Professional Documents
Culture Documents
12 | March 2013
` 50/-
Cover Story BOOKFACE - A Facebook of Books 12 Technical Trend A Concept & Approach for Open Frequent Flyer Program (OFFP) 15 Article Practical Aspects of Implementing Newton-Raphson on Computers 17
www.csi-india.org
Cover Story Emergence of e-libraries Among South-Asian Countries: Critical Issues and Concerns 10
Security Corner
Information Security
(Future topics will be announced on an ongoing basis) The Editorial Board of CSI Communications is looking for high quality technical articles for different columns pertaining to the above themes or emerging and current interests. The articles should cover all aspects of computing, information and communication technologies that should be of interest to readers at large and member fraternity of CSI and around. The articles may be long (2500-3000 words) or short (1000-1500 words) authored in as the original text (plagiarism is strictly prohibited). The articles shall be peer reviewed by experts decided by the Editorial Board and the selected ones shall be published. Both theoretical and practice based articles are welcome. The articles and contributions may be submitted in the following categories: Cover Story, Research Front, Technical Trends, and Article. CIOs/Senior IT/IS personnel/consultants of the companies managing technologies/projects related to the cover themes are welcome to contribute under the CIO (Managing Technology) section. Similarly, HR Senior Managers/Personnel/Consultants are invited to contribute under HR section. Also, Letters to the Editors, questions to be answered in Ask an Expert, your experience to share some Programming Tips under the Practitioner Workbench: Programming.Tips() are welcome. How to submit the contributions: The articles may be sent to the CSI Editorial Board via email csic@csi-india.org.
Please note that months for various cover themes are tentative and may change depending on prevailing circumstances. (Issued on behalf of the Editors of CSI Communications)
Editorial Board
Chief Editor
Dr. R M Sonar
7 10 12 15 17 21
PLUS
Cover Story
Building Electronic Libraries: Issues and Challenges
Rachna Patnaik
23 26 28 30
Deep Web
Editors
Dr. Debasish Jana Dr. Achuthsankar Nair
Resident Editor
Mrs. Jayshree Dhere
Practitioner Workbench
Technical Trend
A Concept & Approach for Open Frequent Flyer Program (OFFP)
Rudranil Dasgupta and Diptiman Dasgupta
Published by
Executive Secretary Mr. Suchit Gogwekar For Computer Society of India
Security Corner
Articles
Practical Aspects of Implementing Newton-Raphson on Computers
Dr. Pramod Koparkar
IT Act 2000 Prof. IT Law in Conversation with Mr. IT Executive Similarities between technology and law; need for collaboration Issue No. 12
Mr. Subramaniam Vutha
Avinash Kadam
Please note: CSI Communications is published by Computer Society of India, a non-prot organization. Views and opinions expressed in the CSI Communications are those of individual authors, contributors and advertisers and they may differ from policies and official statements of CSI. These should not be construed as legal or professional advice. The CSI, the publisher, the editors and the contributors are not responsible for any decisions taken by readers on the basis of these views and opinions. Although every care is being taken to ensure genuineness of the writings in this publication, CSI Communications does not attest to the originality of the respective authors content. 2012 CSI. All rights reserved. Instructors are permitted to photocopy isolated articles for non-commercial classroom use without fee. For any other copying, reprint or republication, permission must be obtained in writing from the Society. Copying for other than personal use or internal reference, or of articles or columns not owned by the Society without explicit permission of the Society or the copyright owner is strictly prohibited.
Brain Teaser
31 32 33 34 36 37 38 41
Ask an Expert
Happenings@ICT: ICT News Briefs in February 2013 CSI Report CSI Report
Mr. Ravi Eppaturi Dr. Dharm Singh, Mr. Sanjay Mohapatra and Ms. Ridhima Khemasra Dr. M Sundaresan
CSI Report
Mohan Datar
Published by Suchit Gogwekar for Computer Society of India at Unit No. 3, 4th Floor, Samruddhi Venture Park, MIDC, Andheri (E), Mumbai-400 093. Tel. : 022-2926 1700 Fax : 022-2830 2133 Email : hq@csi-india.org Printed at GP Offset Pvt. Ltd., Mumbai 400 059.
Vice-President Prof. S V Raghavan vp@csi-india.org Immd. Past President Mr. M D Agrawal ipp@csi-india.org
Regional Vice-Presidents
Region - I Mr. R K Vyas Delhi, Punjab, Haryana, Himachal Pradesh, Jammu & Kashmir, Uttar Pradesh, Uttaranchal and other areas in Northern India. rvp1@csi-india.org Region - V Prof. D B V Sarma Karnataka and Andhra Pradesh rvp5@csi-india.org Region - II Prof. Dipti Prasad Mukherjee Assam, Bihar, West Bengal, North Eastern States and other areas in East & North East India rvp2@csi-india.org Region - VI Mr. C G Sahasrabudhe Maharashtra and Goa rvp6@csi-india.org Region - III Mr. Anil Srivastava Gujarat, Madhya Pradesh, Rajasthan and other areas in Western India rvp3@csi-india.org Region - VII Mr. Ramasamy S Tamil Nadu, Pondicherry, Andaman and Nicobar, Kerala, Lakshadweep rvp7@csi-india.org Region - IV Mr. Sanjeev Kumar Jharkhand, Chattisgarh, Orissa and other areas in Central & South Eastern India rvp4@csi-india.org Region - VIII Mr. Pramit Makoday International Members rvp8@csi-india.org
www.csi-india.org
Presidents Message
Dear Members
Satish Babu From : president@csi-india.org Subject : Presidents Desk Date : 1st March, 2013
This would be my twelfth and nal message to you as the President of the Computer Society of India. The last twelve months have seen a signicant amount of changes in the global ICT ecosystem that CSI is a part of, and also within the Society itself. As ICTs have become an essential part of the lives of citizens around the world, we have seen increasing assertiveness on part of the civil society on their rights vis--vis the Internet and ICTs. Governments around the world have largely been on the defensive, trying to protect their national interests while business, which is the other major stakeholder, has been trying to reduce risks on account of the sometimes-conicting interests of Governments and civil society. This has given rise to piquant situations within the country and abroad in contentious realms such as cyberlaws, Internet Governance, and online security & safety. For CSI too, this has been an eventful year. Our ExeCom has been active in managing the affairs of CSI. We had a very successful Annual Convention at Kolkata, and a large number of professional activities such as conferences and workshops around the country during the year. There have been some developments in the current year that seem to indicate an enhancement of our visibility and prole: during this year, the CSI President was appointed as Member of the Cyber Regulation Advisory Committee (as per the notication on 16 Nov 2012), a high-level committee Chaired by the Hon. Minister for Communication and Information Technology, Government of India, that has the mandate of advising the Government on issues pertaining to cyberlaw. Later this year, the CSI President has been also invited to join as Member, All India Board of Information Technology Education (AIB-ITE) of AICTE, as per the request received in February 2013. CSI has also been mandated to run 50 Electronic System Design & Manufacturing (ESDM) training workshops around the country, on behalf of the Department of Electronics and Information Technology based on our proposal submitted in December 2011. Other signicant milestones during the year have been steady progress in CSI transactions, CSI journal, and the CSI digital library, all of which are set to enhance our visibility & credibility, at the same time providing valuable services to different constituencies within CSI. The need to offer value to Student Members, who constitute a signicant proportion of our membership, was raised at the Think Tank and Presidents Council meeting at Kolkata. We have been gearing up on this aspect, and, with the appointment of a senior professional as the Director of Education, we hope to further enhance student services. These are indeed important achievements for us. However, we still have scope for improvement in many areas, most
noticeably in membership and chapter development. Our coverage in different parts of the country has been steadily increasing, but there are still pockets where CSI is virtually unknown. In some of these regions, we have launched initial activities that will hopefully culminate in Chapters in a reasonable period of time. Another area where we can contribute is to international processes, institutions, and networks. CSIs international presence has traditionally been focussed on IFIP and SEARCC, but we need to also enhance our linkages with other international agencies such as BASIS, IGF, and ICANN. We have already made a beginning on some of these during the last year. We are also in the process of signing new or renewed inter-society agreements with agencies such as IEEE, IEEE Computer Society, and ISACA, which will add further value for our members. I have been fortunate to have a team of Office Bearers, ExeCom members, NC Chair & members, Advisors, and staff who have made my tenure reasonably smooth and trouble free. I would like to thank all of them, and also each member of CSI who have reposed their condence in me. It has been indeed an honour for me to serve as the President of CSI, and I am sure that the Society will become even more effective under the able leadership of Prof. SV Raghavan, who would be taking over as President; Mr. HR Mohan, the Vice President, and President-elect; and their respective teams. It is with a profound sense of satisfaction that I bid you goodbye. As we are about to celebrate our 48th Foundation Day, I would like to end with a message with of hope, that CSI will full its mission and mandate of being the countrys most respected and beloved technical society.
Editorial
From Clay to Silicon is not a paradigm shift. But for libraries, that may not be true. From clay tablets that might have lled the libraries of Alexandria to the Silicon brains that seem to power modern digital libraries, there is of course philosophical transformation. Technology is not a mere tool as far as libraries are concerned. They have pervaded the heart as well as soul of libraries, and they have created new library experiences withering the old ones. This issue of CSI has as its theme e-Libraries. Rachna Patnaik of SAC, ISRO, Ahmedabad in article titled Building Electronic Libraries: Issues and Challenges gives an overview of the scene and introduces the case of SAC e-library. The services of From Clay to Silicon is not a paradigm shift. But for libraries, that may not be true. the SAC library portal clearly indicate the changing face of new generation libraries. Dr. Sudhanshu Joshi and Dr. Manu Sharma in the article titled Emergence of e-libraries Among South-Asian Countries: Critical Issues and Concerns take a look at issues specic to South Asian countries. Binimol M C and Remya Krishnan report an innovative library application that attempts to reach out to generation-X by initiating the ubiquitous facebook. Our Technical Trends section has an interesting article titled A Concept & Approach for Open Frequent Flyer Program (OFFP) authored by Rudranil Dasgupta and Diptiman Dasgupta. In Article Section, Pramod Koparkar has presented an educative computing application for numerical analysis with Practical Aspects of Implementing Newton-Raphson on Computers. Avinash Kadam has highlighted information security awareness through his article Five Key Considerations for an Information Security Defender. He has written
Technology is not a mere as far as libraries are concerned. They have pervaded the heart as soul of libraries, they have created new library experiences wither to unknown. about specic aspects of the role of information security defender, which are different from information security planner and information security investigator. Manish Kumar, Dr. M Hanumanthappa and Dr. T V Suresh Kumar have presented The Underworld of Cyberworld through onion routing aspects as well as anonymity challenges. The article provides information on the technology like Tor and Bitcoin, which has added a potential threat in cyber community. In Practitioner Workbench section, we have Programming.Tips () presenting Fun with C programs comprehending the localization support and The gprof utility in Linux by Wallace Jacob. Security Corner section covers two articles: one on information security article by Adv. Prashant Mali titled Software Agreements in India Points to Ponder, another on IT Act 2000 by Mr. Subramaniam Vutha on Prof. IT Law in Conversation with Mr. IT Executive Similarities between technology and law; need for collaboration Issue No. 12. There are other regular features such as; Brain Teaser, Ask an Expert and ICT News Brief in February 2013 in Happening@ICT and CSI reports, Chapter and Student branch newsand various calls. Remember we look forward to receiving your feedback, contributions, and replies as usual at csic@csi-india.org. With warm regards, Rajendra M Sonar, Achuthsankar S Nair, Debasish Jana and Jayshree Dhere Editors
www.csi-india.org
Cover Story
Rachna Patnaik
Head, Library & Documentation Division, Space Applications Centre, ISRO, Ahmedabad
Introduction
The growth of Internet and the availability of enormous volume of information in electronic/digital form have necessitated the growth of e-libraries. By adopting, emerging technologies, libraries are reshaping its collections and services by organizing, managing, and disseminating information in an electronic format. Due to an explosion of electronic resources in the form of journals, books, newspapers, magazines, data, images, music, and other audio, videos etc., it has become essential for libraries to store information electronically. As the electronic resources change at a very rapid pace, nding ways to manage them effectively, from selection to licensing, is becoming a major challenge for librarians. There are certain issues related to e-resources like acquisition, access restrictions, authentication, copyright, preservation, software, and the user interface. In addition to acquiring and managing e-resources, it is also essential that library professionals must educate patrons on the usage and access to electronic resources. Libraries have evolved from paperbased storehouse of books and journals, into distributed network of electronic information and knowledge, now known as electronic libraries (E-Libraries). In electronic libraries, information is stored electronically and made accessible to the users through networks. Because of the user preferences for the electronic format, these resources are becoming essential in library collection. The collections in E-libraries are developed and maintained to meet the information needs of a given user community. Electronic resources refer to those materials that require computer access and may either be accessed locally or remotely via the Internet.
