` 50/ISSN 0970-647X | Volume No. 36 | Issue No. 10 | January 2013 Cover Story Web 2.0: New Collaborative Tools for Business Excellence 5 Article Looking Back: Alan Turing- The Father of Computer Science 8 Article The Online Identity Crisis 10 www.csi-india.org Article Genesis of Aakash 2 21 Security Corner Information Security » Can You Keep Your Emails Secret? Lawfully? | January26 CSI Communications 2013 | A TM Join The Open Group Events How does Enterprise Architecture (EA) Transform an Enterprise? Mumbai February 18-19, 2013 New Delhi February 21-22, 2013 Industry Verticals & Topics Learn what organizations in these industry verticals are doing to stay progressive and relevant: Banking, Financial Services, Insurance Retail/Manufacturing Telecom, Media, and Entertainment Travel, Tourism, and Hospitality Government Topics include: Enterprise Architecture, TOGAF®, ArchiMate®, Cybersceurity, Security Architecture, Cloud, Big Data, Professional Development. At these events, you will learn: About business solutions, best practices, case studies, and current trends How EA facilitates Enterprise Transformation within IT How EA can create a foundation for Enterprise Transformation which business managers can understand and use to their advantage How EA can help the enterprise successfully adapt to “disruptive technologies” like Cloud Computing and ubiquitous mobile access About transformation management principles – making the whole process more a matter of design than chance Visit the event web sites for further details and to register: www.opengroup.org/mumbai2013 www.opengroup.org/newdelhi2013 Use promotion code YMMOVA for preferential rates to attend these events. Leading the development of open, YHQGRUQHXWUDO,7VWDQGDUGVDQGFHUWL¿FDWLRQV CSI Communications Contents Volume No. 36 • Issue No. 10 • January 2013 Editorial Board Chief Editor Dr. R M Sonar 5 Cover Story Web 2.0: New Collaborative Tools for Business Excellence Dr. Sudhanshu Joshi and Dr. Manu Sharma Editors Dr. Debasish Jana Dr. Achuthsankar Nair Resident Editor Mrs. Jayshree Dhere Published by Executive Secretary Mr. Suchit Gogwekar For Computer Society of India Design, Print and Dispatch by CyberMedia Services Limited Please note: CSI Communications is published by Computer Society of India, a non-profit organization. Views and opinions expressed in the CSI Communications are those of individual authors, contributors and advertisers and they may differ from policies and official statements of CSI. These should not be construed as legal or professional advice. The CSI, the publisher, the editors and the contributors are not responsible for any decisions taken by readers on the basis of these views and opinions. Although every care is being taken to ensure genuineness of the writings in this publication, CSI Communications does not attest to the originality of the respective authors’ content. © 2012 CSI. All rights reserved. Instructors are permitted to photocopy isolated articles for non-commercial classroom use without fee. For any other copying, reprint or republication, permission must be obtained in writing from the Society. Copying for other than personal use or internal reference, or of articles or columns not owned by the Society without explicit permission of the Society or the copyright owner is strictly prohibited. 8 Articles Looking Back: Alan TuringThe Father of Computer Science Vivek Kulkarni 10 16 The Online Identity Crisis Viraat Kothare 18 Making Big Data Work to Solve Big Problems Suryateja Tadigadapa 21 What Do You Need to Know to Be a Cybersecurity Professional? Avinash Kadam Genesis of Aakash 2 Kannan M Moudgalya & D B Phatak and N K Sinha & Pradeep Varma Practitioner Workbench 24 Programming.Tips() » Fun with ‘C’ Programs 25 Programming.Learn (“Python”) » ‘Regular Expression’ of Python 26 Information Security » Can You Keep Your Emails Secret? Lawfully? Wallace Jacob Umesh P Security Corner Adv. Prashant Mali 27 IT Act 2000 » Prof. IT Law in Conversation with Mr. IT Executive – How policies, implementation mechanisms, and training bridge the gap between the law and technology Issue No. 10 Mr. Subramaniam Vutha 28 HR Job Satisfaction: What Is It? Dr. Manish Godse PLUS IT.Yesterday(): CSI – The Early Days 30 Sarwottam Thakur Brain Teaser 32 Dr. Debasish Jana Ask an Expert 33 Dr. Debasish Jana Happenings@ICT: ICT News Briefs in December 2012 34 H R Mohan On the Shelf! Book Review » 35 Mrs Jayshree A Dhere CSI Report 36 R K Bagga CSI Report Ranga Rajagopal 37 CSI News 41 Published by Suchit Gogwekar for Computer Society of India at Unit No. 3, 4th Floor, Samruddhi Venture Park, MIDC, Andheri (E), Mumbai-400 093. Tel. : 022-2926 1700 • Fax : 022-2830 2133 • Email : [email protected] Printed at GP Offset Pvt. Ltd., Mumbai 400 059. CSI Communications | January 2013 | 1 Know Your CSI Executive Committee (2012-13/14) » President Mr. Satish Babu [email protected] Vice-President Prof. S V Raghavan [email protected] Hon. Treasurer Mr. V L Mehta [email protected] Immd. Past President Mr. M D Agrawal [email protected] Hon. Secretary Mr. S Ramanathan [email protected] Nomination Committee (2012-2013) Dr. D D Sarma Mr. Bipin V Mehta Mr. Subimal Kundu Region - I Mr. R K Vyas Delhi, Punjab, Haryana, Himachal Pradesh, Jammu & Kashmir, Uttar Pradesh, Uttaranchal and other areas in Northern India. [email protected] Region - II Prof. Dipti Prasad Mukherjee Assam, Bihar, West Bengal, North Eastern States and other areas in East & North East India [email protected] Region - III Mr. Anil Srivastava Gujarat, Madhya Pradesh, Rajasthan and other areas in Western India [email protected] Region - IV Mr. Sanjeev Kumar Jharkhand, Chattisgarh, Orissa and other areas in Central & South Eastern India [email protected] Region - V Prof. D B V Sarma Karnataka and Andhra Pradesh [email protected] Region - VI Mr. C G Sahasrabudhe Maharashtra and Goa [email protected] Region - VII Mr. Ramasamy S Tamil Nadu, Pondicherry, Andaman and Nicobar, Kerala, Lakshadweep [email protected] Region - VIII Mr. Pramit Makoday International Members [email protected] Regional Vice-Presidents Division Chairpersons, National Student Coordinator & Publication Committee Chairman Division-I : Hardware (2011-13) Dr. C R Chakravarthy [email protected] Division-II : Software (2012-14) Dr. T V Gopal [email protected] Division-IV : Communications (2012-14) Mr. Sanjay Mohapatra [email protected] Division-V : Education and Research (2011-13) Prof. R P Soni [email protected] Division-III : Applications (2011-13) Dr. Debesh Das [email protected] National Student Coordinator Mr. Ranga Raj Gopal Publication Committee Chairman Prof. R K Shyamsundar Important links on CSI website » Structure & Organisation National, Regional & State Students Coordinators Statutory Committees Collaborations Join Now Renew Membership Member Eligibility Member Benefits Subscription Fees Forms Download BABA Scheme Publications CSI Communications* Adhyayan* R & D Projects Technical Papers Tutorials Course Curriculum Training Program (CSI Education Products) eNewsletter* Current Issue Archives Policy Guidelines Events President’s Desk http://www.csi-india.org/web/csi/structure http://www.csi-india.org/web/csi/structure/nsc http://www.csi-india.org/web/csi/statutory-committees http://www.csi-india.org/web/csi/collaborations http://www.csi-india.org/web/csi/join http://www.csi-india.org/web/csi/renew http://www.csi-india.org/web/csi/eligibility http://www.csi-india.org/web/csi/benifits http://www.csi-india.org/web/csi/subscription-fees http://www.csi-india.org/web/csi/forms-download http://www.csi-india.org/web/csi/baba-scheme http://www.csi-india.org/web/csi/publications http://www.csi-india.org/web/csi/info-center/communications http://www.csi-india.org/web/csi/adhyayan http://csi-india.org/web/csi/1204 http://csi-india.org/web/csi/technical-papers http://csi-india.org/web/csi/tutorials http://csi-india.org/web/csi/course-curriculum http://csi-india.org/web/csi/training-programs http://www.csi-india.org/web/csi/enewsletter http://www.csi-india.org/web/csi/current-issue http://www.csi-india.org/web/csi/archives http://www.csi-india.org/web/csi/helpdesk http://www.csi-india.org/web/csi/events1 http://www.csi-india.org/web/csi/infocenter/president-s-desk CSI Divisions and their respective web links Division-Hardware http://www.csi-india.org/web/csi/division1 Division Software http://www.csi-india.org/web/csi/division2 Division Application http://www.csi-india.org/web/csi/division3 Division Communications http://www.csi-india.org/web/csi/division4 Division Education and Research http://www.csi-india.org/web/csi/division5 List of SIGs and their respective web links SIG-Artificial Intelligence http://www.csi-india.org/web/csi/csi-sig-ai SIG-eGovernance http://www.csi-india.org/web/csi/csi-sig-egov SIG-FOSS http://www.csi-india.org/web/csi/csi-sig-foss SIG-Software Engineering http://www.csi-india.org/web/csi/csi-sig-se SIG-DATA http://www.csi-india.org/web/csi/csi-sigdata SIG-Distributed Systems http://www.csi-india.org/web/csi/csi-sig-ds SIG-Humane Computing http://www.csi-india.org/web/csi/csi-sig-humane SIG-Information Security http://www.csi-india.org/web/csi/csi-sig-is SIG-Web 2.0 and SNS http://www.csi-india.org/web/csi/sig-web-2.0 SIG-BVIT http://www.csi-india.org/web/csi/sig-bvit SIG-WNs http://www.csi-india.org/web/csi/sig-fwns SIG-Green IT http://www.csi-india.org/web/csi/sig-green-it SIG-HPC http://www.csi-india.org/web/csi/sig-hpc SIG-TSSR http://www.csi-india.org/web/csi/sig-tssr Other Links Forums http://www.csi-india.org/web/csi/discuss-share/forums Blogs http://www.csi-india.org/web/csi/discuss-share/blogs Communities* http://www.csi-india.org/web/csi/discuss-share/communities CSI Chapters http://www.csi-india.org/web/csi/chapters Calendar of Events http://www.csi-india.org/web/csi/csi-eventcalendar * Access is for CSI members only. Important Contact Details » For queries, correspondence regarding Membership, contact [email protected] CSI Communications | January 2013 | 2 www.csi-india.org President’s Message Satish Babu From : [email protected] Subject : President’s Desk Date : 1st January, 2013 Dear Members At the outset, I wish you the very best for 2013! As we enter the last quarter of the year, it’s perhaps time to take stock of our progress so far, and take corrective action, if necessary, to achieve our targets. It is also a time to plan for the major events of the next financial year. We have had a very successful CSI Annual Convention last month at Kolkata. It is my pleasure to inform you that the 2013 Annual Convention has been awarded to CSI Vishakhapatnam Chapter. Since it is the first time that the Chapter will be organizing the Annual Convention, I wish the chapter leaders success in this endeavor and also commit that all the necessary assistance from the CSI HQ will be forthcoming. I had the pleasure of attending the 9th International Conference on e-Governance (ICEG 2012) co-organized by the Special Interest Group on e-Governance (CSI-SIG-eGov) at SCMS, Kochi, during 29-30 Dec. The Conference brought out the challenges facing e-Governance today in different parts of the country after over a decade of focused efforts. I would like to congratulate the host institution as well as the organizers, in particular the leaders of CSI-SIG-eGov, for organizing an excellent event. At the international level, December was a much-awaited month on account of the World Conference on International Telecommunications (WCIT 2012), organized by the International Telecommunications Union (ITU) at Dubai. The conference had the objective of reviewing the International Telecommunication Regulations (ITRs), which serve as the binding global legal instrument designed to facilitate international inter-operations of information and communication services. With the last review of ITRs taking place in 1988, and the intervening years have seen a revolution in ICTs, the conference attracted a significant amount of attention. However, the most compelling reason why civil society groups across the world were anxiously awaiting the event was related to the efforts by some Governments to bring in new regulations that would impose Governmental controls over the Internet. There were protests and widespread debates in different parts of the world on what was commonly perceived to be threats to the freedom of the Internet by this move. On the other hand, some also perceived the control of some of the Critical Internet Resources—a name applied to a set of resources such as the Domain Name System, IP addresses and root servers—by the US Government, as unnecessary and inequitable, especially as Internet evolves into a global information infrastructure of utility to all countries. As the dust settles on the event, it is far from clear as to what it has achieved. Some countries led by the US walked out of the last part of the Conference citing their irreconcilable differences with the outcome document of the conference, for several reasons such as the need for protection of Freedom of Expression on the Internet. Out of the total 193 attending countries, over 50 countries, including India and the US, have not signed the conference outcome document. The proposals to bring in more controls over the functioning of the Internet have been shelved (at least temporarily), much to the relief of civil society organizations across the world. An important consideration in the governance of a global infrastructure such as the Internet is that there are multiple stakeholders, such as civil society, business, the technical & engineering community, as well as Governments, who need to be consulted. For this, a multistakeholder consultative approach, as promoted by the Internet Governance Forum (IGF) for the last 6 years, seems to be most appropriate, in comparison with purely legalistic approaches. This brings us to another related question that has already been raised earlier in this column: is it time to think of a brand new, outof-the-box piece of legislation such as a Universal Declaration of Internet Rights? Although it sounds somewhat far-fetched at this time, it is important for the international community to attempt a consensus on this matter. Interestingly, I am back in the great city of Kolkata again, a month after the CSI Annual Convention, to deliver the Platinum Jubilee Keynote of the ICT track at the 100th Indian Science Congress. I will be speaking on “Innovation and Open Source: Future Directions for India”, wherein I propose to present the need for an innovation-friendly approach for the future, and how Open Source can stimulate and support innovation, both in computational technologies as well for broader social innovation. I believe that a uniquely Indian model of innovationdriven, socially responsible enterprise can be developed by leveraging the power of Open Source thinking. I believe this to be an important component of an equitable employment model for India in the 21st Century. Jai Hind! Satish Babu President CSI Communications | January 2013 | 3 Editorial Rajendra M Sonar, Achuthsankar S Nair, Debasish Jana and Jayshree Dhere Editors Dear Fellow CSI Members, Very warm welcome to all of you to CSI Communications – Knowledge Digest for IT Community - January 2013 issue. At the outset, we wish you a very happy and prosperous new year 2013 ahead. The new year’s first issue was announced to have Enterprise 2.0 as the cover theme. In recent years we have witnessed that Web has evolved from more of static and one-way communication form of early 1990s to a more of people-web form, which is a shared and collaborative web. Emergence of social networking websites like Facebook and Linkedin, collaborative efforts like Wikipedia made people change the name of Web to Web 2.0. Web has become world’s knowledge-sharing, collaborative, and computing platform. Firms are trying to take advantage of Web 2.0 and related technologies within the organization called Enterprise 2.0. Hence, Enterprise 2.0 was planned as cover story theme for this issue. However, we have hardly received any articles on this theme. In recent years we have witnessed that Web has evolved from more of static and one-way communication form of early 1990s to a more of people-web form, which is a shared and collaborative web. Emergence of social networking websites like Facebook and Linkedin, collaborative efforts like Wikipedia made people change the name of Web to Web 2.0. We begin this issue with cover story by Dr. Sudhanshu Joshi, Incharge – Information Technology, Doon University, Dehradun and Dr. Manu Sharma, Assistant Professor, School of Management, Institute of Management Studies, Dehradun on “Web 2.0: New Collaborative Tools for Business Excellence”. They discuss and focus on Web 2.0 technologies and social media, how these have become topic of interest for many firms, why it is essential for the firms to understand how social media can be used in a business context and what benefits it brings in, how social media impacts the way firms operate and how the firms need to have Web 2.0 strategies in dynamic business environment. We have five articles in the article section, starting with article on Alan Turing titled ‘Looking Back: Alan Turing-The Father of Computer Science’ by Vivek Kulkarni, Principal Architect - LABS, Persistent Systems. Mr. Vivek has taken great amount of efforts in compiling this article on Alan Turing from many sources. Akash tablet has been in news for few months now, and Prof. Kannan M Moudgalya & Prof. D B Phatak of IIT Bombay, Narendra K Sinha (IAS) & Pradeep Varma (IT Professional and Entrepreneur) of National Mission on Education Through ICT, MHRD have written an article on Genesis of Aakash 2. They mention that IIT Bombay has demonstrated that the idea of Aakash is eminently viable, and IIT Bombay has been playing significant role in creating a large number of educational applications locally and also by co-opting students and faculty members of many colleges from all over the country. Towards the end they mention about Aakash 3 likely to come out in about a year’s time after Aakash 2 and that it will be a much bigger order (expected to be of the 5 million) compared to Akash 2 and is expected to deliver a lot more for the same price. In Practitioner Work Bench section we have two articles, first one: Fun with ‘C’ Programs under Programming.Tips() by Prof. Wallace Jacob, Sr. Asst. Prof. at Tolani Maritime Institute and second one: ‘Regular Expression’ of Python by Prof. Umesh P, Department of Computational Biology and Bioinformatics, University of Kerala under Programming. Learn (“Python”) . Security Corner column has two sections one on Information Security and the other on IT Act 200 we have two articles from our regular contributors. The first section contains an article on “Can You Keep Your Emails Secret? Lawfully?” by Adv Prashant Mali, Cyber Security & Cyber Law Expert. In the second section we have an article written by Adv Subramaniam Vutha in the form a dialogue between professor Web has become world’s knowledge-sharing, collaborative, and computing platform. Firms are trying to take advantage of Web 2.0 and related technologies within the organization called Enterprise 2.0. of IT Law and an IT executive, and this time the dialogue topic is “How policies, implementation mechanisms, and training bridge the gap between the law and technology”. In HR section, Dr. Manish Godse writes about ‘Job Satisfaction: What Is It?’ In the article, he explains job satisfaction, factors contributing to that and how to measure it. He mentions what path an employee follows when he or she is not satisfied. Second article we have by Viraat Kothare, Director, Deluxe Elite Info Solutions Pvt Ltd, Mumbai: “The Online Identity Crisis” introduces the readers to virtual online identities, its current scenarios, and the pain points of an end user. He discusses case studies created through their own research, who are the current market players who have created few niche apps around online identities, provide a solution through research that takes care of various pain points, and also talk about related technology and revenue models and business strategies. In IT.Yesterday(), we have an interesting write-up on ‘CSI – The Early Days’ which takes the readers almost 50 years back by Dr. Sarwottam Thakur, Former Hon. Secretary of CSI. He mentions that when CSI was formed it had members who were mainly “Computer Scientists” from academic and government institutions and there were hardly ten computers in India. The write-up narrates a lot of stories about CSI, its evolution and various people who had been and have been associated with the same. We are beginning article series on career opportunities in computer security domain that can help the budding computing professionals and students, who want to make their career in this field. We have the first article in this series by CSI-C regular contributor Avinash Kadam, Advisor to the ISACA India Task Force. He has written on “What Do You Need to Know to Be a Cybersecurity Professional? He starts with introduction to who is hacker/attacker and mentions about various job profiles of cyber security professionals and how one can prepare himself or herself for such career. There are other regular features such as Brain Teaser, Ask an Expert and ICT News Brief in December 2012 in Happening@ICT and CSI reports, chapter and student branch news, CSI reports and various calls. There is also an article titled ‘Making Big Data Work to Solve Big Problems’ by Suryateja Tadigadapa, who is interestingly a junior college student. He highlights how the nature of data has changed in today’s computing world and what technologies are useful for handling it. CSI Communications | January 2013 | 4 We have received a book titled: Practical Apache Struts2 Web 2.0 Projects and it is reviewed by Jayshree Dhere, resident editor CSI-C under ‘On the Shelf!’ section. Remember we look forward to receiving your feedback, contributions and replies as usual at [email protected]. With warm regards, Rajendra M Sonar, Achuthsankar S Nair, Debasish Jana and Jayshree Dhere Editors www.csi-india.org Cover Story Dr. Sudhanshu Joshi* and Dr. Manu Sharma** *Incharge – Information Technology, Doon University, Dehradun **Assistant Professor, School of Management, Institute of Management Studies, Dehradun Web 2.0: New Collaborative Tools for Business Excellence Introduction In the era of knowledge economy, the emergence of information and communication technologies are crucial for the success of the organization. Business models have started shifting towards collaboration and community involvement. Organizations create scope to allow information and knowledge to flow in and out of the organization, which would stimulate creation of knowledge and innovation. This approach is effectively gained through web 2.0 technologies and their underlying concepts, which values collective intelligence and collaboration. Web 2.0 technologies can help improve collaboration and communication within most companies. The companies are increasingly recognizing the potential value in related to usage of Web 2.0 in a business context, however, research on using Web 2.0 in organization is still in its infancy (Saldanha and Krishna, 2010). Considering the impact of using social media, both internal and external implications for company operations is required to explore. Our discussion in this article will be on how social media used to enable innovation practices in company internal operations as well as external stakeholders. Social Media tools are being used for content generation, community building and harnessing information (Vuori, 2012). Social media can be used within employees and among supply chain partners (Chui et al., 2009). Essential Web 2.0 technologies include blogs, wikis and interactive platforms (Ahlqvist et al., 2010). Blogs and Wikis enable exchange of information and facilitate collaborative authoring and information exchange (Kaplan and Haenlein, 2010; Majchrzak et al., 2006). In 2006, Howe (Howe, 2006) coined the term “Crowdsourcing” to describe company efforts to outsource an activity to the crowds, representing an entirely new business model, The premise in crowd sourcing is using collective intelligence, i.e., the wisdom of the crowds (Surowiecki, 2004). Crowdsourcing can be regarded as a practice of open innovation where a company regards its customer and end-users as source of innovation, tapping into their innovative, tapping into their innovative capabilities in a systematic way (Leimeister et al., 2009). At firm level, social media has become a perspective set of tools that can be use for evaluating the performance of existing business processes, to evaluate the state of internally focused as well externally focused processes and their applications (Vuori, 2012) [Table 1]. As per McKinsey Quarterly, in global survey (McKinsey, 2011), companies worldwide are implementing these tools for a wide range of purposes, the most common area of application being internal operations and their reengineering followed by interfacing with customers and business partners in the supply chain or supply chain redesign. In recent past, Web technology has gained strategic importance; it is evidently proved that the traditional firms feel difficult to adopt the new business growth model based on disruptive innovations through web technologies. Rather, they don’t know how to build a new business model to remain competitive in the market place (Johnson et al., 2008). The internet and digital technologies have created new opportunities for firms to create value (Lumpkin and Dess, 2004). The phenomenon of web 2.0 technologies has led many traditional as well digital firms to successfully adjust their web-strategy by adopting web 2.0 concept for sustainable competitive advantage and to reach their objectives. Traditional firms as well, blend their business model in obtain the benefits of web 2.0 services. An effective web-strategy must be the right alignment between organization’s business strategy, objectives, resources and capabilities as well as with the industry trends and technological changes. High Velocity Business Environment and Web 2.0 as Strategy Web-enabled business models comes under ‘high velocity environment’, due to dynamic nature of markets, which are very sensitive towards changes in demand, competition, regulation and technology. With recent technological changes and phenomenal emergence of ‘Web 2.0 and its applications’, firms are now more inclined towards incorporating Web 2.0 in to their business model or developing a new business model to keep pace with the changes in the ‘high velocity environment’. Considering web 2.0 involvement in high velocity business environment along with customer intimacy, level of operations and product/ process leadership, a framework was being developed (Vijay et al, 2011). There exist four forces behind ‘web 2.0 Phenomenon’ including Social Networking; Interaction Orientation; Personalization/ Customization and User- Added Value (M.S. Yadav, and Varadarajan, P.R., 2005) [Fig. 1]. With the evolvement of technology and changes in customer preferences, Web 2.0 forces become inevitable, closely linked and contribute to the evolvement of activities for successful business firm. [Table 2] Discussion As web 2.0 technologies and social media have become topic of interest for many companies, it is essential to understand how social media can be used in a business context. Due to emergence of Web2.0 tools in to the business Internally focused applications Externally focused applications Communication Blogs, Discussion Forums Blogs, micro blogging, social networking, online broadcasting Collaboration Internal idea crowd-sourcing service External idea crowd-sourcing service Connecting Internal networking site, corporate wikis Customer forums, on-line communities, virtual worlds (Source: Vuori, 2012) Table 1: Internal and external focused business applicaƟons CSI Communications | January 2013 | 5 INTERACTION O R I E N TAT I O N Customer centricity Interaction configuration Customer response Social identity Web 2.0 C U S TO M I Z AT I O N / P E R S O N A L I Z AT I O N Group customization E-word of mouth Customer power Personal customization Social customization Social trust SOCIAL NETWORKING Cooperative value User generated content User generated creativity User generated innovation User generated revenue/contract U S E R A D D E D VA LU E Fig. 1: Business scenario for Web 2.0 processes; it also affects the business model and leads to its restructuring. The Classification of social media use is deployed to highlight the possible implications for company operations, and the human factor is emphasized in system adoption and use. Challenge related to social media implementation (Vuori, M., 2012). Many fortune 500 companies are now actively embracing Web 2.0 tools, among the major benefits; they cite increased collaboration, a democracy of talents, and a corporate culture of trust and potential productivity gains. Out of the past academic research and business practices, the following Critical success factors (CSF) are identified and reviewed, for effective and easy adoption of new business model by a global firm, including: (1) Devising