mca – news bulletin · 2012-11-20 · 1. 06.07.2011 digital image processing 7 2. 08.07.2011 rain...
TRANSCRIPT
1
KONGU ARTS AND SCIENCE COLLEGE
ERODE – 638 107
P.G DEPARTMENT OF COMPUTER SCIENCE
MCA – News Bulletin
EDITORIAL BOARD
PATRON : A.VENKATACHALAM B.Sc., Correspondent.
: Dr. N.RAMAN MBA., M.Com., M.Phil., B.Ed.,PGDCA Principal CONVENER
ADVISOR : Ms. D. GAYATHRI DEVI M.C.A., M.Phil. Prof. and Head.
COORDINATOR : Ms. B. JAYANTHI M.C.A., M.Phil., Associate Professor
EDITOR
&
STUDENT EDITORS
1. S.BAGAVATHSINGH - III - M.C.A
2. R.SAMPATHKUMAR - III - M.C.A
3. K.SANKAR – II MCA
2
NEWS BULLETIN
(2011-2012)
3
S.NO DATE PARTICULARS P.NO
1. 06.07.2011 DIGITAL IMAGE PROCESSING
7
2. 08.07.2011 RAIN TECHNOLOGY
8
3. 12.07.2011 NEW BLUE TRACK EQUIPPED RODENT
FROM MICROSOFT SPOTTED
9
4. 15.07.2011 SKY X TECHNOLOGY
10
5. 16.07.2011
MICROSOFT’S MIDORI
11
6. 20.07.2011 CLOUD COMPUTING TO AID ENDANGERED-SPECIES
CONSERVATION EFFORTS
12
7. 22.07.2011
LATEST NVIDIA GRAPHICS CARD
13
8. 25.07.2011
TERACOPY 2.2
14
9. 25.07.2011 ASYNCHRONOUS CHIPS
15
10. 27.07.2011
ROBOTICS
16
4
11. 06-09-2011 APPLE IOS
17
12. 14-09-2011 GRID COMPUTING
18
13. 29.12.2011 DELL VOSTRO 3350
19
14. 30.12.11 URU4000 FINGERPRINT READER
20
15. 04.01.2012 SCRIBUS 1.4.0
21
16. 04.01.2012 SPECIAL ISSUE ON SEMANTIC MULTIMEDIA
22
17. 05.01.2012 HTC THUNDERBOLT 4G
23
18. 09.01.2012 WEBBASED MOBILE
24
19. 10.01.2012 AMAZON WEB SERVICES
25
20. 10.01.2012 TOTAL COMMANDER 26
21. 12.01.2012 ANALOG DISPLAY SERVICES INTERFACE
27
22. 13.01.2012 APPLE ITV 28
5
23. 20.01.2012 VMWARE PLAYER
29
24. 25.01.2012 FILE ZILLA
30
25. 28.01.2012 HOW TO PREVENT BLUETOOTH HACKING
31
26. 17.02.2012
BELKIN LAUNCHES NEXT-GEN ROUTERS
32
27. 20.02.2012
WRIST WORN COMPUTER
33
28. 20.02.2012 TRIPWIRE
34
29. 21.02.2012 CAT-7
35
30. 22.02.2012 OPENSUSE
36
31. 25.02.2012 THUNDERBOLT TECHNOLOGY: THE
FASTEST DATA CONNECTION TO YOUR
PC
37
32. 27.02.2012 GECKO
38
33. 28.02.2012 BREAKING ADMINISTRATOR’S PASSWORD
39
6
34. 29.02.2012 SPYWARE TERMINATOR 3.0.0.61
40
35. 29.02.2012 APPLE THUNDERBOLT DISPLAY
41
36. 01.03.2012 UBUNTU
42
37. 02.03.2012 AXIALIS ICON WORKSHOP 6.70
43
38. 03.03.2012 MULTI-TOUCH
44
39. 07.03.2012 INTEL CORE I9
45
7
KONGU ARTS AND SCIENCE COLLEGE
P.G DEPARTMENT OF COMPUTER SCIENCE
ERODE – 638 107
News Bulletin: MCA Date: 06.07.2011
DIGITAL IMAGE PROCESSING
• Digital image processing fully integrates with mathematical to offer more sophisticated
analysis on the desktop than any standard image processing software. Designed for
professionals and students.
• Over 200 functions for color space transformations, connected component analysis, the
watershed transform, Canny and Shen-Castan edge detection, smoothing, noise reduction,
image morphology operations.