It is essential to answer certain questions before building an e-library like Why do we need an e-library collection?, Who are our patrons and what are their needs? How the collections will be organized and accessed. Due to budget constraints, it is essential to evaluate e-resources before purchase, based on an in-depth knowledge of the patrons needs and availability of resources. Although, the availability of electronic resources enables remote access to the information, it also simultaneously presents certain issues and challenges not encountered with traditional materials.
Collection development is the process of systematically building library collections to serve the needs of the users.
The library services are hosted on high-end servers on Red Hat Linux and Ubuntu platform. The librarys online catalog contains over 1 lakh items owned by the library, including books, periodicals,
electronic documents, and other materials. The bibliographic information can be accessed through Online Public Access Catalogues (OPAC) and users can search according to author, title, subject, keyword, publisher, place, etc. SAC Library has developed a digital repository using Dspace software, on Ubuntu platform for managing digital resources of its scientic community. It consists of original research in digital form, including technical reports (unclassied), publication, and house publication which are uploaded in the repository in a proper collection. For the storage of the content, the server is attached to 4TB Direct attached Storage (DAS) device. The repository provides access to and manages collection in a professionally maintained archive, giving users increased visibility and accessibility over the organizations network. The NPTEL videos and electronic documents available in the library are mirrored on the Network Attached Storage (NAS), of 6TB capacity to help the users to access from their desktops. All efforts are taken into consideration regarding monitoring and controlling of license usage. From the security point, share level security as well as user level security is provided. SAC Library also subscribes to various electronic journals and books. Full text electronic access to some of them is made available as free with print subscription, some by paying additional subscription amount, and registering with our IP address. Complete list of E-journals along with instructions of usage, is provided on library portal. These resources are IP authenticated, and can be accessed within the campus as well as from home through a proxy server.
Taylor & Francis SPIEDL Sciencedirect (Elsevier) OSA John Wiley Indistat IEL (IEEE/IET Electronic Lib) AMS AIP AGUDL ACMDL
0
564 4644 1758 362 403 476 9031 1080 1135 1197 197 2000 4000 6000 8000 10000
The usage of these e-resources is tremendous, and users are accessing these contents for their various projects and research work, as brought out in Fig. 3.
Infrastructure requirements
It is essential to ensure that library has proper infrastructure i.e. hardware and software and has the capability to provide and effectively maintain access to resources on an ongoing and cost effective basis. The various methods of access, either IP-authentication or login/password need to be considered. Access via IP ltering is often preferable because it provides simultaneous access to multiple users. Also, IP-address recognition allows authorized library users to access content from outside the physical boundary of the library via a proxy server. The resources should be compatible across a wide range of platforms and web browsers. Library should also provide training to its users about the resources and browser requirements.
www.csi-india.org
Technological obsolescence
The biggest challenge in e-collection development is the obsolescence of hardware/software required to access electronic information. In order to ensure longer life of the electronic information, a continuous development and upgradation of information storage, and access to techniques and technology is a must. It is also essential to consider the provision for migrating les to new formats/platforms, to keep up with technological advances.
the vendor provides sufficient advance notication in relation to renewals to allow for sufficient lead time to undertake an effective review of the resource.
Acknowledgment
The author is thankful to Shri Kiran Kumar, Director, SAC for his encouragement and Dr. Ajai, Chairman Library Committee, SAC for his constant support and guidance. The author is grateful to Dr. Pradip Pal and Shri Nilesh M Desai for their critical and fruitful discussions on the article.
References
[1] Johnson Sharon, Evensen Ole Gunnar, Gelfand et. al. (2012) Key Issues for E-Resource Collection Development: A Guide for Libraries, International federation of library associations and institutions. [2] Kovacs, Diane K Kovacs, Elkordy Angela (2000) Collection development in cyberspace: building an electronic library collection, Library Hi Tech; Volume: 18 Issue: 4; 2000. [3] Chandel A S, Saikria Mukesh (2012), Challenges and opportunities of e-resources, Annals of Library and Information Studies, Vol. 59, Sept. 2012, pp. 148-154. [4] Branin, J J (1994). Fighting back once again from collection management to knowledge management. In Johnson, P and MacEwan, B Collection management and development issues in an electronic era. Chicago: American Library Association. [5] Kovacs, D K (1999). Electronic publishing in libraries: introduction. Library Hi Tech. Vol. 17 (1), pp 8-9. [6] Jurasek, Karen. (2008). Trends and challenges before the future academic library professional that will Shape the Future of Academic Libraries. [7] Avasia, Maya (2001). Electronic resources: Collection development, Proceedings of Caliber 2001. [8] Kovacs Diane K and Robinson, Kara L (2004), The Kovacs guide to electronic library collection n development.
Archiving/Preserving e-resources
A major concern is, archiving and preserving e-resources for the future use, because libraries do not have ownership of the e-resources, but can only access them. Libraries may want a guarantee that if they cancel or terminate their subscriptions, they have the right of perpetual access to previously subscribed contents. Consideration should be given to whether the content provider is compliant to LOCKSS, Portico or other similar types of archival products.
Conclusion
The development of an electronic library is a long and challenging process and libraries need to apply proper skills in planning the collection and manage both print and e-resources. During the last decade, the status of libraries has drastically changed due to emergence of e-resources. Also, there is a rapid urge of the user community to get more information in e-format. Replacing printed resources with electronic materials can reduce the cost of processing, shelving, and binding. Moving towards electronic library from the traditional library needs a balanced collection between printed and electronic forms. Since a vast amount of information is available in electronic formats on Internet; Librarian must not only identify and facilitate access to electronic information resources, but also educate library users about their availability and use patterns. Protection of intellectual property, security of electronic resources, user training, etc. should also be considered as effective management of information within the electronic library.
Copyright
Copyright is a form of intellectual property that gives the author, of an original work exclusive right for a certain time period in relation to that work, including its publication, distribution, and adaptation, after which time the work is said to enter the public domain. Since the entire electronic library is available online, it comes under the Copyright Laws and its contents should not be reproduced or electronically transmitted.
Rachna Patnaik did her Master of Computer Applications (MCA), from NIT Bhopal in 1992. She has more than 18 years of experience in database management system, web designing, open source software, data mining, and digital repositories. Her research interests cover a wide spectrum of library and IT technologies. Currently, she is Head, Library & Documentation Division, Space Applications Centre, Ahmedabad.
Cover Story
www.csi-india.org
the major challenge the South-Asian countries are facing, because of the underdeveloped state of infrastructure set up, which includes telecommunication setups as well.
Conclusion:
Besides, the difference in the development of e-libraries in developing nations vis-vis other areas of digitalisation, a level of enthusiasm is required among libraries practitioners to develop an evolving prototype for e-libraries through cooperation and collaboration among different countries (Jeevan, 2004). Technology plays a vital role in the transformation of libraries into digital form, but besides technology various factors including infrastructural needs, human resource, nance, and lack of planning also need to be considered. In the emerging networked world, copyrights and intellectual property are now well protected and enough security is developed and maintained. In addition to this, learning from the developed world gives more visibility to the intellectual property of developing nations. The other important dimension that digital libraries should focus on is preservation and access to content, and on making digitalized content free, for easy access among the member libraries, while creating an e- consortium.
Future Outlook
The success of a digital library depends upon the computers, communication skills, and knowledge of library professionals
ILS Acquisition
in connection with modern technology. Future trends point toward the need for extensive research in digital libraries and for the transformation of libraries as institutions. The present ambiguity of terminology is hindering the advance of research and practice in digital libraries, and in our ability to communicate the scope and signicance of our work. A Brief list of potential areas of concern could include (Goldner, 2010): 1. Most library computer systems are built on pre-web technology. Transformation is required in terms of deployment of web 2.0 architecture. 2. System distributed across the net using pre-web technology is harder and more costly to integrate. Security issues are needed to address. 3. Libraries store and maintain much of the same date hundreds and thousands of times. Collection assessment is required across the E-Library database. 4. With library data scatter across distributed systems the librarys web presence is weakened. A comprehensive framework needs to install. 5. With libraries running independent systems collaboration between libraries is made difficult and expensive. Inter-library cloud is required to be installed. 6. Information seekers work in common web environments and distributed systems make it difficult to get the library into their workow.
A to Z List
7.
Many systems are only used to 10% of their capacity. Combining systems into a cloud environment reduces the carbon footprints, making libraries greener.
In the present article, we have suggested measures to build the open-source public cloud service library architecture, across South-Asian libraries based on virtual technology, effectively increase the service capacity of information institutions, use efficiency of network resources, and secure the applicability of services while preventing the server from spreading. Future research can be based on key technical interfaces for building the cloud infrastructure and realization of major functional modules, including the management of virtual server, management of virtual application mapping. A South-Asian Cloud based e-library can be formulated, which aims to cooperate a set of library management services, to support core library services such as circulation, acquisitions, cataloguing, and related resource sharing among selected Asian countries.
References:
[1] Chakraverty, R (2003). Digital libraries: issues and future. In Y Singh, et al. (Eds.), New challenges in information management and e-learning in the age of globalisationissues and opportunities: Proceedings of the SIS 2003, Vol. 1 (pp. 2539). Roorkee: IIT Roorkee. [2] Goswami, S K, & Ghosh, B K (2002). Digital library environmentIndian context. In A Chatterjee, et al. (Eds.), Digital information systems and services (pp. 229234). Kolkata: IASLIC. [3] Bhattacharya. P (2004), Advances in digital library initiatives: a developing country perspective, The International Information & Library Review, 36(3), pp. 165-175. 175. [4] Conceio. P, Heitor, M V, Gibson D V And Shariq S S (1998), The emerging importance of knowledge for development: Implications for technology policy and innovation, Technological Forecasting and Social Change, 58 (3), pp. 181202. [5] C L Borgman, C L (1999), What are digital libraries? Competing visions, Information Processing and Management, 35 pp. 227243. [6] Goldner, M (2010), Wind of Change:
Library
ERM
Library
Resolver
Suppliers Data
Partners
Cataloguing Utility
Consortia System
Fig. I: Migration from tradition library system topology (a) to Proposed Integration Model of South-Asian E-Library (b) [Source: Adopted from Michael Dula et.al. 2012]
Continued on Page 16
CSI Communications | March 2013 | 11
Cover Story
Facebook, Twitter, etc have become the most important forms of social activity for generation-X. With the emergence of social networking ventures like Orkut, Facebook, Twitter, a large network of people
stay connected by status updating, commenting, and sharing pictures. Bookface, library software conceived an implementation at the Department of Computational Biology and Bioinformatics, University of Kerala, has attempted to exploit the paradigm of social networking to make it appealing to Gen-X. Library digitization was used primarily in managements or administrations where users did not have many benets; however Bookface redenes how the library can be used. Bookface is an innovative library management application, which merges the features of social networking and common library management software. It is a web-based application that is supported by multiple browsers and mobile platforms. It is like a Facebook of Books and library users. Users can tag, like, and comment on their favorite books. They can browse the software through any device that can access the internet. They can maintain their bookshelves and thus archive their reader life. This innovative software is aimed at transforming the
www.csi-india.org
the status of availability about any book in the library. In the main window one can view the most read, most liked, most commented books, and recent updates. A search option is also included to look up for the book under various categories like author, title, subject, stock number, call number, etc. The librarian alone has the privilege of viewing the library register in the form of stock number, title of the book, member name, issued, and returned dates of books on the Home Page. The Search box, which is available in all modules, makes it easy to search for particular books. Books can be searched based on their titles, by the authors, publishers, subject, etc. Various lters such as science, philosophy, and mathematics, can be applied to shortlist the search results. Once the user provides the necessary details and hits Enter, the results will be displayed as seen in Fig. 2. By clicking the Books link the page goes to another page which displays images of the new releases (Fig. 3a). Recent comments and recently issued books are the additional menus included in this page. Bibliographical information are available from Book Details page i.e., full book details and its transactions including issuing time, date, month, and year. There is a facility to write comment about the books. Members can reserve their books
library to a futuristic people-centric library. Sookshmatech, a software rm in Technopark, developed the software. The URL of Bookface is www.bookfacedcb.org Homepage of Bookface is obviously reminiscent of Facebook. It energizes the members to read the books. Reading count is automatically recorded in Bookface. Anyone who logs into Bookface can know about the quantity of stock books, availability of books, and the details of issued books. The various ltering options available in Bookface make it easy to search and nd required books. It also complies with the Right to Information Act making the library an open-window system. Bookface gives a more readercentric approach that is much different from the original objective of a usual library that is more book centric and service centric. Issue & return process are done through RFID (Radio Frequency Identication) system, thus replacing the use of barcodes on library books. RFID tags are penetrable through an item; hence it can be directly scanned without the need to open it. A stack of books can thus be read simultaneously by the borrower himself, hence the librarian has just a monitoring role in this process and the end-users can save time. The book operations of the library are fully computerized and the online public access catalog (OPAC) is accessible from anywhere from the world.