strategy for blending social tools into business Process: Develop a strategic, evidence-based approach, integrating existing activities and communications strategies. (2) Awareness generation: Educate managers by raising awareness of what Web 2.0 technologies are available, the opportunities they offer and the risks they raise. (3) Inculcating Social Technology in the mind of users: Develop a code of conduct and toolkit for the use of Web 2.0, proving a clear steer to employees and managers on the use of social media for work and personal use. (4) Evaluation of the action plans: Learn to listen by adopting focused and sustained efforts to understand, map and track the use of relevant Web 2.0 technologies. Regularly evaluate the use and effectiveness of Web 2.0 technologies in the firm. (5) Learn by experience: Set out a business case for using Web 2.0 technologies, including a phased implementation of access to social media tools. (6) Unique technology selection: Avoid replication by engaging with existing technologies before developing in-house ones. Factor Activity Social Networking Build social networking site- e.g., by creating blogs, forums and chats for your website activity. Check and comment on postings on networks (e.g., review platforms) Present your company on relevant social networking platforms. Interaction Orientation Be highly responsive and available 24 hours. Provide users a reward for interaction social status Encourage positive and negative feedback. User-added value Integrate the following tools on your website: user reviews, user-generated information (wikis), media uploads (video etc.) Offer incentives User metadata that track clicks, recommendations, behaviour etc. Customization/Personalization Make good use of available user information as a base for customization efforts (e.g., build track profiles based on customer history) Focus on making customization/personalization easy to use. (Source: Wirtz, 2010) Table 2: Web 2.0 factors and acƟviƟes involved CSI Communications | January 2013 | 6 www.csi-india.org 1 Web 2.0 based technology selection and incorporation into Product/services 5 2 Extending benefits from technology to customers Design mechanism to capture value 3 Identify market segments to be targeted 4 Confirm available revenue streams Value Creation and Profit Maximization and Competitive Advantage Fig. 2: Business model redesign and Web 2.0 integraƟon The broad adoption of social media tools has the potential to unleashed a huge transformation in the way companies operate, resulting in a wide range of benefits, such as enhanced collective knowledge, increased productivity, sharpened strategic focus and greater innovation. Web 2.0 adoption can transform the way companies operate. It may leads to different benefits to the business in global marketplace, so that internal resistance can be reduced at operation as well firm level, including: (a) Increased Collaboration: Mckinsey (McKinsey, 2011) found that when companies incorporate social media across their organizations information is shared more readily. For example, Cisco recently learned this through its deployment of a social networking product called Quad, which integrates with business and Internet content management systems and features instant messaging, Facebook style status updates and a task manager, The company is using social networks to build product and project management teams. (b) A Democracy of Talents: Web 2.0 software constructs open-ended platforms on which in theory m everybody is equal. Employees working in such a setting are much more likely to openly share ideas and information exclusively for the benefits of the organizational as a whole- something very rare in hierarchical organizations. Social media tools, such as Wikis, have the potential to open up the process beyond the usual cronies and favorites who regularly get invited to closed-door meetings. (c) Corporate culture with Trust: With the rise of Web 2.0 corporations, workers at all levels of the organization have a much greater say in the day-to-day running of the company, while also enjoying the benefits of a corporate culture of openness and transparency. (d) Potential Productivity Gains: while many companies view social media as a time sink, the reality is that tools such as blogs, wikis, mashups and RSS feeds offer the potential to significantly increase productivity. (e) Recruitment: Through their social media peer groups on sites such as Facebook, Twitter and LinkedIn, employees can access more information to assess candidates for a vacant post. By encouraging employees to connect with their social media peer groups, companies will find recruiting not only an easier and cheaper task, but one that more often leads to a successful long-term hire. (f) Customer Relationships: Externally networked companies better understand what their customers want and are forging a dialogue with their customers throughout a product’s life span. Building strong links with customer via social media can also sharpen a company’s innovation and product development processes by allowing new ideas to be explored and tried out directly with customers. (g) Channeling the Best expertise: Sites such as LinkedIn and Twitter enable employees to draw on intellectual capital from both within and, vitally, outside their company. Twitter is particularly useful, as members of a network are often willing to retweet a request until it reaches someone in the know. (h) Channeling the best expertise: Sites such as LinkedIn and Twitter enable employees to draw on intellectual capital from both within and, vitally, outside their company. Twitter is particularly useful, as members of a network are often willing to retweet a request until it reach someone in the know. (i) Competitive Intelligence: Externally connected employees can use social networks. The web 2.0 revolution promises to become as important as driver of productivity growth as automation was in the 19th and 20th Centuries. Web 2.0 revolution will be about harassing social technologies to drive cultural changes within organizations. Conclusion Due to the increasing convergence of information technology, telecommunication and media has been one such significant change, business environmental disruption can cause fundamental changes in the business model landscape status quo, and particularly in Internet based businesses (Wijaya, 2011). The main use of social media were identified and conceptualized based on the past research. Internally, social media was used to for internal communication and knowledge transfer, to reach personnel and to conduct internal data idea crowd sourcing. Externally, social media can be use for enhancing communications related to the company brand, strengthen its competitive strength. By integrating web 2.0 into their day-to-day activities, companies can promote higher levels of collaboration, breaking down the organizational barrier that impedes information flows. As companies are exploring the various social media related applications and considering the related implications for their mainstream businesses, there are various opportunities for further research. Continued on Page 14 CSI Communications | January 2013 | 7 Article Vivek Kulkarni Principal Architect - LABS, Persistent Systems Looking Back: Alan TuringThe Father of Computer Science Computers: We use them every dayfrom education to games, offices, homes, banks, movie theaters and more.Our ability to incorporate computers in our everyday lives is largely due to the contributions of one individual, Alan Turning.V Alan Turing, the founder of Computer Science, a mathematician, philosopher, code-breaker, was an extraordinary visionary of his time. His invention, the Universal Turing Machine laid the foundation for today’s digital computers. We would not be where we are today without his contributions in computability theory. We often take for granted technological advances that make our day to day lives easier. Most times we attribute these contributions to people like Steve Jobs and Steve Wozniak; however, before the invention of the computer, it was necessary for someone needed to introduce the idea of the computer. On June 23, 1912 Alan Mathison Turing was born in an upper-middle class british family in Paddington, London[1]. In school, Turing’s scientific talents were not appreciated by more conservative teachers, leading him to make science ashis extra-curricular passion. Often absorbed in his own ideas, Turing was criticized for his handwriting, struggled with English, and even in mathematics. Despite being an unconventional student, Turing won almost every possible prize for mathematics in addition to being amazing athlete. Two years after his graduation in 1936, Turing published his most important paper, On Computable Numbers, with an Application to the Entscheidungsproblem[2]. Entscheidungsproblem is the German word meaning decision problem, a challenge posed by David Hilbert in 1. 2. 3. 4. 5. 6. 7. 8. 1928, a proposition for an algorithm that decides whether a given mathematical statement is provable from the axioms using the rules of logic[3]. In this paper, Turing introduced what later became known as Turing machine, a hypothetical device capable of performing any mathematical function, ultimately laying the foundation for the concept of an algorithm (a set of instructions for the machine to follow). The most striking positive result concerning the capabilities of Turing Machines is the existence of Universal Turing Machines (UTM)[4]. The UTM is the machine capable of simulating any other Turing Machine; in essence a programmable computer. When a UTM is given a program (a description of another machine), it makes itself behave as if it is that machine while processing the input. Alonzo Church, whose work on Lambda Calculus intertwined with Turing's work in a formal theory of computation, also accepted Turing's claim in what is known as the Church’s Turing Thesis. The basic idea is that Turing Machines capture the informal notion of effective method in logic and mathematics, and provide a precise definition of an algorithm or 'mechanical procedure'. Turing also put forth the concept of an unsolvable problem[5]. According to Turing,it is impossible to decide whether a Turing machine with a given table of instructions will output an infinite sequence of numbers[6]. This problem is referred as the Halting Problem and is incomputable. Subsequently, the concept of the Turing machine has become the foundation of the modern Theory of Computation, a theory central to Computer Science.In principle, Turing created the theoretical framework for computers in his paper, much before the first digital computer was built. Turing's 1945 report entitled "Proposed Electronic Calculator" gave the first relatively complete specification of an electronic stored-program generalpurpose digital computer[7]. His idea of a machine was called the Automatic Computing Engine (ACE).In the U.S., the first electronic stored-program digital computer was proposed by von Neumann in his report titled "First Draft of a Report on the EDVAC" in May 1945[8]. EDVAC stands for Electronic Discrete Variable Automatic Computer. This paper achieved greater circulation and the computer architecture it outlined became known as the "von Neumann architecture" though it contained a little engineering detail.Many people have acclaimed von Neumann as the "father of the computer" but he was well aware of the fundamental importance of Turing's paper of 1936. During the Second World War, Turingworked at Bletchley Park. It was the Britain’s code-breaking centerwhere the brightest minds in the country including Gordon Welchman and Harold Keen collaborating to crack German ciphers. Together they invented the Bombe - a machine designed to break Enigma, the Turing’s Biography -http://www-groups.dcs.st-and.ac.uk/history/Biographies/Turing.html http://en.wikipedia.org/wiki/Entscheidungsproblem Formal system -http://en.wikipedia.org/wiki/Logical_system UTM is the machine capable of simulating any other Turing Machine. That means, it can simulate any algorithm possible. Unsolvable problem is the one for which no algorithmic solution exists. Halting problem - http://en.wikipedia.org/wiki/Halting_Problem Proposed Electronic Calculator - http://www.alanturing.net/turing_archive/archive/p/p01/p01.php http://www.fh-jena.de/~kleine/history/machines/Godfrey-VonNeumannComputerPlan.pdf CSI Communications | January 2013 | 8 www.csi-india.org German’s primary method of encryption. It is believed that these efforts shortened the warby at least two years[9]. Turingbegan to consider the issue of artificial intelligence, formulating the famous Turing Test[10]. Introduced by Alan Turing in his 1950 paper, Computing Machinery and Intelligence, The Turing Test is anassessment of a machine's ability to exhibit intelligent behavior which opens with the words: "I propose to consider the question, 'Can machines think?'"[11] Since "thinking" is difficult to define, Turing chooses to replace the question by another, which is closely related to it and is expressed in relatively unambiguous words. Turing's new question was: "Are there imaginable digital computers which would do well in the imitation game?"In the years since 1950, the test has proven to be both highly influential and widely criticized, and it is an essential concept in the philosophy of artificial intelligence. Alan Turing died in 1954 at the age of forty-one, after which his work became forefront identifying him as the founder of Computer Science[12]. Main achievements of Alan Turing: • • • • • • • Designed the paper model of the world's first digitalcomputer Discoverer of Turing Machine, 1935 Accepted as the inventor of Artificial Intelligence Awarded in 1945 for his wartime services He was one of the core team members who built The Bombe. Decoding the Enigma in 1942 He was the key team member which decoded the 'Fish' cipher The A. M. Turing Award is an annual prize given by the Association for Computing Machinery (ACM) to "an individual selected for contributions of a About the Author 9. 10. 11. 12. technical nature made to the computing community". It is stipulated that "The contributions should be of lasting and major technical importance to the computer field". The Turing Award is recognized as the highest distinction in Computer Science and considered as the Computer Science equivalent of a Nobel Prize. 2012 will always be remembered as the “Turing year” as ACM A.M. Turing Award Winners came together for the first time, to honor the 100th Anniversary of Alan Turing and reflect on his contributions, as well as on the past and future of computing. As we look back on Alan Turning’s contributions to the fields of Mathematics and Computer Science, it is hard not to think about his hypothetical reaction to our current lifestyle. Sure he may be thrilled with the computational capabilities of computers today, but he may as well be horrified with our personal dependence on mobile computing technologies. Was his love for artificial intelligence purely fantasy or are we beginning to push the ethical boundaries? It would have been magnificent for Turing to see his ideas become something tangible; we can only hope he would have embraced these advances. References / Sources: [1] http://www-groups.dcs.st-and. ac.uk/history/Biographies/Turing. html [2] h t t p : //e n .w i k i p e d i a . o r g /w i k i / Entscheidungsproblem [3] http://www.alanturing.net/turing_ archive/archive/p/p01/p01.php [4] http://www.fh-jena.de/~kleine/ h i s t o r y /m a c h i n e s / G o d f r e y VonNeumannComputerPlan.pdf [5] h t t p : // w w w . e l l s b u r y . c o m / enigmabombe.htm [6] http://en.wikipedia.org/wiki/Turing_ test [7] http://www.loebner.net /Prizef/ TuringArticle.html [8] http://en.wikipedia.org/wiki/Alan_ Turing [9] http://www-groups.dcs.st-and. ac.uk/history/Biographies/Turing. html [10] http://www.turing.org.uk/ [11] http://www.turing.org.uk/turing / scrapbook/computer.html [12] http://www.turing.org.uk/sources/ vonneumann.html [13] http://plato.stanford.edu/entries/ turing-machine/ [14] http://plato.stanford.edu/entries/ computing-history/ [15] h t t p : //w w w. b b c . c o . u k /n e w s / technology-17662585 [16] http://plato.stanford.edu/entries/ turing-machine/#5.2 [17] http://skepchick.org /2012/05/ alan-turing-computing-pioneercodebreaker-gay-icon/ [18] http://historysheroes.e2bn.org / hero/achievements/91/print [19] http://skepchick.org /2012/05/ alan-turing-computing-pioneercodebreaker-gay-icon/ [20] h t t p : //e n .w i k i p e d i a . o r g /w i k i / Universal_Turing_machine [21] h t t p : // w w w . s c r i b d . c o m / d o c / 1 5 3 2 9 1 0/ Vo n - N e u m a n n Computer-Architecture [22] http://people.ee.ethz.ch/~ballisti/ computer_topics/neumann.vs.turing. html [23] http://turing100.acm.org /index. cfm?p=awardees [24] http://en.wikipedia.org/wiki/Von_ Neumann_architecture [25] h t t p : //w w w. b b c . c o . u k /n e w s / technology-17662585 n The Enigma and the Bombe - http://www.ellsbury.com/enigmabombe.htm Turing test - http://en.wikipedia.org/wiki/Turing_test COMPUTING MACHINERY AND INTELLIGENCE -http://www.loebner.net/Prizef/TuringArticle.html Turing – the father of computer science - http://en.wikipedia.org/wiki/Alan_Turing Vivek Kulkarni is currently working as Principal Architect in Persistent Systems Ltd. He has a total experience of 18+ years in academia and software industry. He has served as a subject chairman for multiple subjects for the Board of Computer Engineering, University of Pune. He has written multiple books on “Theory of Computation’’. He has also worked in organizations such as BMC Software, Symantec Corporation, and Tech-Mahindra. He is also one of the inventors for System and Method of Universal Programming Language Conversion, which has been internationally recognized and patented CSI Communications | January 2013 | 9 Article Viraat Kothare Director, Deluxe Elite Info Solutions Pvt Ltd, Mumbai India The Online Identity Crisis “If you are not embarrassed by the first version of your product, you’ve launched too late.” Reid Hoffman Founder, LinkedIn Abstract: In this article, we will illustrate an introduction to virtual online identities, its current scenarios, and the pain points of an end user. The role of online virtual identities in today’s world plays a major role in our real lives, as it identifies us being a part of a large advancing society, where we are bound to be a part of a popular community or channel in order to keep up with the latest trends and advancements in technology. Currently new startups, developers are more focused on building latest apps and platforms, thinking it would be an exciting platform for users, but sadly not much research & interest have really been focused on working around the existing apps & platforms wherein their content and its popularity is huge. Our objective is to showcase how we can take control & manage our vast ever growing online identities & resolve the current issues. We will also discuss the business models and strategies which can we worked around the online identity space along with scenarios. Keywords: Profiles; Aggregation; Social; Identity; Information. Introduction Since pre-historic times, we humans, have been socializing through different mediums such as; through meetings and gatherings at various events, seminars, public places, and recreational activities to share our joys, issues, current happenings in and around us, and exchange of thoughts that takes place through comments and feedback and as time passes by we tend to be part of a group or community whose ideas and thoughts are as same as ours, & we stick on to those group of people and interests clubs in terms of business or group activities and events which would help increase our knowledge both professionally and personally. At a point in time,. there were bath-houses and local community gatherings and public parks where people used to play various sports and events use to happen, but today all that has diminsihed. CSI Communications | January 2013 | 10 Role of Online Identities and Its Importance With the advent of the internet, improved communication, all these activities and socialization have taken a back seat, including offline activity of mingling with people visiting malls rather going to parks. People can now access any information at their fingertips or connect with anyone simply in a few minutes. Eventually, people have now started reinventing the term socialization, by working on methods which can save time and energy, and things which could be done manually offline; the same work can be achieved virtually within a matter of minutes. People have started to connect to other peers of same ideas and interests through online communities, started writing own feelings and expert information through blogs, expressing themselves with digital photos, uploading special moments, and events through online videos, shout what they did today or experience through status updates and wall messages which have become a recent fad and a addiction by being hooked on to these all sort of online activities. All these activities have to be achieved by accessing different places and locations, due to which people have created multiple identities of themselves in the virtual world which segregates them and other people in each place & location, as each location provides a different purpose and action for the user which lets them get connected to offline world scenarios in one form or the other. It’s importance is that it allows to define who you are, what do you do, what are your feeling/thoughts, what are your expertize, sharing your emotions apart from the face there are % of people who are fake and provide information which they aren’t related to, and that leads to further issues. There are some things which we are unable to express to people openly and share things, but by these new online platforms, each new platform allows people to create a distinguished identity to express themselves to their peers and to the world, about what they are good at and what they are doing. But all these activities, aren’t at a single place, people have developed innumerable platforms with over the years for people to express themselves in any format which was available, due to which people started registering by creation of multiple user accounts for different purpose and work over the web, which we can see is a issue, wherein at some point of time due to time crunch, people are unable to manage all these activities in different mediums effectively over the time, as people are finding it difficult to keep a balance between both the online and offline world which we will discuss in detail in the next topic. Figure 1: Traditional and online interaction h t t p : //w w w . f l i c k r. c o m /p h o t o s / 3 4 41 9 1 8 2 @ N 0 8 / 74 8 47 3 8 0 1 6 /i n / photostream Issues Faced Currently with Online Identities in Our Findings As discussed above, that people have been registering themselves with many new and upcoming sites and platforms, it’s very difficult to remember all online credentials unless the user is able to store all data at a central point, apart from it there’s also possibility of data theft and online credentials can be accessed easily by 3rd party Apps/vendors..Users should not reveal too much information over the net about themselves and stick to only the information needed for that website/application as there are many stalkers, & people and marketers looking forward in getting sensitive and people data and use it for their own purpose. Another issue faced, is nowadays with many sites coming up with their own different purpose and feature, people need to remember the website names also, therefore due to website like Digg (http://digg.com/) Stumble upon (http:// www.stumbleupon.com/) allow users to bookmark site for quick reference afterwards, but what the people actually missing is the accessibility and www.csi-india.org time consumption is increased as the bookmarks start getting increased. In the early days of the web in web 1.0 era, there used be a 1 way communication and expression of content and data exchange, people used to post and upload information for their peers to see and interact, but with the advent of web 2.0, people are now interested in a 2 way communication, wherein they share content and information with their peers and the world like photos, videos, music, and documents, so sharing has become a major part of the web and people also like to receive ratings and comments and likes and analyze data of how other people perceive their information and media content over the web. Over time, data and information has been increased and people have accumulated and created innumerable content over the web, therefore people have shared content across to multiple locations managing data separately in different formats, due to which information and media content has been scattered all over the web, and people are unable to share content seamlessly, also people are now interested in collaboration of data and content with other peers of their interest which is only a possibility if we bring the data and information connectivity seamlessly across multiple locations. Now when, we talk about communications, people communicate through different forms be it SMS, Email, IM, Chat, Blog, Forums, and Networking, people have created separate identities for each mode of communication & apart from it people have multiple accounts in the same mode of communication divided into family, friends, business, and groups ,which further makes managing contacts and communication more complex, with different people in different modes at a single point of time, as most of time would be spent in writing to different people in different modes separately which leads to decrease in productivity and effective communication. One of the other key major issues in online identities space, each tech company is having its separate identity service of its own, but there’s not one online identity to rule them all, apart from the OPENID (http://openid.net/) project, which has recently allowed participation from top web companies to be a part of this project to help & allow users to seamlessly access multiple accounts and information, but limit to only those websites, providers supporting Open ID. It is a good concept from the privacy point of view but also direct access to spammers, hackers, who access all user data across all networks, impersonation, and hide identities. Offline Identity Crisis in Mobiles With the increase usage of smart phones, we now have users identities connected to their mobile devices, the landline no’s were shared with multiple groups of people; mobile phones tend to be more private and personal, with each member of the family and relations having their own phone numbers. At ones own personal level, mobile phones have come with managing multiple sim cards facility, so now users can share separate no’s with different people of their level of relationship where in there’s a need to organize and personalize contacts Recently the portability across mobile carriers has come into place, wherein people are able to retain the same number, even if they change devices or providers. Also, there should be some security measures to be taken into account to prevent criminals from accessing stolen/lost phones to steal identity and personal information, strong encryption and identity logon needs to be put in place for authentication like digital uid or fingerprint scan etc. Figure 2: Types of online identities h t t p : //w w w . f l i c k r. c o m /p h o t o s / 3 4 41 9 1 8 2 @ N 0 8 / 74 8 474 0 6 6 2 /i n / photostream Case Studies Examples We will showcase and explain some of the case studies created in our research i.e.: (Names taken for demo purpose) Mia has received lot of comments on one of her wall posts/blog, but she also received lots of emails also, so Mia is confused which one to handle first, the mails received or to view and reply to comments received, managing a single task at a time separately, increases her time and energy in accomplishment of her communications information received, therefore all types of communications needs to be centralized. John is a avid consumer of latest gadgets news, goes to several sites related to latest gadgets but also wants to view similar information and content elsewhere related to latest gadgets, so John needs to search more content related to tech gadgets, so if we enable integration of multiple platforms related to same medium like an eg- Picasa and flickr for photos, daily motion, and YouTube for videos, it will be simpler in accessing content rather searching for similar content. Mike needs to share & view his content and its updates to import and export his data, Mike needs to login to each platform separately to access his data, after accessing his data from each site, Mike has to wait for push and pull his content which would again be a loss of time in getting his information and content. Therefore, a single sign on needs to be created, wherein Mike can connect to all his accounts through a single login and create settings to import and export of data on each site with just a couple of steps. Amanda found something interesting on the net, and would like to share her thoughts, share and store in her online profile account on some platform, she has to copy that information to local pc/ laptop then post to her online account, and her followers and peers would like to see her what she is doing or recently done there is a universal app/niche platform to be created in order for Amanda to snyc data and showcase it anywhere on the web plus also seamlessly allow Amanda to pull any content or information across the web to her online identities from any place on the web with a single touch. So the role of data portability and push and pull of content to one own online identity needs to come in place across the web. Coca Cola wants to promote and market its products effectively to reach a larger audience in the shortest possible time, Coca Cola has to create a mailing list and collect data, create fan pages to gather fans, create a community and network to share about its product launch, if we create and develop effective marketing tools around each platform, Coca Cola would save time and investment in hiring a expert to do all the marketing activities online at a manual level, with just a couple of clicks Coca Cola can manage their marketing activities across various platforms of social media and networks in a jiffy, so we can see a separate niche can be created around marketing across separate platforms CSI Communications | January 2013 | 11 keeping in mind push of content can be executed seamlessly across all platform with a single point of action. In the case of social network services such as Facebook, companies are even proposing to sell 'friends' as a way to increase a user's visibility, calling into question even more the reliability of a person's 'social identity'.