• More than 15 common image formats can be imported and exported.
• Images can also be quickly enhanced by manipulating contrast; image geometry, and
color, image regions can be interactively selected with a mouse for convenient and
effective region-of-interest processing.
• Digital image processing remains a challenging domain of programming for several
reasons. First the issue of digital image processing appeared relatively late in computer
history, it had to wait for the arrival of the first graphical operating systems to become a
true matter.
• Secondly, digital image processing requires the most careful optimizations and especially
for real time applications. Comparing image processing and audio processing is a good
way to fix ideas.
• Some techniques which are used in digital image processing includes:
� Principal components analysis
� Independent component analysis
� Self-organizing maps
T.VINOTH
II-MCA
8
KONGU ARTS AND SCIENCE COLLEGE
P.G DEPARTMENT OF COMPUTER SCIENCE
ERODE – 638 107
News Bulletin: MCA Date: 08.07.2011
RAIN TECHNOLOGY
• Rainfinity’s technology originated in a research project at the Colifornia Institute of
Technology (Caltech), in collaboration with NASA’s Jet Propulsion Laboratory and the
Defense Advanced Research Projects Agency (DARPA).
• The name of the original research project was RAIN, which stands for Reliable Array of
Independent Nodes.
• The goal of the RAIN project was to identify key software building blocks for creating
reliable distributed applications using off-the-shelf hardware.
• The focus of the research war on high-performance, fault-tolerant and portable clustering
technology for space-borne computing.
• Two important assumptions were made, and these two assumptions reflect the
differentiations between RAIN and a number of existing solutions both in the industry
and in academia:
• The most general share-nothing model is assumed. There is no shared storage accessible
from all computing nodes.
• The guiding concepts that shaped the architecture are as follows:
1. Network Applications
2. Shared-Nothi
3. Scalability
4. Peer-to-peer
L.VIKASINI
II-MCA
9
KONGU ARTS AND SCIENCE COLLEGE
P.G DEPARTMENT OF COMPUTER SCIENCE
ERODE – 638 107
News Bulletin: MCA Date: 12.07.2011
New Blue Track equipped rodent from Microsoft spotted
� A new rodent from Microsoft has been sighted in London this week which could be of
interest to those looking to pickup a replacement notebook mouse or some such in the
near future.
� During the Christmas in july event a new style of Microsoft mouse has been spotted
called named the ‘Microsoft Explorer Touch Mouse’.
� Which is equipped with Blue Track technology allowing it to be used on pretty much any
surface says Microsoft. Similar in the way that the Microsoft Arc Touch mouse works.
� The Microsoft Explorer Touch mouse is also equipped with 5 programmable buttons and
when you scroll up or down using the scroll pad the mouse provides optional haptic
feedback via a small vibration, and the mouse can be configured for both left and right
handed users.
� The new Microsoft Explorer Touch Mouse is expected to land in stores sometime near
the end of July 2011 and be priced around $70.
� Said to be scheduled for release later this month, Microsoft simply call it the remain
operable on practically any surface as well as being wireless in nature.
� Other features of the mouse include five programmable buttons, scrolling in the form of a
touch pad and a compact USB receiver that can be tucked away in a compartment under
the mouse.
D.BOOPATHI
[III-MCA]
10
KONGU ARTS AND SCIENCE COLLEGE
P.G DEPARTMENT OF COMPUTER SCIENCE
ERODE – 638 107
News Bulletin: II-MCA Date: 15.07.2011
Sky X Technology
• Satellites are ideal for providing internet and private network access over long distance
and to remote locations.
• The internet protocols are not optimized for satellite conditions and consequently the
throughput over the satellite networks is restricted to only a fraction of available
bandwidth. We can overcome these restrictions by using the Sky X protocol.
• The Sky X Gateway and Sky X Client/servers systems replaces TCP over satellite link
with the protocol optimized for the long latency, high loss and asymmetric bandwidth
conditions of the typical satellite communication.
• Adding the Sky X system to a satellite network allows users to take full advantage of the
available band width. The Sky X Gateway transparently enhances the performance of all
users on a satellite network without any modifications to the end clients and servers.
• The Sky X client and the Sky X Server enhance the performance of data transmissions
over satellites directly to end user PC’s thereby increasing Web performance by 3 times
or more and file transfer speeds by 10 to 100 times.
• The Sky X solution is entirely transparent to end users, works with all TCP applications
and does not require any modifications to end client and servers.
