacks,
‘hacktivism’ to get an edge – Kaspersky.
Data usage is going up by 20 to 25% per
quarter and the adoption of 3G is set to
accelerate -Bharti Infratel.
Indian companies continue to see higher IT
security budgets – PwC.
India recorded over 75 million wallpapers
(300% growth over last year) and 150 million
plus music downloads this year. Kolaveri Di
continued to be the top downloaded ringtone
in 2012 for the second year in a row. Katrina
Kaif maintains the leading position in images
downloaded for the fourth consecutive year
- Airtel Mobitude.
The K-12 e-learning in India is pegged at
$150 million and is growing at 15% CAGR.
The total number of mobile phone users in
the country fell 0.26% to 904.23 million in
October from 906.62 million a month ago
and the wire line subscriber base declined
to 30.95 million from 31.08 million.
India’s IT outsourcing biz could triple to
$ 1.5 trillion by 2020 - B.V.R Mohan Reddy,
Chairman of Infotech Enterprises.
Gartner revises downwards semiconductor
sales for 2013 at $311 billion.
Promote R&D culture to stay competitive,
President Pranab tells IT industry.
India no more a preferred destination for
telcos - GSM Association.
Manufacturing, financial sector dominate IT
deals in last 7 quarters and accounted for over
45% of total IT contracts – Report by Zinnov.
Voice, gesture to replace keyboards and
mouse – Intel.
Total amount of data generated is expected
CSI Communications | January 2013 | 34
•
•
•
•
to grow to 2,700 exabytes during 2012, a
jump of 48% over 2011 - Sapient Global
Markets.
Net services will contribute $100 b or 3.3%
of GDP by 2015 – McKinsey.
Outsourcing helps US firms save 30-50%
on costs – Union Minister Jaipal Reddy.
Internet users will double once 4G is rolled
out - Google India MD.
IT industry may grow at 11-12% next fiscal
- PwC India.
Telecom, Govt, Policy, Compliance
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
TRAI
moves
to
check
arbitrary
disconnection of SIMs.
The Supreme Court restores SMS cap to
200.
Mobile roaming charges may go in 3
months.
DoT for trial runs of new tech to locate
mobiles real time.
The Government is thinking of setting up a
centralized registry with the identity number
of each mobile device in the country.
Govt plans to launch e-literacy pilot project
by March 2013.
Foreign telecom players can’t invoke
bilateral pacts - The Attorney General.
Satyam case: Final arguments begin in
Hyderabad court.
Aadhaar, PDS database link to help AP plug
loopholes.
Infosys plans to roll out Rs700-cr project for
India Post.
Govt panel cuts price of unsold 2G spectrum
by 30% for the auction to be held in March
2013.
BSNL ventures into interior hamlets in
Eastern Ghats whereas private telecom
operators are not ready go to the interiors,
even though they are obliged to connect
the villages under the universal service
obligation clause.
Price of Aakash tablet to come down to $35
soon – Sibal.
Centre turns down Bengal’s appeal to
extend STPI scheme.
Steps taken for transparent allocation of
spectrum – Prime Minister.
Mobile number portability to apply
countrywide by Feb 2013.
57,271 villages yet to be connected with
mobile services. A total of 13,438 villages
in the country are yet to be connected
with basic telephone facility (landline and
wireless in local loop).
Govt. hopes to raise Rs 20,000 crore from
2G spectrum auction.
TRAI lowers charges for submarine cable
landing stations.
Over 500 Internet firms find the going
tough, surrender licenses.
IT Manpower, Staffing & Top Moves
•
•
•
100% stock options to employees on meeting
target – Cognizant.
Prescience Soft, a Mysore-based company,
launches www.azzist.com, a niche social
recruiting network.
Google to suspend operations at Motorola
•
•
•
Mobility’s Chennai unit. Decision to impact
76 jobs.
ZTE to slash India workforce 30% in a bid
to cut costs.
TCS may hire 16,500 for Bengal SEZ project.
Infosys defers hiring plans again on sluggish
growth.
Company News: Tie-ups, Joint
Ventures, New Initiatives
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
Wishtel to launch computing devices; tablet
PC and net books, starting at $50.
Bharti Airtel launches emergency alert
service enabling its subscribers to send
alert message with location details to
10 mobile numbers.
Google fine-tuning roadmap to net next
100 crore users.
Apple launches iTunes store in India.
Bharti Airtel launches green data centre
designed to achieve 1.7-1.75 power usage
effectiveness in Mumbai.
Facebook to replace Infosys on Nasdaq-100
index.
On Day 1 of India launch, iPad Mini sells at
a steady clip.
Microsoft launches 14 innovation centres in
India.
Google+ adds photo-sharing app to
compete against services like Facebook’s
Instagram.
Vodafone India has received the ‘Green
Telecom Company of the Year 2012’ award
in recognition of its initiatives to reduce
carbon dioxide emissions.
CSIR, HP launch cloud-enabled eHealth
Centre.
Twitter updates its apps with new photo
editing feature.
Google partnered with over 50 Web sites to
organize the Great Online Shopping Festival
(GOSF), a 24-hour online shopping festival.
Yahoo! overhauls email for Web, mobile.
$99 Google Chromebook laptops for
schools sold out.
The Rs. 4500 crore Bharti Infratel IPO oversubscribed.
Delhi International Airport globally certified
in software asset management.
Facebook overhauls settings to simplify
privacy control.
Google India gives Web sites free to shops
in Delhi.
Vodafone to start machine-to-machine
platform.
IBM unveils top innovations of future.
Twitter tops 200 million active users.
Telecom Ministry plans to reduce undersea
cable repair time to 3 days.
Facebook launches a new app which erases
pictures and messages within 10 seconds of
being sent.
Hyundai have invented a new system that
will allow your smartphone to double as
your car keys.
Security Watch unveils mobile application
for women under threat.
Aakash 3 may come with SIM slot, more
exciting apps.
n
www.csi-india.org
On the Shelf!
Mrs Jayshree A Dhere
Resident Editor
Book Review »
Practical Apache Struts2 Web 2.0 Projects
Book Title
:
Practical Apache Struts2 Web 2.0 Projects
Author:
:
Ian Roughley, Struts2 co-creator
ISBN
:
978-81-8128-893-6
Printed Pages :
338
Price
:
Rs. 279/-
Publisher
:
Springer (India) Private Limited
Today’s software creation activity is marked with ample use
of ready frameworks that are basically meant for enhancing
developer productivity and for that matter several frameworks
that come bundled with common tasks generally required by
developers are now readily available. Apache Struts has been a
popular open source framework for building Java applications.
Struts2 is a major new release of the framework and this book
on Struts2 Web 2.0 Projects is written by none other than one
of the creators of Struts 2.0 codebase.
First chapter of the book is devoted to providing an
introduction to Web 2.0. Since from programming perspective
Web 2.0 is synonymous with AJAX (Asynchronous JavaScript
and XML), author has devoted initial portion to explaining
AJAX which is the interaction between various technologies
like HTML/XHTML, DOM, CSS, JavaScript and XML along
with XMLHttpRequest object supplied by the browser, which
is at the core of AJAX. After detailing different values and
principles of Web 2.0 such as Share over Protect, Advertise
over Subscribe, Participation over Publsihing, Community
over Product etc., author goes to explaining other changes
brought in by Web 2.0 which are more fundamental at
software development level e.g. development process agility,
syndication and integration, Web framework agility etc. He
provides highlight of changes brought in by Struts2 which
is also based on MVC pattern just like earlier Struts but
provides much more user friendly features for increasing
developer productivity. Some examples of these are plug-ins,
conventions over configuration, annotations rather than XML
configuration, testability etc.
Next two chapters are devoted to getting up and running
and to the framework overview. Build process is explained in
detail. For build process, author uses Apache’s command line
tool named Maven2, which can be used in any environment
(developer workstation, integration server, test server etc.) for
creating final distribution package of Web application. In the
chapter on overview, basic architecture of Struts framework is
explored with diagrams along with explanation of how various
parts of the framework (like Servlet filter, Action, Interceptors
etc.) interact with each other for providing a complete web
experience by detailing the request-response walk-through. Idea
is to explain how Struts2 uses MVC pattern as its basic principle.