The home module of Bookface provides the most relevant information on the books and the users. Most popular books are listed under separate tabs such as Most Read, Most Liked, etc. Recent comments by users are populated under the Recent Updates tab. (Fig. 1). It is based on the idea of social networking on an academic scenario wherein users can view images, a short description, and
on the number of books the member has read, liked, and commented. Alumni members can also continue using their accounts and add comments, but they are denied borrowing or issuing of books. Automation and networking of libraries are still in their infancy in India. Their full impact on libraries and library resources will be known in due course of time. A lot of concern has been raised in recent times regarding the deteriorating reading standards of the younger generations. The key to this issue is to provide a facelift to libraries that are resources of innite knowledge. Bookface is one such solution that encourages the students, teachers, and all types of front end users alike to befriend the books in their libraries, and to know and let know about the
beforehand when the books get listed on the New Arrivals list through this page, so that when the book is available for borrowing the user who has reserved it shall get it rst. Another unique feature is that the members can use tags on their books with tag names such as humor, science, ction, etc. thus when other users need to read about ction, the books tagged under ction gets listed much similar to a cross referencing system. Users can also create shelf with their most liked books. The book transactions are automatically linked to this module to enable users to nd out if materials are available for loan or have been borrowed (Fig 3b). From the stats page one can generate various statistical reports about book transactions, readership rates over the years or a particular week or a month (Fig. 4). This module displays graphical representations of readership rates, searches the number of stock books, available books, and issued books available as sub-classes from this module. From the Members sub-class the full details about members of Bookface, their readership rates and books currently in hand are displayed.
.The Members module gives details on the names and status of the members in Bookface (Fig. 5). They are classied as MSc/ MPhil students, research scholars, faculty, alumni and administrators. Clicking on each member we get details
effectiveness of a book to others as well. Bookface is thus a social library network that has attracted a wide range of readers ever since its launch and hence other academic libraries shall surely benet with n systems such as these.
Binimol MC completed her Bachelor of Library and Information Science (BLISc) and Master of Library and Information Science (MLISc) from Kerala University. She is currently working as Library Assistant at the Department of Computational Biology and Bioinformatics, University of Kerala.
Remya Krishnan did her Post Graduation in Biotechnology and MPhil in Bioinformatics from the Department of Computational Biology and Bioinformatics, University of Kerala. She is currently doing her PhD in the same department.
www.csi-india.org
Technical Trends
Detailed Algorithm
The steps of the algorithm are: Denition of a single OFFP number that is going to be maintained in a
OFFP = W_Airline_1 * Miles1 + W_ Airline_2 * Miles2 + W_Airline_3 * Miles3 + ......+ W_Airline_N * MilesN The same thing would be appended for other travel industries in the same manner. Redeeming offers on the airlines is a special feature of our approach. When a person is redeeming his miles that has been calculated by our unique algorithm in Airline N, then the airline N will check the number of points earned on their airline (because an airline should give people using their airlines slightly more weightage) AS WELL AS a ratio of the rest of the points. So the Redeemable points for Airline N would be = W_Airline_N * Miles N + (Ratio which is <1 ) * (OFFP [W_ Airline_N * MilesN]) This ratio can be dened by each airline based on their policy. It will be a rating that one airline assigns the other airlines and will be maintained as a standard chart for all airlines. The same algorithm would be used for other travel industries as well. Using the above algorithm will
give the advantages outlined in the earlier section, and have a consistent standard for not only the airline industry but all industries aligned with this. Since one of the main advantages of performing redemptions is to earn new miles, the redeemable points calculated for our program can be translated into miles, using a direct conversion (Points = Miles) or some ratio of the number of miles. To simplify the integration across industries, others can also give the earned awards in terms of miles. This would be very easy for rental cars and trains, and would need a tweaking for hotels, where per night would be translated in terms of miles. Better collaboration, standardization, and business opportunities for Airlines Industries. Allow a common standard across the airline industry reducing redundancy in maintaining of multiple numbers. A new way of proposing the solution in related areas to the customer.
Due to more point accumulation, users will be attracted to travel more, so better business for industries as the points would become a calculation of the Better promotional offers to customers. More win-win situation for travelers and the travel Industry. This points when re-deemed can be reused for getting other products & services too, which can be more attractive to customers (e.g. 5000 OFFP points can help them to buy a great leather bag).
References
[1] https://www.yingreturns.co.in/html/ index.php [2] http://www.staralliance.com/en/ benets/earn-and-redeem/ [3] http://www.qantas.com.au/travel/ airlines/qantas-frequent-yer-qantasclub-queries/global/en [4] http://www.oneworld.com/ffp/ [5] http://www.webyer.com/ [6] h t t p : //w w w . f o r b e s . c o m /s i t e s / l a r r yo l m s t e d /2 0 1 3 /0 1 /2 3 /w h yfrequent-flyer-programs-dont-workand-what-delta-is-doing-about-it/ n
Diptiman Dasgupta is an Executive IT Architect in IBM leading Travel & Transportation Industry in IBM Global Delivery as lead architect and is a member of IBM Academy of Technology (AoT). He has 15+ years of experience in design and development, architecting, providing technical strategy, solutions for creating and leveraging assets in client solution, as well as providing technical leadership to the organization. Diptiman is having multiple publications on Social Collaboration/BPM available in IBM developerWorks and has patents Filed/PUBLISH. Rudranil Dasgupta is an IBM Advisory IT Architect, Advisory Accredited IT Specialist, and is currently working as the Advisory Architect. He has close to 10 years of experience in design and development, architecting, providing technical strategy, solutions for creating and leveraging assets in client solution, as well as providing technical leadership to the organization. He has in-depth experience in working with WebSphere solutions, SOA, Web 2.0, Content Management, SAP CRM, and Java/J2EE. Rudranil has multiple patent publications and patent lings. He is an active writer on the IBM developerWorks community and has multiple publications. Moreover, he is an active member of the IBM University Relations and has delivered multiple lectures.
Dr. Sudhanshu Joshi is the Incharge Information Technology, he is also associated with School of Management, Doon University, Dehradun, He has taught in academic programs at Indian Institute of Technology, Roorkee, University of Petroleum and Energy Studies, Dehradun and Gurukul Kangri University, Haridwar. He is the author of 35 International Research papers and ve books on Technology Management. He has served CSI in various capacities in its Haridwar and Dehradun Chapter. Dr. Manu Sharma is presently serving School of Management, Institute of Management Studies, Dehradun. She has vast academic experience in teaching strategies and technology management, her research and academic interest is web 2.0 and its implications on business revenue.
www.csi-india.org
Article
this calculation and if you already have calculated colour of a neighboring pixel, then this already-calculated value turns out to be a very good initial guess. This happens due to the coherence of the objects involved in the scene. The problem that needs automatic computations is seldom a single one. It is generally a family of similar problems, all of which are programmed in a single stroke. We sort them out over the parameters in which they differ. Having then found the solution of the rst equation, (may be by wasting unreasonably large number of iterations) we now have quite good initial value for the next, or nearby, problem. It is difficult to say with certainty that this strategy will always work, but for problems with un-intricate structure, it generally gives a fairly' good method.
Sampling Issues
In absence of any a priori knowledge about the geometry/behaviour of the functions involved, a common method to deal with initial guess is to sample the entire domain at points of some suitably laid out grid. Typically, a (rectangular) grid is laid out with a constant distance between the adjacent points. A multiple programming loop is then run in which each of these points is used as the starting guess and Newton-Raphson is run to check whether it yields any solution. This capitalizes on the power of computers, in that the computer does not get bored of repeating any kind of mundane, stupid task a number of times. To achieve an accurate scanning, the distance is chosen as small as wished. This has an effect of increasing the number of trials, but a numerical programmer typically proceeds with the view of let the machine do the dirty job. Scanning the entire domain has two bright disadvantages. Let me explain these in detail:
full of four variables or even more, which need to be dealt with simultaneously. A common example is in shape or geometric modelling. Consider an example of nding an edge or a corner of a suitcase whose faces (or sides) are modeled as some kind of surfaces expressed by some kind of functions. Each of these surfaces has two independent variables called surface parameters. You need to evaluate intersection of two surfaces to get an edge. This involves 4 parameters simultaneously. If you want to nd out corner of the suitcase, you need the intersection of three surfaces, and thus, simultaneously have to deal with 6 independent variables. Naturally, the suitcase dimensions are in meters, whereas you want the answers not only in millimeters (1000th part of a meter), but in fractions of millimeters (typically 10th of a millimeter)! Thus, in each dimension you need to have an accuracy that demands sampling of 10,000 points or so. With six independent variables, this amounts to 1,000,000,00 0,000,000,000,000,000 = 1024 trials of Newton-Raphson.
but also in the other portions where the geometry is relatively simple and does not need dense sampling. To appreciate this, I have created an example as follows: The function y = sin (1/x) provides extremely good illustration of this problem of adequate sampling distance. Consider it on the interval (0, 1/2) where the end values are excluded to avoid division by 0. I have chosen this awkward value 1/2 just to ensure that the graph starts at y = 0 value on the right hand side, because sin (2) = 0. This is the usual sin curve compressed or squeezed from one side. Even our trying to plot the graph of this function on computer causes problems. We x up a decrement in x and start a loop from 1/2 down to 0. Successive points are joined by straight lines. However small decrement we choose, eventually it turns out to be crude, and requires renement. When x is close to 0, a small variation in it causes a large (more than 2) variation in 1/x and sin (1/x) tries to take all values from 1 to +1.
its right side, it will most likely converge to B. We say that points on the right of D are in the basin of attraction of B. That is, if you start Newton-Raphson from any point in this set of points on the right side of D, the process of Newton-Raphson iterations shall eventually converge to B. Similar remarks apply for the point C, because the function is symmetric on the other side. We observe that the set of all points on the left of E are included in the basin of attraction of C. It is seen that the chances of Newton-Raphson converging to A would be more for a starting point between E and D. Thus, typically the basin of attraction of A is restricted between E and D, although it may not include every point between D and E. To see this, consider the point K as the starting point of Newton-Raphson. At this point, please recall from numerical analysis[1] that the value xnew obtained by an iteration of Newton-Raphson starting with xold, is obtained geometrically at the intersection of the tangent at xold (green line in the gure) with the x-axis. Thus, starting from K, the tangent lands on some point left to E, and then the further iterations of Newton-Raphson attempt to go closer to point C rather than A. We say that the point K is in the Basin of attraction of the solution point C rather than the solution point A. On the contrary, if M were chosen as the starting point of Newton-Raphson instead of K, the tangent lands on some point right to E, the convergence would detect A as the solution instead of C. Thus, whether the process would converge to C or A depends on the slope of the tangent at the initial guess (and where it hits the x-axis) rather than its distance from the point A. Compared to B and C, the basin
of attraction of A is much narrow, and not in the form of a connected interval. Hence, if we try to run Newton-Raphson with randomly chosen starting point, we are likely to miss out A in spite of many tries. In case of more than one solution, it becomes necessary to have some kind of a priori knowledge about the number of solutions and their distribution in the domain (although it is not easy). Only with such knowledge, all possible solutions can be detected exhaustively. An often-used remedy to this is the grid method with ner grid size, but it has its limitations as discussed before in the section of sampling issues.
