You are on page 1of 73

BOS.

CON 2010
THE 6TH INTER-COLLEGIATE IT FEST

September 24, 2010

Theme
Green IT and Youth Involvement

Sponsored by

Sasi Kumar, Singapore ‹BICS Alumni ‹ Ram Leathers, Ranipet ‹ Dinakaran, US

Organized by

Students@IT Association
Bosco Institute of Information Technology
Don Bosco Centre, Guezou Nagar, Yelagiri Hills, Vellore Dt, TN, India – 635853
BOS.CON 2010 | Green IT and Youth Involvement

Foreword

BOS.CON 2010 SOUVENIR is published to make people know about BIIT and the
way the education is imparted to a section of rural students in Tamil Nadu. This
publication also aims to serve as a reference point for the BOS.CON celebrations of
coming years.

Through this opportunity, students share their knowledge in the form of technical
reports, which constitute the main corpus of this literature. Thus, the students bring-
out the innovative ideas and thoughts prevalent in IT domains, which contribute to
the betterment of human society at large. We also aspire to improve our students’
communication / organization skills through this venture.

Now, coming to the selection of BOS.CON theme: Green IT and Youth


Involvement. The specter Global Warming is insidiously threatening the very
existence of human species. It calls for greater awareness and proactive measures
of collaborative nature. This global responsibility is being widely disseminated and
people are brought to the awareness of need for collective actions.

We are blessed with everything we don’t owe…the cool air, clear river and sea,
vegetations of every kind and unique species of animal kingdom… Whatever we
take for granted today, may not be there for the Next Generation. That stands as
the ‘uncomfortable truth’ now.

In this context, one concrete step towards a responsive and responsible living, we
chose to explore and educate our students by moving our academic focus to ‘Green
IT’ as one of the answer to Global Warming. ‘Youth Involvement’ in Green IT is the
need of the hour as the youth would be the leaders of tomorrow spearheading the
change towards positive growth.

The editorial board immensely expresses the words of gratitude towards BICS
InfoTech management, BIIT Faculty members, non-teaching staff, the great minds
we call, ‘students’ who have put their best efforts, extended moral support and
enthusiastic cooperation in bringing out this magazine with a message that speaks of
hope in terms of IT. Kudos to everyone!

Editorial Board
BIIT, Yelagiri Hills

For those who don’t know about BICS InfoTech and BIIT, here is a short introduction:

BICS InfoTech, Yellagiri Hills (Tamil Nadu, India) is a Don Bosco enterprise for education, training
and placement of rural youth in Information Technology. BICS InfoTech was established in 1997 with
the patronage of Fr Francis Guezou, a Salesian French Missionary. The Vision of BICS InfoTech is to
create a Knowledge Society driven by sound values and beliefs adopting the process of Empowering
Minds using Information Technology and Services. BICS is a unique blend of education, technology,
and knowledge towards the total development of young people and the nation. The organization
combines professional education with industrial practices. It is realized through major units, namely,
BIIT (Bosco Institute of Information Technology), BOSCO ITS (Bosco InfoTech Services) and
ARIVAGAM (Knowledge Resource Centre). BIIT is the Professional Education College offering
technical education and professional training to the rural and underprivileged youth by making them
employable in IT and IT-enabled service (IT-ES) industries.

2
BOS.CON 2010 | Green IT and Youth Involvement

Fr. Francis Guezou – Founder of DBC, Yelagiri


FR FRANIS GUÉZOU, the
French Salesian Missionary is
our Founder and Patron of Don
Bosco Centre at Yelagiri. He
arrived at primitive Yelagiri in
1962 - after seven years of
missionary work in Kochi and
then a short pastoral stint at
Perambur, Chennai to establish
Salesian presence here. For
forty years he toiled in his new -
found - mission - land for
development, education and
well-being of the young and
poor. Thanks to his unflinching
services, today Don Bosco
Center has spread its roots in empowering the Rural Youth in an innovative way,
bringing ‘best to the least’ through IT education and enterprise.

Fr Guezou desired to create conditions by which Hill people could enrich their own
culture. It is an incarnational approach – that is, identifying himself with people in
their daily life, working along with them and sharing in their moments of joys and
sorrows. Fr Guezou was convinced that people should be masters of their own
development. However, he also personally settled poor and orphan boys with family
and work. Some of his social ministry had been fighting the exploitation, eradication
of child labor and freeing of bonded laborers. Fr Guezou had brought up literally
hundreds of boys and girls through his sponsorship program.

Making Yellagiri an e-Hill: In 1998, Don Bosco Center made a tremendous leap into
the world of IT. Fr Guezou joined hands with other Salesian priests to start BICS
InfoTech, a Computer center in order to bring computer education to economically
and socially disadvantaged boys and girls in rural Tamil Nadu. BICS InfoTech
comprises also of a Software Development Centre and a Data Processing Unit as
BOSCO ITS, where many young men and women work and earn to support their
families – most of them are the past pupils of BICS itself. In BIIT, about 200 students
undergo various professional computer training at the diploma, degree, and
postgraduate levels every year. It is heartwarming to state that all those who have
passed out of this institute have found good positions in the IT industries.

Guezou believed that a personal contact is more endearing than a mere greeting.
After the ‘goodnight talk’ every evening, each boy and girl would come up, shake
hands with the elders and wish them goodnight and then only go to sleep. “Our
relationship should be personal. Keeping with his motto of priestly ordination “that all
be one”, he wanted all students to meet together at least once in a day for the Good
Night session. He constantly reminded the trainees and the staff that they must be
cordial and friendly with one another. “All the sections of the house may be different
in nature, but belong to the same family,” he would say. His spirit endures in Don
Bosco Center, Yelagiri Hills.

3
BOS.CON 2010 | Green IT and Youth Involvement

Rector’s Message

September 22, 2010

Dear Staff and Students of BIIT,

I am glad to see that BIIT is gearing up for its Annual Inter


–Collegiate IT Fest BOS.CON 2010 on 24 th this month. I
welcome the enthusiasm you bring to this annual event’s
preparation.

All of us are thrilled by the advance science and


technology has made in recent years. And all the more,
Information Technology-its advance and development is
so much desired by us as it has been at the service of
human life, making it always more and more comfortable and enjoyable.
Nonetheless, one cannot but take note of a sarcastic punch George Bernard
Shaw gave to science when he said always wrong.

It never solves a problem without creating ten more.” How true the English
dramatist and critic was in speaking thus can only be gauged when we
consider the ease with which criminality , that has always been a detested
characteristic of humanity has today incarnated into ‘cyber criminality’ with
which the police and crime investigation departments of every country are
trying so hard to grapple with .

So, where-in, or rather, whom-in lies the truth Bernard Shaw was hinting at in
his sarcastic remark? Obviously the human person who, with every forward
step taken by science and technology, seems to be taking several backward
steps in ethics and morality, the world over! Isn’t it ridiculous? With the
advance of cyber crimes so prevalent today our fundamental right to privacy is
being interfered with and our safety is being placed in jeopardy.

Along with the advance of IT and other such scientific disciplines there surely
needs to be greater attention paid to building up of fine characters among
the young minds by all those involved in the promotion of the desire for
excellence and spirit of competition in this field .

I wish the BOS.CON.2010 every success!

Fr. Vincent Durairaj, SDB


Rector and President
Don Bosco Center & BICS InfoTech

4
BOS.CON 2010 | Green IT and Youth Involvement

Director’s Message

Dear President, Secretaries and Members of Students@IT,

CONGRATULATIONS TO YOU for convening and


conducting BOS.CON 2010, the Inter-College IT Fest
of BIIT!

It is a distinct platform for peer learning and developing


one’s knowledge and skills in IT. I exhort you, the
organizers, to create an environment where the teams
from colleges participate freely with no hassles or
uncertainties. Let this Fest 2010 be a joyful communion
of students and faculty members, in true dialogue and
mutual understanding, as per mandate of UNO for the International Year of
Youth.

Participate and organize as vibrant youth of India with potentials to use


technologies to transform the country. The world acknowledges that Indian
youth have immense capabilities for innovation and growth. Most of these
talents are untapped in regular academic environments as they fail to foster a
culture of self-learning and application. Let BOS.CON 2010 that connects
hundreds of budding professionals, promote the required ambience to bring
out the best among participants and lead them to an action-oriented
commitment.

This commitment should inspire them to translate their ideas into practical,
usable, value-added products and services using information technologies. If
this noble thought germinates in a few of the organizers, competitors or
participants, BOS.CON is a success.

Thaddeus SDB
Director (BIIT) & CEO (BOSCO ITS)
BICS InfoTech, Don Bosco Centre
Guezou Nagar, Yelagiri Hills

5
BOS.CON 2010 | Green IT and Youth Involvement

Administrator’s Message

Dear Organizers of BOS.CON ’10,

WITH IMMENSE JOY I greet you on your


programme BOS.CON’10! The inter-collegiate
celebration is indeed an achievement of a team-
work. Prior to the actual event of the day, your hard
work and enthusiastic preparations are noteworthy.
I am sure, it is a learning experience in itself.

Daniel Goleman’s “Ecological Intelligence” raised-


up further the standard of human intelligence. From
mere Intelligent Quotient (I.Q), he suggested, we
move to Emotional Quotient (E.Q), then to Social
Quotient (S.Q) and now to Ecological Quotient
(Ec.Q). The Ecological Intelligence refers to the phenomenon of radical
transparency and sensitivity regarding “the hidden web of connections
between human activity and nature’s systems and the subtle complexities of
their intersections.” At this juncture, the field of IT stands in demand to
consider seriously this transparency and sensibility with regard to the
environmental hazards of our earth and the universe. Any venture in the
current and relevant IT world has to aim for Green IT.

Therefore, I wish the organizers and the participants an experience of greener


IT world! To conclude, I wish to throw a challenge as well of making Green IT
a reality through your innovative IT solutions.

With kind regards and prayerful blessings,

Fr Edwin George SDB


Administrator, Don Bosco Center, Yelagiri Hills

6
BOS.CON 2010 | Green IT and Youth Involvement

Chief Knowledge Officer’s Message

Quality - the need of the hour

Look at the National reserves of various governments in


the world after the financial crisis of 2008-2009:

• China - $2.45 trillion


• Japan - $1.019 trillion
• Russia - $458 billions
• India - $279 billions
• France - $140 millions
• USA - $124 millions
• UK - $69 millions
• Pakistan - $16 millions
• Sri Lanka - $2 millions

No doubt, India is doing very well. We are a growing super power.

On the other hand look at the Common Wealth Games 2010 being held in
New Delhi. We have become a laughing stock in front of the international
community. India has the second largest workforce in the world next only to
China but far ahead of US. But why are we still lagging behind?

We are not individually a disciplined people and quality consciousness is not


part of our ethos. We still carry the yoke of colonialism; with a deep conviction
that we are not good enough. It’s time to throw off this age-old yoke and
stand-up to the world. I wish and pray that BOSCON 2010 will contribute in
making our young people quality-conscious citizens and make our country
proud.

Fr Maria Arockiaraj, SDB


Chief Knowledge Officer, Arivagam

7
BOS.CON 2010 | Green IT and Youth Involvement

Dean’s Message

Dear Friends,

I am truly happy to learn that BOSCO INSTITUTE OF


INFORMATION TECHNOLOGY is conducting its
annual IT Fest, BOSCON -10.

Man in his quest for individual achievements, tends to


be individualistic. His single-minded focus on the
technological innovations has often pushed his fellow
creatures that share this globe with him into oblivion. At
this juncture, it is heartwarming to note that young
technocrats have given a bit of thought to restoring
harmony on this earth through the novel concept of “Green Computing”.

May we, during this occasion, pledge to do our mite to the cause of Peace
and Harmony among all - men and matter – for whom, this earth is home.
Yes. Let’s make this earth a better place….for us and for all those to come
after us!

Wishing you all the best,

Yours truly,
Leo Maria Francis, ML

8
BOS.CON 2010 | Green IT and Youth Involvement

President (Student@ITA): Message

Dear Students,

FIRST AND FOREMOST I would like to appreciate


all of you for your wonderful participation in planning,
design and execution of various events and activities
for BOS.CON 2010. I also thank the management for
conducting this kind of programs for the students'
welfare.

Sharing is one of the important objectives of


BOS.CON’10, which enables students from various
colleges to come together as one community and
share knowledge, experience and skills with each other in various ways, but it
is once in a year. It should be done every day.

I would suggest all of you to continue sharing every day through technology-
enabled systems. For this, I request the BOS.CON organizers to create an
innovative website to make this sharing a possibility, very soon. This website
should provide lot of features like discussion forums, mailing lists, content
management, threads, and much more for true sharing.

So, my dear students come together as one community to learn, share and
shine.

I wish all the best for the success of BOS.CON 2010.

Thank you.

With Regards,
Sundaram M.
President, Students@ITA

9
BOS.CON 2010 | Green IT and Youth Involvement

BOS.CON 2009 COMMITTEES


Steering Committee
Fr Vincent Durairaj SDB, Rector & President (BICS InfoTech)
Fr Maria Arokiaraj SDB, Vice‐Rector & VP:Finance & Admin (BICS InfoTech)
Fr Saul Nicholas SDB, VP:Business Development (BICS InfoTech)
Fr Edwin George, SDB, Administrator (Don Bosco Center)
Mr Moses Abraham, VP:Software Technology (BICS InfoTech)
Br Expedit Lobo SDB, Warden:Papa Duhayon Hostel
Sr Roselin, Warden:Arockia Annai Hostel

BOS.CON General Chair


Fr Gregory Thaddeus SDB, Director (BIIT) & CEO (BOSCO ITS)

BOS.CON Chair
Mr. Sundaram, President, Students@IT Association

Co‐Chair
Mr Julias Ceasor, Vice President, Students@IT Association

Organizing Committee
Mr. James S., Secretary‐I
Ms. Devakumar V., Secretary‐II
Mr. selvarani A., Join Secretary‐I
Ms. Nirosha., Join Secretary‐II
Mr. vivekananthan, Formar Secretary‐I
Ms. Jancyrani.,Formar Secretary‐II
Mr. sarath.,Formar Join Secretary‐I
Mr. Amalajayanthi,Formar Join Secretary‐II

Faculty Advisory Committee


Mr. Leo Maria Francis, Dean, BIIT
Mrs. Jayamary Christuraj, Faculty, BIIT
Mrs. Rose Gandhi, Faculty, BIIT
Mr. Julius Ceasor, Faculty, BIIT
Mr. Prabhakaran, Faculty, BIIT
Br. James VM, Faculty (Guest), BIIT

Technical Advisory Committee


Gilbert K., Multimedia Division, BOSCO ITS
Yesuraja A., HR Executive, BOSCO ITS
Mr Martin, COE, BIIT
James VM, BIIT

Documentation Committee
Amala Jayanthi M Maria Doss A Amaravathi C
Selvam P Arockia V Kumar A Anitha Immaculate A
Antony Raj S Stephen Raj.D Antony Leela B
Chinna Durai M RekaA Josephine Renitta K
Kuzhanthai Yesu A Nivas M, Lincy R Vidhya Shree M

10
BOS.CON 2010 | Green IT and Youth Involvement

Publicity Committee
Joseph P Felix Raj C Vinnarasi A
Ashok L Felix Raj G Maria Selvi S
Anand J Godvin A Praveen D Anusuya A
Arockia S Raj M Kanagesan K Poomalar S
Kumar S Muthu Kumar M Jemila A
Anand P Perumal R

Hospitality Committee
Sankarnath S Kumaresan G Maria Leony J
Nelson Jayaraj G Malayan K Nirosha P
Raji K Antony Raj Bastin A Vimala Vinnarasi U
Ranjith kumar V Suba Mary D Anitha J
Mano Bastin X Leela Mary X Anitha R
Joe Selvam P Anbarasi D Savariammal A
Rajesh S Chidambaram S

Finance Committee
Vivek Rajan R Sarath S
Gowtham S Kumar A Solomon Raj M
Charles I Selvam P

Events Committee
Ganesh Babu P

IT Quiz
Ganesh Babu P Lincy Angel D Ophiliya A
Naveen Kumar L Edward S Raj C Kamala Cyril Libiya A
Maria Susai M George Vincent A Baskar S

Programming Dexterity
Kumaresan K Francis Xavier S Deepika N
Michael R Mary Prema S Markandan A
Francis Xavier J Magimai Mary A

Web Designing
Savari P Kumar A Shivabasuvanna R Aruna K
Chella Pandi K Rabekka V Malathi P
Carmel Raj M Tamizh Thomas A

Registration Committee
Prabhagaran M Siva Gnanam G Mathalai Mary L
Dinesh P Saran Raj F Mercy S
Jagatheshwaran S Alagar Samy N John Peter A
Prabhagaran K Sekar M Arockia raj J
Arun Prasath A Rajeshwari N Arul Prasanth A
Panthayan James S Antoniyammal N Anand L
Muthu A Samy K Celine Mary J Sathish kumar
Jancy Rani S

11
BOS.CON 2010 | Green IT and Youth Involvement

ABOUT BOS.CON 2010


Bosco Institute of Information Technology (BIIT) is the Professional Education
College offering technical education and professional training in IT and IT -
enabled services.

