Professional Documents
Culture Documents
PATRON EDITORIAL …
Lion.Dr.K.S.Rangasamy, MJF Computing models
Founder & President play key role in today’s IT
CONTENTS
Articles
5. Terms to know
6. Ubiquitous Computing
Tech Zone
10. Jargons
Fun Zone
13. IT Freaks
Ishare
Grid computing may or may not be them can contribute to large capital
data you have stored and check private key management. Amazon
how long it takes for the vendor to will give you the certificate if you
recover. If it takes too long to sign up for it.
recover, ask the vendor why and
Software development in cloud
how much service credit you
would get in different scenarios. To develop software using high-
Verify if the checksums match the end databases, the most likely
original data. choice is to use cloud server pools
at the internal data corporate center
An area of security testing you
and extend resources temporarily
should do is to test a trusted
with Amazon Web services for
algorithm to encrypt the data on
testing purposes. This allows
your local computer, and then try
project managers to better control
to access data on a remote server
costs, manage security, and
in the cloud using the decryption
allocate resources to clouds a
keys. If you can't read the data
project is assigned to. The project
once you have accessed it, the
managers could also assign
decryption keys are corrupted, or
individual hardware resources to
the vendor is using its own
different cloud types: Web
encryption algorithm. You may
development cloud, testing cloud,
need to address the algorithm with
and production cloud. The cost
the vendor.
associated with each cloud type
Another issue is the potential for may differ from one another. The
problems with data in the cloud. cost per hour or usage with the
To protect the data, you may want development cloud is most likely
to manage your own private keys. lower than the production cloud, as
Check with the vendor on the additional features, such as SLA
Ishare
and security, are allocated to the internal data center and replacing
production cloud. them with cloud computing
systems reduces energy for
The managers can limit projects to
running and cooling hardware. By
certain clouds. For instance,
consolidating these systems in
services from portions of the
remote centers, they can be
production cloud can be used for
handled more efficiently as a
the production configuration.
group. Second, techniques for
Services from the development
cloud computing promote
cloud can be used for development
telecommuting techniques, such as
purpose only. To optimize assets at
remote printing and file transfers,
varying stages of the project of
potentially reducing the need for
software development, the
office space, buying new furniture,
managers can get cost-accounting
disposing of old furniture, having
data by tracking usage by project
your office cleaned with chemicals
and user. If the costs are found to
and trash disposed, and so on.
be high, managers can use
They also reduce the need for
Amazon EC2 to temporarily
driving to work and the resulting
extend resources at a very low cost
carbon dioxide emissions.
provided that security and data
recovery issues have been Conclusion
resolved. One incentive for cloud
This article helps you plan ahead
computing is that it may be more
for working with cloud by
environmentally friendly. First,
knowing how cloud computing
reducing the number of hardware
compares to grid computing, how
components needed to run
you can resolve issues in cloud and
applications on the company's
grid computing, and what security
Ishare
issues exist with data recovery and sectors such as power, railways,
managing private keys in a pay-on- aviation and defence.
demand environment. Potential
The reported incidents of phishing
consumers' demands for increased
spiked nearly 42 per cent to 708
capacities over the Internet present
cases against 497 incidents that
a challenge for the developers and
were reported between January-
other members of a project team.
October 2008.
Being aware of and resolving the
issues of Web application design “The rise in instances of Internet
and potential security issues can threats is not just specific to India,
make your team's experiences but is being seen globally. With
trouble-free. more and more businesses and
consumers going online, we have
Web site defacement surges over
witnessed a massive spike
14% in January-October
(phishing, malware, virus attacks,
The incidents of Indian Web site Trojans, botnets) over the last
defacement reported in popular three years,” said Mr Amit Nath
domains such as ‘.com' and ‘.in' Country Manager of security firm
rose over 14 per cent on a Trend Micro.
cumulative basis during January-
Web site defacement includes
October 2009 to 5,239, as
hacking and insertion of malware,
compared to the year-ago period.
while phishing involves acquiring
This is as per data compiled by
sensitive information such as
Indian Computer Emergency
usernames, passwords or credit
Response Team (Cert-in), which
card numbers by masquerading as
tackles hacking or virus attacks on
an authentic site. This is often
the information systems in vital
Ishare
Author
Step 1
Step 2
Step 3
Step 4
Find out whether the computer uses regular, FPM, EDO, or Synch
DRAM.
Step 5
Step 6
Remove the cover from the machine to find the number of open RAM
slots. Look for between two and eight same-sized parallel sockets on the
main circuit board. Usually at least two of those sockets will contain
RAM - ruler-shaped circuit boards with chips on one or both sides.
Step 7
Author
Step 3
Let the battery drain
G. Manigandaprabhu as much as possible before
II B.Sc(CS) ’B’
Article title recharging if you have an
Tips to give best battery life to NiMH battery.
a laptop computer
Article Description Step 4
This article gives the details Recharge an NiMH
about providing best battery
life to a computer battery between long
periods of inactivity.
Step 1
Step 5
Charge the battery for
Travel with an extra
12 hours before use.
battery. Use the two
Step 2
batteries equally.
Let the battery drain
Step 6
completely before
Avoid running the
recharging if you have a
floppy and CD drives off
nickel-cadmium (NiCad)
the battery, if possible.
battery. Upgrade to a nickel-
Step 7
metal-hydride (NiMH)
Reduce the display's
battery or better, a lithium-
brightness when possible.
ion battery if one is made
for your machine.