[3] Reference -Wikipedia More Case Studies http://networkconference.netstudies. org/2010/04/perceptions-of-identityin-social-networking-controlling-youronline-presence/ Current Market Solutions There are few players in the market who have created few niche apps around online identities, but have not exponentially grown to a full extent providing all round performance both in feature wise and productivity. Only a few users who have known these players use it for a particular period but that just it, not engagement driven plus providing limited access to just a few platforms. Some of the few market players who have ventured in the online identity space for instance: Profilactic (http://www.profilactic. com/): allows people to maintain an online directory of all accounts, wherein other people can view by clicking on the hyperlinks of the online identities, it should have worked upon accessing data seamless rather than redirecting content to separate URL. Friend feed (http://friendfeed.com/): allow people to manage and view personal and friend’s activity feeds to those platforms supported by friend feed to stay in touch and being updated of daily and monthly activities through xml feeds. Retaggr.com now closed was also an interesting site, where in users could create a virtual id card and display all online identities on it and were able to share it across the web. Though they could not generate much attention, probably should have provided some more features and seamless integrations to it. So the current market scenario in the online identity space is, each one is having its own set of niche based applications built around it , but they have not really combined together as a whole to provide the user a rich complete experience in CSI Communications | January 2013 | 12 all aspects of online identities, and as for monetization is concerned, they have mostly relied on advertisements, not worked wholly on a proper good revenue model like premium services, managed services etc, which would have provided some value and attraction to user to at least get that experience. They have not much plans of scaling up/expansion plans or any marketing strategy, due to which the popularity of these niche apps is slowly diminishing, as again the same issue faced by user of even managing online identity again needs to register with separate vendors to get access to online identities features so its further creation of more complexities & issues around it. Also the fact is they have worked around with those platforms that are popular in their respective domains and are not able to capture other platforms those are mid-popular, even though people have connections in that platform. The problem hasn’t been solved till date, rather not executed well, as companies are wary about its future and whether it will really work out, but an entity, or an individual needs to experiment and start working around it at least we should not stop experimenting if it’s going to help people in making life easier and simpler. Also the fact is that integration of each platform system access to one own system is a tedious and time consuming process but the advantage for the people is that people can work and access on existing data centrally rather again pushing and pulling of content all over again, thus save time and able to achieve the task in a much organized manner.Not many players currently really want to do much experimentation in this field, not finding it much lucrative about taking it forward, but it’s also a good opportunity to venture out since not many players are trying to compete. If any company/individual wants to enter in this field and create ground breaking innovations, they should keep in mind the long term goals and revenue model and scalability, eager to experiment, and resolve this issue in a simpler effective level. The Solutions (Our Research) Based on the above scenarios we are researching and working to create and develop in resolving issues in a step wise manner currently as a web based project, making things easier and simpler some of the areas we are working on are, taking the pain points into consideration i.e.: • No need to remember site names anymore. • Single login required to access all other online accounts. • Time consumption less in accessing site seamlessly. • Easy communicate and collaborate with peers. • Broad content, multiple sources, open environment. • Save user time and energy & completion of tasks. • Complete end-to-end marketing solutions in various verticals. Remembrance, Hassle Free Access & Manage Accounts Seamlessly We are in the process of creation of a single online account management system wherein the user can encrypt all online credentials of all his accounts online, and provide them at later stages to sync data seamlessly through a single id, rather than remembering separate accounts separately for each individual platform be with photos, videos, friend feeds etc. Collection of Data and Sharing We will allow users to import and export online data and media content through their various accounts scattered online into a centralized platform allowing both push & pull facilities through API calls, each separately for each platform, so that users can organize data and media in folders and also allow ways to backup and collaborate with peers and providing them to promote content through a mash up platform rather for user to upload information y or read/access data for each platform separately for which we are in process of receiving patent for the same in real-time. Aggregation Based Info Services Across Multiple Platforms We will allow users to aggregate their content and media content related to same medium across multiple platforms related to their interests and likes and also as a marketing strategy of cross promotion of information across multiple platforms.eg-user can search topic as animals and select which medium to fetch information be it photos or videos etc and then select from which platform www.csi-india.org he wants to receive data be it Picasa for photos or YouTube for videos. Technology We will be able to achieve the above goals technically, by first maintaining an online directory of all platforms related to different medium and content in our main director Then we will start creating and managing the API keys and calls provided by the platforms for integration. After which we will create a centralized platform to allow users to feed credentials that will be encrypted by default and also integrating open auth and oauth standards when user starts synchronization data Over a period of time, we will keep upgrading the more features and enhancements on top of our platform. Figure 3: Our Research h t t p : //w w w . f l i c k r. c o m /p h o t o s / 3 4 41 9 1 8 2 @ N 0 8 / 74 8 4741 2 24 / i n / photostream Revenue Models & Business Strategies Which Can Be Created • Logins/password managements: We can develop unique key strong credential management system wherein users can store and manage online accounts information in a secured manner to sync data from one website to another. It can further be created for managing offline accounts and internal intranet systems. • Enhanced communications: We can create subscription based premium enhanced features like scheduling, reports, backup services, blacklist, contact organization, and get activity feed reports of our peers etc across all platforms. • Collaboration of data: We can create premium services built around data and information of user generated content of own and others in order to deliver better output in redesigning, changes in content, updates, received feedback, and work together to provide more interesting content, accomplish tasks together be it with photo change, video cuttings, music content, document changes etc. as an individual and as a company. • Backup solutions: We can provide backup solutions based on space and volume of all your virtual identity information and content, incase if account gets compromised, or if data is lost due to mistaken deletions by providing users to sync data from any location and backup all data in a centralized location. A new scope of online data portability can come into place. • Analytics & Reporting solutions: We can provide detailed premium analysis reports to individuals and companies, based on the actions done by users and individuals and the latest trends happening, daily consumption of user data, sharing of information, popularity, ratings etc. • Reputation management: We can provide reputation management services wherein, we can create tools to manage what people say about as an individual or company in various content sharing locations. We can collect feedback and negative data and provide expert solutions in keeping online reputation clean, as its keeps a healthy image at both online & offline levels. • App platform/marketplace: We can create and build standalone tools and applications based around each online identity account, which can provide better accessibility and showcasing content and information. It would also bring enhancements, creativity features which can be divided as free and premium apps to users. Morever help in engagement and promotion of each online identity. • Advertising/marketing solutions: We can provide advertising solutions and marketing solutions wherein the user can select which platform to advertise and also manage and track his ads, spends and reports. We can also create in line text based advertising solutions platform for users to share along with their content or in built advertise types. In marketing we can provide push and pull system, wherein the consumer can push content related to single medium across multiple platforms related to that same medium which would help in better reach and visibility and can also promote premium content in multiple locations. • Expert management solutions: We can create an online agency, where in we provide expert management solutions, which can helpindividuals/ companies generate leads, reach a large userbase,larger fanbase,effective writing to attract other people, creation and development of professional content and information, andmaintaining of complete online portfolios. • Security and verification solutions: We can create innovative security and verification solutions at both online and intranet networks based on online identities verification services, secured data transfer, copyright and infringement of data, data encryption services, creation of user roles and permission based systems etc. • Offline solutions : We can utilize the same concept in offline methods like in company intranet centre, by creation of roles and permission based access, in mobile phones; manage all separate contacts of different allotted numbers. Parental controls on devices based on children age group and what they can access and view content, how long they can stay online and so forth. These are some of the avenues, in which we can build & market business around it. Figure 4: Services can be created: h t t p : //w w w . f l i c k r. c o m /p h o t o s / 3 4 41 9 1 8 2 @ N 0 8 / 74 8 4741 6 2 2 /i n / photostream Conclusion We hereby bring in a conclusion, until and unless a centralized organized system would not be created with an overall perspective of a users likes and interests in separate domains, the existing players would have an impact in retainer ship of users plus unable to predict the market cum user growth with upcoming new players in the future, by showcasing some examples and scenarios we have portrayed current issues faced by the end user in accomplishment of tasks In this age and time, we need to communicate, collaborate and co-exist together in order to avoid this identity crisis. We consider and note that time is being a very critical factor in one own life, as half our day is hooked on the virtual web. We should move ahead to EaaS (Everything as a service).It must be consolidated to provide a seamless, on demand, quick sync, rich user experience. App developers and IT companies should take the initiative in developing key simpler methods and solutions and provide services and solutions around online identities which can greatly impact and help both companies and platforms share profit and grow together for both existing and new CSI Communications | January 2013 | 13 users to make the online a more simple and easier accessible, rather make things complicated and confusing. We look forward in big leaps ground-breaking and innovating apps around online identities in the coming future through our work and development. Making the web simpler and safer place. References [1] Online Identities http://en.wikipedia.org /wiki/Online identity [2] Who owns your online identity? http://mashable.com/2011/11/04/ identity-live-blog/ [3] How Many Social Network Identities Is Too Many? h t t p : // w w w . n p r . o r g / 2 0 1 1 / 01/14/132934030/how-many-socialnetwork-identities-is-too-many n About the Author Viraat Kothare (BSc Comp, MCTS) is one of the directors at Deluxe Elite Info Solutions Pvt Ltd, Mumbai India. He is a serial entrepreneur, running a travel firm & IT Solutions Company working on software as service solutions (SaaS) & Platform as service solutions (Paas) offerings in multiple domains on a single platform. His work is focused on areas of communication, social media, digitalization, value added services. E-commerce and mainly into aggregation space. Continued from Page 7 In general, companies should develop their understanding of the potential implications of web 2.0 technologies and social media for the creation of competitive advantages. [Fig. 2] Biblography About the Authors [1] Amit, R and Zott, C (2001), “Value creation in E-business”, Strategic Management Journal, 22 (6–7), pp. 493–520. [2] Chesbrough, H “Business Model Innovation: Opportunities and Barriers”, Long Range Planning, Vol. 43, Issues 2–3, April–June 2010, pp. 354-363. [3] Cummings, T G and. Worley, C G (2008), “Organization Development and Change”, South-Western Cengage Learning, Mason. [4] Hippel, E V, “Successful industrial products from customer ideas”, The Journal of Marketing, 42 (1) (1978), pp. 39–49. [5] Huston, L and Sakkab, N (2006) “Connect and develop”, Harvard Business Review, 84 (3) (2, pp. 58–66. [6] Johanson, M W, Christensen, C C, and Kagermann, H (2008), “Reinventing your business model”, Harvard Business Review, Vol. 86, Iss. 12. [7] Johnson, M W, Christensen, C M, Kagermann, H, “Reinventing your business model”, Harvard Business Review, 86 (12) (2008), pp. 51–59. [8] Katz, R and Allen, T J (1982), “Investigating the Not Invented Here (NIH) syndrome: A look at the performance, tenure, and communication patterns of 50 R and D Project Groups”, R&D Management, 12 (1), pp. 7–20. [9] Lumpkin, G T and Dess, G G, “E-Business Strategies and Internet Business Models: How the Internet Adds Value”, Organizational Dynamics, Vol. 33, Iss. 2, May 2004, pp. 161–173. [10] McKinsey Quarterly (2007), Mckinsey Quarterly survey of business executive, “How companies are marketing online: A McKinsey Global Survey”. [11] McKinsey Quarterly (2011), How Social technologies are extending the organizations. [12] Miles, R E, Snow, C C, and Miles, G (2000), ”The Future.org”, Long Range Planning, 33(3), pp. 300-321. [13] Prahalad, C K and Ramaswamy, V (2004), “Co-creating unique value with customers”, Strategy and Leadership, 32 (3), pp. 4–9. [14] Schneider, B, Brief, A P, and Guzzo, R A (1996), “Creating a climate and culture for sustainable organizational change”, Organizational Dynamics, 24 (4), pp. 6–19. [15] Teece, D J (2010), “Business models, business strategy and innovation”, Long Range Planning, 43 (2–3) (2010), pp. 172–194. [16] Wirtz, B W, Schike, O, and Ullrich, S (2010),”Strategic Development of Business Models: Implications of the Web 2.0 for Creating Value on the Internet”, Long Range Planning, Vol. 43, Iss. 2–3, pp. 272–290. [17] Yadav, M S and Varadarajan, P R (2005), “Understanding Product Migration to the Electronic Marketplace: A Conceptual Framework”, Journal of Retailing, 81 (2) (2005), pp. 125–140. [18] Vuori, M (2012), “Exploring use of social media in a global corporation, Journal of Systems and Information Technology, 14 (2), pp. 155-170. n Dr. Sudhanshu Joshi is the Incharge – Information Technology, Doon University, Dehradun, He has taught in academic programs in Indian Institute of Technology, Roorkee, University of Petroleum and Energy Studies, Dehradun and Gurukul Kangri University, Haridwar. He is author of 35 International Research papers and five books on Technology Management. He has served CSI in various capacities in its Haridwar and Dehradun Chapter. He is a lifetime member of CSI. Dr. Manu Sharma is presently serving school of management Institute of Management Studies, Dehradun. She has vast academic experience in teaching strategic and technology management, her research and academic interest is web 2.0 and its implications on business revenue. CSI Communications | January 2013 | 14 www.csi-india.org I AM BUILDING for my future UPCOMING EXAM DATE FINAL REGISTRATION DEADLINE: 12 April 2013 8 JUNE 2013 For more information and to register for an ISACA exam, visit www.isaca.org/myfuture-CSI. Register by 13 February 2013 and save US $50! CSI Communications | January 2013 | 15 Article Avinash Kadam [CISA, CISM, CGEIT, CRISC] Advisor to the ISACA India Task Force What Do You Need to Know to Be a Cybersecurity Professional? A professional hacker will definitely be an expert in some technical aspects but will not hesitate to attack anything that is vulnerable, including people defending the information. In the October 2011 issue of CSI Communications, I wrote an article titled, “Introduction to Information Security – Defense-in-Depth”. The seven layers that constituted a strategy for Defense-indepth were described as: 1. 2. 3. 4. 5. 6. 7. Hardware Security Operating System Security Database Security Application Security Network Security Physical Security Personnel Security In this article you are reading now, I will outline the broad areas of expertise required to become a cybersecurity professional. Subsequent articles will explain, in greater details, the areas of specific knowledge required for specific jobs in this rapidly developing field. physical attacker/thief. The only difference is that the target is critical information rather than a physical entity. This critical information could be vital information operating a critical infrastructure, like a power grid; or sensitive financial information, which may ruin a company or an individual; or even sensitive information related to national defense. The Changing Profile of a Cyberattacker We have observed a gradual shift in the cyberattacker’s profile. The earlier image was that of a geek, who was out to prove his/her technical prowess. Today, attackers appear to belong to organized gangs of criminals, who are after high stakes. The stakes might be in the form of large amounts of money held by banks or individuals, trade secrets or top secret information Today, attackers appear to belong to organized gangs of criminals, who are after high stakes. Who Is a Hacker/Attacker? An attacker will try to exploit weaknesses in any of these seven layers. A popular image of a hacker is someone who is a technical wizard. However, to quote the famous cryptographer and security expert Bruce Schneier: “Always remember: amateurs hack systems, professionals hack people”. A professional hacker will definitely be an expert in some technical aspects but will not hesitate to attack anything that is vulnerable, including people defending the information. An attacker can be good at just one layer, but a cybersecurity professional, whose job is to defend against every attack, needs to have working knowledge of each of these seven layers. A cyberattacker is essentially a thief, robber or enemy, who is after some critical information, either to steal it, maliciously tamper with it or outright destroy it. So, a cyberattacker/thief is no different than a CSI Communications | January 2013 | 16 of commercial or defense importance. These may be sold to the highest bidders. The attackers might be mercenaries on contract from rival companies. They could even be state-sponsored attackers backed by enemy governments. Defending against such attackers cannot be done by amateurs. There has to be a well thoughtout plan of action. We need to create a large pool of well-trained professionals, who need to either be well-versed across all the seven layers to provide real and indepth defense or at least have expertise in one or more layers. Job Profile of Cybersecurity Professionals Hindu mythology believes in the concept of “Trimurti”. There are three facets of life – Creation, Preservation and Destruction – represented by the three gods: Brahma, Vishnu and Mahesh. Similarly, for cyber security, we need three different types of persons with different skill sets. I have modified the last facet to meet the cybersecurity profession’s needs: 1. 2. 3. Planners (Creation) Defenders (Preservation) Investigators (Finding the cause of Destruction) Planners These are the professionals who thoroughly understand the business aspects and also the information security or cybersecurity requirements. A “planner” managing cybersecurity for the nation will have a national defense perspective. A “planner” directing cybersecurity for a large organization will have a thorough understanding of the business requirements and its security needs. If security is implemented without proper business direction, it will not be effective and may even be wasteful. So, a planner needs to know what the business is and why security is important. The planner has to be well-informed about all the potential risks, including the information security risks that the business may be exposed to. In addition to business knowledge, the planner should also be thoroughly familiar with the seven layers of defense. It is also highly desirable that the planner has actual hands-on experience in working within other security roles; such as being a defender or an investigator. Having practical experience will help the planner identify any weaknesses. Security is expensive, but lack of security is even more expensive. There always is a temptation to cut costs, where security is concerned. For example, within network security, the planner will have to understand the complete extent of the corporate network, including remote locations connecting via the Internet; various wireless networks, including mobile communications; and To protect against a network attack that could be launched at any time by anyone from anywhere, a 24/7 vigil is a must. www.csi-india.org World War II saw the defeat of the Nazis because their Enigma code was cracked by a brilliant team of Allies cryptographers and cryptanalysts, led by Alan Turing. every entry and exit point to the corporate network. These entry and exit points need to be guarded against attacks, including the denial-of-service attacks. The extensive deployment of network security devices, such as firewalls and IDS/IPS, need to be planned. Logs of all these devices need to be securely recorded and scrutinized on a regular basis. The organization needs to hire and train network security personnel. Network administrators responsible for configuring the networks should know all the loopholes and plug them. To protect against a network attack that could be launched at any time by anyone from anywhere, a 24/7 vigil is a must. Thus the list of tasks is endless. One single failure could be disastrous. If nothing happens for a couple of months, the planner may be asked to review the security plans and reduce the vigil. This is where the planner’s conviction, knowledge and experience will be tested in making the right decisions. A planner should also have the responsibility of implementation and operation of the cybersecurity initiatives. Thereby, there will be no passing of the buck. Defenders Defenders are the foot soldiers, who are in the thick and thin of cyberwarfare. A defender has to be an exceptionally welltrained person. The defender should be able to quickly defend if there is an attack on any of the security layers. The response time will be very crucial. Only a skilled defender with a thorough knowledge and excellent practical experience can provide adequate defense. Training should be provided to defend all the seven layers. However, though desirable, it is not practical to expect expertise in all the seven layers from one person. The defenders may specialize in one or more layers. For example, a defender may be well-trained in the network security layer, but you may need to hire other defenders for the application security layer. Since there are a very large number of programming languages, this will require very narrow specialization. A defender who can review Java code may not be equally good at .Net. Similar requirements will be there for the database security layer. Cryptographers and cryptanalysts will also be part of the defender team. World War II saw the defeat of the Nazis because their Enigma code was cracked by a brilliant team of Allies cryptographers and cryptanalysts, led by Alan Turing. Can the defender become an attacker? If it is a question of national defense, the military plays both roles, depending on the national defense requirements. But, the same is not the case with corporations. Business organizations cannot carry out an attack. They have to follow the law. However tempting it might be to fight back, organizations must resist the urge. Investigators This is the third and independent group of cybersecurity professionals required by every organization. The cybersecurity plans may not always be perfect. There could be lacunae that may be exploited by the attacker. The planner or the defender may have overlooked some vital piece of information. The cyberattacker may have exploited this weakness. Investigators are not fault finders. They are expert analysts, who try to find the root cause for every incident. The investigators need to have enough experience as defenders to be able to do their job well. The investigator’s job is to bring out the lessons learned from every attack and help defenders and planners strengthen their preparation. An investigator should also carry out the role of an information assurance professional. In this role, the investigator will have to reassure management that the design of the particular security layer meets the planned requirements and the preparedness of the defenders is of the An investigator should also carry out the role of an information assurance professional. In this role, the investigator will have to reassure management that the design of the particular security layer meets the planned requirements and the preparedness of the defenders is of the requisite quality. requisite quality. I have deliberately merged the two roles, again, to prevent buckpassing. If an information assurance person has given a clean chit, as an investigator, the same person has to identify why some aspect of security was overlooked. Investigators also have the responsibility to conduct a criminal investigation of every incident suspected to be caused by some criminal activity. Such investigations will require knowledge of cyber forensics. The investigator will have to trace the perpetrator of the criminal activity and capture all the evidence required to prove the criminal act. How Does One Prepare for These Careers? Skill sets and knowledge areas for a planner’s, defender’s or investigator’s job will be discussed in future articles. Currently, cybersecurity is not a focus of regular courses offerings in colleges and universities. Most of the cybersecurity professionals are either self-taught or they have learned on the job. This situation needs to be urgently corrected. Furthermore, some courses that are offered on cybersecurity are excessively focused on hacking. At the most, one can become proficient in using a hacking tool; which is an offensive tool, not a defensive tool. Learning hacking techniques does not prepare one to become a good defender. Learning to use a sword is not the same as learning to use a shield. In fact, a good defender should learn both. To become a cybersecurity professional, one has to understand the defense-in-depth approach. The cybersecurity field is forever changing at a superfast pace and so is the technology associated with it. Therefore, a good cybersecurity professional has to constantly upgrade his/her knowledge and skills. Cyberattackers are constantly changing their tactics. Cybersecurity professional have to be at least equal in competence, if not ahead of the cyberattackers. Avinash Kadam, CISA, CISM, CGEIT, CRISC, CISSP, CSSLP, GSEC, GCIH, CBCP, MBCI, PMP, CCSK, is an advisor to ISACA’s India Task Force. ISACA is a global association for IT professionals. Opinions expressed in the blog are Kadam’s personal opinions and do not necessarily reflect the views of ISACA. He can be contacted via e-mail avinash@ awkadam.com n CSI Communications | January 2013 | 17 Article Suryateja Tadigadapa 12th Grade student of Pace Junior College Making Big Data Work to Solve Big Problems With the advent of social media, we have a platform to share our thoughts with many people, share videos, do instant messaging as well as seek response of thousands of friends and relatives. Few years back as a kid, my opinion about phones was that they are used only for a specific purpose of conversing with people, living far away as well as nearby. Even a thought of using of phone makes me amazed by the fact that while sitting at my own house I could talk to someone thousands of miles away. It was the flexibility and instant information that made me excited in those days. Now when I look at the world around me and compare it to the world in those days ( about 8 years ago), one thing that has a significant relevance company to position its products, plan and structure for education system based on preferences of people, enabling preventive health care in rural etc. I personally feel that with the proliferation of the devices, social networking and data collection is leading to challenges of using these unstructured data and presenting opportunities to find information that can lead to efficiencies and new inventions. If I look at the characteristics of these new data, there are three things that are of critical importance: Usage of data can be multi fold and offer enormous opportunities, e.g. new fashion trends that can help a consumer company to position its products, plan and structure for education system based on preferences of people, enabling preventive health care in rural etc. is the tremendous amount of data and information flow on the Internet. Now, the same phone is able to provide us not only voice but Internet capabilities to search a requisite piece of information. With the advent of social media, we have a platform to share our thoughts with many people, share videos, do instant messaging as well as seek response of thousands of friends and relatives. One thing that strikes me is that the whole flow of information and data that is gathered has the ability to deduce information that can help to make products, which can arrange from soaps to complex products such as a tablet or even new generation computing device. Usage of data can be multi fold and offer enormous opportunities, e.g. new fashion trends that can help a consumer 1. 