Extension points of the framework are also discussed here.
Next chapter provides details of a specific web application,
which is used as a case study throughout the remaining book for
teaching the use of various features of Struts2. The case study
is selected with the idea that it should have good many of Web
2.0 concepts, and it should be easily understood by majority
audience. Hence, the case study is about an application of a
community entertainment service (true Web 2.0 application
is expected to have community aspects), which allows users
to vote for contestants in events. Whether it is a local talent
show or a National Idol event (where users are asked to vote
on who they think is best), the application enables the users to
register the event, and then vote on the contestants with her
friends. After the event is over, everyone can view the voting
results. Application use cases are detailed for further study
of the project. Through the case study, it is emphasized that
Struts2 needs to be integrated with several other technologies
for providing a useful application. Especially, the integration
with technologies – such as Hibernate (Object-Relational
mapping for persistence), Spring Framework (for providing an
architectural layer of business services to separate Struts2
action and persistence layer), Acegi (for authentication and
authorization services), Rome (for generating RSS Feeds) and
Google Web Toolkit (GWT) and Dojo Toolkit (for providing
Ajax user interface – is covered.
Domain model for the case study is provided along
with details of how agile development process is used with
continuous integration, which is characteristic of modern day
software development. Chapters 5 through 8 provide core
features of web application viz. Data manipulation, wizards
and workflows, security, and rendering information. Last
two chapters are basically about Web 2.0 features of the
application, including syndication, integration and ways in
which AJAX can be integrated into the application.
Book is useful for anyone who intends to explore using
Struts framework for software development as well as to those
who have already used earlier Struts framework for developing
their Java applications as they will find the comparison with
the earlier framework especially useful.
n
CSI Communications | January 2013 | 35
CSI Report
R K Bagga
Chairman, CSI-SIGeGOV
Report on CSI – Nihilent eGovernance Awards 2011-2012
during CSI-2012 held at Kolkata
CSI Celebrates a Decade of Success in Encouraging e-Governance in India
Completing a remarkable decade this year, the prestigious CSI-Nihilent e-Governance
Awards instituted by the Computer Society of India’s Special Interest Group on
e-Governance and sponsored by Nihilent technologies announced the Best e-Governance
initiatives for the year 2011-2012. The winners were honoured at a grand ceremony held at
the 47th Annual Convention of CSI-2012 at Kolkata. Through out the journey, the mission
of the awards has been to acknowledge and appreciate the valuable efforts in bringing
good governance through utilization of Information and Communication Technologies
(ICT). The awards ceremony session was chaired by Prof PVS Rao in presence of Mr
Satish Babu, President, CSI. A book on ‘Inclusive Growth through e-Governance: Selected
“Prof P V S Rao releasing CSI Case study
eGovernance Initiatives in India’ covering the case studies for the current year published
book on “Inclusive Growth Through
by Universities Press India was released. A special brochure commemorating the 10th year
e-Governance “ during CSI Nihilent eGov
Awards ceremony held at Kolkata on
of CSI Nihilent eGovernance Awards was also released.
2 Dec 2012.
The state of Bihar has been conferred with the ‘Award of Excellence’ for the State
category. Passport Seva Project by Ministry of External Affairs - Government of India was
awarded ‘Award of Excellence’ in ‘Projects Category - Government of India’ while ‘Ports & Transport Department’, Government of
Gujarat has received ‘Award of Excellence’ in Department Category.
Centralized Online Real-time Electronic (CORE) PDS by Government of Chhattisgarh
has received joint award with Government of Gujarat for its initiative on ‘Using Technology
for strengthening Targeted Public Distribution System’ for e-Governance projects in
‘Government to Citizen’ category. Other initiatives like ‘eUparjan’ by Civil Supplies
Department - Government of Madhya Pradesh, ‘Manava Sampada’ (A Green Governance
Tool for Human Resource Management) by Government of Himachal Pradesh and ‘Poll
Monitoring System’ by Government of Goa; have won awards in Government to Business,
Government to Employee and Government to Government categories respectively.
CSI-Nihilent e-Governance Awards has consistently acknowledged and encouraged
Dr Ashok Agarwal, Past Chairman CSI-SiGeGOV
such
initiatives over the decade contributing to the growth of effective governance in the
presenƟng his report on “Sustenance of e-Gov
country. This year the event signifies the successful journey of CSI and Nihilent towards
Projects” during CSI-2012 e-Gov track on
2 Dec 2012 at Kolkata.
the endeavor to recognize and appreciate efforts for initiating good governance, using
Information and communication technology (ICT). States across the country have actively
participated in the awards with rising enthusiasm every year.
A full day eGovernance track for Knowledge Sharing of successes was held in presence of large number of delegates including
Government officials. The sessions were chaired by Mr Surendra Kapoor and Dr Ashok Agarwal with Co-Chairs as Harish P Iyer
and GSN Prabhu. The presentations from the team leaders included SWARNIM-RTO (Gujarat), Passport Seva Project (Ministry of
External Affairs), eUparjan (Madhya Pradesh), Manav Sampada (Himachal Pradesh), eDistrict (Kerala), CORE PDS (Chattisgarh),
Poll Monitoring System (Goa) and Bihar State. Dr Ashok Agarwal, leader of Sustenance Team gave details of the efforts being
made by CSI SIGeGOV team to ensure that ‘Old eGovernance projects which got recognized by CSI more than five years ago were
recognized for their sustenance under a special category’. This year’s sustenance awards were given to eProcurement (Gujarat),
VAT Information Systems (Gujarat), Samadhan Ek Din Mein (Madhya Pradesh), DC Suite (Kerala), IISFM (New Delhi) and PESO, Nagpur.
Dear CSI Member Your hard copy of CSI Communications magazine is sent to the address, which you have provided to CSI. Please ensure that this
address is correct and up-to-date. You can modify your address if required by logging as a member to the CSI website viz. http://
www.csi-india.org.
In case you are unable to log in, please write an email to [email protected] for assistance. You may send your feedback and
comments on the contents of CSI Communications - Knowledge Digest fo IT Community to [email protected].
- On behalf of editors of CSI Communications
CSI Communications | January 2013 | 36
www.csi-india.org
CSI Report
Ranga Rajagopal
National Student Co-ordinator
“E-merge” - 2012 -13 CSI Maharashtra State Convention (Region VI)
At MKSSS’s Cummins College of Engineering for Women, Pune
Panel Discussion Day 1
2012 -13 CSI Maharashtra State Convention
(Region VI) was hosted by
MKSSS’s
Cummins College of Engineering for
Women, Pune in collaboration with CSI Pune
Chapter on 24th and 25th August 2012.
The convention “E-merge” was indeed a
perfect blend of tutorials and competitions
on emerging trends and technologies. The
event was very well supported by industry,
academia and students.
The convention activities started under the
able guidance of steering committee of Mr. Satish
Babu, President, Computer Society of India, Mr.
Shekhar Sahasrabudhe, Regional Vice President,
BI Session Day 2
Region VI, Computer Society of India and Dr. S.
S. Sane, Regional Student Coordinator, Region VI,
Computer Society of India.
The event was successfully executed
with the support extended by Event Chair
– Dr. (Mrs.) M.B. Khambete, Principal,
Cummins College of Engineering for Women.
The scheduling and implementation was
carried under the unrelenting guidance
of Program Committee of Prof. Bhakti S.
Ahirwadkar, State Student Coordinator,
Region VI, Computer Society of India,
Prof. Shilpa S. Deshpande, HOD, and
Prof. A. N. Muchrikar A.P., Department of
Computer Engineering, Cummins College of
Engineering for Women. The was immense
interest, support and help was also extended
by Mr. Amit Dangle, Chairman, Computer
Society of India – Pune Chapter and Mr.
Nikhil Karkare, Vice President, Computer
Society of India – Pune Chapter.
The event commenced its beginning
by an inaugural function on 24th August
morning. Dr. Bhooshan Kelkar, Country
Manager, IBM India University Relations was
the Chief Guest to join the CSI and CCOEW
authorities on the dais. The key note speech
was delivered by him. He discussed various
emerging trends and their relevance. His
talk was truly motivating and provided a real
“Glimpse into future”.
