ARTICLE PART 1



VIRUS JOKES


Adam and Eve Virus
Takes a couple of bytes out of your Apple computer.

Airline Virus
You're in Dallas, but your luggage is in Singapore.

Disney Virus
Everything in your computer goes Goofy.

Oprah Winfrey virus
Your 200MB hard drive suddenly shrinks to 80MB, and then slowly expands to 300MB.

Star Trek Virus
Invades your system in places where no virus has gone before.

Titanic Virus
Your whole computer goes down.

Alzheimer Virus
It makes your computer forget where it put your files.

Child Virus
It constantly does annoying things, but is too cute to get rid of.

Diet Virus
Allows your hard drive to lose weight by eliminating the FAT table.

-M.AJITHA PURNIMA M.Sc., M.Phil. PGDCA,

Lecturer, Department of Computer Science




COMPUTER FUN


What If People Bought Cars Like They Buy Computers?

General Motors doesn't have a "help line" for people who don't know how to drive, because people don't buy cars like they buy computers -- but imagine if they did . . .

HELPLINE: "General Motors HelpLine, how can I help you?"

CUSTOMER: "I got in my car and closed the door, and nothing happened!"

HELPLINE: "Did you put the key in the ignition slot and turn it?"
CUSTOMER: "What's an ignition?"

HELPLINE: "It's a starter motor that draws current from your battery and turns over the engine."
CUSTOMER: "Ignition? Motor? Battery? Engine? How come I have to know all of these technical terms just to use my car?"

HELPLINE: "General Motors HelpLine, how can I help you?"
CUSTOMER: "My car ran fine for a week, and now it won't go anywhere!"

HELPLINE: "Is the gas tank empty?"
CUSTOMER: "Huh? How do I know!?"

HELPLINE: "There's a little gauge on the front panel, with a needle, and markings from 'E' to 'F.' where is the needle pointing?"
CUSTOMER: "It's pointing to 'E.' what does that mean?"

HELPLINE: "It means that you have to visit a gasoline vendor, and purchase some more gasoline. You can install it yourself, or pay the vendor to install it for you."
CUSTOMER: "What!?" I paid $12,000. for this car! Now you tell me that I have to keep buying more components? I want a car that comes with everything built in!"

HELPLINE: "General Motors HelpLine, how can I help you?"
CUSTOMER: "Your cars suck!"

HELPLINE: "What's wrong?"
CUSTOMER: "It crashed, that's what went wrong!"

HELPLINE: "What were you doing?"
CUSTOMER: "I wanted to run faster, so I pushed the accelerator pedal all the way to the floor. It worked for a while, and then it crashed -- and now it won't start!"

HELPLINE: "It's your responsibility if you misuse the product. What do you expect us to do about it?"
CUSTOMER: "I want you to send me one of the latest version that doesn't crash anymore!"
HELPLINE: "General Motors HelpLine, how can I help you?"
CUSTOMER: "Hi! I just bought my first car, and I chose your car because it has automatic transmission, cruise control, power steering, power brakes, and power door locks."

HELPLINE: "Thanks for buying our car. How can I help you?"
CUSTOMER: "How do I work it?"

HELPLINE: "Do you know how to drive?"
CUSTOMER: "Do I know how to what?"

HELPLINE: "Do you know how to drive?"
CUSTOMER: "I'm not a technical person! I just want to go places in my car!"

- M.Kiruthika B.E

Lecturer, Dept of Computer Science


COMPUTER VIRUS


One might think of a computer virus as a tiny computer program designed to perform mischief. Most computer users have heard about computer viruses. A computer virus is the result of a destructive program that someone has written and placed inside a computer program, which unsuspecting people then place in their computer system.

Some viruses can erase all the information from the place where it's stored on the computer's hard disk. But each virus is different. Some display strange messages on your computer screen; others make small changes in your computer programs. Where do these viruses come from? They certainly don't float around in the air like some human viruses. Instead, like any other computer program, a human must create them.

Why do people create them? It's hard to say. Some people create these programs out of meanness to get even. While others create them just as a challenge. Why do you thing people create these very destructive programs? How does your computer get a virus? Almost exactly the way humans do. The computer gets exposed to one. Well, its not quiet that easy.

Many people get contaminated computer programs by trading programs with other people. Others get contaminated computer programs through the use of modems, which allow computers to communicate over telephone lines (i.e. The Internet)

Most of the time, programs that arrive by modem or a trade are perfectly safe to use. However, you do stand a chance of getting a program that has been tampered with. Here a computer program virus is hiding inside the normal program. Many computer programs that are traded were copied illegally.

When this program enters your computer through your input device, it hides in your computer's memory and starts to duplicate itself like a disease. When you save your data, you also save the virus. Slowly but surely, the virus crowds out your data and causes major system problems.

If the virus is on your disk or hard drive, it will return to the computer when you use the program again. If you switch from one program to another without shutting down the machine, the virus will attach itself to the new program. In this way, it can slowly infect all your programs before you know that it exists. Today millions of dollars are being spent to rid and protect computer systems from these virus programs.

Commercial and shareware programs have been created with the sole purpose of detecting and fixing suspect programs that might be viruses infected. These detection programs should be ran when any disk is put into your disk drive or every time your computer is first started up each day to scan the computer's hard drive.

- M.AJITHA PURNIMA M.Sc., M.Phil, PGDCA.

Lecturer, Department of Computer Science



DIFFERENT TYPES OF COMPUTERS TO CHOOSE FROM


Almost everyone in America has a computer in their home. In fact the World, not everyone will have one, but I bet you there are well over 10 billion people who do have a computer. When you're looking for a computer you have a few choices that you can buy. Plus we're going to go over a few choices that we may not have as consumers yet, but they are really neat.

