SlideShare ist ein Scribd-Unternehmen logo
1 von 44
Downloaden Sie, um offline zu lesen
CSE Snaps

       Articles
   Mobile Dreams         1

 Wear the World(6th      5
       sense)

 Microsoft Sql Server    8


Better Safe Than Sorry   11


  Cloud Computing        13


Wireless LAN Security    16


Google’s Web Browser     17                  Messages
 Computer Security       18           Chancellor’s Message

                                      Vice Chancellor’s Message
     Virtuality          20
                                      Registrar Message

       Puzzles           24           COE’s Message

                                      Director’s Message
      Microsoft          24

      Simplifier         24

   Secret of maths       25

    Tips & Tricks        27

  Comp-Confusion         28

 Student’s Activities    29

   Staff Activities      34
October 2010




               CHANCELLOR’S MESSAGE


   I am very much delighted to hear that Computer Science Engineer-
  ing Department is starting an association. I am sure the activities of
  the association will help improving the organizational skills and leader-
  ship qualities of student which are essential for their career develop-
  ment. I am very confident that the association of Computer Science
  will reach greater heights in the years to come. I wish them to have a
  grand success in all their moves and I wish that these steps shall bring
  them a drastic change in their career growth.




                                                   Dr. Ishari K.Ganesh




                                        I
October 2010




               VICE-CHANCELLOR’S MESSAGE


      I am very much delighted to learn that the department of computer science
      and Engineering is inaugurating their Association. The IT education has trans-
      formed our country and economy and the benefits of IT revolution has
      reached the common man. Vels University strives hard to impart quality edu-
      cation to the students so that, they have the required competencies to meet the
      changing needs of this nation.

      The activities of the association must facilitate the students to acquire organi-
      zational skills and bring change in their perception and attitudes. The e-
      Magazine to be published to mark this occasion should reflect the student’s
      talents and their abilities.

      I would like to congratulate and appreciate the students and the faculty of
      CSE for their efforts and I wish them all the best




                                               II
October 2010




                  REGISTRAR’S MESSAGE


       I am much pleased to note that the department of Computer Science
      Engineering is inaugurating the Department Association on 14-10-
      2010.
                          The usage of computers has increased drastical-
      ly in these days, computers playing a role in almost every industrial
      sector and also in various branches of society. They are presently
      the backbone of every industry that currently exists. Computers
      have transformed the lives of billions around the world in every
      possible way. No field is left out without computers, whether it is
      medicine, e-governance, managing laws of department activities,
      computers have become essential.
                                      I wish all the very best for the inau-
      guration of the department’s association and success in implement-
      ing innovative ideas for the development of the world.




                                                  Dr. P. Govindarajan




                                         III
October 2010




               CONTROLLER OF EXAM’S MESSAGE



      I am very glad to see that the Department of Computer Science is Inaugurating
      the Department Association on 14.10.2010.

      The present human generation is associated mostly with the computer usages
      which makes easy in day life like banking, accounting, ticketing, E-mailing,
      chatting, conduct of online Examination and E-governance etc., Most of the
      peoples relied on the computers for various matter and considered to be a very
      essential for the human being.

      In this connection, I wish all the very best for the inauguration of Department
      Association and success in implementing the new invents in the Computer Ed-
      ucation.




                                              IV
October 2010




                         DIRECTOR’S MESSAGE
                         “A GOOD START MEANS HALF DONE”

          I am very much pleased to note that the students of Computer Science Engineering, Vels
  University are coming out with an e-journal. The knowledge one acquires in college has to be
  harnessed in real life for the betterment of self and humanity. In other words, the students
  should acquire the skill of presenting & utilizing their knowledge, they get during their stay in
  VELS UNIVERSITY fully & properly. In that way, this journal that they intend to publish on
  regular basis will definitely give them an opportunity to sharpen their deliverance skills.

          At this juncture, I request each and every student to utilize this forum fully.

         I wish the students and staff of Department of Computer Science Engineering all the
  very Best in their endeavor.

                                        God Bless You All.




                                                               Prof. P. Thiagarajan




                                                       V
October 2010




                                              Mobile -DREAMs......
                                                                                  By V.vinoth, D.Ashokkumar, NitinGoswami, K.Gautam(3rd yr, CSE)




                                           Windows phone 7 is the latest version of windows mobile in development by Microsoft,
                                          scheduled for release by October 2010.

                                          Microsoft’s idea of the Smartphone is very different from their competitors, traditionally
                                          smart phones were devices that did not have touch screens and were intended to be used
                                          by one hand ,but today’s smart phones push the boundaries of technology , Microsoft
                                          plans to push it even further .
                                          The minimum requirements for phone 7 was revealed recently

                                              Capacitive Touch: 4 or more contact points

                                              Sensors: A-GPS, Accelerometer, Compass, Light, Proximity

                                              Camera: 5 megapixels or more, Camera with a flash and dedicated camera button

 But Microsoft has their work cut out
                                              Multimedia: Common detailed specs, Codec acceleration
for them to address copy-paste and
multi-tasking while also spreading            Memory: 256 MB, 8 GB Flash or more
the word about their new mobile OS,
which is something they have not              GPU: DirectX 9 acceleration
been able to do in the past with Zune
HD, Windows Mobile, and other tech-           Processor: ARMv7 Cortex/Scorpion or better
nology. They seem to be doing pretty
well with the Xbox, so maybe Phone7           2 screen sizes: 480×800 WVGA, 480×320 HVGA
teams should probably be looking at
that team for help.                           Keyboard: Optional

                                          Five specific hardware buttons required: Start, back, search (a dedicated Bing button), camera
                                          button, and power -- no more, no less
                                          From the minimum requirements we can clearly understand that Microsoft is clearly targeting
                                          only the high end market for Phone 7.


                                        The basic facts

                                 Windows Phone 7 Series is the suc-      are supposed to be released by         branded and expansive Zune and
                                                                                                                Xbox components, and extremely
                                cessor to Microsoft's line of Windows    the end of this year.
                                                                                                                strict hardware requirements for
                                Mobile phone operating systems. It's     The visual and underlying differ-
                                                                                                                partners. A couple familiar touch-
                                based on the Windows CE 6 kernel,        ences in the operating system are      stones from the past include plans
                                like the Zune HD, while current ver-     almost too numerous to mention,
                                                                                                                for Outlook and Office support, as
                                sions of Windows Mobile are based        including a completely (and we do
                                                                                                                well as licensing to a wide variety
                                                                         mean completely) upended user          of third party hardware vendors --
                                on Windows CE 5. Microsoft an-
                                                                         interface, an emphasis on finger-
                                nounced the new OS at Mobile World                                              despite the name change; Mi-
                                                                         based touch screen input, deep
                                                                                                                crosoft still isn't building any
                                Congress 2010 in Barcelona, and
                                                                         social networking integration, fully   phones itself
                                says that the first handsets to run it


                                                                     1
October 2010



        MOBILE -DREAMS......




          TILES                                Hub Strategy                                 Apps, Lots of Apps
                                                                                         None of the applications designed for Win-
                                                                                        dows mobile will work on WP7. Sorry Win-
                                          The Hub strategy is the core for Win-
  The tile function of the screen                                                       dows Mobile developers, it's for the best.
  replaces the icon displays seen        dows Phone 7 and it makes a lot of             Deep down, we all knew a clean break was
  on the iPhone and the Android          sense. So, I will have a music hub in the      the only way Windows Phone wasn't going to
                                                                                        get stuck in the same loop.
  with living breathing tiles. Just      shape of the Zune app. But this app is
  picking up the phone you can see                                                      Apps will have some standardized interface
                                         not restricted to content I have upload-
  what is going on in your world                                                        elements, like the app bar on the bottom for
                                         ed to, or bought in Zune, but all the          common commands..
  without opening any app.
                                         music content on my ‘phone. On my
  I know we can have push notifi-                                                       It’s all about the apps. Some of the biggest
                                         iPhone I have many music apps, each
  cations on the iPhone and alerts                                                      names      in    Apps.         Seismic,                   Four
  on the Android but they both           with different content. I have to remem-
                                                                                        square, Shazam, the Associated Press –are
  require some element of effort.        ber where my music is before I can play
                                                                                        all bringing apps to the 7. So, we don’t need
  The push notifications don’t al-       it. With the 7 I can access my music in
  ways hang around on your iPh-                                                         to worry about not having the big names you
                                         the various apps, or I can have a cen-
  one and on the Nexus I have to                                                        are used to. It looks like they are already
                                         tralized hub of music.
  slide the thing down and then                                                         lining up to come on board.
                                                                                                               “To catch the reader's attention, place
  read through the various bits.          Take the hub strategy across to other                                an interesting sentence or quote from
                                                                                                               the story here.”

  This delivery of information is just   content, like business documents and
  one example of how Microsoft           Office becomes the business hub. This
  are looking to fully innovate with
                                         strategy gives me the best of both
  this phone, not just deliver a                                                                   Quality Apps
                                         worlds, I can use my preferred app or I
  version of what the market is
  used to.                               can find it in the main hub. Smart.             The demonstrations all looked awesome
                                                                                        with plenty of depth, functionality and
                                                                                        interaction. These apps were developed in
                                                                                        3 weeks running the new Silverlight plat-
                                                                                        form announced yesterday.


                                                                                             Try before you buy
                                                                                         Forget this lite/pro app business. You get
                                                                                         to download the app as a trial. The func-
                                                                                         tionality for the trial is core to the new
                                                                                         Silverlight toolbox, so it is down to the app
                                                                                         developers to decide the best way for the

 The Zune Phone!                                                                         trial. Some apps may be fully functional
                                                                                         but on a limited trial time. Other apps may
                                                                                         have limited functionality or the first few
 Microsoft's vision of Zune is finally clear with Windows Phone 7. It's an app, just     levels of a game  .
 like iPod is on the iPhone, though the Zune Marketplace is integrated with it into

 the music + video hub, not separated into its own little application. It's just like

 the Zune HD,. But you get third-party stuff like Pandora, too, built-in here., there

 will be an FM radio in every phone

                                                                    2
October 2010



          MOBILE -DREAMS......



        Email


       The 7 will have full capability to support not just Exchange accounts but all other major email providers as well. So, you don’t

       need to have an Exchange account to be using this for email. However, if you do have exchange, this will be a boon.

       Remember, the iPhone has Exchange support but the Android does not offer Active Sync. The 7 will offer multiple exchange

       account sync which will also be good for business users. Let us not forget there are still a lot more people running Exchange

       emails than Gmail or Apple Mail. Blackberry, are you paying attention?




   TOP 10 FEATURES                                                                             Games

                                                     If Microsoft's got an ace-in-hole with Win-   ber of levels. Not only will you be able
  1.    Smooth transitional user interface
                                                   dows Phone 7, it's Xbox Live. Gamers have       to continue playing your XBOX games
  2.    Informative lock screen and auto- hidden   talked about a portable Xbox for years—this     on the phone (we don’t know right now
        top status bar                             is the most logical way to do it. The N-Gage    if you can play all of them) but also
                                                   was ahead of its time. The DS and PSP are       that it remembers you across plat-
  3.    Good Office integration and support        the past. The iPhone showed us that the         forms so you can pick up where you
  4.    Bing search page and functionality
                                                   future of mobile gaming was going to be on      left off when at home in front of your
                                                   your phone, and now that just got a lot         XBOX. In a sense, this is what Sony
  5.    Easy setup for Google, Windows Live,       more interesting. The potential's there, and    has been trying to achieve with the
        Yahoo! Mail, and others                    hopefully the games will be plentiful and       PSP/PS3 hook up, but with all the oth-
                                                   awesome enough to meet it.                      er mobile bits added.
  6.    Functional QWERTY keyboard
                                                   Forget Flight Control, how about full on        If the 7 can be an awesome entertain-
  7.    Cool camera software
                                                   XBOX action on your phone? The graphics         ment platform as well as the business
  8.    Tell me voice search                       look up to it and the game levels, credits      platform of Microsoft’s heritage, this
                                                   and achievements will be recorded against       could be amazing.
  9.    Powerful Outlook email, calendar, and
                                                   your live profile.
        contacts client
                                                     This cross performance works on a num-
  10. Zune HD functionality

                                                                      3
October 2010


      Over the air Sync : Mesh

      A piece of interface that's shockingly not there: A                               together. The iPhone gets better but doesn’t perfectly inte-
     desktop syncing app. If anyone would be expected to                                grate my Google life. Nor does Android completely – Gmail,
     tie their phone to a desktop, you'd think it'd be Mi-                              Google apps yes but other accounts like Google Finance
     crosoft, but they're actually moving forward here. All of                          still don’t hook up.
     your contacts and info sync over the air. The only
                                                                                        Microsoft is the sleeping giant. Historically not as good
     thing you'll be syncing through your computer is music                             looking as Apple, and not as fast as Google. The phone 7 is
     and videos, which is mercifully done via the Zune
                                                                                        the show piece if not the Centre piece of their empire which
     desktop client's
                                                                                        will help them back on the path to greatness.
     Microsoft’s plans to sync your life across channels                                Of course we assume that Microsoft can get the hardware
     and platforms seems a little ahead of its time but
                                                                                        right. We have seen some great things, beautiful graphics,
     with the 7, finally everything comes into place. Music,
                                                                                        great games but will the hardware be up to it? Multi tasking
     work, games, contacts all come of age in one place.                                is not coming which is probably a smart reason to manage
     What we forget is that Microsoft has all the compo-                                the hardware drain. No doubt they will be working hard to
     nent parts to serve my digital life. Email, Search, Gam-                           find the right partners to deliver the best handset possible.
     ing, Music. Until now some of those have been a bit                                A glitch in the hardware could be the undoing of such great
     crap, the Zune didn’t really inspire, don’t get me start-                          potential.
     ed on Vista and pre Bing, search wasn’t too hot either.
                                                                                        Until we start to see handsets in the wild, I will remain with
     Roll forward a year and Windows plans are coming                                   my view that this is the iPhone Killer.
     together. With the phone the potential Centre of my
     digital universe I tend to gravitate to the platform that
     gives me the greatest experience to hook them all




                 FINAL COMMENTS                                                                      WHAT IS STILL MISSING?

