You are on page 1of 36

Ishare

PATRON EDITORIAL …
Lion.Dr.K.S.Rangasamy, MJF Computing models
Founder & President play key role in today’s IT

ADVISORS wave. Since we have to cope up


with the changing needs, in this
Kavithaa Srinivashaan, M.A.,M.B.A.,
issue we have discussed some of
Executive Director
the computing scenarios. Cloud
Dr. N. Kannan, M.Sc., Ph.D.
computing, Grid computing,
Principal
Ubiquitous computing are some
Prof.K.Natarajan, M.Sc.,M.Phil.,
renowned topics discussed in this
Director, Center for Information
issue. Please send your
Technology
comments, suggestions and
Mr. R. Pugazendi, M.Sc.,M.Phil.,M.E.,
articles to
HOD, Department of Computer
ksrcas.ishare@gmail.com.
Science & Applications
EDITORIAL TEAM
By,
S.Sasikala, M.Sc., M.Phil., PGDPM &IR.,
Editorial Board
S.Ranichandra, M.Sc., MBA.,M.Phil.,
S.Nithya., M.Sc(CS & IT).,
G.Anwar Basha., M.C.A.,
S.Maheswaran, III BCA ’A’.,
M.Karthikeyan, III B.Sc(CS) ’C’.,
& Office bearers of TRACE and ACAI
Ishare

CONTENTS

Articles

1. Cloud computing Vs Grid computing

2. Microsoft introduces new input tools for Indian languages

3. Academic difficulty forum

4. Revolutionary web2.0 tools

5. Terms to know

6. Ubiquitous Computing

Tech Zone

7. How to upgrade RAM

8. How to avoid unwanted emails

9. Steps to give best battery life to our laptop

10. Jargons

11. Innovative IT gadgets

12. Web site defacement surges over 14%

Fun Zone

13. IT Freaks
Ishare

Author computing”. The question is in


what way Cloud computing
different from Distributed
S.Sasikala, computing and grid computing?
Lecturer, CS
Article Title This question in partly answered
Cloud computing Vs Grid
Computing here. Please go through and send
Article Description
This article discusses the your comments.
differences in cloud computing
and grid Computing.
You may have wondered about
This article is suitable for all
people who wish to know the cloud computing as compared to
difference between cloud
computing and grid computing. grid computing. In this article, I
talk about cloud computing service
I want to share with the readers of
types and the similarities and
this magazine one interesting event
differences between cloud and grid
that took place recently. Our CIT
computing. I look at why cloud
Director raised a pertinent question
computing may be advantageous
in the knowledge sharing meeting
over grid computing, what issues
for which I have an answer here.
to consider in both, and some
In our college every Monday
security concerns. I use Amazon
evening, we are conducting a
Web Services as an example.
knowledge sharing meeting, where
each and every faculty will deliver To get cloud computing to work,
a lecture on recent topics in turn. you need three things: thin clients
(or clients with a thick-thin
Last week on 14.12.2009, one
switch), grid computing, and
faculty member was delivering a
utility computing. Grid computing
expert lecture on “Cloud
Ishare

links disparate computers to form particular benefit to small and


one large infrastructure, harnessing medium-sized businesses who
unused resources. Utility wish to completely outsource their
computing is paying for what you data-center infrastructure, or large
use on shared servers like you pay companies who wish to get peak
for a public utility (such as load capacity without incurring the
electricity, gas, and so on). higher cost of building larger data
centers internally. In both
With grid computing, you can
instances, service consumers use
provision computing resources as a
what they need on the Internet and
utility that can be turned on or off.
pay only for what they use.
Cloud computing goes one step
further with on-demand resource The service consumer no longer
provisioning. This eliminates over- has to be at a PC, use an
provisioning when used with application from the PC, or
utility pricing. It also removes the purchase a specific version that's
need to over-provision in order to configured for smartphones,
meet the demands of millions of PDAs, and other devices. The
users. consumer does not own the
infrastructure, software, or
Cloud Computing
platform in the cloud. He has

With cloud computing, companies lower upfront costs, capital


can scale up to massive capacities expenses, and operating expenses.

in an instant without having to He does not care about how


invest in new infrastructure, train servers and networks are

new personnel, or license new maintained in the cloud. The


software. Cloud computing is of consumer can access multiple
Ishare

servers anywhere on the globe alleviated if that component has a


without knowing which ones and failover component on another
where they are located. node, but problems can still arise if
components rely on other pieces of
Grid Computing
software to accomplish one or