First off the most popular choice is most likely the desktop computer. This is an independent personal computer or PC. Prior to the spread of PCs computers that would fit a desk would actually considered small. Desktops are smaller versions of computers

from days past. You can get a tower in different styles and shapes. Sometimes you can even get specific colors now. Desktop computers specifically apply to a horizontally cased tower. Normally the display screen will be placed on top of the tower to save space.

Another choice that you have is a laptop computer or better known as a laptop, or notebook computer at times. This is a smaller personal computer which is designed for the person who needs mobility. All the hardware needed to operate a laptop is in a smaller space. Laptops do have batteries though; you need to remember to charge them or your going to lose power. In order to save power, weight and even space, most laptops share there RAM with the video channel, it makes there performance a bit slower than a desktop.

Next is one of those cool things it's called a tablet PC, it's a notebook, or perhaps better put a slate-shaped mobile computer. It was first introduced in the 90's, but really I don't think I've ever seen one. Its touch screen technology allows the user to touch the screen for their choices with either there finger or a digital pen, or stylus even. Very neat, it's used where notebooks are normally unable to be used.

Ever hear of the ultra-mobile PC, it's a specification that is used to describe a small form factor tablet PC. First developed jointly by Microsoft, Intel and Samsung. These currently use Windows XP, a special addition for Tablet PCs, Vista, or Linux. They have a very small voltage processor around 1 GHz

How about a home theater PC or HTPC, this is a device convergence of the personal computer and a digital video recorder. You connect it to your TV or a television sized computer display. Normally this is used for digital photos, music, video player, or even a TV receiver. They are referred to as media centers; the goal of an HTPC is to combine many items into one box, thus cutting out clutter. They can be pre-configured upon purchase to match your needs.

Finally we have the pocket PC; it's small, and easily used, running on a Microsoft Windows Mobile operating system. It may have the ability to use alternative systems like Linux. Also it is able to do many things that your normal desktop can. Right now there are thousands of applications that can be added to your pocket pc. Some pocket pc are now combing with mobile phones, giving you a greater usage capability. Most pocket pc's can also have GPS added to it; many probably already have cameras and possibly video cameras.

As you can see when going to purchase a computer you have as when buying registry cleaner several choices available to you. Keep in mind what you'll be using it for and if you need the mobility also. Good luck.

There are a lot of people who don't agree when the first computer was built; in fact many say that the first actual conception of the idea of a computer was by J. H. Smith in 1782. He however never built the computer. His concept was called a difference engine.

Difference engines were put on the backburner until 1822, when Charles Babbage picked up the concept. He created a machine that used a decimal number system, and was powered by the cranking of a handle. Babbage was financed in his research by the British government, but they later would cut that support off. This did not stop Babbage though, he went on to design a more analytical machine, but later on he made it more improved and put out a difference engine #2, all this happened between 1834 and 1869. Babbage made leaps and bounds in his designs.

Still other people will argue that Babbage's machine was the first electronic computer. While an earlier concept was made called the Antikythera machine, which was a mechanic device that was used to calculate the position of astrological signs. This "earliest computer" was discovered on a shipwreck in the Mediterranean Sea, and it dates back to 250 BC. It's not known who designed this early device but it has been guessed to be designed by Archimedes, because it is similar to some of his other mechanical devices.

However, there are still other people who will argue that the abacus was truly the first computer. These were invented in China somewhere between 2600 BC and 300 BC. These abacus were used by clerks and merchants in China, they are felt to be the first computer by many people.

Alan Turing who was from Cambridge UK, he was drafted to the Bletchley park secret base where the work was being done on the WW3 enigma codes that the Germans were using. It was kept top secret until recently the name of this computer was Colossus; it was smashed into pieces at the end of the war.

The first known "modern computer" was invented during WWII, done by a German engineer named Konrad Zuse in 1941. This computer was named the Z3. It was an analog computer that was designed to stimulate the guidance system for rockets.

With some research it was found that Babbage did not build a complete machine. Thus it would be Zuse who invented the first electronic computer.

Thus to truly answer who invented the computer it’s not really simple. Really you have to say who all contributed to the make up of the computer. So many different people in history helped with these inventions, by their failures and successes.

So over all the first electronic computer was invented by John Vincent Ansoff. It was named the ABC, which stood for Anatasoff Berry Computer.

A lot of people would feel that IBM was the first in designing the PC, but really prior to them was the MITS Altair 8800, Apple II, TRS80, the Atari 800, and of course the

Commodore 64. Still others say Altair was not first, but instead it was the Simon by Berkley Enterprises.

So as you can see who invented the first computer is like who did invent the registry cleaner, really up for grabs, and will be forever. But let's thank all these people who came up with an incredible machine that is hard to live our lives without.

- MUTHUSUBRAMANIYAN I MSC IT



LAPTOP OR DESKTOP IS THE QUESTION


Deciding to buy a computer, and not sure what you want? Do you like the ability to take your computer with you? Or are you more apt to purchase a desktop? Really with the technological advancements over the years, this is a question more people are faced with than before. Laptops used to have worse graphics and not near the storage of a desktop. Processors speeds also did not match up in a comparison of laptops to desktops.

Now you can get a laptop that offers you 160 GB of storage or more, an Intel processor and a great LCD screen with crisp colors that look nice.

Of course you can get the same thing in desktops. And for both you of course do have several brand choices. It seems like some brands are coming out with great options to the higher priced brands that have been in business longer. Some notable newer names are E-machines and Acer. These companies are not as well known as Compaq, Sony or Toshiba, but these choices are just as good and offer you cheaper alternatives to other companies and they have both laptops and desktops.