• Sky X products are the leading implementation of a class of products known variously as
protocol gateway TCP performance Enhancing Proxy (TCP/PEP), or satellite spoofer.
The Sky X gateways are available as ready to install hardware solutions which can be
added to any satellite network.
V.SENTHIL
II-MCA
11
KONGU ARTS AND SCIENCE COLLEGE
P.G DEPARTMENT OF COMPUTER SCIENCE
ERODE – 638 107
News Bulletin: MCA Date: 16.07.2011
MICROSOFT’S MIDORI
• MICROSOFT is working on a new generation of operating systems called Cloud-Based
Operating System and rumors are there that MIDRI will be their first such operating
system, which will replace Windows fully from computer map.
• Midori is the code name for a managed code operating system being developed by
Microsoft Research.
• In this the tools and libraries are completely managed code.
• MIDORI is designed to run directly on native hardware (x86, x64 and ARM), will be
hosted on the windows Hyper-V hyper visor, or even be hosted by a Windows process.
IMPORTANCE OF MIDORI:
• Due to installing different applications on a single computer may led to different
compatibility issues whenever the machine require updating.
• The new operating system will solve these problems by the concept of virtualizing.
• This will solve problems such as widespread security vulnerabilities, unexpected
interactions among different applications, failures caused by errant extensions, plug-ins,
and drivers and many more.
• It was designed for concurrency, and can run a program spread across multiple nodes at
once.
• It also features an entirely new security model that sandboxes applications for increased
security.
P.HEMACHANDRAN.,
[III-MCA]
12
KONGU ARTS AND SCIENCE COLLEGE
P.G DEPARTMENT OF COMPUTER SCIENCE
ERODE – 638 107
News Bulletin: MCA Date: 20.07.2011
CLOUD COMPUTING TO AID ENDANGERED-SPECIES
CONSERVATION EFFORTS
� The new cloud network was donated as a part of IBM’s Trailblazer program, which provides software, services and consulting grants to local nonprofits.
� Lotus Live Engage, a suite of cloud-based collaboration tools, is allowing zookeepers and conservation planners to host online meetings, as well as share and edit information.
� The technology also includes instant messaging and video-conferencing capabilities to let scientists connect between different zoos.
� “The Lotus Live solution allows us to coordinate programs across regions much more easily and quickly.
� It also assists us in sharing educational resources and encourages collaboration on priority projects such as the grey nurse shark captive management plan, which is the first of its kind in the world.
� Knowing that this knowledge-sharing takes place within a stable and secure environment offers peace of mind,” Martin Phillips, executive director of the Zoo and Aquarium Association, said in a statement.
K. SABARIRAJAN
II-MCA
URL REF: http://www.smartertechnology.com/c/a/Cloud%20Computing/Cloud-Computing -to-Aid-EndangeredSpecies-conservation-Efforts/
13
KONGU ARTS AND SCIENCE COLLEGE
P.G DEPARTMENT OF COMPUTER SCIENCE
ERODE – 638 107
News Bulletin: MCA Date: 22.07.2011
Latest Nvidia graphics card
• Nvidia has developed a new graphics card quadro FX 5800 gives an extra solution for
high end users designers, scientists, engineers and technical persons.
• Quadro FX 5800 comes 4GB frame buffer providing the professionals to deliver the right
tolls that required for visualization beyond 3d tradition.
• The previous graphics card allows you to make 3d modeling but with this you can make
4d modeling.
• This graphics card memory size is 4GB, memory interface is 512 bit, and memory
bandwidth is 102GB per second.
• NVIDIA graphics card comes with 240 CUDA CORE and maximum resolution display
is 2560x1600.
• This new nvidia graphics card supports multi operating system and CUDA architecture.
• This is the latest industry 4GB graphics card and there is no one had developed 4gb
graphics card still today.
G.LAKSHMANAN
[III-MCA]
14
KONGU ARTS AND SCIENCE COLLEGE
P.G DEPARTMENT OF COMPUTER SCIENCE
ERODE – 638 107
News Bulletin: MCA Date: 25.07.2011
TERACOPY 2.2
Teracopy is a compact program designed to copy and move files at the maximum
possible speed, providing the user a lot of features:
• Copy files faster: TeraCopy uses dynamically adjusted buffers to reduce seek
times. Asynchronous copy speeds up file transfer between two physical hard
drives.
• Pause and resume file transfer: Pause copy process at any time to free up
system resources and continue with a single click.