Cloud computing evolves from more grid computing tasks. Large

grid computing and provides on- system images and associated

demand resource provisioning. hardware to operate and maintain

Grid computing may or may not be them can contribute to large capital

in the cloud depending on what and operating expenses.

type of users are using it. If the


Similarities and differences
users are systems administrators
and integrators, they care how Cloud computing and grid
things are maintained in the cloud. computing are scalable. Scalability
They upgrade, install, and is accomplished through load
virtualize servers and applications. balancing of application instances
If the users are consumers, they do running separately on a variety of
not care how things are run in the operating systems and connected
system. Grid computing requires through Web services. CPU and
the use of software that can divide network bandwidth is allocated
and farm out pieces of a program and de-allocated on demand. The
as one large system image to system's storage capacity goes up
several thousand computers. One and down depending on the
concern about grid is that if one number of users, instances, and the
piece of the software on a node amount of data transferred at a
fails, other pieces of the software given time.
on other nodes may fail. This is
Ishare

Both computing types involve S3. You can store an object as


multitenancy and multitask, small as 1 byte and as large as 5
meaning that many customers can GB or even several terabytes. S3
perform different tasks, accessing uses the concept of buckets as
a single or multiple application containers for each storage
instances. Sharing resources location of your objects. The data
among a large pool of users assists is stored securely using the same
in reducing infrastructure costs and data storage infrastructure that
peak load capacity. Amazon uses for its e-
Cloud and grid commerce Web sites.
computing provide
While the storage
service-level
computing in the grid
agreements (SLAs)
is well suited for data-
for guaranteed
intensive storage, it is
uptime availability
not economically
of, say, 99 percent.
suited for storing
If the service slides
objects as small as 1
below the level of
byte. In a data grid,
the guaranteed uptime service, the
the amounts of distributed data
consumer will get service credit
must be large for maximum
for receiving data late.
benefit.
The Amazon S3 provides a Web
A computational grid focuses on
services interface for the storage
computationally intensive
and retrieval of data in the cloud.
operations. Amazon Web Services
Setting a maximum limits the
in cloud computing offers two
number of objects you can store in
Ishare

types of instances: standard and Interoperability issues


high-CPU.
If a company outsources or creates
Issues to consider applications with one cloud
computing vendor, the company
Four issues stand out with cloud
may find it is difficult to change to
and grid computing: threshold
another computing vendor that has
policy, interoperability issues,
proprietary APIs and different
hidden costs, and unexpected
formats for importing and
behavior.
exporting data. This creates

Threshold policy problems of achieving


interoperability of applications
Let's suppose I had a program that between these two cloud
did credit card validation in the computing vendors. You may need
cloud, and we hit the crunch for to reformat data or change the
the December buying season. logic in applications. Although
Higher demand would be detected industry cloud-computing
and more instances would be standards do not exist for APIs or
created to fill that demand. As we data import and export, IBM and
moved out of the buying crunch, Amazon Web Services have
the need would be diminished and worked together to make
the instances of that resource interoperability happen.
would be de-allocated and put to
other use. Hidden costs

service-level agreements (SLAs) Cloud computing does not tell you


what hidden costs are. For
instance, companies could incur
Ishare

higher network charges from their resources, turning them over to


service providers for storage and other work. If the tests show
database applications containing unexpected results of credit card
terabytes of data in the cloud. This validation or releasing unused
outweighs costs they could save on resources, you will need to fix the
new infrastructure, training new problem before running the
personnel, or licensing new application in the cloud.
software. In another instance of
Security issues
incurring network costs,
companies who are far from the In February 2008, Amazon's S3
location of cloud providers could and EC2 suffered a three-hour
experience latency, particularly outage. Even though an SLA
when there is heavy traffic. provides data recovery and service
credits for this type of outage,
Unexpected behaviour
consumers missed sales
Let's suppose your credit card opportunities and executives were
validation application works well cut off from critical business
at your company's internal data information they needed during the
center. It is important to test the outage.
application in the cloud with a
Instead of waiting for an outage to
pilot study to check for unexpected
occur, consumers should do
behavior. Examples of tests
security testing on their own—
include how the application
checking how well a vendor can
validates credit cards, and how, in
recover data. The test is very
the scenario of the December
simple. No tools are needed. All
buying crunch, it allocates
you have to do is to ask for old
resources and releases unused
Ishare