Ishare
Step 6
If your email provider doesn't Step 7
have a built-in spam filter, Invest in anti-spam software
search the Web for email filters such as CYBERSitter or
and other anti-spam software. Spamkiller.
Many of these programs are
free and can be easily installed.
Author
S.Sundarraj,
III BCA ‘C’
Article title
Innovative IT gadgets
Article Description
This article gives the details
innovative IT gadgets which
have been explored for our
life.
Medical Gadget : Bionic i-LIMB
B-membrane Laptop/Desktop System
Concept computer designed by Revolutionary new prosthetic
Korean designer Won-Seok Lee. technology has made life easier
No bulky monitors, just a UFO and more fulfilling for a California
shape system that displays screen woman who is an upper extremity
like a projector. amputee. The revolutionary i-
LIMB hand and his innovative
interface system would enable her
to accomplish her goals at work
and encourage her to more actively
use her right arm.
Ishare
Author
These tools have been
engineered by the Emerging
Markets Labs (EM Labs) team of
M.Jagadeesh, the Microsoft India Development
III BCA ‘C’ Center (MSIDC) and the
Article title technology can be leveraged to
Microsot introduces input
tools for Indian languages support other syllabic languages
Article Description beyond Indian languages.
This article gives the details
about input tools for Indian These input tools use free-form
languages
transliteration. Users spell Indian
set of tools for Indian languages transliterate into the right words
Author
Ms.J.Pavithra,
Lecturer,CS DEPT
Article title
Academic Difficulty Forum
Article Description
This article gives the details about
Photoshop and its tools and list out
the tools with their purpose
Question: Shall I know the tools and their uses in Adobe Photoshop?
Photoshop Toolbox
Icon Tool Key Purpose Icon Tool Key Purpose
-
Single
Rectangular
M selecting Column selecting
Marquee
Marquee
Ishare
Polygonal
L selecting Magic Wand W selecting
Lasso
Magnetic
L selecting Crop C transforming
Lasso
Healing
J retouching Patch J retouching
Brush
Clone Pattern
S painting S painting
Stamp Stamp
Painting
restores to
History selected Art History
Y Y
Brush history Brush
state
Background
E erasing Magic Eraser E erasing
Eraser
Paint
G painting Gradient G painting
Bucket
color
Smudge R painting Sponge O
adjustment
tonal tonal
Dodge O Burn O
adjustment adjustment
Ishare
Horizontal Vertical
T typing T typing
Type Type
Horizontal Vertical
T typing T typing
Type Mask Type Mask
Direct Path
A drawing A drawing
Selection Selection
Freeform
Pen P drawing P drawing
Pen
Convert
- drawing Rectangle U drawing
Point
Rounded
U drawing Ellipse U drawing
Rectangle
Custom
U drawing Eyedropper I choosing color
Shape
non-
Audio non-printable
Notes N printable N
Annotation data
data
Color displays
Color
Selecting - current J retouching
Replacement
box color
Jump to Shift+
Mode
Q selecting Image Ctrl+ web design
Selector
Ready M
Ishare
Author
TimZon - The private video
discussion solution for the
enterprise."the perfect
S.Prema, Lecturer, CS
collaboration tool enabling virtual
Article title teams to communicate effectively
Revolutionary web2.0 tools
Article description through video and across
This article gives the details timezones" Timzon is currently in
about the tools available in beta and is available for Google
web2.0, a milestone in cloud apps and Google Gmail users.
computing .
Homework Tracker
PicLits.com - is a creative writing
Soshiku - is a simple but powerful
site that matches beautiful images
way for students to keep track of
with carefully selected keywords
Ishare
GIF: (Graphics Interchange Format) A standard for digitised images compressed with the
LZW algorithm, defined in 1987 by CompuServe (CIS).
Inkjet Printer: A class of printer in which small ink droplets are sprayed electrostatically
from a nozzle onto the paper.
IRQ: (Interrupt Request) The name of an input found on many processors which causes the
processor to suspend normal instruction execution temporarily and to start executing an
interrupt handler routine.
Jargon File: The on-line hacker Jargon File. A large collection of (often amusing) definitions
of computing terms.
Java Archive: A compressed archive file containing Java class files, filename extension:
".jar". The Java Development Kit contains a tool called "jar" for creating .jar files, similar to
the standard Unix tar command. As well as archiving and compressing the Java class files, it
also inserts a "manifest" file which can contain information about the class files, such as a
digital signature. Combining class files into a single archive file makes it possible to
download them in a single HTTP transaction. This, and the compression, speeds up
execution of Java programs delivered via the Internet.
Jumper: A removable wire or small plug whose presence or absence is used to determine
some aspect of hardware configuration.
Author
Naveenkumar ,
III Bsc(cs) c
Ishare
What Is an Extranet?
Allowing controlled access to an
otherwise private company
network enables business-to-
business transactions and file
Intranets and Extranets sharing.
An "intranet" is the generic term
for a collection of private What Is Groupware?
computer networks within an Groupware is software designed to
organization. An "extranet" is a improve the productivity of
computer network that allows individuals with common goals or
controlled access from the outside interests. Groupware applications
for specific business or educational often support information sharing
purposes. Intranets and extranets on corporate intranets.
are communication tools designed
to enable easy information sharing What Is a Portal?
within workgroups. Portals deliver networked
information to a targeted audience
What Is an Intranet? using Web and/or groupware
Many schools and non-profit technologies.
groups have deployed intranets,
Ishare
Two day Aptitude coaching was also given to the interested students (students who have
enrolled their names at the placement cell on or before 20th Dec, 09). The date of training is
also informed through email.