• Error recovery: in case of copy error, TeraCopy will try several times and in the
worst case just skips the file, not terminating the entire transfer.
• Interactive file list: TeraCopy shows failed file transfers and lets you fix problem
and recopy only problem files.
• Shell integration:TeraCopy can completely replace Explorer copy and move
functions, allowing you work with files as usual.
S.LALETHAPPRIYA
III-MCA
15
KONGU ARTS AND SCIENCE COLLEGE
P.G DEPARTMENT OF COMPUTER SCIENCE
ERODE – 638 107
News Bulletin: MCA Date: 25.07.2011
Asynchronous Chips
Definition:
Computer chips of today are synchronous. They contain a main clock, which controls the
timing of the entire chips there are problems, however, involved with these clocked designs that
are common today. One problem is speed. Therefore, if one part of the chip is especially slow,
the other parts of the chip are forced to sit idle. This wasted computed time is obviously
detrimental to the speed of the corner.
• New problems with speeding up a clocked chip are just around the corner. Clock
frequencies are getting so fast that signals can barely cross the chip in one clock cycle.
• When we get to the point where the clock cannot drive the entire chip, we’ll be forced to
come up with a solution. One possible solution is a second clock, but this will incur
overhead and power consumption, so this is a poor solution.
• It is also important to note that doubling the frequency of the clock does not double the
chip speed, therefore blindly trying to increase chip speed by increasing frequency
without considering other options is foolish.
• The other major problem with c clocked design is power consumption. The clock
consumes more power that any other component of the chip.
• These chips need to be even more conservative with power consumption in order to have
a reasonable battery lifetime.
C.RAMESH
II-MCA
16
KONGU ARTS AND SCIENCE COLLEGE
P.G DEPARTMENT OF COMPUTER SCIENCE
ERODE – 638 107
News Bulletin: MCA Date: 27.07.2011
ROBOTICS
� Robotics is the engineering science and technology of robots, and their design, manufacture, and application.
� Robotics is related to electronics, mechanics, and software.
What is a Robot?
“ A re-programmable, multifunctional manipulator designed to move material, parts, tools, or specialized devices through various programmed motions for the performance of a variety of tasks.”
ROBOTICS TECHNOLOGY:
� Robotics systems operate by way of hydraulic, pneumatic, and electrical power.
� Industrial robots are programmed by the former method.
ESSENTIAL CHARACTERS OF ROBOTS:
� Mobility.
� Programmability.
� Sensors.
� Mechanical capability.
� Flexibility.
S.NITHYA
II-MCA
URL REF: http://en.wikipedia.org/wiki/robotics
17
KONGU ARTS AND SCIENCE COLLEGE
P.G DEPARTMENT OF COMPUTER SCIENCE
ERODE-638107
News Bulletin:MCA DATE:06-09-2011
Apple iOS
� Apple's mobile operating system for its iPhone, iPod touch, iPad, Apple TV and similar
devices.
� IOS was originally called the iPhone OS but was renamed in 2010 to reflect the operating
system’s evolving support for additional Apple devices.
� Apple iOS is currently in v4.x release, with iOS 5 expected to debut in late 2011, likely at
the same time Apple introduces the iPhone 5.
� Older devices such as the original iPhone and iPod touch are not supported in the iOS 4
family of updates, and the iPhone 3G and second-generation iPod Touch cannot be
updated past iOS version 4.2.1.
� The primary competitors to Apple iOS in the mobile operating system space are
Windows Phone 7, Google’s Android OS, and the BlackBerry OS.
� Apple iOS does have a head start in the apps department, with its App Store already
featuring more than 500,000 third-party applications.
� The Android platform is Google Inc.'s open and free software stack that includes an
operating system, middleware and also key applications for use on mobile devices,
including smartphones. Android is an Open Handset Alliance Project.
E.JAYAPRAKASH
II-MCA
REF _URL: http:// www.webopedia.com/TERM/A/apple_ios.html
18
KONGU ARTS AND SCIENCE COLLEGE
P.G DEPARTMENT OF COMPUTER SCIENCE
ERODE-638107
News Bulletin: MCA DATE: 14-09-2011
Grid Computing
� Grid computing is a term referring to the combination of computer resources from
multiple administrative domains to reach a common goal.
� Grids are a form of distributed computing whereby a “super virtual computer” .
� The NASA Advanced Supercomputing facility (NAS) has run genetic algorithms using
the Condor cycle scavenger running on about 350 Sun and SGI workstations.