  We have assumed here that Microsoft can get the hardware right.
                                                                                              The two most obvious glaring issues are the lack of
 We have seen some great things, beautiful graphics, and great                                copy-paste and the limited multi-tasking. You can al-
 games but will the hardware be up to it? Multi tasking is not com-                           ready select a word and use the cursor so it shouldn’t be
 ing which is probably a smart reason to manage the hardware                                  that much effort for Microsoft to get some developers
 drain. No doubt they will be working hard to find the right partners                         locked into a room to figure out copy-paste on WP7
 to deliver the best handset possible. A glitch in the hardware
                                                                                              Just like the previous versions of the iPhone, you can
 could be the undoing of such great potential.
                                                                                              have native apps running in the background so you
 Until we start to see handsets in the wild, we can safely assume                             could listen to Zune HD streaming content while surfing
 that this is the iPhone Killer.                                                              the web and receiving emails on the go.

                                                                                              There are several other areas that need work, such as
     REFERENCE                                                                                the games in Xbox Live, Twitter support, 3rd party apps,
 HTTP://W W W .MIC R OSOF T.C OM/W INDOW SMOB ILE/ E N -US/
                                                                                              and more. However, the OS is quite refined and con-
 C MPNW INDOW SPHONE7/DEFA UL T.MSPX
                                                                                              sistent and I think people are going to be quite happy
 H TTP :/ / TH EN EX TW EB .C O M/ MO B ILE/ 20 10/ 03/ 16/ 7 -R EA S O N S -W IN D O W S
 -7-PHONE-IPHONE-KILLER/                                                                      with it when it rolls out later this year.
 HTTP://D EVELOP ER .W INDOW SPHONE.C OM/W INDOW S - PHONE-7/




                                                                                    4
October 2010




     WEAR UR WORLD (6 SENSE)                                                             th

                                                                            By C.Saravanan, N.Veeramani(3rd yr,CSE)




                                           Sixth Sense is a wearable gestural interface that augments the physical world
                                           around us with digital information and lets us use natural hand gestures to
                                           interact with that information.
                                          It was developed by Pranav Mistry, a PhD student in the Fluid Interfaces
                                           Group at the MIT Media Lab.
                                          Sixth Sense bridges the gap by bringing intangible, digital information out into
                                           the tangible world, and allowing us to interact with this information via natu-
                                           ral hand
                                          Sixth Sense comprises a pocket projector, a mirror and a camera. The hard-
                                           ware components are coupled in a pendant like mobile wearable device


                                                COMPONENTS
                                                The hardware components are coupled in a pendant like mobile wearable
                                                device.

                                          Camera
                                          Projector
                                          Mirror
                                          Mobile Component
                                          Colored Markers




                   CAMERA                                        PROJECTOR
                                                           The projector pro-
              Captures an object in view
                                                            jects visual infor-
               and tracks the user’s hand
                                                            mation enabling sur-
               gestures
                                                            faces and physical
              It sends the data to smart
                                                            objects to be used as
               phone
                                                            interfaces                                A tiny LED projector
              It acts as a digital eye, con-
                                                           The project itself                         displays data sent
               necting you to the world of                  contains a battery                         from the smart
               digital information                          inside, with 3 hours
                                                                                                       phone on any sur-
                                                            of battery life.
                                                                                                       face in view–object,
                                                                                                       wall, or person.



                                                                   5
October 2010


                                                                       W E A R   U R   W O R L D   ( 6 th   S E N S E )




   MIRROR

   The usage of the mirror is significant as the projector dangles pointing
   downwards from the neck.



   SMART PHONE
    A Web-enabled smart phone in the user’s pocket processes the video data Oth-
    er software searches the Web and interprets the hand gestures



    COLOR MARKERS
           It is at the tip of the user’s fingers .
           Marking the user’s fingers with red, yellow, green, and blue tape helps the webcam recognize gestures.
           The movements and arrangements of these makers are interpreted into gestures that act as interaction
             instructions for the projected application interfaces.


   HOW IT WORKS




          The hardware that makes Sixth Sense work is a pendant like mobile wearable interface
          It has a camera, a mirror and a projector and is connected wirelessly to a Bluetooth smart phone that can slip com-
           fortably into one’s pocket




                                                               6
October 2010




              The camera recognizes individuals, images, pictures, gestures one makes with their hands
                 Information is sent to the Smartphone for processing
              The downward-facing projector projects the output image on to the mirror
              Mirror reflects image on to the desired surface
              Thus, digital information is freed from its confines and placed in the physical world.


           SOME EXAMPLE APPLICATIONS




       ADVANTAGES
              Portable
              Supports multi-touch and multi-user interaction
              Cost effective
              It is an open source

                                          Reference:
                                          http://www.freshcreation.com/entry/sixth_sense_technology/
                                          http://theviewspaper.net/sixth-sense-technology-will-revolutionize-the-world/
                                          http://www.ted.com/talks/pattie_maes_demos_the_sixth_sense.html
                                          http://gizmodo.com/5167790/sixth-sense-technology-may-change-how-we-look-at-the-world-forever
                                          http://boingboing.net/2009/11/12/sixth-sense-technolo.html

                                                                 7
October 2010




MICROSOFT SQL SERVER 2008
                                                                                                    By Mallica(3rd yr., CSE)


                                      Microsoft SQL Server is a relational model database server produced by
                                      Microsoft. Its primary query languages are T-SQL and ANSI SQL.

                                           The current version of      file, document, spatial, etc.    gration of the data visuali-
                                      SQL Server, SQL Server 2008      as well as perform search,       zation products from Dun-
                                      was released (RTM) on Au-        query, analysis, sharing, and    das Data Visualization Inc.,
                                      gust 6, 2008 and aims to         synchronization across all       which was acquired by Mi-
                                      make data management             data types.                      crosoft. On the manage-
                                      self-tuning, self organizing,                                     ment side, SQL Server 2008
                                      and self maintaining with              SQL Server includes        includes the Declarative
                                      the development of SQL           better compression fea-          Management Framework
                                      Server Always On technolo-       tures, which also helps in       which allows configuring
                                      gies, to provide near-zero       improving scalability. It en-    policies and constraints, on
                                      downtime. SQL Server 2008        hanced the indexing algo-        the entire database or cer-
                                      also includes support for        rithms and introduced the        tain tables. The version of
                                      str uc tur ed  a nd     se mi-   notion of filtered indexes. It   SQL Server Management
                                      structured data, including       also includes Resource Gov-      Studio included with SQL
                                      digital media formats for        ernor that allows reserving      Server 2008 supports Intel-
                                      pictures, audio, video and       resources for certain users or   liSense for SQL queries
                                      other multimedia data. In        workflows. It also includes      against a SQL Server 2008
                                      current versions, such multi-    capabilities for transparent     Database Engine. SQL Serv-
                                      media data can be stored         encryption of data (TDE) as      er 2008 also makes the da-
                                      as BLOBs (binary large ob-       well as compression of           tabases available via Win-
                                      jects), but they are generic     backups SQL Server 2008          dows PowerShell providers
                                      bit streams. Intrinsic aware-    supports the ADO.NET Entity      and management function-
                                      ness of multimedia data will     Framework and the report-        ality available as Cmdlets,
                                      allow specialized functions      ing tools, replication, and      so that the server and all
                                      to be performed on them.         data definition will be built    the running instances can
                                      SQL Server 2008 can be a         around the Entity Data           be managed from Windows
                                      data storage backend for         Model. SQL Server Reporting      PowerShell.
                                      different varieties of data:     Services will gain charting
                                      XML, email, time/calendar,       capabilities from the inte-




 Performance Data Collector
     Performance Data Collector           time consuming one. To Overcome                  By using this feature you are getting
is one of the new features that’s         this MS has added Performance data               the data in standard format and stor-
accompanied from SQL Server               collector feature in SQL 2008. In a              ing it in relational format, so it will be
2008. It’s very hard to get perfor-       Nutshell performance data collector
                                                                                           easy to correlate the data. Moreover
mance data from necessary in-             will collect performance data
puts. We will get the data from           (integrating all your data from your             it will allow the data to be stored in
Perfmon (system monitor), profil-         server), upload it in centralized man-           centralized server so you can query
er, DMV etc and correlating this          agement data warehouse (MDW) in                  the single server to see reports of all
data is very hard, implementing           relational format and finally allows             your server in single location
the same process or scripts               you to see reports in graphical for-
across your environment is also           mat.




                                                                 8
October 2010




Availability

This feature is available in the following editions of SQL 2008 and SQL 2008 R2
   Datacentres (only for R2)
   Enterprise
   Standard
   Web
   Workgroup

Data Collector

Before we stepping into configuring Data collector service, we need to configure a centralized
server to store these data. Let’s configure the centralized server no Connect to the server, Ex-
pand Management folder and right click on “Data Collection” and click on “Configure Manage-
ment Data Warehouse                                                                                      Configuring Centralized
                                                                                                        Server for Data Collector
Initialization Process




       Click next on the welcome screen                                   In this window you have the option for config-
                                                                         uring the centralized server. Select “ Create or
                                                                         upgrade a management data warehouse “ op-
                                                                         tion and click “next”




 In this window it will choose your local server as cen-                  In this window you will be providing necessary
tralized server and you have the option to select the data-              permissions to the logins to view or modify data.
base. Either you can use the existing database or you can                You can click on individual login and select the role
create a new one. To create new database click on new                    for that login and click ok. It’s not mandatory to set
button, a new database creation window will be popped                    the permissions now you can also set it later.
up.




                                                                   9
October 2010




                     Role Name              Role Description

                     mdw_admin              Has both reader and writer permissions
                     mdw_reader             Provides read access only to view reports
                     mdw_writer             Provides permission to modify and upload data to MDW




         At last it will show the summary descrip-                        Configuring Data collector in instance
        tion , if you find everything correct then
                                                                          Connect to the server, expand management folder and
        click on finish to configure the centralized
                                                                          right click on “Data Warehouse” as shown above.
        data warehouse server.
                                                                          Now it’s time to configure data collector at instance
  Version                      Details Captured                           level since centralized server is configured and ready to
                                                                          accept data. Pass the welcome screen.
                                   Disk Usage
                                   Query Statistics                      Select "Set up data collection” in this window to config-
  SQL Server 2008
                                   Server Activity                       ure data collector. It will capture the following details
                                                                          into the DB
                                   Disk Usage
  SQL Server 2008 R2               Query Statistics
                                   Server Activity
                                   Utility Information




                                                                         Once information is provided you will be
                                                                         shown with the summary details of the config-
                                                                         uration you have chosen. If you found it’s cor-
                                                                         rect just click on Finish button
   In this window select the centralized server and
  the data warehouse db. In this case it’s SAGAR-
  LAPTOP and Data Collection database. You can
                                                                    Reference
  find one more option here and it’s cache directo-
  ry, this will allow the data to be cached to the                  SQL SERVER 2005 students guide—NIIT
  folder and uploading it later. Data collector works
  in two modes as follows




                                                               10
BETTER SAFE THAN SORRY
       (WIFI NETWORK SECURITY)!

                                                                         -By K.Gautam(3rd yr,CSE)




So you have finally worked your way past all the Network jargons of Ip addresses, SSIDs, access points…etc.
and got your Wi-Fi network up and running, now you may think you are in the clear but you are far from it
unless you have set up some sort of security on your wireless network.
So here is a list of a few techniques that hackers use to get into your wireless network, and how to safeguard
yourself.

1. Sniffing

This is the most simple of all the attacks, simply put an unsecured wireless network can be easily intercepted
and the attacker can easily obtain almost all of your information. This is mainly caused by people with “This
won’t happen to me” attitude.




The solution: The simplest attack has the simplest solution; just make sure you secure your network with
some sort of encryption and a password.




                                                      11
2. SPOOFING
                                                                         network with a stronger wireless
                                                                         signal and a copied SSID (Access
                                   So you’ve setup your Wi-Fi net-
                                                                         point name) in the same area as a
                                   work you may notice that the
                                                                         legitimate network. This causes
                                   computer no longer asks which
                                                                         unsuspecting computers to auto-
                                   network to connect to , it just
                                                                         matically connect to the spoofed
                                   automatically connects .This very     network instead of the real one.
                                   convenient feature is the basis of
                                   the spoofing attack .

                                   Hackers often attack a wireless
                                   network by simply creating a new



                                   3. Encryption Cracking

                                    This the most difficult attack , hackers try to crack your wireless net-
Conclusion                         work password by a combination of different techniques ,and as en-
                                   cryption keys become more advanced, hackers also increase their skills
                                   and develop new tools for penetrating even well protected wireless net-
                                   works.
                                   There are numerous ways to crack a wireless network’s encryption, but
                                   even simplistic methods can work. The website WPA Cracker, for exam-
                                                                      ple, can be used to hit a network
                                                                      with a brute force dictionary attack
                                                                      that simply throws random words
These are the most common
methods for hacking into a
                                                                      at a secured wireless network to try
wireless network, but there                                           and crack it. This method can take
are other methods too,                                                a long time, and sometimes re-
                                                                      quires luck on the hacker’s part, but
And new methods are being
found everyday so it’s very                                           it is often effective
difficult to be a 100% safe.


That is the bad news; the          The first step in protecting yourself from this kind of attack is to use
good news is that unless you       WPA encryption or a combination of WPA & AES. WEP, the older en-
happen to be the CEO of a          cryption technology, has been completely de-constructed by hackers
multi-billion dollar Company
                                   and is now considered quite easy to crack.
or the Chief Minister of a state
you are very unlikely to be the
target of such a sophisticated     The second step is to use a long and completely random password /
attempt to hack into your          encryption key , these are really hard to remember but are very hard
system. But still it’s better to
                                   and take a long time to crack.
be safe than sorry, so simple
steps like using a long encryp-
                                     References :
tion key can solve most secu-
rity situations.                     Makeuseof.com

                                     Lifehacker.com

                                     Wikipedia.org

                                     engadget.com




                                                      12
October 2010



                                       CLOUD COMPUTING
                                          By Nitin Goswami (3rd yr., CSE)

                                                                                   the internet. Cloud computing pro-


                                        C          loud computing is a model
                                       for enabling convenient ,on demand
                                                                                   viders delivers a common online
                                                                                   application which are accessed by
                                                                                   other web services.
                                                                                   The major cloud service provider -
                                       network access to a shared pool of          Microsoft, Google, sales force ,IBM
                                       resources, such as networks, storage,       etc.
                                       Applications and services that can be
                                       rapidly provisioned and released
                                       with minimal management effort or
                                       service provider. Cloud computing
                                       provides a new supplement , con-
                                       sumption and delivery model for it
                                       services based on internet. The
                                       term cloud is used as a metaphor for



                                                           Architecture
 Cloud architecture, the systems architecture of the software systems involved in the delivery of cloud computing, typically
 involves multiple cloud components communicating with each other over application programming interfaces, usually web
 services.