In the long run you need to decide what you want: the mobility or the stay-at-home computer. Everyone likes one another more than the other one. But desktop or laptop you can find good deals.

You also have several choices of stores that you can look at when looking for a computer. Best Buy, Circuit City, and Wal-Mart are great places to shop. This will give you a way to compare not only a laptop to a desktop, but also the different prices and brands available.

When getting something as expensive as a computer, you really need to compare and do research at different stores. Don't ever walk in and buy the first computer that you see. You will most likely question that purchase at a later time and wish you had waited.

Also if you are purchasing a computer, you should really consider getting at least the one year extended warranty, if not two years. One problem with your computer and you will most likely have paid for that extra coverage. Don't think this is a bad idea, because in the long run this coverage does pay for itself.

So remember to compare prices and styles, and then decide like you do when buying a registry cleaner software and anything else. And by all means, get the extended warranty.

Desktop or Laptop Computer - Which One Should You Get?

You're in the market for a computer, but you just aren't sure which type you want to get. Maybe you're replacing an old desktop that is now a dinosaur and is way too slow to do much of anything online. Do you want another desktop? Or are you maybe looking for the mobility and freedom you will receive from owning a laptop?

Which is best? It's not as easy as it use to be to choose between the two. In days of past laptops use to be much slower than their desktop brothers. But now you can get laptops that are quick and at times perhaps faster than a desktop. Another problem use to be the amount of hard disk space that was available. In desktops you never really had to worry. The amount you got for storage was pretty much equivalent to the amount of money you wanted to spend on the desktop. Laptops although in the past were limited to a smaller amount of storage space no matter how much you spent on one.

Another problem was the picture of a desktop monitor was very good, not always sharp, but much nicer than what you would receive on an older laptop computer. Plus back a few years’ laptops weighed more than they do now. Making them easier to carry about, but still cumbersome none the less.

Like antivirus and registry cleaner, now you have so many different choices in desktops and laptops it's at times really a hard decision. Laptop prices have come down also in the last few years compared to what they use to be. Now you can actually buy a laptop for cheaper than some desktop computer models. The storage space on the hard drive is higher than and in fact as high as desktops are now. The picture rivals those monitors you can purchase with a desktop. Also the weight is much less sometimes weighing in as little as three pounds. So really the past reasons for not getting a laptop are not around any longer.

Desktops have also made great strides over the years, you have a choice of monitors between the CRT and LCD, and one gives you a better picture that is sharp, which the other gives you more colors. The hard drive storage is at times tremendous, depending again on how much you want to spend. They now have CD burring drives in every computer that is sold, and some have DVD burning drives too. You can get a very decent computer for around $400 to $500 now and have a fast machine with good storage capability.

Of course you also have flash drives and external hard drives that you can store your information on, and a lot of these are not very expensive. So storage isn't as big of a deal as it uses to be.

Really though the biggest decision is do you want to have a computer that you can take along with you? Or do you not need that mobility available? Which ever way you choose to go, make sure to research your options and get the one that offers you the most for the amount of money that you spend.

- C.JEEVA I M.SC. IT



ROBOTICS SENSOR NETWORK

Defining Robotics:

Robotics can be described as the current pinnacle of technical development. Robotics is a confluence science using the continuing advancements of mechanical engineering, material science, sensor fabrication, manufacturing techniques, and advanced algorithms. The study and practice of robotics will expose a dabbler or professional to hundreds of different avenues of study. For some, the romanticism of robotics brings forth an almost magical curiosity of the world leading to creation of amazing machines. A journey of a lifetime awaits in robotics.

Robotics can be defined as the science or study of the technology primarily associated with the design, fabrication, theory, and application of robots. While other fields contribute the mathematics, the techniques, and the components, robotics creates the magical end product. The practical applications of robots drive development of robotics and drive advancements in other sciences in turn. Crafters and researchers in robotics study more than just robotics.

The promise of robotics is easy to describe but hard for the mind to grasp. Robots hold the promise of moving and transforming materials with the same ease as a computer program transforms data. Today, robots mine minerals, assemble semi-processed materials into automobile components, and assemble those components into automobiles. On the immediate horizon are self-driving cars, robotics to handle household chores, and assemble specialized machines on demand. It is not unreasonable to imagine robots that are given some task, such as reclaim desert into photovoltaic cells and arable land, and left to make their own way. Then the promise of robotics exceeds the minds grasp. In summary, robotics is the field related to science and technology primarily related to robotics. It stands tall by standing the accomplishments of many other fields of study. PCs have the benefit of abundance of memory, program space and processing power. Additionally they provide the best debug I/O (screen, keyboard and mouse) you could wish for. But they do have a few flaws that limit their usefulness in a mobile robot. First of all their size. Even the smallest PC, a laptop, is quite bulky and forces you to use a rather large frame.

Secondly, except for a laptop, power consumption is large and provide AC-power on a mobile unit is bulky as you need heavy batteries and an inverter.

Lastly Pc’s are lousy when it comes to getting a reliable accurate timing from the outside world.

Using A PC or Laptop in a Robot

The first two points basically shape most of your robot's frame and other than using a different controller not much you can do about it. Picking the best hardware you can find is pretty much all that can make these points a little less troublesome.

The last point is quite easy to get around. Most PCs have a serial port. Most microcontrollers have a serial port as well. Use a level converter to connect the TTL level serial port of the microcontroller with the RS232 level computer serial port and use a little program that handles the accurate timing in the microcontroller and transfers this information to the computer through the serial connection. This is a very powerful setup that combines the strengths of both the PC and the microcontroller.