� In 2001, United Devices operated the United Devices Cancer Research Project based on
its Grid MP product, which cycle-scavenges on volunteer PCs connected to the Internet.
The project ran on about 3.1 million machines before its close in 2007.
� The project is significant not only for its long duration, but also for its budget, which at
24.8 million Euros, is the largest of any FP6 integrated project. Of this, 15.7 million is
provided by the European commission and the remainder by its 98 contributing partner
companies.
� CERN, one of the largest users of grid technology, talk of The Grid: “a service for
sharing computer power and data storage capacity over the Internet.”
� In 2007 the term cloud computing came into popularity, which is conceptually similar to
the canonical Foster definition of grid computing.
S.GOMATHI
II-MCA
URL_REF: http://en.wikipedia.org/wiki/Grid_computing
19
KONGU ARTS AND SCIENCE COLLEGE
P.G DEPARTMENT OF COMPUTER SCIENCE
ERODE-638107
News Bulletin: MCA DATE: 29.12.2011
DELL VOSTRO 3350
• The Dell Vostro 3350 is a great option for those looking for a powerful, portable
business laptop with a style statement.
• Excellent hardware backed up by good performance and battery life, "The Dell
Vostro 3350 is the latest Dell laptop for business users. The Vostro 3350 borrows
its elegant design from the Vostro 3300.
• Apart from this, the business laptop now packs the new Sandy Bridge Core i7
processor, 4 GB of RAM and 500 GB HDD.
• The latest trend of the industry, the Dell Vostro 3350 business laptop features
Intel’s new Sandy Bridge processor.
• The unit that was sent to us features the Core i7- 2620 clocked at 2.9GHz with 4
GB of RAM and dedicated graphics AMD Radeon HD 6490M option and a
500GB hard drive.
• The Dell 3350 has a screen size of 13.3-inch packing in 1333x768 pixels.
• The Dell Vostro 3350 also features a 2MP in-built HD webcam and the laptop
comes with pre-installed Skype software -- video conferencing is a treat.
G.DIVYA II-MCA
REF _URL: www.thinkdigit.com/Internet/dellvostro3350.html
20
KONGU ARTS AND SCIENCE COLLEGE
P.G DEPARTMENT OF COMPUTER SCIENCE
ERODE.
MCA:NEWS BULLETIN DATE:30.12.11
URU4000 Fingerprint Reader
• Microsoft is introducing the new product called URU4000 Fingerprint Reader that
replace user names and passwords with fingerprint recognition technology.
• The U.are.U 4000 is a USB fingerprint reader designed for use with Digital Persona, Inc.s
enterprise software applications and developer tools.
• The user simply places their finger on the glowing reader window, and the reader quickly
and automatically scans the fingerprint.
• On-board electronics calibrate the reader and encrypt the scanned data before sending it
over the USB interface.
• Digital Persona readers utilize optical fingerprint scanning technology to achieve
excellent image quality, a large capture area and superior reliability.
• The U.are.U 4000 Reader and Digital Persona® Fingerprint Recognition Engine have an
unmatched ability to authenticate even the most difficult fingerprints accurately and
rapidly regardless of placement angle.
N.ELAVARASI
II MCA
URL:http://www.szhcct.com/en/ShowSingleProduct.asp?id=218
21
KONGU ARTS AND SCIENCE COLLEGE
P.G DEPARTMENT OF COMPUTER SCIENCE
ERODE – 638 107
News Bulletin: MCA Date: 04.01.2012
Scribus 1.4.0
• Scribus is an open-source program that brings professional page layout to Linux/Unix,
MacOS X, OS/2 and windows.
• It is powerful software that helps you create great looking documents of all kinds.
• It also comes with a lot of support options to help you achieve the best result.
• There is an enthusiastic and friendly community around Scribus that assists beginner and
pro alike through our mailing list, IRC channel, wiki, contracted support, and the bug
tracker.
• Scribus supports professional features, such as CMYK color, spot color, separations, ICC
color and robust commercial grade PDF.
