information management - a green perspective - vinay mehta 2009

11
 CBS E-Journal, Biz n Bytes, Vol. 2, Dec., 2009 http://www.cgc.edu.in/ ISSN 0976 – 0458 Proceedings Of  National Conference On Information Management, Computing and Security (IMCS’09) 3 rd November 2009 Convener: Dr.Col. S.P.S Bedi Director, CBS, Landran, Mohali Co-Convener: Ms.Bikrampal Kaur Head of Deptt, MCA, CBS Landran, Mohali Organized by: Department of Computer Applications Chandigarh Business School, Landran, Mohali

Upload: mehtawin

Post on 04-Oct-2015

2 views

Category:

Documents


0 download

DESCRIPTION

How our systems can learn from what is already in the Nature - Adaptivity to the information all around ourselves

TRANSCRIPT

  • CBS E-Journal, Biz n Bytes,

    Vol. 2, Dec., 2009

    http://www.cgc.edu.in/ISSN 0976 0458

    Proceedings

    Of

    National Conference

    On

    Information Management,

    Computing and Security

    (IMCS09)

    3rd

    November 2009

    Convener:

    Dr.Col. S.P.S Bedi

    Director, CBS, Landran, Mohali

    Co-Convener:

    Ms.Bikrampal Kaur

    Head of Deptt, MCA, CBS Landran, Mohali

    Organized by:

    Department of Computer Applications

    Chandigarh Business School, Landran, Mohali

  • CBS E-Journal, Biz n Bytes,

    Vol. 2, Dec., 2009

    http://www.cgc.edu.in/ISSN 0976 0458

    Organizing Committee

    Mr.Sudhanshu Shrivastava

    Asst.Prof., MCA Dept

    CBS,Mohali, Landran,Mohali

    Ms.Jaspreet Kaur Sandhu

    Lecturer.MCA Dept.

    CBS,Mohali,Landran,Mohali

    Mr.Ravikant Potdar

    Lecturer,MCA Dept.

    CBS,Mohali,Landran Mohali

  • CBS E-Journal, Biz n Bytes,

    Vol. 2, Dec., 2009

    http://www.cgc.edu.in/ISSN 0976 0458

    FOREWORD

    It gives me immense pleasure to know that the Department of Computer Applications,

    Chandigarh Business School, Landran is Organizing National Level Conference on Information

    Management, Computing and Security (IMCS09) on 3rd

    November 2009.I am sure that

    IMCS09 is an excellent opportunity for researchers ,scientists and professionals from industry,

    educational institutes and students to share and disseminate their innovative ideas and pioneering

    views about the recent trends and development in the field of computer applications.

    Today information includes both electronic and physical information. The information

    management comprises of collection, compilation, collation and distribution of information.

    Information management (IM) is the collection and management of information from one or

    more sources and the distribution of that information to one or more audiences. This means the

    organization of and control over the structure, processing and delivery of information.

    Computing means any goal-oriented activity requiring, benefiting from, or creating computers.

    Thus, computing includes designing and building hardware and software systems for a wide

    range of purposes; processing, structuring, and managing various kinds of information; doing

    scientific studies using computers; making computer systems behave intelligently; creating and

    using communications and entertainment media; finding and gathering information relevant to

    any particular purpose, and so on. Information security is the protection of information from a

    wide range of threats in order to ensure business continuity, minimize business risk, and

    maximize return on investments and business opportunities. Information security is achieved by

    implementing a suitable set of controls, including policies, processes, procedures, organizational

    structures and software and hardware functions. These controls need to be established,

    implemented, monitored, reviewed and improved, where necessary, to ensure that the specific

    security and business objectives of the organization are met. This should be done in conjunction

    with other business management processes.

    I welcome and thank all delegates, honorable guest, renowned speakers and participants for their

    generous views, support and contribution n for the success of this conference. The organizers

    have put in a lot of effort to make such a big event a grand success. I appreciate their planning,

    coordination and hard work.

    I wish you all a knowledgeable and rewarding experience.

    .

  • CBS E-Journal, Biz n Bytes,

    Vol. 2, Dec., 2009

    http://www.cgc.edu.in/ISSN 0976 0458

    AUTHORS Vinay Mehta

    AshwathaNarayana Shastry.