data you have stored and check private key management. Amazon
how long it takes for the vendor to will give you the certificate if you
recover. If it takes too long to sign up for it.
recover, ask the vendor why and
Software development in cloud
how much service credit you
would get in different scenarios. To develop software using high-
Verify if the checksums match the end databases, the most likely
original data. choice is to use cloud server pools
at the internal data corporate center
An area of security testing you
and extend resources temporarily
should do is to test a trusted
with Amazon Web services for
algorithm to encrypt the data on
testing purposes. This allows
your local computer, and then try
project managers to better control
to access data on a remote server
costs, manage security, and
in the cloud using the decryption
allocate resources to clouds a
keys. If you can't read the data
project is assigned to. The project
once you have accessed it, the
managers could also assign
decryption keys are corrupted, or
individual hardware resources to
the vendor is using its own
different cloud types: Web
encryption algorithm. You may
development cloud, testing cloud,
need to address the algorithm with
and production cloud. The cost
the vendor.
associated with each cloud type
Another issue is the potential for may differ from one another. The
problems with data in the cloud. cost per hour or usage with the
To protect the data, you may want development cloud is most likely
to manage your own private keys. lower than the production cloud, as
Check with the vendor on the additional features, such as SLA
Ishare

and security, are allocated to the internal data center and replacing
production cloud. them with cloud computing
systems reduces energy for
The managers can limit projects to
running and cooling hardware. By
certain clouds. For instance,
consolidating these systems in
services from portions of the
remote centers, they can be
production cloud can be used for
handled more efficiently as a
the production configuration.
group. Second, techniques for
Services from the development
cloud computing promote
cloud can be used for development
telecommuting techniques, such as
purpose only. To optimize assets at
remote printing and file transfers,
varying stages of the project of
potentially reducing the need for
software development, the
office space, buying new furniture,
managers can get cost-accounting
disposing of old furniture, having
data by tracking usage by project
your office cleaned with chemicals
and user. If the costs are found to
and trash disposed, and so on.
be high, managers can use
They also reduce the need for
Amazon EC2 to temporarily
driving to work and the resulting
extend resources at a very low cost
carbon dioxide emissions.
provided that security and data
recovery issues have been Conclusion
resolved. One incentive for cloud
This article helps you plan ahead
computing is that it may be more
for working with cloud by
environmentally friendly. First,
knowing how cloud computing
reducing the number of hardware
compares to grid computing, how
components needed to run
you can resolve issues in cloud and
applications on the company's
grid computing, and what security
Ishare

issues exist with data recovery and sectors such as power, railways,
managing private keys in a pay-on- aviation and defence.
demand environment. Potential
The reported incidents of phishing
consumers' demands for increased
spiked nearly 42 per cent to 708
capacities over the Internet present
cases against 497 incidents that
a challenge for the developers and
were reported between January-
other members of a project team.
October 2008.
Being aware of and resolving the
issues of Web application design “The rise in instances of Internet
and potential security issues can threats is not just specific to India,
make your team's experiences but is being seen globally. With
trouble-free. more and more businesses and
consumers going online, we have
Web site defacement surges over
witnessed a massive spike
14% in January-October
(phishing, malware, virus attacks,
The incidents of Indian Web site Trojans, botnets) over the last
defacement reported in popular three years,” said Mr Amit Nath
domains such as ‘.com' and ‘.in' Country Manager of security firm
rose over 14 per cent on a Trend Micro.
cumulative basis during January-
Web site defacement includes
October 2009 to 5,239, as
hacking and insertion of malware,
compared to the year-ago period.
while phishing involves acquiring
This is as per data compiled by
sensitive information such as
Indian Computer Emergency
usernames, passwords or credit
Response Team (Cert-in), which
card numbers by masquerading as
tackles hacking or virus attacks on
an authentic site. This is often
the information systems in vital
Ishare

done by directing users to enter identifies `crisis' in the context of


personal information at a fake Web IT infrastructure - hacking, `denial
site which looks virtually identical of service' attacks, virus attacks,
to the authentic one. data centre disruption due to
natural calamity, and defacement
"The growth in Web site
of sites. There have been rising
defacement is tracking the increase
concerns over the persistent
in Internet usage. Although
Chinese assaults on Indian
initially hacking was most often
computer networks. Media reports
done with the purpose of gaining
over the last few years have
fame, it is now motivated by
documented how Chinese hackers
financial gains and involves
are constantly scanning India's
organised crime groups," Mr
networks, a move that allows them
Akhilesh Tuteja, COO, IT
to identify vulnerabilities and
Advisory, KPMG said.
access content. National
As per CERT-in statistics, as many
Informatics Centre and several
as 1,118 Indian sites were defaced
Indian embassies overseas have
by hackers in October this year,
been targets of such attacks, in the
compared to 692 incidents Do U
past
reported in September 2009, and Know

503 cases in the October 2008.