The “Students@IT” association with the motto of “Up with Knowledge” is


an association for peer learning, organizes seminars, workshops, debates and
group discussions every week that helps us to learn about the recent
developments in IT Industry. This is fully organized by the students of BIIT,
guided by a staff member as the President of the association.

As part of this program, we conduct Inter-collegiate IT-Fest “BOS.CON 2010”


annually to develop a network with neighboring colleges, empower the young
minds of rural and urban and promote open source technologies. This year
we celebrate this Fest on September 24, 2010 with the theme of “Green IT
and Youth Involvement”.

This festival is for the Under Graduate and I & II Year Engineering Students of
Computer Science / Information Technology / Computer Application. A
maximum of eight participants per colleges can represent their institution.

Our Contact Information


Email: boscon@biit.edu.in
Website: www.biit.edu.in
Follow us: www.twitter.com\biit_ylg

Cell: 9486844736 / 9790646418

12
BOS.CON 2010 | Green IT and Youth Involvement

Programme Schedule
08.30 AM : REGISTRATION

10.00 AM : INAUGURATION

• Prayer Song
• Lighting the Lamp
• Welcome Address
• Inaugural Address
• Releasing Souvenir
• Felicitation
• Key-note Address
• Theme: Green IT and Youth Involvement
• Vote of Thanks

EVENTS

11.00 AM to 01.00 PM : Programming Dexterity

Wobbling Minds
[Parallel Events]
Paper Presentation

Virtual Dreams

01.00 PM to 02.00 PM : LUNCH

02.00 PM to 03.15 PM : Venture Capitalism

03.30 PM : VALEDICTION

• Welcome Address
• Participant’s Response
• Valedictory Address
• Announcement of Results
• Prize Distribution
• Vote of Thanks
• Hymn to St Don Bosco

13
BOS.CON 2010 | Green IT and Youth Involvement

Keynote Addresses
Mr. Prince Benjamin
Head, Global Datacenter Operations, MC Corporation, Bangalore

First of all we would like to congratulate and Appreciate BIIT for their great mission and the way they
operate this institution. It’s really amazing to see such a great enthusiasm and knowledge from this
young people. It’s our honor and great pleasure to be part of this inter college meet.

Green Computing is not only for IT Industry, it has very wide scope. Almost any product we use in
current situation has IC (Integrated Circuit) in it. Every IC consists of Millions of Transistors and
consuming more and more Power. Low power consumption is listed as the second greatest challenge
for the industry.

Where are the web pages you browse?

Everything is on a Server in a Data Center. One single room in Datacenter contains 100 Racks. 1 Rack
= 5 to 20 kW. Data centers = huge energy bill + produce CO2 + green house emission + air pollution…
In order to achieve sustainable computing, we need to rethink from a “Green Computing” perspective
in everything we do.

What are the things we can do about this?

• Understand all levels of the computer


• Understand where power is dissipated
• Think about ways to reduce power usage at all levels:
o Hardware Levels - when designing Integrated Circuits, Digital Logic, and Processor’s
Instruction Architecture
o Software level - when writing code for Operating System, Assembly Language, and High
Level Programming

The performance of software systems is dramatically affected by how well software designers
understand the basic hardware technologies at work in a system. Similarly, hardware designers must
understand the far-reaching effects their design decisions have on software applications.

Today’s Youth/Students are tomorrows Hardware Design engineers, Software Programmers, users of
various devices consume power. They should know the device, layout, circuit, architecture, algorithm,
system-6 levels, how over utilizing power and Carbon generation going to affect our globe so that they
could create better products for the future.

Green Computing is every one responsibility so let’s consume less power, create more efficient
software, products, and systems & Leave a better earth for our next generation.

14
BOS.CON 2010 | Green IT and Youth Involvement

VALEDICTION, Key‐note Address

Ms Vennila
Social Entrepreneur, Head, Aruvi Agency, Yelagiri Hills

A pleasant evening to one and all gathered here!

I am really happy to address you in this valedictory function. Anybody can come-up in life, if one
really works hard and with the grace of God. I may sound proud. And I myself is the best example of
this saying; yet, I would say, we should never have the word ‘I’ in our book of life. The best example,
my life can give to the youth is, ‘work truly and hard’. True and hard work will surely help make our
nation become a superpower as Dr A.P.J Abdul Kalam has said.

I started my school life here in Athanavur Government School. I wanted to do my High Schooling in
Jolarpet, but it was impossible for me. I am grateful to say that it is Fr Guezou who gave me the gift of
education.

My life in Yelagiri Hills started in 1987. At that time I made my living with the money earned by
breeding the cow given by my mother. Now I have a small farm for cow with the calves yielded by the
cow. By hard work, I started the first Rice Mill and I am still running it well. Then I started a small
agency called ‘Aruvi Agency’ and through it, I was authorized to distribute all the newspapers in
Yelagiri Hills. Further, I received approval for Sun Direct Service and am running it well. Lately, I
thought of running a shop for Photocopying, Lamination, and Spiral Binding and now these are
successfully functioning.

I want to do something in a bigger scale than these. Hence, I am now building a hotel ‘Hotel Aruvi’
with lodging facilities. It also includes a conference hall with a beautiful garden attached. This hotel is
soon to be opened in Yelagiri Hills.

At last I am proud to express my long cherished dream of setting up an industry and through that
employment for at least some people on Yelagiri Hills. And I am sure I would achieve this very soon
with my hard work.

Thank you.

15
BOS.CON 2010 | Green IT and Youth Involvement

BOS.CON 2010 Report


As a step to promote study and exposure in Information Technology, Students@IT Association (ITA)
conducted one-day inter-collegiate IT FEST called BOS.CON (Bosco Connect) on September 24, 2010.
Students from 14 colleges participated to share their knowledge and engage in various IT related
competitions. A group of eight participants from each institution or college attended the BOS.CON IT
Fest.

Bosco Institute of Information Technology (BIIT) is a Professional Education Unit of BICS InfoTech
located in Guezou Nagar, Yellagiri Hills. BIIT conducts a one-day IT Fest ‘BOS.CON 2010’ every
year in the month of September. The Students@IT Association, management, ITA President, ITA Vice
President, and the Staff members of BIIT planned to conduct BOS.CON 2010 on 24th of September. To
make BOS.CON 2010 a great success the second year and third year students of BIIT were divided into
six committees namely Fund-raising Committee, Publicity Committee, Registration Committee,
Documentation Committee, Hospitality Committee, and Events Committee which includes five sub
committees for various events namely, Paper Presentation, Wobbling Minds, Web Designing,
Programming Dexterity, and Venture Capitalism. Each committee was assigned with a faculty advisor.
All the preparations for BOS.CON 2010 started right in the beginning of the month of August, 2010.
Members of each committee along with the faculty advisor sat together and planned all the necessary
things towards BOS.CON 2010. Each committee worked towards achieving the objectives of the
committee.

Objectives of each committee are:

1. Fund-raising Committee:
• Raise Sponsorship amount to Rs. 1,50,000/-

2. Publicity Committee
• To make POSTER to invite Colleges for IT Fest
• To display BANNER
• To put up BACKDROP and decorate the Hall
• To make arrangement to submit AD and NEWS to as many News Agencies as possible and
Local channels.

3. Registration Committee
• To make sure that at least 25 colleges participate in BOSCON 2010.

4. Documentation Committee
• BOS.CON 2010 Souvenir Publication (120 copies) by September 24, 2010 with Messages
(from Rector, Director, Administrator, Dean and ITA President), Keynote Address(es) from
the Chief Guest(s), selected technical reports submitted by students, Write-ups by students,
Photos of Management, Chief Guests, BIIT-Arivagam Staff members, Students and Sponsors.
• Compilation of BOS.CON 2010 Proceedings for Documentation within two-weeks of
BOS.CON 2010 conclusion.

5. Hospitality Committee
• To make arrangement for Transportation.
• To arrange the lunch and refreshment.
• To arrange Guest Rooms for girls.
• To arrange a dormitory in PDH for boys in consultation with the Warden

6. Events Committee
• To asses the knowledge of students in IT
• To learn How to organize and plan for varies events
• To develop a network among other colleges

16
BOS.CON 2010 | Green IT and Youth Involvement

• To make others to know about our college


• To empower our & others knowledge with recent technologies

With the help of the faculty advisors and with the hard work all the committees achieved almost all
their objectives in a perfect manner. Event committee members prepared all the necessary things for the
events and things for BOS.CON 2010 were ready before one day. At last the day came. Chief guests for
the day were arranged by Fr Gregory Thaddeus SDB, Director of BIIT along with Mr William
Sundaram, ITA President and Mr Julias Ceasor, ITA Vice-President.

The inauguration of IT Fest started with a prayer song at 09:45 AM and James, the secretary of ITA
welcomed the gathering. Fr Gregory Thaddeus SDB, Director of BIIT, Yelagiri Hills delivered the
inaugural address. Fr Vincent Durairaj SDB, the Rector of Don Bosco Centre, released the souvenir of
BOS.CON 2010, felicitated the gathering and introduced the chief guest of the day Mr Prince
Benjamin, Head of Global Datacenter Operations, MC Corporation and the guests of honour, Mr
Dhayalan Srinivasan Chief Architect of Enterprise Computing Group, Unisys Corporation, Mr
Jayatheertha Karnam, Chief Architect of Enterprise Computing Group, Unisys Corporation, and Mr
Nagendra Kallukuli, Senior Team Lead of Infrastructure Management Service, Mahindra Satyam. The
chief guest delivered the keynote address on, Green IT and Youth Involvement and Ms Selvarani, the
Associative ITA Secretary concluded the IT Fest Inauguration ceremony by proposing the Vote of
Thanks.

The Events of the Day started at 11:00 AM with participants from eight colleges presenting their
papers on various technologies. Two students from each institute were given the opportunity to present
papers on Information Technology in the fields of Cloud Computing Green Computing Social
Networking Virtualization Technology Network Security E-Governance Open Source Technology E-
Learning. In the meanwhile prelims for Programming Dexterity, Web Designing and IT-Quiz were
conducted.

For Programming Dexterity and Web Designing, participants were asked to make use of open source
software (OSS) only. Accordingly, members of Event Committee demonstrated several open source
software that can be used in Programming Dexterity and Web Designing. After the Paper Presentation,
IT-Quiz was conducted at 11:15 AM by Fr Saul Nicholas and at 12:45 PM, Prelims were conducted for
Venture Capitalism. After the lunch, the final round for Venture Capitalism started with eight
participating colleges advertising their products to the audience.

Following the conclusion of IT Fest Competitions, Valediction function commenced at 03:30 PM and
Mr Julias Ceasor, the ITA Vice President welcomed the gathering. Fr Gregory Thaddeus SDB, the
Director of BIIT delivered the Felicitation Address. The students of the participating colleges shared
their experiences on the IT Fest. Ms. Vennila, Social Entrepreneur and Head of Aruvi Agency,
Athanavoor, Yellagiri Hills delivered the valedictory address on her life story. She exhorted the
students to strive hard honestly for success in life. Mrs Jayamary Christuraj, Faculty of Computer
Science department took over the Dias to announce the winners of the IT Fest and the overall
championship of this IT Fest, Govt. College of Engineering, Bargur. The Valediction formally was
brought to conclusion with Mr William Sundaram, the ITA President, proposing the Vote of Thanks.

The IT Fest offered an opportunity for graduate-level students of Computer Science and Computer
Applications to exchange new ideas, skills and share IT technologies with other budding professionals
in the field. Further, many other competitions like, Venture Capitalism, Debugging and Wobbling
Minds (IT Quiz), and Web Designing were conducted that gave ample opportunities for the participants
to exhibit their IT skills.

17
BOS.CON 2010 | Green IT and Youth Involvement

BOS.CON IT Fest Winners


No. Event Name Prize College
Kamban Engineering College
I
(Tiruvannamalai)

1 Paper Presentation II Siharam-Don Bosco (Tiruvannamalai)

III Govt College of Engineering (Bargur)

I Don Bosco Community College (Dindigul)

2 Web Designing II Sacred Heart College (Tiruppattur)

III Muthurangam Govt. Arts College (Vellore)

I Govt College of Engineering (Bargur)

3 Wobbling Minds (IT-Quiz) II Muthurangam Govt. Arts College (Vellore)

III K.M.G College of Arts & Science

I Govt College of Engineering, Bargur

4 Programming Dexterity II Don Bosco Community College

III Kamban Engineering College

I Indo-American Arts & Science College

5 Venture Capitalism II Sacred Heart College, Tirupattur

III Bharathidasan Engineering College

18
BOS.CON 2010 | Green IT and Youth Involvement

Participant Colleges

1. Mazharul-Uloom College
Ambur, Vellore DT.

2. Don Bosco College


Sogathur By-Pass Road, Dharmapuri-636809

3. Don Bosco Community College


Malapatty Road, Thottumoothu, Dindigul-624005

4. K.M.G College of Arts & Science


R.S. Road, Gudiyattam

5. Govt. College of Engineering


Bargur

6. BSCS, Don Bosco


Siharam, Tiruvannamalai

7. Indo-American Arts & Science College


Tiruvannamalai

8. Sacred Heart College


Tirupattur, Vellore DT.

9. Marappan Lakshmiammal Arts & Science College, (Shift 1 & 2)


Kurumaberi, Tirupattur, Vellore DT.

10. Islamiah College (Shift 1 & 2)


Vaniyambadi, Vellore DT.

11. Arts & Science College


Tiruppattur, Vellore DT.

12. Muthurangam Govt. Arts College (Autonomous)


Otteri, Vellore-632002

13. Kamban Engineering College


Tiruvannamalai

14. Bharathidasan Engineering College


Nattrampalli, Vellore DT.