The day 1 continued with parallel tracks
of the tutorials on Linux 1O1 and Cloud Buster.
The Linux session was aimed to introduce
open source environment to students and
was conducted by Mr. Arun Tomar, CEO,
Solution Enterprises, Pune. The technology
beneath the cloud was made easy and
simple by Mr. Subramhanya Hathwar from
ICERTIS, Pune.
To celebrate the centenary year of
Allan Turing, a poster paper presentation
was organized on the work of Turing Award
Winners. Participants showed great interest
to put up the posters and many submitted
their abstracts. 11 groups were shortlisted to
compete. The judges, participants and even
the audience very much appreciated the idea
and enjoyed poster making with a new facet
of computer science.
The day 1 was called off with a very well
planned and moderated Panel Discussion
on “Be a dream Candidate of a Dream
Company”. Panelists included various
industry HR experts, TPO of institutes, who
threw the light on the industry expectations
from a candidate. The panelist were - Mr.
Prem Apte, Head of Management Trainee
Program and Technical Training, Zensar,
Mr. Moti Thadani, Head, SAS Research
and Development (India) Pvt. Ltd., Mr.
M. P. Khond, Ex TPO, COEP, Mr. Jayant
Sabnis, Executive Software Professional,
SQS India Infosystems Pvt. Ltd., Mr. Rajesh
Sinha, CEO, Fulcrum WorldWide (by Video
conferencing) and Prof. A. N. Muchrikar
was Panel Moderator. All the speakers
unanimously agreed on the fact that they
look into the candidate are his / her actual
technical ability, awareness of the industry
demands and the attitude towards working,
but not the marks obtained.
The day 2 was full of activities in
the campus with parallel tutorials tracks,
paper presentation competition and mini
project competition. Tutorial focusing
on the programming the mobile based
applications on Android OS “androidology”
was conducted by Mr. Jaydeep Wagh. At the
same time Mr. Prashant Bhatwadekar from
Persistent System Ltd. Introduced audience
with new area of Business Intelligence. It
was followed by a case study of sentiment
analysis of a very popular reality show on
TV. The sessions were thoroughly enjoyed
by students from various colleges from Pune.
The tracks received overwhelming
response from students’ community. Both
the tracks were full with the auditorium
capacity i.e. 188 and 205 respectively from
25 different colleges in and around Pune.
The mini project competition was a
platform for third and second year students
to show case their team work, presentation
skills along with the basics imbibed in
previous year. Usually the mini projects are
part of the curriculum and it was a sincere
try to provide them a dais to put forth their
idea. 18 groups from various colleges actually
selected for the same.
Paper presentation competition was
carried out in parallel tracks. It included the
papers from the areas like Social networking
/ internet Life, Animation and Multimedia,
Biometrics / Internet Security. The paper
were selected from the abstracts sent
by students and actually 30 papers were
presented in theses domains.
There was a technical quiz conducted
by an industry quiz master in various rounds
by Mr. Avaneendra Bhargav. This was
enjoyed thoroughly by participants as well
as audience.
The convention was waved off with
a valedictory session. Winners were given
attractive cash as well as gifts from sponsors.
In all more than 500 students attended in
the convention.
The convention activities were planned
and implemented by the Organizing
Committee consisting of Mrs. Aparna
Hajare, SBC, Mrs. Madhuri Tasgaonkar,
SBC, Mrs. Rakhi Dongaonkar, A.P., Cummins
College of Engineering for Women. The
finance committee consisting of Mr. Rahul
Pore, Hon. Treasurer, Computer Society
of India – Pune Chapter and Mrs. Vaishali
Salgar, SBC, Cummins College of Engineering
for Women, Pune provided absolute support
to manage event activities.
The tutorials on recent industry trends
combined the theory knowledge with some
demonstrations, live programming snippets
or case study, not only added the knowledge
but also gave the students the insight of
industry demands. Various competitions
provided them a fair stage to showcase
technical as well as presentation abilities. It
was a sincere and honest attempt to bridge
the gap between industry and academics.
CSI Communications | January 2013 | 37
CSI SERVICE AWARD WINNERS FOR 2011-12
Chapter Patron Awards
Best Regional Chapter Awards
S. No.
Nominee
Chapter
1.
Dr. A K Saini
Delhi
2.
Dr. Tarun Kumar De
Kolkata
3.
Ms. Alakananda Rao
4.
5.
S. No.
Region
Category
Chapter
1.
Region I
Category - B
Chandigarh
Kolkata
2.
Region I
Category - C
Dehradun
Mr. Dholakia Ghanshyam Gulabra
Ahmedabad
3.
Region II
Category – A
Kolkata
Mr. Arun Kumar
Bhilai
4.
Region III
Category – B
Ahmedabad
6.
Mr. Rajesh Kumar Vijayavergia
Ranchi
7.
Sri V K Garg
Rourkela
5.
Region III
Category – C
Udaipur
Bangalore
6.
Region IV
Category – C
Ranchi
7.
Region IV
Category – C
Bhilai
8.
Region V
Category – A
Bangalore
8.
Mr. Ashok S Kololgi
9.
Prof. K Raja Sekhar
Koneru
10.
G Siva Nageswara Rao
Vijayawada
11.
Shri Paramata Satyanarayana
Vishakhapatnam
12.
Mr. Sanjay V Kulkarni
Aurangabad
9.
Region V
Category - A
Vishakhapatnam
13.
Shri Ramrao Wagh
Goa
10.
Region VI
Category – A
Mumbai
14.
Srinivas Eranki
Mumbai
15.
Mr. Anurag Ashok Kenge
Nashik
11.
Region VI
Category – A
Pune
16.
Mr. Ashok Pawar
Pune
12.
Region VI
Category – C
Nashik
17.
Mr. Jayaramakrishnan K
Chennai
13.
Region VII
Category – A
Chennai
18.
Mr. N Raveendran
Coimbatore
14.
Region VII
Category – C
Cochin
19.
Mr. Mohapatra Biranchi Narayan
Cuttack
20.
Mr. Gautam Mahapatra
Hyderabad
15.
Region VII
Category – B
Coimbatore
21.
Mr. Devesh Kumar Dwivedi
Allahabad
Best National Chapter: Bangalore
Life Time Achievement Award
Prof. H N Mahabala
Prof. PVS Rao
Dr. N Vittal
Fellowship
Prof. Pradeep Pendse
Prof. Rajeev Sangal
Dr. Pankaj Jalote
Prof. R K Shyamasundar
Mr. Sibsankar Daspal
Dr. Dinkar S Rane
CSI Patron Award on National Level
Sri. Ravi Saxena
Significant Contribution at National Level
Dr. Dharam Singh
Ms. Awantika Varma
Mr. Vijaya Sekhar KS
Dr. M A Maluk Mohamed
Mr. T Sabhapati
For more details of CSI Service Awards Winner, Kindly visit http://www.csi-india.org/web/csi/
CSI Communications | January 2013 | 38
www.csi-india.org
Computer Society of India
TM
About YITP Awards:
The National competition for young IT professionals is an event conducted annually instituted by CSI in the year 1999
to encourage Researchers, IT Professionals, Academicians, Consultants, Entrepreneurs and IT Practitioners in an
Organization or as individuals in service/ support/ training function in the field of Information Technology.
Themes:
Hardware. Software, Application, Communications and Education & Research
Awards Comprise of:
Trophy and Certificate to winning team/individual and prize as under:
Category
Winner
1st runner up
Special mention
National Awards
Regional YITP award (For each region)
` 50,000/` 25,000/` 15,000/-
` 25,000/` 15,000/` 10,000/-
The winners of the regional contest will qualify for competing in the final national round.