Step 2: Alternatively, if the range has 0 in it, check the sufficiency conditions for the convergence of Newton-Raphson to a unique solution. Such conditions do exist, and can be computed and programmed as shown in[2, 3]. If the condition is satised, start Newton-Raphson and it shall converge to the unique solution. Step 3: Alternatively, if the condition is not satised, subdivide the domain at its mid point, and then recursively apply the same technique to each of the resulting sub-domains. In case the domain is too small (i.e. zero within tolerance of the program) then stop, as further subdivision makes no sense. However, this generally never happens, as during subdivisions, smaller and smaller subdomains are generated, and they either do not contain 0 (handled in step 1) or satisfy the sufficiency condition (handled in step 2). Observe that Step 2 resolves the conict discussed in the section Impact of Basin of Attraction and Step 3 resolves the conict discussed in the section Sampling Issues
No Remedy?
Now, with all my discussion above, a question would arise in your mind: Can we not have a solution to this failure of Newton-Raphson? Luckily, the answer is yes! A method exists to avoid these failures. It is computable, and can be automated. You may nd its theoretical development in[2]. Unfortunately, its details involve intricate mathematics, and are lengthy. Thus, they are beyond the scope of this paper. However, the method is found to work well in practice, at least, when applied to detect intersections of curved surfaces. In case you are interested to know the details, please see[3]. However, for the sake of completeness, I am including below a quick and short description of the algorithm. The algorithm is based on recursive subdivision technique.
References
[1] Acton, F S: Numerical Methods That Work, Harper and Raw, New York, 1970. [2] Koparkar, Pramod: Efficient, Accurate, Exhaustive, and Robust Method for Solving System of Non-Linear Equations, Proc. Numerical Analysis with Automatic Result Verication, Lafayette, Louisiana, February, 1993. [3] Koparkar, Pramod: Surface Intersection by Switching from Recursive Subdivision to Iterative Renement, The Visual Computer, v. 8, p. 47, 1991. [4] Moore R E: Interval Analysis, PrenticeHall, Englewood-Cliffs, 1966. [5] http:/ /www.google.co.in/ Search with key phrases applications of newton raphson method in engineering and applications of newton raphson method in science. n
The Algorithm
Step 1: Evaluate the range of the function on the entire domain of interest, using some standard technique like Interval Analysis[4]. If the range does not contain 0, then no question arises to nd the solution to f(x) = 0; it simply does not exist. Stop in this case.
Dr. Koparkar has a Ph.D. in Computer Science, in 1985. He has internationally published original research mainly in the areas of Geometric Modelling, Image Synthesis, and Geometric Shape Processing in 2-D and 3-D. He has been on the International Journal Editorial Board and International Conference Program Committee. He has visited several organizations in different countries for delivering lectures, developing software and presenting research papers. He has been on various Academic Advisory Committees at the University and Government levels in India. He had worked in Research Institutes like TIFR and NCST, and in Corporations like Citicorp, Computer Vision, ADAC Laboratories (all USA), and 3-dPLM/GSSL (India). He has written four Books: Unix for You, Pascal for You, Java for You, and C-DAC Entrance Guide. At present, he offers consultancy to corporate clients about various latest technologies.
8 JUNE 2013
www.csi-india.org
Article
Most of the defensive activities happen at the information security program management and incident management and response levels. However, defense priorities, risks and budgets are decided at the rst three layers. A good understanding of all dimensions is critical for effective and efficient information security defense.
managed security program. Appropriate policies, standards, procedures, guidelines, and other documentation needs to be developed. Good knowledge of how to link policies and other supporting documentation to the business objectives is required. Not all security initiatives can be handled by the in-house staff. Good understanding of the processes for incorporating security requirements into contracts (e.g., with joint ventures, outsourced providers, business partners, customers, and third parties) should be ensured. Knowledge of the methods and techniques to manage third-party risks (e.g. service level agreements, contracts, due diligence, suppliers, and subcontractors) should be acquired. Knowledge of the design, development and implementation of information security metrics is essential for a successful security program as you can only manage something that you can measure. There is a growing requirement for certifying and accrediting the compliance of business applications and infrastructure to business needs. Awareness of this is essential to meet the expectation for certied and accredited security systems. Methods for ongoing evaluation of the effectiveness and applicability of information security controls such as vulnerability testing and assessment tools is required, to get an assurance of the efforts that have been taken.
security requirements. There should be good familiarity with the methods and approaches for providing continuous monitoring of security activities in the enterprises infrastructure and business applications. The management metrics should be dened and monitored to validate the information security program investments (e.g., data collection, periodic review, and key performance indicators). Various methods of testing effectiveness and applicability of information security controls (e.g., penetration testing, password cracking, social engineering, and assessment tools) should be deployed judiciously. There should be good knowledge of external vulnerability and reporting sources, for information on potential impacts on information security in applications and infrastructure. The information security problem management practices, the reporting of systems, and infrastructure security status should be well dened.
team also requires forensic tools for collecting and presenting evidence (e.g., admissibility, quality and completeness of evidence, and chain of custody). Thorough knowledge of these tools and techniques is essential. The knowledge of incidents should be documented and used for subsequent action. Familiarity with various internal and external reporting requirements is essential. The postincident review practices and investigative methods to identify causes and determine corrective action is equally essential to know. Knowledge of techniques for quantifying damages, costs and other business impacts arising from a security incident is necessary. Finally, knowledge of the recovery time objective (RTO) and its relationship to business continuity and contingency planning objectives and processes needs to be acquired.
Conclusion
Familiarity with the ve CISM job practice areas is utmost essential to become a good information security manager, as well as a good information security defender. The practice areas mention a number of knowledge statements. A practitioner has to gain practical hands-on experience in performing each of these tasks. Only after gaining prociency in these activities can a defender work toward making the systems secure against any attacks that a wily hacker may launch. There is no such thing as a guaranteed, 100 percent secure system, but managing a security incident with the least damage and deploying the lessons learnt to prevent its recurrence is a great contribution the information defender can make. Avinash Kadam, CISA, CISM, CGEIT, CRISC, CISSP, CSSLP, GSEC, GCIH, CBCP, MBCI, PMP, CCSK, is an advisor to ISACAs India Task Force. ISACA is a global association for IT assurance, security, risk and governance professionals with more than 100,000 members worldwide and more than 6,000 in India. The nonprot, independent ISACA developed the COBIT framework for governance and management of IT, and offers the CISA, CISM, CGEIT and CRISC certications. Opinions expressed in the blog are Kadams personal opinions and do not necessarily reect the views of ISACA (www.isaca.org). He can be contacted via n e-mail avinash@awkadam.com.
www.csi-india.org
Article
Experts estimation claims that deep web can be up to 200 times larger than the surface Internet, and it allows people to communicate without detection.
I am talking about deep web (also known as hidden web or Tor services). What Google is capable of, merely scrapes the surface of what Deep Web really has. Experts estimation claims that deep web can be up to 200 times larger than the surface Internet, and it allows people to communicate without detection. What happens in a cyber world where people can slip in and out of sites, which shift every now and then without leaving any permanent trace. This is where child trafficking, drug peddling, people offering hitmen services, and threads on how to build bombs are available. From counterfeit and stolen products, to illegal drugs, stolen identities, and weapons, nearly anything can be purchased online with a few clicks of the mouse. The online black market not only can be accessed by anyone with an internet connection, but the whole process of ordering illicit goods and services is alarmingly easy and anonymous. Its a dark world of the internet, where majority of the worlds population are oblivious to. The most surprising thing is that law enforcement agencies are almost helpless exploited by the ill minded anti social elements. Before continuing our walkthrough towards these technologies, I would like to say, we are NOT endorsing these activities. This information can help
Tor aims to conceal its users' identities and their network activity from surveillance and traffi c analysis by separating identi cation and routing. It is an implementation of onion routing, which encrypts and then randomly bounces communications through a network of relays run by volunteers around the globe.
security professionals to understand how stolen identities and credit cards are used, how products are fenced or distributed illegally, and more. Unless until we understand about this hidden activity, we cannot develop any counter measure techniques to prevent it. So objective of this article is to spread the awareness in the computer professional society, and igniting the professionals to come out with their novel ideas to combat it. A journey into the darker side of Foundation of U.S. from 2004 to 2005. Tor software is now developed by the Tor Project, which has been a researcheducation nonprot organization based in U.S. since December 2006. Tor aims to conceal its users' identities and their network activity from surveillance and traffic analysis by separating identication and routing. It is an implementation of onion routing, which encrypts and then randomly bounces communications through a network of relays run by volunteers around the globe. These onion routers employ encryption in a multi-layered manner (hence the onion metaphor) to ensure perfect forward secrecy between relays, thereby providing users with anonymity in network location. Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. Individuals use Tor to keep websites from
A journey into the darker side of the internet starts with two open source programs: A Tor browser and Bitcoin. Tor browser gives platform to the user for anonymous communication, and Bitcoin work as an online currency for nancial transaction for illicit purpose.
Bitcoin is an experimental new digital currency that enables instant payments to anyone, anywhere in the world. Bitcoin uses peer-to-peer technology to operate with no central authority: managing transactions and issuing money are carried out collectively by the network.
tracking them and their family members, or to connect to news sites, instant messaging services, or the like when these are blocked by their local Internet providers. Tor's hidden services let users publish web sites and other services without revealing the location of the site. Individuals also use Tor for socially sensitive communication. Journalists use Tor to communicate more safely with whistleblowers. Non-governmental organizations (NGOs) use Tor to allow their workers to connect to their home website while they're in a foreign country, without notifying everybody nearby that they're working with that organization. so can authorized intermediaries like Internet service providers and sometimes unauthorized intermediaries as well. There are some more powerful kinds of traffic analysis. Some attackers spy on multiple parts of the Internet and use sophisticated statistical techniques to track the communication patterns of many different organizations and individuals. Encryption does not help against these attackers, since it only hides the content of Internet traffic, not the headers. Tor helps to reduce the risks of both simple and sophisticated traffic analysis, by distributing your transactions over several places on the Internet, so no single point can link you to your destination. The idea is similar to using a twisty, hard-tofollow route in order to throw off somebody who is tailing you and then periodically erasing your footprints. Instead of taking a direct route from source to destination, data packets on the Tor network take a random pathway through several relays that cover your tracks, so no observer at any single point can tell where the data came from or where it's going. Well, no doubt that the intention of Tor development was an anonymous communication for the good cause, but the technology has been misused for illegal activity. It suits the requirements of cyber criminals and helps them in all ways to be hidden, but when it comes for the nancial transaction, tor alone can not help them to be hidden. When there is online business, there is online Transaction. As normal online transaction is monitored by federal government, it will reveal the identity of the people doing
illegal business. To overcome this problem the cyber criminal uses a different currency and transaction system known as Bitcoin. Its a very different technique for nancial transaction and raises a challenging issue for the government to monitor it. Next section will give you a brief idea that how Bitcoin works without revealing the identity of the users and works as a real currency in the cyberworld.
Objectives of TOR
The Tor protects a common form of Internet surveillance known as "traffic analysis." Traffic analysis can be used to infer who is talking to whom over a public network. Knowing the source and destination Internet traffic allows others to track behavior and interests of users. As we know Internet data packets have two parts: a data payload and a header used for routing. The data payload works on the principle that whatever is being sent, whether that's an email message, a web page, or an audio le. Even if you encrypt the data payload of your communications, traffic analysis still reveals a great deal about what you're doing and, possibly, what you're saying. That's because it focuses on the header, which discloses source, destination, size, timing, and so on. A basic problem for the privacy is that the recipient of your communications can see that you sent it by looking at headers,
The digital monetary system online is predominately operated by the likes of PayPal, Western Union, and banking companies that try to follow government regulations to prevent fraud and money laundering.
www.csi-india.org
Tor Servers are now the norm for storing, accessing ,and hiding illicit activity. Tor's Hidden Servers provide a real insight to an underground world that once was limited to dark alleys, shady places, and dangerous criminals.
is conrmed, you can transfer any amount from your personal bank to Dwolla. Next you need to set up an account with the Bitcoin exchanger e.g. MtGox. After your Dwolla transfer moves to MtGox, you can use the money to purchase Bitcoins on the open market for a small percentage-based fee. Once this sale is complete, your Bitcoins are best stored in your own bank account that is residing digitally on your computer. Now you are ready to go shopping on the black market. Combination of Tor and Bitcoin has unfortunately served all the purpose of cyber criminals. Tor Servers are now the norm for storing, accessing ,and hiding illicit activity. Tor's Hidden Servers provide a real insight to an underground world that once was limited to dark alleys, shady places, and dangerous criminals. Much like the internet has expanded our e-commerce into a borderless global market, Bitcoins and Tor have made shopping for illicit goods and services almost as easy as ordering a gift on eBay or an iTunes song on your computer. The level of protection provided by Tor, makes law enforcement's agencies job for tracking such activities, next to impossible.