Details:
• Requirements : Windows 9x/2000/XP/2003/Vista/
• License : Open Source
• Date of publishing : January 2, 2012
• Author : Scribus(www.scribus.net)
S.JAYAPRIYA
I-MCA
REF_URL: http://www.filehippo.com/download_scribus/
22
KONGU ARTS AND SCIENCE COLLEGE
P.G DEPARTMENT OF COMPUTER SCIENCE
ERODE – 638 107
News Bulletin: II-MCA Date: 04.01.2012
SPECIAL ISSUE ON SEMANTIC MULTIMEDIA
Semantics in multimedia:
• The role of multimedia objects in the semantic web • Multimedia Ontologies and Infrastructures
Semantic Analysis of multimedia documents:
• Content-based multimedia analysis
• Knowledge assisted multimedia analysis and datamining
Semantic Retrieval of multimedia documents:
• Semantic-driven multimedia Indexing and Retrieval
• Machine Learning and Relevance Feedback for Semantic Retrieval
Applications of semantic multimedia:
• Semantic multimedia mash-ups • Semantic-driven multimedia application in Cultural Heritage Contexts
T.GUGAN
II-MCA
http://www.worldscinet.com.ijsc.mkt.sm.pdf
23
KONGU ARTS AND SCIENCE COLLEGE
P.G DEPARTMENT OF COMPUTER SCIENCE
ERODE – 638 107
News Bulletin: MCA Date: 05.01.2012
HTC THUNDERBOLT 4G
• 4.3-inch touch screen display
• 1.2GHz dual-core MSM8960 Snapdragon processor
• 8-megapixel back camera with dual-LED flash and HD video recording
• 5-megapixel front-facing camera
• Quad band support
• Wi-Fi b/g/n
• Bluetooth
• GPS and a GPS
• Mobile Hotspot for up to 5 devices
• 3.5mm headphone jack
• 16GB of internal storage
• Up to 128GB of storage support via microSD card slot
• Android 2.3 Gingerbread
• 1800mAh battery
• kickstand
DHILIPKUMAR.K
I-MCA
REF-URL: http://www.htc.com/us/products/thunderbolt-verizon
24
KONGU ARTS AND SCIENCE COLLEGE
P.G DEPARTMENT OF COMPUTER SCIENCE
ERODE – 638 107
News Bulletin:-MCA Date: 09.01.2012
WEBBASED MOBILE
� The Mobile Web refers to the use of Internet-connected applications, or browser-based access to the Internet from a mobile device has a Smartphone or tablet computer, connected to a wireless network. Traditionally, access to the Web has been via fixed-line services.
� However the Web is becoming more accessible by portable and wireless devices and in 2008 Mobile access to the Internet exceeded desktop computer-based access for the first time (source: International telecommunication Union, Oct 2009).
� The shift to mobile web access has been accelerating with the rise since 2007 of larger multi touch Smartphone, and of Multi touch tablet computers since 2010.
� Platforms provide better Internet access and browser or application based user Web experience than previous generations of mobile devices have done.
� The distinction between mobile web applications and native applications is anticipated to become increasingly blurred, as mobile devices and the speed and abilities of browser-based applications improve.
KANIMOZHI.A
I-MCA
URL-REF: http://en.wikipedia.org/
25
KONGU ARTS AND SCIENCE COLLEGE
P.G DEPARTMENT OF COMPUTER SCIENCE
ERODE – 638 107
NEWS BULLETIN:-MCA DATE: 10.01.2012
Amazon Web Services
• Amazon Web Services (AWS) was first launched as a public beta of Amazon Elastic Compute Cloud running Microsoft Windows Server and Microsoft SQL Server.
• This was later expanded to several operating systems including various flavors of Linux and Open Solaris.
• In March 2006, Amazon launched an online storage service called Amazon Simple Storage Service (Amazon S3).
• An unlimited number of data objects, from 1 byte to 5 terabytes in size, can be stored in S3 and distributed via HTTP or Bit Torrent.
• In 2006, Amazon introduced Amazon Simple Queue Service, a distributed queue messaging service and product wikis and discussion forums for certain products using guidelines that follow standard message board conventions.
• Also in 2006, Amazon introduced Amazon Elastic Compute Cloud (Amazon EC2), a virtual site farm, allowing users to use the Amazon infrastructure to run applications ranging from running simulations to web hosting.
• In 2008, Amazon improved the service adding Elastic Block Store(EBS), offering persistent storage for Amazon EC2 instances and Elastic IP addresses, static IP addresses designed for dynamic cloud computing.
• Amazon introduced Simple DB, a database system, allowing users of its other infrastructure to utilize a high reliability high performance database system.