Host Chapters for Regional Contest
Regional Round
will be held at
Region-I
DELHI
Region-II
KOLKATA
Region-III
Territory
Regional YITP Conveners
Delhi, Punjab, Haryana, Himachal
Pradesh, Jammu & Kashmir, Uttar
Pradesh, Uttaranchal and other
areas in Northern India
Assam, Bihar, West Bengal, North
Eastern States and other areas in
East and North-East India
Gujarat, Madhya Pradesh, Rajasthan
and other areas in Western India
AHMEDABAD
Region-IV
BHILAI
Region-V
Jharkhand, Chhattisgarh, Orissa
and other areas in Central & South
Eastern India
Karnataka and Andhra Pradesh
BANGALORE
Region-VI
Maharashtra and Goa
NASHIK
Region-VII
Tamil Nadu, Pondicherry, Andaman
and Nicobar, Kerala, Lakshadweep
CHENNAI
Prof. M N Hoda
Mob: 09212022066
Email: [email protected]
Mr. Deva Prasanna Sinha
Mob: 09830129551
Email: [email protected]
Mr. Sanjay Parikh
Mob: 09376152193
Email: [email protected]
Mrs. Ranjana Muley
Mob: 09407982385
Email: [email protected]
Mr. Bindhumadhava
Mob: 09844253414
Email: [email protected]
Mr. Prashant Patil
Mob: 09545453233
Email: [email protected]
Dr. R M Suresh
Mob: 09444285519
Email: [email protected]
Last Date of
Application
Regional Round on
15/01/2013
16/02/2013
31/12/2012
19/01/2013
28/01/2013
09/02/2013
15/01/2013
02/02/2013
08/02/2013
22/02/2013
20/01/2013
07/02/2013
18/01/2013
25/02/2013
The National round will be hosted by CSI, Coimbatore Chapter at PSG College of Technology, Coimbatore, Tamil Nadu on CSI Foundation
Day - 6th March 2013. CSI National Young IT Professional Award will be presented on the same day.
National Round
Patron : Dr. R Nadarajan, PSG College of Technology, Coimbatore
Event coordinator : Mr. N Valliappan, Secretary, CSI Coimbatore Chapter (Mob: 09842231307)
How to apply
Nominations should be made in the prescribed format available on the CSI-website: http://www.csi-india.org/web/csi/yitpawards2012 or
http://www.csi-india.org/yitpawards2012 on or before the last date of submission for the specific region to the Regional Convener.
Bipin Mehta
Convener, CSI Young IT Professional Awards
Parmata Satyanarayana
Co-Convener, CSI Young IT Professional Awards
MD Agrawal
Chairman, CSI Awards Committee
CSI Communications | January 2013 | 39
Begin the New Year with a new perspective on Emerging Technologies
CSI-IT2020
IT2020
SECURITY -- MOBILITY
SOCIAL MEDIA -- BIG DATA
TOPIC: Making Emerging Technologies a Boardroom Agenda
VENUE: Victor Menezes Convention Centre,
Indian Institute of Technology, Bombay
st
DATE: 1 February 2013
EVENT HIGHLIGHTS
• Insights of world renowned
speakers in 4 tracks
• Focus on Big Data, Social Media,
Security and Mobility
• High Power CIO Summit
• CIO Conclave: By Invitation Only
• Participation of key organisations &
CSI partners
• Experience spoken Tutorials of IIT
Bombay
• Eminent academician: Prof. D B
Phatak on webinar from US
• Knowledge Partner: KPMG
VENUE
Victor Menezes Convention Centre,
IITB, Mumbai
KEY TRACKS
NEW PARADIGMS IN :SECURITY
• How can virtual business processes be built enabling
stakeholders to do seamless business?
Track Chair: B. Swaminathan, Director, Deloitte
Touche Tohmatsu India Pvt. Ltd.
MOBILITY
1. How can mobile devices be secured against threat?
2. How can this help customer engagement and
employee productivity to improve.
Track Chair: Lalit Sawhney, Director, Lalit Sawhney
and Associates
SOCIAL MEDIA
1. What value addition could Social Media add to the
company?
2. How can this help organisations earn business and
improve performance?
Track Chair: Harish Tibrewala, Social Media
Strategist, Business Owner & Jt. CEO at Social
Wavelength.Com
BIG DATA
1. What is the value in Big Data that can be exploited with
experimentation and exploration?
2. How can Big Data be used as an opportunity for
insights in voluminous data forms soaring beyond
historical record keeping?
Track Chair: Sanjay Lulla, Associate Director, Sales
West, IBM
Making
Emerging Technologies
a Boardroom Agenda
DELEGATE PROFILE
• CxOs, CIO Top Management
• Senior Business Strategists
• Professionals from MNCs
• IT Managers
• Academicians, Analysts and
Researchers
• Entrepreneurs and Investors
Knowledge Partner
REGISTRATION FEES
CSI Members
Non CSI Members
Students
Academicians
:
:
:
:
INR 2,500
INR 3,500
INR 500
INR 1,500
EARLY BIRD DISCOUNT BEFORE 15 JANUARY 2013
CSI Members
: INR 1,750
Non CSI Members : INR 3,000
Academicians
: INR 1,000
IT2020 CONFERENCE SECRETARIAT
CSI Mumbai Chapter, IT2020 Secretariat,
Unit III, Flr IV, Samruddhi Venture Park,
MIDC, Andheri East, Mumbai 400 093.
CONTACT NUMBERS
+91-22-28235476
+91-22-28235548
Telefax: +91-22-28235546
GROUP DISCOUNT
FOR ORGANISATIONS ONLY
5 and more participants from the
same organisation get a 10% discount
REGISTRATION ENQUIRY
[email protected]
PARTNERSHIP ENQUIRY
[email protected]
Participate in the Emerging Technologies Survey, created by our knowledge partner KPMG.
Log on to our website, www.csimumbai.org/it2020/ to take the survey. Results out on 1st February 2013
LOG ON TO
www.csimumbai.org/it2020/ TO KNOW MORE AND REGISTER NOW
CSI Communications | January 2013 | 40
www.csi-india.org
CSI News
From CSI Chapters »
Please check detailed news at:
http://www.csi-india.org/web/csi/chapternews-January2013
SPEAKER(S)
TOPIC AND GIST
BHOPAL (REGION III)
6 December 2012: A general meet of CSI and release of a research book
Dr. R K Datta
A general meet was organized. There were many eminent personalities
present including Dr. R K Datta, Professor V P Saxena, Mr. Vivek Dhawan,
and Dr. K R Pardasani. A research book on ‘Engineering Management &
Pharmaceutical Science’ was unveiled by the eminent guest.
Í
While releasing of a research book
GWALIOR (REGION III)
Director DRDE Gwalior, AC Pandey,
Suryanarayana, and Er. Sushil Batham
Dr.
MVS 1 December 2012: 16th Computer Quiz
Chapter organized 16th computer quiz. Rishi Galav Public school won the first
prize, Army public school secured 2nd position. Director DRDE Gwalior was
the chief guest for this event, Convener of the quiz was CSI member AC Pandey.
Dr. MVS Suryanarayana addressed the audience. Chief guest distributed the
prizes and certificates to the winners and the participants respectively.
Í
Chief Guest distribuƟng the prizes
ROURKELA (REGION IV)
Mr. S K Panigrahi, Mr. N Suresh Kumar, Mr. A K Dash, 25 November 2012: CSI Quiz and Elocution-2012 Competitions for School Students
and their team
Chapter organized quiz and elocution competitions for school students
of classes-IX and X around Rourkela. Topics covered were Computer
Hardware, Programming Basics, Networking, Database and Who is Who
in Computer Industry. The topic for elocution competition was “IT for the
underprivileged mass”. 28 students of Class-VII and VIII from 14 schools
participated in the competition.
Í
The students parƟcipaƟng in the compeƟƟons
Shri Dipankar Basu, Sri P K Padhi, Sri N Suresh Kumar, Mr. S 16 December 2012: Ceremony of “Prize Distribution of CSI Quiz and
K Panigrahi, Mr. A K Dash, Smt B Mohanty, and Sri V P Arya Elocution-2012 Competitions”
Shri Dipankar Basu graced the occasion as Chief Guest and presented the
Quiz and Elocution Awards to students. All the Prize winning students were
given a Certificate, Memento and a Bag. Sri P K Padhi, was the Guest of
Honour and handed over the CSI Service Awards.
Í
Prize distribuƟon and winning team
BANGALORE (REGION V)
Mr. Suresh Thiagarajan
1 December 2012: One-day Workshop on “Software Configuration
Management (SCM)”
SCM is critical in ensuring integrity of software work products. Workshop
started with basic concepts of configurable item identification, naming
convention, establishing folder structure and controlling their access. Handson session using SVN-Tortoise tools was conducted for understanding
features like repository creation, folder / file uploads, checking out, commit,
multiple commit & conflict resolution, branching, tagging and merging.