3D software
Earlier this year, in a bid to protect
IT infrastructure in critical sectors • Swift3D is the marquee tool
for producing vector-based
such as petroleum, aviation, 3D content for Flash. Also
comes in plug-in form for
banking, power and telecom,
transforming models in
Government finalised a `National Lightwave or 3DS Max into
Flash animations.
Crisis Management Plan'. The plan
Ishare

Author

G.Anwar Basha, Lecturer,


CS
Article title
To Upgrade the RAM
Article Description
This article gives the details
about to upgrading the RAM.

To increase the random-access memory (RAM) of your computer, you must


know the type of RAM it uses, how the RAM is presently configured and
how many open RAM slots are available.

Step 1

Check the owner's manual or motherboard manual to determine if RAM


is parity or non-parity. The website of the company you purchased the
computer from usually will tell you what kind of memory your computer
needs as well.

Step 2

Find out the speed of RAM (for example, 60 nanoseconds).


Ishare

Step 3

Determine whether the computer uses single in-line memory modules


(SIMMs) or dual in-line memory modules (DIMMs).

Step 4

Find out whether the computer uses regular, FPM, EDO, or Synch
DRAM.

Step 5

Determine the number of pins on the motherboard: 30, 72 or 168.

Step 6

Remove the cover from the machine to find the number of open RAM
slots. Look for between two and eight same-sized parallel sockets on the
main circuit board. Usually at least two of those sockets will contain
RAM - ruler-shaped circuit boards with chips on one or both sides.

Step 7

Purchase additional RAM that matches existing memory


specifications.
Ishare

Author

 Step 3
Let the battery drain
G. Manigandaprabhu as much as possible before
II B.Sc(CS) ’B’
Article title recharging if you have an
Tips to give best battery life to NiMH battery.
a laptop computer
Article Description  Step 4
This article gives the details Recharge an NiMH
about providing best battery
life to a computer battery between long
periods of inactivity.
 Step 1
 Step 5
Charge the battery for
Travel with an extra
12 hours before use.
battery. Use the two
 Step 2
batteries equally.
Let the battery drain
 Step 6
completely before
Avoid running the
recharging if you have a
floppy and CD drives off
nickel-cadmium (NiCad)
the battery, if possible.
battery. Upgrade to a nickel-
 Step 7
metal-hydride (NiMH)
Reduce the display's
battery or better, a lithium-
brightness when possible.
ion battery if one is made
for your machine.
Ishare

Author Avoid including your email


address when you post to
newsgroups.
Step 4
A.R.Abdul Jabbar Sheriff, Send a complaint message to
II B.Sc (CS) ‘B’
Article title the postmaster at the spammer's
How to stop unwanted email ISP, if you can figure it out.
instructions?
Article Description Many spammers forge return
This article gives the steps to addresses, but you can
stop unwanted emails coming
to us. sometimes figure out the ISP
Step 1 from the full email header. In
Contact your ISP and some email programs you can
complain. ISPs don't like spam right-click on the email
any more than you do; the mail message and choose Options or
clogs their servers. The ISP can Properties to see this
filter out mail from a suspected information.
spammer address. Step 5
Step 2 Be careful when selecting a
Avoid displaying your email free ISP or e-mail account.
address in Internet chat rooms Some of these services make
and only give out your email their money by letting
address on secure sites. 'sponsors' send email messages
Step 3 to their subscribers.
Ishare

Step 6
If your email provider doesn't Step 7
have a built-in spam filter, Invest in anti-spam software
search the Web for email filters such as CYBERSitter or
and other anti-spam software. Spamkiller.
Many of these programs are
free and can be easily installed.

What is Amazon EC2 ?

Amazon EC2 (Amazon Elastic Compute Cloud) is a web service offered by


Amazon that allows customers/business to run applications in the Amazon
″ is a commercial web service which lets
computing environment. “Ec2
customers to rent computing resources from Amazon computing cloud.