2. Volume: Now, I understand that every day we create 2.5 quintillion bytes of data - so much that 90% of the data in the world today has been created in the last two years alone! This data comes from everywhere: sensors used to gather climate information, posts to social media sites, digital pictures and videos, purchase transaction records, and cell phone GPS signals to name a few. Now with data coming from different sources like social networking and video on Internet the data is becoming more unstructured. Second is Velocity: The rate of flow of information is very high whether it is instant messaging, tweets or millions of videos on the Internet and this data is also changing constantly. I personally feel that with the proliferation of the devices, social networking and data collection is leading to challenges of using these unstructured data and presenting opportunities to find information that can lead to efficiencies and new inventions. CSI Communications | January 2013 | 18 Sometimes a few seconds is too late. For time-sensitive processes such as catching fraud, data needs to be analyzed as it streams in order to maximize its value. 3. Variety: Data is getting originated not only from the data residing on the computer, but from multiple sources such as social networking sites, sensors that register power, temperature, video files and many more. For a very long time barring last few years, structured data was available in digital format within the boundaries of an entity, be it a corporate, a research institution, or a service provider. Hence, the technologies required to analyze these data are technologies needed to be based on structured, repeatable tasks based relational database systems. Now given the three dimensional view of the data like Volume, Velocity, and Variety we need new technologies to deduce information from these vast amounts of unstructured data to make decisions. The reason is that data sets are just not numeric, they can be alphanumeric, images, audio, video, scanned form etc. This leads to the challenge of managing larger and complex data sets, which is now known as Big Data. I sincerely feel that Big Data is an opportunity to solve big problems facing the world, especially in developing countries today. • For example, I was traveling to Odisha to visit the famous Konark temple. My aunt lives in a taluk in Nayagarh district near Bhubaneswar and my uncle, a state agriculture officer told me that the small farmers in that area are able to improve agriculture productivity and grow more crops by simply having access to soil testing parameters through a service being provided by an entrepreneur owning a computer with soil-testing machine. Imagine the benefits of mapping the entire agriculture land in India and sharing best practices from the good work done by research institutes, NGOs, and Government throughout the country through a common data www.csi-india.org For a very long time barring last few years, structured data was available in digital format within the boundaries of an entity, be it a corporate, a research institution, or a service provider. Hence, the technologies required to analyze these data are technologies needed to be based on structured, repeatable tasks based relational database systems. hub. Our country has 700 million small farmers contributing to 18% of GDP and we can well imagine the benefits. Another application area for Big Data is renewable energy. Making wind a reliable source of energy depends greatly on the placement of the wind turbines used to produce electricity. We can determine the optimal turbine placement using weather forecasts and data from operational wind power plants to create hourly and daily predictions regarding energy production. Similarly a wind library, which incorporates data from global weather systems with data collected from existing turbines helps us to choose the best site for turbine placement, help forecast wind and power production. We daily hear thousands getting affected by viruses across the country. By collecting, consolidating, • • • • and analyzing health data from diverse collection points across primary health centers, clinics and data collected by Auxiliary nurse mid wives (ANMs) we can discover, track, and assess disease trends early and then make operational adjustments in resources, capacities and target our health programs to address them. For medical researchers, data can help surface subtle relationships between symptom and ailment, between patient and predisposition, between actual predictive indicators, and reactive symptoms. Big data technology also provides law enforcement opportunities the ability to analyze data from a multiplicity of data sources and correlate and vector activities to provide an overview of activities. Apply data and text analytics and the ability to see activities whose relationships may multiple degrees There are technologies that meet these capabilities which can be deployed to manage the constantly evolving data which we call Big Data. There are challenges as well in ensuring data integrity and effort needed to collect these data, but it will be worth investing to enable the country to solve the big problems in energy, education, and health. of separation. The technology is providing law enforcement the capability to employ predictive analytics - and thus the ability to make “intelligent predictions” based on criminal activity. This unprecedented ability gives law enforcement the potential to become proactive in their efforts by possible prevention of criminal activity before its occurrence. However, to implement systems to dissect such data poses challenges. These data sets are very large and complex that they become difficult to work with using existing on-hand database management tools. The system to handle these data which is constantly evolving and growing rapidly needs core capabilities such as: Data processing: processes and analyzes any data type across server clusters that are scalable. Data Warehousing: delivers deep operational insight and analytics. Information Integration: understand, cleanse, and deliver trusted information. The fourth one is the ability to process data as it streams in real time. There are technologies that meet these capabilities which can be deployed to manage the constantly evolving data which we call Big Data. There are challenges as well in ensuring data integrity and effort needed to collect these data, but it will be worth investing to enable the country to solve the big problems in energy, n education, and health. Kind Attention: Prospective Contributors of CSI Communications Please note that cover themes of future issues of CSI Communications are as follows • • February 2013 – Programming Language Paradigms March 2013 - e-Libraries The articles and contributions may be submitted in the following categories: Cover Story, Research Front, Technical Trends, and Article. For detailed instructions regarding submission of articles, please refer to CSI Communications April 2012 and/ or CSI Communications September 2012 issue. [Issued on behalf of Editors of CSI Communications] CSI Communications | January 2013 | 19 Software Development Competition on Tablet All are welcome to participate... Android experts are welcome We also invite Linux Enthusiasts For more information, please visit http://AakashLabs.org/compete Aakash is an initiative of National Mission on Education through ICT, MHRD, Government of India, Currently being executed by IIT Bombay CSI Communications | January 2013 | 20 IIT Bombay www.csi-india.org Article Kannan M Moudgalya & D B Phatak* and N K Sinha & Pradeep Varma** *Indian Institute of Technology Bombay **National Mission on Education Through ICT, MHRD Genesis of Aakash 2 On 2 Feb. 2009, the then Human Resource Development Minister Shri Arjun Singh inaugurated at Tirupati the National Mission on Education through ICT (NMEICT) with an outlay of Rs. 4,612 crore, equivalent to one billion US$ at the prevailing exchange rates. Out of this sum, about 60% was allocated to provide good bandwidth to universities and colleges and the remaining was meant for content development and a low cost access and computing device. The objective of this mission was to raise the levels of education in India. It was an initiative of the Department of Higher Education, MHRD, Government of India. The National Programme on Technology Enhanced Learning (NPTEL) had just completed the first phase with instructional material on 240 courses. This success had demonstrated that it was possible for the educational institutions to work together to deliver products of common good. The team behind NMEICT believed that a lot could be done for education using information and communication technologies. There was a need to develop NPTEL like courses for all subject areas: science, arts, social sciences and commerce, by the best people from all universities and colleges. To support theory, and to increase the motivation levels, virtual labs and robotic devices were proposed. In order that the technologies and the content are accessible to everyone, use and promotion of open source software was mandated. To stream the content, extensive plans were drawn up to provide bandwidth. A low cost access device was proposed as the delivery vehicle. Statistics revealed that a large number of college going students spent two hours or more in travelling to the place of study every day. At least a few of them would be interested in using that time for learning purposes. If recorded educational videos were available on a tablet device, the students could listen to them while travelling between their homes and colleges. It was not necessary to spend money on software development specific to the device, such as a unique operating system - Android or Linux should do. The operating cost could also be kept low by avoiding the use of proprietary software packages. A rich software ecosystem could be provided through the promotion of open source software. Necessary funding to train the students and faculty on the use and creation of open source software could be provided separately through the content development budget head. Having a computing system on the go would allow students to try out their ideas even while on the move or during a group discussion, etc. Such a device should allow students to validate their ideas through small programs, which if worked, could be transferred through a cloud to a high-end computing system. It should be possible to use this instrument as an access device, for getting on to the Internet, for browsing and for writing emails. It should be possible to open and read documents created in standard format, such as pdf, odt and doc. It should be possible to use this device for entertainment: to play games or watch videos. S u b j e c t to the above requirements, the device should be at the lowest cost possible, so that a large number of students could easily be accommodated, in case of subsidized distribution programs. It was felt that a tablet based on a low cost ARM processor could meet all the above mentioned requirements. Instead of going to the latest, one could profitably use the components that were just past their prime, as these provide the best performance to price ratio. Experts from IITs, IISc and the industry helped the government arrive at the specifications for the proposed low cost access and computing device. It was estimated that the bill of materials for the absolute minimum configuration required to meet the above capabilities would be about $35. It should be possible to get such a device for sub $50 to start with and eventually to sub $20 levels. The already existing solutions like the one laptop per child would have cost in excess of $150 and hence would have been prohibitively expensive, given the hundreds of millions of students in India. The task would be entrusted to a group of educational or research institutions, led by an Indian Institute of Technology. This IIT would place an order for 100,000 devices based on a global tender. It would verify whether the proposed hardware configuration was sufficient to make the instrument a reasonable computing and access device. It would arrive at this conclusion by testing this device at a large number of educational institutions. In this process, this IIT would also establish a huge ecosystem in many colleges and universities, required to port and support the software that would eventually run in the device. Unfortunately, almost no one believed that the proposed low cost model was viable. The then prevailing high costs of tablets made many to disbelieve the proposed approach. Some even went to the extent of casting aspersions on the people behind this project. Vested interested groups that stood to lose by the success of this project were the other adversaries. As it involved mostly developmental work and not basic research, most institutions were reluctant to lead this project. Even those who had the necessary background and interest in such a project were busy CSI Communications | January 2013 | 21 with prior commitments. IIT Rajasthan was the only institution that was ready to give this project a try. IIT Rajasthan followed an open tender process. A three step process was followed to evaluate the bids that were received. First, a committee scanned all bids to check their eligibility based on the conditions specified in the tender. Next, a technical evaluation committee comprising eminent academics and industry experts evaluated the eligible bids. In the third stage, the bids that were found technically suitable underwent financial scrutiny to identify the lowest bidder. The company Datawind emerged as the lowest cost bidder. On further negotiations, Datawind agreed to supply these devices at a landed price of $49.98. Custom and excise duties would be waived. The device that Datawind agreed to supply had the following specifications: 366 MHz Conexant ARM 11 processor, 7” resistive touch screen, 256 MB RAM, two USB ports and wifi. Many criticized the Government for holding on to the price point of $50 when the idea of low cost access device was contemplated. It should be pointed out that there is no correlation between the selling price and the cost of production in the electronics industry. If the Government were not stubborn, the price would easily have escalated. The sub $50 order resulted in a saving of at least $50 per device and hence a net saving of about Rs. 25 crore, even on an order of 100,000 units. The savings would be a lot more when millions of students are covered. CSI Communications | January 2013 | 22 It should be pointed out that no established manufacturer in the field of computer tablets or CPUs was willing to participate in this activity either directly or indirectly. There were two reasons: if the project went awry, their reputation would take a hit. If on the other hand it was a success, the margins in their other product lines could be severely affected. On the other hand, for a new or a first generation entrepreneur, the loss of profitability of an existing product line was not applicable. They would also go for the most efficient way to produce the goods as the margins were small. The possible establishment of their brand would be the driving force to take the necessary risks. The low cost access and computing device was christened Aakash and was launched on 5 Oct. 2011 by the then Human Resource Development Minister, Shri Kapil Sibal. Unfortunately, however, differences between Aakash and what people expected it to be arose. The public compared this device with the ones available in the market, which were several times more expensive. On the flip side, the latter, although expensive, were only access devices, but not computing instruments. In order to bring Aakash closer to people’s expectations, the specifications were redrawn in a meeting held between MHRD, IIT Rajasthan and Datawind in Nov. 2011. In this meeting, Datawind agreed to provide a capacitive touch screen in lieu of the resistive screen. They also agreed to provide the tablet at Rs. 2,276, the rupee equivalent of $49.98 on the day the purchase order was placed. This would more correctly account for the delays, while protecting against the fluctuations in the exchange rates. This new improved device was christened as Aakash 2. In Feb. 2012, IIT Rajasthan informed MHRD that they would like to withdraw from the project. We have already explained the kind of work expected of IIT Rajasthan. Being a new IIT without sufficient faculty strength and with a temporary campus, it was possibly proving to be difficult to handle this project. Expectation management was an unexpected, additional, headache. By that time, several NMEICT projects were functioning very successfully at IIT Bombay. The e-Yantra project had produced several versions of educational www.csi-india.org robots and had trained many college teachers and students. The OSCAR team came up with several 3D animations that could be used for instructional purposes. The design content creation project of the Industrial Design Centre created a lot of the state of the art content in the area of design. The virtual labs project had many simulation and remote triggered experiments. The FOSSEE project had created good eco-systems for open source software, such as Scilab, Python, Open FOAM for computational fluid dynamics, OSCAD for electronic circuit simulation and GNUKhata for accounting. The live recording of regular courses of IIT Bombay was ready to be delivered through a web portal. The Spoken Tutorial project was training tens of thousands of students through open source software workshops in hundreds of colleges, free of cost. Many high quality spoken tutorials were also created by this project. The benefits of all of these projects could be delivered through Aakash. The 1,000 teacher training programme activity, also funded through NMEICT, was possibly the most appropriate one to test Aakash. The Remote Centres of this programme would be the natural testing ground for Aakash. It would be possible to teach thousands of teachers simultaneously on the use of Aakash, software development and support. All the thousands of teachers trained through this programme could be called upon to test Aakash and to give their feedback. Many students in these colleges could be encouraged to carry out their final year project using Aakash. More than 200 staff members were working in all the NMEICT projects at IIT Bombay. As all the NMEICT projects at IIT Bombay had achieved a substantial part of their targets, they could be called upon to transfer the fruits of their projects to Aakash. In March 2012, the Aakash project was transferred to IIT Bombay, with CDAC as its testing partner. As IIT Rajasthan selected Datawind through due diligence, following all CAG norms, IIT Bombay decided to procure Aakash 2 from the same vendor. Starting a new tender would have delayed the project by six months to one year. IIT Bombay negotiated with Datawind once again and froze the prices at Rs. 2,263. The specifications of this device are given below: 800 MHz ARM Cortex A8, 256 MB RAM, 2GB NAND flash, 2GB SD card, 7” display with 800x480 resolution, four point multitouch projective capacitive touch panel, Android 2.3 or later. The purchase order was issued on 4 May 2012. Datawind was supposed to complete the delivery of 100,000 units by 31 October 2012. On testing the devices supplied by Datawind, it was found that the CPU of the device and the Android 2.3 OS that ran on it were not stable. It was required to reset the system very often. The 256 MB RAM that came with the device was not sufficient to port many applications. In July 2012, Datawind agreed to upgrade the device to a better one without any cost escalation. The new device would have 512 MB RAM, 1GHz ARM Cortex A8 processor, Android 4.0 operating system and a gravity sensor, all upgrades over the purchase order issued by IIT Bombay in May 2012. On testing, it was found that the new device was a lot more stable than the previous one, because of the upgrades in the hardware and the software. The software team at IIT Bombay also found this device to be a lot easier to port software on to. The extra time that Datawind had between Aakash 1 and the improved Aakash 2 helped it iron out the raw edges and to give a much better product. This is true of any new product development project: there are always a lot of shortcomings during the learning curve and once the problems are rectified, the product becomes a much better one. Datawind was also given an extension as this was a completely different tablet and hence, tooling, etc., had to be re-done. During the past six months, a lot of software development work around Aakash has taken place at IIT Bombay and its remote centres. This work can be classified into five categories: 1. Porting of instructional videos and associated ecosystem: NPTEL videos and the video recordings of class room lectures at IIT Bombay are now available on Aakash. The 3-D educational animations created by OSCAR and the spoken tutorials are also available on Aakash. While watching a video, one can “ask a question”, which gets lodged in a 2. 3. 4. 