Other topics covered were concepts on CM planning, CM audits, CM status
accounting and CM related metrics with related exercises.
Í
Faculty members and parƟcipants in workshop
CSII Co
CS
Communications
omm
m un
u ic
i at
a io
ons
n | Ja
January
Janu
nuar
nu
ary
ar
y2
201
2013
013
01
3 | 41
SPEAKER(S)
TOPIC AND GIST
HYDERABAD (REGION V)
Dr. A Govarthan, Muralidhar, Sh. Ramesh Loganathan,
Sh. Atul Negi, Dr. L Pratap Reddy, and Dr. Srineevas
14 December 2012: One-day Workshop on “Open Source Technologies –
The Present Scenario”
Topics covered were - Introduction to Open Source software, FOSS
Advantages, FOSS trends and initiatives in C-DAC, FOSS in Mobile
Technologies, Implementation of Video Streaming using Open source
tools, Latest open source technologies and applications like CMS, LMS etc.,
Demonstration of BOSS GNU/Linux and its compatibility with commercial
software and Security in Open Source software.
Í
(L to R): Dr. A Govarthan, Muralidhar, Sh. Ramesh Loganathan, Sh. Atul Negi,
Dr. L Pratap Reddy, and Dr. Srineevas
VISHAKHAPATNAM (REGION V)
Prof. Raj Kumar Buyya
13 December 2012: One-day Workshop on “Introduction to Cloud Computing”
Dr. Raj Kumar Buyya enlightened the participants on Cloud Computing and
spoke on topics on recent advances in parallel and distributed computing, Cloud
Architectures, cloud computing platforms and cloud computing case studies
using Aneka Platform. Various aspects of cloud computing were explained along
with details on how to install cloud environment at lab. Demonstration on cloud
computing with effective improvement in response efficiency was conducted.
Í
Speaker conducƟng the workshop
COIMBATORE (REGION VII)
Arun Sundararaman
2 November 2012: Lecture on “Business Analytics - Recent Trends and
Industry Expectations”
Mr. Arun delivered the lecture with special focus on Healthcare and Manufacturing.
The central theme of the lecture was around how the Information Management
paradigm is changing from the relatively “simple” Enterprise Data Management
world to the emerging “complex” era of Business Analytics. In short, key for successful
corporate practices in leveraging potential of business analytics lies in generating
differentiated and actionable insights and building appropriate algorithms.
Í
Arun Sundararaman during the lecture
COIMBATORE (REGION VII)
Dr. Harjinder Singh Lallie
29 November 2012: Lecture on “The Changing Cyber Security Landscape”
Dr. Lallie started with research trends in analytics related to cyber
security and analysis of cyber crimes. He explained how analytics was
used in analyzing and eliminating less critical entities and how to narrow
down to identify critical entities crucial to the case. He dealt with further
developments in areas of Cyber security and cyber crimes that are posing
challenges to many countries and governments, than the corporates. He
also highlighted the opportunities for the professionals and corporates.
Í
Dr. Harjinder Singh Lallie during the lecture
TRIVANDRUM (REGION VII)
Chapter in association with Zyxware Technologies 17 November 2012: One-day Hands on Workshop on “Introduction to HTML5”
The workshop provided a complete introduction to HTML5. The content
included - how to build HTML5 pages, understanding differences between
HTML5 and HTML4, using new semantic elements and attributes of HTML5,
working with audio and video in HTML5, working with new Canvas element
to create code-based drawings in HTML5, using Web Storage for offline
applications, using new HTML5 form elements, understanding current state
of browser support for HTML5 and how to make HTML5 sites degrade
gracefully. Programming exercises were used to reinforce the learning.
Í
CSII Co
CS
Comm
Communications
mmun
mm
unic
un
ic
cat
atio
ions
nss | Ja
January
anu
uarr y 2
2013
013
01
3 | 42
ParƟcipants during HTML5 workshop
www.
ww
w.cs
w.
csics
i-in
indi
in
dia
di
a.or
a.or
org
g
www.csi-india.org
From Student Branches »
http://www.csi-india.org/web/csi/chapternews-January2013
SPEAKER(S)
TOPIC AND GIST
MODEL INSTITUTE OF ENGINEERING & TECHNOLOGY (MIET), JAMMU (REGION-I)
Prof. Ankur Gupta, Prof. S K Sharma, Mr. Aijaz Qaiser,
and Prof. Salim Raza Qureshi
2 December 2012: Celebration of the "World Computer Literacy Day"
Prof. Ankur Gupta highlighted the need of computer literacy for underprivileged socio-economic section of the country. Prof. S K Sharma also
stressed on the idea to initiate computer literacy mission in the state. Mr. Aijaz
Qaiser applauded the efforts made by the college. Prof. Salim Raza Qureshi
explained how this initiative which has been taken by the college.
Í
ParƟcipants aƩending the event
BHARATI VIDYAPEETH'S INSTITUTE OF COMPUTER APPLICATIONS & MANAGEMENT, NEW DELHI (REGION-I)
Prof. M N Hoda, Mr. N K Gupta, and Prof. Moin Uddin
24-25 November 2012: Two-days Faculty Development Programme (FDP)
Prof. Hoda emphasized that 21st century teaching learning system will
be based on learners’ pull rather than teachers’ push strategy. Mr. Gupta
introduced ISTE and highlighted its significance for professional growth of
technical faculty members. Prof. Uddin opined that teachers’ growth will be
based on quality research. There were sessions on concepts like - Activity
Oriented Learning, Intelligent Pedagogies for Computer Science Teaching,
Problem and Project Based Learning, Challenges and Opportunities for 21st
Century Teaching Learning System etc.
Í
FDP: A group photograph
ACROPOLIS INSTITUTE OF TECHNOLOGY AND RESEARCH (AITR), INDORE (REGION-III)
NGO Asra Samajik Lok Kalyan Samiti, Dewas
11 August 2012: Awareness Program on “Child Education, Corruption and
Girl Infanticide”
With association of NGO Asra Samajik Lok Kalayan Samiti awareness program
was organized to guide villagers about corruption by playing certain nukkad
natak in front of them. The event encouraged people to give education to their
children and fight against corruption & girls infanticide.
Í
EMC2 persons
Awareness Program on educaƟon, corrupƟon and girl infanƟcide
14 September 2012: A Technical Event on Cloud and Big Data “Epistemology 2012”
Event of EPISTEMOLOGY 2012 was organized with EMC2 to update with
latest technology in IT industry. Experts shared their views on new technology
and explained how it is a good platform for students to showcase their talent.
Events like Online Quiz, Paper Presentation, Poster Presentation, Expert Talk
were part of the program.
Í
Online Exam for Quiz
14 September 2012: Technical Competition on “C language”
Technical Competition was organized on C language for students of BE and
MCA. The Aim of this event was to prepare the students for the placement.
Í
WriƩen Test and Online Test
CSII Co
CS
Communications
omm
m un
u ic
icat
a io
at
ons
n | Ja
January
Janu
n ar
nu
ary
y2
2013
013
01
3 | 43
SPEAKER(S)
TOPIC AND GIST
ACROPOLIS INSTITUTE OF TECHNOLOGY AND RESEARCH (AITR), INDORE (REGION-III)
Rakshit Tandon, Manish Nahar
3 October 2012: Expert Talk on “Surf Safe” and on “i-phone Technology”
The programme aimed at teaching youngsters how to use the Internet, while
educating them to be safe, smart and responsible users. Expert talk on “i-phone
Technology” by Manish Nahar was also organized. The aim of this event was to
explain i-phone technology and recent trends, research approach in this field.
Í
Expert Talk By Mr. Manish Nahar
GODAVARI INSTITUTE OF ENGINEERING AND TECHNOLOGY, (GIET), RAJAHMUNDRY, AP (REGION-V)
Shri Suman Das, Mr. Chandrasekhar Ramshetti, and
Santosh Kumar G
15–16 December 2012: CSI Prasthan 2K12 A National level Student Technical
Fest – “Information Security and Cloud Computing”
The program was focused on students of various engineering colleges.