Need for cloud computing
                                        Key features
 To gain a competitive business        Agility improves with users' ability to rapidly and inexpensively re-
edge ,small and medium scale           provision technological infrastructure resources.
enterprises ,which have a work
force of 10 to 15 employees or
                                       Cost is claimed to be greatly reduced and capital expenditure is convert-
more need to have an it infra-
                                       ed to operational expenditure. This ostensibly lowers barriers to entry, as
structure that is scala-
                                       infrastructure is typically provided by a third-party and does not need to
ble ,reliable and efficient as
                                       be purchased for one-time or infrequent intensive computing tasks. Pric-
that of large scale enterprises.
                                       ing on a utility computing basis is fine-grained with usage-based options
Smes face various issues in            and fewer IT skills are required for implementation (in-house).
terms of cost and knowledge
for setting up such a large en-
terprise network. There-               Device and location independence enable users to access systems
fore ,both smes and large en-
                                       using a web browser regardless of their location or what device they are
terprises came up with the
                                       using (e.g., PC, mobile). As infrastructure is off-site (typically provided
solution of new concept of
                                       by a third-party) and accessed via the Internet, users can connect from
cloud computing.in cloud com-
puting the customer need not
                                       anywhere .
have to invest in the physical
infrastructure instead they can
consume the resources as a             Multi-tenancy enables sharing of resources and costs across a large
service on demand. They can            pool of users thus allowing for:
pay only on the usage basis.            Centralization of infrastructure in locations with lower costs (such
                                       as real estate, electricity, etc.)
                                        Peak-load capacity increases (users need not engineer for highest
                                       possible load-levels)
                                       Utilization and efficiency improvements for systems that are often
                                       only 10–20% utilized.
                                                                    13
October 2010



                                                                             Service providers


                                                                             Google

                                                                               It offers various cloud
                                                                             computing services that
                                                                             come in form of Google
                                                                             app, which is a saas cloud
                                                                             computing        service.
                                                                             Google app provides a
                                                                             fully integrated applica-
                                                                             tion environment that
                                                                             enables a user to host
                                                                             their own web applica-
                                                                             tion. Google provides fol-
                                                                             lowing web applications
                                                                             like-
                                                                              Gmail for messaging
Caption describing picture or graphic
                                                                              Gtalk for instant mes-
                                                                             saging and voice over in-
                                                                             ternet
                                                                              Google docs for docu-
                                                                             ment sharing
Reliability is improved if multiple redundant sites are used, which
makes well designed cloud computing suitable for business continuity
and disaster recovery. Nonetheless, many major cloud computing ser-
vices have suffered outages, and IT and business managers can at times
do little when they are affected.


Scalability via dynamic ("on-demand") provisioning of resources on a
fine-grained, self-service basis near real-time, without users having to
engineer for peak loads. Performance is monitored, and consistent and
loosely coupled architectures are constructed using web services as the
system interface. One of the most important new methods for overcom-
ing performance bottlenecks for a large class of applications is data par-
allel programming on a distributed data grid.
Maintenance cloud computing applications are easier to maintain,
since they don't have to be installed on each user's computer. They are
easier to support and to improve since the changes reach the clients
instantly.
Metering cloud computing resources usage should be measurable and
should be metered per client and application on daily, weekly, monthly,
and annual basis. This will enable clients on choosing the vendor cloud
on cost and reliability (QoS)




                                                    14
October 2010




Microsoft
                                                                    complexity of security is greatly
 MS has developed win-        Security could improve due to         increased when data is distribut-
dows azure platform           centralization of data, increased     ed over a wider area and / or
(azure) which is an inter-    security-focused resources, etc.,     number of devices.
net-scale cloud services      but concerns can persist about
platform. Subscribing to      loss of control over certain sensi-
                              tive data, and the lack of security
azure ,a user need not
                              for stored kernels. Security is of-
buy      the software /
                              ten as good as or better than un-
applications for develop-
                              der traditional systems, in part
ing the customized appli-
                              because providers are able to de-
cations for its customers,
                              vote resources to solving security
thereby reduces the cost.     issues that many customers can-
Microsoft also offers         not afford. Providers typically log
cloud applications ready      accesses, but accessing the audit        Cloud Computing Models
for use     by customers      logs themselves can be difficult or
such as windows live, Mi-     impossible. Furthermore, the
crosoft dynamics, other
online services.             Software as Service                       Infrastructure as a service

                                                                        The iaas model enables a user to
                              The saas model enables a user             use it infrastructure such as hard-
                              to use the software or applica-           ware, storage, networking as a ser-
                              tion as a service on demand by            vice. The various service that are
                              using the internet.                       provided by iaas are amazon
                                                                        ec2,gogrid etc.
                             Growth of cloud computing                        Platform as a service
                                 The paas model enables a                    Thus ,cloud computing is an
                                user to use a hosting envi-                 emerging technology which is
                                ronment for their applica-                  increasing in present scenario
                                tions. The various services                 that will enable user ,small
                                that are provided by the                    scale enterprises as well as
                                paas model are         Ap-                  large scale enterprise to attain
                                pExchange, Facebook, ama-                   a huge profit in terms of cost
                                zon web services ,windows                   and infrastructure. Hats why
                                azure platform and Google                   cloud computing is being
                                app engine.                                 called as



                                                      Next generation computing

                              Reference:

                              Cloud computing – next generation computing environment student guide.
                                                 15
October 2010

     Wireless LAN Security                                                                   By Monika(3rd yr,CSE)



  MAC Filtering               One         issue      with     corporate        wireless       networks    in   general,
                              and WLANs in particular, involves the need for security. Many ear-
  In computer network-
  ing, MAC Filtering (or      ly access points could not discern whether or not a particular user
  EUI filtering, or layer     had authorization to access the network. Although this problem re-
  2 address filtering) re-    flects issues that have long troubled many types of wired networks (it
  fers to a security access
  control methodology         has been possible in the past for individuals to plug computers into
  whereby the 48-bit ad-      randomly available Ethernet jacks and get access to a local network),
  dress     assigned     to   this did not usually pose a significant problem, since many organiza-
  each network card is
  used to determine access    tions had reasonably good physical security. However, the fact that
  to the network.             radio signals bleed outside of buildings and across property lines
  MAC addresses are           makes physical security largely irrelevant to Piggy backers. Such cor-
  uniquely assigned to
  each card, so using MAC     porate issues are covered in wireless security.
  filtering on a network
  permits and denies net-
  work access to specific     Security Options
  devices through the use
  of blacklists and white
  lists. While the re-        There are three principal ways to secure a wireless network.
  striction of network ac-
  cess through the use of                  For closed networks (like home users and organizations)
  lists is straightforward,   the most common way is to configure access restrictions in the access
  an individual person is
  not identified by a MAC
                              points. Those restrictions may include encryption and checks
  address, rather a device    on MAC address. Another option is to disable ESSID broadcasting,
  only, so an authorized      making the access point difficult for outsiders to detect. Wireless In-
  person will need to have    trusion Prevention Systems can be used to provide wireless LAN se-
  a white list entry for      curity in this network model.
  each device that he or
  she would use to access
  the network.                           For commercial providers, hotspots, and large organiza-
  While giving a wireless     tions, the preferred solution is often to an open and unencrypted, but
  network some additional     completely isolated wireless network. The users will at first have no
  protection, MAC Filter-     access to the Internet nor to any local network resources. Commercial
  ing can be circumvented
  by scanning a valid MAC
                              providers usually forward all web traffic to a captive portal which
  (via airodump-ng) and       provides for payment and/or authorization. Another solution is to
  then changing the own       require the users to connect securely to a privileged network us-
  MAC into a validated        ing VPN.
  one. This can be done in
  the Windows Registry or
  by using command line                       Wireless networks are less secure than wired ones; in
  tools on a Linux plat-      many offices intruders can easily visit and hook up their own com-
  form.                       puter to the wired network without problems, gaining access to the
                              network, and it's also often possible for remote intruders to gain ac-
                              cess to the network through backdoors like Back Orifice. One general
                              solution may be end-to-end encryption, with independent authenti-
                              cation on all resources that shouldn't be available to the public.


                              Reference
                              www.wardrive.net

                              www.sans.org/reading_room/../wireless-lan-security-issues-solutions_1009

                                                            16
October 2010




                      Google’s Web Browser
                                                                 By V.Vinoth, D.Ashok kumar(3rd yr,CSE)




     Chrome   the web browser from Google is touted to be the fastest web
   browser . It is based on the open source Chromium project . It uses the Web
   kit Layout engine and the V8 JavaScript engine . The first public stable
   release was on 11 December 2008. Today chrome is the third most widely
   used web browser after Firefox.


   Development
   Chrome was assembled from 25 different code libraries from Google and third
   parties such as Mozilla's Netscape Portable Runtime, Network Security
   Services, NPAPI, as well as SQLite and a number of other open-source
   projects. The JavaScript virtual machine was considered a sufficiently
   important project to be split off. Chrome was one of the first browsers to
   include support for HTML 5.


     Features
    Tabs and Stability                                                                     Incognito Mode:
    Chrome is a process based web browser, i.e. each tab open as an individual process,    Chrome is one of the few brows-
    so if one of the tabs crash the whole widow does not crash and the other tabs can      ers in which the private browsing
    remain working                                                                         mode is totally separate from the
                                                                                           normal mode operation. Both
    Security:
                                                                                           windows can be simultaneously
    Chrome will show you a warning message when visiting a site that is suspected of       used and they operate separately.
    containing malware or phishing.
                                                                                           Incognito is the private browsing
    A phishing attack takes place when someone masquerades as someone else to trick        mode, where all records like his-
    you into sharing personal or other sensitive information with them, usually through    tory, downloads , etc. are not
    a fake website. Malware, on the other hand, is software installed on your machine      saved not beyond the current
    often without your knowledge, and is designed to harm your computer or                 session.
    potentially steal information from your computer.

    Sandboxing helps prevent malware from installing itself on the computer or using
    what happens in one browser tab to affect what happens in another. The sandbox
    adds an additional layer of protection to your browser by protecting against
    malicious web pages that try to leave programs on your computer, monitor your
    web activities, or steal private information from your hard drive

    Automatic web page translation
    Starting with Google Chrome 4.1 the application added a built-in translation bar
                                                                                           Reference :
    using Google Translate. Translation is currently available for 52 languages            http://www.google.com/chrome .

    Omni bar                                                                               http://chrome.blogspot.com/

                                                                                           http://en.wikipedia.org/wiki/
    This is one of the best features if chrome , instead of having a separate box for
                                                                                           Google_Chrome
    searching and for the URL , chrome combines both for usability and speed.




                                                                 17
October 2010


                   Computer Security
                                                                  By Akash Goswami(3rd yr,CSE)




                It is a dangerous world, even for the computers that sit in our offices. Bad
               things can happen.

                Some bad things happen because computers are pieces of machinery. Parts
               can break, wear out, choke on dust and dirt, or simply quit working for mysteri-
               ous reasons. That’s why the smart computer user frequently backs up all the
               critical data on the hard drives. Programs can be reinstalled, but membership
               lists, financial records, congregation council minutes, and other data have to be
               saved in several places to avoid disaster. Computers are pieces of machinery,
               and they will fail.


               Viruses Spam                      BX316.dll. Fatal opera-       the past month and
                                                 tion error.”                  leaves the computer
               and More                          A virus has wormed its        on. Someone else
                                                 way from the council sec-     walks by and finds the
                But there are other              retary’s disk to the          giving     records    of
               threats to church com-            church’s computer.            members displayed on
               puters.                           Here’s another problem        the screen. The temp-
               Consider       this.     Your     scenario. This time the       tation is strong to
               church council secretary          disk inserted by the          scroll through and see
               rushes in one hour before         council secretary isn’t       just whether Mrs. Hob-
               the monthly meeting. “I           infected. But after saving    son is as generous as
               didn’t have time to print         the minutes, he decides       she says she is.
               out the minutes,” he says,        to do a little web surfing    Casual use of church
               pulling a floppy disk out of      while waiting for the         computers can destroy
               his pocket. “And I need to        printout. He checks the       information, get the
               make one final correc-            trash pickup days at the      church on spammers’
               tion.” He inserts the disk        town’s Web site, then         lists, and create pasto-
               into the church’s comput-         follows a link about recy-    ral problems.
               er and finishes the work          cling. This leads him to a
               so that the council can           couple of additional sites.
               have      the       corrected     Then he signs off, after
               minutes.                          sending a quick e-mail to
               The next morning the of-          a colleague at work
               fice secretary turns on the       about tomorrow’s lunch-
               computer. The disk drives         eon meeting.
               whirr and whirr, but noth-        Before long, the church’s
               ing comes up on the               e-mail inbox is crammed
               screen. Or she boots the          with spam; strange, of-
               computer, calls up the            fensive, and unwanted
               monthly income report             missives from places with
               and the computer shuts            weird names.
               down,      displaying      the    One more horror story.
               dreaded “blue screen of           The financial secretary
               death” with the message           checks the spread sheet
               “unable       to      retrieve    showing the income for



                                            18
October 2010

                                                         COMPUTER SECURITY


                 How to Protect
                It is not hard to protect           an anti-virus program              server from unauthorized
               church computers                     first to make sure it is not       use.
               from most of these                   infected.                          There is a dark side to
               problems.                            Everyone who uses                  computer security, for it
               Access to the computers              church computers                   means that we have to
               must be restricted. Sec-             should be instructed to            think about whether
               retaries and others au-              avoid casual Web surf-             church computer users
               thorized to use the                  ing. Build a list of neces-        will do unacceptable or
               church computers                     sary sites — the ELCA              dangerous things. We
               should be required to                and synod Web sites,               don’t like to operate on
               sign on with passwords               local agencies, and oth-           the basis of suspicion.
               and instructed not to let            er places useful to the            But the goal of computer
               anyone else use their                congregation’s work and            security is to protect the
               password.                            known to be safe to visit.         church’s equipment and
               “Drop-in” use by church              Enforce the no-surfing             data and preserve the
               officers or members                  policy. There are numer-           confidentiality of neces-
               should be prohibited,                ous stories about occa-            sary records. Churches
               unless the church has a              sions when people em-              should develop a poli-
               separate computer for                barrassed themselves,              cy on who uses their
               that purpose, not linked             their employers, and               computers and for
               with any critical office             their churches by inap-            what reasons. This can
               machine.                             propriate use of the               protect data from vi-
               Computers that are                   computer.                          ruses and other en-
               online should be protect-            You might want to install          croachments and
               ed with a “firewall” that            a filter or program that           avoid the serious prob-
               offers some protection               monitors online usage to           lems that can occur if
               against known viruses                spot potential problems.           someone uses the
               and “worms” that hide in             Access to critical and             church computer for
               e-mail and on internet               confidential data should           unauthorized purposes
               sites. Norton Utilities®             be protected by a double
               and similar programs                 password, and all au-
               can keep out many vi-                thorized users should be
               ruses; but the programs              instructed on how to ac-
               must be purchased, in-               cess the data without
               stalled, and maintained              inadvertently leaving it
               to keep the list of virus            open to others.
               infections updated. This             If churches use “servers”
               usually requires an an-              to store data and make it
               nual subscription.                   accessible from several
               If it is necessary to insert         sites, you might need
               a “foreign” disk in a                the advice of a computer
               church computer, it                  specialist to protect the
               should be scanned by