19
BOS.CON 2010 | Green IT and Youth Involvement

Table of Content
Technical Reports

1. Social Networking .................................................................................. 21


Rajeswari N, Vinnarasi A and Antoniammal N

2. Multimedia Technology ......................................................................... 25


Vivek Rajan R, Saranraj F and Joe Selvam P

3. Network Security.................................................................................... 29
Joseph P, Anand J and Antony Raj S

4. E-Learning Technologies ...................................................................... 33


Pasca Mary C, Mary Prema S and Anitha J

5. E-Governance......................................................................................... 37
Reka.A, Lincy Angel.D and Amala Jeyanthi.M

6. Database Technology ............................................................................ 41


Selvam P, Panthayan James S and Siva Gnanam G

7. Cloud Computing ................................................................................... 45


Prabakaran M, Michael R and Francis Xavier J

8. Information Architecture ....................................................................... 48


Ranjith R, Kumaresan K., and Prabhakaran K

9. Open Source Technologies................................................................... 53


Rose Gladson A.G, Sarath S and Solomon Raj M

10. Mobile Computing ................................................................................ 57


Muthu Arockia Samy A,Ashok Kumar L and Charles I

Techie Thoughts ............................................................................... 61

20
BOS.CON 2010 | Green IT and Youth Involvement

Social Networking
Abstract
Social networking sites (SNSs) attract the attention of academic and industry researchers intrigued by
their affordances and reach. This report brings together scholarships and best practices on this
emerging phenomenon. We strive to describe the features of SNSs and propose a comprehensive
definition and the history of social networking sites.

Introduction
Social networking is a new means of communicating and sharing information between two or more
individuals in online community. When it comes to online, websites are commonly observed entities.
These provide virtual communities for people interested in any particular subjects.

What is social Networking?


We define social networking sites as web-based services that allow individuals to construct a public or
semi-public profile within a bounded system, articulate a list of other users with whom they share a
connection, and view and traverse their list of connections and those made by others within the system.
The nature of these connections may vary from site to site.

Why to we need go for Social Networking?


• To communicate with existing networks, making and developing friendships/contacts.
• To view content and find information
• To create and customize profiles
• To author and upload content
• To post messages - public and private
• To collaborate with other people

History of Social Networking


The first recognizable social networking site was launched in 1997. www.SixDegrees.com allowed
users to create profiles, list their Friends and beginning in 1998, surf the Friends lists. Each of these
features existed in some form before SixDegrees, of course. Profiles existed on most major dating sites
and many community sites. AIM and ICQ buddy lists supported lists of Friends, although those Friends
were not visible to others. www.Classmates.com allowed people to affiliate with their high school or
college and surf the network for others who were also affiliated, but users could not create profiles or
list Friends until years later. SixDegrees was the first to combine these features.

Leading Social Networking Sites


• Facebook
• Twitter
• Orkut
• MySpace
• LinkedIn
• Hi5 and so on.

21
BOS.CON 2010 | Green IT and Youth Involvement

Technologies
• Network Technology
• Web Technology
• Mobile Technology
• Database Technology
• Human-Computer Interaction (HCI)
• Multimedia Technology

Applications

Government Applications
• Social networking is more recently being used by various government agencies.
• Social networking tools serve as a quick and easy way for the government to get the opinion
of the public and to keep the public updated on their activity.

Business Applications
• Use of social networking services in an enterprise context presents the potential of having a
major impact on the world of business and work.
• Social networking being used for business purposes like www.LinkedIn.com.

Dating Applications
• Many social networks provide an online environment for people to communicate and
exchange personal information for dating purposes. Intentions can vary from looking for a one
time date, short-term relationships, and long-term relationships.
• Decrease in users – www.Match.Com, www.eHarmony.com.
• Increase in users - MySpace, Facbook.

Educational Applications
• Social networks focused on supporting relationships between teachers and between teachers
and their students are now used for learning, educator professional development, and content
sharing (Learn Central and for teachers, www.Ning.com).

Medical Applications
• Social networks are beginning to be adopted by healthcare professionals as a means to manage
institutional knowledge, disseminate peer to peer knowledge and to highlight individual
physicians and institutions.

Social Network Services


A social networking service is an online service, platform, or site that focuses on building and
reflecting of social networks or social relations among people; for example, sharing interests and/or
activities. A social networking service essentially consists of a representation of each user, social links,
and a variety of additional services. Most social networking services are web-based and provide means
for users to interact over the Internet, such as email and instant messaging. Although online community
services are sometimes considered as a social networking service in a broader sense, social networking
service usually means an individual-centered service whereas online community services are group-
centered. Social networking sites allow users to share ideas, activities, events, and interests within their
individual networks.

22
BOS.CON 2010 | Green IT and Youth Involvement

Social Networking Sites


Facebook: It is a social networking site. It has got more than 400 million active users. It allows the
sharing of photos, videos, events, information, interests and blogs.

Orkut: Orkut is a social networking website that is owned and operated by Google Inc. The service is
designed to help users meet new friends and maintain existing relationships.

Twitter: It is a micro-blogging site; it is a real-time connected micro-blogger.

LinkedIn: It is a business-oriented social networking site. It was founded in December 2002 and
launched in May 2003. It is mainly used for professional networking. The site is available in English,
French, German, Italian, Portuguese and Spanish.

Emerging Trends
The use of online social networks by libraries is increasingly becoming prevalent and growing to
communicate with more potential library users, as well as extending the services provided by
individual libraries.

A final rise in social networking use is being driven by college students using the services to network
with professionals for internship and job opportunities. Many studies have been done on the
effectiveness of networking online in a college setting, and notable one is by Phipps Arabie and Yoram
Wind published in Advances in Social Networking Analysis.

Advantages of social networking


Social networking is a quite a new Internet invention that brings every kind of social group together in
one place and lets them interact with each other.

Low costs
It is free to use social networking sites for personal and business use which is underestimated by many
online business owners. Using social networking strategies for marketing a product or service online is
very effective because you can scout out target markets and potential customers with just a few clicks.

Builds credibility
You can build trust with customers if you can connect with them on both personal and professional
level. Social networking sites are all about sharing information. The more your customers know about
you, the better. Despite having to do a bit of work, it definitely pays off as you can be tapped for an
offer if someone catches wind of your products or services. As long as you don’t pursue them too
aggressively, you will do well here.

Connections and ‘new friends’


You have friends; people you know have friends, and so on. This is a common situation that has
potential. With the help of a social networking site, you can get in contact with these people if you play
your cards right. You must give to receive, it is true in this case as well.

Disadvantages of Social Networking


Let us also look at the disadvantages of social networking.

Lack of Anonymity
You are putting your name, location, gender, age and other information on the Internet that you don´t
necessarily want other people to know about. As long as people can know who you exactly are, then
someone can find ways to do you harm.

23
BOS.CON 2010 | Green IT and Youth Involvement

Scams
Online scams, identity theft and other cases of harassment are normal on the Internet. Many social
networking sites apply certain measures to keep these at an absolute minimum. You need to be careful.

Time Consuming
Social networking is really time-consuming. If it is not your thing it may just be a waste of time. It is
supposed to be fun, whether for business or personal use. There are number of social networking
software for business people that post your links automatically to dozens of social networking sites.

Conclusion
Social networking often involves grouping specific individuals or organizations together. Once you are
inside this online community, you can begin to create your own network of friends and eliminate
members that do not share common interests or goals. So, we can make many new friends, learn about
new cultures and new languages through this social networking.

Reference
Boyd, Danah, Ellison and Nicole, Social Networking Sites: Definition, History and Scholarship, 2007
Govani .T., and Pashely .H, Student awareness of the privacy implications when using Facebook PA:
Carnegie Mellon University, 2005
http://www.obea.info
http://developers.facebook.com/
http://onesocialweb.org/

Group Name: Oracle


Coordinator: M. Rose Gandhi (BIIT: Faculty)
Editors: N. Rajeswari, A.Vinnarasi, N. Antoniammal, M. Maria Selvi

24
BOS.CON 2010 | Green IT and Youth Involvement

Multimedia Technology - Virtual Reality


Abstract
Today, Multimedia has found its applications in all the areas. Especially, the advancing Virtual Reality
technology has expanded its boundary very rapidly. Here in this Report, we aim to give the overall
knowledge about Virtual Reality and its application in the context of Multimedia Technologies.

Introduction
Virtual Reality (VR) hit the headlines in the mid-1980s, and spawned a series of conferences,
exhibitions, television programs, and philosophical debates about the meaning of reality. Following this
trend, the concepts such as ‘Virtual Environments’ (VE) and ‘synthetic environments’ has emerged in
1990s.

Today, we have virtual universities, virtual offices, virtual laboratory, virtual exhibitions, virtual wind
tunnels, virtual actors, virtual studios, virtual museums, virtual doctors, virtual X, virtual Y, and
simply, ‘virtual’!

Virtual Reality definition can be: It is a way for humans to visualize, manipulate and interact with
computers and extremely complex data. ["Silicon Mirage: The Art and Science of Virtual Reality", S.
Aukstakalnis & D. Blatner, Peach Pit Press 1992]

Another definition that is generally accepted is this: Virtual Reality is about creating acceptable
substitutes for real objects or environments, and is not really about constructing imaginary worlds that
are indistinguishable from the real world”. [Essential Virtual Reality fast”, J. Vince, Springer Verlag
1998]

Human Performance in Virtual Words


Computer speed and functionality, image processing, synthetic sound, and tracking mechanisms have
been joined together to provide realistic “acceptable” virtual worlds.
A fundamental advance still required for VEs to be effective is to determine how to maximize the
efficiency of human task performance in virtual worlds. In many cases, the task will be to obtain and
understand information portrayed in the virtual environment. Maximizing the efficiency of the
information conveyed in VEs will require developing a set of guiding design principles that enable
intuitive and efficient interaction so that users can readily access and comprehend data. It is difficult to
gauge the importance of the various human-factor issues requiring attention.
It is clear that if humans cannot perform efficiently in virtual environments (thereby compromising the

High

Increasing Human
Performance in VE

Navigational
Easiness

Immersion increase sense


of presence
Low

Low Degree of sense of High


Presence

25
BOS.CON 2010 | Green IT and Youth Involvement

effectiveness of the human virtual environment interaction or the transfer of training), then further
pursuit of this technology may be fruitless. In order to determine the effectiveness of a VE, a means of
assessing human performance efficiency in virtual worlds is first required. This is easier said than done.
Factors contributing to human performance in VEs predictably include the navigational complexity of
the VE and the degree of presence provided by the virtual world.

VR Reconstruction
Virtual reality enables heritage sites to be recreated extremely accurately, so that the recreations can be
published in various media. The original sites are often inaccessible to the public, or may even no
longer exist. This technology can be used to develop virtual replicas of caves, natural environment, old
towns, monuments, sculptures and archaeological elements.

Virtual Reality Hardware


Virtual Reality relies on specialized hardware to present information to users. Because of the
complexity of human perception, the hardware associated with VE presentation has been specialized to
render a single facet of human senses (especially visual perception, auditory perception, and haptic and
kinaesthetic perception). Although the interface components enable the rendering of different, separate
sensory information, they share common characteristics such as the following:
• dimension rendering
• spatial resolution
• refresh and update rates
• intensity
• range
• bandwidth
• number of users supported
• “naturalness" of design and interaction (body-centered interaction)
• size, weight, comfort, and mobility
• portability, and cost

Technologies Used
Virtual Reality consists of many technologies. They are as follows:
• Compositing
• Camera re-sectioning
• Head-mounted & Head-up
display
• Image-based modeling and
rendering
• Real-time computer graphics
• Virtual retinal display
• Wearable computer
• Stereoscopy
• Chroma key & Visual hull
• Omni-directional treadmill

These are technologies that make the virtual reality a possibility.

Applications
Virtual Reality finds its applications in all the areas. A few are:
• Design reviews
• Shopping experiences
• Simulation-based training

26
BOS.CON 2010 | Green IT and Youth Involvement

• Advergaming
• Sales configurators and more.

Tools
Virtools is a special tool to deliver graphically stunning, interactive real-time experiences for industry
or game production.

Virtools is a software program used to create interactive 3D virtual environments, which can then be
exported to play on the Web via Virtools 3D Life Player. Virtools uses resources in the form of 3D
models, textures, characters, sounds, videos, etc. which must be imported from (and created in) other
programs. Virtools is not a 3D modeling program or a graphics or sound editor. Media is saved in
specially designated folders (called resources) or can be imported directly.

Virtools is an extensive collection of technologies for 3D visualization. The Virtools technologies are
broadly grouped as:
1. Authoring application
2. Behavioral Engine (CK2)
3. Rendering Engine
4. Web Player, and
5. Software Development Kit (SDK)

Virtools Advantages
• 3DVIA Virtools is a complete development and deployment platform with an innovative
approach to interactive 3D content creation.
• The 3DVIA Virtools production process facilitates prototyping and robust development up to
large-scale, immersive or online, lifelike experience delivery.
• Breaking away from traditional environments, 3DVIA Virtools solutions help optimize
timescales and budgets:
• It helps you meet your production requirements on schedule, while significantly reducing
production costs and overall risks.

Impact of Virtual Reality


There has been an increase in interest in the potential social impact of new technologies, such as virtual
reality. The Future of Virtual Reality, argues that virtual reality will lead to a number of important
changes in human life and activity. He argues that:
• Virtual reality will be integrated into daily life and activity, and will be used in various human
ways.
• Techniques will be developed to influence human behavior, interpersonal communication, and
cognition.
• As we spend more and more time in virtual space, there will be a gradual "migration to virtual
space", resulting in important changes in economics, worldview, and culture.
• The design of virtual environments may be used to extend basic human rights into virtual
space, to promote human freedom and well-being, and to promote social stability as we move
from one stage in socio-political development to the next.
• Virtual reality can also be used to induce body transfer illusions.

Challenges for VR
Virtual reality has been heavily criticized for being an inefficient method for navigating non-
geographical information. At present, the idea of ubiquitous computing is very popular in user interface
design, and this may be seen as a reaction against VR and its problems. In reality, these two kinds of
interfaces have different goals and are complementary. The goal of ubiquitous computing is to bring

27
BOS.CON 2010 | Green IT and Youth Involvement

the computer into the user's world, rather than force the user to go inside the computer. The current
trend in VR is actually to merge the two user interfaces to create a fully immersive and integrated
experience.

Related Concepts
There are a few other concepts that are related to Virtual Reality. They are:
• Augmented reality
• Mediated reality
• Augmented virtuality
• CAVE - Cave Automatic Virtual Environment
• Simulated reality
• Virtual globe
• Virtual Reality Modeling Language
• Virtual worlds
• Virtuality Continuum

Conclusion
Virtual Reality is the going to be the powerful Multimedia technology which is going to change the life
and working style of the entire world. Its applications are going to make remarkable changes in the IT
field. Let’s invoke the change and also contribute to the change.

References
Brooks Jr., F. P. (1999). "What's Real About Virtual Reality?”, IEEE Computer Graphics and
Applications, 19(6), 16
Burdea, G. and P. Coffet (2003). Virtual Reality Technology, Second Edition. Wiley-IEEE Press.
Goslin, M, and Morie, J. F., (1996). ‘Virtopia’ - Emotional experiences in Virtual Environments,
Leonardo, vol. 29, no. 2, pp. 95–100.
Oliver Grau, (2003) Virtual Art: From Illusion to Immersion (Leonardo Book Series).
Cambridge/Massachusetts: MIT-Press.
Hayward V, Astley OR, Cruz-Hernandez M, Grant D, Robles-De-La-Torre G. “Haptic interfaces and
devices”, Sensor Review, 24(1), pp. 16–29 (2004).
Hillis, Ken (1999). Digital Sensations: Space, Identity and Embodiment in Virtual Reality, University
of Minnesota Press, Minneapolis, Minnesota.
Kalawsky, R. S. (1993). The Science of Virtual Reality and Virtual Environments: A Technical,
Scientific and Engineering Reference on Virtual Environments, Addison-Wesley, Wokingham,
England; Reading, Massachusetts

Group: PostgreSQL
Coordinator: Sundar Raj (Multimedia Division, BOSCO ITS)
Editors: Vivekrajan R., Joe Selvam P., and Saran Raj F.