- SANDEEP II B.SC. (C.S SEC -1)



DATA TRANSFER AND MANAGEMENT IN WIRELESS SENSOR NETWORK


A wireless sensor network (WSN) is a wireless network consisting of spatially distributed autonomous devices using sensors to cooperatively monitor physical or environmental conditions, such as temperature, sound, vibration, pressure, motion or pollutants, at different locations. The development of wireless sensor networks was originally motivated by a wireless sensor network (WSN) is a wireless network consisting of spatially distributed autonomous devices using sensors to cooperatively monitor physical or environmental conditions, such as temperature, sound, vibration, pressure, motion or pollutants, at different locations. The development of wireless sensor networks was originally motivated by military applications such as battlefield surveillance military applications such as battlefield surveillance

A sensor network normally constitutes a wireless ad-hoc network, meaning that each sensor supports a multi-hop routing algorithm (several nodes may forward data packets to the base station).

In computer science and telecommunications, wireless sensor networks are an active research area with numerous workshops and conferences arranged each year.

Data visualization

The data gathered from wireless sensor networks is usually saved in the form of numerical data in a central base station. Additionally, the Open Geospatial Consortium (OGC) is specifying standards for interoperability interfaces and metadata encodings that enable real time integration of heterogeneous sensor webs into the Internet, allowing any individual to monitor or control Wireless Sensor Networks through a Web Browser.

Unique characteristics of a WSN include:

Limited power they can harvest or store

Ability to withstand harsh environmental conditions

Ability to cope with node failures

Mobility of nodes

Dynamic network topology

Communication failures

Heterogeneity of nodes

Large scale of deployment

Unattended operation

Applications

The applications for WSNs are many and varied, but typically involve some kind of monitoring, tracking, and controlling. Specific applications for WSNs include habitat monitoring, object tracking, nuclear reactor control, fire detection, and traffic monitoring. In a typical application, a WSN is scattered in a region where it is meant to collect data through its sensor nodes.

Area monitoring is a common application of WSNs. In area monitoring, the WSN is deployed over a region where some phenomenon is to be monitored. As an example, a large quantity of sensor nodes could be deployed over a battlefield to detect enemy intrusion instead of using landmines.. When the sensors detect the event being monitored (heat, pressure, sound, light, electro-magnetic field, vibration, etc), the event needs to be reported to one of the base stations, which can take appropriate action (e.g., send a message on the internet or to a satellite). Depending on the exact application, different objective functions will require different data-propagation strategies, depending on things such as need for real-time response, redundancy of the data (which can be tackled via data aggregation techniques), need for security, etc.

Sensor nodes can be imagined as small computers, extremely basic in terms of their interfaces and their components. They usually consist of a processing unit with limited computational power and limited memory, sensors (including specific conditioning circuitry), a communication device (usually radio transceivers or alternatively optical), and a power source usually in the form of a battery. Other possible inclusions are energy harvesting modules, secondary ASICs, and possibly secondary communication devices (e.g. RS-232 or USB).

The base stations are one or more distinguished components of the WSN with much more computational, energy and communication resources. They act as a gateway between sensor nodes and the end user.

- SINDHANA II-BSC.COMPUTER SCIENCE



THE IMPORTANCE OF INTERNET SECURITY


Internet Security:

In the computer industry, Internet security refers to techniques for ensuring that data stored in a computer cannot be read or compromised by any individuals without authorization. Most security measures involve data encryption and passwords. Data encryption is the translation of data form that is unintelligible without a deciphering mechanism. Password is a secret word or phrase that gives a user access to a particular program or system.

Internet security can be achieved through following steps.

ISP:

Your internet service provider (ISP) should be your first line of defence.If you have a choice, chosen an ISP that offers online virus, spam and content filters. This will reduce, but not eliminate, the amount of spam and the number of infected emails that you receive. The content filter is to protect your kids. If you do not have a choice or want to keep your current ISP, consider using an online email service that offers virus and spam filters. For more information, see our Broadband page.

Routers:

Routers provide the security from internet using Network using Network Address Translation technique. Network Address Translation (NAT) typically has the effect of preventing connections from being established impound into a computer, whilst permitting connections out. For a small home network, software NAT can be used on the computer with the Internet connection, providing similar levels of security, but for a lower cost and lower complexity.

Firewalls:

A firewall blocks all “roads and cars” through authorized ports on your computer, thus restricting unfettered access. A stateful firewall is a more secure form of firewall, and system administrators often combine a proxy firewall with a packet-filtering firewall to create a highly secure system. Most home users use a software firewall. These types of firewalls can create a log file where it records all the connection details (including connection attempts) with the PC.

Anti-Virus:

Some people or companies with malicious intentions write programs like computer viruses, worms, Trojan horses and Spyware. These programs are all characterized as being unwanted software that installs automatically on your computer through deception. Viruses also down system performance and cause strange system behavior and in many cases do serious harm to computers, either as deliberate, malicious damage or as unintentional side effects.

In order to prevent to prevent damage by viruses and worms, users typically install antivirus software, which runs in the background on the computer, deleting any suspicious software and preventing it from running.

Anti-Spyware:

Spyware is software that runs on a computer without the explicit permission of its user. It often gathers private information from a user’s computer and sends this data over the Internet back to the software manufacturer. However, instead of taking information; it’s typically runs in the background and displays random or targeted pop-up advertisements. In many cases, the computer down and many also cause software conflicts.