                Reference:
                http://en.wikipedia.org/wiki/Computer_security

                http://www.unixtools.com/security.html

                http://communications-solutions.com/security/computer-security-guide




                                               19
October 2010




                                            VIRTUALITY
                                                                     By sumit banerjee (be.cse.3rd yr)




                                The word virtual refers to not being real
Application of VR              it’s the presentation of reality or imagina-
The range of possible VR       tion. Previously it was only the part of peo-
application is vast and var-   ple’s thinking but as the development of
ied. Here are just a few       the technology virtuality took the wide
example of projects carried
                               part in creation & development of what
out recently in development
at the CRVM                    that really exist in world or only in imagi-
                               nation.
Industrial application

-Design studies                  VIRTUAL REALITY
-computer Aided design

-Ergonomic validation
                                 Virtual reality (VR) it’s a term or technology that basically defined as computerized
Research application             simulated environment that can simulate places in the real as well as imaginary
-Behavioral sciences: mod-       worlds. Two major aspects of VR are:
eling human behavior by
manipulating sensory infor-               1) Visualization is immersive, since the goal is to give the User the sensation
mation.                                   of being really in virtual world.
-psycho-pharmacological                 2) The user is able to interact in “real-time” with this environment.
research
                                 User can interact with a virtual environment either through the use of standard in-
Teaching Applications
                                 put devices such as a keyboard and mouse or through multimodal devices such as
-Teaching and learning
aids: visualization and vir-
tual                  explo-      Terms supporting virtual reality
ration of our solar system,
virtual reconstruction and        There are many devices that are use for virtual sensation like 3D visualization,
visits of ancient architec-
                                  holography, virtual caves, etc.
tural sites.

-scientific visualization
                                   3D visualization
Therapeutic application

-Cyber-therapy: treatment          The 3D visualization can be more easily understand by taking 3D films in ac-
of phobias, depression,            count.
anxiety where patient are
kept in virtual     environ-       A 3D film or S3D (stereoscopic 3D) film is a motion picture that enhances the illu-
ment to relax there brain.         sion of depth perception. Derived from stereoscopic photography, a special mo-
-Motor-therapy through             tion picture camera system is used to record the images as seen from two per-
sport: Virtual squash where        spectives and special projection hardware and/or eyewear are use to provide the
the ball speed is matched to       illusion of depth when viewing.
the patient’s disability.




                                                             20
October 2010



               Virtuality



Technique used in 3D view                                     New system without glasses
                                                              There is increasing
 Anaglyph images were         ing filters oriented differ-
                                                             emergence of new 3D
the earliest method of        ently. As each filter pass-
                                                             viewing systems which
presenting theatrical 3D.     es only that light which is
                                                             do not require the use of
                              similarly polarized and
Now polarization system                                      special viewing glasses.
                              blocks the light polarized
is used to present a stere-                                  They are referred to
                              differently each eye sees
oscopic motion picture,
                              a different image. Since       As Auto stereoscopic
here two images are pro-
                              no head tracking is in-        LCD displays.
jected superimposed onto
                              volved, the entire audi-
the same screen through
different polarizing fil-
                              ence can view the stereo-           Technology
                              scopic images at the same
ters. The viewer wears
                              time
eyeglasses which also                                        A lifelike visual display is
contain a pair of polariz-                                   created by projectors
                                 VR caves                    positioned outside the
 Holography                   It is an immersive vir-
                                                             cave and controlled by
                                                             physical       movements
                              tual reality environ-
 It is a technique that                                      from a seer inside the
                              ment where the projec-
 allows the light scat-                                      cave. Stereoscopic LCD
                              tors are directed to
 tered from an object to                                     shutter glasses convey a
                              three, four, five or six
 be recorded and later                                       3D image. The comput-
                              of the walls of a room-
 reconstructed so that it                                    ers rapidly generate a
                              sized cube where a
 appears as if the object                                    pair of images, one for
                              viewer contemplates
 is in the same position                                     each of the user’s eye.
 relative to recording        perception, reality and
                                                             The glasses are synchro-
                              illusion.
 medium as it was when                                       nized with the projectors
 recorded. The image                                         so that each eye only sees
 changes as the position        Application                  the correct image.
 and orientation of the
 viewing system chang-
                              The caves are currently being used in a
 es in exactly the same
                              variety of fields.
 way as if the object
 were still present, thus     -many engineering companies use CAVEs                         Visual effect
 making the recorded          to enhance product development.
 image appears three                                                            Visual effects (commonly shortened to
                              -prototype of parts can be created and
 dimensional.                                                                  Visual F/X or VFX) are the various
                              tested
                                                                               processes by which imagery is created
 It has a wide range of                                                        and/or manipulated outside the context
                              -Factory layout can be simulated
 application.                                                                  of a live action shoot. Visual effects often
                              -In gaming                                       involve the integration of live-action foot-
                                                                               age and computer generated imagery
                                                                               (CGI) in order to create environments
                                                                               which look realistic, but would be dan-
                                                                               gerous, costly, or simply impossible to
                                                                               capture on film. They have become in-
                                                                               creasingly common in big-budget films,
                                                                               and have also recently become accessible
                                                                               to the amateur filmmaker with the intro-
                                                                               duction of affordable animation and
                                                                               compositing software.


                                                             21
October 2010



               Virtuality



Chroma key compositing
 Chroma key compositing (or            weather forecast broadcasts,            video. This also works for green
Chroma keying) is a technique          wherein the presenter appears to        screens, since blue and green are
for compositing two images or          be standing in front of a large         considered the colors least like skin
frames together in which a color       map, but in the studio it is actu-      tone. This technique is also used in
(or a small color range) from one      ally a large blue or green back-        the entertainment industry, the
image is removed (or made              ground. The meteorologist stands        iconic theatre shots in Mystery Sci-
transparent), revealing another        in front of a blue screen, and          ence Theater 3000, for example
image behind it. This technique        then different weather maps are
is also referred to as color key-      added on those parts in the im-
ing, color-separation over-            age where the color is blue. If the
lay (CSO; primarily by the             meteorologist himself wears blue
BBC), green screen, and blue           clothes, his clothes will become
screen. It is commonly used for        replaced with the background


  Virtual world
                               manipulate elements of       sure activities. Commu-
  A virtual world is a                                      nication is usually textu-
 genre of online commu-        the modeled world and
                               thus      experien ces       al, with real-time voice
 nity that often takes the                                  communication using
 form of a computer-           telepresence to a cer-
                               tain degree. Such mod-       VOIP also possible.
 based simulated envi-                                      Virtual worlds are not
 ro nment ,      t h ro u gh   eled worlds may appear
                               similar to the real world    limited to games but,
 which users can inter-
 act with one another          or instead depict fanta-     depending on the degree
 and use and create ob-        sy worlds. The model         of immediacy presented,
 jects .Virtual worlds are     world may simulate           can encompass computer
 intended for its users to     rules based on the real
                                                            conferencing and text
 inhabit and interact,         world or some hybrid
                               fantasy world. Example       based chat rooms. Some-
 and the term today has
 become largely synony-        rules are gravity, topog-    times, emoticons or
 mous with interactive         raphy, locomotion, real      'smiles' are available, to
 3D virtual environ-           -time actions, and com-      show feeling or facial ex-
 ments, where the users        munication. Communi-
                                                            pression. Emoticons of-
 take the form of avatars      cation between users
                               has ranged from text,        ten have a keyboard
 visible to others graph-
                               graphical icons, visual      shortcut. Edward Castro        cave. Stereoscopic LCD
 ically. These avatars are
 usually depicted as tex-      gesture, sound, and          nova is an economist who       shutter glasses convey a
 tual, two-dimensional,        rarely, forms using          has      argued      that      3D image. The comput-
 or three-dimensional          touch, voice command,                                       ers rapidly generate a
                                                            "synthetic worlds" is a
 graphical representa-         and balance senses.
                                                            better term for these cy-      pair of images, one for
 tions, although other         Massively multiplayer
                               online games common-         berspaces, but this term       each of the user’s eye.
 forms are possible
 (auditory and touch           ly depict a world very       has not been widely            The glasses are synchro-
 sensations for exam-          similar to the real          adopted.                       nized with the projectors
 ple). Some, but not all,      world, with real world                                      so that each eye only sees
 virtual worlds allow for      rules and real-time ac-      A lifelike visual display is
                                                                                           the correct image.
 multiple users.               tions, and communica-        created by projectors
 The computer accesses         tion. Players create a       positioned outside the
 a computer-simulated          character to travel be-
                                                            cave and controlled by
 world and presents per-       tween buildings, towns,
                               and even worlds to car-      physical       movements
 ceptual stimuli to the
 user, who in turn can         ry out business or lei-      from a seer inside the



                                                           22
October 2010



               Virtuality



                 Virtual world concepts
   One perception of virtual                  As virtual world is a fairly                 example).
  worlds requires an online persis-           vague and inclusive term, the
  tent world, active and available                                                         Massively multiplayer online
  24 hours a day and seven days a                                                          real-life games or MMORLGs,
  week, to qualify as a true virtual                                                       the user can edit and alter their
  world. Although this is possible                                                         avatar at will, allowing them to
  with smaller virtual worlds, es-                                                         play a more dynamic role, or
  pecially those that are not actu-                                                        multiple roles.
  ally online, no massively multi-
  player game runs all day, every
  day. All the online games listed                                                         Virtual worlds are well-known
  above include downtime for
                                                                                           as being fantasy spaces sealed
  maintenance that is not included
  as time passing in the virtual                                                           off from the real world, but
  world. While the interaction                                                             more careful analysis reveals
  with other participants is done                                                          that the boundaries between the
  in real-time, time consistency is           above can generally be divided               real and virtual worlds are quite
  not always maintained in online             along a spectrum ranging from:               porous.
  virtual worlds. For example, Ev-            Massively multiplayer online role
                                              -playing games or MMORPGs                 Reference :
  er Quest time passes faster than
  real-time despite using the same            where the user playing a specific          http://virtualityconference.it/
  calendar and time units to pre-             character is a main feature of the
                                              game (World Of War craft for               http://en.wikipedia.org/wiki/Virtual_reality
  sent game time.


                                                     Do You Know?
    1. The human heart creates enough pressure while                15. The ant can lift 50 times its own weight, can pull
    pumping to squirt blood 30 feet.                                30 times its own weight and always falls over on its
    2. On average people fear spiders more than they do             right side when intoxicated.
    death.                                                          16. Polar bears are left handed.
    3. The strongest muscle in the body is the TONGUE.              17. The catfish has over 27,000 taste buds, that
    4. it’s impossible to sneeze with your eyes open.               makes the catfish rank #1 for animal having the
                                                                    most taste buds.
    5. Americans on the average eat 18 acres of pizza every
    day.                                                            18. The flea can jump 350 times its body length, that
                                                                    is like a human jumping the length of a football
    6. Did you know that you are more likely to be killed           field.
    by a champagne cork than by a poisonous spider?
                                                                    19. Butterflies taste with their feet.
    7. Right-handed people live, on average, nine years
    longer than left-handed people do.                              20. It is impossible to sneeze and keep ones eye's
                                                                    open at the same time.
    8. In ancient Egypt, Priests plucked EVERY hair from
    their bodies, including their eyebrows and eyelashes.           21. Elephants are the only animals that can't jump.
    9. The dot on top of the letter 'i' is called a tittle.         22. A cat's urine glows under a black light.
    10. A "hairbreadth away" is 1/48 of an inch.                    23. An ostrich's eye is bigger than it's brain.
    11. The word four has four letters. In the English lan-         24. Cockroaches can change course as many as 25
    guage there is no other number whose number of let-             times in one second, making them the most nimble
    ters is equal to its value.                                     animals known.
    12. The king of hearts is the only king without a mous-         25. Mosquitoes do not bite. They stab. A mosquito
    tache.                                                          has no jaws, hence when attacking a victim; it pierc-
                                                                    es it with its long proboscis and sucks the blood up
    13. No piece of square dry paper can be folded more             through its nasal tube.
    than 7 times in half.
                                                                    26. Starfishes haven't got brains.
    14. A crocodile cannot stick its tongue out.
                                                                                                By Monika (1st yr,CSE)
                                                               23
October 2010


                                         PUZZLES                                        -by Mallica(3rd yr,CSE)

 1. Can you find four numbers such that the sum of every two and sum of all four may be
     perfect squares?
 2. A cubic object 3"*3"*3" is painted blue on all the outside cubic surfaces ,including the top
     and bottom .if the cube is cut into 27 cubes of 1"*1"*1".how many 1" cubes do have any
     painted surfaces?
 3. How can you make a total of 1,000 by using sixteen 4's?
 4. The shape shown in sketch below is a square attached to half of
     another similar square ,divided diagonally:



 5. How will you write 31 using only digit 3 five times?
 6. A man decided to drive through the city and on the first day he did only 7 miles. On the last
      day he did 51 miles ,increasing his journey 4 miles each day. How many days did he travel
      and how far?
 7. Which would you say is heavier, a pound of cotton or a pound of gold?
 8. There is a number which is very peculiar, this number is three times the sum of its digits .Can
      you find the number?
 9. There is a number ,the second digit of which is smaller than its first digit by 4,and if the
      number was divided by the digit's sum ,the quotient would be 7. What will be the number?
 10. There is a number which is greater than the aggregate of its third, tenth and twelth parts by
      58.Find the number?