28
BOS.CON 2010 | Green IT and Youth Involvement

Network Security
Abstract
Collection of interconnected computers is called as Network. Network Security is providing protection
for the resources over the network. The concept of this is protecting the network and the accessible
resources from unauthorized access. In Network, Security is needed both during storage of data as well
as during transmission of data. For that we are using the technologies like Encryption Techniques,
Firewall, Proxy Server, Authentication, Antivirus software, Anti-spyware program all these. The tools
used are: Firewall Tools COMODO, Antivirus software Tools like AVG Antivirus and Norton
Antivirus, Anti-spyware program Tools like Windows Defender and encryption techniques like AES
encryption. The applications of network security are Small houses, Schools, Medium business, large
business and Government. In all these areas we are using the network security to protect our system
from the unauthorized accesses.

Types of Threats
The threats that drive us towards network security are due to the bad and evil programs (like Malware),
which can attach our digital systems. A general name for such evil software is called Viruses, which
are actually pieces of code that attach to other programs. Worms do not need to attach to other stand-
alone programs and but they can propagate through email, and so on.

And also we have many other threats like Payloads. The Payloads erase hard disks or send user to
pornography sites if they mistype URLs. The Trojan horses are the exploitation programs that
disguise themselves as system files as well as the Spam which comes as unsolicited commercial e-mail
and cheats the victim users.

The main threat in the network is the Fraud in the sense of Deceiving individuals to get them to do
things against their interests and making the users to get cheated. We must also be aware of the
Phishing which means the sophisticated social engineering attack in which an authentic-looking email
or Website that entices the user to enter his or her username, password, or other sensitive information.

Another important threat is Hacking. Hacking is intentionally using a computer resource without
authorization or in excess of authorization. The other important threat is the Scanning Phase, that is,
sending attack probes to map the network and identify possible victim hosts to attack.

Distributed Denial-of-Service (DDoS)

By sending attack commands continuously, an Attacker can make the Victim system's services to be
denied. Here we must speak of the different kinds of attackers who can be the threat for our system. We
can classify them as follows: Traditional Attackers who will be like the professionals and they will
do in the way in which no one can catch them. Traditional Wizard Hackers and the Virus writers
are the one who writes the evil software are another breed of security threat. We have also the Script
kiddies i.e. kids who can write very simple scripts to remove the files, but if we put them together then

29
BOS.CON 2010 | Green IT and Youth Involvement

they will cause us a lot. Of course, we need not mention about the Criminal Attackers. So, what is the
way to protect our system from all these kind of threats? We are going to see some of the concepts to
protect our system from these threats:

Security Measures

Digital Certificate Authentication

Public and Private Keys


Private Key is with the individuals and it is kept secret. And the Public key is with others using which
only the details alone can be seen and modification is denied.

The Process of this authentication is this: after a form is completed for any transaction
along with username and Password, the secret code from the private key will be entered.
This private key will encrypt the document. When the document is opened by using
public key the document will be decrypted. All the details will be shown but
modification cannot be done.

Example for Public key

Name: Smith
Public Key: 8m27cj$leo62@lj*^l18dwk...
Other field

Tamper Checking Field
Strong Digital Certificate Authentication

Firewall
Firewall is hardware, software, or a combination of both which is used to prevent unauthorized
programs or Internet users from accessing a private network and/or a single computer. A firewall
Works like this: It inspects each individual “packet” of data as it arrives at either Side of the Firewall; it
determines whether the packet of data should be allowed to pass through or if it should be blocked.

The Firewall follows some rules, they are:

Allow – traffic that flows automatically because it has been found to be ‘safe’. Firewall will allow the
packet of data and it will be stored in the file; whenever we want the data we can set some criteria and
can retrieve the same.

Block – traffic that is blocked because it has been deemed dangerous to your computer. It will block all
the files that reach our system and it will be stored in the log file and we can get the needed files
whenever we want it by setting some criteria.

Ask – asks the user whether or not the traffic is allowed to pass through. It will ask for some

30
BOS.CON 2010 | Green IT and Youth Involvement

authentication to allow and if the files has that authentication then it will be allowed in our system;
otherwise, it will be stored in the log file and if we want, we can retrieve it whenever we need by
setting some criteria in the log files.

What a personal firewall can do?


It stops hackers from accessing your computer and protects your personal information. Personal
Firewall determines which programs can access the Internet. With the use of this type of firewall, we
can protect the system from unwanted and unauthorized files.

What a personal firewall cannot do?


A personal firewall cannot prevent email viruses. Only an antivirus product with updated definitions
can prevent email viruses. After setting up this firewall initially, you cannot just forget about it;
because the firewall will require periodic updates to the rule sets and the software itself.

Firewall Operation

Firewall Operation

Here when the attacker sends the attacked files through the internet, the firewall system that we fixed in
the system will stop that unauthorized files and it will be stored in the log files; if we want to have a
look at it, we can do so and can retrieve the files if they are really needed.

Cryptographic Protections
Cryptographic systems provide security to multi-message dialogues. In the beginning the two parties
mutually authenticate each other, after this initial authentication, cryptographic systems provide
protection to every message. Cryptographic systems add an electronic signature to each message. The
electronic signature authenticates the sender. It also provides message integrity: receiver can tell if a
message has been changed in transit.

Applications
We can use the network security technique in the small houses in order to protect our personal
computer from the crackers. And also we can use this technique for the companies which cannot have
the proper security.

When we speak of the larger companies, we cannot provide the firewall security for all the system.
Hence, in case of a larger company, we can go for the proxy server application. When a person is sent
out of the company due to any fault attempt then the person may try to do some evil things to the
company and its systems that they are familiar with. We must be aware of them and we must not allow
them to get in to our system once again in any of the way.

In the internet we cannot always use these two techniques; so we can go for the encryption technique
and it will be very useful for administrators to maintain the systems. In the case of banks, we need to
go for the digital authentication to maintain the large amount of data.

In schools, the kids can make some sort of scripts that can just remove the files but when you install
them, they may attack your system. In case of IP, the student might use them in the wrong way for
pornography materials. We can restrict the access to these websites by setting a proxy server between
the student’s system and the internet provider.

31
BOS.CON 2010 | Green IT and Youth Involvement

Conclusion
In order to protect our system from the hackers, we can deploy the network security that is appropriate
for use. In the large business companies, one must go for a network security that protects the systems
from the hackers.

For the network security we have many tools and ways to protect our system with firewall and proxy
server. In the banking systems, we use the digital authentication to reduce the theft of the credit cards
and hacking of the ATM machines.

In the schools we should not allow the students to have all the provisions that an administrators have
and if that happen we cannot stop them from getting into the system. We should not allow any of the
outside people to access the system; in that case then, they may hack into our system and they may
spoil our things that we use for our school.

Network security is a must for all the organization and for all the business places and government to
protect their systems and the data. If the management fails to give good network security, this implies
that there is no good working system is functioning there.

Reference
Andrew S. Tanenbaum, Computer Networks, Third Edition, Prentice Hall of India, New Delhi, 2000
www.dogster.com
www.petzzy.com
www.doggysnaps.com
www.sniflabs.com

Group Name: Ingres


Coordinator: William Sundram (HOD: Computer Science)
Editors: Joseph. P., Anand. J., and Peter Felix. A.

32
BOS.CON 2010 | Green IT and Youth Involvement

Elearning Technologies

Abstract
Elearning to be established as a global practice, require new innovative means to increase their
effectiveness. Effective Elearning thrives at the nexus of web usability, communication, relationship,
document and Knowledge Management tools. This technical report presents a clear view of what
Elearning is, its tools, technologies and its varied types, highlighting how web technologies are used in
learning.

Introduction
Elearning comprises all forms of electronically supported learning and teaching. Elearning is
essentially the computer and network enabled transfer of skills and knowledge. Elearning applications
and processes include web-based learning, computer-based learning, virtual classrooms and digital
collaboration. Content is delivered via the Internet/extranet, audio or video tape, satellite TV, and CD-
ROM. It can be self-paced or instructor-led and includes media in the form of text, image, animation,
streaming video and audio.

A crucial issue in Elearning is how to organize and classify the learning content so that learners and
instructors can find what they need when they really need it. The success of Elearning applications
depends on the amount of effort that is involved in developing teaching and learning material by
authors and in retrieving relevant learning resources by learners.

History
As early as 1993, William D. Graziadei described an online computer-delivered lecture, tutorial and
assessment project using electronic Mail, two VAX Notes conferences and Gopher/Lynx together with
several software programs that allowed students and instructor to create a Virtual Instructional
Classroom Environment in Science (VICES) in Research Education, Service & Teaching (REST). In
1997 Graziadei published an article entitled ‘Building Asynchronous and Synchronous Teaching-
Learning Environments: Exploring a Course/Classroom Management System Solution’.

Concept
A learning environment supported by continuously evolving, collaborative processes focused on
increasing individual and organizational performance. Effective Elearning thrives at the nexus of web
usability, communication, relationship, document and Knowledge Management tools.

Elearning is…
• Non-Linear: Learners determine how, what and when they access information
• Dynamic Process: Transformed, personalized, customized on demand in response to
learner and environmental variables and Available on demand and just-in-time.
• Learner Controlled: Learner controls their interaction with the content and presentation.
Learner has opportunities for reflection and application.
• Reusable objects: Content of any media that can be chunked down to the most granular,
meaningful level to allow combinations of objects to be assembled and dynamically
presented for different environments and functional needs.
• Informal: Recognizes that at least 70% of learning occurs in meetings, in the corridors
and break-rooms, through collaboration and in situational communities.
• Platform independent: It can be transformed for use in variety of standard formats –
XML, HTML, DHTML and PDA etc. in a variety of environments, both formal and
informal.

33
BOS.CON 2010 | Green IT and Youth Involvement

• Knowledge Management: Rich, flexible tools chosen to create, collect and distribute
information, on demand and contextually to learners, intra and extra organizationally.

Types of E- learning
Learning can be based on what the users use for learning. They are, Computer-based learning, Web-
based learning and Technology-based learning. Now-a-days people mostly learn through computer and
web-based learning environment.

Computer–based Learning
Computer-based learning, sometimes abbreviated to CBL or CBT, refers to the use of computers as a
key component of the educational environment. While this can refer to the use of computers in a
classroom, the term more broadly refers to a structured environment in which computers are used for
teaching purposes.

Cassandra B. Whyte researched about the ever increasing role that computers would play in higher
education. This evolution, to include computer-supported collaborative learning, in addition to data
management, has been realized. The type of computers have changed over the years from
cumbersome, slow devices taking up much space in the classroom, home and office to laptops and
handled devices that are more portable in form and size and will continue to do so.

Technology-enhanced learning (TeL)


Technology enhanced learning has the goal to provide socio-technical innovations (also improving
efficiency and cost effectiveness) for Elearning practices, regarding individuals and organizations,
independent of time, place and pace. The field of TEL therefore applies to the support of any learning
activity through technology.

Technologies used in Elearning


1. Communication Technology
2. Database Technology
3. Web Technology
4. Multimedia Technology

Communication technologies used in Elearning


Communication technologies are generally categorized as asynchronous or synchronous.
Asynchronous activities use technologies such as blogs, wikis and discussion boards. The idea here is
that participants may engage in the exchange of ideas or information without the dependency of other
participant’s involvement at the same time. Electronic mail is also asynchronous in that mail can be
sent or received without having both the participants’ involvement at the same time.

Synchronous activities involve the exchange of ideas and information with one or more participants
during the same period of time. A face to face discussion is an example of synchronous
communications. Synchronous activities occur with all participants joining in at once, as with an online
chat session or a virtual classroom or meeting.

Virtual classrooms and meetings can often use a mix of communication technologies. In many models,
the writing community and the communication channels relate with the Elearning and the M-learning
models and the activities required for the participants to join the learning sessions across the virtual
classroom or even across standard classrooms enabled by technology. Many activities, essential for the
learners in these environments, require frequent chat sessions in the form of virtual classrooms and/or
blog meetings.

Reusability, Standards and learning objects


Much effort has been put into the technical reuse of electronically based learning materials and in
particular creating or re-using Learning objects. These are self contained units that are properly tagged
with keywords, or other metadata, and often stored in an XML file format. Creating a course required
putting together a sequence of learning objects. There are proprietary and open, non-commercial and
commercial, peer- reviewed repositories of learning objects such as the Merlot repository. A Common

34
BOS.CON 2010 | Green IT and Youth Involvement

standard format for Elearning content is SCORM while other specifications allow for the transporting
of “learning objects” (Schools Framework) or categorizing metadata (LOM).

Tools used in Elearning


• Blogging tools: Blogging tool let you create and write content to a blog (or web log).

• Collaboration tools
o Application sharing: An application sharing program or utility lets the presenter
share programs, windows, or the entire screen with participants.
o Chat and instant messaging: Chat and instant messaging allow participants to carry
on a text-based conversation in real-time.
o Email: Email readers, or clients, enable you to exchange messages with other email
clients using the Internet.
• Media: Chip animation
Clip animation refers to animated sequences that can be purchased, downloaded, possibly edited,
and used in online projects such as Elearning.

• Media editors
o Audio: Audio tools are used to capture, create, and edit sounds that provide narration,
sound effects, and music.
o Graphics: Graphics tools are used to create drawings, photographs, charts, graphs,
diagrams, and icons.
o Multimedia: Multimedia tools can capture, edit, or output multiple forms of media-
graphics, animation and video. They go beyond the tools designed to capture, create,
or edit a particular medium.
• Testing and assessment tools
Testing and assessment tools let you create tests, quizzes, and other activities that measure the
effectiveness of learning.

Application areas
1. Education: Elearning is helpful in conducting paperless examinations, online training and virtual
classroom learning. It can also offer face-to-face lectures and distance education.
2. Healthcare: Through video conferencing, Elearning helps the surgeons performing surgeries.
Using Multimedia technology, it also helps in instructing the patients on ways of maintaining
his/her health and taking precautionary measures. ‘Real’ simulations can be provided during
Medical training.
3. Entertainment: Games can be made available online. Using multimedia tools, Virtual reality
can be created, for playing games.
4. Governance: Government can make use of Elearning technologies to train the general public
and other government personnel, on government related matters. For e.g. it can provide online
instructions to get passport and all other government certificates.
5. Research Center: Elearning helps the researchers in making research more effective. The
research guides can upload the sample presentations and virtual models online, which in turn may
be used by the fellow and junior researchers to understand the topics better.

Benefits
Increased access
Instructors of the highest caliber can share their knowledge across borders; allowing students to attend
courses have the opportunity of making information available internationally, to anyone interested at

35
BOS.CON 2010 | Green IT and Youth Involvement

minimum costs. For example, the MIT Open Course Ware (OCW) program has made substantial
portions of that university’s curriculum and lectures available for free online.

Convenience and flexibility to learners


In many contexts, Elearning is self-paced and the learning sessions are available 24x7. Learners are not
bound to a specific day/time to physically attend classes. They can also pause learning sessions at their
convenience. High technology is not necessary for all online courses. Basic internet access, audio, and
video capabilities are common requirements. Depending on the technology used, students can begin
their courses while at work and finish those at an alternate internet equipped location.