BIO-DATA


1. Name : Hindustan College of Arts and Science

2. Motto : To "Think High"

3. Birth : 1990’s

4. Retirement : When the sun rises in the west.

5. Health : Nearly young and energetic

6. Wealth : Students and Teachers.

7. Know for : Discipline, Character, Excellence-in

academics and Extra Curricular

8. Promotes : Love, Kindness and Team Work

9. Aim : To prepare pupils for their future life

10. Achievements : Innumerable

11. Nick Name : "Temple of Knowledge"

12. Name of its Head : our Founder, Dr. K.C.G VERGHESE

13. Back Bone : Teachers

14. Doest not believe in: Failure

15. Trust in : Teachers and Students

16. Concern for : Weak Students

17. Earns : Name and Fame



MATHS MAGIC


The number multiplied with 12345679

12345679 * 9 = 111111111

12345679 * 18 = 222222222

12345679 * 27 = 333333333

12345679 * 36 = 444444444

12345679 * 45 = 555555555

12345679 * 54 = 666666666

12345679 * 63 = 777777777

12345679 * 72 = 888888888

12345679 * 81 = 999999999

The numbers multiplied with 12345679

123456789 * 8 = 98765432

MY DISCIPLINE FORMULA

D - Determination => 04th letter - 04

I - Intelligence => 09th letter - 09

S - Service => 19th letter - 19

C - Captaincy => 03rd letter - 03

I - Imagination => 09th letter - 09

P - Planning => 16th letter - 16

l - Leadership => 12th letter - 12

L - Loyal => 09th letter - 09

N - Nobility => 14th letter - 14

E - Esteem => 05th letter - 05

-------

100

-------



QUALITIES OF TEACHER


T - Talented

E - Efficient

A - Active

C - Cheerful

H - Helpful

E - Energetic

R - Resourceful

- J.VEDACHALAM-I M.SC. (IT)



HISTORY OF COMPUTERS

(click on image for better quality)
























-DIVYAMANOGARAN I B.SC CS



A SOFTWARE PROFESSIONAL'S LOVE LETTER


Dear Ms.Baby,

I saw you yesterday while surfing on the local train platform and realized that you are the only site I was browsing. For a long time, I've bee lonely, trying to find a bug in my life and you can be a real debugger for me now. My life is just an uncompiled program

without you that never produces an executable code and hence is useless.

You not only have a beautiful face, but all your active controls are attractive as well. Your smile is so delightful that it encourages me and gives me power equal to thousand of mainframes processing power.

When you looked at me last evening, I felt all my program modules running smoothly and giving expected result, which l have never experienced before.

With this letter, I just want to convey that, if we are linked together, I’ll provide you with all the objects and libraries necessary for a human being to live an error free life, also don't bother about the firewall, Which may be created by our parents as live strong hacking capabilities by which I'll ultimately break their security passwords and make them accept our marriage.

I anticipate that nobody has already logged into your database so that my connect script would fail and it's all certain that if this happened to me, I will crash my system beyond recovery. Kindly interpret this letter properly and grant me the privilege to access your inbox.

Only yours,

Software professional.

J.VEDACHALAM- I.MS.C(IT)



WINDOWS VISTA


Several companies have raised concerns about Microsoft's upcoming Windows Vista operating system with federal and state prosecutors responsible for overseeing the 2002 antitrust settlement with the Redmond, Wash-based developer, the government said Wednesday.

In papers filed with U.S. District judge Colleen Kollar-Kotelly, federal and state officials said that they received one complaint--the source was unnamed--about Vista's "Welcome Center”, a new interface that appears when users start the PC for the first time. The Welcome Center not only presents setup options, but also commercial offers from partners and/of the hardware maker.

Government lawyers, said the report, haven't decided whether to demand changes to the Welcome Center--a step that might toss the OS's tight schedule into disarray--but” continue to gather information and monitor situation. Several other companies said the report, have made additional complaints about various unspecified aspects of Windows Vista and/or Internet Explorer 7.

"Plaintiffs will report to Microsoft and the Court if they determine that these issues raise concerns under the Final Judgments”, the report said.

Windows Vista is the first operating system that Microsoft has developed under the protocols of the antitrust settlement, and under the watchdog Technical Committee appointed by the court to make sure Microsoft complies with the rulings.

The filing used the phrase "first-boot experience,” which garnered some attention earlier this week in report clamming that PCs.

Microsoft's past practice of squeezing money from software makers and twisting hardware manufacturer's arms to say which programs would be pre-installed in Windows was one of those which led to the antitrust case.

- M.DINESH BABU-I M.SC(I.T)



IT- STEP BACK AND THINK!


As we all know, IT is one of the greatest work enablers today. From connecting people sitting in boardrooms across the globe to the casual cyber hawk, it plays a very important role in our lives. We begin our day by checking our mail boxes and finish by logging on to social networking sites, to connect with our loved ones.

IT, in its different avatars, hence, has become more of a second life for all of us. From being our source of entertainment to forming the backbone in a business setup, its everywhere we see. Without the IT systems running, the day to day businesses would come crashing down. They connect and keep the businesses going.

This is the level to which I.T’s power has been utilized. But is this enough? For IT to really make a difference, its important to take this immense power and put it across different sectors of our economy and see what difference comes out.

If IT could make such a difference in a corporate house, it would definitely make a sea change if used in agriculture or healthcare in villages, or in medicine. What the current situation demands, is for us to step back and take a good look at the distribution of computing technology and the power of software and how we’re making use of it.

At this point in time, what’s important is not how much its been used, but how and where it has been used. IT for example, can go beyond being just an enabler in Industry to the classroom environment etc.

Imagine a college setup. Under the current setup, except for the smart card entries, in the libraries, everything else is mechanical. This is one of the places where IT could be of great use. We could use this power to deploy a centralized IT system, which largely serves as a repository of information. Each student is given an id and a password and has a profile and an account on this system.

This profile, should ideally enable the student to connect with his classmates, and his professors and help get information about classes and subjects and also connect to an e library. Students can log on to it when they miss classes and still remain up to date about what has happened in class.