5. forum and gets answered during a one hour live session every week. IIT Bombay has been running this AAQ activity for more than two years in electrical engineering. An open source software PROXIMITY that helps access videos on the basis of tags is also available on Aakash. Porting of text books and research monographs in e-pub format to Aakash: Work is underway to port NCERT textbooks on to Aakash. As the screen size of Aakash is small, one may have to zoom the contents, which would make page width exceed the size of the screen, resulting in scrolling to read every line. The e-pub format re-flows the lines so that the entire text fits within the width of the screen. The current plan is to port the textbooks of all school boards. The same activity can be extended to college level textbooks and research monographs that are freely available, an example being the IGNOU content. Programming and simulation environments: C, C++, Python, Scientific Python, PHP, Perl, R and Scilab have been ported to Aakash. Accessing external hardware from Aakash: Aakash has been used to control robots developed through the e-Yantra project. We have been able to access virtual labs and the physics experimental kit expeyes. Work is underway to build a low cost alternative to ECG systems using an Aakash based sensor system. Work is also underway to build a low cost microscope using Aakash and an USB web camera. Porting of Linux: We have been successful in porting different flavors of Linux to Aakash. We have Ubuntu 12.0 running in native mode on Aakash. The performance of some applications is better in Linux, compared to Android. For example, the Scilab port on Android is through a chroot environment, with associated communication delays between the operating systems. On the Linux side, however, Scilab runs in native mode, resulting in a much better performance. We will describe these in a future article. It should be pointed out that the philosophy Continued on Page 29 CSI Communications | January 2013 | 23 Practitioner Workbench Wallace Jacob Sr. Asst. Prof. at Tolani Maritime Institute [email protected] Programming.Tips() » Fun with ‘C’ Programs The article attempts to dwell on the concept of union in ‘C’ language. A declaration like: union ex { int num1; char c1[4]; char x; } var1; implies that four bytes will be reserved for the variable var1 (assuming that an integer is being stored in four bytes and a character requires one byte for storage). For simplicity, let us assume that the four bytes have been allocated as depicted in Fig. 1 below: 3215172627 3215172626 3215172625 3215172624 ⇑ Cell ⇑ Cell addresses (implementation dependent) If an integer is assigned to var1.num1, then it will be stored in these four bytes, if a character is assigned to var1.x then it will be stored in one of these four bytes, and the array elements of the single dimensional array var1. c1 will also be stored in the same four bytes which have been reserved for num1. So how are the values actually stored? The program and its output below answer the aforesaid question (the lines have been numbered for easy readability): Program listing one 1 #include<stdio.h> 2 3 union ex 4 { 5 int num1; 6 char c1[4]; 7 char x; 8 }; 9 10 main() 11 { 12 union ex var1; 13 14 printf(“\nsizeof(char)=%d”, sizeof(char)); 15 printf(“\nsizeof(int)=%d”, sizeof(int)); 16 printf(“\nsizeof(var1)=%d”, sizeof(var1)); 17 18 var1.num1=1145258561; 19 20 printf(“\nvar1.num1=%d”, var1.num1); 21 printf(“\nvar1.c1[0]=%c”, var1.c1[0]); 22 printf(“\nvar1.c1[1]=%c”, var1.c1[1]); 23 printf(“\nvar1.c1[2]=%c”, var1.c1[2]); 24 printf(“\nvar1.c1[3]=%c”, var1.c1[3]); 25 printf(“\nvar1.x=%d”, var1.x); CSI Communications | January 2013 | 24 26 27 var1.c1[0]=’Z’; 28 printf(“\nvar1.num1=%d”, var1.num1); 29 printf(“\nvar1.c1[0]=%c”, var1.c1[0]); 30 printf(“\nvar1.c1[1]=%c”, var1.c1[1]); 31 printf(“\nvar1.c1[2]=%c”, var1.c1[2]); 32 printf(“\nvar1.c1[3]=%c”, var1.c1[3]); 33 printf(“\nvar1.x=%d”, var1.x); 34 35 var1.c1[0]=’a’; 36 var1.c1[1]=’b’; 37 var1.c1[2]=’c’; 38 var1.c1[3]=’d’; 39 printf(“\nvar1.num1=%d”, var1.num1); 40 printf(“\nvar1.c1[0]=%c”, var1.c1[0]); 41 printf(“\nvar1.c1[1]=%c”, var1.c1[1]); 42 printf(“\nvar1.c1[2]=%c”, var1.c1[2]); 43 printf(“\nvar1.c1[3]=%c”, var1.c1[3]); 44 printf(“\nvar1.x=%d”, var1.x); 45 46 printf(“\n&var1.num1=%u”, &var1.num1); 47 printf(“\n&var1.c1[0]=%u”, &var1.c1[0]); 48 printf(“\n&var1.c1[1]=%u”, &var1.c1[1]); 49 printf(“\n&var1.c1[2]=%u”, &var1.c1[2]); 50 printf(“\n&var1.c1[3]=%u”, &var1. c1[3]); 51 printf(“\n&var1.x=%u”, &var1.x); 52 53 return 0; 54} A sample output (implementation dependent) of the program is given below: sizeof(char)=1 sizeof(int)=4 sizeof(var1)=4 var1.num1=1145258561 var1.c1[0]=A var1.c1[1]=B var1.c1[2]=C var1.c1[3]=D var1.x=65 var1.num1=1145258586 var1.c1[0]=Z var1.c1[1]=B var1.c1[2]=C var1.c1[3]=D var1.x=90 var1.num1=1684234849 var1.c1[0]=a var1.c1[1]=b var1.c1[2]=c var1.c1[3]=d var1.x=97 &var1.num1=3215172624 &var1.c1[0]=3215172624 &var1.c1[1]=3215172625 &var1.c1[2]=3215172626 &var1.c1[3]=3215172627 &var1.x=3215172624 Statements 14 to 16 have been included only to ascertain the amount of storage space (in bytes) which few of the different data types (basic and user-defined data types in this program) may require. In line no. 18 when the integer 1145258561 is being stored in var1. num1, one possible internal representation (out of several possible representations) might be as follows: 68 3215172627 67 3215172626 66 3215172625 65 3215172624 When var1.num1 is being printed the following computation is being performed: 65 + (66 * 256) + (67 * 65536) + (68 * 16777216) which yields 1145258561. Since this program has been executed on a machine which is using ASCII codes, therefore when the values of the character array var1.c1 are being printed the characters whose ASCII codes are 65, 66, 67, and 68 are printed. The effect of statement number 27 when ‘Z’ is being assigned to var1.c1[0], might be visualized as follows: 68 3215172627 67 3215172626 66 3215172625 90 3215172624 Thus, when var1.num1 is being printed through statement 28, the output is 1145258586 [=90 + (66 * 256) + (67 * 65536) + (68 * 16777216)]. The effect of statements 35 to 38 wherein ‘a’, ‘b’, ‘c’, and ‘d’ are being assigned to var1.c1[0], var1.c1[1], var1.c1[2], var1.c1[3] respectively, might be visualized as follows: 100 3215172627 99 3215172626 98 3215172625 97 3215172624 Thus, when var1.num1 is being printed through statement 39, the output is 1684234849 [=97 + (98 * 256) + (99 * 65536) + (100 * 16777216)]. For a deeper understanding of how the members of union variable var1 are being stored, their addresses are printed through statements 46 to 51. [A word of caution: In general, a member of a union should be examined/worked on only if the union has been assigned a value using the same member.] n www.csi-india.org Practitioner Workbench Umesh P Department of Computational Biology and Bioinformatics, University of Kerala Programming.Learn (“Python”) » ‘Regular Expression’ of Python If you are working with text you may need to search or identify a specific string or particular pattern. In programming, this is usually done by regular expression commands. The term ‘regular’ is borrowed from the definition of formal language. Some of the problems like validating email and/or password, extracting some specific section from HTML or XML file, Parsing a text and saving in a database, replace a specific pattern with another text, etc. can easily and effectively be tackled by regular expression commands. Python is excellent in manipulating textual data. There are many built in functions to manipulate text in Python. Let us see some of them. str1='cell' str1.replace('c', 's') ## To replace ‘c’ with ‘s’ str1[:2] ## To print first two letters str1[1:] ## To print letters after first letter str1.count('l') ## To count letter ‘l’ str1.find(‘l’) ## To find letter ‘l’ str1.lower() ## To convert all letters into small letters str1.upper() ## To convert all letters into capital letters str1.title() ## To convert all letters into title case letters str1.rjust ( 20 ) ## To move string to 20 pt right str1.ljust ( 20 ) ## To move string to 20 pt left Python also supports format strings, by which you can pass a number by using operator %. This is called formatting operator. %s is used to pass string and %d is used to pass a digit. "Today is %s January, of %d" % (‘first’, 2013) Regular expression module in Python adds much more functionality to Python.The regular expression module can be imported in Python by using the command ‘import re’ import re pattern = 'Year' text = 'Happy New Year' match = re.search(pattern, text) s = match.start() e = match.end() print 'Found "%s" in "%s" from %d to %d ("%s")' % (match. re.pattern, match.string, s, e, text[s:e]) Program 1 The output of the above program is Found "Year" in "Happy New Year" from 10 to 14 ("Year") Here match.re.pattern refers to the pattern which is to be matched and match.string refers to the match obtained after the search. The commands - match.start() and match.end() gives the start and end position of the string where the match is found. Also we can easily extract the string from the text by using the syntax text[s:e] Now let us see how a pattern from a long text can be found by using the Python regular expression.Try the following program: import re text = 'abbabababbbbaaaaa' pattern = 'ab' for match in re.findall(pattern, text): print 'Found "%s"' % match Program 2 See another program which finds wherever the symbol percentage (%) is present This program [Program4] searches the text ‘abc’ or ‘cde’or ‘fgh’ or ‘ijk’ or ‘ml’ in the string which you would like to search using the regular expression pattern match. In each of the above examples, we have used different regular expression commands- re.match, re.search(), re.findall, and re.compile. There is some difference between these commands. For a given string and a pattern re.match checks if there is some matching pattern in the string from the beginning of the string, whereas re.search() checks for a match anywhere in the string. The expression, re.findall returns a list of matches, from the documentation. The power of regular expression is you can do complicated search and string processing by using two or three lines of codes. The very basic application of regular expression is matching a single character, which is the simplest of the kind. That is to find whether a particular letter is present in a sentence. We can also match particular set of alphabets by using square brackets (For example, [a-z], this is called matching "character classes.") We can compare with more complex pattern by using particular symbols and operators. Also grouping of strings by using braces are done for better abstraction. The regular expression for zero or more is “*”; and one or more is denoted by "+"; zero or one is indicated by “?” string= "hello66666666world" ifre.search("hello([d-w]*\d\d?)+world", string): print "Match!" Program 5 In the above program, we are interested only on the first and last part of the string To validate an email ID, different methods have been used. Let us use regular expression to find whether a particular Email ID is valid or not. import re def validate(email): if re.match("^.+\\@(\\[?)[a-zA-Z0-9\\-\\.]+\\.([a-zA-Z] {2,3}|[0-9]{1,3})(\\]?)$", email): return "This is a correct E-mail ID" return "This is not a correct E-mail ID" Program 6 Regular expressions can be extended to find a particular string in a huge text file, or find pattern of text. Linguists and Bioinformaticians (regular users of regular expression) can exploit the potential of Python and regular expression modules. Regular expression Usage ^ To match the beginning of a string $ To match the end of a string * To match whether the pattern is repeated zero or more + To match whether the pattern is repeated one or more \b To match a word boundary \d To match any numeric digit \D To match any non-numeric character \s To match anywhitespace character (blank space, tab, etc.) import re data= 'Reservation is 30% not in 13%' find_percentage = re.compile('\S+%') printfind_percentage.findall(data) Program 3 \S To matchany non-whitespace character \w To match any alphanumeric character and the underscore (a|b|c) To match exactly one of a, b or c In program3, re.compile, compiles the regular expression pattern into a regular expression object, which can be used for matching pattern by ‘ match()’, ‘search ()’ and ‘findall()’methods. {n} Match Exactly n times x{n,m} To match character x, at least n times, but not more than m times. data='abc’ ## Try different values for data ‘cde’,‘fgh’etc Regex1 = re.compile('^(abc|cde|fgh|ijk|ml)+$') print Regex1.findall(data) Program 4 Table 1: Some of the regular expression symbols n CSI Communications | January 2013 | 25 Security Corner Adv. Prashant Mali [BSc (Physics), MSc (Comp Science), LLB] Cyber Security & Cyber Law Expert Email: [email protected] Information Security » Can You Keep Your Emails Secret? Lawfully? I can give this to you, most people don’t have the CBI/RAW/IB sniffing through their personal e-mails, but people grossly underestimate how transparent their digital communications have become. Anyone can read your e-mails because it’s so easy to do. What people don’t realize is that hacking and spying went mainstream a decade ago, They think hacking is some difficult thing. Meanwhile, everyone is reading everyone else’s e-mails girlfriends are reading boyfriends, bosses are reading employees, Parents re reading children’s or vice versa because it’s just so easy to do. True fact is no matter what you are trying to hide in your e-mail in-box or text message folder be it an extramarital affair or company trade secrets it is possible that someone will find out. If it involves criminal activity or litigation, the odds increase because the government has search and IT Act, 2000 powers that can be used to get any and all information, whether it is stored on your laptop or, as is more likely these days, stored in the cloud. There are legitimate reasons that people want to keep private all types of information and communications that are not suspicious (like old letters. the contents of will, or a chronic illness). In that case, here are your best shots at hiding the skeletons in your digital closet. Understanding the threat is always the most difficult part of security technology, for example in the US army officer case, If he had believed the threat to be a government with the ability to get his login records from a service provider, not just their spouse, he might have acted differently. To hide their affair from their spouses, the two reportedly limited their digital communications to a shared Gmail account. They did not send e-mails, but saved messages to the draft folder instead, ostensibly to avoid a digital trail. It is unlikely either of their spouses would have seen it. But neither took necessary steps to hide their computer’s I.P. addresses HIDE YOUR LOCATION: You can mask your I.P. addresses using TOR, a popular privacy tool that allows anonymous Web browsing. You can also use a virtual private network, which adds a layer of security to CSI Communications | January 2013 | 26 public Wi-Fi networks like the one in your hotel room. E-mail providers like Google and Yahoo keep login records, which reveal I.P. addresses, for 18 months, during which they can easily be asked for data legally. A letter on the letterhead of DCP / SP of the police to network service providers can reveal lot of individual data. Requests for Google to hand over user info from governments around the world grew from 18,257 in the last half of 2011, to 20,938 in the first half of 2012. Those requests have been rising steadily since Google introduced the Transparency Report back in 2009, but it’s beginning to look like the growth rate of requests is accelerating. disappears. But there is always the chance that your recipient captured screenshots. GO OFF THE RECORD: At bare minimum, choose the “off the record” feature on Google Talk, Google’s instant messaging client, which ensures that nothing typed is saved or searchable in either person’s Gmail account. PLEA OF ALIBI: Under Section 11 of The Indian Evidence Act, then there is the obvious problem of having to explain to someone why you are carrying a cell phone or suddenly so knowledgeable about encryption technologies. Sometimes the sneakier you are, the weirder you look. ENCRYPT YOUR MESSAGES: E-mail encryption services, like GPG(GNU Privacy Guard), help protect digital secrets from eavesdroppers. Without an encryption key, any message stored in an in-box, or reached from the cloud, will look like gibberish. The sender must get a key from the recipient to send them an encrypted message. The drawback is that managing those keys can be cumbersome. And ultimately, even though a message’s contents are unreadable, the frequency of communication is not. That is bound to arouse suspicions. Wickr, a mobile app, performs a similar service for smart phones, encrypting video, photos, and text and erasing deleted files for good. Typically, metadata for deleted files remains on a phone’s hard drive, where forensics specialists and skilled hackers can piece it back together. Wickr erases those files by writing gibberish over the metadata. SET YOUR SELF-DESTRUCT TIMER: Services like 10 Minute Mail allow users to open an e-mail address and send a message, and the address self-destructs 10 minutes later. Wickr also allows users to set a self-destruct timer for mobile communications so they can control how long a recipient can view a file before it DROP THE DRAFT FOLDER IDEA: It may sound clever, but saving e-mails in a shared draft folder is no safer than transmitting them. This tactic had long been used by terrorists Khalid Sheikh Mohammed, the mastermind of the 9/11 attacks and terrorist groups in India, but now it doesn’t work. E-mails saved to the draft folder are still stored in the cloud. Even if they are deleted, e-mail service providers can be compelled to provide copies. USE ONLY A DESIGNATED DEVICE: One should use a separate, designated device for sensitive communications like a second cell phone or a tablet. DON’T MESS UP: It is hard to pull off one of these steps, let alone all of them all the time. It takes just one mistake forgetting to use TOR, leaving your encryption keys where someone can find them, connecting to an airport Wi-Fi just once to ruin you. Robust tools for privacy and anonymity exist, but they are not well integrated in a way that makes us easy to use, we’ve all made the mistake of accidentally hitting Reply All. Well, if you’re trying to hide your e-mails or account or I.P. address, there are a thousand other mistakes you can make. If the Law and enforcement is after your e-mails, it will find a way to read them. In that case, any attempt to stand in its way may just lull you into a false sense of security. Some people think that if something is difficult to do, it has security benefits, but that’s all fake everything is logged and you are profiled. The reality is if you don’t want something to show up on the front page of The Times of India, then don’t say it. In this networked world filled with netizen’s and data harping companies providing mind boggling apps and services virtually free, I feel the user should be also aware his data or usage data is being used covertly when the law says so. n www.csi-india.org Security Corner Mr. Subramaniam Vutha Advocate Email: [email protected] IT Act 2000 » Prof. IT Law in Conversation with Mr. IT Executive – How policies, implementation mechanisms, and training bridge the gap between the law and technology Issue No. 10 IT Executive: Hi Prof. IT Law! In our last session you talked to me about the challenges of “authenticity”, “integrity” and “non-repudiation” in electronic commerce. And how digital signatures address these challenges. What will we discuss today? Prof. IT Law: Today, we will examine why people like you, who engage in electronic commerce or I T functions should know a little about the law. IT Executive: I guess anyone who engages in commerce of any type should know the basics of the law – such as how contracts are formed and so on. Prof. IT Law: True. But in the case of electronic commerce and the Internet, some knowledge of the law is even more crucial than for people who engage in commerce in the “real” world. IT Executive: Why do you say so? Prof. IT Law: Because, the velocity of commerce on the Internet is so high that mistakes can be very costly and there is much less time to retract errors or remedy mistakes. For example, if you have made an offer on your website that mistakenly indicates a much lower price than you intended, you could be flooded with orders that you cannot refuse. IT Executive: Quite right. Any other reasons why knowledge of the law is more important for those engaged in e-commerce as compared to those in “regular” commerce? Prof. IT Law: Yes. Consider the reach of the Internet. Apart from the velocity of transactions, the Internet permits a global reach across countries, continents and varying judicial systems. That must be borne in mind too. IT Executive: So that make e-commerce easier doesn’t it? Prof. IT Law: True. But it also makes e-commerce more risky in some ways. Both speed and reach are accelerated and magnified. So, that raises new issues, some of which we discussed in the past 9 sessions. IT Executive: For example, the challenges of identifying the other party to a transaction? And the challenge of ensuring that documents transmitted are not tampered with? Prof. IT Law: Yes. And the fact that most work has moved to the Net. And a lot of entertainment and social interaction as well. IT Executive: I see what you mean. Like Facebook, Youtube and other popular Internet based offerings! Prof. IT Law: Precisely. These have aided the stupendous growth of the use of the Internet for work, entertainment and social interaction. All of these have presented new challenges to the legal system that the legal system is struggling to address. IT Executive: I see. So what is the remedy? Prof. IT Law: For every company engaged in e-commerce it is important to have in place 3 very important things. The first of these requirements is a policy relating to electronic interaction. IT Executive: That is easy. Every company has a website policy and so on. Prof. IT Law: Yet, many companies do not have the mechanisms to ensure compliance with their own electronic policies. This brings me to the second requirement, which is, internal guidelines and checklists to handle issues and transgressions of the policy. IT Executive: I agree. Not having implementation mechanisms nullifies the value of having a policy. Prof. IT Law: Yes. And the 3rd requirement is training and periodic updates on such training. IT Executive: You are right Prof I T Law. Given the fact that errors in e-commerce can be very expensive and difficult to remedy, prevention is a superior option. Prof IT Law: You are absolutely right. Policies, implementation mechanisms and trained people are the 3 underpinnings of any risk mitigation plan relating to e-commerce. Such investments will obviate very expensive and painful legal liabilities and almost always, be much cheaper than litigation. IT Executive: I suppose that is because the law lags technology. Prof IT Law: Yes. And that will always be the case. That’s why electronic contracts, policies, implementation mechanisms, and training will help to bridge the gap between the law and technology. IT Executive: It sounds so logical now that you have explained it to me. Prof IT Law: I am glad you concur. We cannot keep knowledge of the law to lawyers alone. Those in technology and business [especially e-commerce] will need to keep abreast of technology law developments too. And we will do that through these series of discussions. Bye n for now. CSI Communications | January 2013 | 27 HR Dr. Manish Godse [email protected] Job Satisfaction: What Is It? Introduction Every day, I question myself: Am I happy to go to my work place? Do I have a negative attitude at workplace? Do I believe in managers and peers? Do I have a positive opinion about the organization? Is the work exciting to me? Am I encouraging my friends to join the organization? If answer to most of these questions is positive then my feeling about job is satisfactory, however if I have negative reaction about these questions then I have to find out the reasons for job dissatisfaction. Every individual has certain values in his or her life which are established and nurtured since childhood by parents, teachers, friends, and family relatives. Values are the end-state of existence which individual wants to achieve during their lifetime, and the essential behavior to reach the end-state of existence. The need of existence can be like self-respect, family security, freedom, prosperity, happiness and many more. The necessary behaviors to achieve these end-states are: honesty, capability, responsibility, ambitious, open-mindedness etc. Values influence behavior and attitude of individuals in a positive or negative way depending upon the situation he or she is facing. Every individual has to be careful at work place because values may affect their work and finally job satisfaction. Job Satisfaction Job satisfaction is employee’s prerequisite to be happy at the work place, whereas it is essential for organization to achieve organization’s vision and objectives. Job satisfaction is expressed as collective feeling of individual towards a job. A person having high positive feeling about the job is highly satisfied and viceversa. Studies show that high esteem individuals are more satisfied with their job rather than individuals who have low esteem. Research has shown that there is a positive correlation between job satisfaction and age. Job satisfaction also increases as individual rises up the hierarchy of the organization. CSI Communications | January 2013 | 28 Factors Contributing to Job Satisfaction Factors affecting the job satisfaction are mainly driven by industry sector, individual’s aspiration, and behavior. Some of the factors which affect job satisfaction are: • Compensation and benefits: It is the major requirement of any person to reach the end-state of existence. Compensation has the positive correlation with job satisfaction. There is no end for the desire for compensation hence individuals have to decide their limit to be satisfied. • Career development: It is always linked with power, compensation, and benefits. Organization has to provide necessary training and opportunities to use skills of employee so that employee can progress on his or her career. If an employee is aware of career development plan and necessary efforts required to achieve it then they can be happy. • Working environment: Organization’s values, ethics, policies, social responsibility, financial conditions, working hours, leave policies, and transparency covers the basic working environment. If working environment is supportive to employees then loyalty of employee towards the organization increases and hence positively impacts job satisfaction. • Work itself: Work should be interesting, challenging, dynamic, and matching to skills of individual. Work has to be aligned with career aspiration and compensation. Some kind of reward program is necessary to acknowledge the work of employee. If all this is true for work then employee is more satisfied. • Job security: It’s important for every individual to have a feeling of job security, however in professional jobs there isn’t any security. It is thus the responsibility of the organization and management to create the sense of job security. • Relationship with management and • immediate supervisor: Relationship with immediate supervisor has to be healthy and transparent such that employee should believe in the supervisor. The relationship with supervisor should be like mentor-mentee rather than masterslave. There is a necessity of regular communication between management and employee. This communication should express the organizations strategy, goals, customers, financial status, and employee policies. Healthy relations with supervisor and management enriches bond between employee and organization. Relationship with peers: This is vital for the survival of an employee within an organization. A manager has to ensure enrichment of peer relationship through various group activities. How to Measure Job Satisfaction? • • Ask a single question to employee about their job satisfaction and allow them to rate on certain scale ranging from ‘Least satisfied’ to ‘Highly satisfied’. However this method isn’t perfect as the employee won’t be able to provide collective opinion of job satisfaction. Set of questions can be asked on various parameters to measure collective job satisfaction on certain scale. What If Dissatisfied? If an individual is dissatisfied about his or her work then they may follow some of the following paths: • Low performance: Individual’s performance or productivity gets reduced if they are dissatisfied with their job. • Absenteeism: Satisfied individuals have positive attitude towards job, hence will avoid being absent from work. • Passive job involvement: Dissatisfied employees may avoid responsibilities, reduce concrete efforts towards work, and may commit more errors in work. www.csi-india.org • • About the Author • Destructive: Dissatisfied employees may express their dissatisfaction in destructive ways such as: complaining nature, stealing organization property, wasteful use of organization facilities and many more. Life dissatisfaction: Job satisfaction also affects life satisfaction. More the job satisfaction more is the life satisfaction and vice-versa. Possibility of exit: If individual isn’t satisfied then there are high chances of their exit from the organization. Conclusion Each employee is unique in the sense of values and end-state of existence; hence it is difficult to meet the aspirations of every individual by the organization. In many cases state-of existence may be unrealistic and out of reach of the individual due to lack of skills. To tackle such odd situations, organization can have various programs to develop culture of self realization, self-esteem, and support in defining end-state of existence which may be more realistic and aligned with employee skills. Effective feedback mechanism, training programs, and learning opportunities has to be created by the organization for effective development of the employee. This creates positive impact on employees and increases their loyalty towards the organization. Reference [1] Stephen P. Robbins and Seema Sanghi, “Organization Bahavior”, Pearson Education, 2005. n Manish has two decades of experience, which spans as Business Leader, Entrepreneur, and Academician. His functional experience is focused on strategy, customer relationship management, pre-sales, product management, costing, psychometric testing, assessment, and counseling. He holds Ph.D. in management from SJM School of Management, Indian Institute of Technology Bombay. Continued from Page 23 of NMEICT that all the instructional material should be made available free of cost to the learner would apply to the above explained resources as well. When IIT Bombay started the Aakash work six months ago, there were three specific tasks: To confirm whether the idea of Aakash was viable. This is an important question to answer as not many people believed in this concept until as recently as six months ago. IIT Bombay has demonstrated that the idea of Aakash is eminently viable. The second mandate to IIT Bombay was to create a large number of educational applications locally and also by co-opting students and faculty members of many colleges from all over the country. IIT Bombay is making a lot of progress in this as well. In order to publicize this intent, IIT Bombay is spearheading two competitions on application development for Aakash, one for Android and the other for Linux. Depending on the number of entries, there could be different tracks, such as school applications, home automation, etc., in each of Linux and Android, with corresponding number of sets of prices. An advertisement for this appears elsewhere in this issue. Several other parallel efforts are also underway to develop applications suitable for Aakash. CDAC is working on providing Indian language support to Aakash. IIT Madras is leading a software development effort by collaborating with several other IITs, including some recently established IITs. The third task assigned to IIT Bombay was to carryout extensive testing and to get sufficient feedback required to arrive at the specifications of Aakash 3. This work is also in full swing. IIT Madras is coordinating the task of coming up with the specifications for Aakash 3. One can see that the Aakash project is progressing well. There have been controversies, such as the origin of manufacture, poor hardware quality and delivery schedule. Such problems do arise in any such ambitious project. We are glad that through sheer determination and grit of the Aakash Team, most of these problems have been overcome. We are also glad that Aakash has had a role in lowering the price of tablets all over the world: reasonable quality