Around 300 participants participated in this event. There were events like
technical paper presentation, poster presentation, brain drain, quiz and
many other spot events. On this occasion, workshop on cloud computing
by Mr. Chandrasekhar Ramshetti and on Information Security by Santosh
Kumar were also organized.
Í
Dr. D L N Raju lightning the lamp, Mr. Suman Das, Dr. S Maruthuperumal, and
Dr. L S Gupta are looking on the inauguraƟon event
ALL INDIA SHRI SHIVAJI MEMORIAL SOCIETY’S COLLEGE OF ENGINEERING, (AISSMS), PUNE (REGION-VI)
Mrs. M V Kadam, Ms. J P Asabe, Mr. A M Jagtap,
Mrs. M A Pradhan, and Dr. S P Danao
1-2 December 2012: Awards Won in National Convention of CSI at Kolkata
The Student Branch has won following awards - Best Student Branch Award
in Region VI (Maharashtra & Goa), International Paper Presenter Award Prof. Mrs. M A Pradhan and Highest Committed Student Branch Activist Awar
- Ms. Shruti Sayal.
Í
Head of Department Prof. M A Pradhan with CSI Coordinators
DR. NGP INSTITUTE OF TECHNOLOGY, COIMBATORE (REGION-VII)
Mr. Guruprasad Vijayarao, Ms. Swapna Akula, and
Ms. Divya Khandelwal
21 September 2012: National Level Workshop on Windows Azure
The workshop explained basic concepts of cloud platform using database
connectivity with SQL. Both theory and Hands-on sessions were conducted
by pioneers in the field of cloud computing using Windows Azure. Mr.
Vijayarao spoke about What is Cloud Computing, Introduction to Azure, How
it is different, Azure Roles, Storage and Application Fabric. Ms. Khandelwal
conducted hands-on Lab-Upload - a simple application using Azure. Ms. Akula
talked about SQL Azure.
Í
Faculty member conducƟng the workshop
EINSTEIN COLLEGE OF ENGINEERING, TIRUNELVELI, TN (REGION-VII)
Mr. D Sai Satheesh, Dr. AVS Prasad, and
Prof. V Muniraju Naidu
2 November 2012: Quiz titled "Einstein Quiz 12"
Einstein quiz 12 was organized for first year students. More than 100 students
participated in the Knock out round for the quiz. Top 15 from the 100 were
selected and 5 groups with 3 members each were formed. The winners are First prize Kavitha P., Ullagammal Suganya and Bhavathachayini.
Í
CSII Co
CS
Comm
Communications
mmun
mm
unic
un
ic
cat
atio
ions
nss | Ja
January
anu
uarr y 2
2013
013
01
3 | 44
Knock out round during Quiz 12
www.
ww
w.cs
w.
csics
i-in
indi
in
dia
di
a.or
a.or
org
g
www.csi-india.org
SPEAKER(S)
TOPIC AND GIST
JAMAL MOHAMED COLLEGE, TIRUCHIRAPPALLI (REGION-VII)
Dr. A Zameer Pasha, Prof. G Ravi, Dr. R Khader
Mohideen, Dr. A K Khaja Nazeemudeen and Mr. N
Hyder Ali, Dr. M Maluk Mohamed, Dr. T Abdul Razak,
Mr. M Ahamed Hussain and R Khader Mohideen
10-11 October 2012: Intercollegiate Technical Symposium “SWAP 2K12”
Various events such as Animation, Debugging, Extempore, IT Marketing,
Online Event, Quiz, Stress Management, Surprise Event, Short Film,
Treasure Hunt, Web Design and Word Hunt were conducted. The overall
championship was bagged by the students of Christ College of Engineering
& Technology, Pondicherry.
Í
Dr. M A Maluk Mohamed, giving away the overall championship to the
students of Christ College of Engineering & Technology, Pondicherry
KONGU ENGINEERING COLLEGE (KEC), PERUNDURAI, TN (REGION-VII)
7 September 2012: An Inter-departmental Technical Symposium
“NAEVUS’12”
The program started off with C-Debugging in CC1 followed by Paper
Presentation and Idea Presentation in ITP-S03. Parallel event photography
was also conducted. This was followed by GOOGLE Mania. Other events
were started with Quiz programme. It was continued with Marketing and
then followed by Team Zappers. NAEVUS’12 provided a platform students to
showcase their talent and technical skills as well as managerial skills.
Í
A snapshot on NAEVUS’12- interdepartmental Technical Symposium
MOUNT ZION COLLEGE OF ENGINEERING AND TECHNOLOGY, PUDUKKIOTTAI, TAMILNADU (REGION-VII)
Mr. K Somasundram
27 August 2012: Guest Lecture on “Visual Programming”
Mr. K Somasundram gave lecture about Fundamentals of Visual Programming
and its Techniques. He explained topics such as - MFC Library, Active X, COM
and DCOM.
Í
Dr. A Vadivel
ParƟcipants aƩending Lecture on “Visual Programming”
29 August 2012: Guest Lecture on “Internet Computing”
Dr. A Vadivel gave lecture about Server Side Programming. He explained
concepts such as XML, SOAP and Web Services.
Í
Ms. N Anathalakshmi
Faculty Member and students during lecture on “Internet CompuƟng”
3-7 October 2012: Five-days Workshop on “Network Simulator-2”
Ms. N Anathalakshmi gave training about NS2, Routing Protocols and NS2
Programming.
Í
Faculty Member conducƟng workshop
CSII Co
CS
Communications
omm
m un
u ic
icat
a io
at
ons
n | Ja
January
Janu
n ar
nu
ary
y2
2013
013
01
3 | 45
SPEAKER(S)
TOPIC AND GIST
NARASU'S SARATHY INSTITUTE OF TECHNOLOGY (NSIT), POOSARIPATTY, SALEM (REGION-VII)
Mr. Abdul Kareem
22 September 2012: One-day Workshop on “PC troubleshooting &
Hardware Assembly”
The Project Manager of RAK Technologies Mr. Abdul Kareem highlighted
the basic components of a PC and the process of assembling them. He also
delivered his ideas on overlocking and secrets of improving performance.
Í
Dignitaries on dais
S.A. ENGINEERING COLLEGE, CHENNAI (REGION-VII)
Mr. Y Kathiresan
November 2012: Guest Lecture on "CSI Awareness Program"
Department of MCA organized the CSI awareness program for First year
students of CSE, IT and MCA to explain the benefits of CSI membership.
Mr. Y. Kathiresan explained the benefits of becoming CSI Member and
motivated students to become members of CSI.
Í
Dr. S Suyambazhahan, S A Engineering college, Dr. Viji Rajesh, Mr. Y Kathiresan,
and Sr. Manager and Taramani
SREE NARAYANA GURUKULAM COLLEGE OF ENGINEERING (SNGCE), ERNAKULAM, KERALA (REGION-VII)
Dr. M V Rajesh
20 September 2012: Guest lecture on “Artificial Neural Networks (ANN)
and its Applications”
The objective was to provide information on ANN and where it is applied.
Dr Rajesh said that an artificial neural network is an interconnected group
of nodes just like network of neurons in the human brain. Later he spoke
on linear separability and XOR problem and explained various layers
viz.- input layer, hidden layer and output layer. Students learnt about
supervised training and unsupervised training, feed forward networks,
back propagation etc. and the applications of neural network that include
character recognition, data compression, pattern recognition, signal
processing, language processing etc.
Í
InauguraƟon by Dr. M V Rajesh
VELAMMAL INSTITUTE OF TECHNOLOGY, CHENNAI (REGION-VII)
21 August 2012: Intra-college Paper Presentation Event “CARTE BLANCHE”
Student Chapter organized an inter-department Paper Presentation event
“CARTE BLANCHE” for II and III year students to improve their Presentation
skills and to create an awareness on latest trends. Best three papers were
selected from the presentation & were awarded.
Í
Students aƩending Paper PresentaƟon event
8 October 2012: Online Coding and Debugging Event
Online coding and debugging competition was conducted through the
software created by final year students. Based on the first round results,
top ten performers were selected for the next round. In this phase, coding
knowledge was verified by analyzing piece of code in C program. Finally, top
three teams were selected & awarded.