                MICROSOFT                                                           The Simplifier
                                                           Chorus:-
Nine-tenths of a gig,                                                     Am happy that you came into my life,
Biggest ever seen,                                                        You made my world very bright;
God, this program is big--                                                I don’t think I can ever live with out you,
MS Word 15!                                                               Because you’re the backbone of my life;
Comes on ten CDs,                                           Stanza 1:-
And requires--damn!                                                      You may not be the greatest by looks,
Word is fine, but jeez--                                                 But you are the most stunning creation;
60 megs of RAM?!                                                         You may not be as strong as the Hercules,
Oh! Microsoft, Microsoft,                                                But you can solve the Herculean problems;
Bloat ware all the way!                                    Stanza 2:-
I'm installing Word                                                      You are the Centre point of my work;
Since breakfast yesterday!                                               You are a citizen of the world;
Oh! Microsoft, Microsoft,                                               Every one loves you very much,
Moderation, please.                                                     As you simplify the problems of their world;
Guess you hadn't noticed:                                  Stanza 3:-
Four-gig drives don't grow on trees!                                  These days you’ve even started to think by yourself,
                           -by NitinGoswami(3rd yr, CSE)              Scaling new heights every now and then;
                                                                   I know it’s not hard to compete with you,
                                                                   But now I am in love with you;
                                                                                           - Venkateshwar.R (3rd yr, CSE)


                                                           24
magazine
magazine
magazine
magazine
magazine
magazine
magazine
magazine
magazine
magazine
magazine
magazine
magazine

Weitere ähnliche Inhalte

Ähnlich wie magazine

Technical seminar report on
Technical seminar report onTechnical seminar report on
Technical seminar report onBalveer Rathore
 
Sop Statement Of Purpose For Engineering
Sop Statement Of Purpose For EngineeringSop Statement Of Purpose For Engineering
Sop Statement Of Purpose For EngineeringKatyana Londono
 
Mobile First and Last: End to End Computing and the Age of Context
Mobile First and Last: End to End Computing and the Age of ContextMobile First and Last: End to End Computing and the Age of Context
Mobile First and Last: End to End Computing and the Age of ContextJames Governor
 
Whither Smartphone Development
Whither Smartphone DevelopmentWhither Smartphone Development
Whither Smartphone Developmentguestb815204
 
Whither Smartphone Development
Whither Smartphone DevelopmentWhither Smartphone Development
Whither Smartphone DevelopmentAdam Blum
 
Whither Smartphone Development
Whither Smartphone DevelopmentWhither Smartphone Development
Whither Smartphone Developmentguestb815204
 
9 Predictions for the Future of Programming.pdf
9 Predictions for the Future of Programming.pdf9 Predictions for the Future of Programming.pdf
9 Predictions for the Future of Programming.pdfDailyTechnoReview
 
Windows10_IoT_business_challenge-Avinash
Windows10_IoT_business_challenge-AvinashWindows10_IoT_business_challenge-Avinash
Windows10_IoT_business_challenge-AvinashAvinash Misra
 
User Interface Design for Web and Mobile Devices
User Interface Design for Web and Mobile DevicesUser Interface Design for Web and Mobile Devices
User Interface Design for Web and Mobile DevicesIRJET Journal
 
AGE BASED USER INTERFACE IN MOBILE OPERATING SYSTEM
AGE BASED USER INTERFACE IN MOBILE OPERATING SYSTEMAGE BASED USER INTERFACE IN MOBILE OPERATING SYSTEM
AGE BASED USER INTERFACE IN MOBILE OPERATING SYSTEMIJCSEA Journal
 
AGE BASED USER INTERFACE IN MOBILE OPERATING SYSTEM
AGE BASED USER INTERFACE IN MOBILE OPERATING SYSTEMAGE BASED USER INTERFACE IN MOBILE OPERATING SYSTEM
AGE BASED USER INTERFACE IN MOBILE OPERATING SYSTEMIJCSEA Journal
 
IEM ECE Electrovision 2013
IEM ECE Electrovision 2013IEM ECE Electrovision 2013
IEM ECE Electrovision 2013agomoni16
 
DESIGN AND DEVELOPMENT OF A MULTI FEATURED IOS MOBILE APPLICATION USING SWIFT 3
DESIGN AND DEVELOPMENT OF A MULTI FEATURED IOS MOBILE APPLICATION USING SWIFT 3DESIGN AND DEVELOPMENT OF A MULTI FEATURED IOS MOBILE APPLICATION USING SWIFT 3
DESIGN AND DEVELOPMENT OF A MULTI FEATURED IOS MOBILE APPLICATION USING SWIFT 3Journal For Research
 
Sixth sense technology
Sixth sense technologySixth sense technology
Sixth sense technologyNiraj Bharambe
 
1.Usability Engineering.pptx
1.Usability Engineering.pptx1.Usability Engineering.pptx
1.Usability Engineering.pptxDr.Saranya K.G
 
PPT of 6th sense tech. Jagdeep Singh Sidhu
PPT of 6th sense tech. Jagdeep Singh SidhuPPT of 6th sense tech. Jagdeep Singh Sidhu
PPT of 6th sense tech. Jagdeep Singh Sidhujagdeepsidhu
 
2009 Mux Florentstroppa Mobilecontext Small
2009 Mux Florentstroppa Mobilecontext Small2009 Mux Florentstroppa Mobilecontext Small
2009 Mux Florentstroppa Mobilecontext SmallFlorent Stroppa
 

Ähnlich wie magazine (20)

Technical seminar report on
Technical seminar report onTechnical seminar report on
Technical seminar report on
 
Sop Statement Of Purpose For Engineering
Sop Statement Of Purpose For EngineeringSop Statement Of Purpose For Engineering
Sop Statement Of Purpose For Engineering
 
Mobile First and Last: End to End Computing and the Age of Context
Mobile First and Last: End to End Computing and the Age of ContextMobile First and Last: End to End Computing and the Age of Context
Mobile First and Last: End to End Computing and the Age of Context
 
14 585
14 58514 585
14 585
 
Whither Smartphone Development
Whither Smartphone DevelopmentWhither Smartphone Development
Whither Smartphone Development
 
Whither Smartphone Development
Whither Smartphone DevelopmentWhither Smartphone Development
Whither Smartphone Development
 
Whither Smartphone Development
Whither Smartphone DevelopmentWhither Smartphone Development
Whither Smartphone Development
 
9 Predictions for the Future of Programming.pdf
9 Predictions for the Future of Programming.pdf9 Predictions for the Future of Programming.pdf
9 Predictions for the Future of Programming.pdf
 
20140429 BUILD Briefing
20140429 BUILD Briefing20140429 BUILD Briefing
20140429 BUILD Briefing
 
Windows10_IoT_business_challenge-Avinash
Windows10_IoT_business_challenge-AvinashWindows10_IoT_business_challenge-Avinash
Windows10_IoT_business_challenge-Avinash
 
User Interface Design for Web and Mobile Devices
User Interface Design for Web and Mobile DevicesUser Interface Design for Web and Mobile Devices
User Interface Design for Web and Mobile Devices
 
AGE BASED USER INTERFACE IN MOBILE OPERATING SYSTEM
AGE BASED USER INTERFACE IN MOBILE OPERATING SYSTEMAGE BASED USER INTERFACE IN MOBILE OPERATING SYSTEM
AGE BASED USER INTERFACE IN MOBILE OPERATING SYSTEM
 
AGE BASED USER INTERFACE IN MOBILE OPERATING SYSTEM
AGE BASED USER INTERFACE IN MOBILE OPERATING SYSTEMAGE BASED USER INTERFACE IN MOBILE OPERATING SYSTEM
AGE BASED USER INTERFACE IN MOBILE OPERATING SYSTEM
 
IEM ECE Electrovision 2013
IEM ECE Electrovision 2013IEM ECE Electrovision 2013
IEM ECE Electrovision 2013
 
DESIGN AND DEVELOPMENT OF A MULTI FEATURED IOS MOBILE APPLICATION USING SWIFT 3
DESIGN AND DEVELOPMENT OF A MULTI FEATURED IOS MOBILE APPLICATION USING SWIFT 3DESIGN AND DEVELOPMENT OF A MULTI FEATURED IOS MOBILE APPLICATION USING SWIFT 3
DESIGN AND DEVELOPMENT OF A MULTI FEATURED IOS MOBILE APPLICATION USING SWIFT 3
 
Sixth sense technology
Sixth sense technologySixth sense technology
Sixth sense technology
 
1.Usability Engineering.pptx
1.Usability Engineering.pptx1.Usability Engineering.pptx
1.Usability Engineering.pptx
 
PPT of 6th sense tech. Jagdeep Singh Sidhu
PPT of 6th sense tech. Jagdeep Singh SidhuPPT of 6th sense tech. Jagdeep Singh Sidhu
PPT of 6th sense tech. Jagdeep Singh Sidhu
 
Khaled
KhaledKhaled
Khaled
 
2009 Mux Florentstroppa Mobilecontext Small
2009 Mux Florentstroppa Mobilecontext Small2009 Mux Florentstroppa Mobilecontext Small
2009 Mux Florentstroppa Mobilecontext Small
 

Kürzlich hochgeladen

HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 

Kürzlich hochgeladen (20)

HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 

magazine

  • 1.
  • 2. CSE Snaps Articles Mobile Dreams 1 Wear the World(6th 5 sense) Microsoft Sql Server 8 Better Safe Than Sorry 11 Cloud Computing 13 Wireless LAN Security 16 Google’s Web Browser 17 Messages Computer Security 18 Chancellor’s Message Vice Chancellor’s Message Virtuality 20 Registrar Message Puzzles 24 COE’s Message Director’s Message Microsoft 24 Simplifier 24 Secret of maths 25 Tips & Tricks 27 Comp-Confusion 28 Student’s Activities 29 Staff Activities 34
  • 3. October 2010 CHANCELLOR’S MESSAGE I am very much delighted to hear that Computer Science Engineer- ing Department is starting an association. I am sure the activities of the association will help improving the organizational skills and leader- ship qualities of student which are essential for their career develop- ment. I am very confident that the association of Computer Science will reach greater heights in the years to come. I wish them to have a grand success in all their moves and I wish that these steps shall bring them a drastic change in their career growth. Dr. Ishari K.Ganesh I
  • 4. October 2010 VICE-CHANCELLOR’S MESSAGE I am very much delighted to learn that the department of computer science and Engineering is inaugurating their Association. The IT education has trans- formed our country and economy and the benefits of IT revolution has reached the common man. Vels University strives hard to impart quality edu- cation to the students so that, they have the required competencies to meet the changing needs of this nation. The activities of the association must facilitate the students to acquire organi- zational skills and bring change in their perception and attitudes. The e- Magazine to be published to mark this occasion should reflect the student’s talents and their abilities. I would like to congratulate and appreciate the students and the faculty of CSE for their efforts and I wish them all the best II
  • 5. October 2010 REGISTRAR’S MESSAGE I am much pleased to note that the department of Computer Science Engineering is inaugurating the Department Association on 14-10- 2010. The usage of computers has increased drastical- ly in these days, computers playing a role in almost every industrial sector and also in various branches of society. They are presently the backbone of every industry that currently exists. Computers have transformed the lives of billions around the world in every possible way. No field is left out without computers, whether it is medicine, e-governance, managing laws of department activities, computers have become essential. I wish all the very best for the inau- guration of the department’s association and success in implement- ing innovative ideas for the development of the world. Dr. P. Govindarajan III
  • 6. October 2010 CONTROLLER OF EXAM’S MESSAGE I am very glad to see that the Department of Computer Science is Inaugurating the Department Association on 14.10.2010. The present human generation is associated mostly with the computer usages which makes easy in day life like banking, accounting, ticketing, E-mailing, chatting, conduct of online Examination and E-governance etc., Most of the peoples relied on the computers for various matter and considered to be a very essential for the human being. In this connection, I wish all the very best for the inauguration of Department Association and success in implementing the new invents in the Computer Ed- ucation. IV
  • 7. October 2010 DIRECTOR’S MESSAGE “A GOOD START MEANS HALF DONE” I am very much pleased to note that the students of Computer Science Engineering, Vels University are coming out with an e-journal. The knowledge one acquires in college has to be harnessed in real life for the betterment of self and humanity. In other words, the students should acquire the skill of presenting & utilizing their knowledge, they get during their stay in VELS UNIVERSITY fully & properly. In that way, this journal that they intend to publish on regular basis will definitely give them an opportunity to sharpen their deliverance skills. At this juncture, I request each and every student to utilize this forum fully. I wish the students and staff of Department of Computer Science Engineering all the very Best in their endeavor. God Bless You All. Prof. P. Thiagarajan V
  • 8. October 2010 Mobile -DREAMs...... By V.vinoth, D.Ashokkumar, NitinGoswami, K.Gautam(3rd yr, CSE) Windows phone 7 is the latest version of windows mobile in development by Microsoft, scheduled for release by October 2010. Microsoft’s idea of the Smartphone is very different from their competitors, traditionally smart phones were devices that did not have touch screens and were intended to be used by one hand ,but today’s smart phones push the boundaries of technology , Microsoft plans to push it even further . The minimum requirements for phone 7 was revealed recently  Capacitive Touch: 4 or more contact points  Sensors: A-GPS, Accelerometer, Compass, Light, Proximity  Camera: 5 megapixels or more, Camera with a flash and dedicated camera button But Microsoft has their work cut out  Multimedia: Common detailed specs, Codec acceleration for them to address copy-paste and multi-tasking while also spreading  Memory: 256 MB, 8 GB Flash or more the word about their new mobile OS, which is something they have not  GPU: DirectX 9 acceleration been able to do in the past with Zune HD, Windows Mobile, and other tech-  Processor: ARMv7 Cortex/Scorpion or better nology. They seem to be doing pretty well with the Xbox, so maybe Phone7  2 screen sizes: 480×800 WVGA, 480×320 HVGA teams should probably be looking at that team for help.  Keyboard: Optional Five specific hardware buttons required: Start, back, search (a dedicated Bing button), camera button, and power -- no more, no less From the minimum requirements we can clearly understand that Microsoft is clearly targeting only the high end market for Phone 7. The basic facts Windows Phone 7 Series is the suc- are supposed to be released by branded and expansive Zune and Xbox components, and extremely cessor to Microsoft's line of Windows the end of this year. strict hardware requirements for Mobile phone operating systems. It's The visual and underlying differ- partners. A couple familiar touch- based on the Windows CE 6 kernel, ences in the operating system are stones from the past include plans like the Zune HD, while current ver- almost too numerous to mention, for Outlook and Office support, as sions of Windows Mobile are based including a completely (and we do well as licensing to a wide variety mean completely) upended user of third party hardware vendors -- on Windows CE 5. Microsoft an- interface, an emphasis on finger- nounced the new OS at Mobile World despite the name change; Mi- based touch screen input, deep crosoft still isn't building any Congress 2010 in Barcelona, and social networking integration, fully phones itself says that the first handsets to run it 1
  • 9. October 2010 MOBILE -DREAMS...... TILES Hub Strategy Apps, Lots of Apps None of the applications designed for Win- dows mobile will work on WP7. Sorry Win- The Hub strategy is the core for Win- The tile function of the screen dows Mobile developers, it's for the best. replaces the icon displays seen dows Phone 7 and it makes a lot of Deep down, we all knew a clean break was on the iPhone and the Android sense. So, I will have a music hub in the the only way Windows Phone wasn't going to get stuck in the same loop. with living breathing tiles. Just shape of the Zune app. But this app is picking up the phone you can see Apps will have some standardized interface not restricted to content I have upload- what is going on in your world elements, like the app bar on the bottom for ed to, or bought in Zune, but all the common commands.. without opening any app. music content on my ‘phone. On my I know we can have push notifi- It’s all about the apps. Some of the biggest iPhone I have many music apps, each cations on the iPhone and alerts names in Apps. Seismic, Four on the Android but they both with different content. I have to remem- square, Shazam, the Associated Press –are require some element of effort. ber where my music is before I can play all bringing apps to the 7. So, we don’t need The push notifications don’t al- it. With the 7 I can access my music in ways hang around on your iPh- to worry about not having the big names you the various apps, or I can have a cen- one and on the Nexus I have to are used to. It looks like they are already tralized hub of music. slide the thing down and then lining up to come on board. “To catch the reader's attention, place read through the various bits. Take the hub strategy across to other an interesting sentence or quote from the story here.” This delivery of information is just content, like business documents and one example of how Microsoft Office becomes the business hub. This are looking to fully innovate with strategy gives me the best of both this phone, not just deliver a Quality Apps worlds, I can use my preferred app or I version of what the market is used to. can find it in the main hub. Smart. The demonstrations all looked awesome with plenty of depth, functionality and interaction. These apps were developed in 3 weeks running the new Silverlight plat- form announced yesterday. Try before you buy Forget this lite/pro app business. You get to download the app as a trial. The func- tionality for the trial is core to the new Silverlight toolbox, so it is down to the app developers to decide the best way for the The Zune Phone! trial. Some apps may be fully functional but on a limited trial time. Other apps may have limited functionality or the first few Microsoft's vision of Zune is finally clear with Windows Phone 7. It's an app, just levels of a game . like iPod is on the iPhone, though the Zune Marketplace is integrated with it into the music + video hub, not separated into its own little application. It's just like the Zune HD,. But you get third-party stuff like Pandora, too, built-in here., there will be an FM radio in every phone 2
  • 10. October 2010 MOBILE -DREAMS...... Email The 7 will have full capability to support not just Exchange accounts but all other major email providers as well. So, you don’t need to have an Exchange account to be using this for email. However, if you do have exchange, this will be a boon. Remember, the iPhone has Exchange support but the Android does not offer Active Sync. The 7 will offer multiple exchange account sync which will also be good for business users. Let us not forget there are still a lot more people running Exchange emails than Gmail or Apple Mail. Blackberry, are you paying attention? TOP 10 FEATURES Games If Microsoft's got an ace-in-hole with Win- ber of levels. Not only will you be able 1. Smooth transitional user interface dows Phone 7, it's Xbox Live. Gamers have to continue playing your XBOX games 2. Informative lock screen and auto- hidden talked about a portable Xbox for years—this on the phone (we don’t know right now top status bar is the most logical way to do it. The N-Gage if you can play all of them) but also was ahead of its time. The DS and PSP are that it remembers you across plat- 3. Good Office integration and support the past. The iPhone showed us that the forms so you can pick up where you 4. Bing search page and functionality future of mobile gaming was going to be on left off when at home in front of your your phone, and now that just got a lot XBOX. In a sense, this is what Sony 5. Easy setup for Google, Windows Live, more interesting. The potential's there, and has been trying to achieve with the Yahoo! Mail, and others hopefully the games will be plentiful and PSP/PS3 hook up, but with all the oth- awesome enough to meet it. er mobile bits added. 6. Functional QWERTY keyboard Forget Flight Control, how about full on If the 7 can be an awesome entertain- 7. Cool camera software XBOX action on your phone? The graphics ment platform as well as the business 8. Tell me voice search look up to it and the game levels, credits platform of Microsoft’s heritage, this and achievements will be recorded against could be amazing. 9. Powerful Outlook email, calendar, and your live profile. contacts client This cross performance works on a num- 10. Zune HD functionality 3
  • 11. October 2010 Over the air Sync : Mesh A piece of interface that's shockingly not there: A together. The iPhone gets better but doesn’t perfectly inte- desktop syncing app. If anyone would be expected to grate my Google life. Nor does Android completely – Gmail, tie their phone to a desktop, you'd think it'd be Mi- Google apps yes but other accounts like Google Finance crosoft, but they're actually moving forward here. All of still don’t hook up. your contacts and info sync over the air. The only Microsoft is the sleeping giant. Historically not as good thing you'll be syncing through your computer is music looking as Apple, and not as fast as Google. The phone 7 is and videos, which is mercifully done via the Zune the show piece if not the Centre piece of their empire which desktop client's will help them back on the path to greatness. Microsoft’s plans to sync your life across channels Of course we assume that Microsoft can get the hardware and platforms seems a little ahead of its time but right. We have seen some great things, beautiful graphics, with the 7, finally everything comes into place. Music, great games but will the hardware be up to it? Multi tasking work, games, contacts all come of age in one place. is not coming which is probably a smart reason to manage What we forget is that Microsoft has all the compo- the hardware drain. No doubt they will be working hard to nent parts to serve my digital life. Email, Search, Gam- find the right partners to deliver the best handset possible. ing, Music. Until now some of those have been a bit A glitch in the hardware could be the undoing of such great crap, the Zune didn’t really inspire, don’t get me start- potential. ed on Vista and pre Bing, search wasn’t too hot either. Until we start to see handsets in the wild, I will remain with Roll forward a year and Windows plans are coming my view that this is the iPhone Killer. together. With the phone the potential Centre of my digital universe I tend to gravitate to the platform that gives me the greatest experience to hook them all FINAL COMMENTS WHAT IS STILL MISSING? We have assumed here that Microsoft can get the hardware right. The two most obvious glaring issues are the lack of We have seen some great things, beautiful graphics, and great copy-paste and the limited multi-tasking. You can al- games but will the hardware be up to it? Multi tasking is not com- ready select a word and use the cursor so it shouldn’t be ing which is probably a smart reason to manage the hardware that much effort for Microsoft to get some developers drain. No doubt they will be working hard to find the right partners locked into a room to figure out copy-paste on WP7 to deliver the best handset possible. A glitch in the hardware Just like the previous versions of the iPhone, you can could be the undoing of such great potential. have native apps running in the background so you Until we start to see handsets in the wild, we can safely assume could listen to Zune HD streaming content while surfing that this is the iPhone Killer. the web and receiving emails on the go. There are several other areas that need work, such as REFERENCE the games in Xbox Live, Twitter support, 3rd party apps, HTTP://W W W .MIC R OSOF T.C OM/W INDOW SMOB ILE/ E N -US/ and more. However, the OS is quite refined and con- C MPNW INDOW SPHONE7/DEFA UL T.MSPX sistent and I think people are going to be quite happy H TTP :/ / TH EN EX TW EB .C O M/ MO B ILE/ 20 10/ 03/ 16/ 7 -R EA S O N S -W IN D O W S -7-PHONE-IPHONE-KILLER/ with it when it rolls out later this year. HTTP://D EVELOP ER .W INDOW SPHONE.C OM/W INDOW S - PHONE-7/ 4
  • 12. October 2010 WEAR UR WORLD (6 SENSE) th By C.Saravanan, N.Veeramani(3rd yr,CSE)  Sixth Sense is a wearable gestural interface that augments the physical world around us with digital information and lets us use natural hand gestures to interact with that information.  It was developed by Pranav Mistry, a PhD student in the Fluid Interfaces Group at the MIT Media Lab.  Sixth Sense bridges the gap by bringing intangible, digital information out into the tangible world, and allowing us to interact with this information via natu- ral hand  Sixth Sense comprises a pocket projector, a mirror and a camera. The hard- ware components are coupled in a pendant like mobile wearable device COMPONENTS The hardware components are coupled in a pendant like mobile wearable device.  Camera  Projector  Mirror  Mobile Component  Colored Markers CAMERA PROJECTOR  The projector pro-  Captures an object in view jects visual infor- and tracks the user’s hand mation enabling sur- gestures faces and physical  It sends the data to smart objects to be used as phone interfaces  A tiny LED projector  It acts as a digital eye, con-  The project itself displays data sent necting you to the world of contains a battery from the smart digital information inside, with 3 hours phone on any sur- of battery life. face in view–object, wall, or person. 5
  • 13. October 2010 W E A R U R W O R L D ( 6 th S E N S E ) MIRROR The usage of the mirror is significant as the projector dangles pointing downwards from the neck. SMART PHONE A Web-enabled smart phone in the user’s pocket processes the video data Oth- er software searches the Web and interprets the hand gestures COLOR MARKERS  It is at the tip of the user’s fingers .  Marking the user’s fingers with red, yellow, green, and blue tape helps the webcam recognize gestures.  The movements and arrangements of these makers are interpreted into gestures that act as interaction instructions for the projected application interfaces. HOW IT WORKS  The hardware that makes Sixth Sense work is a pendant like mobile wearable interface  It has a camera, a mirror and a projector and is connected wirelessly to a Bluetooth smart phone that can slip com- fortably into one’s pocket 6
  • 14. October 2010  The camera recognizes individuals, images, pictures, gestures one makes with their hands Information is sent to the Smartphone for processing  The downward-facing projector projects the output image on to the mirror  Mirror reflects image on to the desired surface  Thus, digital information is freed from its confines and placed in the physical world. SOME EXAMPLE APPLICATIONS ADVANTAGES  Portable  Supports multi-touch and multi-user interaction  Cost effective  It is an open source Reference: http://www.freshcreation.com/entry/sixth_sense_technology/ http://theviewspaper.net/sixth-sense-technology-will-revolutionize-the-world/ http://www.ted.com/talks/pattie_maes_demos_the_sixth_sense.html http://gizmodo.com/5167790/sixth-sense-technology-may-change-how-we-look-at-the-world-forever http://boingboing.net/2009/11/12/sixth-sense-technolo.html 7