devices that were available only in the $200-300 range a year ago are now available for less than $100. No top of the line tablet device can match Aakash even today in the computing area. The Aakash 3 order is expected to be of the order of 5 million. As it will come out about a year after Aakash 2 and as it will be a much larger order, Aakash 3 is expected to deliver a lot more for the same price. Development of a system on a chip, exclusively for Aakash, will be a long term goal of this project, as it will help achieve much lower prices, while simultaneously n improving the performance levels. About the Authors Dr Kannan M. Moudgalya has degrees in Chemical Engg. and Electrical Engg. from IIT Madras and Rice University. He has been a professor at IIT Bombay for 25 years. Through the Spoken Tutorial project, he promotes IT literacy. Dr Deepak Phatak is a teacher. He has been working with IIT Bombay for over 40 years. He is currently engaged in NMEICT projects to scale quality education using ICT. He is a fellow of CSI. Mr Narendra K. Sinha, IAS, graduated in electrical engineering with a gold medal and distinction from IT BHU and IISc and an MBA from Southern Cross University, Australia. As Chief Electoral Officer, District Magistrate and Collector, and Transport Secretary and Transport Commissioner in Bihar, he implemented IT solutions to streamline the operations. Mr. Sinha is the Additional Secretary (TEL) MHRD and Director of NMEICT. He conceptualised NMEICT in general and Aakash in particular. Mr Pradeep Varma is an IT professional and entrepreneur. After a distinguished career in the corporate sector, he has devoted his time to teaching and to serving the National Mission on Education through ICT of the Govt. of India. CSI Communications | January 2013 | 29 IT.Yesterday() Sarwottam Thakur Former Hon. Secretary CSI CSI – The Early Days It is about 50 years now since the mid1960s. Computers were very uncommon in India that time, and a small group of computer users, may be about twenty, had formed an association to address their common interests, problems, and for sharing mutual experiences. At that time IBM had established its South-East Asia Regional Education Centre at the Holiday Inn Hotel in Faridabad near Delhi, and I was in charge of this centre. We invited this group to visit us at our centre. Some ten to fifteen members of this association, mostly non-Industrial users, came to Faridabad, and I hosted their stay there. We did not want the impression that this was an IBM sponsored association created for its own benefit, so I did not take any part in their discussion. I just attended the sessions. In this meeting, the “All India Computer Users Group” was formed, which was later renamed as the Computer Society of India. By this time, the need for such an All-India Society was becoming imperative by the day. Actually the CDC-3600 computer installed at the Tata Institute of Fundamental Research in Mumbai in June 1964 was considered one of the fastest computers in the world that time. Thus, a very good beginning was made to usher the computer age in India. But due to government apathy this first step remained the last step for quite some time. So, an organization to defend the further use of computers was a necessity. And thus the CSI was born. The initial members were mainly “Computer Scientists” from academic and government institutions. There were hardly ten computers in India in the private sector organizations, all with wellknown MNCs. I do not know whether they were approached while forming that first group, but when the CSI was formed, it was mainly the “Computer Scientists” who ran the show. For the first few years, CSI had no employees, no office, and no formal constitution, not even a type-writer and the group operated from the residence of the Honorary Secretary. Naturally, there were hardly any regular activities, as there were no funds. When I left IBM and became an active member of CSI, I wrote to the IBM Country Manager requesting a grant of Rs. 10,000 for our activities. CSI Communications | January 2013 | 30 He immediately sent the cheque as a donation-probably the first time CSI got some substantial amount. Those days, for CSI it was really a substantial amount. The yearly salary of most computer personnel was less than that in the early 1960s. Even with such rickety infrastructure, CSI gained in stature. This I experienced during our Annual Convention (that time called the AGM) at Trivandrum. The ISRO or some such organization had planned their space–rocket launch from the Thumba launch pad around that time. When we reached Trivandrum for the meeting, some of the computer people from there, who had come to receive us, mentioned about this Rocket Launching Program. We just mentioned that if the CSI delegates can watch the launch, it will be a lifelong memory, but they will miss it just by a day. The local delegates conveyed this to their superiors, and to our utter surprise and delight, the launch was postponed by two days so that CSI members could watch the rocket-lift-off. This we thought was recognition of the work that CSI was doing for the computer field, in those days. As CSI grew, though very slowly, private sector organizations were persuaded to join it, and the AGMs got converted into conventions. By this time, opposition to computer usage was growing in the working class and also in the government circles. They vehemently refused to believe in the bright future or helpful usage of computers. It was considered a useless device meant mainly to increase unemployment in the country. In 1972, the Govt. of India appointed “Committee on Automation” stating …… it will be farfetched and wrong to attribute changes in financial working, profits etc. to the introduction of computer”. Such opposition also prompted computer users to join and strengthen the CSI. In 1965 the Bhabha Committee estimated that by the year 1975, India would need about 5500 computers. But due to anti-computer policies of the Indian Government at that time; by the end of 1974, only 233 computers were installed in India. A vast majority of these were with government related organizations. In passing, it may be mentioned that Indian govt. was not alone in underestimating computer growth. Prof. Peter F. Drucker mentions in his article “Business and Technology: Partners in Progress”, an extensive market research study in1950 concluded that by the year 2000, the world would need 1000 computers while there were over 150,000 computers in use in early 1970”. It will be interesting to know the background and history of the anticomputer wave in India, because it affected the working of the CSI. Those were the days when organizations were run (or paralyzed) not by Board of Directors, but by the Leaders of the employees unions (This continues today also, but on a considerably lesser scale than in the 1960s and 1970s). The Life Insurance Corporation of India installed a computer in its Mumbai office. The L.I.C. union objected that their consent was not taken before installing the machine. The L.I.C. management agreed and said that for all future expansion they would consult the unions. But the unions were objecting to the machine already installed. Mr. George Fernandes, the fiery Union Leader of those days (and later much sobered Minister in the Atal Behari Bajpai Govt.) was the main leader of such protests. He had a commanding influence on the Mumbai labor unions. This started the anti-computer wave in India and continued for twenty years. The enviable position which indian computer personnel occupy in the world computer scene today, was delayed by at least twenty years by this union opposition and we lost more than fifteen unrecoverable years in this battle. As a result of this, if an organization wanted to setup a computer installation, it had to secure an approval from its recognized union. A difficult hurdle, because the union thought there will be staff reductions. If the Organizations guaranteed no retrenchment, the union wanted a guarantee for future generations’ jobs - something impossible to understand. Today I.T. industry is not a job reducer but one of the largest job creators. But this objection continued. When that hurdle was crossed, next the consent of the state government was needed. And finally, an approval from the central government was required. The C.S.I was directly or indirectly involved in helping computer-desiring organizations in crossing these hurdles. www.csi-india.org About the Author The government objections did help some ingenuous individuals who imported used computers with their own foreign exchange, set up their personal installations thus creating (and not retrenching) new jobs (only five or six, but new jobs), and rented out time on these machines to various organizations, making a decent profit. Around this time, Mr. F. C. Kohli (justifiably considered the father of computer growth in India) of Tata Consultancy Services, was elected President of the C.S.I, and I as the Honorary Secretary. Mr. Kohli and I had excellent rapport since the time he attended a course that I conducted at the IBM Education Centre. The responsibilities on the C.S.I were increasing considerably - defending the use of computers and proving its potential being the topmost priorities. We still had no staff, no office. We were in a hurry to change this and give CSI an international standing. That time, Col. Ranji, a very sincere retired Army officer was appointed, the first full time employee of C.S.I., and we acquired a small full time office for him. Before this, one Mr. Aranha, an excellent steno, used to come to my office after his office hours, to take dictation for the C.S.I. correspondence. He would type the letters immediately, and take the signed letters for mailing. He also helped me in allotting numerical identification numbers to our members. This we did with some logic but randomly. Thus, I was not CSI member number 0001, but 1835. I do not remember how I came to this odd number for me, but CSI continued my membership number as 1835 even after 40 years. Thank you C.S.I With the establishment of an office and staff (though just one, and later his assistant), we set out to add one more essentials to the CSI image. For the Registered Office of the society, there were two firm suggestions. One some place in Chennai (or, was it Hyderabad) and the other of Nehru Centre in Mumbai. Mumbai had the largest number of members from the Managing Committee, Mr. Kohli, i, the treasurer, and one or two other members were from Mumbai. But I thought there was no point in further crowding an already over-crowded Mumbai, and suggested Chennai. I think this resolution was later passed in the Bangalore convention. But either way, Mumbai or Chennai would not make any difference to the day-to-day working of the CSI or to its public image. Then in the executive committee meeting, we discussed the creation of a logo. There were many suggestions such as - punch cards, magnetic tapes, and other paraphernalia used with computers those days. But the computer field was changing so fast that we discarded all these and decided to ask the National Institute of Design in Ahmedabad to handle the project. We also briefed them about the very fast changing computer concepts. We accepted the logo they suggested, the one being used now. Only question was the color of the logo. But for ease of reproduction on all literature and other products, we chose black & white. Those were the days of National Emergency declared by Mrs. Indira Gandhi. So there was a discussion on whether the two arrows, one pointing right and the other left, would indicate our leftist or rightist inclinations - some fun! The major task still pending was drafting of a model constitution. Mr. Kohli readily agreed to devote whatever time needed for this and in a few months, after detailed discussions in the Managing Committee, prepared the final draft. We were now a full-fledged All India Organization representing the Computer Community. Then we applied to the International Federation of Information Processing for membership and established our presence on the International scene. We also helped and took lead in forming the South East Asia Regional Computer Conference or SEARCC. A large Indian delegation attended the first SEARC convention held in Singapore in 1976. The Singapore television devoted considerable time to air the interview of the CSI chairman, Mr. F.C. Kohli. With the CSI expanding rapidly despite government apathy towards computers, and only the annual convention to meet, city chapters of CSI were started, the first being Mumbai chapter. I think Mr. Shrikhande of Philips was the first chairman. Then student membership and student chapters followed. CSI had now come of age. It was now a well-knit organization standing firmly on its own in the then turbulent Indian computer scene. Before I close these reminiscences of the early days of CSI, I must mention one stormy episode, which had threatened to break the CSI. The CSI was initially formed by computer scientists. By now, business users had joined and so, membership was substantially from industry and business application users. Some of them thought that the “computer scientists” were dominating the CSI, and not giving adequate importance to business use, which was the future of the industry. Most of the sessions of the annual conventions discussed technical issues. In fact, no business-oriented paper was ever rejected for presentation, but the feeling was growing in private discussions. And in one convention (I do not recollect where) a strong group of members indicated that they would like to break away and start an independent business computer society. Membership wise they were in majority. We had lengthy closed-door discussions on this issue. This group finally agreed that when the government itself was against the whole computer industry, we must keep aside our mutual differences, and put up a united front to put forth our views. A viamedia solution was reached, the rebel group withdrew their protests, and the Business and Industry Group (B.I.G) was established. A vertical split of the CSI was averted. The CSI continued as a single united body. I do not know whether the group, called the B. I. G. is still functioning the way it was at least for the first few years. Chak De CSI! Dr Sarwottam Thakur has master degree in science and also master in art from USA. He has done his doctorate in management. He was Hon. Secretary of the CSI in the “early days” when Mr. Kohli was the president. He was also present when the computer users first met at Faridabad in 1964. Having seen CSI right since its birth till it stood on its legs, he has written about these early days and how CSI grew. E-mail: [email protected] Sarwottam Thakur taught mathematics In American Universities and while serving in the corporate field, he was invited faculty in Management Institutes. A founder member of the Computer Society of India and later its Honorary General Secretary, he is considered as one of the pioneers in introducing the Computer Age in India. For some years he headed IBM’s Computer Education Center for South East Asia. Actively engaged in social work, he was the Secretary to Acharya Vinoba Bhave during his Bhoodan and Gramadan Padayatra in Maharashtra. CSI Communications | January 2013 | 31 Brain Teaser Dr. Debasish Jana Editor, CSI Communications Crossword » On popular demand, Crossword is back again for our enthusiastic readers. Send your comments and feedback on this column to CSI Communications at email address [email protected] with subject: Crossword Feedback. Test your Knowledge on Enterprise 2.0 Solution to the crossword with name of first all correct solution provider(s) will appear in the next issue. Send your answers to CSI Communications at email address [email protected] with subject: Crossword Solution - CSIC January 2013 1 2 3 CLUES 4 ACROSS 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 25 24 26 27 28 29 30 31 2. An important element in Web 2.0 as web oriented architecture (3) 3. Language used for extensible hypertext markups (5) 5. A social photo sharing website (6) 6. A popular blogging platform (7) 9. A Rich Internet Application (RIA) framework (11) 11. A social networking site (8) 15. A Rich Internet Application (RIA) framework (4) 17. Someone almost constantly chatting (7) 18. A text-based data interchange format (4) 19. Google’s search advertising program for web publishers (7) 24. A protocol for information exchange using web services (4) 25. Facilitates searching (3) 26. Voice services over the Internet (4) 27. The digital representation of a person in virtual world (6) 29. Mobile weblog (6) 30. A social networking site (8) 31. Blogging from mobile devices (10) DOWN 1. 2. 4. 5. 7. 8. 10. 12. 13. 14. 16. 20. 21. 22. 23. Blogs as a social network (11) Markup language used in wireless medium (3) XML based web service description language (4) An open source web browser (7) An XML based web content format of newsfeed (3) Folk taxonomies (12) Inventor of the wiki (4,10) Language used to describe presentation of web document (3) Semantic Web technology used for organizing data (3) Forms the basic framework of Enterprise 2.0 (6) A form of audio broadcasting over the Internet (10) An open source modular JavaScript library (4) A storage area network (3) Permanent URLs to your individual weblog posts (9) Virtual private networks used by remote users as if they are on internal LAN (3) 26. Blog that includes video medium (4) 28. Enables devices to be connected to networks without special device drivers (4) Solution to December 2012 crossword 1 3 U F Z Z Y L O G I 5 C 6 I Did you know importance of Blogging? N S 8 Ha ve yo u n otic ed th at bl ogs ha ve no w bec ome an essential ingr e die nt o f online c u ltu re? Many p eo p le r ea d bl ogs, many people p o st o n the m too. E arlier people use d to k e ep personal d iaries, now p eo p le wr ite on walls of peopl e (wh ic h a re shared areas o n the we b), as wel l as post on pu blic bl o g s, peo ple read the se a nd comment on th em. Th e tre n d has chan g ed fr o m p e r so na l d iary to web d iary in terms o f b lo g s. 4 12 D 9 S D E P H F I P C N R I V 13 E S V I 15 K N K I N N O W E D G 2 O U R A L N 11 P R O 7 Y L L L A O G G 14 B A Y E S E E B A S C O 10 J S O S H I A F E N M I C W T C C N L F A A E T D R 16 G E N E R U T T I C I D 18 C O G N E I H T A B T N L 20 I V E S 21 S R A T M A B E O D U S P O N E N T A K N O W L E T E O H U N Y P E T R I O R M A T A C N E T I O N S 25 I N F S I 27 C E R I R 24 E T H 17 R 19 E M O T T R 28 L N O F M CSI Communications | January 2013 | 32 C I 22 26 No ALL correct answers to December 2012 month’s crossword received at our Editorial Office. T S E T E S O E 23 R E E N A T U R A R F D G T E www.csi-india.org Ask an Expert Dr. Debasish Jana Editor, CSI Communications Your Question, Our Answer “The foolish man seeks happiness in the distance, the wise grows it under his feet.” ~ James Oppenheim From: V Keerthika Assistant professor, Dept of CSE, SBC / CSI, Er. Perumal Manimekalai College of Engineering, Hosur, Tamilnadu 16777217 is an odd number Approach (iii) 16777217 is odd number [cse68@osscse ~]$. Sir, This is about finding if the entered number is odd or even without using mod function. I have been observing discussions on this for last three months in CSI Communications (Oct, Nov and Dec 2012). Since integer data type in 32-bit machine occupies 32-bits with the range -2147483648 to 2147483647, it needs to be changed to datatype long instead of int and double for float datatype. Accordingly, the dividend should not be 2 as an integer rather needs to be float as 2.0. These corrections make all the three approaches work correctly for any number. [We appreciate all views, including the current one, from our readers expressed on this topic. Many thanks for the analysis and explanation. – Editors, CSIC] Regards, V Keerthika Program: #include<stdio.h> int main() { long numtotest=16777217; //Approach (i) printf("Testing with Approach (i) \n"); long a; double b, no=numtotest; a = no/2; b = no/2.0; if (a==b) printf("%ld is even Number",(long)no); else printf("%ld is odd Number ",(long)no); //Approach (ii) printf("\nTesting with approach(ii)\n"); double no1 = numtotest,no2,no3; no2=no1/2; no3=no2-(int)no2; if(no3>0) printf("%d is an odd number\n",(int)no1); else printf("%d is an even number\n",(int)no1); //Approach (iii) printf("Testing with Approach (iii) \n"); int x = numtotest; if(x & 1) printf("%d is odd number ",x); else printf(“%d is even number “,x); printf(“\n”); return 0; } Output: [cse68@osscse ~]$ cc Pro1.c [cse68@osscse ~]$. /a.out Testing with Approach (i) 16777217 is odd Number Testing with approach (ii) From: K Sivanaadhbaazi, M.Tech, Vignan's Lara Institute of Technology, Guntur I have lot of doubts about this programming language "SemiDefinite Programming". Why this programming language is used? What is the purpose? What is the relation between semidefinite programming and convex optimization? Are there any other optimizers like convex optimizer? This is what Wikipedia says on semi-definite programming: A “Semidefinite programming (SDP) is a subfield of convex optimization concerned with the optimization of a linear objective function (that is, a function to be maximized or minimized) over the intersection of the cone of positive semidefinite matrices with an affine space, i.e., a spectrahedron.” (Ref: http://en.wikipedia. org/wiki/Semidefinite_programming). As you can observe from this definition that this is not at all a programming language. This is a mathematical term, as we learn terms like say, linear programming. This is an optimization technique applied for combinatorial optimization problems and alike. There are many books on semidefinite programming, one reference could be book titled “Aspects of Semidefinite programming” by Klerk, E. de, Springer (2002), URL: http://www. springer.com/mathematics/book/978-1-4020-0547-3 Experts claim that “In broad terms, a semidefinite program is a convex optimization problem that is solved over a convex cone that is the positive semidefinite cone.” (Ref: http://www. convexoptimization.com/dattorro/semidefinite_programming. html) A popular C library is available for Semidefinite programming, it’s called CSDP. Currently, CSDP is available as part of the Debian and Ubuntu distributions. CSDP is also available for many other operating systems, for example, Mac OS, Windows family, Linux etc. A python interface to CSDP is also going to be available. For further reference, you may refer to this URL: https://projects.coinor.org/Csdp/ To access the most recent development version of CSDP, you need to first install subversion tool (you may download from http://subversion.apache.org/packages.html), then, you can run subversion (svn) command as below to get a copy of the latest version. svn co https://projects.coin-or.org/svn/Csdp/trunk n Send your questions to CSI Communications with subject line ‘Ask an Expert’ at email address [email protected] CSI Communications | January 2013 | 33 Happenings@ICT H R Mohan AVP (Systems), The Hindu, Chennai Email: [email protected] ICT News Briefs in December 2012 The following are the ICT news and headlines of interest in December 2012. They have been compiled from various news & Internet sources including the dailies - The Hindu, Business Line, and Economic Times. Voices & Views • • • • • • • • • • • • • • • • • • Big data market is expected to grow more than two-fold to $ 153.1 million (around Rs 840 crore) by 2014 – IDC. Last year, about 220 crore accessed the Internet and 460 crore people remaining out of the Web. Half of those who don’t have the Web live in India, China, Indonesia, Pakistan, and Bangladesh - Google. Only 2% of 13 crore small businesses in emerging markets have online presence - Nelson Mattos, Vice-President, Product and Engineering, Europe and Emerging Products, Google. Globally, there are 2.4 billion Internet users with 8% y-o-y growth and a population penetration rate of 35%. China continues to dominate with 538 million users. 13% of global Internet traffic is estimated from mobile devices. The mobile apps and advertising industry combined has made $19 billion in revenue in 2012. Under National Policy on Information Technology 2012, the government has set target to make at least one person in every family e-literate by 2020. Cyber espionage, State-sponsored attacks, ‘hacktivism’ to get an edge – Kaspersky. Data usage is going up by 20 to 25% per quarter and the adoption of 3G is set to accelerate -Bharti Infratel. Indian companies continue to see higher IT security budgets – PwC. India recorded over 75 million wallpapers (300% growth over last year) and 150 million plus music downloads this year. Kolaveri Di continued to be the top downloaded ringtone in 2012 for the second year in a row. Katrina Kaif maintains the leading position in images downloaded for the fourth consecutive year - Airtel Mobitude. The K-12 e-learning in India is pegged at $150 million and is growing at 15% CAGR. The total number of mobile phone users in the country fell 0.26% to 904.23 million in October from 906.62 million a month ago and the wire line subscriber base declined to 30.95 million from 31.08 million. India’s IT outsourcing biz could triple to $ 1.5 trillion by 2020 - B.V.R Mohan Reddy, Chairman of Infotech Enterprises. Gartner revises downwards semiconductor sales for 2013 at $311 billion. Promote R&D culture to stay competitive, President Pranab tells IT industry. India no more a preferred destination for telcos - GSM Association. Manufacturing, financial sector dominate IT deals in last 7 quarters and accounted for over 45% of total IT contracts – Report by Zinnov. Voice, gesture to replace keyboards and mouse – Intel. Total amount of data generated is expected CSI Communications | January 2013 | 34 • • • • to grow to 2,700 exabytes during 2012, a jump of 48% over 2011 - Sapient Global Markets. Net services will contribute $100 b or 3.3% of GDP by 2015 – McKinsey. Outsourcing helps US firms save 30-50% on costs – Union Minister Jaipal Reddy. Internet users will double once 4G is rolled out - Google India MD. IT industry may grow at 11-12% next fiscal - PwC India. Telecom, Govt, Policy, Compliance • • • • • • • • • • • • • • • • • • • • TRAI moves to check arbitrary disconnection of SIMs. The Supreme Court restores SMS cap to 200. Mobile roaming charges may go in 3 months. DoT for trial runs of new tech to locate mobiles real time. The Government is thinking of setting up a centralized registry with the identity number of each mobile device in the country. Govt plans to launch e-literacy pilot project by March 2013. Foreign telecom players can’t invoke bilateral pacts - The Attorney General. Satyam case: Final arguments begin in Hyderabad court. Aadhaar, PDS database link to help AP plug loopholes. Infosys plans to roll out Rs700-cr project for India Post. Govt panel cuts price of unsold 2G spectrum by 30% for the auction to be held in March 2013. BSNL ventures into interior hamlets in Eastern Ghats whereas private telecom operators are not ready go to the interiors, even though they are obliged to connect the villages under the universal service obligation clause. Price of Aakash tablet to come down to $35 soon – Sibal. Centre turns down Bengal’s appeal to extend STPI scheme. Steps taken for transparent allocation of spectrum – Prime Minister. Mobile number portability to apply countrywide by Feb 2013. 