    Arvinder Singh Kang

    Bikrampal Kaur

    Chamkaur Singh Dhillon

    Deepti Tara

    Divya Dhara Gupta

    Garima Shrivastava (Paper-1) (Paper2)

    Jaspreet Kaur Sandhu

    Jaspreet Kaur

    Narinder Kumar

    Navita Shrivastava (Paper-1) (Paper2)

    Nitin Bansal

    Pawnee Mahendru

    Parminder Singh

    Sahil Sharma

    Sandeep Singh Kang

    Satish Alaria

    Sudhanshu Shrivastava(Paper-1) (Paper2)

    Upasna Sharma

    Vimal Kumar

    Vijay Kumar

    Yogesh Kumar

  • CBS E-Journal, Biz n Bytes,

    Vol. 2, Dec., 2009

    http://www.cgc.edu.in/ISSN 0976 0458

    AUTHOR WISE PAPERS

    Vinay Mehta

    Information Management - A green perspective

    AshwathaNarayana Shastry

    Information Security in Information Technology Industry in India

    Arvinder Singh Kang

    Internet Security and Ethical Hacking

    Bikrampal Kaur

    Evaluation In Inforamtion Retrieval

    Chamkaur Singh Dhillon

    Improving the performance of search engine technology

    Deepti Tara

    An Empricial study on Network Security Mangement during data extraction and sharing

    in SAN.

    Divya Dhara Gupta

    Internet Security and Ethical Hacking

    Garima Shrivastava

    The State-of-the-Art Machine Learning Strategy for Predicting Protein Conformation from DNA

    Sequence :Progress and Prospects

    Application of Machine Learning Techniques to Explore Complex Networks in Cell Biology:

    Simulating the Language of Living Cells

    Jaspreet Kaur Sandhu

    Criterias for evaluating the qaulity of information on the internet

    Jaspreet Kaur

    Search engines and Strategies

    Narinder Kumar

    Threats to Network Security and its Counter measures

    Navita Shrivastava

    The State-of-the-Art Machine Learning Strategy for Predicting Protein Conformation from DNA

    Sequence :Progress and Prospects

    Application of Machine Learning Techniques to Explore Complex Networks in Cell Biology:

    Simulating the Language of Living Cells

  • CBS E-Journal, Biz n Bytes,

    Vol. 2, Dec., 2009

    http://www.cgc.edu.in/ISSN 0976 0458

    AUTHOR WISE PAPERS

    Nitin Bansal

    An Empricial study on Network Security Mangement during data extraction and sharing

    in SAN.

    Pawnee Mahendru

    Improving the performance of search engine technology

    Parminder Singh

    Performance Analysis of QOS for IEEE 802.11 E

    Sahil Sharma

    Internet Security and Ethical Hacking

    Sandeep Singh Kang

    Performance Analysis of QOS for IEEE 802.11 E

    Satish Alaria

    A Software process improvemment Model

    Sudhanshu Shrivastava

    The State-of-the-Art Machine Learning Strategy for Predicting Protein Conformation from DNA

    Sequence :Progress and Prospects

    Application of Machine Learning Techniques to Explore Complex Networks in Cell Biology:

    Simulating the Language of Living Cells

    Upasna Sharma

    Threats to Network Security and its Counter measures

    Vimal Kumar

    Search engines and Strategies

    Vijay Kumar

    A Software process improvemment Model

    Yogesh Kumar

    Improving the performance of search engine technology

  • CBS E-Journal, Biz n Bytes,

    Vol. 2, Dec., 2009

    http://www.cgc.edu.in/ISSN 0976 0458

    PAPERS

    Information Management - A green perspective by Vinay Mehta

    Information Security in Information technology Industry in India.

    Internet Security and Ethical hacking

    Evaluation In Information Retrieval

    Improving the performance of search engine technology

    An Empirical study on Network Security Management during data extraction

    and sharing in SAN

    The State of the Art Machine Learning strategy for predicting Protein

    Conformation from DNA Sequence: Progress and Prospects.

    Application of Machine Learning Techniques to explore complex Networks in

    cell Biology :Simulating the language of Living Cells

    Criterias for evaluating the quality of information on the internet

    Search Engines and Strategies

    Threats to Network security and its Counter measures

    Performance Analysis of QOS for IEEE 802.11E

    A Software process improvement model.