Instead of managing their own servers, companies can increase capacity or


add new web features by purchasing more gigabytes through EC2. Server
outsourcing through Amazon EC2 will potentially save companies hardware
costs and time.
Ishare

Author

S.Sundarraj,
III BCA ‘C’
Article title
Innovative IT gadgets
Article Description
This article gives the details
innovative IT gadgets which
have been explored for our
life.
Medical Gadget : Bionic i-LIMB
B-membrane Laptop/Desktop System
Concept computer designed by Revolutionary new prosthetic
Korean designer Won-Seok Lee. technology has made life easier
No bulky monitors, just a UFO and more fulfilling for a California
shape system that displays screen woman who is an upper extremity
like a projector. amputee. The revolutionary i-
LIMB hand and his innovative
interface system would enable her
to accomplish her goals at work
and encourage her to more actively
use her right arm.
Ishare

Author
These tools have been
engineered by the Emerging
Markets Labs (EM Labs) team of
M.Jagadeesh, the Microsoft India Development
III BCA ‘C’ Center (MSIDC) and the
Article title technology can be leveraged to
Microsot introduces input
tools for Indian languages support other syllabic languages
Article Description beyond Indian languages.
This article gives the details
about input tools for Indian These input tools use free-form
languages
transliteration. Users spell Indian

PC users can now enter text in language words in a natural

Indian languages, easy and quick. (phonetic) way using English

Microsoft recently showcased the alphabet, which the tools

set of tools for Indian languages transliterate into the right words

at the Microsoft India in the chosen Indian language. In

Development Center in addition, to desktop and web

Hyderabad. versions, visual keyboards for all


supported languages are also
The beta version of the tools will
available.
be made available as a free
download and will initially “There is a huge demand to

support six languages—Bengali, consume and interact with Indian

Hindi, Kannada, Malayalam, language content today. Tools

Tamil and Telugu. that make it easy to search,


Ishare Do U
Know
communicate and create content Steganography vs.
in Indian languages are key for Cryptography
broader computing adoption and
• Steganography’s goal is to
the tools we are showcasing
keep the presence of a
today are aimed at addressing this
message secret, or hide the
need,” said Srini Koppolu,
fact that communication is
Corporate Vice President and
taking place
Managing Director, MSIDC.
• Cryptography’s goal is to

“The desktop version is unique obscure a message or

among the free-form transliteration communication so that it

offerings in the market today, in cannot be understood.

that it enables the user to enter Cryptography — the science

Indian language text directly into of writing in secret codes —

any application running on addresses all of the elements

Microsoft Windows, such as necessary for secure

Microsoft Word or Windows Live communication over an

Messenger.,” said Koppulu. insecure channel, namely


privacy, confidentiality, key
“The web version allows the user exchange, authentication,
to enter text on any web page and non-repudiation.
without requiring software • Steganography and
download. The visual keyboard Cryptography make great
enables users who are not familiar partners. It is common
with English alphabet to visually practice to use cryptography
select and directly enter Indian with steganography
language characters,” he added.
Ishare

Author

Ms.J.Pavithra,
Lecturer,CS DEPT
Article title
Academic Difficulty Forum
Article Description
This article gives the details about
Photoshop and its tools and list out
the tools with their purpose

Since we want to open a forum for discussing the informative and


innovative questions asked by students we have created this section in
our Ishare. Here the student queries posted to our mailbox will be
reviewed and answers will be published.

Question: Shall I know the tools and their uses in Adobe Photoshop?

By, A.R.Abdul Jabbar Sheriff, II B.Sc(CS) ‘B’

Answer is provided by Ms.J.Pavithra, Lecturer of Computer Science


Department

Adobe Photoshop, or simply Photoshop, is a graphics editing


program developed and published by Adobe Systems. It is the current
market leader for commercial bitmap and image manipulation software, and
is the flagship product of Adobe Systems.
Ishare
A SAMPLE WORKSPACE OF PHOTOSHOP