Í
CSII Co
CS
Comm
Communications
mmun
mm
unic
un
ic
cat
atio
ions
nss | Ja
January
anu
uarr y 2
2013
013
01
3 | 46
ParƟcipants aƩending on line Coding and Debugging Event
www.
ww
w.cs
w.
csics
i-in
indi
in
dia
di
a.or
a.or
org
g
www.csi-india.org
Following new student branches were opened as mentioned below: –
REGION V
ƒ HKBK College of Engineering, Bangalore The inauguration of student branch began with qirat and lighting of lamp on 25th August, 2012.
The Chief Guest Mr. Vishwas Bondade gave keynote address. It was followed by a Technical
Symposium with four events – such as Technical Quiz, Code Debugging, Programming, and
Technical Pick & Speak.
ƒ Regency Institute of Technology (RIT), Adavipolam, Yanam, AP
Regency Institute of Technology inaugurated CSI student branch on 15th September 2012, in the
presence of Dr. P Kumar Babu, Dr. A Rama Krishna Rao, Prof. S T V S Kumar, Mr. B Venkata
Ramana, Mr. B Sateesh Kumar and other delegates. The inaugural function was followed by a
technical seminar on "Recent Trends in Software industry" by Mr. B Venkata Ramana. Further a
guest lecture on "Software Testing" was given by Mr. B Sateesh Kumar.
Lightning the lamp by dignitaries,
HKBKCE-CSI Students Branch
Inauguration 2012.
The Dignitaries on the dais from L
to R: Dr. T C Manjunath, Mr. Abdul
Hameed S A, Mr. Vishwas B,
Mr. Prakash, and Mr. Faiz
Yanam: Dr. A Rama Krishna Rao, Dean
RIT, Welcoming the guests on the
Inauguration of the Student branch
REGION VI
ƒ Manoharbhai Patel institute of Engineering and Technology (MIET), Gondia
Inauguration of Student Branch at MIET was organized on 16th October 2012. Guest of honor was
Mr. Vinod Verma, DGM - IT Systems - Adani Power. Special guest Mrs. Gayatri Soni talked about
cyber crime and about safe and secure practices students should follow while working on Internet.
Along with inauguration Garba - Dandia event was also organized. Program of Computer Tricks
included Shobhit Katiyar and Lun, such as treasure hunt, computer quiz, graphity, and extempore.
Guests on stage for Inauguration at
MIET, Gondia
REGION VII
ƒ Einstein College of Engineering, Tirunelveli, TN
The CSI student branch was inaugurated on 16th October 2012, in the presence of Mr. Y
Kathiresan, Prof. A Ezhilvanan, Dr. K Ramar, Prof. R Velayutham & Prof. M Suresh Thangakrishnan.
Mr. Kathiresan explained the benefits & use of CSI membership. Also he conducted a session on
“Your Unique Identity”.
Mr. Y Kathiresan, Prof. A Ezhilvanan,
Dr. K Ramar, Prof. R Velayutham &
Prof. M Suresh Thangakrishnan
ƒ SASTRA University, Srinivasa Ramanujan Center (Sastra-SRC), Kumbhakonam, TN
The inaugural function of CSI student branch in Sastra-SRC was held on 12th September 2012. It
was graced by resource person Mr. Kathiresan. He delivered inaugural address and gave a lecture
on “Your Unique Identity”.
ƒ Nehru College of Engineering And Research Centre, (NCERC), Kerala
The inauguration of CSI-Student branch took place on 6th December 2012, and Prof. Prashant
R Nair was the Chief Guest. About 150 students of UG and PG in CSE and IT Departments
participated in the function. Prof. Prashant Spoke on “Importance of CSI in IT sector”.
ƒ SNS College of Engineering Coimbatore
The CSI student branch was inaugurated on 6th October 2012, by Mr. R. Mahalingam. Two
presentations were projected on the topics, “Inauguration of CSI student Branch” and “What is
CSI?” Dr. C. Vivekanandan gave a speech about growing trends in technology and the need for
students to take them up seriously.
Inauguration of Student Branch at
NCERC, Kerala
Guests on stage
ƒ Vivekanandha Engineering College for Women, Sankari
Student Chapter inauguration was held on 29th October 2012. Dr. V Krishnakumar, Principal,
welcomed the gathering. The chief guest Mr. L Venkatesan enlightened the students on how to
use student chapter.
Inspiring speech by Mr. L Venkatesan chief guest
On the Dias R to L: Prof. Mohanraj, Dr. V Krishnakumar and Ms. D Sathya
CSII Co
CS
Communications
omm
m un
u ic
i at
a io
ons
n | Ja
January
Janu
nuar
nu
ary
ar
y2
201
2013
013
01
3 | 47
COMNET-2013
National Conference on Computer Communication and Networks
Theme: Data Communication and Networking for Inclusive Growth
(March 21-22, 2013)
Jointly Organized by: SIG-WNs, Division IV CSI, CSI Trivandrum Chapter and Sarabhai Institute of Science and Technology,
Trivandrum, Kerala (India)
Announcement and Call for Papers
Computer Society of India - National Conference on Communication and Networks (CoMNeT) 2013 with the theme: "Data
Communication and Networking for Inclusive Growth" provides an open forum for researchers, engineers, network planners and service
providers targeted on newly emerging algorithms, communication systems, network standards, services, and applications, bringing
together leading players in Computer Communication and Networks.
Instruction for Authors
Authors are requested to submit full papers in IEEE format describing their original, unpublished, research contribution which is not
currently under review by another conference or journal
Important Dates:
Submission of Full Paper
6th February, 2013
Paper Acceptance Notification
20th February, 2013
Detailed guidelines are available at: www.comnet2013.in
Prof (Dr) C.G Sukumaran Nair
Chair-Programme Committee
CSI-COMNET-2013
Email : [email protected]
CSI Membership = 360° Knowledge
WE INVITE YOU TO JOIN
Your membership in CSI provides instant
access to key career / business building
resources - Knowledge, Networking,
Opportunities.