Conclusion
Anonymity has given wings to the cyber criminals and anonymous digital cash becomes their strength. The technology like Tor and Bitcoin has added a potential threat in cyber community. These are the new challenges for which adequate monitoring mechanism should be developed. We accept that somewhere anonymity is necessary ,but we should try to develop a mechanism that unsocial elements should not be able to use for illegal activity.
References
[1] Jacob Appelbaum. Tor and NAT devices: increasing bridge & relay reach ability or, enabling the use of NAT-PMP and UPnP by default. Technical Report 2012-08-001, The
Tor Project, August 2012. [2] Karsten Loesing. Counting daily bridge users. Technical Report 201210-001, The Tor Project, October 2012. [3] Philipp Winter. Design requirements for a Tor censorship analysis tool. Technical Report 2013-02-001, The Tor Project, February 2013. [4] R Mark Bortner. Cyber laundering: Anonymous Digital Cash and Money Laundering. Presented as nal paper requirement for Law & the Internet (LAW 745). A seminar at the University of Miami School of Law1996. [5] Satoshi Nakamoto. Bitcoin: A Peerto-Peer Electronic Cash System, Bitcoin Research Paper- 2009 [6] Simon Barber, Xavier Boyen, Elaine Shi, Ersin Uzun. Bitter to Better How to Make Bitcoin a Better Currency. Financial Cryptography and Data Security. Lecture Notes in Computer Science Volume 7397, 2012, pp 399-414. [7] Brandon Gregg. Online black markets and how they work, 01 May 2012. http://features.techworld.com/ [8] http://www.torproject.org.in/ [9] https:/ /en.bitcoin.it/ n
Manish Kumar is working as Assistant Professor in Department of Master of Computer Applications, M. S. Ramaiah Institute of Technology, Bangalore, India. His specialization is in Network and Information Security and Computer Forensic. He has worked on the R&D projects related on theoretical and practical issues about a conceptual framework for E-Mail, Web site, and Cell Phone tracking, which could assist in curbing misuse of Information Technology and Cyber Crime. He is also the president of International Association of Cyber Crime Prevention (India Chapter). Dr. M Hanumanthappa is currently working as Associate Professor in the Department of Computer Science and Applications, Bangalore University, Bangalore, India. He has over 15 years of teaching (Post Graduate) as well as Industry experience. He is member of Board of Studies /Board of Examiners for various Universities in Karnataka, India. He is actively involved in the funded research project and guiding research scholars in the eld of Data Mining and Network Security. Dr. T V Suresh Kumar is working as Professor and Head, Department of Master of Computer Applications and Registrar (Academic), M S Ramaiah Institute of Technology, Bangalore. He has delivered lectures at various organizations like Honeywell, SAP Labs, Wipro Technologies, DRDO, Mphasis, Indian Institute of Science (Procience), HCL Technologies, L&T Infotech, Nokia and various Universities/Academic Institutions. He is actively involved in R&D projects. He has published several research papers in various National and International Conferences and Journals.
I had plenty of pimples as a kid. One day I fell asleep in the library. When I woke up, a blind man was reading my face. ~ Rodney Dangereld
Practitioner Workbench
Wallace Jacob
Sr. Asst. Prof. at Tolani Maritime Institute wallace_jacob@yahoo.co.in
Programming.Tips()
Fun with C programs comprehending the localization support Normally while writing, we tend to use the comma as the thousands separator and the decimal point for separating the integer part of a number from its fractional part. But there are also a few languages in which the decimal point is being used as the thousands separator, and the comma is being used for separating the integer part of a number from its fractional part! There are differences in recording the date and/or time in different zones/countries. This article focuses on a few aspects of the localization support provided by the C language. The code below explains the process of setting locale specic information: The fourth character is the character which separates the currency symbol from the monetary quantity. char *currency_symbol; local symbol used for currency char *mon_decimal_point; decimal point character used for monetary values char *mon_thousands_sep; the thousands place grouping character used for monetary values char *positive_sign; the character used for positive monetary values char *negative_sign; the character used for negative monetary values char int_frac_digits; number of digits to be displayed after the decimal point in international monetary values char frac_digits; number of digits to be displayed after the decimal point in monetary values char p_cs_precedes; If p_cs_precedes is equal to 1, then the currency_symbol appears before a positive monetary value. If p_ cs_precedes is equal to 0, then the currency_symbol appears after a positive monetary value. char p_sep_by_space; If p_sep_by_space is equal to 1, then the currency_symbol is separated by a space from the positive monetary value. If p_ sep_by_space is equal to 0, then there is no space between the currency_symbol and the positive monetary value. char n_cs_precedes; If n_cs_precedes is equal to 1, then the currency_symbol appears before a negative monetary value. If p_ cs_precedes is equal to 0, then the currency_symbol appears after a negative monetary value. char n_sep_by_space; If n_sep_by_space is equal to 1, then the currency_symbol is separated by a space from the negative monetary value. If n_ sep_by_space is equal to 0, then there is no space between the currency_symbol and the negative monetary value. char p_sign_posn; If p_sign_posn is 0, then parentheses encapsulate the value and the currency_ symbol If p_sign_posn is 1, the sign precedes the value and the currency_ symbol If p_sign_posn is 2, the sign succeeds the value and the currency_ symbol char n_sign_posn; If n_sign_posn is 0, then parentheses encapsulate the value and the currency_ symbol If n_sign_posn is 1, the sign precedes the value and the currency_ symbol If n_sign_posn is 2, the sign succeeds the value and the currency_ symbol In the statement, setlocale(LC_ALL, en_US); LC_ALL sets all the settings pertaining to a particular locale. Instead of LC_ALL the other permissible values are: LC_COLLATE LC_TYPE LC_MONETARY LC_NUMERIC LC_TIME which affects strcoll() and strxfrm() functions. affects all character functions. affects the monetary information provided by the localeconv() function. affects decimal-point formatting affects the strftime() function.
www.csi-india.org
The gprof utility in Linux Often a programmer may be interested in nding out how much time is being used in executing different functions in a very large or complex program with multiple functions. Perhaps the programmer may like to increase the efficiency of a function if a major chunk of time is being used in executing a particular function. The gprof utility helps in obtaining a programs prole. In order to use gprof the executable le should be compiled using the -pg option of gcc. For instance, suppose a program, saved by the name test.c, is as follows (the program is for illustrative purpose only):
no time accumulated
% cumulative self time seconds seconds calls 0.00 0.00 0.00 1 0.00 0.00 0.00 1 self Ts/call 0.00 0.00 total Ts/call 0.00 0.00 name func1 func2
% time
the percentage of the total running time of the program used by this function.
cumulative a running sum of the number of seconds accounted seconds for by this function and those listed above it. self seconds the number of seconds accounted for by this function alone. This is the major sort for this listing. the number of times this function was invoked, if this function is proled, else blank. the average number of milliseconds spent in this function per call, if this function is proled, else blank. the average number of milliseconds spent in this function and its descendents per call, if this function is proled, else blank. the name of the function. This is the minor sort for this listing. The index shows the location of the function in the gprof listing. If the index is in parenthesis it shows where it would appear in the gprof listing if it were to be printed.
calls
self ms/call
total ms/call
name
Call graph (explanation follows) granularity: each sample hit covers 2 byte(s) no time propagated index % time self children called 0.00 0.00 1/1 [1] 0.0 0.00 0.00 1 -----------------------------------------------0.00 0.00 1/1 [2] 0.0 0.00 0.00 1 -----------------------------------------------name main [9] func1 [1] main [9] func2 [2]
This table describes the call tree of the program, and was sorted by the total amount of time spent in each function and its children. Each entry in this table consists of several lines. The line with the index number at the left hand margin lists the current function. The lines above it list the functions that called this function, and the lines below it list the functions this one called. n
There's a serendipity to real life that the Internet can't duplicate. Do you use the library? For anything? Well, sometimes you end up picking up the book next to the one you were looking for, and it's that book that changes your life. ~ Laura Lippman, Hardly Knew Her: Stories What is the value of libraries? Through lifelong learning, libraries can and do change lives, a point that cannot be overstated. ~ Michael Gorman, Our Enduring Values: Librarianship in the 21st Century
Security Corner
Information Security
user should have the right to terminate the contract if it is not satised with the specications produced by the developer. On the other hand, if the developer is asked to include additional features and functions, the user should expect to pay additionally. Most users will insist that a development and implementation schedule be included in the contract. The developer will often have an opportunity to shape the schedule in situations, where it is more familiar with the development process than the user. The schedule should provide for weekly status meetings, so as to avoid any surprises from almost inevitable delays. Schedule slippages typically result from the user requesting design changes, changing developer staffing demands, unavailability of key user personnel for decision making, or unavailability of other resources. The contract should state the respective efforts, and levels of contribution required of each party in order to meet the schedule. Since slippages are to be expected, the developer will want to avoid agreeing to nancial penalties associated with delays and may wish to agree to exercise only "best efforts" to meet the schedule. If the user insists on a rigid schedule plus penalty for delays, the developer should negotiate to receive bonuses for early delivery. The acceptance testing process, typically involves testing each software module individually, and the entire system as a whole, to determine whether it conforms to the detailed design specications. The testing mechanism should be set forth in detail in the contract. It should state objective acceptance criteria, which can be developed with the assistance of an independent third party, if the user and developer cannot agree on what such criteria should be. From the developers standpoint, the contract should require the user to provide written acceptance or rejection of the system within a specied time period, or it will be deemed accepted. The developer should be afforded several opportunities and reasonable time periods to correct any defects that may cause the system to fail the acceptance tests before the user can
www.csi-india.org
Scope Changes
Changes in project scope or software functionality, from what the parties originally envisioned are almost inevitable during a custom software development engagement. Disputes between the developer and the client often arise concerning whether the developer was obligated to make a change, who should bear the cost of the change, the cost itself, and who should be responsible for any resulting delay. A written development agreement, should state a clear mechanism for requesting, approving and implementing any changes in scope or software functionality. The procedure should require the client to request the change in writing and the developer to respond, again in writing, with a proposal describing the fee and schedule impact of implementing the requested change. The developer should not be obligated to proceed with making the change until the parties have agreed on the cost and schedule impact, as well as the specications for the revised software. In the absence of a clear contractual provision addressing change orders, the developer is particularly at risk in xed price projects. The client might request a change it perceives to be minor but which actually entails a signicant amount of extra effort by the developer.
completion of the program testing phase, and nally, upon successful acceptance testing including operation of the system in production using live data. The client will typically want to avoid making large payments at the beginning of the project so as to keep the developers interest in performing promptly. Similarly, in order to maintain an incentive for the developer to provide needed assistance during the often painful conversion from an old system to a new one, the client may nd it useful to withhold a nal payment until after the system has proven itself capable of successfully operating in a live environment for some period of time, e.g., 90 days. A very clear payment schedule in a written agreement also benets the developer. Once a project milestone has passed, the developer can rightfully refuse to proceed with further work until it receives the required payment.
One way to resolve this concern is, for the client to receive royalties from the developers further distribution of the software. While there are no standard guidelines as to the amount of the royalty, it is not uncommon for the royalty to terminate once the client has recovered the cost of the software.
Ownership Rights
The area of ownership or proprietary rights presents a challenging and complex range of issues. Without a written contract clearly stating the parties agreement on ownership of the software created by the developer, Copyright Act, 2012 will apply to vest ownership of the copyright in the developer. Ownership of the copyright is, for practical purposes, ownership of the software. The copyright owner has the exclusive rights to copy, distribute and modify the software. The client will own the actual copies of the software delivered by the developer and residing on its computers, but without ownership of the copyright it cannot market, distribute or duplicate the software. Section 19 of the Act stipulates the mode of assignment. Sub Section (1) thereof provides that in no uncertain term that assignment has to be in writing signed by the assignor or by his authorized agent. As per sub Section (2) of Section 19 of the Act, the assignment of the copyright, any such work is to identify such work and also specify the rights assigned and the duration and territorial extent of such assignment. In many cases, however, the client may only be interested in using the software for its internal business purposes, in which case ownership of the software, as opposed to a license to use, is not a critical concern. The client may object, however, if after paying millions of dollars to fund the development of new system, the developer then wishes to commercially distribute the software to others, including the clients competitors.