Photoshop Toolbox
Icon Tool Key Purpose Icon Tool Key Purpose

Elliptical Single Row


M selecting selecting
Marquee Marquee

-
Single
Rectangular
M selecting Column selecting
Marquee
Marquee
Ishare

Lasso L selecting Move V transforming

Polygonal
L selecting Magic Wand W selecting
Lasso

Magnetic
L selecting Crop C transforming
Lasso

Slice K web design Slice Select K web design

Healing
J retouching Patch J retouching
Brush

Brush B painting Pencil B painting

Clone Pattern
S painting S painting
Stamp Stamp

Painting
restores to
History selected Art History
Y Y
Brush history Brush
state

Icon Tool Key Purpose Icon Tool Key Purpose

Airbrush J painting Eraser E erasing

Background
E erasing Magic Eraser E erasing
Eraser

Paint
G painting Gradient G painting
Bucket

Blur R unfocusing Sharpen R focusing

color
Smudge R painting Sponge O
adjustment

tonal tonal
Dodge O Burn O
adjustment adjustment
Ishare

Horizontal Vertical
T typing T typing
Type Type

Horizontal Vertical
T typing T typing
Type Mask Type Mask

Direct Path
A drawing A drawing
Selection Selection

Freeform
Pen P drawing P drawing
Pen

Add Anchor Delete


- drawing - drawing
Point Anchor Point

Convert
- drawing Rectangle U drawing
Point

Rounded
U drawing Ellipse U drawing
Rectangle

Polygon U drawing LIne U drawing

Custom
U drawing Eyedropper I choosing color
Shape

Color color geometrical


I Measure I
Sampler information measurements

non-
Audio non-printable
Notes N printable N
Annotation data
data

Hand H navigating Zoom Z image viewing

Color displays
Color
Selecting - current J retouching
Replacement
box color

Icon Tool Key Purpose Icon Tool Key Purpose

Jump to Shift+
Mode
Q selecting Image Ctrl+ web design
Selector
Ready M
Ishare

Author
TimZon - The private video
discussion solution for the
enterprise."the perfect
S.Prema, Lecturer, CS
collaboration tool enabling virtual
Article title teams to communicate effectively
Revolutionary web2.0 tools
Article description through video and across
This article gives the details timezones" Timzon is currently in
about the tools available in beta and is available for Google
web2.0, a milestone in cloud apps and Google Gmail users.
computing .

Dimdim - lets you deliver


WiZiQ - is a place where you can synchronised live presentations,
teach and learn using an easy-to- whiteboards and web pages while
use Virtual Classroom. You are sharing voice and video over the
welcome to give private and public Internet, with no download
live online sessions, teach for free required.
or earn money teaching. As a
learner you can attend public TheFlashMeetingProject - Allows
sessions on various topics from a dispersed group of people to
academics to anything under the meet from anywhere in the world
sun. with an internet connection.
Ishare

MultiMedia Tools each photo, fun effects, and more.

VoiceThread - is a collaborative, Brainstorming Tools


multimedia slide show that holds
images, documents, and videos Bubbl.us - is a simple and free web
and allows people to leave application that lets you
comments !! brainstorm online.

Vocaroo - The premier voice Exploratree - is a free web


recording service. resource where you can access a
library of ready-made interactive
Masher - free, and super-easy to thinking guides, print them, edit
mash a video from photos and them or make your own. You can
video clips share them and work on them in
. groups too.
Eyejot - Video Mail in a Blink! It's
fun, it's easy and there's nothing to LucidChart - Here are some of its
install! features:

• Creating crisp, attractive


PhotoPeach - Make your own
flow charts for the web or
social slideshow in seconds.
print has never been so fast
PhotoPeach helps you share your
and easy.
memories in a lively and vivid way
• Everyone works on a
by moving your photos like a
document at the same time.
video with your choice of
Collaborators get your
background music, captions on
Ishare

changes immediately when in order to inspire you. The object


you save. is to put the right words in the
• Share your flow charts as a right place and the right order to
web page, PDF, or image. capture the essence, story, and
Publish an always-updated meaning of the picture.
image of your work.
Tikatok - is where kids channel
Any computer with Internet
their imagination into stories – and
Explorer 6+, FireFox, Safari, or
publish those stories into books for
Chrome works with LucidChart
you to share and treasure with
without requiring words are used
friends and family.
in context. Just copy text from a
document and paste it into the box,
Young Novelist Workbooks - here
and then click on the "Grab
you will find NaNoWriMo’s 100%
Vocabulary!" button.
awesome, non-lame Young
VocabGrabber will automatically
Novelist Workbooks!
create a list of vocabulary from
your text, which you can then sort,
SceneCaster - is a 3D social media
filter, and save.
application and online community
where anyone can visualize their
Confusing Words - is a collection
ideas, share them, and make them
of 3210 words that are
real.
troublesome to readers and writers.