Computer Society of India
CSI provides you with 360°
coverage for your Technology goals
Join us
India's largest technical
professional association
and
become a member
Learn more at www.csi-india.org
I am interested in the work of CSI . Please send me information on how to become an individual/institutional*
member
Name ______________________________________ Position held_______________________
Address______________________________________________________________________
______________________________________________________________________
City ____________Postal Code _____________
Telephone: _______________ Mobile:_______________ Fax:_______________ Email:_______________________
*[Delete whichever is not applicable]
Interested in joining CSI? Please send your details in the above format on the following email address. [email protected]
CSI Communications | January 2013 | 48
www.csi-india.org
CSI Calendar
2013
Date
Prof. S V Raghavan
Vice President & Chair, Conference Committee, CSI
Event Details & Organizers
Contact Information
January 2013 Events
21 Jan. 2013
Hands on Workshop on Advanced Excel
CSI Mumbai Chapter at Mumbai
Harshvardhan Mane, [email protected] /
[email protected]
23-24 Jan. 2013
8th National Conference of IT for Defence on “Role of Information Technology for Defence
Modernization
NIMHANS Convention Centre, Bangalore
Dr. C R Chakravarthy, [email protected]
Mr. H C Sridhar
[email protected]
24-27 Jan. 2013
Workshop on Project Management (PMBOK Guide Version 4.0)
CSI Mumbai Chapter at Mumbai
Harshvardhan Mane
[email protected] / [email protected]
29-31 Jan. 2013
International Conference on Reliability Infocom Technologies and Optimization
(Trends and Future Directions)
Amity Institute of Information Technology Amity University CSI and IEEE
Prof. Sunil Kumar Khatri
[email protected]
31 Jan. 2013
Workshop on Software Effort Estimation using FPA Method, Mumbai
Venue : CSI Mumbai Chapter
Harshvardhan Mane
[email protected] / [email protected]
February 2013 Events
1 Feb. 2013
IT2020 - Making Emerging Technologies a Board Room Agenda
The Lalit Hotel
Harshvardhan Mane
[email protected] / [email protected]
1-2 Feb. 2013
A Southern Regional Conference on Innovation in Information Technology Vizag 2012-13
Computer Society of India Visakhapatnam Chapter
Suman Das
[email protected]
2 Feb. 2013
Regional Round Contest of Young IT Professional (YITP) Awards- Region-IV
CSI Bhilai Chapter
Mrs. Ranjana Muley
[email protected]
7 Feb. 2013
Regional Round Contest of Young IT Professional (YITP) Awards- Region-VI
CSI Nashik Chapter
Mr. Prashant Patil
[email protected]
8-9 Feb. 2013
Regional Conference of Region-VI on ‘NexGen Computing’
CSI Nashik Chapter
Mr. C B Dahale
[email protected]
9 Feb. 2013
Regional Round Contest of Young IT Professional (YITP) Awards- Region-III
CSI Ahmadabad Chapter
Mr. Sanjay Parikh
[email protected]
16 Feb. 2013
Regional Round Contest of Young IT Professional (YITP) Awards- Region-I
Bharati Vidyapeeth's Institute of Computer Applications and Management (BVICAM)
New Delhi and CSI
Prof. M N Hoda
[email protected]
19-20 Feb. 2013
International Conference on Advance Computing and Creating Entrepreneurs (ACCE2013)
SIG-WNs DivIV and Udaipur Chapter CSI and GITS Udaipur
http://www.acce2013.gits.ac.in/
Dr. Dharm Singh, [email protected]
Sanjay Mohapatra, [email protected]
Ms. Ridhima Khamesra, [email protected]
22 Feb. 2013
Regional Round Contest of Young IT Professional (YITP) Awards- Region-V
CSI Bangalore Chapter
Mr. Bindhumadhava
[email protected]
25 Feb. 2013
Regional Round Contest of Young IT Professional (YITP) Awards- Region-VII
CSI Chennai Chapter
Dr. R M Suresh
[email protected]
March 2013 Events
6 March 2013
National Round Contest of Young IT Professional (YITP) Awards
CSI Coimbatore Chapter at PSG College of Technology, Coimbatore, Tamil Nadu
Mr. N Valliappan
[email protected]
6–7 March 2013
INDIACom – 2013; 7th Nation Conference on “Computing for Nation Development”
Bharati Vidyapeeth's Institute of Computer Applications and Management (BVICAM) New Delhi
CSI IEEE ISTE IETE IE (I)
Prof. M N Hoda
[email protected]
8 March 2013
NSC – 2013; 6th National Students’ Convention on “Computing for Nation Development”
Bharati Vidyapeeth's Institute of Computer Applications and Management (BVICAM) New Delhi
CSIISTE IETE IE (I)
Mrs. Parul Arora
[email protected]
9-10 March
2013
International Conference on Information Systems and Computer Networks (ISCON-2013)
CSI Mathura Chapter Division IV & Region-I at GLA University Mathura www.gla.ac.in/iscon2013
Dr. Dilip Kumar Sharma
[email protected]
9-10 March
2013
IEEE ISCON 2013; 1st IEEE International Conference on Information Systems and Computer Networks
IEEE UP Section India, Division IV, Region-I & CSI Mathura Chapter at GLA University Mathura, India
www.gla.ac.in/ISCON2013
Dr. Dilip Kumar Sharma, [email protected]
Sanjay Mohapatra, [email protected]
Prof. R K Vyas, [email protected]
21-22 March
2013
National Conference on Communication and Networking for Inclusive Growth
CSI DIV IV (Communications) & CSI Trivandrum Chapter
Sarabhai Institute of Science and Technology, Trivandrum
http://www.csitvm.org
Dr. C G Sukumaran Nair
[email protected]
Mr. Biju Varghese, [email protected]
Sanjay Mohapatra, [email protected]
Please send your event news to [email protected] . Low resolution photos and news without gist will not be published. Please send only 1 photo per
event, not more. Kindly note that news received on or before 20th of a month will only be considered for publishing in the CSIC of the following month.
Registered with Registrar of News Papers for India - RNI 31668/78
Regd. No. MH/MR/N/222/MBI/12-14
Posting Date: 10 & 11 every month. Posted at Patrika Channel Mumbai-I
Date of Publication: 10 & 11 every month
If undelivered return to :
Samruddhi Venture Park, Unit No.3,
4th floor, MIDC, Andheri (E). Mumbai-400 093
COMPUTER SOCIETY OF INDIA
NATIONAL HEADQUARTERS
EDUCATION DIRECTORATE, CHENNAI
Invites Project Proposals from Faculty Members and Students
Under the Scheme of R&D Funding for the year 2012-2013
As India’s largest and one of the world’s earliest organizations for IT professionals, the Computer Society of India has always aimed
at promoting education and research activities, especially in advanced technological domains and emerging research fields. It is also
committed to take the benefits of technological progress to the masses across India, in particular to unrepresented territories. The
objective is to promote research and innovation and meeting the grass-root level ICT needs. To emphasize the importance of joint research
by faculty-students, CSI has been providing R&D funding to members from CSI student branches for last several years.
CSI Student Branch coordinators are requested to motivate the young faculty members and students (including undergraduate
and postgraduate) to benefit from this scheme. The proposals (based on the ongoing or new projects for the academic year 2012-13)
indicating the aims/objectives, expected outcome, and indicative thrust areas for research funding may be submitted to: The Director
(Education), Computer Society of India, Education Directorate, CIT Campus, IV Cross Road, Taramani, Chennai 600113. Last date for Receipt
of Proposals: 31st January, 2013.
Aims and Objectives
☞
☞
☞
☞
☞
☞
To provide financial support for research by faculty members, especially for developing innovative techniques and systems to improve
teaching-learning and institutional management processes.
To provide financial support to students for developing new systems catering to the needs of socially relevant sectors and/or involving
proof of concepts related to emerging technologies.
To facilitate interaction/collaboration among academicians, practitioners, and students.
To develop confidence and core competence among faculty/students through research projects.
To foster an ambience of ‘Learning by Doing’ and explore opportunities of industry funding and mentoring for inculcating
professionalism and best practices among students and faculty.
To recognize innovation and present excellence awards for path-breaking projects through CSI YITP awards and industry associations,
Govt. agencies, and professional societies.
Expected Outcome
✓
✓
✓
✓
✓
Identification of thrust areas, capability assessment, gap analysis, recommendations, and future education and research directions.
Integration of research methodologies into the university teaching-learning process and evolving a quality control mechanism for
academic programs and curricula.
Strengthening of industry-institute interaction through commercialization of technologies and products developed by students and
faculty.
Publication of research studies (ICT penetration, technological innovation, diffusion & adaptation), state-of-the-art reports, and case
studies of education/research initiatives.
Identification of potential new and innovative projects of young faculty, researchers, and students for possible business incubation.
Indicative Thrust Areas for Research Funding
Financial assistance of up to Rs 50,000/- for hardware projects and up to Rs 30,000/- for software projects would be provided to cover
items like equipment, books/journals, field work, questionnaire, computation work, and report writing. The indicative thrust areas for
funding include (but not limited to): Technology - OS, Programming Languages, DBMS, Computer & Communication Networks, Software
Engineering, Multimedia & Internet Technologies, and Hardware & Embedded Systems Process & Tools - Requirements Engineering,
Estimation & Project Planning, Prototyping, Architecture & Design, Development, Testing & Debugging, Verification & Validation,
Maintenance & Enhancement, Change Management, Configuration Management, Project Management, and Software Quality Assurance
& Process Improvement Vertical Applications - Scientific Applications, Enterprise Systems, Governance, Judiciary & Law Enforcement,
Manufacturing, Health care, Education, Infrastructure, Transport, Energy, Defense, Aerospace, Automotive, Telecom, and Agriculture
& Forest Management Inter-disciplinary Applications - CAD/CAM/CAE, ERP/SCM, EDA, Geoinformatics, Bioinformatics, Industrial
Automation, CTI, and Convergence.
Last date for Receipt of Proposals: 31st January, 2013
For further details and downloading application form, please visit “About Us – Education Directorate – R & D Projects” at www.csi-india.org
Wg Cdr M Murugesan (Retd.),
Director (Education)
Computer Society of India
Education Directorate,
CIT Campus, IV Cross Road
Taramani, Chennai-600113
E-mail: [email protected]