Payment Terms
Software development engagements are typically paid for, on either a xed price/ milestone or time and materials basis. Since developing software is extremely labor-intensive and complex projects can take years to complete, the developer will usually prefer to be paid on a time and materials basis so as to recoup all its costs and maintain its prot margin. The client will usually want the job to be done on a xed fee basis, so as to be able to budget for a known expense. It is hardly reasonable for the developer to be expected to fund the entire development process, and wait until project completion before receiving any payment. Accordingly, many development agreements provide for regular periodic payments. An initial payment may be made upon signing the agreement, followed by a second payment upon completion of the detailed design specication phase. Subsequently, payments can become due after completion of the coding phase,
Security Corner
IT Act 2000
Prof. IT Law in Conversation with Mr. IT Executive Similarities between technology and law; need for collaboration Issue No. 12
IT Executive: Welcome Prof. IT Law! In our last session you explained quite lucidly how, both the law and technology open up new business options. What will we discuss today?
Prof. IT Law: And I also explained how the common objective of both technology and law render predictable outcome of human plans and actions. We will discuss that at greater length as desired by you. IT Executive: Thank you. I nd that connections between law and technology quite fascinating. Please tell me more about it. Prof. IT Law: We know that technology opens up new business options. For example, the Internet opened up new vistas for commerce in the form of e-commerce. IT Executive: Yes, and e-commerce has opened up many wonderful new options, such as C2B and C2C commerce and so on. Prof. IT Law: You are right. The Internet, The World Wide Web, and the creation of cyberspace in which people work, seek entertainment and interact socially, has spawned so many new options that did not exist barely 10 years ago. Just as a case in point, consider the possibility of reverse auctions. Would that have been possible without the Internet? IT Executive: Not at all. Like many other things we now take for granted such as e-ticketing, web check-in for ights, and so on. Prof. IT Law: Yes. Even the law has been a great innovator except that the law moves much more slowly. IT Executive: I am beginning to see what you mean. But please give me some examples. Prof. IT Law: Take the case of the Companies Act or company law. It has made possible, some fairly revolutionary options. For example, company law makes it possible for several thousands of people to combine or pool their capital, for common goals without even knowing each other. When they do this, they are shareholders in that company that executes their common goal. IT Executive: Wow! I did not think of it this way. I too am a shareholder in a few companies. What else does the company law do to open up new business options? Prof. IT Law: Company law permits separation of ownership and management. This is a great step for business. Now the owners [shareholders] of a company need not be its managers. That can be delegated to professionals. IT Executive: Great. And what else? Prof. IT Law: Because company law limits liability of the shareholders to the value of their shares, it has encouraged commerce and industry in areas that are risky and have a long range outlook in terms of returns. IT Executive: I see. It does look like company law in itself is some kind of great innovation by the lawmakers. Prof. IT Law: Yes. And so are laws pertaining to contracts, insurance, transport, stock exchanges, banking, and so on. Each of these open up new business options and does as much as technology to keep the industry growing. IT Executive: I can see your point of view and I quite agree with what you say. But what connections do these laws have with technology? Prof. IT Law: Each of these laws, and the businesses they serve or facilitate, has been impacted by technology. Especially the Internet and the World Wide Web. For example, company law now provides for e-voting, electronic board meetings, and electronic filings. Insurance and contracts have moved online in a big way. Also travel and communication have been revolutionized by the Internet. IT Executive: I understand. So what would you advise those engaged in creating or advancing technology? Prof. IT Law: I would advise them to learn the basics of the laws that apply to them; the speed at which they work, and progress does not give them much margin for error. So knowing about the essentials of law will make them safer and more intelligent in their approach to technology and its advancements. IT Executive: I guess law and technology will need to collaborate which means lawyers should learn more about technology and technology advances. Prof. I T Law: Yes, and technologists must understand more about the law. And help shape the laws that will impact their plans and work. IT Executive: That is an interesting concept. I do hope to work with you to make computer professionals more law-savvy. Prof I T Law: Thank you, I appreciate your openness and willingness to collaborate with the law. IT Executive: Thank you Prof I T Law, I look forward to more sessions with you.
n
www.csi-india.org
Test your Knowledge on e-Libraries Solution to the crossword with name of rst all correct solution provider(s) will appear in the next issue. Send your answers to CSI Communications at email address csic@csi-india.org with subject: Crossword Solution - CSIC March 2013
1 2 3 4 5 6 7
CLUES
ACROSS
1. 5. 8. 11. 12. 13. 16. 18. 19. 20. 21. 23. 25. 27. 29. A digital collection management software (8) Sharable content object reference model (5) An opensource asset management system for digital contents (9) A numerical code assigned to a book to uniquely identify it (4) Helps to locate a le or resource on the Internet (3) Online public access catalog (4) An archive for electronic preprints of scientic papers (5) Information about the publication (7) A portable format for word processing (3) Portable Document Format of les (3) A bibliographic database and model for scientic community (6) An opensource repository software package (6) Digital Book (5) A digital collection management software (9) A technical framework developed by W3C for description of resources (3) 31. An initiative by libraries and publishers to provide usage reporting (7) 33. A computer bus interface to connect to mass storage devices (4) 34. Data about data (8)
10
11 12 13 14 16 17 18 20 21 22 23 24 19 15
DOWN
1. 2. 3. 4. 6. 7. 8. 9. 10. 14. 15. 17. 20. 21. 22. 24. 26. A standard meta-language for mark-up languages (4) A non-periodical work complete as a complete set (9) A digital storage directly attached to a system (3) A document type denition for archival material (3) A unique code for titles of periodical publications (5) An e-book format (4) An Internet protocol (4) An e-book format (3) A short summary describing the main idea (8) An enterprise content management system (8) An organized collection of information resources (7) Macintosh audio le format (4) A programming language that controls printing (10) A le previewer for the GNOME Desktop Environment (5) An open standard based on open web languages for ebooks (4) A Digital Library for offline access (8) Standard for the storage and exchange of two-dimensional graphical data (3) 28. A language for document style, semantics and specications (5) 30. An Internet audio le format (4) 32. A document type denition for scholarly resources (3)
25
26
27 29 31 32
28 30
33 34
A B
D
5
R
2
A
6
A T
T
7
S T R A C T I
A
8
L O
K E X C
9 11
T R
O Z
O B J E C T O R Y
O P
10
N I
U
12
K
14
M P
P
15
D
13
U N T
16
E R A T I V
A F
O N
N
17
N S I
A R
18
L
25
Y
26
19
R E
20
H A
21
P E
23
R C U
24
22
I E N D
N
27
S I
A L
S K E
Congratulations to P Deepa (Dept. of MCA, Panimalar Engineering College, Chennai) for getting ALL correct answers to February 2013 months crossword.
O L O G
O B O L
V A L U E
M
29
M U
R
28
L L
L A
Ask an Expert
Many thanks, Sandeep. In the past, we had discussed this issue alongwith suggestions and concerns at length. Keeping in mind of maximum size of storage and the maximum as well as minimum permissible value for a particular data type, here comes some interesting observation. For example, in a 32-bit machine, a variable of int (signed) type would take the minimum value as (-231 i.e. -2147483648). If noToTest is say, (-231), and you try to divide by 2, the buffer can hold the result, as the sign remains negative whereas value when divided by 2 becomes (-230 i.e. - 1073741824). So, this should work ne.
[We appreciate all views, including the current one, from our readers expressed on this topic. Many thanks for the analysis and explanation. Editors, CSIC]
Send your questions to CSI Communications with subject line Ask an Expert at email address csic@csi-india.org CSI Communications | March 2013 | 32 www.csi-india.org
Happenings@ICT
H R Mohan
AVP (Systems), The Hindu, Chennai Email: hrmohan.csi@gmail.com
'Third-party system integrators in demand as CIOs take to outsourcing'. At TCS, Rajesh Gopinathan will succeed S. Mahalingam as the companys CFO. Many HCL campus hires yet to join the company. Tech Mahindra in favor of hiring locals in overseas centers. TCS to continue campus hiring. The ratio is 60% N. Chandrasekaran, CEO and MD of TCS. Azim Premji transfers Rs 12,300-cr worth shares to trust to help improve the school education system and allied areas.
CSI Report
Mobility Track
Mr. Lalit Shawney, Director, Lalit Sawhney and Associates, chaired the Mobility Track. The Enterprise Mobility Track covered the opportunity, provided by increasingly popular and powerful smartphones and feature phones, which are in the hands of knowledge workers, senior management, 'feet on street', and all level of employees today. With rapid proliferation of mobile devices, more powerful than the standard corporate desktop, a large number of working people are now 'connected' to work for longer hours than before. Often this access happens on the same device, which supports personal as well as corporate applications. The speakers Mr. Gerard Rego, Director Developer Experience, NOKIA, Mr. Sowri Santhanakrishnan, Vice President & Venture Leader, Mobility Solutions, Cognizant Technology Solutions, Mr. Suresh Anantpurkar, Consultant Mobile Governance, ExPresident, mChek, Mr. Nitin Bhandari, Associate Vice President New Products & Partnerships, Vodafone, Mr. Jayanta Prabhu, Group CTO, Essar Group, Mr. Anish Gupte, IT Infrastructure & Services Lead, Kraft Asia Pacic, Ms. Manjula Sridhar, Sr. Director Sales at Arcot Systems (CA technologies), Mr. LN Sundarrajan, Founder Rewire, and Mr. Amit Chaubal, IS Security & Compliance Manager, Kraft Asia Pacic covered the opportunity, the challenges, and practical implementation of this consumerisation in the enterprise world and government, including the required technologies and security / network implications - to allow people to work the way they want to work, and allowing enterprises to leverage trends and innovations to gain business advantage. The two interesting and interactive sessions covered policy issues, cost savings, and productivity gains; the disruptive character of the technology, how 'the pilots are nally ying' and how these technologies are changing the world.
Security Track
The security track was a blend of latest trends in organizational security, and how various industries are strategizing to combat them. Mr. AK Viswanathan, Senior Director, Deloitte India, was the track chair. In his introductory speech he highlighted how security remains a dynamic talked about topic and shared the agenda for the day. The session on Security Intelligence Operations Centre (SIOC), was presented by two subject matter experts namely, Mr. Mark Fernandez, Partner, Deloitte Canada and Mr. Vinay Puri, Senior Manager, Deloitte India. The interactive session focused on global and Indian perspective of the growing complexities in securities for an organization. Numerous test cases and scenarios were showcased and discussed. The Security panel discussion on Winning strategies to counter emerging security threats was moderated by Mr. Vinay Puri, Senior Manager, Deloitte India. Eminent panelist included Mr. Anantha Sayana, Vice President and Head - Corporate IT, Larsen & Toubro Limited, Mr. Ashish Pachory, Chief Information Officer at Tata Teleservices Limited, Mr. Jagdish Mahapatra, Managing Director, McAfee India and SAARC, and Mr. Pravin Sharma, Chief Information Systems Officer and Assistant General Manager, Union Bank of India. The panelist and delegates shared and deliberated on the emerging threats, and how an organization can guard against such threats, based on their risk appetite. Mr. Pinakin Dave, National Manager, Channels and Alliances for McAfee India on Security Connected Framework, shared enterprise wide solution by McAfee India in order to provide a seamless integration of solutions, services, and partnerships
www.csi-india.org
Ms. Bharati Lele, Head Innovations, L & T Infotech, shared some very interesting eye-popping facts about social media, importance of social media monitoring in CRM, and relevance of social analytics. An engaging Q and A session with the speakers gave the audience an opportunity to understand the future of social media and integrated communication, as well how social media would start impacting other areas of business.