57,271 villages yet to be connected with mobile services. A total of 13,438 villages in the country are yet to be connected with basic telephone facility (landline and wireless in local loop). Govt. hopes to raise Rs 20,000 crore from 2G spectrum auction. TRAI lowers charges for submarine cable landing stations. Over 500 Internet firms find the going tough, surrender licenses. IT Manpower, Staffing & Top Moves • • • 100% stock options to employees on meeting target – Cognizant. Prescience Soft, a Mysore-based company, launches www.azzist.com, a niche social recruiting network. Google to suspend operations at Motorola • • • Mobility’s Chennai unit. Decision to impact 76 jobs. ZTE to slash India workforce 30% in a bid to cut costs. TCS may hire 16,500 for Bengal SEZ project. Infosys defers hiring plans again on sluggish growth. Company News: Tie-ups, Joint Ventures, New Initiatives • • • • • • • • • • • • • • • • • • • • • • • • • • • Wishtel to launch computing devices; tablet PC and net books, starting at $50. Bharti Airtel launches emergency alert service enabling its subscribers to send alert message with location details to 10 mobile numbers. Google fine-tuning roadmap to net next 100 crore users. Apple launches iTunes store in India. Bharti Airtel launches green data centre designed to achieve 1.7-1.75 power usage effectiveness in Mumbai. Facebook to replace Infosys on Nasdaq-100 index. On Day 1 of India launch, iPad Mini sells at a steady clip. Microsoft launches 14 innovation centres in India. Google+ adds photo-sharing app to compete against services like Facebook’s Instagram. Vodafone India has received the ‘Green Telecom Company of the Year 2012’ award in recognition of its initiatives to reduce carbon dioxide emissions. CSIR, HP launch cloud-enabled eHealth Centre. Twitter updates its apps with new photo editing feature. Google partnered with over 50 Web sites to organize the Great Online Shopping Festival (GOSF), a 24-hour online shopping festival. Yahoo! overhauls email for Web, mobile. $99 Google Chromebook laptops for schools sold out. The Rs. 4500 crore Bharti Infratel IPO oversubscribed. Delhi International Airport globally certified in software asset management. Facebook overhauls settings to simplify privacy control. Google India gives Web sites free to shops in Delhi. Vodafone to start machine-to-machine platform. IBM unveils top innovations of future. Twitter tops 200 million active users. Telecom Ministry plans to reduce undersea cable repair time to 3 days. Facebook launches a new app which erases pictures and messages within 10 seconds of being sent. Hyundai have invented a new system that will allow your smartphone to double as your car keys. Security Watch unveils mobile application for women under threat. Aakash 3 may come with SIM slot, more exciting apps. n www.csi-india.org On the Shelf! Mrs Jayshree A Dhere Resident Editor Book Review » Practical Apache Struts2 Web 2.0 Projects Book Title : Practical Apache Struts2 Web 2.0 Projects Author: : Ian Roughley, Struts2 co-creator ISBN : 978-81-8128-893-6 Printed Pages : 338 Price : Rs. 279/- Publisher : Springer (India) Private Limited Today’s software creation activity is marked with ample use of ready frameworks that are basically meant for enhancing developer productivity and for that matter several frameworks that come bundled with common tasks generally required by developers are now readily available. Apache Struts has been a popular open source framework for building Java applications. Struts2 is a major new release of the framework and this book on Struts2 Web 2.0 Projects is written by none other than one of the creators of Struts 2.0 codebase. First chapter of the book is devoted to providing an introduction to Web 2.0. Since from programming perspective Web 2.0 is synonymous with AJAX (Asynchronous JavaScript and XML), author has devoted initial portion to explaining AJAX which is the interaction between various technologies like HTML/XHTML, DOM, CSS, JavaScript and XML along with XMLHttpRequest object supplied by the browser, which is at the core of AJAX. After detailing different values and principles of Web 2.0 such as Share over Protect, Advertise over Subscribe, Participation over Publsihing, Community over Product etc., author goes to explaining other changes brought in by Web 2.0 which are more fundamental at software development level e.g. development process agility, syndication and integration, Web framework agility etc. He provides highlight of changes brought in by Struts2 which is also based on MVC pattern just like earlier Struts but provides much more user friendly features for increasing developer productivity. Some examples of these are plug-ins, conventions over configuration, annotations rather than XML configuration, testability etc. Next two chapters are devoted to getting up and running and to the framework overview. Build process is explained in detail. For build process, author uses Apache’s command line tool named Maven2, which can be used in any environment (developer workstation, integration server, test server etc.) for creating final distribution package of Web application. In the chapter on overview, basic architecture of Struts framework is explored with diagrams along with explanation of how various parts of the framework (like Servlet filter, Action, Interceptors etc.) interact with each other for providing a complete web experience by detailing the request-response walk-through. Idea is to explain how Struts2 uses MVC pattern as its basic principle. Extension points of the framework are also discussed here. Next chapter provides details of a specific web application, which is used as a case study throughout the remaining book for teaching the use of various features of Struts2. The case study is selected with the idea that it should have good many of Web 2.0 concepts, and it should be easily understood by majority audience. Hence, the case study is about an application of a community entertainment service (true Web 2.0 application is expected to have community aspects), which allows users to vote for contestants in events. Whether it is a local talent show or a National Idol event (where users are asked to vote on who they think is best), the application enables the users to register the event, and then vote on the contestants with her friends. After the event is over, everyone can view the voting results. Application use cases are detailed for further study of the project. Through the case study, it is emphasized that Struts2 needs to be integrated with several other technologies for providing a useful application. Especially, the integration with technologies – such as Hibernate (Object-Relational mapping for persistence), Spring Framework (for providing an architectural layer of business services to separate Struts2 action and persistence layer), Acegi (for authentication and authorization services), Rome (for generating RSS Feeds) and Google Web Toolkit (GWT) and Dojo Toolkit (for providing Ajax user interface – is covered. Domain model for the case study is provided along with details of how agile development process is used with continuous integration, which is characteristic of modern day software development. Chapters 5 through 8 provide core features of web application viz. Data manipulation, wizards and workflows, security, and rendering information. Last two chapters are basically about Web 2.0 features of the application, including syndication, integration and ways in which AJAX can be integrated into the application. Book is useful for anyone who intends to explore using Struts framework for software development as well as to those who have already used earlier Struts framework for developing their Java applications as they will find the comparison with the earlier framework especially useful. n CSI Communications | January 2013 | 35 CSI Report R K Bagga Chairman, CSI-SIGeGOV Report on CSI – Nihilent eGovernance Awards 2011-2012 during CSI-2012 held at Kolkata CSI Celebrates a Decade of Success in Encouraging e-Governance in India Completing a remarkable decade this year, the prestigious CSI-Nihilent e-Governance Awards instituted by the Computer Society of India’s Special Interest Group on e-Governance and sponsored by Nihilent technologies announced the Best e-Governance initiatives for the year 2011-2012. The winners were honoured at a grand ceremony held at the 47th Annual Convention of CSI-2012 at Kolkata. Through out the journey, the mission of the awards has been to acknowledge and appreciate the valuable efforts in bringing good governance through utilization of Information and Communication Technologies (ICT). The awards ceremony session was chaired by Prof PVS Rao in presence of Mr Satish Babu, President, CSI. A book on ‘Inclusive Growth through e-Governance: Selected “Prof P V S Rao releasing CSI Case study eGovernance Initiatives in India’ covering the case studies for the current year published book on “Inclusive Growth Through by Universities Press India was released. A special brochure commemorating the 10th year e-Governance “ during CSI Nihilent eGov Awards ceremony held at Kolkata on of CSI Nihilent eGovernance Awards was also released. 2 Dec 2012. The state of Bihar has been conferred with the ‘Award of Excellence’ for the State category. Passport Seva Project by Ministry of External Affairs - Government of India was awarded ‘Award of Excellence’ in ‘Projects Category - Government of India’ while ‘Ports & Transport Department’, Government of Gujarat has received ‘Award of Excellence’ in Department Category. Centralized Online Real-time Electronic (CORE) PDS by Government of Chhattisgarh has received joint award with Government of Gujarat for its initiative on ‘Using Technology for strengthening Targeted Public Distribution System’ for e-Governance projects in ‘Government to Citizen’ category. Other initiatives like ‘eUparjan’ by Civil Supplies Department - Government of Madhya Pradesh, ‘Manava Sampada’ (A Green Governance Tool for Human Resource Management) by Government of Himachal Pradesh and ‘Poll Monitoring System’ by Government of Goa; have won awards in Government to Business, Government to Employee and Government to Government categories respectively. CSI-Nihilent e-Governance Awards has consistently acknowledged and encouraged Dr Ashok Agarwal, Past Chairman CSI-SiGeGOV such initiatives over the decade contributing to the growth of effective governance in the presenƟng his report on “Sustenance of e-Gov country. This year the event signifies the successful journey of CSI and Nihilent towards Projects” during CSI-2012 e-Gov track on 2 Dec 2012 at Kolkata. the endeavor to recognize and appreciate efforts for initiating good governance, using Information and communication technology (ICT). States across the country have actively participated in the awards with rising enthusiasm every year. A full day eGovernance track for Knowledge Sharing of successes was held in presence of large number of delegates including Government officials. The sessions were chaired by Mr Surendra Kapoor and Dr Ashok Agarwal with Co-Chairs as Harish P Iyer and GSN Prabhu. The presentations from the team leaders included SWARNIM-RTO (Gujarat), Passport Seva Project (Ministry of External Affairs), eUparjan (Madhya Pradesh), Manav Sampada (Himachal Pradesh), eDistrict (Kerala), CORE PDS (Chattisgarh), Poll Monitoring System (Goa) and Bihar State. Dr Ashok Agarwal, leader of Sustenance Team gave details of the efforts being made by CSI SIGeGOV team to ensure that ‘Old eGovernance projects which got recognized by CSI more than five years ago were recognized for their sustenance under a special category’. This year’s sustenance awards were given to eProcurement (Gujarat), VAT Information Systems (Gujarat), Samadhan Ek Din Mein (Madhya Pradesh), DC Suite (Kerala), IISFM (New Delhi) and PESO, Nagpur. Dear CSI Member Your hard copy of CSI Communications magazine is sent to the address, which you have provided to CSI. Please ensure that this address is correct and up-to-date. You can modify your address if required by logging as a member to the CSI website viz. http:// www.csi-india.org. In case you are unable to log in, please write an email to [email protected] for assistance. You may send your feedback and comments on the contents of CSI Communications - Knowledge Digest fo IT Community to [email protected]. - On behalf of editors of CSI Communications CSI Communications | January 2013 | 36 www.csi-india.org CSI Report Ranga Rajagopal National Student Co-ordinator “E-merge” - 2012 -13 CSI Maharashtra State Convention (Region VI) At MKSSS’s Cummins College of Engineering for Women, Pune Panel Discussion Day 1 2012 -13 CSI Maharashtra State Convention (Region VI) was hosted by MKSSS’s Cummins College of Engineering for Women, Pune in collaboration with CSI Pune Chapter on 24th and 25th August 2012. The convention “E-merge” was indeed a perfect blend of tutorials and competitions on emerging trends and technologies. The event was very well supported by industry, academia and students. The convention activities started under the able guidance of steering committee of Mr. Satish Babu, President, Computer Society of India, Mr. Shekhar Sahasrabudhe, Regional Vice President, BI Session Day 2 Region VI, Computer Society of India and Dr. S. S. Sane, Regional Student Coordinator, Region VI, Computer Society of India. The event was successfully executed with the support extended by Event Chair – Dr. (Mrs.) M.B. Khambete, Principal, Cummins College of Engineering for Women. The scheduling and implementation was carried under the unrelenting guidance of Program Committee of Prof. Bhakti S. Ahirwadkar, State Student Coordinator, Region VI, Computer Society of India, Prof. Shilpa S. Deshpande, HOD, and Prof. A. N. Muchrikar A.P., Department of Computer Engineering, Cummins College of Engineering for Women. The was immense interest, support and help was also extended by Mr. Amit Dangle, Chairman, Computer Society of India – Pune Chapter and Mr. Nikhil Karkare, Vice President, Computer Society of India – Pune Chapter. The event commenced its beginning by an inaugural function on 24th August morning. Dr. Bhooshan Kelkar, Country Manager, IBM India University Relations was the Chief Guest to join the CSI and CCOEW authorities on the dais. The key note speech was delivered by him. He discussed various emerging trends and their relevance. His talk was truly motivating and provided a real “Glimpse into future”. The day 1 continued with parallel tracks of the tutorials on Linux 1O1 and Cloud Buster. The Linux session was aimed to introduce open source environment to students and was conducted by Mr. Arun Tomar, CEO, Solution Enterprises, Pune. The technology beneath the cloud was made easy and simple by Mr. Subramhanya Hathwar from ICERTIS, Pune. To celebrate the centenary year of Allan Turing, a poster paper presentation was organized on the work of Turing Award Winners. Participants showed great interest to put up the posters and many submitted their abstracts. 11 groups were shortlisted to compete. The judges, participants and even the audience very much appreciated the idea and enjoyed poster making with a new facet of computer science. The day 1 was called off with a very well planned and moderated Panel Discussion on “Be a dream Candidate of a Dream Company”. Panelists included various industry HR experts, TPO of institutes, who threw the light on the industry expectations from a candidate. The panelist were - Mr. Prem Apte, Head of Management Trainee Program and Technical Training, Zensar, Mr. Moti Thadani, Head, SAS Research and Development (India) Pvt. Ltd., Mr. M. P. Khond, Ex TPO, COEP, Mr. Jayant Sabnis, Executive Software Professional, SQS India Infosystems Pvt. Ltd., Mr. Rajesh Sinha, CEO, Fulcrum WorldWide (by Video conferencing) and Prof. A. N. Muchrikar was Panel Moderator. All the speakers unanimously agreed on the fact that they look into the candidate are his / her actual technical ability, awareness of the industry demands and the attitude towards working, but not the marks obtained. The day 2 was full of activities in the campus with parallel tutorials tracks, paper presentation competition and mini project competition. Tutorial focusing on the programming the mobile based applications on Android OS “androidology” was conducted by Mr. Jaydeep Wagh. At the same time Mr. Prashant Bhatwadekar from Persistent System Ltd. Introduced audience with new area of Business Intelligence. It was followed by a case study of sentiment analysis of a very popular reality show on TV. The sessions were thoroughly enjoyed by students from various colleges from Pune. The tracks received overwhelming response from students’ community. Both the tracks were full with the auditorium capacity i.e. 188 and 205 respectively from 25 different colleges in and around Pune. The mini project competition was a platform for third and second year students to show case their team work, presentation skills along with the basics imbibed in previous year. Usually the mini projects are part of the curriculum and it was a sincere try to provide them a dais to put forth their idea. 18 groups from various colleges actually selected for the same. Paper presentation competition was carried out in parallel tracks. It included the papers from the areas like Social networking / internet Life, Animation and Multimedia, Biometrics / Internet Security. The paper were selected from the abstracts sent by students and actually 30 papers were presented in theses domains. There was a technical quiz conducted by an industry quiz master in various rounds by Mr. Avaneendra Bhargav. This was enjoyed thoroughly by participants as well as audience. The convention was waved off with a valedictory session. Winners were given attractive cash as well as gifts from sponsors. In all more than 500 students attended in the convention. The convention activities were planned and implemented by the Organizing Committee consisting of Mrs. Aparna Hajare, SBC, Mrs. Madhuri Tasgaonkar, SBC, Mrs. Rakhi Dongaonkar, A.P., Cummins College of Engineering for Women. The finance committee consisting of Mr. Rahul Pore, Hon. Treasurer, Computer Society of India – Pune Chapter and Mrs. Vaishali Salgar, SBC, Cummins College of Engineering for Women, Pune provided absolute support to manage event activities. The tutorials on recent industry trends combined the theory knowledge with some demonstrations, live programming snippets or case study, not only added the knowledge but also gave the students the insight of industry demands. Various competitions provided them a fair stage to showcase technical as well as presentation abilities. It was a sincere and honest attempt to bridge the gap between industry and academics. CSI Communications | January 2013 | 37 CSI SERVICE AWARD WINNERS FOR 2011-12 Chapter Patron Awards Best Regional Chapter Awards S. No. Nominee Chapter 1. Dr. A K Saini Delhi 2. Dr. Tarun Kumar De Kolkata 3. Ms. Alakananda Rao 4. 5. S. No. Region Category Chapter 1. Region I Category - B Chandigarh Kolkata 2. Region I Category - C Dehradun Mr. Dholakia Ghanshyam Gulabra Ahmedabad 3. Region II Category – A Kolkata Mr. Arun Kumar Bhilai 4. Region III Category – B Ahmedabad 6. Mr. Rajesh Kumar Vijayavergia Ranchi 7. Sri V K Garg Rourkela 5. Region III Category – C Udaipur Bangalore 6. Region IV Category – C Ranchi 7. Region IV Category – C Bhilai 8. Region V Category – A Bangalore 8. Mr. Ashok S Kololgi 9. Prof. K Raja Sekhar Koneru 10. G Siva Nageswara Rao Vijayawada 11. Shri Paramata Satyanarayana Vishakhapatnam 12. Mr. Sanjay V Kulkarni Aurangabad 9. Region V Category - A Vishakhapatnam 13. Shri Ramrao Wagh Goa 10. Region VI Category – A Mumbai 14. Srinivas Eranki Mumbai 15. Mr. Anurag Ashok Kenge Nashik 11. Region VI Category – A Pune 16. Mr. Ashok Pawar Pune 12. Region VI Category – C Nashik 17. Mr. Jayaramakrishnan K Chennai 13. Region VII Category – A Chennai 18. Mr. N Raveendran Coimbatore 14. Region VII Category – C Cochin 19. Mr. Mohapatra Biranchi Narayan Cuttack 20. Mr. Gautam Mahapatra Hyderabad 15. Region VII Category – B Coimbatore 21. Mr. Devesh Kumar Dwivedi Allahabad Best National Chapter: Bangalore Life Time Achievement Award Prof. H N Mahabala Prof. PVS Rao Dr. N Vittal Fellowship Prof. Pradeep Pendse Prof. Rajeev Sangal Dr. Pankaj Jalote Prof. R K Shyamasundar Mr. Sibsankar Daspal Dr. Dinkar S Rane CSI Patron Award on National Level Sri. Ravi Saxena Significant Contribution at National Level Dr. Dharam Singh Ms. Awantika Varma Mr. Vijaya Sekhar KS Dr. M A Maluk Mohamed Mr. T Sabhapati For more details of CSI Service Awards Winner, Kindly visit http://www.csi-india.org/web/csi/ CSI Communications | January 2013 | 38 www.csi-india.org Computer Society of India TM About YITP Awards: The National competition for young IT professionals is an event conducted annually instituted by CSI in the year 1999 to encourage Researchers, IT Professionals, Academicians, Consultants, Entrepreneurs and IT Practitioners in an Organization or as individuals in service/ support/ training function in the field of Information Technology. Themes: Hardware. Software, Application, Communications and Education & Research Awards Comprise of: Trophy and Certificate to winning team/individual and prize as under: Category Winner 1st runner up Special mention National Awards Regional YITP award (For each region) ` 50,000/` 25,000/` 15,000/- ` 25,000/` 15,000/` 10,000/- The winners of the regional contest will qualify for competing in the final national round. Host Chapters for Regional Contest Regional Round will be held at Region-I DELHI Region-II KOLKATA Region-III Territory Regional YITP Conveners Delhi, Punjab, Haryana, Himachal Pradesh, Jammu & Kashmir, Uttar Pradesh, Uttaranchal and other areas in Northern India Assam, Bihar, West Bengal, North Eastern States and other areas in East and North-East India Gujarat, Madhya Pradesh, Rajasthan and other areas in Western India AHMEDABAD Region-IV BHILAI Region-V Jharkhand, Chhattisgarh, Orissa and other areas in Central & South Eastern India Karnataka and Andhra Pradesh BANGALORE Region-VI Maharashtra and Goa NASHIK Region-VII Tamil Nadu, Pondicherry, Andaman and Nicobar, Kerala, Lakshadweep CHENNAI Prof. M N Hoda Mob: 09212022066 Email: [email protected] Mr. Deva Prasanna Sinha Mob: 09830129551 Email: [email protected] Mr. Sanjay Parikh Mob: 09376152193 Email: [email protected] Mrs. Ranjana Muley Mob: 09407982385 Email: [email protected] Mr. Bindhumadhava Mob: 09844253414 Email: [email protected] Mr. Prashant Patil Mob: 09545453233 Email: [email protected] Dr. R M Suresh Mob: 09444285519 Email: [email protected] Last Date of Application Regional Round on 15/01/2013 16/02/2013 31/12/2012 19/01/2013 28/01/2013 09/02/2013 15/01/2013 02/02/2013 08/02/2013 22/02/2013 20/01/2013 07/02/2013 18/01/2013 25/02/2013 The National round will be hosted by CSI, Coimbatore Chapter at PSG College of Technology, Coimbatore, Tamil Nadu on CSI Foundation Day - 6th March 2013. CSI National Young IT Professional Award will be presented on the same day. National Round Patron : Dr. R Nadarajan, PSG College of Technology, Coimbatore Event coordinator : Mr. N Valliappan, Secretary, CSI Coimbatore Chapter (Mob: 09842231307) How to apply Nominations should be made in the prescribed format available on the CSI-website: http://www.csi-india.org/web/csi/yitpawards2012 or http://www.csi-india.org/yitpawards2012 on or before the last date of submission for the specific region to the Regional Convener. Bipin Mehta Convener, CSI Young IT Professional Awards Parmata Satyanarayana Co-Convener, CSI Young IT Professional Awards MD Agrawal Chairman, CSI Awards Committee CSI Communications | January 2013 | 39 Begin the New Year with a new perspective on Emerging Technologies CSI-IT2020 IT2020 SECURITY -- MOBILITY SOCIAL MEDIA -- BIG DATA TOPIC: Making Emerging Technologies a Boardroom Agenda VENUE: Victor Menezes Convention Centre, Indian Institute of Technology, Bombay st DATE: 1 February 2013 EVENT HIGHLIGHTS • Insights of world renowned speakers in 4 tracks • Focus on Big Data, Social Media, Security and Mobility • High Power CIO Summit • CIO Conclave: By Invitation Only • Participation of key organisations & CSI partners • Experience spoken Tutorials of IIT Bombay • Eminent academician: Prof. D B Phatak on webinar from US • Knowledge Partner: KPMG VENUE Victor Menezes Convention Centre, IITB, Mumbai KEY TRACKS NEW PARADIGMS IN :SECURITY • How can virtual business processes be built enabling stakeholders to do seamless business? Track Chair: B. Swaminathan, Director, Deloitte Touche Tohmatsu India Pvt. Ltd. MOBILITY 1. How can mobile devices be secured against threat? 2. How can this help customer engagement and employee productivity to improve. Track Chair: Lalit Sawhney, Director, Lalit Sawhney and Associates SOCIAL MEDIA 1. What value addition could Social Media add to the company? 2. How can this help organisations earn business and improve performance? Track Chair: Harish Tibrewala, Social Media Strategist, Business Owner & Jt. CEO at Social Wavelength.Com BIG DATA 1. What is the value in Big Data that can be exploited with experimentation and exploration? 2. How can Big Data be used as an opportunity for insights in voluminous data forms soaring beyond historical record keeping? Track Chair: Sanjay Lulla, Associate Director, Sales West, IBM Making Emerging Technologies a Boardroom Agenda DELEGATE PROFILE • CxOs, CIO Top Management • Senior Business Strategists • Professionals from MNCs • IT Managers • Academicians, Analysts and Researchers • Entrepreneurs and Investors Knowledge Partner REGISTRATION FEES CSI Members Non CSI Members Students Academicians : : : : INR 2,500 INR 3,500 INR 500 INR 1,500 EARLY BIRD DISCOUNT BEFORE 15 JANUARY 2013 CSI Members : INR 1,750 Non CSI Members : INR 3,000 Academicians : INR 1,000 IT2020 CONFERENCE SECRETARIAT CSI Mumbai Chapter, IT2020 Secretariat, Unit III, Flr IV, Samruddhi Venture Park, MIDC, Andheri East, Mumbai 400 093. CONTACT NUMBERS +91-22-28235476 +91-22-28235548 Telefax: +91-22-28235546 GROUP DISCOUNT FOR ORGANISATIONS ONLY 5 and more participants from the same organisation get a 10% discount REGISTRATION ENQUIRY [email protected] PARTNERSHIP ENQUIRY [email protected] Participate in the Emerging Technologies Survey, created by our knowledge partner KPMG. Log on to our website, www.csimumbai.org/it2020/ to take the survey. Results out on 1st February 2013 LOG ON TO www.csimumbai.org/it2020/ TO KNOW MORE AND REGISTER NOW CSI Communications | January 2013 | 40 www.csi-india.org CSI News From CSI Chapters » Please check detailed news at: http://www.csi-india.org/web/csi/chapternews-January2013 SPEAKER(S) TOPIC AND GIST BHOPAL (REGION III) 6 December 2012: A general meet of CSI and release of a research book Dr. R K Datta A general meet was organized. There were many eminent personalities present including Dr. R K Datta, Professor V P Saxena, Mr. Vivek Dhawan, and Dr. K R Pardasani. A research book on ‘Engineering Management & Pharmaceutical Science’ was unveiled by the eminent guest. Í While releasing of a research book GWALIOR (REGION III) Director DRDE Gwalior, AC Pandey, Suryanarayana, and Er. Sushil Batham Dr. MVS 1 December 2012: 16th Computer Quiz Chapter organized 16th computer quiz. Rishi Galav Public school won the first prize, Army public school secured 2nd position. Director DRDE Gwalior was the chief guest for this event, Convener of the quiz was CSI member AC Pandey. Dr. MVS Suryanarayana addressed the audience. Chief guest distributed the prizes and certificates to the winners and the participants respectively. Í Chief Guest distribuƟng the prizes ROURKELA (REGION IV) Mr. S K Panigrahi, Mr. N Suresh Kumar, Mr. A K Dash, 25 November 2012: CSI Quiz and Elocution-2012 Competitions for School Students and their team Chapter organized quiz and elocution competitions for school students of classes-IX and X around Rourkela. Topics covered were Computer Hardware, Programming Basics, Networking, Database and Who is Who in Computer Industry. The topic for elocution competition was “IT for the underprivileged mass”. 