  • CBS E-Journal, Biz n Bytes,

    Vol. 2, Dec., 2009

    http://www.cgc.edu.in/ISSN 0976 0458

    Information Management A Green Perspective

    Vinay Mehta

    CEO, PoleVault Technologies Pvt Ltd, Chandigarh

    [Keynote Presentation held on 3-Nov-09]

    Abstract: In this age of information explosion, information management has become a huge

    challenge for organizations and nations. What is noteworthy however is that information

    howsoever it may have been created, by whosoever it may have been created, whatsoever

    number of times it may have been used, and may have lost its relevance with time comes to be

    treated at par with all other new information. And this is what increases the burden of

    information management. The author expounds the basic tenets of nature with an example of

    data storage mechanism of a tree - to come out with a new model of Information Management so

    that instead of carrying loads of information in our storage media for years together, the

    information manages itself on its own depending on the number of factors affecting it. This

    would simplify our lives manifold and make us much more productive in everyday life.

    1.0 Information

    I would like to define Information as anything that carries no value or little value in itself, but its

    proper use delivers great value. Often, I use an example of a newspaper advertisement or a web

    advertisement that by itself does not cost us anything, but if someone uses the information inside

    it and applies, it could change his / her life. Similarly that piece of information may be obsolete

    after sometime and shall get stored by default somewhere. This way we keep accumulating

    information in our cabinets, our drawers, our almirahs that are full of information but rarely used

    for productive purposes. Imagine if the amount of data within an organization is so huge that it

    needs scores of Storage Area Networks (SANs) to keep it safe and sound, the data of a nation

    must run into trillions of megabytes to be stored for ages. This way the information management

    becomes a humungous challenge, and in the coming centuries half of our efforts as a world

    community might go into keeping what we have already generated, knowing what is relevant,

    what is not and in the process, losing some of the key information to bring some order into

    Information Management. Therefore the information of present age needs to be

    organized,

    managed and

    processed (computed),

    Secured and

    Shared or communicated

    2.0 Information needs an actor

    It is obvious that any piece of information needs an actor to act upon it to process it. If you need

    to cull out some data for previous years, you need to dig into your databases to get it out using

    queries. If you need some old text out, you need to search it in your files you created months

    back. So without action, you can not get the desired information. By itself it does not tell how

    old it is, how irrelevant it is to you or how useful it could be to you before you use it. In other

    words, Information Model of present times treats information as a static entity that neither

    changes according to its exposure nor modifies itself destroys itself depending on the

    environment it is in or based on how it was created or for whom it was created.

  • CBS E-Journal, Biz n Bytes,

    Vol. 2, Dec., 2009

    http://www.cgc.edu.in/ISSN 0976 0458

    In short, the information models of present age are not intelligent, they are static definitions of

    constructs in which bits and bytes are stored as information that keeps lying like a dud till some

    application acts upon them and do something with them. In contrast, let us see how nature is

    managing its information since billions of years.

    3.0 Natures Dynamic Information Model

    Look us look at the Green way the way nature stores the information in a tree.

    The smallest unit on a tree is a leaf. The information the leaves carry about their health and

    growth is self- contained. The cells within the leaf have the information about how to grow, how

    to make food, how to survive in storms or rough weather, how to live, and even when to fall. It is

    not dependent on the branch for taking a decision on these in normal case of growth (most of the

    times in their life-time).

    If we look at the branch, information about its growth, its divisions into sub-branches, further

    leaves, are all contained within its cells, and are not dependent on the stem for this information

    in normal case. In fact in case of any obstruction or condition, it is able to take a decision on its

    own about the direction it has to grow and how much.

    Lets us look at the stem. It represents the life support system, apart from being a physical

    support system as well. It can be said that the basic infrastructure is available to all components

    of the tree through the stem - physical support, water, other nutrients, life support processes in

    these they act as one entity, as a tree. The stem and its processes are similar to the passive and

    active IT infrastructure in any network.

    In all these components, the information storage is happening in their basic cell structure

    according to the need, exposure, growth, potential to grow and other factors. And as a system the

    information is changed or modified or destroyed or shed appropriately depending on these

    factors with time.