Dr. A B Pandey from UIDAI, made an interesting presentation revolving around AADHAR project that is going to capture data of over 1.2 Billion residents of India. The complexities of nature of data, size, and challenges were eye openers. Elephant in the room, are corporate feeding it ? by Mr. Arun Gupta, CIO, Cipla shared his candid view that business value has to be assessed before embracing projects of such nature and reiterated that one should critically evaluate the need before embarking on the journey of Big Data. Mr. Sanjay Mehta CEO, MAIA Intelligence presented an overview of the Power and Reach of analytics. Mr. Pushkar Bhat, SAP shared capabilities of their product HANA, which offers Big data analytics using In-Memory Computing technology. Presentations by Sanjay and Pushkar highlighted the importance of analytics, in delivering tangible business value and their contribution in making smarter faster decisions. A unique and highly interactive panel discussion, Big debate on Big data was much appreciated by the speakers and the enthusiastic audience.. Mr. S. S. Mulay of Netmagic solutions presented Data Jig saw Puzzle- Tools & Technologies about Hadoop, and all other relevant technology elements in Big Data environment. Mr. Harish Ganesan - CTO and Co-Founder of 8KMiles, made his pitch Big Data - beyond hype and shared implementation experience through a real life case study. Mr. Yogesh Sawant of Hitachi data systems shared interesting real life cases, about deployment of Big data solutions within his parent company and clients. He also gave his views about Information Cloud and some of the problems that have been solved using Big Data Analytics.
Officer, DDB Mudra Group, and Mr. Shashi Kumar Ravulapaty, SVP & CTO, Reliance Capital. The discussion revolved around the requirement of the board and impact of emerging technologies on the Boardroom agenda. The joint CSI and KPMG, Thought leadership paper was released by Mr. Kunal Pande and Mr. Ravi Eppaturi along with Mr. R. Ramanan, Prof. Kannan Moudgalya, and Mr. Rajiv Gerela. CSI Mumbai Chapter Mobile Application was launched on Android, iOS and Windows, by Mr. Sandip Chintawar, Mr. VL Mehta, Mr. Ravi Eppaturi, and Mr. Chari.
Closing Session
Mr. Ravi Eppaturi, Chairman, CSI Mumbai Chapter, gave the vote of thanks and reiterated the conference highlights: 1 One Day Conference with 50 speakers across 5 tracks 2 Over 500 delegates 3 CSI-KPMG Thought leadership paper released on the conference theme Making Emerging Technologies a Boardroom Agenda 4 C++ and C Spoken Tutorial released 5 CSI Mumbai Chapter Mobile Application launched Available on Google Workspace 6 IIT Bombay Partnership, Venue, Active Participation 7 Lively CXO Theme Discussion 8 Aakash 2 and Spoken Tutorial demos 9 Pre Conference Survey In collaboration with KPMG, over 100 responses 10 Speaker Memento was designed by an artist from Mouth and Foot Association A CSR initiative by CSI Mumbai Chapter 11 CSI IT2020 Advertisement on Rediff Visit www.csimumbai.org/IT2020 to download the conference, Presentations CSI KPMG Thought Leadership Paper Photos CSI Mumbai Chapter Android Application
n
Theme Discussion
Mr. Kunal Pande, Partner, KPMG moderated the discussion. The group of business leaders and CIOs who joined the discussion included Mr. R. Ramanan, CEO, CMC Limited, Mr. Vipin Agarwal, India Chair, BSA, Mr. C Kajwadkar, CIO,CCIL, Mr. Sebastian Joseph, Chief Technology
Congratulations to you, for successfully conducting key event of 2013. I admire all of your efforts to make Indian IT a reckoning industry on the world map.
CSI Report
Dr. Dharm Singh*, Mr. Sanjay Mohapatra** and Ms. Ridhima Khemasra***
*Organizing Chair and Convener SIG-WNs CSI **Chairperson, Div IV, CSI ***Organizing Secretory
Special Interest Group Wireless Networks (SIG-WNs), Division IV, and Udaipur Chapter Computer Society of India, Geetanjali Institute of Technical Studies, Udaipur, organized an International Conference on Advance Computing and Creating Entrepreneurs (ACCE2013) in technical collaboration with by IEEE Computer Society Chapter India Council at Udaipur, Rajasthan, India, during Feb 19-20, 2013.
Inaugural Session
ACCE-2013 started on Feb 19th 2013, with the inaugural session at 10.30 a.m, in Geetanjali Medicity Campus, Udaipur. The conference was inaugurated by Sh. Raghuveer Meena MP, Lok Sabha, Udaipur constituency. He emphasized on the use of communication and advance computing for the welfare of society at large. Key note speaker Prof. Bharat Bhargav, guided the delegates about cloud computing and how it could be used for the upliftment of physically gifted people. He emphasized on thinking out of the box and using current technology to create something innovative. Dr. R K Nahar, Guest of Honor, pointed out the rampant change in media and devices in past decade. He emphasized the research in nano- technology and semiconductors devices to facilitate our living. Mr. M L Talesra, Chairman, Computer Society of India, Udaipur Chapter, informed the housed that Udaipur Chapter has 171 Members and three Institutions as Institution members. The Udaipur Chapter, established in 1986, witnessed organization of many technical events, seminar, and state convention .
e-Innovation
Guest of honor, Mr. M D Agarwal, immediate Past President, Computer Society of India and Head IT, BPCL highlighted the 12th Five Year Plan, and discussed CSI ethics and values. He emphasized about the role of network research in governance indicatives. Technological change and innovation, driven by research and development have been found to be the most important sources of increased productivity, higher growth, and better welfare. He said the country is now recognized as a global player in software and software services sector. Over the years several initiatives have been taken in the Information Technology sector to foster innovation, improve delivery of e-Services to citizens, and bring about profound change in the way business is conducted and the way Government works. The 12th Five Year Plan considers ICT as a key driver for Indias economic growth; budget outlay for ICT based projects has been increased by more than 100%.
Role of SIG-WNs
Dr. Dharm Singh, Convener SIG-WNs, presented the role and activities organized
Continued on Page 37
CSI Communications | March 2013 | 36 www.csi-india.org
CSI Report
Dr. M Sundaresan
Professor and Head, Department of Computer Science and IT Bharathiar University Coimbatore
Inaugural Function
Valedictory Function
Mr. S Ramasamy delivering inaugural address. (From L to R) Mr. D Chandrasekarn, Mr. A Sundar and Dr. C G Ravichandran.
Dr. M Sundaresan T N State Student Coordinator (Chennai, Coimbatore,Pondicherry) distributing Prize and Certicates to the participants of CSI Sixth Tamilnadu State student convention held at RatnaVel Subramaniam College of Engg. & Tech., Dindigul.
Recommendations
The conference concluded with healthy discussion and recommendations were put forward based on the technical sessions. These are: End to end framework for application centric network infrastructure is needful for implementing latest applications. Online resources should be strengthened. RFID, sensor technology with cloud computing can be employed as an enabler for physical challenged and gifted children. Promote vernacular languages for communication in different media. Cloud storage should be used for educational institutes among the students and faculty to effectively store, share, and distribute educational data. n
Valedictory Session
The conference valedictory session was organized in GITS campus at 4.30 p.m on 20th February. Dr. N S Rathore, Dean, College of Technology and Engineering, Udaipur, graced the occasion as the Chief Guest.
e-Security
Dr. S C Bhatia, fellow of CSI was the guest of honor. He spoke about advance computing technologies at large, and how they could be used to improve the situation of population in India. He discussed about hacking and security issues. The cyber security threats come from a wide variety of sources and manifest themselves in disruptive activities that target individuals, homes, institutions, business, national infrastructure, and Governments alike. Their effects carry signicant risk for public safety, security of nation, and the stability of the globally linked economy as a whole.
I must say I nd television very educational. The minute somebody turns it on, I go to the library and read a good book. ~ Groucho Marx
CSI Report
Mohan Datar
Fellow And Advisor, Csi
The new membership system will overcome all these problems. Currently,
www.csi-india.org
successfully used this functionality and have registered as new members of CSI.
User Feedback
Users were requested to give their feedback about the new portal. A special feedback form was provided to capture the feedback. More than 400 feedback entries were recorded during 26th Jan to 18th February 2013. After eliminating
some duplicates, there were 355 unique entries. It shows that 94% viewers have rated the portal as Good, Very Good or Excellent.
was decided to give a free subscription to every 5th feedback entry. However, after seeing the feedback volume, CyberMedia has agreed to increase the offer from 20 free subscriptions to 80. The list of lucky winners will be published on the portal. The detailed analysis of the feedback is presented below:
Feedback Analysis For 26-01-2013 to 18-01-2013 Non-Member Feedback S. No 1 2 3 4 5 Portal Feature Look & Feel Ease of use Performance Content Quality Overall Excellent 90 105 114 123 432 V Good 63 59 58 56 236 Good 55 40 43 36 174 Avg 18 21 11 11 61 Poor 3 4 3 3 13 Excellent 39 55 48 57 199 Member Feedback V Good 41 38 43 38 160 Good 29 17 19 16 81 Avg 4 3 3 2 12 Poor 2 2 2 2 8 Excellent 129 160 162 180 631 Total V Good 104 97 101 94 396 Good 84 57 62 52 255 Avg 22 24 14 13 73 Poor 5 6 5 5 21
6%
34% 36%
Continued on Page 50
CSI Communications | March 2013 | 39
FORM IV (Rule No. 8) Statement about ownership and other particulars of the CSI Communications 1. Place of Publication 2. Periodicity of its Publication 3. Printers Name Nationality Address Unit No. 3, 4th Floor, Samruddhi Venture Park, Marol MIDC Area, Andheri (E). Mumbai 400 093. Monthly Mr. Suchit Gogwekar Indian Computer Society of India Unit No. 3, 4th Floor, Samruddhi Venture Park, Marol MIDC Area, Andheri (E). Mumbai 400 093. Mr. Suchit Gogwekar Indian Computer Society of India Unit No. 3, 4th Floor, Samruddhi Venture Park, Marol MIDC Area, Andheri (E). Mumbai 400 093. Dr. R M Sonar Indian Shailesh J. Mehta School of Management, Indian institute of Technology, Powai, Mumbai-400 076. Computer Society of India Unit No. 3, 4th Floor, Samruddhi Venture Park, Marol MIDC Area, Andheri (E). Mumbai 400 093.
5. Editors Name Nationality Address 6. Names and Address of Individuals who own the newspaper and partners or shareholders holding more than one percent of the total capital
I, Suchit Gogwekar, hereby declare that the particulars given above are true to my knowledge and belief. Sd/Suchit Gogwekar Signature of the Publisher
www.csi-india.org
CSI News
From CSI Chapters
Please check detailed news at: http://www.csi-india.org/web/csi/chapternews-March2013 SPEAKER(S) AHMEDABAD (REGION III)
10 February 2012: Campus Interview for CSI Students The chapter initiated activities for shaping the future of CSI students by enhancing their career. Chapter organized Campus Recruitment Drive in association with IBM for pre-nal year students of BCA/BBA/MBA and MCA. Campus interviews were conducted by HR-GPS department of IBM, India wherein company tested the potential of students on different parameters as required by industry. Some CSI students were selected by IBM after interview.
Conducting Campus Interview
BANGALORE (REGION V)
Mr. E S Chakravarthy, Mr. Ramakrishnan, Joseph Sunil Nallapalli, Prem Sankar, Sandeep J Alur, Niranjan Maka, T Sabapathy, and Tathagat Verma 10-11 January 2013: Workshop on Faculty Development Program Mr. Chakravarthy delivered keynote address on Software Trends. NIIT, TCS, Ericsson, Microsoft, VMWare, Ninestar Technologies and Yahoo! supported the FDP. They sent experts to address FDP as Outcome Based Education Mr. Ramakrishnan, Leadership, management & Administrative challenges Joseph Sunil Nallapalli, Instilling thinking, Innovation & Research culture Prem Sankar, Current Trends in Technology Sandeep J Alur, Future of Cloud Technology Niranjan Maka, Mobile Apps Development T Sabapathy and Advanced Lean & Agile methods by Tathagat Verma respectively.
Conducting FDP
Participants of the Regional Finals of Discover Thinking 2013 quiz programme hosted by CSI Cochin Chapter on 18th February 2013 at Cochin along with the oce bearers of CSI Cochin Chapter
CSI CS I Co C Communications mmun mm un n ic cat atio ions io ns | Ma March Marc rch rc h 2013 2013 | 41
Mrs. S Soraja AP, IT of Mepco Schlenk Engineering College, Sivakasi interacting with the students during the Workshop on 7th Jan 2013.