Homework Tracker
PicLits.com - is a creative writing
Soshiku - is a simple but powerful
site that matches beautiful images
way for students to keep track of
with carefully selected keywords
Ishare

their homework, and to never miss • Collaborate with co-


a due date again. workers, customers and
partners
Deadline - is the simplest calendar • Turn emails into tasks
ever made. You write in plain • Attach Google Docs to tasks
English, and it will set up a and projects
reminder for you. Once your
Knetwit - is a new, exciting social
appointments have been entered,
networking and knowledge
you can quickly search through
collaboration site that is available
them based on words or dates.
to students and teachers at colleges
around the world
JogLab - create a Jog (a mnemonic
device or memorable phrase) to • lets you create an online
help remember your stuff. Memory academic environment
experts learn this way; it’s as easy where the college
as 1,2,3.. community can share notes,
ideas, issues, and content
Manymoon - Simplify your from their educational
worklife. Use Manymoon to: journey.
• enables the community to
• Manage your private and
share its resources and be
shared tasks
more successful in their
• Find out what other people
studying and come together
are working on
with other students using
• Simple tracking and
Study Groups.
completion of projects
Ishare

Gigabyte: 2^30 = 1,073,741,824 bytes = 1024 megabytes.

Gigahertz: Billions of cycles per second.

GIF: (Graphics Interchange Format) A standard for digitised images compressed with the
LZW algorithm, defined in 1987 by CompuServe (CIS).

Handshaking: Predetermined hardware or software activity designed to establish or maintain


two machines or programs in synchronisation.

Hard Boot: A boot which resets the entire system.

Inkjet Printer: A class of printer in which small ink droplets are sprayed electrostatically
from a nozzle onto the paper.

IRQ: (Interrupt Request) The name of an input found on many processors which causes the
processor to suspend normal instruction execution temporarily and to start executing an
interrupt handler routine.

Jargon File: The on-line hacker Jargon File. A large collection of (often amusing) definitions
of computing terms.

Java Archive: A compressed archive file containing Java class files, filename extension:
".jar". The Java Development Kit contains a tool called "jar" for creating .jar files, similar to
the standard Unix tar command. As well as archiving and compressing the Java class files, it
also inserts a "manifest" file which can contain information about the class files, such as a
digital signature. Combining class files into a single archive file makes it possible to
download them in a single HTTP transaction. This, and the compression, speeds up
execution of Java programs delivered via the Internet.

Jumper: A removable wire or small plug whose presence or absence is used to determine
some aspect of hardware configuration.

Author

Naveenkumar ,
III Bsc(cs) c
Ishare

but an intranet is still seen


primarily as a corporate
productivity tool.

What Is an Extranet?
Allowing controlled access to an
otherwise private company
network enables business-to-
business transactions and file
Intranets and Extranets sharing.
An "intranet" is the generic term
for a collection of private What Is Groupware?
computer networks within an Groupware is software designed to
organization. An "extranet" is a improve the productivity of
computer network that allows individuals with common goals or
controlled access from the outside interests. Groupware applications
for specific business or educational often support information sharing
purposes. Intranets and extranets on corporate intranets.
are communication tools designed
to enable easy information sharing What Is a Portal?
within workgroups. Portals deliver networked
information to a targeted audience
What Is an Intranet? using Web and/or groupware
Many schools and non-profit technologies.
groups have deployed intranets,
Ishare

systems and applications can be


Ubiquitous computing described
Author At their core, all models of
ubiquitous computing (also called
pervasive computing) share a
vision of small, inexpensive,
S.Nithya, robust networked processing
Lecturer, CS devices, distributed at all scales
throughout everyday life and
Ubiquitous computing generally turned to distinctly
(ubicomp) is a post-desktop model common-place ends. For example,
of human-computer interaction in a domestic ubiquitous computing
which information processing has environment might interconnect
been thoroughly integrated into lighting and environmental
everyday objects and activities. In controls with personal biometric
the course of ordinary activities, monitors woven into clothing so
someone "using" ubiquitous that illumination and heating
computing engages many conditions in a room might be
computational devices and systems modulated, continuously and
simultaneously, and may not imperceptibly. Another common
necessarily even be aware that they scenario posits refrigerators
are doing so. This model is usually "aware" of their suitably-tagged
considered an advancement from contents, able to both plan a
the desktop paradigm. variety of menus from the food
actually on hand, and warn users
This paradigm is also described as of stale or spoiled food.
pervasive computing, ambient
intelligence. When primarily Mark Weiser proposed three basic
concerning the objects involved, it forms for ubiquitous system
is also physical computing, the devices, see also Smart device:
Internet of Things, haptic tabs, pads and boards.
computing, and things that think. Tabs: wearable centimetre sized
Rather than propose a single devices
definition for ubiquitous Pads: hand-held decimetre-sized
computing and for these related devices
terms, a taxonomy of properties Boards: meter sized interactive
for ubiquitous computing has been display devices.
proposed, from which different
kinds or flavours of ubiquitous
Ishare