  • 15. October 2010 MICROSOFT SQL SERVER 2008 By Mallica(3rd yr., CSE) Microsoft SQL Server is a relational model database server produced by Microsoft. Its primary query languages are T-SQL and ANSI SQL. The current version of file, document, spatial, etc. gration of the data visuali- SQL Server, SQL Server 2008 as well as perform search, zation products from Dun- was released (RTM) on Au- query, analysis, sharing, and das Data Visualization Inc., gust 6, 2008 and aims to synchronization across all which was acquired by Mi- make data management data types. crosoft. On the manage- self-tuning, self organizing, ment side, SQL Server 2008 and self maintaining with SQL Server includes includes the Declarative the development of SQL better compression fea- Management Framework Server Always On technolo- tures, which also helps in which allows configuring gies, to provide near-zero improving scalability. It en- policies and constraints, on downtime. SQL Server 2008 hanced the indexing algo- the entire database or cer- also includes support for rithms and introduced the tain tables. The version of str uc tur ed a nd se mi- notion of filtered indexes. It SQL Server Management structured data, including also includes Resource Gov- Studio included with SQL digital media formats for ernor that allows reserving Server 2008 supports Intel- pictures, audio, video and resources for certain users or liSense for SQL queries other multimedia data. In workflows. It also includes against a SQL Server 2008 current versions, such multi- capabilities for transparent Database Engine. SQL Serv- media data can be stored encryption of data (TDE) as er 2008 also makes the da- as BLOBs (binary large ob- well as compression of tabases available via Win- jects), but they are generic backups SQL Server 2008 dows PowerShell providers bit streams. Intrinsic aware- supports the ADO.NET Entity and management function- ness of multimedia data will Framework and the report- ality available as Cmdlets, allow specialized functions ing tools, replication, and so that the server and all to be performed on them. data definition will be built the running instances can SQL Server 2008 can be a around the Entity Data be managed from Windows data storage backend for Model. SQL Server Reporting PowerShell. different varieties of data: Services will gain charting XML, email, time/calendar, capabilities from the inte- Performance Data Collector Performance Data Collector time consuming one. To Overcome By using this feature you are getting is one of the new features that’s this MS has added Performance data the data in standard format and stor- accompanied from SQL Server collector feature in SQL 2008. In a ing it in relational format, so it will be 2008. It’s very hard to get perfor- Nutshell performance data collector easy to correlate the data. Moreover mance data from necessary in- will collect performance data puts. We will get the data from (integrating all your data from your it will allow the data to be stored in Perfmon (system monitor), profil- server), upload it in centralized man- centralized server so you can query er, DMV etc and correlating this agement data warehouse (MDW) in the single server to see reports of all data is very hard, implementing relational format and finally allows your server in single location the same process or scripts you to see reports in graphical for- across your environment is also mat. 8
  • 16. October 2010 Availability This feature is available in the following editions of SQL 2008 and SQL 2008 R2  Datacentres (only for R2)  Enterprise  Standard  Web  Workgroup Data Collector Before we stepping into configuring Data collector service, we need to configure a centralized server to store these data. Let’s configure the centralized server no Connect to the server, Ex- pand Management folder and right click on “Data Collection” and click on “Configure Manage- ment Data Warehouse Configuring Centralized Server for Data Collector Initialization Process Click next on the welcome screen In this window you have the option for config- uring the centralized server. Select “ Create or upgrade a management data warehouse “ op- tion and click “next” In this window it will choose your local server as cen- In this window you will be providing necessary tralized server and you have the option to select the data- permissions to the logins to view or modify data. base. Either you can use the existing database or you can You can click on individual login and select the role create a new one. To create new database click on new for that login and click ok. It’s not mandatory to set button, a new database creation window will be popped the permissions now you can also set it later. up. 9
  • 17. October 2010 Role Name Role Description mdw_admin Has both reader and writer permissions mdw_reader Provides read access only to view reports mdw_writer Provides permission to modify and upload data to MDW At last it will show the summary descrip- Configuring Data collector in instance tion , if you find everything correct then Connect to the server, expand management folder and click on finish to configure the centralized right click on “Data Warehouse” as shown above. data warehouse server. Now it’s time to configure data collector at instance Version Details Captured level since centralized server is configured and ready to accept data. Pass the welcome screen.  Disk Usage  Query Statistics Select "Set up data collection” in this window to config- SQL Server 2008  Server Activity ure data collector. It will capture the following details into the DB  Disk Usage SQL Server 2008 R2  Query Statistics  Server Activity  Utility Information Once information is provided you will be shown with the summary details of the config- uration you have chosen. If you found it’s cor- rect just click on Finish button In this window select the centralized server and the data warehouse db. In this case it’s SAGAR- LAPTOP and Data Collection database. You can Reference find one more option here and it’s cache directo- ry, this will allow the data to be cached to the SQL SERVER 2005 students guide—NIIT folder and uploading it later. Data collector works in two modes as follows 10
  • 18. BETTER SAFE THAN SORRY (WIFI NETWORK SECURITY)! -By K.Gautam(3rd yr,CSE) So you have finally worked your way past all the Network jargons of Ip addresses, SSIDs, access points…etc. and got your Wi-Fi network up and running, now you may think you are in the clear but you are far from it unless you have set up some sort of security on your wireless network. So here is a list of a few techniques that hackers use to get into your wireless network, and how to safeguard yourself. 1. Sniffing This is the most simple of all the attacks, simply put an unsecured wireless network can be easily intercepted and the attacker can easily obtain almost all of your information. This is mainly caused by people with “This won’t happen to me” attitude. The solution: The simplest attack has the simplest solution; just make sure you secure your network with some sort of encryption and a password. 11
  • 19. 2. SPOOFING network with a stronger wireless signal and a copied SSID (Access So you’ve setup your Wi-Fi net- point name) in the same area as a work you may notice that the legitimate network. This causes computer no longer asks which unsuspecting computers to auto- network to connect to , it just matically connect to the spoofed automatically connects .This very network instead of the real one. convenient feature is the basis of the spoofing attack . Hackers often attack a wireless network by simply creating a new 3. Encryption Cracking This the most difficult attack , hackers try to crack your wireless net- Conclusion work password by a combination of different techniques ,and as en- cryption keys become more advanced, hackers also increase their skills and develop new tools for penetrating even well protected wireless net- works. There are numerous ways to crack a wireless network’s encryption, but even simplistic methods can work. The website WPA Cracker, for exam- ple, can be used to hit a network with a brute force dictionary attack that simply throws random words These are the most common methods for hacking into a at a secured wireless network to try wireless network, but there and crack it. This method can take are other methods too, a long time, and sometimes re- quires luck on the hacker’s part, but And new methods are being found everyday so it’s very it is often effective difficult to be a 100% safe. That is the bad news; the The first step in protecting yourself from this kind of attack is to use good news is that unless you WPA encryption or a combination of WPA & AES. WEP, the older en- happen to be the CEO of a cryption technology, has been completely de-constructed by hackers multi-billion dollar Company and is now considered quite easy to crack. or the Chief Minister of a state you are very unlikely to be the target of such a sophisticated The second step is to use a long and completely random password / attempt to hack into your encryption key , these are really hard to remember but are very hard system. But still it’s better to and take a long time to crack. be safe than sorry, so simple steps like using a long encryp- References : tion key can solve most secu- rity situations. Makeuseof.com Lifehacker.com Wikipedia.org engadget.com 12
  • 20. October 2010 CLOUD COMPUTING By Nitin Goswami (3rd yr., CSE) the internet. Cloud computing pro- C loud computing is a model for enabling convenient ,on demand viders delivers a common online application which are accessed by other web services. The major cloud service provider - network access to a shared pool of Microsoft, Google, sales force ,IBM resources, such as networks, storage, etc. Applications and services that can be rapidly provisioned and released with minimal management effort or service provider. Cloud computing provides a new supplement , con- sumption and delivery model for it services based on internet. The term cloud is used as a metaphor for Architecture Cloud architecture, the systems architecture of the software systems involved in the delivery of cloud computing, typically involves multiple cloud components communicating with each other over application programming interfaces, usually web services. Need for cloud computing Key features To gain a competitive business Agility improves with users' ability to rapidly and inexpensively re- edge ,small and medium scale provision technological infrastructure resources. enterprises ,which have a work force of 10 to 15 employees or Cost is claimed to be greatly reduced and capital expenditure is convert- more need to have an it infra- ed to operational expenditure. This ostensibly lowers barriers to entry, as structure that is scala- infrastructure is typically provided by a third-party and does not need to ble ,reliable and efficient as be purchased for one-time or infrequent intensive computing tasks. Pric- that of large scale enterprises. ing on a utility computing basis is fine-grained with usage-based options Smes face various issues in and fewer IT skills are required for implementation (in-house). terms of cost and knowledge for setting up such a large en- terprise network. There- Device and location independence enable users to access systems fore ,both smes and large en- using a web browser regardless of their location or what device they are terprises came up with the using (e.g., PC, mobile). As infrastructure is off-site (typically provided solution of new concept of by a third-party) and accessed via the Internet, users can connect from cloud computing.in cloud com- puting the customer need not anywhere . have to invest in the physical infrastructure instead they can consume the resources as a Multi-tenancy enables sharing of resources and costs across a large service on demand. They can pool of users thus allowing for: pay only on the usage basis.  Centralization of infrastructure in locations with lower costs (such as real estate, electricity, etc.)  Peak-load capacity increases (users need not engineer for highest possible load-levels) Utilization and efficiency improvements for systems that are often only 10–20% utilized. 13
  • 21. October 2010 Service providers Google It offers various cloud computing services that come in form of Google app, which is a saas cloud computing service. Google app provides a fully integrated applica- tion environment that enables a user to host their own web applica- tion. Google provides fol- lowing web applications like- Gmail for messaging Caption describing picture or graphic Gtalk for instant mes- saging and voice over in- ternet Google docs for docu- ment sharing Reliability is improved if multiple redundant sites are used, which makes well designed cloud computing suitable for business continuity and disaster recovery. Nonetheless, many major cloud computing ser- vices have suffered outages, and IT and business managers can at times do little when they are affected. Scalability via dynamic ("on-demand") provisioning of resources on a fine-grained, self-service basis near real-time, without users having to engineer for peak loads. Performance is monitored, and consistent and loosely coupled architectures are constructed using web services as the system interface. One of the most important new methods for overcom- ing performance bottlenecks for a large class of applications is data par- allel programming on a distributed data grid. Maintenance cloud computing applications are easier to maintain, since they don't have to be installed on each user's computer. They are easier to support and to improve since the changes reach the clients instantly. Metering cloud computing resources usage should be measurable and should be metered per client and application on daily, weekly, monthly, and annual basis. This will enable clients on choosing the vendor cloud on cost and reliability (QoS) 14
  • 22. October 2010 Microsoft complexity of security is greatly MS has developed win- Security could improve due to increased when data is distribut- dows azure platform centralization of data, increased ed over a wider area and / or (azure) which is an inter- security-focused resources, etc., number of devices. net-scale cloud services but concerns can persist about platform. Subscribing to loss of control over certain sensi- tive data, and the lack of security azure ,a user need not for stored kernels. Security is of- buy the software / ten as good as or better than un- applications for develop- der traditional systems, in part ing the customized appli- because providers are able to de- cations for its customers, vote resources to solving security thereby reduces the cost. issues that many customers can- Microsoft also offers not afford. Providers typically log cloud applications ready accesses, but accessing the audit Cloud Computing Models for use by customers logs themselves can be difficult or such as windows live, Mi- impossible. Furthermore, the crosoft dynamics, other online services. Software as Service Infrastructure as a service The iaas model enables a user to The saas model enables a user use it infrastructure such as hard- to use the software or applica- ware, storage, networking as a ser- tion as a service on demand by vice. The various service that are using the internet. provided by iaas are amazon ec2,gogrid etc. Growth of cloud computing Platform as a service The paas model enables a Thus ,cloud computing is an user to use a hosting envi- emerging technology which is ronment for their applica- increasing in present scenario tions. The various services that will enable user ,small that are provided by the scale enterprises as well as paas model are Ap- large scale enterprise to attain pExchange, Facebook, ama- a huge profit in terms of cost zon web services ,windows and infrastructure. Hats why azure platform and Google cloud computing is being app engine. called as Next generation computing Reference: Cloud computing – next generation computing environment student guide. 15
  • 23. October 2010 Wireless LAN Security By Monika(3rd yr,CSE) MAC Filtering One issue with corporate wireless networks in general, and WLANs in particular, involves the need for security. Many ear- In computer network- ing, MAC Filtering (or ly access points could not discern whether or not a particular user EUI filtering, or layer had authorization to access the network. Although this problem re- 2 address filtering) re- flects issues that have long troubled many types of wired networks (it fers to a security access control methodology has been possible in the past for individuals to plug computers into whereby the 48-bit ad- randomly available Ethernet jacks and get access to a local network), dress assigned to this did not usually pose a significant problem, since many organiza- each network card is used to determine access tions had reasonably good physical security. However, the fact that to the network. radio signals bleed outside of buildings and across property lines MAC addresses are makes physical security largely irrelevant to Piggy backers. Such cor- uniquely assigned to each card, so using MAC porate issues are covered in wireless security. filtering on a network permits and denies net- work access to specific Security Options devices through the use of blacklists and white lists. While the re- There are three principal ways to secure a wireless network. striction of network ac- cess through the use of For closed networks (like home users and organizations) lists is straightforward, the most common way is to configure access restrictions in the access an individual person is not identified by a MAC points. Those restrictions may include encryption and checks address, rather a device on MAC address. Another option is to disable ESSID broadcasting, only, so an authorized making the access point difficult for outsiders to detect. Wireless In- person will need to have trusion Prevention Systems can be used to provide wireless LAN se- a white list entry for curity in this network model. each device that he or she would use to access the network. For commercial providers, hotspots, and large organiza- While giving a wireless tions, the preferred solution is often to an open and unencrypted, but network some additional completely isolated wireless network. The users will at first have no protection, MAC Filter- access to the Internet nor to any local network resources. Commercial ing can be circumvented by scanning a valid MAC providers usually forward all web traffic to a captive portal which (via airodump-ng) and provides for payment and/or authorization. Another solution is to then changing the own require the users to connect securely to a privileged network us- MAC into a validated ing VPN. one. This can be done in the Windows Registry or by using command line Wireless networks are less secure than wired ones; in tools on a Linux plat- many offices intruders can easily visit and hook up their own com- form. puter to the wired network without problems, gaining access to the network, and it's also often possible for remote intruders to gain ac- cess to the network through backdoors like Back Orifice. One general solution may be end-to-end encryption, with independent authenti- cation on all resources that shouldn't be available to the public. Reference www.wardrive.net www.sans.org/reading_room/../wireless-lan-security-issues-solutions_1009 16
  • 24. October 2010 Google’s Web Browser By V.Vinoth, D.Ashok kumar(3rd yr,CSE) Chrome the web browser from Google is touted to be the fastest web browser . It is based on the open source Chromium project . It uses the Web kit Layout engine and the V8 JavaScript engine . The first public stable release was on 11 December 2008. Today chrome is the third most widely used web browser after Firefox. Development Chrome was assembled from 25 different code libraries from Google and third parties such as Mozilla's Netscape Portable Runtime, Network Security Services, NPAPI, as well as SQLite and a number of other open-source projects. The JavaScript virtual machine was considered a sufficiently important project to be split off. Chrome was one of the first browsers to include support for HTML 5. Features Tabs and Stability Incognito Mode: Chrome is a process based web browser, i.e. each tab open as an individual process, Chrome is one of the few brows- so if one of the tabs crash the whole widow does not crash and the other tabs can ers in which the private browsing remain working mode is totally separate from the normal mode operation. Both Security: windows can be simultaneously Chrome will show you a warning message when visiting a site that is suspected of used and they operate separately. containing malware or phishing. Incognito is the private browsing A phishing attack takes place when someone masquerades as someone else to trick mode, where all records like his- you into sharing personal or other sensitive information with them, usually through tory, downloads , etc. are not a fake website. Malware, on the other hand, is software installed on your machine saved not beyond the current often without your knowledge, and is designed to harm your computer or session. potentially steal information from your computer. Sandboxing helps prevent malware from installing itself on the computer or using what happens in one browser tab to affect what happens in another. The sandbox adds an additional layer of protection to your browser by protecting against malicious web pages that try to leave programs on your computer, monitor your web activities, or steal private information from your hard drive Automatic web page translation Starting with Google Chrome 4.1 the application added a built-in translation bar Reference : using Google Translate. Translation is currently available for 52 languages http://www.google.com/chrome . Omni bar http://chrome.blogspot.com/ http://en.wikipedia.org/wiki/ This is one of the best features if chrome , instead of having a separate box for Google_Chrome searching and for the URL , chrome combines both for usability and speed. 17