2 February 2013: CSI Discover Thinking Quiz Chapter successfully organized a CSI Discover Thinking Quiz competition for school students. In this event more than 10 students from various schools participated. Top 5 teams were selected for nal round. Students were tested in the eld of maths, science and sports. Prizes were distributed for them by Chair Person Dr. T Revathi.
Dr. T Revathi Chair person CSI Sivakasi Chapter Distributing the certicates to the Winners.
Please send your event news to csic@csi-india.org . Low resolution photos and news without gist will not be published. Please send only 1 photo per event, not more. Kindly note that news received on or before 20th of a month will only be considered for publishing in the CSIC of the following month.
CSI CS I Co Comm Communications mmun mm unic un ic cat atio ions ns s | Ma March M r h 2013 rc 201 2 0 3 | 42 01
www. ww w.cs w. csics i-in indi in dia di a.or a.or org g www.csi-india.org
Dignitaries on Dias: Mr. Rajanikumar, Mr. D Suribabu, Dr. U Rangaraju Principal, and Mr. Shabbir
CSI CS I Co C Communications mmun mm un n ic cat atio ions io ns | Ma March Marc rch rc h 2013 2013 | 43
Guests on dias
CSI CS I Co Comm Communications mmun mm unic un ic cat atio ions ns s | Ma March M r h 2013 rc 201 2 0 3 | 44 01
www. ww w.cs w. csics i-in indi in dia di a.or a.or org g www.csi-india.org
SPEAKER(S)
Principal, Dr. D V Jadhav, and Mr. Girish
CSI CS I Co C Communications mmun mm un n ic cat atio ions io ns | Ma March Marc rch rc h 2013 2013 | 45
SPEAKER(S)
Chief guest Mr. Ramasamy, Dr. S Chitra Ph. D Principal and Prof V Keerthika
CSI CS I Co Comm Communications mmun mm unic un ic cat atio ions ns s | Ma March M r h 2013 rc 201 2 0 3 | 46 01
www. ww w.cs w. csics i-in indi in dia di a.or a.or org g www.csi-india.org
SPEAKER(S)
Dr. Ch. Aswanikumar
8 February 2013: Guest Lecture on Computer Network and Security System The Chief Guest Mr. Balaji Ravi spoke on Computer Network and Security System, its history and evolution. He insisted that students should update themselves to face competing environment. Dr. K Ramasamy delivered presidential address. Third Year and Final Year Students from dept of Computer Science and Engineering, Information Technology and Electrical and electronic Engineering participated.
Speaker conducting the lecture
CSI CS I Co C Communications mmun mm un n ic cat atio ions io ns | Ma March Marc rch rc h 2013 2013 | 47
SPEAKER(S)
Mr. G Vinoth, Analyst, Verizon Technologies, Chennai
21 January 2013: National Conference on Computer Applications and Information Technology The chief guest explained the objectives of the conference and asked participants to be radical in the research in the eld of computer science and Information Technology.
The guest Mrs. S Muthumala, releasing the proceedings of the National Conference CCAIT13. Director Mr. P Venkatesh Raja, Dr. S Suyambazhahan, and Mrs. V Sujatha
2 February 2013: Guest Lecture on Principles of Compiler Design Various topics like Lexical Analyzer, Syntax Analyzer and Semantic Analyzer were covered and the concepts were explained with problems and examples. It provided a platform to the students to recollect and gather new ideas in the related topics.
Guest lecturer and participants
CSI CS I Co Comm Communications mmun mm unic un ic cat atio ions ns s | Ma March M r h 2013 rc 201 2 0 3 | 48 01
www. ww w.cs w. csics i-in indi in dia di a.or a.or org g www.csi-india.org
Following new Student Branches Were Opened as Detailed Below REGION III
IPS College of Technology & Management, Gwalior, M.P. The Inauguration of Student Branch Chapter on January 31, 2013, began with lightening of lamp and Saraswati Vandana. The inaugural function was followed by a technical computer quiz titled as Computer Ville. The quiz was organised for 9th to 12th standard students. The winner team was Rishi Galav Hr. Sec. Public School.
REGION V
Audisankara College of Engineering for Women, Nellore, A.P. The CSI Student Branch was launched at Audisankara College of Engineering for Women on 31-012013, under the auspices of CSE department of the college. Participating in the event as the Chief Guest, Mr. Y Kathiresan explained about the activities to be taken up by the CSI Chapter and the techniques that would help students to face the technical interviews successfully. Srinivasa Ramanujan Institute of Technology, Anantapur, A.P. Departments of CSE & IT inaugurated CSI-SRIT Student Branch conducted workshop on Information Security Awareness and SAP Career Opportunities on 19th January 2013. Chief Guest was the resource person for the workshop on Information Security Awareness. He gave wonderful presentation and covered topics such as - how to choose strong passwords, precautions when downloading email attachments, types of mails, attacks, and prevention. Vidhya Nikethan College of Engineering, Thirupathy, A.P. CSI Student Branch was inaugurated on 28th January, 2013, by Chief Guest Mr. S. Ramasamy. He informed that employment of graduates in computer science discipline is only 5% in India. He said that through CSI student branch activities, students can acquire additional co-curricular skills needed in the present day competition for employment of engineering graduates. Mr. Y Kathiresan delivered a guest lecture on Awareness on CSI and Unique Identity of Students.
REGION VI
L to R: Dr. D V S Bhagavanulu, Mr. Y Kathiresan, Dr. P C Krishnamachary, Dr. V V Rama Prasad, and Mr. S Ramasamy
Yadavrao Tasgaonkar College of Engineering and Management (YTCEM), Mumbai TIt was the occasion of inauguration function of CSI-YTCEM on 22nd January, 2013. The function was followed by seminar on the topic Adaptive business intelligence through L to R: Dr. S K Ukarande, Principal, addressing the Inaugural web personalized recommendation by Chief Guest Dr. Subhash Shinde.
REGION VII
Jeppiar Institute of Technology, Chennai The inaugural function of CSI Student Branch in Jeppiaar Institute of Technology was held on 23rd January 2013. The Chief Guest Mr. Rajan T Joseph inaugurated the CSI Student Branch and enlightened students about open source, technical skills, and managerial skills.
session of CSI-YTCEM. On the dias Mr. Kiran Chorghe, Prof. Sumit Bhattacharjee, Dr. Subhash Shinde, Prof. Vijay Shelake, during the inauguration of CSI-YTCEM Students Chapter.
Kathir College of Engineering, Neelambur, Coimbatore Lightning the lamp by dignitaries from L to R Dr. V Kannan, The Chief Guest Mr. Ranga Rajagopal Mr. Y Kathiresan, Mr. Rajan T Joseph, Dr. Marie Wilson inaugurated CSI-Student Branch on 23rd January, 2013. He shared his views on Role and purpose of CSI student branches. Guest of honour, Mr. Kaiser Masood, gave the special lecture on IT Trends and Industry Expectations from fresh recruits. Guest of honour, Mr. Vaikunt R Prabhu, talked Chief Guest and organizing team on the role of Finishing School for todays engineering students. Knowledge Institute of Technology (KIOT), Salem Department of Computer Science and Engineering of KIOT organized the inaugural function of CSI Student Branch on 28th January, 2013. Dr. Lakshmi Narasimhan inaugurated the branch and spoke on Research Issues and Challenges in Cloud Computing. He delivered his new ideas and spoke about job opportunities in Cloud Computing.
CSI CS I Co C Communications mmun mm un n ic cat atio ions io ns | Ma March Marc rch rc h 2013 2013 | 49
Four good reasons to JOIN Take part in various forums and discuss, your favourite topics Make a contribution on National level through our open exchange of ideas seminars Share your specialized knowledge with colleagues Receive new information on developments in the eld via regular conferences, seminars, workshops etc.
WE INVITE YOU TO JOIN Computer Society of India A professional body guiding Indian Information Technology Industry
Join us and
become a member
I am interested in the work of CSI . Please send me information on how to become an individual/institutional* member Name ______________________________________ Position held_______________________ Address______________________________________________________________________ ______________________________________________________________________ City ____________Postal Code _____________ Telephone: _______________ Mobile:_______________ Fax:_______________ Email:_______________________ *[Delete whichever is not applicable] Mail this coupon to: Computer Society of India, Unit 3, 4th Floor, Samruddhi Venture Park, MIDC, Andheri , Mumbai 400 093 URL: http://www.csi-india.org Email: helpdesk@csi-india.org Continued from Page 39
Performance by all
4% 18% 47% 29% 2%
Excellent V Good Good Avg Poor
Performance by Members
3% 16% 42% 37% 2%
Excellent V Good Good Avg Poor
Performance by Non-Members
5% 1% 19% 25%
Excellent V Good
50%
54% 24%
Prof. S V Raghavan
Vice President & Chair, Conference Committee, CSI
Contact Information
Photography did not eliminate painting. Film did not eliminate theater and so on. One technology feeds on the vocabulary of the other, and I believe that the electronic technology has taught us to value the reading on the page, and the reading on the page has taught us what we can do on the screen. They are alternatives, but theyre certainly not synonymous. ~ Alberto Manguel A library may look like a single building, but please don't be misled by the walls. It's a single link in an enormous chain. It's a single being in a gigantic ecosystem of words and thoughts and ideas. ~ Shula Klinger, Richmond, BC. Quoted in Beyond Words: BC's Public Libraries Are Changing Lives I always tell people that I became a writer not because I went to school but because my mother took me to the library. I wanted to become a writer so I could see my name in the card catalog. ~ Sandra Cisneros I must say I nd television very educational. The minute somebody turns it on, I go to the library and read a good book. ~ Groucho Marx I have always imagined that Paradise will be a kind of library ~ Jorge Luis Borges What is the value of libraries? Through lifelong learning, libraries can and do change lives, a point that cannot be overstated. ~ Michael Gorman, Our Enduring Values: Librarianship in the 21st Century I had plenty of pimples as a kid. One day I fell asleep in the library. When I woke up, a blind man was reading my face. ~ Rodney Dangereld
Registered with Registrar of News Papers for India - RNI 31668/78 Regd. No. MH/MR/N/222/MBI/12-14 Posting Date: 10 & 11 every month. Posted at Patrika Channel Mumbai-I Date of Publication:10 & 11every month
If undelivered return to : Samruddhi Venture Park, Unit No.3, 4th oor, MIDC, Andheri (E). Mumbai-400 093
Criteria: The proposing Student Branch should be very active, with a track record of several CSI activities, and be in good standing through the years 2012-13 and 2013-14. In case of multiple proposals for convention at the same location, the decision will be broadly based on the parameters given below. a) b) c) d) e) f) g) h) Number of years of continuous valid student branch at the college (without break) Average student strength over the past three years Number and quality / level of activities at the student branch Prompt submission of activity reports and nancial accounts Ability to attract good speakers from Industry Availability of infrastructure and other resources Financial strength and potential Accessibility and other general conditions
The Proposal: Interested Student Branches are requested to send electronic proposals with all relevant data, including the information stated below. a) b) c) d) Type of convention proposed: National/Regional/State level (Proposers of National Convention must have ability to mobilize participation from multiple states and experience of having conducted regional/state level convention earlier ) Proposed dates (at least two days) please indicate two sets of dates A statement of case why the SB should be considered favourably for the proposed event Signed undertaking by the head of the institution to provide all the required support (Document with Scanned signature)
How to send: The Student Branches may send the proposals through the Regional Student Coordinator (RSC) with copy to Education Directorate (admn.officer@csi-india.org), concerned Regional Vice President (RVP) (http://www.csi-india.org/web/guest/executivecommittee) and National Student Coordinator.(Contact details of NSC/RSC are available at http://www.csi-india.org/web/guest/104). Time line: Interested Student Branches may please send the proposals with all details through proper channel as explained above to reach CSI Education Directorate before 10 April 2013. Selection: A Committee constituted by CSI, including the Honorary Secretary, National Student Coordinator, Director (Education) will assess the proposals and make the decisions. CSI Support: CSI extends partial nancial assistance, in accordance with the availability of budgetary resources, subject to the approval of the Executive Committee. CSI also supports the publicity efforts for the Conventions. Rajan T Joseph Director (Education), Computer Society of India Education Directorate, National Headquarters C I T Campus, 4th Cross Road, Taramani, Chennai 600113 Ph: +91-44-2254 1102/1103/2874; Fax: +91-44-2254 1143