At the same time, projects and assignments can also be submitted online and discussed with their respective professors. This in effect, brings into place a more livelier way of information exchange. It also brings in the flexibility aspect. A student can stay connected to his college and his professors, irrespective of geography.

This is just one of the examples of how the power of software and systems can be used in education. This would be a high level investment in terms of the infrastructure. But once installed, it could change the whole way education takes place, both within and outside the classroom environment.

Similarly, we can consider other parts of our economic ecosystem where we can make use of the power of technology to transform how we do things in a more practical sense.

From a personal standpoint, I’d say, we still haven’t explored the power of software.

Once we start applying it, in a truer sense, in our real lives, what we would see would be not change, but progress of an unparalleled kind.

So, the next time you sit down to write a piece of software, think transform. Think change. Try to write a piece of software that creates a different. It can even be something really simple, but it should be different. Remember, the end results matter. And that’s what really counts.

S.Arun II B.C.A (Sec 1)



Wi – Fi

Wi-Fi is a trademark of the Wi-Fi Alliance, founded in 1999 as WECA (Wireless Ethernet Compatibility Alliance). The organization comprises more than 300 companies, whose products are certified by the Wi-Fi Alliance, based on the IEEE 802.11 standards (also called WLAN (Wireless LAN) and Wi-Fi). This certification warrants interoperability between different wireless devices.

The alliance was founded because many products did not correctly implement IEEE 802.11, and some included proprietary extensions. This led to incompatibilities between products from different manufacturers.

The Wi-Fi Alliance tests the wireless components to their own terms of reference. Products that pass become Wi-Fi certified and may carry the Wi-Fi logo. Only products of Wi-Fi Members are tested, as they pay membership and per-item-fees. A missing Wi-Fi logo does not necessarily mean non-compliance with the standard.

In some countries (USA, France, Poland...) the term "Wi-Fi" is often used by the public as a synonym for wireless Internet (W-LAN), although not every wireless Internet product has a Wi-Fi certification. This may be due to certification costs that must be paid for each certified device type.

Wi-Fi certification is provided for technology used in home networks, mobile phones, video games and other devices that require wireless networking. It covers IEEE 802.11 standards including 802.11a, 802.11b, 802.11g, and 802.11n.

Wi-Fi is supported by most personal computer operating systems, many game consoles, laptops, smart-phones, printers and other peripherals.

Purpose

The purpose of Wi-Fi is to provide inter-operable wireless access between devices. Wi-Fi generally makes access to information between devices from different manufacturers easier, as it can eliminate some of the physical restraints of wiring which can be especially true for mobile devices.

Uses

A Wi-Fi enabled device such as a PC, game console, mobile phone, MP3 player or PDA can connect to the Internet when within range of a wireless network connected to the Internet. The coverage of one or more interconnected access points — called a hotspot — can comprise an area as small as a single room with wireless-opaque walls or as large as many square miles covered by overlapping access points. Wi-Fi technology has served to set up mesh networks, for example, in London. Both architectures can operate in community networks.

In addition to restricted use in homes and offices, Wi-Fi can make access publicly available at Wi-Fi hotspots provided either free of charge or to subscribers to various providers. Organizations and businesses such as airports, hotels and restaurants often provide free hotspots to attract or assist clients. Enthusiasts or authorities who wish to provide services or even to promote business in a given area sometimes provide free Wi-Fi access. Metropolitan-wide Wi-Fi (Muni-Fi) already has more than 300 projects in process. There were 879 Wi-Fi based Wireless Internet service providers in the Czech Republic as of May 2008.

Wi-Fi also allows connectivity in peer-to-peer (wireless ad-hoc network) mode, which enables devices to connect directly with each other. This connectivity mode can prove useful in consumer electronics and gaming applications.

When wireless networking technology first entered the market many problems ensued for consumers who could not rely on products from different vendors working together. The Wi-Fi Alliance began as a community to solve this issue — aiming to address the needs of the end-user and to allow the technology to mature. The Alliance created the branding Wi-Fi CERTIFIED to reassure consumers that products will interoperate with other products displaying the same branding.

Many consumer devices use Wi-Fi. Amongst others, personal computers can network to each other and connect to the Internet, mobile computers can connect to the Internet from any Wi-Fi hotspot, and digital cameras can transfer images wirelessly.

Routers which incorporate a DSL-modem or a cable-modem and a Wi-Fi access point, often set up in homes and other premises, provide Internet-access and internetworking to all devices connected (wirelessly or by cable) to them. One can also connect Wi-Fi devices in ad-hoc mode for client-to-client connections without a router. Wi-Fi also enables places which would traditionally not have network to be connected, for example bathrooms, kitchens and garden sheds. The 'father of Wi-Fi', Vic Hayes, stated that being able to access the internet whilst answering a call of nature was 'one of life's most liberating experiences'.

As of 2007 Wi-Fi technology had spread widely within business and industrial sites. In business environments, just like other environments, increasing the number of Wi-Fi access-points provides redundancy, support for fast roaming and increased overall network-capacity by using more channels or by defining smaller cells. Wi-Fi enables wireless voice-applications (VoWLAN or WVOIP). Over the years, Wi-Fi implementations have moved toward "thin" access-points, with more of the network intelligence housed in a centralized network appliance, relegating individual access-points to the role of mere "dumb" radios. Outdoor applications may utilize true mesh topologies. As of 2007 Wi-Fi installations can provide a secure computer networking gateway, firewall, DHCP server, intrusion detection system, and other functions.