Skill Development
To develop the skills and competencies needed in the 21st century, in particular to ensure that learners
have the digital literacy skills required in their discipline, profession or career. Bates states that a major
argument for Elearning is that it enables learners to develop essential skills for knowledge-based
workers by embedding the use of information and communications technologies within the curriculum.
He also argues that using Elearning in this way has major implications for course design and the
assessment of learners.

Drawbacks
• It can be difficult to manage student classroom behavior: During class sessions, it may be hard
for the instructor to maintain the attention and participation of the students in the class. If only
the instructor is visible during the meeting, it is easy for students to become distracted by
other things and not pay any attention.
• Flexibility doesn’t necessarily mean better student performance: Though it is nice for students
to work at their own pace, it doesn’t necessarily mean that flexibility will facilitative skill or
knowledge acquisition.
• Cultural acceptance: Many view Elearning as un-necessary or untraditional. Having a negative
bias toward the teaching procedures may result in low student performance.

Conclusion
Learning is the most essential and innate passion for human being. Learning has no limits because it is
a lifelong Endeavour, from cradle-to-the-grave, one keeps learning. To develop the skills and
competencies needed in the 21st century, in particular to ensure that learners have the digital literacy
skills required in their discipline, profession or career. Bates states that a major argument for Elearning
is that it enables learners to develop essential skills for knowledge-based workers by embedding the use
of information and communications technologies within the curriculum.

Reference
‘Learning the interactive way’, Digital Learning, April-2010, 6(2010)4
‘Commitment for Learning’, Digital Learning, September-2010, 6(2010)9
EduTech, Media Publication, August 2010, 1(2010)10
http://en.wikipedia.org/wiki/Elearning
www.edu_leaders.com
www.digitallearning.in
www.expresscomputeronline.com

Group Name: DB2


Coordinator: Jaya Mary Christuraj (BIIT: Faculty)
Editors: C. Pasca Mary, J. Anitha and Nagalakshmi

36
BOS.CON 2010 | Green IT and Youth Involvement

E-Governance
Abstract
eGovernance can be defined as giving the choice of when and where people access and avail
Government Information and Services respectively. eGovernance Projects have attempted to improve
the reach, enhance the base, and minimize the processing cost. eGovernance provides the better
service to the citizens through many applications.

Introduction
eGovernance is Electronic Governance. It is not just about Government website and Email. It is not just
about Service delivery over the Internet. It will change how citizens relate to Government as much as it
changes how citizens relate to each other. It will also bring forth new concepts of citizenship both in
terms of needs and responsibilities.

Concept
eGovernance can be defined as giving citizens, the choice of accessing the information and services
provided by the government online (from anywhere at any time). Putting the Citizens at the centre of
Government means taking a delivery channel view; it would mean using more and more of Electronic
Information Technology in many of the Government Functions. Typically this would also mean web-
enabled applications. However, eGovernance can also be called as automated application for
Government sector that helps in achieving SMART governance which some define as Speed, Moral,
Accountable/Accurate, Responsive and Transparent governance.

Why eGovernance?
The Purpose of implementing eGovernance is to enhance good Governance. Good Governance is
generally characterized by participation, transparency and accountability. The recent advances in
Communication technologies and the providing Internet opportunities are to transform the relationship
between E-Governments and Citizens in a new way, thus contributing to the achievement of good
Governance goals. The use of Information Technology can increase the broad involvement of Citizens
in the process of Governance at all levels by providing the possibility of online discussion groups and
by enhancing the rapid development and effectiveness of pressure groups.

The Phases of eGovernance


There are a few processes that take place between the Government and the Citizens in order to interact
between the Government and the Citizens. They are as follows:
• Information
• Interaction
• Transaction
Information
It is being present in the web, providing the public with relevant information. For Example,
• Calendar of examination
• Time tables and examination results
• All welfare schemes
• Rights of the citizens

Interaction
It is about interaction between government and Public through,
• Chat rooms
• Online classrooms
• Discussions with the press and government bodies

37
BOS.CON 2010 | Green IT and Youth Involvement

Transaction
Transaction can be done without going to the Government Office. Here are few the examples for such
Transactions:
• Payment of utility bills.
• Electricity, Gas and so on
• Payment of various taxes (Income Tax, Professional Tax, Property Tax)
• Applying for income and community certificate
• Registering birth, death and marriage.
• Applying for passports, PAN card and so on.

Characteristic of eGovernance
E-Engagement E-consultant

E-Governance

Controllership Networked selected Guidance

Standardization
There are some aspects that need to be added in eGovernance in order to make as standard service.
They are
• Storage standards
• Font standards
• Inputting standards
• Transliteration / Roman equivalent
• Sorting order / sequence for Indian languages.
• OCR Standards
• Standards for Website and Email
• Local Search Engine Standards
• Availability of all constitutionally recognized Indian Languages in all Operating Systems
• Strategy for conversion of data from ISCII to UNI

Tools
Mostly all the electronic devices can be used in eGovernance. But the following tools are often used.
• Internet: Web-based Applications
• Email
• Mobile
• Television
• Pocket Internet

Technologies
There are many technologies namely, Web technology, Mobile technology and Television
communication for eGovernance.

• Web Technology: This is the one which is mainly used for eGovernance. Internet plays a vital
role to get to know about eGovernance and functionalize the objectives of eGovernance.

38
BOS.CON 2010 | Green IT and Youth Involvement

• Mobile Technology: Internet can be accessed also through mobile. We need not have computer
to so. This implies that wherever we are, we will be able to access the Services and the Information
of the government.

• Television Communication: Most of the rural areas have not got the internet facility. Hence,
to this day the citizens of the rural area continue the one-way communication through Television.

eGovernance in India
Many projects have been successfully developed in India. The reasons are,
• Islands of successful eGovernance projects in many States
• Politicians and Administrators buy in at the higher level, the effective use of the forum of
interstate council
• Systematic Assessment and Evaluation of eGovernance Projects
• Standardize, localize and replicate national centre for good governance
• Responsibility of best eGovernance and good practices
• Research and Building
• Dissemination of Information
• Setup State Centers for Good Governance (SCGG)

Challenges of eGovernance
Some of the Challenges of eGovernance are Infrastructure, Privacy and security, People’s Readiness
and Legal issues.

Applications
The Fields of implementation of eGovernance are:

• E-Administration: Refers to improving of government process and the internal working of the
public sector with new excited information process of eGovernance.

• E-Services: Refers to improved delivery of public services to citizens; some examples of


interactive services are request for public document, request for legal documents and certificates
issuing permits and licenses.

• E-Democracy: Implies greater and more active citizen participation and involvement enabled by
eGovernance in the decision-making process. The use of ICI in eGovernance can be illustrated as
an example for E-Democracy.

• Informing Citizens: Making information widely available to citizens with the aim of increasing
transparency and accountability, providing information about the political process about the
services and the availability choices.

• Improved Service Delivery: By giving the citizens a greater choice, faster delivery and
improved efficiency of services.

• Increased Citizen’s Participation: Improving accessibility of citizens to their elected


members creating a vision for partnership in the decision-making process.

Successful eGovernance Projects


BHOOMI, Karnataka: The first eGovernance project and land records computerization system.

RASI, Tamil Nadu [Rural Access to Service through Internet] of Tamil Nadu Rural IT Infrastructure
in Tamil Nadu.

39
BOS.CON 2010 | Green IT and Youth Involvement

WARNA, Maharashtra: Wired Village Concept at WARNA Co-Operative complex in Kolhapur and
Sangli districts in Maharashta

CARD, AP: System of registration through electronic delivery of all the registration services.

E-Seva, AP: It Provides services relating to payment of Utility Bills, Certificates, Permits licenses,
Reservation etc.

Advantages
• Improve the efficiency of the current system
• Reduced corruption and Manpower
• Reduced cost of running government
• More efficient and faster delivery of service and information
• Save time and money
• Ease of Learning
• National Development by IT

It helps in expanding the scope of governances in the areas like E-Democracy, E-Participation.

Disadvantages
Digital Divide, Unavailability of facility, Illiteracy, Lack of education among people, Not easy to use
and Lack of people’s trust.

Conclusion
Moving from manual to online for small procedures produces large benefits. But integration across
departments is more complex. Therefore, legacy systems with large number of websites used by
citizens unwilling to engage the intermediates are needed. We can save our own time, if we use
eGovernance. Through eGovernance, we can develop our country.

Reference
Adeel Ghayur, The E-Government: A. Framework for Transition to E-Governance, H2O Power Pvt.
Ltd. adeel@h2opower.com.pk
www.akshaya.kerala.gov.in/pdf/presentation/akshaya-friends.ppt
www.cs.northwestern.edu/~agupta/_projects/ibm.../eGovernance.ppt
www.cs.northwestern.edu/~agupta/_projects/ibm.../eGovernance.ppt
www.pide.org.pk/pdf/Seminar/E-Government.pdf
www.rti.gov.in
www.elitex.in/presentation2007/suchitrapyarelal.ppt

Group Name: MySQL


Coordinator: Fr Maria Arockiaraj (Vice-Rector, CKO: Arivagam, VP: F&A, BICS)
Editors: Reka A., Lincy Angel D., and Amala Jeyanthi

40
BOS.CON 2010 | Green IT and Youth Involvement

Database Technology
Abstract
To understand the present it is very important that we look at the past. How can we know the past? It
is possible only if the information is available. So information plays vital role in the world. Database
technology is the one, which is used in all the fields, because the information can be stored and
retrieved in database. And another advantage of database technology is that in all the applications the
database is used in different ways. There are many types of databases available; for example,
operational database, data warehouse, analytical database, distributed database and hyper-media
database. Different kinds of models are used to design database too. The main advantage of database
is that anyone can design their database as they wish and as per their need. This report highlights how
important database technology is.

Introduction
A database is a collection of data which has been organized so that a computer program can quickly
select desired items. The essential feature of database technology is that it provides an INTERNAL
Representation (model) of the EXTERNAL world of interest, consistent with external reality. This
involves the results of extensive R&D over the past 30 years in areas such as user requirements
analysis, data modeling, process modeling, data integrity, concurrency, transactions, file organization,
indexing, rollback and recovery, persistent programming, object-orientation, logic programming,
deductive database systems, active database systems... and in all these (and other) areas there remains
much to be done.

A Database management System consists of a single logical Database that is split into a number of
fragments .Then they are stored on computers under the control of database Management system over a
network where it can be processed independently. In a large modern enterprise, it is almost inevitable
that different portions of the organization will use different database management systems to store and
search their critical data. Competition, evolving technology, mergers, acquisitions, geographic
distribution, and the inevitable decentralization of growth all contribute to this diversity. Yet it is only
by combining the information from these systems that the enterprise can realize the full value of the
data they contain.

Architecture
Database architecture consists of three levels, external, conceptual and internal. Clearly separating the
three levels was a major feature of the relational data model that dominates 21st century databases. The
external level defines how users understand the organization of the data. A single database can have
any number of views at the external level. The internal level defines how the data is physically stored
and processed by the computing system. Internal architecture is concerned with cost, performance,
scalability and other operational matters. The conceptual is a level of interaction between internal and
external. It provides a common view of the database that is uncomplicated by details of how the data is
stored or managed, and that can unify the various external views into a coherent whole.

Types of databases

Operational Database
These databases store detailed data about the operations of an organization. They are typically
organized by subject matter, process relatively high volumes of updates using transactions. Essentially
every major organization on earth uses such databases. Examples include customer databases that
record contact, credit, and demographic information about a business' customers, personnel databases
that hold information such as salary, benefits, skills data about employees, manufacturing databases
that record details about product components, parts inventory, and financial databases that keep track
of the organization's money, accounting and financial dealings.

41
BOS.CON 2010 | Green IT and Youth Involvement

Data Warehouse
A data warehouse is a repository (collection of resources that can be accessed to retrieve information)
of an organization's electronically stored data, designed to facilitate reporting and analysis. In simple
form data warehouse is a collection of large amount of data. This definition of the data warehouse
focuses on data storage. The main source of the data is cleaned, transformed and cataloged and is made
available to be used by managers and other business professional for data mining, online analytical
processing, market research and decision support. However, the means to retrieve and analyze data, to
extract, transform and load data, and to manage the data dictionary are also considered essential
components of a data warehousing system. Many references to data warehousing use this broader
context. Thus, an expanded definition for data warehousing includes business intelligence tools, tools
to extract, transform and load data into the repository, and tools to manage and retrieve metadata. Data
warehousing arises in an organization's need for reliable, consolidated, unique and integrated analysis
and reporting of its data, at different levels of aggregation.

Analytical Database
The analytical database system reads and processes the data in the modified form. The analytical
database system reads only a minimal amount of data that is necessary to fulfill a data request from a
business user. The analysis database system performs all operations in memory including direct
traversal of compressed data structures. The analytical database system distributes the database reading
and processing across a variable number of servers. The time necessary to read and process the data
that is assigned to one of the servers does not exceed a desired response time of the analytical database
system. The analytical database system executes applications in a pipeline fashion. In other words,
phases of application are overlapped such that processing delays are reduced. This allows different
stages of the analysis to be performed simultaneously and in parallel.

Distributed Database
These are databases of local work-groups and departments at regional offices, branch offices,
manufacturing plants and other work sites. These databases can include segments of both common
operational and common user databases, as well as data generated and used only at a user’s own site.
This is the database where a lot of databases are connected and the information is shared among them.
The data can be in any one of the database and the data might be retrieved from any one of the system.

Hypermedia Databases
The World Wide Web can be thought of as a database, albeit one spread across millions of independent
computing systems. Web browsers "process" this data one page at a time, while web crawlers and other
software provide the equivalent of database indexes to support search and other activities.

Model of the databases

Post-relational Database Models


Products offering a more general data model than the relational model are sometimes classified as post-
relational Alternate terms include "hybrid database", "Object-enhanced RDBMS" and others. The data
model in such products incorporates relations. It is not based on constrained Information Principle,
which requires that all information in the database must be cast explicitly in terms of values in relations
and in no other way. Some of these extensions to the relational model integrate concepts from
technologies that pre-date the relational model. For example, they allow representation of a directed
graph with trees on the nodes. Some post-relational products extend relational systems with non-
relational features. Others arrived in much the same place by adding relational features to pre-relational
systems. Paradoxically, this allows products that are historically pre-relational, such as PICK and
MUMPS, to make a plausible claim to be post-relational.

Object Database Models


In recent years, the object-oriented paradigm has been applied in areas such as engineering and spatial
databases, telecommunications and in various scientific domains. The conglomeration of object-
oriented programming and database technology led to this new kind of database. These databases
attempt to bring the database world and the application-programming world closer together, in
particular by ensuring that the database uses the same type of system as the application program. This
aims to avoid the overhead of converting information between its representation in the database and its

42
BOS.CON 2010 | Green IT and Youth Involvement

representation in the application program. At the same time, object databases attempt to introduce key
ideas of object programming, such as encapsulation and polymorphism, into the world of databases. A
variety of these ways have been tried for storing objects in a database. Some products have approached
the problem from the application-programming side, by making the objects manipulated by the
persistent program. This also typically requires the addition of some kind of query language, since
conventional programming languages do not provide language-level functionality for finding objects
based on their information content. Others have attacked the problem from the database end, by
defining an object-oriented data model for the database, and defining a database.

Data Mining
Data mining (sometimes called data or knowledge discovery) is the process of analyzing data from
different perspectives and summarizing it into useful information - information that can be used to
increase revenue, cuts costs, or both. Data mining software is one of a number of analytical tools for
analyzing data. It allows users to analyze data from many different dimensions or angles, categorize it,
and summarize the relationships identified. Technically, data mining is the process of finding
correlations or patterns among dozens of fields in large relational databases.