JAYAPRIYA.P
II-MCA
http://en.wikipedia.org/wiki/Amazon.com#Software_development_centers
26
KONGU ARTS AND SCIENCE COLLEGE
P.G DEPARTMENT OF COMPUTER SCIENCE
ERODE – 638 107
News Bulletin: MCA Date: 10.01.2012
Total Commander
Total commander is a file manager for Windows similar to well-known DOS file manager. Total commander can handle archives as if they were subdirectories. It also has an internal ZIP-compatible packer. The search function allows you to search for files inside archives, even for text.
• Two file windows side by side
• Multiple language support
• Enhanced search function
• Compare files (now with editor)/ synchronize directories
• Quick View panel with bitmap display
• ZIP, ARJ, LZH, RAR, UC2, TAR, GZ, CAB, ACE archive handling + plugins
• Built-in FTP client with FXP (server to server) and HTTP proxy support
• Parallel port link, multi-rename tool
• Tabbed interface, regular expressions, history + favorites buttons
• Thumbnails view, custom columns, enhanced search
• Compare editor, cursor in lister, separate trees, logging, enhanced overwrite dialog, and more.
S.KARTHIK
I-MCA
REF_URL:http://www.filehippo.com/d/totalcommander/
27
KONGU ARTS AND SCIENCE COLLEGE
P.G DEPARTMENT OF COMPUTER SCIENCE
ERODE – 638 107
News Bulletin: I-MCA Date: 12.01.2012
ANALOG DISPLAY SERVICES INTERFACE
� Analog Display Services Interface is a TELEPHONY technology that is currently used in POTS or computer-based PBX telephone service.
� It works in conjunction with a screen-based telephone (“screen phone’) or other compatible CPE to provide the user with softkey access to Telephone Company or internal PBX custom calling features.
� It is an analog service because it uses analog Frequency Shift Keying (FSK) technology to interact with an LCD screen via short, low-baud rate, downloads to refreash and re-program softkeys in real-time.
� The technology introduced and rolled out to RBOCs from Bell core in April 1995.
New features:
� Call waiting Deluxe
� Message waiting indicator to work exclusively with ADSI telephones.
MADHUBALA.V
I-MCA
URL:http://en.wikipedia.org/wiki/Analog_Display_Services_Interface
28
KONGU ARTS AND SCIENCE COLLEGE
P.G DEPARTMENT OF COMPUTER SCIENCE
ERODE – 638107
News Bulletin : II-MCA DATE : 13.01.2012
APPLE ITV
� The supply chain of Apple will start preparing materials for iTV sets in the first quarter of 2012 in order to meet Apple's schedule to launch the new display products in the second or the third quarter of 2012, according to industry sources.
� Instead of a form of set-top box (STB) like the Apple TV launched in 2006, Apple's new products will be full TV sets, the sources added.
� Media reports in Korea also indicated that Samsung Electronics started producing chips for the iTVs in November 2011, while Sharp will produce the displays for the new TVs.
� The displays of the new iTV sets will focus on 32- and 37-inch sizes initially, noted sources in the supply chain.
� However, other sources also revealed that Apple may continue to launch its next-generation STB-like Apple TVs in 2012 as it has lowered the price of its current version of Apple TV listed on Amazon by 9% recently.
Ref: http://www.digitimes.com/news/a20111227PD204.html
R . KAVITHA
II - MCA
29
KONGU ARTS AND SCIENCE COLLEGE
P.G DEPARTMENT OF COMPUTER SCIENCE
ERODE – 638 107
News Bulletin: MCA Date: 20.01.2012
VMware player
A virtual machine is a computer defined in software. It’s like running a PC on your PC.
This free desktop virtualization software application makes it easy to operate any virtual
machine created by VMware Workstation, VMware Fusion, VMware Server or VMware ESx, as
well as Microsoft virtual server virtual machines or Microsoft Virtual PC virtual machines.
• Run multiple operating systems simultaneously on a single PC
• Experience the benefits of preconfigured products without any installation or
configuration hassles
• Share data between host computer and virtual machine
• Run 32-and 64-bit virtual machines
• Leverage 2-way virtual SMP
• Use 3rd-party machines and images
• Share data between host computer and virtual machine
• Broad host and guest operating system support
• Support for USB 2.0 devices
• Get appliance info at start-up
• Gain easy access to virtual machines via intuitive home page interface
S.KARTHIKEYAN
II-MCA
URL REF: http://www.filehippo.com/download_vmware_player/
30
KONGU ARTS AND SCIENCE COLLEGE
P.G DEPARTMENT OF COMPUTER SCIENCE
ERODE – 638 107
News Bulletin: MCA Date: 25.01.2012
File Zilla
FileZilla Client is a fast and reliable cross-platform FTP, FTPS and SFTP client with lots of useful features and an intuitive graphical user interface.