Advantages and challenges


Operational advantages

Wi- Fi allows local area networks (LANs) to be deployed without cabling for client devices, typically reducing the costs of network deployment and expansion. Spaces where cables cannot be run, such as outdoor areas and historical buildings, can host wireless LANs.

Wireless network adapters are now built into most laptops. The price of chipsets for Wi-Fi continues to drop, making it an economical networking option included in even more devices. Wi-Fi has become widespread in corporate infrastructures.

Different competitive brands of access points and client network interfaces are inter-operable at a basic level of service. Products designated as "Wi-Fi Certified" by the Wi-Fi Alliance are backwards compatible. Wi-Fi is a global set of standards. Unlike mobile telephones, any standard Wi-Fi device will work anywhere in the world.

Wi-Fi is widely available in more than 220,000 public hotspots and tens of millions of homes and corporate and university campuses worldwide.[5] Wi-Fi Protected Access encryption (WPA and WPA2) is not easily cracked if strong passwords are used. New protocols for Quality of Service (WMM) make Wi-Fi more suitable for latency-sensitive applications (such as voice and video), and power saving mechanisms (WMM Power Save) improve battery operation.

Limitations

Spectrum assignments and operational limitations are not consistent worldwide. Most of Europe allows for an additional 2 channels beyond those permitted in the U.S. for the 2.4 GHz band. (1–13 vs. 1–11); Japan has one more on top of that (1–14). Europe, as of 2007, was essentially homogeneous in this respect. A very confusing aspect is the fact that a Wi-Fi signal actually occupies five channels in the 2.4 GHz band resulting in only three non-overlapped channels in the U.S.: 1, 6, 11, and three or four in Europe: 1, 5, 9, 13 can be used if all the equipment on a specific area can be guaranteed not to use 802.11b at all, even as fallback or beacon. Equivalent isotropically radiated power (EIRP) in the EU is limited to 20 dBm (100 mW).

Reach

Wi-Fi networks have limited range. A typical Wi-Fi home router using 802.11b or 802.11g with a stock antenna might have a range of 32 m (120 ft) indoors and 95 m (300 ft) outdoors. Range also varies with frequency band. Wi-Fi in the 2.4 GHz frequency block has slightly better range than Wi-Fi in the 5 GHz frequency block. Outdoor range with improved (directional) antennas can be several kilometers or more with line-of-sight.

Wi-Fi performance decreases roughly quadratically as the range increases at constant radiation levels.

Due to reach requirements for wireless LAN applications, power consumption is fairly high compared to some other low-bandwidth standards. Especially Zigbee and Bluetooth supporting wireless PAN applications refer to much lesser propagation range of <10m>

Mobility

Speed vs. Mobility of wireless systems: Wi-Fi, HSPA, UMTS, GSM

Because of the very limited practical range of Wi-Fi, mobile use is essentially confined to such applications as inventory taking machines in warehouses or retail spaces, barcode reading devices at check-out stands or receiving / shipping stations. Mobile use of Wi-Fi over wider ranges is limited to move, use, move, as for instance in an automobile moving from one hotspot to another. Other wireless technologies are more suitable as illustrated in the graphic.















Threats to security

The most common wireless encryption standard, Wired Equivalent Privacy or WEP, has been shown to be easily breakable even when correctly configured. Wi-Fi Protected Access (WPA and WPA2), which began shipping in 2003, aims to solve this problem and is now available on most products. Wi-Fi Access Points typically default to an "open" (encryption-free) mode. Novice users benefit from a zero-configuration device that works out of the box, but this default is without any wireless security enabled, providing open wireless access to their LAN. To turn security on requires the user to configure the device, usually via a software graphical user interface (GUI). Wi-Fi networks that are open (unencrypted) can be monitored and used to read and copy data (including personal information) transmitted over the network, unless another security method is used to secure the data, such as a VPN or a secure web page. (See HTTPS/Secure Socket Layer.)

Population

Many 2.4 GHz 802.11b and 802.11g access points default to the same channel on initial startup, contributing to congestion on certain channels. To change the channel of operation for an access point requires the user to configure the device. Origin and meaning of the term "Wi-Fi" The term "Wi-Fi" suggests "Wireless Fidelity", comparing with the long-established audio recording term "High Fidelity" or "Hi-Fi", and "Wireless Fidelity" has often been used in an informal way, even by the Wi-Fi Alliance itself, but officially the term does not mean anything.

The term "Wi-Fi", first used commercially in August 1999, was coined by a brand consulting firm called Interbrand Corporation that had been hired by the Alliance to determine a name that was "a little catchier than 'IEEE 802.11b Direct Sequence'." Interbrand invented "Wi-Fi" as simply a play-on-words with "Hi-Fi", as well as creating the yin yang style Wi-Fi logo.

The Wi-Fi Alliance initially complicated matters by stating that it actually stood for "Wireless Fidelity", as with the advertising slogan "The Standard for Wireless Fidelity", but later removed the phrase from their marketing. The Wi-Fi Alliance's early White Papers still held in their knowledge base: "… a promising market for wireless fidelity (Wi-Fi) network equipment." and "A Short History of WLANs." The yin yang logo indicates that a product had been certified for interoperability. The Alliance has since downplayed the connection to "Hi-Fi". Their official position is that it is merely a brand name that stands for nothing in particular, and they now discourage the use of the term "Wireless Fidelity".



DATA WAREHOUSE


A data warehouse is the main repository of an organization's historical data, its corporate memory . It contains the raw material for management's decision support system. The critical factor leading to the use of a data warehouse is that a data analyst can perform complex queries and analysis, such as data mining, on the information without slowing down the operational systems.