What can data mining do?


Data mining is primarily used today by companies with a strong consumer focus - retail, financial,
communication, and marketing organizations. It enables these companies to determine relationships
among "internal" factors such as price, product positioning, or staff skills, and "external" factors such
as economic indicators, competition, and customer demographics. And, it enables them to determine
the impact on sales, customer satisfaction, and corporate profits. Finally, it enables them to "drill
down" into summary information to view detail transactional data. With data mining, a retailer could
use point-of-sale records of customer purchases to send targeted promotions based on an individual's
purchase history. By mining demographic data from comment or warranty cards, the retailer could
develop products and promotions to appeal to specific customer segments.

Indexing
Indexing is a technique for improving database performance. The many types of index share the
common property that they eliminate the need to examine every entry when running a query. In large
databases, this can reduce query time/cost by orders of magnitude. The simplest form of index is a
sorted list of values that can be searched using a binary search with an adjacent reference to the
location of the entry, analogous to the index in the back of a book. The same data can have multiple
indexes. Indexes affect performance, but not results. Database designers can add or remove indexes
without changing application logic, reducing maintenance costs as the database grows and database
usage evolves. Given a particular query, the DBMS' query optimizer is responsible for devising the
most efficient strategy for finding matching data. The optimizer decides which index or indexes to use,
how to combine data from different parts of the database, how to provide data in the order requested,
etc. Indexes can speed up data access, but they consume space in the database, and must be updated
each time the data are altered. Indexes therefore can speed data access but slow data maintenance.
These two properties determine whether a given index is worth the cost.

Advantages
• Large amount of data is stored and retrieved easily within all the databases.
• The exact data is retrieved and the speed of the processing is high.
• Data is distributed to different databases and the data is maintained there.
• Since the data is shared with different databases the size of the memory is managed
efficiently.
• The companies and the industries use this very efficiently.

Disadvantages
• Complexity is high.
• If it is single database the size of the memory is very high.
• The speed of the process is slow if data is more.

43
BOS.CON 2010 | Green IT and Youth Involvement

• Additional hardware requirement is needed to perform well.

Conclusion
Database Technologies make the world to be smart. It is used to manage the data and there are many
technologies available for the database. But the most important is how the data is stored and maintained
and retrieved when it is needed. So it’s based on the fields or applications how the database technology
is used in efficient way. It is hoped that this DB technology will define the requirements for the way
forward; perhaps the requirement is for world to exchange experience and to motivate the initiation of
joint databases. There is clearly a need to share the information over the world. Hopefully joint
databases can be initiated in order to demonstrate the effectiveness of DB technology for the region.

Reference
http://www.dev.mysql.com/.../connector-j-reference-configuration-properties.html
http:// www.herongyang.com/.../MySQL-JDBC-Driver-Connection-URL.html
http://www.libweb.uoregon.edu/systems/databaseURLS.html
http://www.download.oracle.com/docs/cd/E11223_01/doc.910/.../create.htm

Group Name: Sqlite


Coordinator: Antony Raj A. (Project Leader, BOSCO ITS)
Editors: Sivagnanam.G, Panthiyan James, Jagatheshwaran.S.

44
BOS.CON 2010 | Green IT and Youth Involvement

Cloud Computing
Abstract
Cloud computing is a wed-based technology which maintains data and application to be provided as a
service on Web. It allows us to store huge amount of data in a centralized server. The users can access
their or business files wherever, with internet connections. These services are classified into there parts
namely: SaaS, PaaS, IaaS. The users can achieve their need by using services “on demand”. The users
need not pay for hardware, software or maintaining the services, rather the resources they use is, “pay
by use”. This can be used by most of the multi-technology companies and also it provides services in
an efficient manner, anytime and anywhere.

Introduction
The term "cloud computing" is an evolving concept. Some believe it to be a new way of computing
while others focus on the processes involved with more efficient data transfer. The overall concept is
that cloud computing is an innovation that allows users, from the smallest to the largest, to use shared
hardware and software to send their data packets more effectively. It is, in effect, a new infrastructure
for the World Wide Web and not so much of a new way of computing data. Which has compiled a list
of the top 150 cloud computing players, the situation is evolving rapidly enough to caution IT pros to
check each one out for themselves and to evaluate the quality of movers and shakers. Cloud Computing
provides resources as a service from anywhere, at anytime, regardless what kind of system the users
want to access and use their data.

Concepts
Cloud computing is a technology that uses the internet and remote servers to store the applications and
data to provide services, ‘on demand in many forms’.

Software as a Service (SaaS)


SaaS provides software as a Service. The consumer use applications whenever they want, but they
don’t have control over the operating system, hardware or network infrastructure on which it is
running. The consumers pay for the resources they use. SaaS is secure and reliable. Many companies in
India are targeted to deliver their applications on SaaS.

Platform as a Service (PaaS)


It delivers a computing platform and/or solution stack as a service. PaaS facilitates deployment of
applications without the cost and complexity of buying and managing the underlying hardware and
software layers. This platform is typically an application framework. The applications can be
distributed over the internet. It becomes as SaaS model when it provides applications as a service.

Infrastructures as a Service (IaaS)


The consumer uses fundamental computing resources such as processing powers, storage, networking
components of middleware (which is a small application to communicate with other devices
efficiently). One can control the operating system, storage, deployed applications and possible
networking components (firewalls). The users need not have any operating system on personal
computer when they use IaaS models.

Deployment Models
The NIST (National Institute of Standards and Technology) defines four deployment models.
1. Public Cloud
2. Private Cloud
3. Community Cloud
4. Hybrid Cloud

Technologies
There are many technologies involved in cloud computing:

45
BOS.CON 2010 | Green IT and Youth Involvement

• Web Technology
• Distributed file system
• Virtualization

(i) Web technology


Mashup everything that is available on the web; and it enables the services to reach all in the world.
There are several web services that provide these services to the consumers. The web technology
enables the services in public, sharable, available on the web whenever we want. For examples:
• Toggle
• Anagozn
• Bhir

The companies in the IT sector lead the way in their use of Web technologies. Software as a service is
used by 94% of them, compared with 75% across all industries. Some 88% of InformationWeek 500
companies are using wikis, blogs, and social networking for external collaboration, compared with
72% for the entire population. The trend continues for cloud computing (66% vs. 50%), hosted
collaborative apps (62% vs. 55%), (60% vs. 48%), and platform as a service (46% vs. 17%).

(ii) Distributed file system


The Distributed File System (DFS) technologies in Windows Server 2003 R2 offer wide area network
(WAN)-friendly replication as well as simplified, fault-tolerant access to geographically dispersed files.

The two technologies in DFS are as follows:

1. DFS Replication. New state-based, multi-master replication engine that is optimized for WAN
environments. DFS Replication supports replication scheduling, bandwidth throttling, and a new
byte-level compression algorithm known as remote differential compression (RDC).
2. DFS Namespaces. Technology that helps administrators group shared folders located on different
servers and presents them to users as a virtual tree of folders known as a namespace. DFS
Namespaces was formerly known as Distributed File System in Windows 2000 Server and
Windows Server 2003.

(iii) Virtualization
Virtualization is software technology which uses a physical resource such as a server and divides it up
into virtual resources called virtual machines (VM's). Virtualization allows users to consolidate
physical resources, simplify deployment and administration, and reduce power and cooling
requirements. While virtualization technology is most popular in the server world, virtualization
technology is also being used in data storage.

Tools
RightScale
RightScale is a web-based cloud computing management platform for managing cloud infrastructure
from multiple providers.

Coghead
Coghead was a web application company based on Redwood City, California. The company offered a
Web-based service for building and hosting custom online database applications. Applications were
built around custom data collections (similar to tables) and are typically designed to facilitate
management of, and collaboration on, business data.

Coghead's product is a fully hosted environment for building, accessing, and maintaining applications
and the associated business data. Like other so-called "Web 2.0" companies, Coghead has built its
product around the idea of SaaS. The product is intended to allow users to design a range of
applications from scratch using only a drag and drop, WYSIWYG user interface, with very limited
scripting or coding (if any) required.

46
BOS.CON 2010 | Green IT and Youth Involvement

Elastra
Elastra unveiled its approach today to making cloud computing more practical, introducing two markup
languages - one (ECML) that helps pull applications together to deploy to a cloud environment, and a
second (EDML) to help define and organize the right cloud-based infrastructure to support those
applications.

Applications
Cloud Computing are applied in small and large scale industries.

Conclusion
Cloud computing has been gathering significant interest in the past months. But aside from developers,
testers and startups, the ability to exploit the efficiencies and cost-benefits of cloud computing for
average enterprises continue to remain hard to grasp.

Reference
www.iiea.com/Cloud-Computing
http://en.wikipedia.org/wiki/Cloud_computing
www.wikinvest.com/concept/Cloud_Computing
www.infoworld.com/.../cloud-computing/what-cloud-computing-really-means-031
http://cloudcomputing.sys-con.com/node/650408
http://www.oncloudcomputing.com/en/2009/09/cloud-computing-architecture-cloud-computing-
technology/
http://communication.howstuffworks.com/cloud-computing2.htm
http://www.netapp.com/in/company/leadership/cloud-
computing/?REF_SOURCE=ntpggl9700000108212s&gclid=CNyHlpu7naQCFcpS6wod5WPJHQ

Group Name: SQL Server


Coordinator: Julias Caesor (Faculty, BIIT)
Editors: Prabhagaran M, Michael R., Raji K.

47
BOS.CON 2010 | Green IT and Youth Involvement

Information Architecture
Abstract
Information architecture (IA) refers to the structure or organization of your website. It describes the
ways in which the different pages of your site relate to one another and ensures information is
organized in a consistent and predictable way on each page. It involves steps such as Assessing
existing and needed content, organizing the pages, providing clues to help use the site efficiently, and
developing navigational structure. IA is the commonly accepted abbreviation for either Information
Architect or Information Architecture and is used throughout the rest of the paper. We will see the
process and the design of information architecture in the later part of this document.

Introduction
Information architecture is a structured conceptual model that represents the way in which information
is labeled, organized and made available to users. If planned, developed, implemented and adhered to
correctly, information architecture will provide consistency and standards across an organization.

In the context of this guidance, information architecture includes how the information if a Share Point
Server 2007 site, including Web pages, documents, lists, and data is organized and presented. It also
includes how content including documents and records, will be classified and how metadata will be
applied to 2007 Office system files, such as Word documents, through document information panels
and document placeholders.

What is Information Architecture?


Information architecture is a relatively new craft that is approximately eight to ten years old. Like
indexing, IA is part art and part science. IA forms one of the many subfields in the area of Web
site/intranet design. (It is strongly related to usability/user experience/ interaction design, information
design, graphic design and information technology/system design.)

IA is firmly rooted in many of the traditional areas of expertise of librarianship: information retrieval,
search strategies and most importantly classification, that is the application of collocation (gathering)
and differentiation to content organization. At its most basic, IA provides solutions to the problem of
finding information on Websites.

Information architecture has been variously defined as:


• the structure of information
• the usable organization of information
• organizing information so users can find what they need

Emergence of IA
While the term IA was first used by Richard Saul Wurman in the 1960’s, the growth of the Internet has
played a major role in pushing IA to the mainstream. Richard Saul Wurman an architect by trade was
concerned with the gathering, organizing, and presenting of information to achieve some purpose.

The rise in the visibility and demand for IA in the late 1990’s coincided with the Internet reaching
critical mass in 1997. Lou Rosenfeld and Peter Morville published Information Architecture for the
World Wide Web in 1998.5 the book referred to as the “Polar Bear” book is due to the publisher
placing a polar bear on the front cover. This book defined the current scope of IA as it relates to the
website development. The book also brought the principles of IA to the Internet development
community. IA has been gaining wide acceptance as an essential part of developing websites and other
information spaces. Since the publication of the “Polar Bear” book in 1998, professional interest and
the number of publications about IA have been on the rise. There have been two ASIS&T IA
conferences. The first was the mid year summit 2000 in oston. The second IA summit was in February
2001. Also in the fall of 2000 Argus Associates sponsored an IA conference in La Jolla, California.
The ASIS&T SIG IA is also enjoying widespread popularity between IA’s. Started in the summer of

48
BOS.CON 2010 | Green IT and Youth Involvement

2000 it is one of the most active ASIS&T SIGS. Starting in the beginning of 2001, Andrew Dillon
began publishing a regular IA column in the Bulleting for ASIS&T. The professional interest in IA is
ensuring its future in the design and creation of information spaces. Since the field is in its defining
stages, there still are many debates about the definition and scope of what an IA is and does. LIS has an
important role in this debate and an opportunity to shape the future of this important profession.

Information Architecture Process

I’ll give you a brief overview of the IA process. Essentially, the process of creating or updating the
information architecture for a Web site can be divided into these steps: researching, designing, testing,
implementing, maintaining and revising. The research step begins with a thorough study of the site’s
context, content and users. Corporate opinion leaders are interviewed to get important information
about their views of the new site. Stakeholders such as content producers and editors should also be
interviewed for their input. Finally, users are queried to find out how they currently use the site and
what problems they may be having.

After gathering all of this information, the information architect designs the content organization,
navigation system and labeling system that will best enhance the users’ experience of the site and
enable them to find the information they need or complete the task they have come to accomplish.
Next, the IA will test the preliminary design with users. Without user input the site’s designers run the
risk of ignoring the most important audience. And if no one is viewing or using a site, what good is it?
User testing can include such things as task completion and card sorting, in which users sort cards
representing content chunks to validate the IA’s choices.

Then the information architecture is implemented. This requires intense cooperation with the many
other professionals involved in the team responsible for the design of a Web site: system programmers,
graphic designers and user experience designers. This part of the process is where the information
architect gets a big dose of reality and needs to make essential trade-off based on the time and money
available for implementation. Finally, once the site is up and running, there must be a plan for
maintaining the site. Who designs new labels if large chunks of content are added to the site? Who is
responsible for making sure that a new segment of users is accommodated? Who updates the links on
the site index?

Having a proper site maintenance plan ensures that the time and effort put into the creation or updating
of the site doesn’t disappear into entropy’s black hole. As necessary, the site must be revised, with
newly reorganized content, and new navigation and labeling systems. That means completing the cycle
and starting again with research and moving on from there.

49
BOS.CON 2010 | Green IT and Youth Involvement

Professional Requirements for Information Architect


Job requirements range greatly from employer to employer and are dependant on job title. Job Titles
themselves cover a larger range from simply IA to Senior Structural Web Designer. Below is a list of
requirements compiled from at least 30 different job descriptions.