The Vice-Chancellor, Periyar University ,Salem-11


The Registrar, Periyar University ,Salem
The Controller of Examination, Periyar University ,Salem-11
The HOD, Department of Computer Science, Periyar University
,Salem-11
The Principal, Government Arts College for Women, Salem-8
The Principal, Government Arts College for Women , Krishnagiri
The Principal, Government Arts & Science College (W), Burgur,
Kirshnagiri
The Principal, J.K.K Nataraja College of Arts & Science
The Principal, M.G.R College of Arts & Science
The Principal, Sengunthar Arts & Science College
The Principal, Muthayammal College of Arts & Science
The Principal, PEE GEE College of Arts &, Science
The Principal, Harur Muthu Arts & Science College for Women
The Principal, Vivekanandha College of Arts & Sciences (W)
The Principal, Mahendra Arts & Science college
The Principal, Selvam Arts & Science college
The Principal, St.Joseph's College of Arts & Science for (W)
The Principal, Vysya College of Arts &, Science
Ishare

The Principal, NKR Government Arts College for Women


The Principal, Arignar Anna Government Arts College
The Principal, Salem Sowdeswari College
The Principal, P.G.P College of Arts & Science
The Principal, Attur Arts & Science College
The Principal, SSM College of Arts & Science
The Principal, Government Arts College Salem
The Principal, Government Arts College Men
The Principal, Government Arts College, Dharmapuri
The Principal, Gobi Arts and Science College (Autonomous)
The Principal, Sri Kandhan College of Arts & Science
The Principal, Sri Ganesh College of Arts & Science
The Principal, Jairam Arts & Science College
The Principal, Sri Balamurugan College of Arts & Science
The Principal, PSG College of Arts and Science
The Secretary, PSG College of Arts and Science
The Principal, Kongunadu Arts and Science
College(Autonomous)
The Principal, Vivekanandha College for Women
The Principal, Sri Vidhya Mandir Arts & Science College
The Principal, St.John's College Palayamkottai - 627 007
Mr. S.T.Rajan, St. Joseph’s College, Trichy
Components and Subsystems

A printed circuit board from


"crossbar switch" or C.mmp --
an experimental multiprocessor
built by Bill Wulf 's group at
A circuit board from a Dutch computer on which Carnegie Mellon University in
Edgsar Dijkstra implemented a famous operating the 1970's. Cimmp had 16
system called THE in the 1960's. PDP-11 processors.

The module for a CDC 160


computer. This small
peripheral computer was used
to control the input and
output magnetic tape
preparation for the CDC 1604
- the first high performance
commercial machine to use
transistors.
A CDC 6600 logic board.

A "gift" from Cray Computer Inc., containing contains three


GaAS chips that were to be part of the Cray 3 computer
(before Cray Computer went bankrupt). The large brownish
item in the center is a miniature "printed circuit board" -- the
idea was to bind the chips directly to this board (rather than
to first package them in individual carriers) -- this allowed
smaller, denser packaging.
TRAINING AND PLACEMENT ACTIVITY
“Educational Excellence”
K.S.RANGASAMY COLLEGE OF ARTS AND SCIENCE
DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONS (UG)

WIPRO (WASE)-Aptitude Training & Test


A Written Aptitude test (20 Analytical+ 20 Logical & Numerical + 20 Verbal) was conducted on
9th December, 2009 for the final year UG students who are eligible to attend WIPRO
interview. Mock Technical and Mock HR interview will be conducted after Aptitude tests.

Two day Aptitude coaching was also given to the interested students (students who have
enrolled their names at the placement cell on or before 20th Dec, 09). The date of training is
also informed through email.

We welcome your valuable comments, suggestions & articles to


Ishare, Department of Computer Science & Applications (UG)
K.S.R College of Arts and Science, Tiruchengode-637215
Phone: 04288 -274741(4), Mail : ksrcas.ishare@gmail.com

You might also like