Bill Inmon, an early and influential practitioner, has formally defined a data warehouse in the following terms;

Subject-oriented

The data in the database is organized so that all the data elements relating to the same real-world event or object are linked together;

Time-variant : The changes to the data in the database are tracked and recorded so that reports can be produced showing changes over time;

Non-volatile : Data in the database is never over-written or deleted - once committed, the data is static, read-only, but retained for future reporting;

Integrated : The database contains data from most or all of an organization's operational applications, and that this data is made consistent.













Source System Identification:

In order to build the data warehouse, the appropriate data must be located. Typically, this will involve both the current OLTP (On-Line Transaction Processing) system where the "day-to-day" information about the business resides , and historical data for prior periods, which may be contained in some form of "legacy" system. Often these legacy systems are not relational databases , so much effort is required to extract the appropriate data.

Data Warehouse Design and Creation:

This describes the process of designing the warehouse, with care taken to ensure that the design supports the types of queries the warehouse will be used for. This is an involved effort that requires both an understanding of the database schema to be created, and a great deal of interaction with the user community. The design is often an iterative process and it must be modified a number of times before the model can be stabilized. Great care must be taken at this stage, because once the model is populated with large amounts of data, some of which may be very difficult to recreate, the model can not easily be changed.

Data Acquisition:

This is the process of moving company data from the source systems into the warehouse. It is often the most time-consuming and costly effort in the data warehousing project, and is performed with software products known as ETL (Extract/Transform/Load) tools. There are currently over 50 ETL tools on the market. The data acquisition phase can cost millions of dollars and take months or even years to complete. Data acquisition is then an ongoing, scheduled process, which is executed to keep the warehouse current to a pre-determined period in time, (i.e. the warehouse is refreshed monthly).

Data Cleansing:

A data warehouse that contains incorrect data is not only useless, but also very dangerous. The whole idea behind a data warehouse is to enable decision-making. If a high level decision is made based on incorrect data in the warehouse, the company could suffer severe consequences, or even complete failure. Data cleansing is a complicated process that validates and, if necessary, corrects the data before it is inserted into the warehouse.

Advantages:

There are many advantages to using a data warehouse, some of them are:

Enhances end-user access to a wide variety of data. Decision support system users can obtain specified trend reports, e.g. the item with the most sales in a particular area/country within the last two years. A data warehouse can be a significant enabler of commercial business applications, most notably customer relationship management (CRM).

Summary:

Data Warehousing is a complex field, with many vendors vying for market awareness. The complexity of the technology and the interactions between the various tools, and the high price points for the products require companies to perform careful technology evaluation before embarking on a warehousing project.

- C.M.Aishwarya III B.Sc(cs).



ATTITUDE


A small truth to make life 100%

If

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z.

Is equal to

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26.

Hard work

H+A+R+D+W+O+R+K

8+1+18+4+23+15+18+11 = 98%

Knowledge

K+N+O+W+L+E+D+G+E

11+14+15+23+12+5+4+7+5 =96%

Love

L+O+V+E

12+15+22+5 = 54%

Luck

L+U+C+K

12+21+3+11 = 47%

Then what makes 100%?

Is it Money? ... NO!!!

M+O+N+E+Y

13+15+14+5+25 = 72%

Leadership ?

L+E+A+D+E+R+S+H+I+P

12+5+1+4+5+18+19+9+16 = 89%

Every problem has a solution, only if we perhaps

Change our attitude.

To go to the top,

To that 100%,

What we really need to go further… a bit more…

ATTITUDE

A+T+T+I+T+U+D+E

1+20+20+9+20+21+4+5 = 100%

It is OUR ATTITUDE towards life and work that makes our life 100%!!!

Attitude is everything!!

Change your attitude…

Then automatically it changes your LIFE…

Aijaz Azharuddin - I MSC (IT)



MATH TRICKS


TIMES ELEVEN

The eleven times table has always been very easy

To learn up to 9*11.Here’s a way of multiplying

Large numbers by 11 too:

Example:

Q. What is 324 * 11 ?

A. write down the first digit…3

……Add the first and second digits..3+2=5

……Add the second and third digits..2+4=6

…….Write down the last digit………..4

The answer is 3564

Try it yourself….. multiply 543 by 11

Multiplying by Eight

Multiplying by 8 can be achieved by doubling

Three times:

Example:

Q. What is 742*8?

A.742*2=1484

…..1482*2=2968

…..2968*2=5936

The answer is 5936

-Rajesh.D I-M.Sc I.T



HOW MUCH ARE WE SUPPORTING INDEPENDENCE AND CREATIVITY?


This is one of the things that I’ve always thought about. Are we encouraging individualism enough? Independent and creative ideas enough? Not really.

How many times have you dismissed a seemingly boring idea, only to see it blossom into something beautiful?

We live in a society where we follow things and make decisions based on what others think. Individual thinking has been given up for the sake of being on a safer side. We’re taught not to question(some of you might disagree, but it still exists), we’re taught not to think beyond the possible lines. Its surprising how even our thought process is controlled from outside.

This cripples and individual’s creativity, ideas, work and study to a great extent. Only when a person starts thinking for himself, can he really flourish as an individual. Ground breaking inventions and great ideas have come from people who worked and lived more for the love of it and less for the sake of it.

Starting from career to study, question how you want it to be. Education can be much more interesting if it comes with a drive from within. An external force can create only a pressure, but when assisted with a drive, it becomes a passion. A passion that lives on for a long time to come.

S.Arun II BCA (Sec-I)



TO TEACHERS WITH LOVE


Teachers are so kind

They fill our mind

With words

Always standing by our side

Giving us hope in life

Thank you teachers for everything

Without you, we couldn’t have

Learn anything.

Comments

Popular posts from this blog

MESSAGE DESK

articles 3,4,5