IA Design Skills
• Design the navigation structure (hierarchy), • Specify how users will find and interact with
system and workflow (dataflow) information by defining systems of
• Solid understanding of web technology organization, labeling and searching.
• Create User scenarios • Produce site maps, content maps, page
• Create User profiles schematics, and text-based outlines to
• Conduct Task flow analysis communicate information structures and
• Develop Use cases organization schemes.
• Create Form, function, metaphor, interface, • Develop Storyboards
interaction, and visual design • Develop Wireframes
• Assist in translation of business and user • Develop Infoboards, mood boards
requirements into functional and design • Develop Project site structures
recommendations. • Develop controlled vocabularies and thesauri

Technical Application Skills


The following is a gathering from several job listings via the Internet.
• HTML and creation tools • Quark Express
• JavaScript • Cross-platforming
• CSS • XML
• DHTML • VB & VB Script
• MS Visio • CGI
• MS Project • Perl
• MS Word • ASP
• MS Excel • SQL
• Illustrator • Java
• Photoshop

Other Skills
Other skills required to become an IA include:
• Degree in a related field, such as Technical Communication, HCI, Usability, LIS, or Graphic
design.
• Experience designing application interfaces.
• Experience designing and conducting usability tests and (method inspections).
• Self motivated and proactive mind set (initiative)
• Experience leading (and presenting) clients through the discovery, analysis, and design phases of
web projects.
• Thorough understanding of web design and online media issues
• Ability to work effectively with other team members
• Strong critical thinking and problem solving abilities
• Excellent verbal and written communication skills
• Exceptional customer service orientation
• Design of information architecture and navigation, information structure and workflow for Web
sites and other interactive media
• Creating and documenting design concepts and solutions through sketches, diagrams, maps,
storyboards, rapid prototypes, and functional prototypes
• Task analysis, task modelling, and usage scenarios
• Experience working with multidisciplinary teams contextual inquiry

50
BOS.CON 2010 | Green IT and Youth Involvement

IA Tools
The IA software tools mentioned below are used in sitemap, navigation, flowchart, concept mapping,
network and organizational diagrams, trees, and so forth.
• Microsoft Visio: Powerful diagramming tool used by many designers/developers to
diagram, map Web sites in the planning stages.
• SmartDraw: Easily create sitemaps and diagrams with SmartDraw. A variety of templates
can be used, or create your own. Economically priced, flexible program. For Windows.
• Omnigraffle: Create flow charts, org charts, network diagrams, family trees, project
processes, office layouts - or anything else that can be represented by symbols and
lines.Diagramming application for Mac.
• PowerMapper: by Electrum Software. Easy to use, terrific site mapping tool for mapping
existing sites or skeleton sites in the process, online or offline. A variety of mapping styles
available. Standard and professional versions. Now does Google sitemaps, too. Highly
recommended by WebsiteTips.com. For Windows.
• Ontology Editor (Protégé)
• Content Management System (Joomla, Drupal)
• OverSite (Website page layout – Wireframe tool)
• Content Value Analysis (CVA)
• Content Inventory/Sitemap Tool (Visio)
• Concept Mapping Tools (VUE and FreeMind)

Technologies
Following are the key technologies used in Information Architecture.
- Web Technologies, (HTML, XML, XHTML, CSS, JavaScript, AJAX)
- Semantic Technologies (OWL, RDF, Content Aggregator)
- Content Technologies (CMS, Wiki, RSS, Metadata)
- Database Technologies (Data mining, Data warehousing)

Applications
Information Architecture is widely applied in areas where the information is to be precisely described
for better usability. And here are some examples.
• Semantic web • Cognitive Psychology / Human Behavior
• Information Systems / Management / • Software Engineering / User Interface Design
Organization • Classification / Indexing / Cataloging
• Information Searching / Retrieval • Search Behavior / User Needs
• Database Management • Semantic Publishing
• Research Methodology / Statistics • Advertising and Marketing
• Human-Computer Interaction • Healthcare and Life Sciences

Conclusion

It simply isn’t good enough for organizations to build functionality or write content, put it on their
computer systems and expect people to be able to find it. Developing effective information architecture
is an essential step in the development of all computer systems. Effective information architectures
enable people to quickly, easily and intuitively find content. This avoids frustration and increases the
chance that the user will return to the system the next time they require similar information.

51
BOS.CON 2010 | Green IT and Youth Involvement

REFERENCE

Books
Peter Morville & Louis Rosenfeld, Information Architecture for the World Wide Web, O'Reilly, 2006
Jesse James Garrett, The Elements of User Experience, User Centered Design for the Web and Beyond,
New Riders Publishing, 2003
Nickuil, Web 2.0 Architectures: What Entrepreneurs and Information Architects Need to Know,
O'Reily, 2009
Andrew Dillon and Don Turnbull, Information Architecture
Chris Ewing, Erik Magnuson and Steve Schang, Information Architecture Proposed Curriculum
What is Information Architecture, IA Institute, 2007

Websites
http://articles.sitepoint.com/article/architecture-usable
http://websitetips.com/ia
http://www.fatpurple.com/2010/03/01/web-information-architecture-deliverables-and-diagrams
http://www.iainstitute.org
http://www.iawiki.com
http://www.informationdesign.org
http://www.jjg.net/ia/visvocab
http://www.webmonkey.com/2010/02/Information_Architecture_Tutorial
www.azgita.gov/Data-Information Architecture.doc
www.infosihat.gov/
http://www.jjg.net
www.websitetips.com/ia

Group Name: Informix


Coordinator: James VM (BIIT)
Editors: Ranjith R, Kumaresan K, Prabhakaran K

52
BOS.CON 2010 | Green IT and Youth Involvement

Open Source Technologies


Abstract
Open source technologies refer to the various technologies that provide the source code of the software or
hardware freely available to everyone who is willing to move towards it. It gives the privilege to anyone to copy, to
modify and to distribute it. Open Source is a practice that is followed by the developers to make the source of the
software product available to all. A main principle of open source software development is peer production by
bartering and collaboration, end-product, source material, “blue prints” and documentation available at no cost
to the public.

Introduction
Open source technologies are mostly used in all the industries today. Open source describes practices
in production and development that promote access to the end product's source materials. Open source
technologies have come into not only in IT related fields but also in all the other fields like business,
agriculture, medicine. Etc.

History of Open source technologies


The concept of open source and free sharing of technological information has existed long before
computers existed. There are earlier instances of open source and free software such as IBM's source
releases of its operating systems and other programs in the 1950s, 60s, and the SHARE user group that
formed to facilitate the exchange of software. Open source on the Internet began when the internet was
just a message board and progressed to more advanced presentation and sharing forms like a website.
The term was given a big boost at an event organized in April 1998 by technology publisher Tim
O'Reilly. Originally titled the “Freeware Summit” and later known as the “Open Source Summit”.
Starting in the early 2000s, a number of companies began to publish a portion of their source code to
claim they were open source.

Open source
Open source is a practice that is followed in software development that makes the source code
available to all so that anyone can copy, modify, and even distribute it widely.

Understanding of open source technologies


Open source technologies refer to technologies that are designed in the same fashion as free and code
available. Open source technology means that it is designed specially to the environmental, ethical,
cultural, social, political and economical aspects of the community it is invented for. Open source
technologies can be categorized into two broad categories.
1. Open source software technologies
2. Open source hardware technologies

1. Open source software: Software, whose source code is published and made available to the
public, enabling anyone to copy, modify and redistribute the source code without paying royalties
or fees. Open source code evolves through community cooperation. These communities are
composed of individual programmers as well as very large companies.

2. Open source hardware: Hardware whose initial specification, usually in a software format, are
published and made available to the public, enabling anyone to copy, modify and redistribute the
hardware and source code without paying royalties or fees. Open source hardware evolves through
community cooperation. These communities are composed of individual hardware/software
developers, hobbyists, as well as very large companies.

Tools
Some of the tools are:
• FreeBSD – Operating System derived from UNIX.

53
BOS.CON 2010 | Green IT and Youth Involvement

• GNU project - a sufficient body of free software.


• Joomla – Content Management System.
• Linux – Operating System based on UNIX.
• MediaWiki - server software, the software that runs Wikipedia.
• MongoDB - document-oriented, non-relational database.
• Moodle - course management system.
• Mozilla Firefox - web browser.
• Mozilla Thunderbird - email client.

Open Source Development Progress

Applications
Open source technologies are mainly applied in
• Education
• Medicine and Healthcare
• Project management and development
• Open source in business
• Agriculture
• Science and Research

Open source in Education: Open source technologies are used very much in schools and colleges
for development and for learning. Open source tools like Openadmin which is used for administration
in schools. Through these tools the student's performance is tested in schools. Open source course
management applications like Moodle that can run on any browsers are very much needed for today's
distance education.

54
BOS.CON 2010 | Green IT and Youth Involvement

Project management and development: Now-a-days, many software development industries are
moving towards open source tools to develop the software. For example:

OpenProj is an open source project management tool for all major operating systems. It purports to be
a replacement for Microsoft project. OpenProj has a very simple interface. Most professionals
appreciate the case with which project details such as duration, priority, person in charge and resources
can be recorded. It allows activities linkages to be specified with simple click and drag action. For ease
of comprehension project details can be displayed in different formats such as Gantt chart, network and
histogram.

DotProject is an Open source web-based Project Management tool using PHP and MySQL that
requires the application to link to be loaded on a server and can then be accessed with a web browser
from any PC.

Medicine and Healthcare: A category of software based on open source catering to electronic
medical records, electronic health records and practice management software have evolved. Electronic
medical / health care recording software are applied in hospitals in electronic form. OpenEMR is also
another open source tool available for medicine recording.

Open source business applications

Enterprise resource planning: The openERD application is available in binary form for Windows and
as source code for Linux. OpenERD offers different editions of the application, with the only
difference between editions being the level of support provider.

Accounting: Phreebooks is one of the open source products with decent features that offer a demo
precluding the need to go through the web installation process. Phreebooks is written in PHP and
JavaScript and uses MySQL in the back-end.

All aspects of biz accounting namely inventory, general ledger, banking and customer are covered in
the interface. Another online accounting solution has an extensive feature list is legerSMB.

Case study
Openadmin for schools and colleges
Openadmin is a web service that needs to be installed on a web server. This application offers
extensive data collection capabilities to monitor every aspect of a student's performance. Since
Openadmin deals with teachers and the parents, the interaction between the teachers and parents also
grow better.

This particular interface is designed to address the corners of different types of users, school principal,
teachers and parents. The Openadmin provides access according to the different level of users in the
area.

Permissions to Different Levels of users

School principal Level-1

Teachers Level-2

Students and parents Level-3

55
BOS.CON 2010 | Green IT and Youth Involvement

The school principal’s page allows creating, modifying different aspects of running school as setting up
the fee amount, creating a schedule and management of enrolments.

Level-1

Creating

School principal Modifying

Deleting

Similarly, the teacher’s view allows finer control of student’s activities like recording the attendance,
marks and the performance.
Level-2

Monitoring

Teachers Ranking

Recording
The parents view allows viewing the progress card of the student online. The parents can send their
feedbacks through online.
Level-3

Viewing
Parents

Online Feedback

From a non-pro’s view, the options on the pages are esoteric, but considering the application has been
accepted in many schools and colleges all over the world. Openadmin can surely help in improving the
student’s improvement in their studies.

Conclusion
Open Source is software or hardware that is available in source code form for which the source code
and certain other rights normally reserved for copyright holders are provided under a software
development that permits users to study, change, and improve the software.

Reference
http://en.wikipedia.org/wiki/Commercial_open_source_applications
http://opensource.org/docs/osd
http://belogic.com/uzebox/
http://www.worldchanging.com/archives/009340.html

Group Name: Sybase


Coordinator: Fr Gerogary Thaddeus (Director, BIIT and CEO, BOSCO ITS)
Editors: A.G. Rose Gladson, S. Sarath, P. Ganesh Babu, A. Kuzanthai Yesu

56
BOS.CON 2010 | Green IT and Youth Involvement

Mobile Computing
Abstract
The rapidly expanding technology of cellular communication, wireless LANs, and satellite services will
make information accessible anywhere and at anytime. In the near future, tens of millions of people
will carry a portable palmtop or laptop computer. Smaller units, often called personal digital
assistants or personal communicators, will run on AA batteries and may have only a small memory;
larger ones will be powerful laptop computers with large memories and powerful processors.
Regardless of size, most mobile computers will be equipped with a wireless connection to the fixed part
of the network, and, perhaps, to other mobile computers. The resulting computing environment, which
is often referred to as mobile or nomadic computing, no longer requires users to maintain a fixed and
universally known position in the network and enables almost unrestricted mobility. Mobility and
portability will create an entire new class of applications and, possibly, new massive markets
combining personal computing and consumer electronics.

Introduction
Mobile computing refers to the use of small and portable computing devices in wireless enabled
networks that provide wireless connections to a central main server. These devices include laptops,
notebook PCs, tablet PCs, palmtops, personal digital assistant (PDAs) and other hand held devices. A
radio-signaling device is installed inside these devices for receiving and transmitting electronic data.
Mobile computing is taking a computer and all necessary files and software out into the field. Many
types of mobile computers have been introduced since the 1990s, including the:
• Wearable computer
• Personal digital assistant/Enterprise digital assistant
• Smart phone
• Ultra-Mobile PC

The most familiar aspect of mobile computing technology is the hand phone. About two decades ago, a
hand phone was bulky and was only used for voice communication. It was merely an extension of the
fixed line telephony that allowed users to keep in touch with colleagues. Now the hand phone is not
only used for voice communication, it is also used to send text and multimedia messages, enable
Internet access, supports high-speed data services.

Concept
Mobile computing embraces a host of portable technologies that makes Internet access on the go not
only possible, but integral to every day life. From notebook computers to personal digital assistants
(PDAs) like the Blackberry and iPhone, to standard cell phones, mobile computing has becoming an
indispensable way of life. Mobile laptop and notebook computers can use one of two types of wireless
access services when away from the home or office. The most commonly used and least expensive is
WiFi. WiFi uses radio waves to broadcast an Internet signal from a wireless router to the immediate
surrounding area. If the wireless network is not encrypted, anyone can jump on. WiFi is commonly
used in public places to create ‘hotspots’.

Technology
‘Mobile computing’ is a generic term that refers to technologies that allow you to take our computer
with you. In the past, this was limited to notebook computers and similar hardware that allowed you to
physically bring your computer along. Today, however, this can be extended to software and web
solutions that allow you to bring your computing experience without the bulky hardware.

There are numerous technologies available over Mobile Computing. There are a few listed out below:

Mobile Network Technologies


Bluetooth
It is an open wireless protocol for exchanging data over short distances (using short length radio
waves) from fixed and mobile devices, creating personal area networks (PANs). It was originally

57
BOS.CON 2010 | Green IT and Youth Involvement

conceived as a wireless alternative to RS-232 data cables. It can connect several devices, overcoming
problems of synchronization. The Bluetooth 3.0 specification will include faster speeds, reportedly
transferring files at 480 megabits per second in close proximity and 100 megabits per second at 10
meters. It will also feature an ultra-low-power mode that Gartner predicts will enable new peripherals,
sensors, and applications, such as health monitoring. The technology will be backwards compatible,
allowing old devices to communicate with new ones, so there's no reason for it not to take off in the
upcoming years.

Ultra Wide Band Technology


Ultra-wideband is a radio technology that can be used at very low energy levels for short-range high-
bandwidth communications by using a large portion of the radio spectrum. UWB has traditional
applications in non-cooperative radar imaging. Most recent applications target sensor data collection,
precision locating and tracking applications. UWB communications transmit in a way that doesn't
interfere largely with other more traditional narrowband and continuous carrier wave uses in the same
frequency band. However first studies show that the rise of noise level by a number of UWB
transmitters puts a burden on existing communications services. This may be hard to bear for
traditional systems designs and may affect the stability of such existing systems.

SMS Technology
Short Message Service (SMS) is the text communication service component of phone, web or mobile
communication systems, using standardized communications protocols that allow the exchange of short
text messages between fixed line or mobile phone devices. SMS text messaging is the most widely
used data application in the world, with 2.4 billion active users, or 74% of all mobile phone
subscribers. SMS as used on modern handsets was originated from radio telegraphy in radio memo
pagers using standardized phone protocols and later defined as part of the Global System for Mobile
Communications (GSM) series of standards in 1985 as a means of sending messages of up to 160
characters, to and from GSM mobile handsets. Since then, support for the service has expanded to
include other mobile technologies such as ANSI CDMA networks and Digital AMPS, as well as
satellite and landline networks. Most SMS messages are mobile-to-mobile text messages, though the
standard supports other types of broadcast messaging as well.