28 students of Class-VII and VIII from 14 schools participated in the competition. Í The students parƟcipaƟng in the compeƟƟons Shri Dipankar Basu, Sri P K Padhi, Sri N Suresh Kumar, Mr. S 16 December 2012: Ceremony of “Prize Distribution of CSI Quiz and K Panigrahi, Mr. A K Dash, Smt B Mohanty, and Sri V P Arya Elocution-2012 Competitions” Shri Dipankar Basu graced the occasion as Chief Guest and presented the Quiz and Elocution Awards to students. All the Prize winning students were given a Certificate, Memento and a Bag. Sri P K Padhi, was the Guest of Honour and handed over the CSI Service Awards. Í Prize distribuƟon and winning team BANGALORE (REGION V) Mr. Suresh Thiagarajan 1 December 2012: One-day Workshop on “Software Configuration Management (SCM)” SCM is critical in ensuring integrity of software work products. Workshop started with basic concepts of configurable item identification, naming convention, establishing folder structure and controlling their access. Handson session using SVN-Tortoise tools was conducted for understanding features like repository creation, folder / file uploads, checking out, commit, multiple commit & conflict resolution, branching, tagging and merging. Other topics covered were concepts on CM planning, CM audits, CM status accounting and CM related metrics with related exercises. Í Faculty members and parƟcipants in workshop CSII Co CS Communications omm m un u ic i at a io ons n | Ja January Janu nuar nu ary ar y2 201 2013 013 01 3 | 41 SPEAKER(S) TOPIC AND GIST HYDERABAD (REGION V) Dr. A Govarthan, Muralidhar, Sh. Ramesh Loganathan, Sh. Atul Negi, Dr. L Pratap Reddy, and Dr. Srineevas 14 December 2012: One-day Workshop on “Open Source Technologies – The Present Scenario” Topics covered were - Introduction to Open Source software, FOSS Advantages, FOSS trends and initiatives in C-DAC, FOSS in Mobile Technologies, Implementation of Video Streaming using Open source tools, Latest open source technologies and applications like CMS, LMS etc., Demonstration of BOSS GNU/Linux and its compatibility with commercial software and Security in Open Source software. Í (L to R): Dr. A Govarthan, Muralidhar, Sh. Ramesh Loganathan, Sh. Atul Negi, Dr. L Pratap Reddy, and Dr. Srineevas VISHAKHAPATNAM (REGION V) Prof. Raj Kumar Buyya 13 December 2012: One-day Workshop on “Introduction to Cloud Computing” Dr. Raj Kumar Buyya enlightened the participants on Cloud Computing and spoke on topics on recent advances in parallel and distributed computing, Cloud Architectures, cloud computing platforms and cloud computing case studies using Aneka Platform. Various aspects of cloud computing were explained along with details on how to install cloud environment at lab. Demonstration on cloud computing with effective improvement in response efficiency was conducted. Í Speaker conducƟng the workshop COIMBATORE (REGION VII) Arun Sundararaman 2 November 2012: Lecture on “Business Analytics - Recent Trends and Industry Expectations” Mr. Arun delivered the lecture with special focus on Healthcare and Manufacturing. The central theme of the lecture was around how the Information Management paradigm is changing from the relatively “simple” Enterprise Data Management world to the emerging “complex” era of Business Analytics. In short, key for successful corporate practices in leveraging potential of business analytics lies in generating differentiated and actionable insights and building appropriate algorithms. Í Arun Sundararaman during the lecture COIMBATORE (REGION VII) Dr. Harjinder Singh Lallie 29 November 2012: Lecture on “The Changing Cyber Security Landscape” Dr. Lallie started with research trends in analytics related to cyber security and analysis of cyber crimes. He explained how analytics was used in analyzing and eliminating less critical entities and how to narrow down to identify critical entities crucial to the case. He dealt with further developments in areas of Cyber security and cyber crimes that are posing challenges to many countries and governments, than the corporates. He also highlighted the opportunities for the professionals and corporates. Í Dr. Harjinder Singh Lallie during the lecture TRIVANDRUM (REGION VII) Chapter in association with Zyxware Technologies 17 November 2012: One-day Hands on Workshop on “Introduction to HTML5” The workshop provided a complete introduction to HTML5. The content included - how to build HTML5 pages, understanding differences between HTML5 and HTML4, using new semantic elements and attributes of HTML5, working with audio and video in HTML5, working with new Canvas element to create code-based drawings in HTML5, using Web Storage for offline applications, using new HTML5 form elements, understanding current state of browser support for HTML5 and how to make HTML5 sites degrade gracefully. Programming exercises were used to reinforce the learning. Í CSII Co CS Comm Communications mmun mm unic un ic cat atio ions nss | Ja January anu uarr y 2 2013 013 01 3 | 42 ParƟcipants during HTML5 workshop www. ww w.cs w. csics i-in indi in dia di a.or a.or org g www.csi-india.org From Student Branches » http://www.csi-india.org/web/csi/chapternews-January2013 SPEAKER(S) TOPIC AND GIST MODEL INSTITUTE OF ENGINEERING & TECHNOLOGY (MIET), JAMMU (REGION-I) Prof. Ankur Gupta, Prof. S K Sharma, Mr. Aijaz Qaiser, and Prof. Salim Raza Qureshi 2 December 2012: Celebration of the "World Computer Literacy Day" Prof. Ankur Gupta highlighted the need of computer literacy for underprivileged socio-economic section of the country. Prof. S K Sharma also stressed on the idea to initiate computer literacy mission in the state. Mr. Aijaz Qaiser applauded the efforts made by the college. Prof. Salim Raza Qureshi explained how this initiative which has been taken by the college. Í ParƟcipants aƩending the event BHARATI VIDYAPEETH'S INSTITUTE OF COMPUTER APPLICATIONS & MANAGEMENT, NEW DELHI (REGION-I) Prof. M N Hoda, Mr. N K Gupta, and Prof. Moin Uddin 24-25 November 2012: Two-days Faculty Development Programme (FDP) Prof. Hoda emphasized that 21st century teaching learning system will be based on learners’ pull rather than teachers’ push strategy. Mr. Gupta introduced ISTE and highlighted its significance for professional growth of technical faculty members. Prof. Uddin opined that teachers’ growth will be based on quality research. There were sessions on concepts like - Activity Oriented Learning, Intelligent Pedagogies for Computer Science Teaching, Problem and Project Based Learning, Challenges and Opportunities for 21st Century Teaching Learning System etc. Í FDP: A group photograph ACROPOLIS INSTITUTE OF TECHNOLOGY AND RESEARCH (AITR), INDORE (REGION-III) NGO Asra Samajik Lok Kalyan Samiti, Dewas 11 August 2012: Awareness Program on “Child Education, Corruption and Girl Infanticide” With association of NGO Asra Samajik Lok Kalayan Samiti awareness program was organized to guide villagers about corruption by playing certain nukkad natak in front of them. The event encouraged people to give education to their children and fight against corruption & girls infanticide. Í EMC2 persons Awareness Program on educaƟon, corrupƟon and girl infanƟcide 14 September 2012: A Technical Event on Cloud and Big Data “Epistemology 2012” Event of EPISTEMOLOGY 2012 was organized with EMC2 to update with latest technology in IT industry. Experts shared their views on new technology and explained how it is a good platform for students to showcase their talent. Events like Online Quiz, Paper Presentation, Poster Presentation, Expert Talk were part of the program. Í Online Exam for Quiz 14 September 2012: Technical Competition on “C language” Technical Competition was organized on C language for students of BE and MCA. The Aim of this event was to prepare the students for the placement. Í WriƩen Test and Online Test CSII Co CS Communications omm m un u ic icat a io at ons n | Ja January Janu n ar nu ary y2 2013 013 01 3 | 43 SPEAKER(S) TOPIC AND GIST ACROPOLIS INSTITUTE OF TECHNOLOGY AND RESEARCH (AITR), INDORE (REGION-III) Rakshit Tandon, Manish Nahar 3 October 2012: Expert Talk on “Surf Safe” and on “i-phone Technology” The programme aimed at teaching youngsters how to use the Internet, while educating them to be safe, smart and responsible users. Expert talk on “i-phone Technology” by Manish Nahar was also organized. The aim of this event was to explain i-phone technology and recent trends, research approach in this field. Í Expert Talk By Mr. Manish Nahar GODAVARI INSTITUTE OF ENGINEERING AND TECHNOLOGY, (GIET), RAJAHMUNDRY, AP (REGION-V) Shri Suman Das, Mr. Chandrasekhar Ramshetti, and Santosh Kumar G 15–16 December 2012: CSI Prasthan 2K12 A National level Student Technical Fest – “Information Security and Cloud Computing” The program was focused on students of various engineering colleges. Around 300 participants participated in this event. There were events like technical paper presentation, poster presentation, brain drain, quiz and many other spot events. On this occasion, workshop on cloud computing by Mr. Chandrasekhar Ramshetti and on Information Security by Santosh Kumar were also organized. Í Dr. D L N Raju lightning the lamp, Mr. Suman Das, Dr. S Maruthuperumal, and Dr. L S Gupta are looking on the inauguraƟon event ALL INDIA SHRI SHIVAJI MEMORIAL SOCIETY’S COLLEGE OF ENGINEERING, (AISSMS), PUNE (REGION-VI) Mrs. M V Kadam, Ms. J P Asabe, Mr. A M Jagtap, Mrs. M A Pradhan, and Dr. S P Danao 1-2 December 2012: Awards Won in National Convention of CSI at Kolkata The Student Branch has won following awards - Best Student Branch Award in Region VI (Maharashtra & Goa), International Paper Presenter Award Prof. Mrs. M A Pradhan and Highest Committed Student Branch Activist Awar - Ms. Shruti Sayal. Í Head of Department Prof. M A Pradhan with CSI Coordinators DR. NGP INSTITUTE OF TECHNOLOGY, COIMBATORE (REGION-VII) Mr. Guruprasad Vijayarao, Ms. Swapna Akula, and Ms. Divya Khandelwal 21 September 2012: National Level Workshop on Windows Azure The workshop explained basic concepts of cloud platform using database connectivity with SQL. Both theory and Hands-on sessions were conducted by pioneers in the field of cloud computing using Windows Azure. Mr. Vijayarao spoke about What is Cloud Computing, Introduction to Azure, How it is different, Azure Roles, Storage and Application Fabric. Ms. Khandelwal conducted hands-on Lab-Upload - a simple application using Azure. Ms. Akula talked about SQL Azure. Í Faculty member conducƟng the workshop EINSTEIN COLLEGE OF ENGINEERING, TIRUNELVELI, TN (REGION-VII) Mr. D Sai Satheesh, Dr. AVS Prasad, and Prof. V Muniraju Naidu 2 November 2012: Quiz titled "Einstein Quiz 12" Einstein quiz 12 was organized for first year students. More than 100 students participated in the Knock out round for the quiz. Top 15 from the 100 were selected and 5 groups with 3 members each were formed. The winners are First prize Kavitha P., Ullagammal Suganya and Bhavathachayini. Í CSII Co CS Comm Communications mmun mm unic un ic cat atio ions nss | Ja January anu uarr y 2 2013 013 01 3 | 44 Knock out round during Quiz 12 www. ww w.cs w. csics i-in indi in dia di a.or a.or org g www.csi-india.org SPEAKER(S) TOPIC AND GIST JAMAL MOHAMED COLLEGE, TIRUCHIRAPPALLI (REGION-VII) Dr. A Zameer Pasha, Prof. G Ravi, Dr. R Khader Mohideen, Dr. A K Khaja Nazeemudeen and Mr. N Hyder Ali, Dr. M Maluk Mohamed, Dr. T Abdul Razak, Mr. M Ahamed Hussain and R Khader Mohideen 10-11 October 2012: Intercollegiate Technical Symposium “SWAP 2K12” Various events such as Animation, Debugging, Extempore, IT Marketing, Online Event, Quiz, Stress Management, Surprise Event, Short Film, Treasure Hunt, Web Design and Word Hunt were conducted. The overall championship was bagged by the students of Christ College of Engineering & Technology, Pondicherry. Í Dr. M A Maluk Mohamed, giving away the overall championship to the students of Christ College of Engineering & Technology, Pondicherry KONGU ENGINEERING COLLEGE (KEC), PERUNDURAI, TN (REGION-VII) 7 September 2012: An Inter-departmental Technical Symposium “NAEVUS’12” The program started off with C-Debugging in CC1 followed by Paper Presentation and Idea Presentation in ITP-S03. Parallel event photography was also conducted. This was followed by GOOGLE Mania. Other events were started with Quiz programme. It was continued with Marketing and then followed by Team Zappers. NAEVUS’12 provided a platform students to showcase their talent and technical skills as well as managerial skills. Í A snapshot on NAEVUS’12- interdepartmental Technical Symposium MOUNT ZION COLLEGE OF ENGINEERING AND TECHNOLOGY, PUDUKKIOTTAI, TAMILNADU (REGION-VII) Mr. K Somasundram 27 August 2012: Guest Lecture on “Visual Programming” Mr. K Somasundram gave lecture about Fundamentals of Visual Programming and its Techniques. He explained topics such as - MFC Library, Active X, COM and DCOM. Í Dr. A Vadivel ParƟcipants aƩending Lecture on “Visual Programming” 29 August 2012: Guest Lecture on “Internet Computing” Dr. A Vadivel gave lecture about Server Side Programming. He explained concepts such as XML, SOAP and Web Services. Í Ms. N Anathalakshmi Faculty Member and students during lecture on “Internet CompuƟng” 3-7 October 2012: Five-days Workshop on “Network Simulator-2” Ms. N Anathalakshmi gave training about NS2, Routing Protocols and NS2 Programming. Í Faculty Member conducƟng workshop CSII Co CS Communications omm m un u ic icat a io at ons n | Ja January Janu n ar nu ary y2 2013 013 01 3 | 45 SPEAKER(S) TOPIC AND GIST NARASU'S SARATHY INSTITUTE OF TECHNOLOGY (NSIT), POOSARIPATTY, SALEM (REGION-VII) Mr. Abdul Kareem 22 September 2012: One-day Workshop on “PC troubleshooting & Hardware Assembly” The Project Manager of RAK Technologies Mr. Abdul Kareem highlighted the basic components of a PC and the process of assembling them. He also delivered his ideas on overlocking and secrets of improving performance. Í Dignitaries on dais S.A. ENGINEERING COLLEGE, CHENNAI (REGION-VII) Mr. Y Kathiresan November 2012: Guest Lecture on "CSI Awareness Program" Department of MCA organized the CSI awareness program for First year students of CSE, IT and MCA to explain the benefits of CSI membership. Mr. Y. Kathiresan explained the benefits of becoming CSI Member and motivated students to become members of CSI. Í Dr. S Suyambazhahan, S A Engineering college, Dr. Viji Rajesh, Mr. Y Kathiresan, and Sr. Manager and Taramani SREE NARAYANA GURUKULAM COLLEGE OF ENGINEERING (SNGCE), ERNAKULAM, KERALA (REGION-VII) Dr. M V Rajesh 20 September 2012: Guest lecture on “Artificial Neural Networks (ANN) and its Applications” The objective was to provide information on ANN and where it is applied. Dr Rajesh said that an artificial neural network is an interconnected group of nodes just like network of neurons in the human brain. Later he spoke on linear separability and XOR problem and explained various layers viz.- input layer, hidden layer and output layer. Students learnt about supervised training and unsupervised training, feed forward networks, back propagation etc. and the applications of neural network that include character recognition, data compression, pattern recognition, signal processing, language processing etc. Í InauguraƟon by Dr. M V Rajesh VELAMMAL INSTITUTE OF TECHNOLOGY, CHENNAI (REGION-VII) 21 August 2012: Intra-college Paper Presentation Event “CARTE BLANCHE” Student Chapter organized an inter-department Paper Presentation event “CARTE BLANCHE” for II and III year students to improve their Presentation skills and to create an awareness on latest trends. Best three papers were selected from the presentation & were awarded. Í Students aƩending Paper PresentaƟon event 8 October 2012: Online Coding and Debugging Event Online coding and debugging competition was conducted through the software created by final year students. Based on the first round results, top ten performers were selected for the next round. In this phase, coding knowledge was verified by analyzing piece of code in C program. Finally, top three teams were selected & awarded. Í CSII Co CS Comm Communications mmun mm unic un ic cat atio ions nss | Ja January anu uarr y 2 2013 013 01 3 | 46 ParƟcipants aƩending on line Coding and Debugging Event www. ww w.cs w. csics i-in indi in dia di a.or a.or org g www.csi-india.org Following new student branches were opened as mentioned below: – REGION V HKBK College of Engineering, Bangalore The inauguration of student branch began with qirat and lighting of lamp on 25th August, 2012. The Chief Guest Mr. Vishwas Bondade gave keynote address. It was followed by a Technical Symposium with four events – such as Technical Quiz, Code Debugging, Programming, and Technical Pick & Speak. Regency Institute of Technology (RIT), Adavipolam, Yanam, AP Regency Institute of Technology inaugurated CSI student branch on 15th September 2012, in the presence of Dr. P Kumar Babu, Dr. A Rama Krishna Rao, Prof. S T V S Kumar, Mr. B Venkata Ramana, Mr. B Sateesh Kumar and other delegates. The inaugural function was followed by a technical seminar on "Recent Trends in Software industry" by Mr. B Venkata Ramana. Further a guest lecture on "Software Testing" was given by Mr. B Sateesh Kumar. Lightning the lamp by dignitaries, HKBKCE-CSI Students Branch Inauguration 2012. The Dignitaries on the dais from L to R: Dr. T C Manjunath, Mr. Abdul Hameed S A, Mr. Vishwas B, Mr. Prakash, and Mr. Faiz Yanam: Dr. A Rama Krishna Rao, Dean RIT, Welcoming the guests on the Inauguration of the Student branch REGION VI Manoharbhai Patel institute of Engineering and Technology (MIET), Gondia Inauguration of Student Branch at MIET was organized on 16th October 2012. Guest of honor was Mr. Vinod Verma, DGM - IT Systems - Adani Power. Special guest Mrs. Gayatri Soni talked about cyber crime and about safe and secure practices students should follow while working on Internet. Along with inauguration Garba - Dandia event was also organized. Program of Computer Tricks included Shobhit Katiyar and Lun, such as treasure hunt, computer quiz, graphity, and extempore. Guests on stage for Inauguration at MIET, Gondia REGION VII Einstein College of Engineering, Tirunelveli, TN The CSI student branch was inaugurated on 16th October 2012, in the presence of Mr. Y Kathiresan, Prof. A Ezhilvanan, Dr. K Ramar, Prof. R Velayutham & Prof. M Suresh Thangakrishnan. Mr. Kathiresan explained the benefits & use of CSI membership. Also he conducted a session on “Your Unique Identity”. Mr. Y Kathiresan, Prof. A Ezhilvanan, Dr. K Ramar, Prof. R Velayutham & Prof. M Suresh Thangakrishnan SASTRA University, Srinivasa Ramanujan Center (Sastra-SRC), Kumbhakonam, TN The inaugural function of CSI student branch in Sastra-SRC was held on 12th September 2012. It was graced by resource person Mr. Kathiresan. He delivered inaugural address and gave a lecture on “Your Unique Identity”. Nehru College of Engineering And Research Centre, (NCERC), Kerala The inauguration of CSI-Student branch took place on 6th December 2012, and Prof. Prashant R Nair was the Chief Guest. About 150 students of UG and PG in CSE and IT Departments participated in the function. Prof. Prashant Spoke on “Importance of CSI in IT sector”. SNS College of Engineering Coimbatore The CSI student branch was inaugurated on 6th October 2012, by Mr. R. Mahalingam. Two presentations were projected on the topics, “Inauguration of CSI student Branch” and “What is CSI?” Dr. C. Vivekanandan gave a speech about growing trends in technology and the need for students to take them up seriously. Inauguration of Student Branch at NCERC, Kerala Guests on stage Vivekanandha Engineering College for Women, Sankari Student Chapter inauguration was held on 29th October 2012. Dr. V Krishnakumar, Principal, welcomed the gathering. The chief guest Mr. L Venkatesan enlightened the students on how to use student chapter. Inspiring speech by Mr. L Venkatesan chief guest On the Dias R to L: Prof. Mohanraj, Dr. V Krishnakumar and Ms. D Sathya CSII Co CS Communications omm m un u ic i at a io ons n | Ja January Janu nuar nu ary ar y2 201 2013 013 01 3 | 47 COMNET-2013 National Conference on Computer Communication and Networks Theme: Data Communication and Networking for Inclusive Growth (March 21-22, 2013) Jointly Organized by: SIG-WNs, Division IV CSI, CSI Trivandrum Chapter and Sarabhai Institute of Science and Technology, Trivandrum, Kerala (India) Announcement and Call for Papers Computer Society of India - National Conference on Communication and Networks (CoMNeT) 2013 with the theme: "Data Communication and Networking for Inclusive Growth" provides an open forum for researchers, engineers, network planners and service providers targeted on newly emerging algorithms, communication systems, network standards, services, and applications, bringing together leading players in Computer Communication and Networks. Instruction for Authors Authors are requested to submit full papers in IEEE format describing their original, unpublished, research contribution which is not currently under review by another conference or journal Important Dates: Submission of Full Paper 6th February, 2013 Paper Acceptance Notification 20th February, 2013 Detailed guidelines are available at: www.comnet2013.in Prof (Dr) C.G Sukumaran Nair Chair-Programme Committee CSI-COMNET-2013 Email : [email protected] CSI Membership = 360° Knowledge WE INVITE YOU TO JOIN Your membership in CSI provides instant access to key career / business building resources - Knowledge, Networking, Opportunities. Computer Society of India CSI provides you with 360° coverage for your Technology goals Join us India's largest technical professional association and become a member Learn more at www.csi-india.org I am interested in the work of CSI . Please send me information on how to become an individual/institutional* member Name ______________________________________ Position held_______________________ Address______________________________________________________________________ ______________________________________________________________________ City ____________Postal Code _____________ Telephone: _______________ Mobile:_______________ Fax:_______________ Email:_______________________ *[Delete whichever is not applicable] Interested in joining CSI? Please send your details in the above format on the following email address. [email protected] CSI Communications | January 2013 | 48 www.csi-india.org CSI Calendar 2013 Date Prof. S V Raghavan Vice President & Chair, Conference Committee, CSI Event Details & Organizers Contact Information January 2013 Events 21 Jan. 2013 Hands on Workshop on Advanced Excel CSI Mumbai Chapter at Mumbai Harshvardhan Mane, [email protected] / [email protected] 23-24 Jan. 2013 8th National Conference of IT for Defence on “Role of Information Technology for Defence Modernization NIMHANS Convention Centre, Bangalore Dr. C R Chakravarthy, [email protected] Mr. H C Sridhar [email protected] 24-27 Jan. 2013 Workshop on Project Management (PMBOK Guide Version 4.0) CSI Mumbai Chapter at Mumbai Harshvardhan Mane [email protected] / [email protected] 29-31 Jan. 2013 International Conference on Reliability Infocom Technologies and Optimization (Trends and Future Directions) Amity Institute of Information Technology Amity University CSI and IEEE Prof. Sunil Kumar Khatri [email protected] 31 Jan. 2013 Workshop on Software Effort Estimation using FPA Method, Mumbai Venue : CSI Mumbai Chapter Harshvardhan Mane [email protected] / [email protected] February 2013 Events 1 Feb. 2013 IT2020 - Making Emerging Technologies a Board Room Agenda The Lalit Hotel Harshvardhan Mane [email protected] / [email protected] 1-2 Feb. 2013 A Southern Regional Conference on Innovation in Information Technology Vizag 2012-13 Computer Society of India Visakhapatnam Chapter Suman Das [email protected] 2 Feb. 2013 Regional Round Contest of Young IT Professional (YITP) Awards- Region-IV CSI Bhilai Chapter Mrs. Ranjana Muley [email protected] 7 Feb. 2013 Regional Round Contest of Young IT Professional (YITP) Awards- Region-VI CSI Nashik Chapter Mr. Prashant Patil [email protected] 8-9 Feb. 2013 Regional Conference of Region-VI on ‘NexGen Computing’ CSI Nashik Chapter Mr. C B Dahale [email protected] 9 Feb. 2013 Regional Round Contest of Young IT Professional (YITP) Awards- Region-III CSI Ahmadabad Chapter Mr. Sanjay Parikh [email protected] 16 Feb. 2013 Regional Round Contest of Young IT Professional (YITP) Awards- Region-I Bharati Vidyapeeth's Institute of Computer Applications and Management (BVICAM) New Delhi and CSI Prof. M N Hoda [email protected] 19-20 Feb. 2013 International Conference on Advance Computing and Creating Entrepreneurs (ACCE2013) SIG-WNs DivIV and Udaipur Chapter CSI and GITS Udaipur http://www.acce2013.gits.ac.in/ Dr. Dharm Singh, [email protected] Sanjay Mohapatra, [email protected] Ms. Ridhima Khamesra, [email protected] 22 Feb. 2013 Regional Round Contest of Young IT Professional (YITP) Awards- Region-V CSI Bangalore Chapter Mr. Bindhumadhava [email protected] 25 Feb. 2013 Regional Round Contest of Young IT Professional (YITP) Awards- Region-VII CSI Chennai Chapter Dr. R M Suresh [email protected] March 2013 Events 6 March 2013 National Round Contest of Young IT Professional (YITP) Awards CSI Coimbatore Chapter at PSG College of Technology, Coimbatore, Tamil Nadu Mr. N Valliappan [email protected] 6–7 March 2013 INDIACom – 2013; 7th Nation Conference on “Computing for Nation Development” Bharati Vidyapeeth's Institute of Computer Applications and Management (BVICAM) New Delhi CSI IEEE ISTE IETE IE (I) Prof. M N Hoda [email protected] 8 March 2013 NSC – 2013; 6th National Students’ Convention on “Computing for Nation Development” Bharati Vidyapeeth's Institute of Computer Applications and Management (BVICAM) New Delhi CSIISTE IETE IE (I) Mrs. Parul Arora [email protected] 9-10 March 2013 International Conference on Information Systems and Computer Networks (ISCON-2013) CSI Mathura Chapter Division IV & Region-I at GLA University Mathura www.gla.ac.in/iscon2013 Dr. Dilip Kumar Sharma [email protected] 9-10 March 2013 IEEE ISCON 2013; 1st IEEE International Conference on Information Systems and Computer Networks IEEE UP Section India, Division IV, Region-I & CSI Mathura Chapter at GLA University Mathura, India www.gla.ac.in/ISCON2013 Dr. Dilip Kumar Sharma, [email protected] Sanjay Mohapatra, [email protected] Prof. R K Vyas, [email protected] 21-22 March 2013 National Conference on Communication and Networking for Inclusive Growth CSI DIV IV (Communications) & CSI Trivandrum Chapter Sarabhai Institute of Science and Technology, Trivandrum http://www.csitvm.org Dr. C G Sukumaran Nair [email protected] Mr. Biju Varghese, [email protected] Sanjay Mohapatra, [email protected] Please send your event news to [email protected] . Low resolution photos and news without gist will not be published. Please send only 1 photo per event, not more. Kindly note that news received on or before 20th of a month will only be considered for publishing in the CSIC of the following month. Registered with Registrar of News Papers for India - RNI 31668/78 Regd. No. MH/MR/N/222/MBI/12-14 Posting Date: 10 & 11 every month. Posted at Patrika Channel Mumbai-I Date of Publication: 10 & 11 every month If undelivered return to : Samruddhi Venture Park, Unit No.3, 4th floor, MIDC, Andheri (E). Mumbai-400 093 COMPUTER SOCIETY OF INDIA NATIONAL HEADQUARTERS EDUCATION DIRECTORATE, CHENNAI Invites Project Proposals from Faculty Members and Students Under the Scheme of R&D Funding for the year 2012-2013 As India’s largest and one of the world’s earliest organizations for IT professionals, the Computer Society of India has always aimed at promoting education and research activities, especially in advanced technological domains and emerging research fields. It is also committed to take the benefits of technological progress to the masses across India, in particular to unrepresented territories. The objective is to promote research and innovation and meeting the grass-root level ICT needs. To emphasize the importance of joint research by faculty-students, CSI has been providing R&D funding to members from CSI student branches for last several years. CSI Student Branch coordinators are requested to motivate the young faculty members and students (including undergraduate and postgraduate) to benefit from this scheme. The proposals (based on the ongoing or new projects for the academic year 2012-13) indicating the aims/objectives, expected outcome, and indicative thrust areas for research funding may be submitted to: The Director (Education), Computer Society of India, Education Directorate, CIT Campus, IV Cross Road, Taramani, Chennai 600113. Last date for Receipt of Proposals: 31st January, 2013. Aims and Objectives ☞ ☞ ☞ ☞ ☞ ☞ To provide financial support for research by faculty members, especially for developing innovative techniques and systems to improve teaching-learning and institutional management processes. To provide financial support to students for developing new systems catering to the needs of socially relevant sectors and/or involving proof of concepts related to emerging technologies. To facilitate interaction/collaboration among academicians, practitioners, and students. To develop confidence and core competence among faculty/students through research projects. To foster an ambience of ‘Learning by Doing’ and explore opportunities of industry funding and mentoring for inculcating professionalism and best practices among students and faculty. To recognize innovation and present excellence awards for path-breaking projects through CSI YITP awards and industry associations, Govt. agencies, and professional societies. Expected Outcome ✓ ✓ ✓ ✓ ✓ Identification of thrust areas, capability assessment, gap analysis, recommendations, and future education and research directions. Integration of research methodologies into the university teaching-learning process and evolving a quality control mechanism for academic programs and curricula. Strengthening of industry-institute interaction through commercialization of technologies and products developed by students and faculty. Publication of research studies (ICT penetration, technological innovation, diffusion & adaptation), state-of-the-art reports, and case studies of education/research initiatives. Identification of potential new and innovative projects of young faculty, researchers, and students for possible business incubation. Indicative Thrust Areas for Research Funding Financial assistance of up to Rs 50,000/- for hardware projects and up to Rs 30,000/- for software projects would be provided to cover items like equipment, books/journals, field work, questionnaire, computation work, and report writing. The indicative thrust areas for funding include (but not limited to): Technology - OS, Programming Languages, DBMS, Computer & Communication Networks, Software Engineering, Multimedia & Internet Technologies, and Hardware & Embedded Systems Process & Tools - Requirements Engineering, Estimation & Project Planning, Prototyping, Architecture & Design, Development, Testing & Debugging, Verification & Validation, Maintenance & Enhancement, Change Management, Configuration Management, Project Management, and Software Quality Assurance & Process Improvement Vertical Applications - Scientific Applications, Enterprise Systems, Governance, Judiciary & Law Enforcement, Manufacturing, Health care, Education, Infrastructure, Transport, Energy, Defense, Aerospace, Automotive, Telecom, and Agriculture & Forest Management Inter-disciplinary Applications - CAD/CAM/CAE, ERP/SCM, EDA, Geoinformatics, Bioinformatics, Industrial Automation, CTI, and Convergence. Last date for Receipt of Proposals: 31st January, 2013 For further details and downloading application form, please visit “About Us – Education Directorate – R & D Projects” at www.csi-india.org Wg Cdr M Murugesan (Retd.), Director (Education) Computer Society of India Education Directorate, CIT Campus, IV Cross Road Taramani, Chennai-600113 E-mail: [email protected]
© Copyright 2026 Paperzz