  • 25. October 2010 Computer Security By Akash Goswami(3rd yr,CSE) It is a dangerous world, even for the computers that sit in our offices. Bad things can happen. Some bad things happen because computers are pieces of machinery. Parts can break, wear out, choke on dust and dirt, or simply quit working for mysteri- ous reasons. That’s why the smart computer user frequently backs up all the critical data on the hard drives. Programs can be reinstalled, but membership lists, financial records, congregation council minutes, and other data have to be saved in several places to avoid disaster. Computers are pieces of machinery, and they will fail. Viruses Spam BX316.dll. Fatal opera- the past month and tion error.” leaves the computer and More A virus has wormed its on. Someone else way from the council sec- walks by and finds the But there are other retary’s disk to the giving records of threats to church com- church’s computer. members displayed on puters. Here’s another problem the screen. The temp- Consider this. Your scenario. This time the tation is strong to church council secretary disk inserted by the scroll through and see rushes in one hour before council secretary isn’t just whether Mrs. Hob- the monthly meeting. “I infected. But after saving son is as generous as didn’t have time to print the minutes, he decides she says she is. out the minutes,” he says, to do a little web surfing Casual use of church pulling a floppy disk out of while waiting for the computers can destroy his pocket. “And I need to printout. He checks the information, get the make one final correc- trash pickup days at the church on spammers’ tion.” He inserts the disk town’s Web site, then lists, and create pasto- into the church’s comput- follows a link about recy- ral problems. er and finishes the work cling. This leads him to a so that the council can couple of additional sites. have the corrected Then he signs off, after minutes. sending a quick e-mail to The next morning the of- a colleague at work fice secretary turns on the about tomorrow’s lunch- computer. The disk drives eon meeting. whirr and whirr, but noth- Before long, the church’s ing comes up on the e-mail inbox is crammed screen. Or she boots the with spam; strange, of- computer, calls up the fensive, and unwanted monthly income report missives from places with and the computer shuts weird names. down, displaying the One more horror story. dreaded “blue screen of The financial secretary death” with the message checks the spread sheet “unable to retrieve showing the income for 18
  • 26. October 2010 COMPUTER SECURITY How to Protect It is not hard to protect an anti-virus program server from unauthorized church computers first to make sure it is not use. from most of these infected. There is a dark side to problems. Everyone who uses computer security, for it Access to the computers church computers means that we have to must be restricted. Sec- should be instructed to think about whether retaries and others au- avoid casual Web surf- church computer users thorized to use the ing. Build a list of neces- will do unacceptable or church computers sary sites — the ELCA dangerous things. We should be required to and synod Web sites, don’t like to operate on sign on with passwords local agencies, and oth- the basis of suspicion. and instructed not to let er places useful to the But the goal of computer anyone else use their congregation’s work and security is to protect the password. known to be safe to visit. church’s equipment and “Drop-in” use by church Enforce the no-surfing data and preserve the officers or members policy. There are numer- confidentiality of neces- should be prohibited, ous stories about occa- sary records. Churches unless the church has a sions when people em- should develop a poli- separate computer for barrassed themselves, cy on who uses their that purpose, not linked their employers, and computers and for with any critical office their churches by inap- what reasons. This can machine. propriate use of the protect data from vi- Computers that are computer. ruses and other en- online should be protect- You might want to install croachments and ed with a “firewall” that a filter or program that avoid the serious prob- offers some protection monitors online usage to lems that can occur if against known viruses spot potential problems. someone uses the and “worms” that hide in Access to critical and church computer for e-mail and on internet confidential data should unauthorized purposes sites. Norton Utilities® be protected by a double and similar programs password, and all au- can keep out many vi- thorized users should be ruses; but the programs instructed on how to ac- must be purchased, in- cess the data without stalled, and maintained inadvertently leaving it to keep the list of virus open to others. infections updated. This If churches use “servers” usually requires an an- to store data and make it nual subscription. accessible from several If it is necessary to insert sites, you might need a “foreign” disk in a the advice of a computer church computer, it specialist to protect the should be scanned by Reference: http://en.wikipedia.org/wiki/Computer_security http://www.unixtools.com/security.html http://communications-solutions.com/security/computer-security-guide 19
  • 27. October 2010 VIRTUALITY By sumit banerjee (be.cse.3rd yr) The word virtual refers to not being real Application of VR it’s the presentation of reality or imagina- The range of possible VR tion. Previously it was only the part of peo- application is vast and var- ple’s thinking but as the development of ied. Here are just a few the technology virtuality took the wide example of projects carried part in creation & development of what out recently in development at the CRVM that really exist in world or only in imagi- nation. Industrial application -Design studies VIRTUAL REALITY -computer Aided design -Ergonomic validation Virtual reality (VR) it’s a term or technology that basically defined as computerized Research application simulated environment that can simulate places in the real as well as imaginary -Behavioral sciences: mod- worlds. Two major aspects of VR are: eling human behavior by manipulating sensory infor- 1) Visualization is immersive, since the goal is to give the User the sensation mation. of being really in virtual world. -psycho-pharmacological 2) The user is able to interact in “real-time” with this environment. research User can interact with a virtual environment either through the use of standard in- Teaching Applications put devices such as a keyboard and mouse or through multimodal devices such as -Teaching and learning aids: visualization and vir- tual explo- Terms supporting virtual reality ration of our solar system, virtual reconstruction and There are many devices that are use for virtual sensation like 3D visualization, visits of ancient architec- holography, virtual caves, etc. tural sites. -scientific visualization 3D visualization Therapeutic application -Cyber-therapy: treatment The 3D visualization can be more easily understand by taking 3D films in ac- of phobias, depression, count. anxiety where patient are kept in virtual environ- A 3D film or S3D (stereoscopic 3D) film is a motion picture that enhances the illu- ment to relax there brain. sion of depth perception. Derived from stereoscopic photography, a special mo- -Motor-therapy through tion picture camera system is used to record the images as seen from two per- sport: Virtual squash where spectives and special projection hardware and/or eyewear are use to provide the the ball speed is matched to illusion of depth when viewing. the patient’s disability. 20
  • 28. October 2010 Virtuality Technique used in 3D view New system without glasses There is increasing Anaglyph images were ing filters oriented differ- emergence of new 3D the earliest method of ently. As each filter pass- viewing systems which presenting theatrical 3D. es only that light which is do not require the use of similarly polarized and Now polarization system special viewing glasses. blocks the light polarized is used to present a stere- They are referred to differently each eye sees oscopic motion picture, a different image. Since As Auto stereoscopic here two images are pro- no head tracking is in- LCD displays. jected superimposed onto volved, the entire audi- the same screen through different polarizing fil- ence can view the stereo- Technology scopic images at the same ters. The viewer wears time eyeglasses which also A lifelike visual display is contain a pair of polariz- created by projectors VR caves positioned outside the Holography It is an immersive vir- cave and controlled by physical movements tual reality environ- It is a technique that from a seer inside the ment where the projec- allows the light scat- cave. Stereoscopic LCD tors are directed to tered from an object to shutter glasses convey a three, four, five or six be recorded and later 3D image. The comput- of the walls of a room- reconstructed so that it ers rapidly generate a sized cube where a appears as if the object pair of images, one for viewer contemplates is in the same position each of the user’s eye. relative to recording perception, reality and The glasses are synchro- illusion. medium as it was when nized with the projectors recorded. The image so that each eye only sees changes as the position Application the correct image. and orientation of the viewing system chang- The caves are currently being used in a es in exactly the same variety of fields. way as if the object were still present, thus -many engineering companies use CAVEs Visual effect making the recorded to enhance product development. image appears three Visual effects (commonly shortened to -prototype of parts can be created and dimensional. Visual F/X or VFX) are the various tested processes by which imagery is created It has a wide range of and/or manipulated outside the context -Factory layout can be simulated application. of a live action shoot. Visual effects often -In gaming involve the integration of live-action foot- age and computer generated imagery (CGI) in order to create environments which look realistic, but would be dan- gerous, costly, or simply impossible to capture on film. They have become in- creasingly common in big-budget films, and have also recently become accessible to the amateur filmmaker with the intro- duction of affordable animation and compositing software. 21
  • 29. October 2010 Virtuality Chroma key compositing Chroma key compositing (or weather forecast broadcasts, video. This also works for green Chroma keying) is a technique wherein the presenter appears to screens, since blue and green are for compositing two images or be standing in front of a large considered the colors least like skin frames together in which a color map, but in the studio it is actu- tone. This technique is also used in (or a small color range) from one ally a large blue or green back- the entertainment industry, the image is removed (or made ground. The meteorologist stands iconic theatre shots in Mystery Sci- transparent), revealing another in front of a blue screen, and ence Theater 3000, for example image behind it. This technique then different weather maps are is also referred to as color key- added on those parts in the im- ing, color-separation over- age where the color is blue. If the lay (CSO; primarily by the meteorologist himself wears blue BBC), green screen, and blue clothes, his clothes will become screen. It is commonly used for replaced with the background Virtual world manipulate elements of sure activities. Commu- A virtual world is a nication is usually textu- genre of online commu- the modeled world and thus experien ces al, with real-time voice nity that often takes the communication using form of a computer- telepresence to a cer- tain degree. Such mod- VOIP also possible. based simulated envi- Virtual worlds are not ro nment , t h ro u gh eled worlds may appear similar to the real world limited to games but, which users can inter- act with one another or instead depict fanta- depending on the degree and use and create ob- sy worlds. The model of immediacy presented, jects .Virtual worlds are world may simulate can encompass computer intended for its users to rules based on the real conferencing and text inhabit and interact, world or some hybrid fantasy world. Example based chat rooms. Some- and the term today has become largely synony- rules are gravity, topog- times, emoticons or mous with interactive raphy, locomotion, real 'smiles' are available, to 3D virtual environ- -time actions, and com- show feeling or facial ex- ments, where the users munication. Communi- pression. Emoticons of- take the form of avatars cation between users has ranged from text, ten have a keyboard visible to others graph- graphical icons, visual shortcut. Edward Castro cave. Stereoscopic LCD ically. These avatars are usually depicted as tex- gesture, sound, and nova is an economist who shutter glasses convey a tual, two-dimensional, rarely, forms using has argued that 3D image. The comput- or three-dimensional touch, voice command, ers rapidly generate a "synthetic worlds" is a graphical representa- and balance senses. better term for these cy- pair of images, one for tions, although other Massively multiplayer online games common- berspaces, but this term each of the user’s eye. forms are possible (auditory and touch ly depict a world very has not been widely The glasses are synchro- sensations for exam- similar to the real adopted. nized with the projectors ple). Some, but not all, world, with real world so that each eye only sees virtual worlds allow for rules and real-time ac- A lifelike visual display is the correct image. multiple users. tions, and communica- created by projectors The computer accesses tion. Players create a positioned outside the a computer-simulated character to travel be- cave and controlled by world and presents per- tween buildings, towns, and even worlds to car- physical movements ceptual stimuli to the user, who in turn can ry out business or lei- from a seer inside the 22
  • 30. October 2010 Virtuality Virtual world concepts One perception of virtual As virtual world is a fairly example). worlds requires an online persis- vague and inclusive term, the tent world, active and available Massively multiplayer online 24 hours a day and seven days a real-life games or MMORLGs, week, to qualify as a true virtual the user can edit and alter their world. Although this is possible avatar at will, allowing them to with smaller virtual worlds, es- play a more dynamic role, or pecially those that are not actu- multiple roles. ally online, no massively multi- player game runs all day, every day. All the online games listed Virtual worlds are well-known above include downtime for as being fantasy spaces sealed maintenance that is not included as time passing in the virtual off from the real world, but world. While the interaction more careful analysis reveals with other participants is done that the boundaries between the in real-time, time consistency is above can generally be divided real and virtual worlds are quite not always maintained in online along a spectrum ranging from: porous. virtual worlds. For example, Ev- Massively multiplayer online role -playing games or MMORPGs Reference : er Quest time passes faster than real-time despite using the same where the user playing a specific http://virtualityconference.it/ calendar and time units to pre- character is a main feature of the game (World Of War craft for http://en.wikipedia.org/wiki/Virtual_reality sent game time. Do You Know? 1. The human heart creates enough pressure while 15. The ant can lift 50 times its own weight, can pull pumping to squirt blood 30 feet. 30 times its own weight and always falls over on its 2. On average people fear spiders more than they do right side when intoxicated. death. 16. Polar bears are left handed. 3. The strongest muscle in the body is the TONGUE. 17. The catfish has over 27,000 taste buds, that 4. it’s impossible to sneeze with your eyes open. makes the catfish rank #1 for animal having the most taste buds. 5. Americans on the average eat 18 acres of pizza every day. 18. The flea can jump 350 times its body length, that is like a human jumping the length of a football 6. Did you know that you are more likely to be killed field. by a champagne cork than by a poisonous spider? 19. Butterflies taste with their feet. 7. Right-handed people live, on average, nine years longer than left-handed people do. 20. It is impossible to sneeze and keep ones eye's open at the same time. 8. In ancient Egypt, Priests plucked EVERY hair from their bodies, including their eyebrows and eyelashes. 21. Elephants are the only animals that can't jump. 9. The dot on top of the letter 'i' is called a tittle. 22. A cat's urine glows under a black light. 10. A "hairbreadth away" is 1/48 of an inch. 23. An ostrich's eye is bigger than it's brain. 11. The word four has four letters. In the English lan- 24. Cockroaches can change course as many as 25 guage there is no other number whose number of let- times in one second, making them the most nimble ters is equal to its value. animals known. 12. The king of hearts is the only king without a mous- 25. Mosquitoes do not bite. They stab. A mosquito tache. has no jaws, hence when attacking a victim; it pierc- es it with its long proboscis and sucks the blood up 13. No piece of square dry paper can be folded more through its nasal tube. than 7 times in half. 26. Starfishes haven't got brains. 14. A crocodile cannot stick its tongue out. By Monika (1st yr,CSE) 23
  • 31. October 2010 PUZZLES -by Mallica(3rd yr,CSE) 1. Can you find four numbers such that the sum of every two and sum of all four may be perfect squares? 2. A cubic object 3"*3"*3" is painted blue on all the outside cubic surfaces ,including the top and bottom .if the cube is cut into 27 cubes of 1"*1"*1".how many 1" cubes do have any painted surfaces? 3. How can you make a total of 1,000 by using sixteen 4's? 4. The shape shown in sketch below is a square attached to half of another similar square ,divided diagonally: 5. How will you write 31 using only digit 3 five times? 6. A man decided to drive through the city and on the first day he did only 7 miles. On the last day he did 51 miles ,increasing his journey 4 miles each day. How many days did he travel and how far? 7. Which would you say is heavier, a pound of cotton or a pound of gold? 8. There is a number which is very peculiar, this number is three times the sum of its digits .Can you find the number? 9. There is a number ,the second digit of which is smaller than its first digit by 4,and if the number was divided by the digit's sum ,the quotient would be 7. What will be the number? 10. There is a number which is greater than the aggregate of its third, tenth and twelth parts by 58.Find the number? MICROSOFT The Simplifier Chorus:- Nine-tenths of a gig, Am happy that you came into my life, Biggest ever seen, You made my world very bright; God, this program is big-- I don’t think I can ever live with out you, MS Word 15! Because you’re the backbone of my life; Comes on ten CDs, Stanza 1:- And requires--damn! You may not be the greatest by looks, Word is fine, but jeez-- But you are the most stunning creation; 60 megs of RAM?! You may not be as strong as the Hercules, Oh! Microsoft, Microsoft, But you can solve the Herculean problems; Bloat ware all the way! Stanza 2:- I'm installing Word You are the Centre point of my work; Since breakfast yesterday! You are a citizen of the world; Oh! Microsoft, Microsoft, Every one loves you very much, Moderation, please. As you simplify the problems of their world; Guess you hadn't noticed: Stanza 3:- Four-gig drives don't grow on trees! These days you’ve even started to think by yourself, -by NitinGoswami(3rd yr, CSE) Scaling new heights every now and then; I know it’s not hard to compete with you, But now I am in love with you; - Venkateshwar.R (3rd yr, CSE) 24