Smart phone Technology


Mobile Technology has groomed a lot in past few years, major reasons for rapid advancements in
mobile network technology is requirements for being mobile or connectivity on move. Latest mobile
handsets offers features which one had never thought off, ultimately it forces mobile network
companies to bring these features in practice use to take commercial advantages.

5G Technology
5G technology is on its way to change the way by which most of the users access their handsets. Users
will go through a level of call volume and data transmission with 5G pushed over a VOIP enables
gadget. With increasing awareness of customers with respect to upcoming technologies, affordable
packages and good looks; it is very important that mobile producers must give an altogether decent
package for keeping up the customer loyalty. The most important and leading motive of leading mobile
phone manufacturers is the creation of best and latest technology to compete with innovative market
giants. We have seen great cell phones one after another, with unbelievable traits. Apple has remained
successful in shivering the electronic world by putting forth its latest iPhone 4G that take the market by
storm.

GPRS Technology
GPRS (General Packet Radio Services) is one of the technologies to improve 2G phones (second
generation phones) to enable them for transferring data at higher speed, GPRS allows mobile phones to
remain connected to network and transfer requested or sent data instantly, e.g. if you receive MMS
from other mobile phone, you do not need to press a button to check if you have any new MMS,
instead mobile handset notifies you when new MMS is downloaded to your mobile. GPRS technology
can provide you up to 32 kbps to 48 kbps. One of the features of GPRS technology which makes it
even more useful and practical is that data can transfer during the call and there is no requirement of
disconnecting call to receiving incoming or outgoing data. For example, you can receive SMS during
the call and you can reply to it without having to disconnect your on going call. GPRS usage is charged

58
BOS.CON 2010 | Green IT and Youth Involvement

for the amount of data sent and received, unlike CSD which is charged for amount of time it remained
connected.

GPRS technology enabled to move 2G networks closer to the performance of 3G networks. 3G (Third
Generation) support networks are best at transferring data to unbelievably higher data rates which can
go up 2 Mbps. Data rate up to 2Mbps made so many impossible tasks very possible on mobile phones
which was once only possible on computers. With this data rate it is possible to do video calling, video
streaming and downloading, web browsing, emailing etc. Improved 2G networks (GPRS) manages to
support few of applications like web browsing, emailing, video streaming, Multimedia messaging
service etc. therefore GPRS can also be said that it is 2.5 generation technology. Technologies like
HSCSD and EDGE are enhancements to the CSD technology

Outdoor WiFi Beam Forming Technology


Wi-Fi is a wireless technology, which enables connection between two or more devices wirelessly for
data sharing purposes. It is wireless networking which is based on IEEE 802.11 standards. It is now
being used by millions of people using various devices such as personal computers, laptops, PDAs',
printers, camera, games, mp3 players etc, more and more gadgets are coming with built in feature of
this amazing wireless technology.

Application
Mobile Applications are a rapidly developing segment of the global mobile market. They consist of
software that runs on a mobile device and performs certain tasks for the user of the mobile phone.
Mobile applications are common on most phones, including inexpensive, entry-level models. Their
wide use is due to the many functions they perform, including providing user interfaces for basic
telephony and messaging services, as well as for advanced services such as games and videos.

Also known as downloads, mobile applications are common on most phones, including inexpensive,
entry level models. Their wide use is due to the many functions they performs, including providing
user interfaces for basic telephony and messaging services, as well as for advanced services such as
games and videos. Some Applications are listed out below:
1. Money Transfer: This refers to people sending money via SMS messages. Like mobile payments,
this service has more appeal in developing markets for now. However, there may come a time
when even using your debit card seems passé, while paying for something with actual cash seems
downright ancient.
2. Location-Based Services: As mentioned above, there are still far too many services to choose
from when it comes to location-based social networking, fragmenting the market.
3. Mobile Search: mobile search isn't new, but on the mobile platform, it may get shaken up a bit.
Gartner predicts that consumers won't necessarily be sticking with the search services they know
and use on the Web (think Google, Bing, Yahoo) and instead experiment with using a few
different search providers that have "unique technologies" for mobile search.
4. Mobile Browsing: Saying that mobile browsing technologies will be heavily used in the future
sounds a little bit like stating the obvious. That's also good news for web developers who can build
mobile web applications to cater to this bunch as opposed to focusing all their efforts into building
apps for the numerous mobile platforms like the iPhone, Android, RIM, and others.
5. Mobile Health Monitoring: Another technology whose impact will be felt more heavily in
developing markets, mobile health monitoring is still at an early stage of maturity and
implementation. Project rollouts have been limited to pilot projects for now, but in the coming
years the industry will begin to monetize these efforts by offering mobile healthcare monitoring
products, services, and solutions to various care delivery organizations.
6. Mobile Payments: Like mobile transfers, mobile payments are more common in developing
markets at the moment, but that is quickly changing. Yet even as this type of service grows, there
will be challenges. Mobile payments will be a "highly fragmented market" where there will not be
"standard practices of deployment," notes the report. That makes it sound like this is one
technology that will still need some work, even when 2012 rolls around.

59
BOS.CON 2010 | Green IT and Youth Involvement

Application areas
1. Airline and Railway Industries
2. Health Care
3. Hospitality Industry
4. Transportation Industry
5. Manufacturing & Mining Industries
6. Distribution Industry
7. Banking & Financial Institutions

Tools
Basically, Tools play a vital role in developing an Application. Tools can be in the form of Software or
Hardware. So, in the Mobile computing also there are tools present to develop the Mobile Application.
Some tools are listed below:
• Virtual Desktop
• SpecsMidlet
• ClassBrowser Midlet
• Keys Midlet

Conclusion
At present, the future of mobile computing remains uncertain however continued development and
advances in technology should see this revolution continue. The continued success of mobile
computing relies on the ability of developers to meet the needs of consumers, and resolve any ongoing
difficulties with hardware and software. By the by, the Mobile applications have brought the world to
your fingertips and promise a revolution in communication.

References
The Express Group, “SATA SMS and Server Archival”, Express Computer, The Indian Express Ltd.,
Mumbai 18/01/2010
The Express Group, “Pioneering Mobile Healthcare”, Express Computer, The Indian Express Ltd.,
Mumbai 21/09/2009
The Express Group, “Messaging for the Customer-centric Organization”, Express Computer, The
Indian Express Ltd., 6/04/2009
www.searchmobilecomputingTecharget.com
www.mobilecomputing application.com
www.itoutsourcingindia.com/resource/mobile-issues.php
www.spinger.com/computer/comunication-and-networks
www.spec-india.com/services/pda-mobile-application-development.htm
www.developers.net/intelisnshowcase/view/870
www.mobitorms.comss

Group Name: Teradata


Coordinator: Prabhakaran (Faculty, BIIT)
Editors: Muthu Arockiasamy K., Ashok Kumar L., Dinesh P., Charles I.

60
BOS.CON 2010 | Green IT and Youth Involvement

Techie Thoughts…

e-Learning
¾ Someday, in the distant future, our grandchildren's grandchildren will develop a new equivalent of
our classrooms. They will spend many hours in front of boxes with fires glowing within. May they
have the wisdom to know the difference between light and knowledge. (Plato)

¾ A single conversation with a wise man is better than 10 years of study.

¾ Learning is not compulsory... neither is survival.

¾ All of my fellow eLearning gurus will tell you that learning is the important part of eLearning, not
the "e".

¾ Moving from the one-room schoolhouse to the one-world schoolhouse is now a reality.

¾ If we don't focus on the experience dimension of learning, we run the risk of mistaking the
publishing of information for learning and training.

¾ X-Generations demand X-cellent training in an X-celerated speed.

¾ If you are not being educated in your job today, you may be out of a job tomorrow... Employee
education is not growing 100 percent faster than academia, but 100 times - or 10,000 percent -
faster... Over the next few decades the private sector will eclipse the public sector and become the
major institution responsible for learning.

¾ Companies are looking at E-learning programs like a stapler or reams of paper-- it's just one item
in their inventory." In other words, E-learning is becoming a commodity.

¾ You can't teach people everything they need to know. The best you can do is position them where
they can find what they need to know when they need to know it.

¾ In your career, knowledge is like milk. It has a shelf life stamped right on the carton. The shelf life
of a degree in engineering is about three years. If you're not replacing everything you know by
then, your career is going to turn sour fast.

Information Architects
¾ What an Information Architect thinks, programmer does.

¾ A doctor can bury his mistakes but an architect can only advise his clients to plant vines.

¾ A great architect is not made by way of a brain nearly so much as he is made by way of a
cultivated, enriched heart. (Frank Lloyd Wright)

¾ A journalist and an information architect face exactly the same problem - how to give shape to the
pile of information in front of you in a way that will make it easy and natural for people to
comprehend. I can't imagine any better preparation for the work I do now. (Frank Lloyd Wright)

¾ A lawyer without history or literature is a mechanic, a mere working mason; if he possesses some
knowledge of these, he may venture to call himself an architect. (Jesse James Garrett)

¾ An architect's most useful tools are an eraser at the drafting board, and a wrecking bar at the site.
(John Ruskin)

61
BOS.CON 2010 | Green IT and Youth Involvement

¾ An architect should live as little in cities as a painter. Send him to our hills, and let him study there
what nature understands by a buttress, and what by a dome. (Walter Scott)

¾ Every great architect is - necessarily - a great poet. He must be a great original interpreter of his
time, his day, his age. (Terry McMillan)

¾ He who rejects change is the architect of decay. The only human institution which rejects progress
is the cemetery. (Marcus Fabius Quintilian)

Cloud Computing
¾ Microsoft will continue its push into cloud computing, or software provided over the Internet on
demand, while introducing a new operating system for mobile devices.

¾ Cloud Computing Will Be As Influential As E-business.

¾ We think everyone on the planet deserves to have their own virtual data center in the cloud. What a
developer gets when they have an account with the Sun Cloud is their own virtual data center.

¾ Cloud computing is really a no-brainer for any start-up because it allows you to test your business
plan very quickly for little money.

¾ Cloud-based business processes are the largest portion of the cloud services market, which
includes advertising, e-commerce, human resources, and payments processing.

Mobile Computing
¾ Mobile computing is taking a computer and all necessary files and software out into the field.

¾ If you look at the next decade, the concept of a mobile app will be the equivalent of what software
were 20 years ago ... Computing is moving to mobile. Apps are the software of the future.

¾ In mobile computing, people are typically thinking about how great an ultra-portable product is.

¾ There's been explosive growth in mobile computing, driven by new features such as built-in
wireless Internet connections and security features

Network Security
¾ If you spend more on coffee than on IT security, you will be hacked. What's more, you deserve to
be hacked.

¾ Amateurs hack systems, professionals hack people. (Kevin Mitnick)

¾ The only truly secure system is one that is powered off, cast in a block of concrete and sealed in a
lead-lined room with armed guards. (Bruce Schneier)

¾ We didn't install the [Code Red] patch on those DMZ systems because they were only used for
development and testing. (Said an anonymous client, shortly after spending 48 continuous hours
removing 2001's Code Red worm from internal corporate servers)

¾ People often represent the weakest link in the security chain and are chronically responsible for the
failure of security systems.

¾ If you think technology can solve your security problems, then you don't understand the problems
and you don't understand the technology. (Bruce Schneier)

Social Networking
¾ Social media should improve your life, not become your life!

62
BOS.CON 2010 | Green IT and Youth Involvement

¾ Social Networking is all about people. It's about networking and being nice to people and not
burning any bridges.

¾ The value of a social network is defined not only by who's on it, but by who's excluded.

¾ The successful networkers I know, the ones receiving tons of referrals and feeling truly happy
about themselves, continually put the other person's needs ahead of their own.

e-Governance
¾ A construction laborer will soon not have to forgo a day's work and wages and to go to the district
labor office to become a member of the Building and Other Construction Workers' Welfare Board
or to claim any benefit under the board's schemes.

Multimedia
¾ One of the things I learned from working on the Olympics was, the world does not need another
big multimedia show. Multimedia scares me off.

¾ With 'multimedia' the profound ethical and aesthetic challenge comes from the burden of
responsibility that lies with the individual once the constraints on communications are so radically
eased, if not eliminated.

¾ With growing broadband connections, more powerful computers and more streaming multimedia,
we see that the traditional way of communicating by phone no longer makes any sense, anymore.

Open Source Technologies


¾ Open collaboration is critical for driving innovation, which fuels global economic growth.
Impediments to collaboration on the Linux operating system seriously jeopardize innovation.

¾ “I am in disagreement with both the definition of Open Source and of The Free Software
foundation - the body that certify software with the following words:
• ‘Single-handedly wrote an operating system’
• ‘Build it and they will come’
• ‘Just one part of the open-source puzzle. But it's not necessarily the most important one’,
and
• ‘Patent commons project’

¾ A new model of intellectual property management for Linux must be established to maintain
advances in software innovation - regardless of the size or type of business or organization.

Social Networking
¾ Social media should improve your life, not become your life!

¾ It's all about people. It's about networking and being nice to people and not burning any bridges.

¾ Social networking is that rare sector of the economy that seems to be booming in the midst of the
recession.

¾ Social networkers will interact with an organization that provides value and entertains, informs,
instructs or educates them.

¾ Humans like to know about the good, the bad, and the ugly side of people, places, and situations,
as well as to share this information with others, often as quickly as possible.

¾ Social Networking isn’t a direct marketing tool, this is human communication.

63
Best of wishes for your BOS.CON IT Fest

Mr Sasi Kumar M.
Oracle Financial Services
Singapore

With Best Compliments From

Mr Baskaran
Ram Leathers
#41, Sipcot Industrial Complex

Ranipet - 632402

Phone: +91-4172-244491/2
Gratefully Thoughtful Gratitude

Remembering On BOS.CON Fest

BICS and BIIT


PGDIT B07 Batch Mr Anand Kumar M.
Chennai

Wishing you all the Best on BOS.CON IT FEST

Mrs. Thavamani
Mr. Arockia Doss
Ms. Santha Maria A.
Mrs. Saritha Mary D.
Mrs. Kanivathana J.
Alumni at Chennai
Congratulations on BOS.CON Fest!
Be Green All the Way!
Chennai

Mr Jacob Rajesh I.

Mr Antony Raj J.

Mr Prakash Senthivel

Mr Arockia Adaikalaraj T.

Ms Jeyanthi A.

Ms Victory Mary K.

Mr Vincent Napolean

Kovai

Mr Vijay Amritharaj J.

Bangalore

Mr Veerabadrachari

Best Compliments
Mr Arulandham S.

Mr Inbaraj I.

Ms Mesiya Savariyayee A.

Mr Jegan G.

Chennai
Best Compliments Wishes and Compliments

Mr Peter Mr Dinagaran
Peter's Park & Mrs Roja
Exclusive Cottages USA
#503, Manjankolaipudur
Yellagiri Hills.

Email: peter.yelagiri@hotmail.com
Web: www.petersparkyelagiri.com

Mobile: 09442357711, 09629957711


Landline: 04179-295456

Best Wishes for BOS.CON Fest

Mr Felix R.
Software Unit-1 Head
Congratulation and Compliments
BOSCO ITS
Yelagiri Hills
Mr Giri
Proprietor

Hotel Nigress
Yelagiri Hills

You might also like