  • CBS E-Journal, Biz n Bytes,

    Vol. 2, Dec., 2009

    http://www.cgc.edu.in/ISSN 0976 0458

    If we look at this model of Information, it is no doubt dynamic, constantly changing itself,

    adapting itself and carries itself only as much as is needed (in the form of a seed), you may call it

    the most relevant information in a compressed form, that can be used again!

    Therefore in a tree adaptive changes in information happen. Whereas the core Information

    genetic information - remains same, other information changes with time, weather and water or

    resource availability.

    4.0 Todays Information Systems

    Compare the Tree (as Information Object) with the Information in IT processes of todays

    Information Systems. You will find that there is absolutely no adaptive change in information

    within them. You would find the core Information remaining same, and the other information

    also remains same w.r.t. time and other factors, unless they are acted upon by applications.

    This static behaviour is depicted by all of our passive Infrastructure, active Infrastructure,

    application Infrastructure as well as information storages.

    This is precisely the reason why information is not easily shared, it is not secure nor is it prone to

    misuse. There are no adaptive changes happening in the data and there are no ways to change

    how it is processed depending on what it is exposed to.

    I give you a simple example:

    A file shared with another user has same format and a static password.

    If encrypted, it can be opened with a private key (that is same for all users)

    Time relevant components of the information within the file remain same, they do not

    change or nor do they get highlighted unless the application whos using it is aware

    enough.

    5.0 Imagine a Dynamic Information Model for IT world

    Therefore I ask you not to think your information as data. Data usually connotes a dud or static

    piece of information which does not change at all with time or exposure. It needs an intelligent

    actor to make it useful. Instead I ask you to visualize an Information Object that contains data

    and acts dynamically! Just for some time, forget all about what you have learnt in data

    management systems, and visualize the following:

    Any information (say, a worksheet) going out of your system or network having

    Adaptive locks depending on who opens the information a trusted one within or outside the

    network or a stranger;

    Ability to tell before it is used that components in this file may be outdated since it old

    Ability to kind of destroy itself beyond a certain time or age

    Ability to get differently processed depending on the exposure

    To reinforce this idea, I would give you another example from nature. Very often I have used a

    particular road to my college campus, now my office campus as well. On the left side of it, there

    are two kinds of trees as you can see in the images below. One planted in three rows on extreme

    left, they stand straight adjacent to the boundary walls of Museum and Art Gallery and the

    College of Art, sector 10, Chandigarh, and the others planted on the road edges and have lesser

    space to grow in the vertical direction. Look carefully at the images below:

  • CBS E-Journal, Biz n Bytes,

    Vol. 2, Dec., 2009

    http://www.cgc.edu.in/ISSN 0976 0458

    Now see the Tree Information Object which is very adaptive in respect of its angle of stem, the

    percentage of foliage, and even the location of flowers changes with respect to what it is exposed

    to. And all this forms a part of the basic information system of the Tree. I would call it as

    Adaptive Computing happening even in the primitive cells of the stem which calculates all the

    physical parameters and changes the direction of its growth and way it grows.

    6.0 Think Information Objects

    Now that you have been imagining the tree information object, think of our own information

    files or database as Information Objects, NOT data. This would make it adaptive and it would

    have the

    o Ability to get differently processed depending on the exposure

    o Ability to have different encoding based on where they are going

    o Ability to get differently transported depending on their state

    o Ability to age with time

    And think that these information objects are available to you as a part of OS or base network

    layer in your information system setup! A simple example would make you understand the ease

    it would bring to your life: Think of worksheets or files in your system behaving differently

    depending on

    o what they contain

    o by whom they have been sent to you,

    o how frequently you have used them, &

    o what their age is!

    7.0 Conclusion

    I believe, once we start thinking in a different way on a totally different model or pattern, we are

    sure to come up with ways to create it and generate it. The progress we can have with dynamic

    information objects would help us achieve Information Management in much more easier natural

    way and help us explore hitherto unexplored potential that human race is destined for. We at

    PoleVault encourage ways to keep thinking different and as Steve Jobs said remain hungry all

    the time.

    [Copyright All ideas presented herein are original and are copyrighted in the author and the

    PoleVault Technologies Pvt Ltd, Chandigarh]