Features of FileZilla:
� Easy to use � Supports FTP, FTP over SSL/TLS (FTPS) and SSH File Transfer Protocol
(SFTP) � IPv6 support � Available in many languages � Supports resume and transfer of large files greater than 4GB � Powerful Site Manager and transfer queue � Bookmarks � Drag & drop support � Configurable transfer speed limits � Filename filters � Network configuration wizard � Remote file editing � Keep-alive � HTTP/1.1,socks5 and FTP-Proxy support � Logging to file
E.KAVIYAVARSHINI
II-MCA
REF_URL:http://www.filehippo.com/download_filezilla/
31
KONGU ARTS AND SCIENCE COLLEGE
P.G DEPARTMENT OF COMPUTER SCIENCE
ERODE – 638 107
News Bulletin: MCA Date: 28.01.2012
HOW TO PREVENT BLUETOOTH HACKING
• Keep your Bluetooth off after sharing your data or even when you are not using it. Even you can use internet or Wifi instead of using Bluetooth.
• Do not accept invitation from the device and most important don’t keep your cellphone in “visible” or “discover” mode.
• Most of the people think Bluetooth range is 10 meter but this is wrong because Bluetooth chip range is about 100 meter.
• It is better to switch off the Bluetooth after using it.
• Furthermore, be wary of the passwords you’re using.
• It’s a very good idea to set a very difficult PIN fir accessing your mobile phone, one which contains a sequence of several letters and numbers.
• It’s good idea to change the passwords at relative short time intervals, just to be on the safe side.
Bluetooth hacks are categorized broadly among:
� Bluejacking � Bluesnarfing � Bluebugging � Bluetoothing
N.KIRUTHIKA
II-MCA
URL REF:
http://www.onlytechtalks.com/techtalks/2009/05/tips-for-preventing-bluetooth-hock/
32
KONGU ARTS AND SCIENCE COLLEGE
P.G DEPARTMENT OF COMPUTER SCIENCE
ERODE – 638 107
News Bulletin: I-MCA Date: 17.02.2012
BELKIN LAUNCHES NEXT-GEN ROUTERS
� Belkin India has launched a reange of next-generation routers. The range includes N750 Dual Band, N600 Dual Band, N300 and N150 wireless routers and modem routers.
� The new router chassis has been designed specifically to support the new MultiBeam antennas and maximize the MIMO sphere and absolute coverage distance.
� The Belkin N750 also has a technology called implicit beam forming, whereby the energy of the radio signal is focused toward the devices on the network instead of radiating in all directions.
� In terms of speed, the Belkin N750 uses the IEEE 3x3 standards to transmit data on three streams, simultaneously, whereas traditional 802.11n routers transmit using two streams. The third stream gives 50-percent better throughput.
� Additionally, the N750 also features a Hardware-based Network Address Translation that enables lightning-fast NAT speeds (up to 900+ Mbps) without compromising the performance of the rest of the home network.
K.PRIYADHARSHINI
II-MCA
URL REF: http://itvoir.com/portal/news/New-Products/Belkin-launches-Next- Gen-Routers
33
KONGU ARTS AND SCIENCE COLLEGE
P.G DEPARTMENT OF COMPUTER SCIENCE
ERODE – 638 107
News Bulletin: I-MCA Date: 20.02.2012
Wrist Worn Computer
Zypad WL 1000 wrist-worn personal computer is a powerful computer designed to be worn comfortably on the user’s wrist.
Zypad WL 1000 was conceived and designed to be as flexible as possible, in order to maximize its potential applications. It is of special interest to the Emergency services, Security, Defence, Healthcare, Maintenance, and Logistics. In fact, Zypad WL 1000 is an essential tool in any field where hands-free access to large amounts of information is a necessity.
The Zypad WL 1000 exemplifies the concept of ubiquitous computing by integrating all the power and capabilities offered by a full size PC within an extremely versatile device. The design allows flexible, ergonomic positioning and fastens easily to the wrist, even over the user’s clothes, thus ensuring ideal weight distribution and maximum comfort. With Zypad WL 1000 information can be shared and services can be accessed regardless of location.
PRODUCT FEATURES:
Battery Life : Average 8+ Hours of Operation
Wireless : Bluetooth, Wi-Fi 802.11 b/g
Weight : 290 grams (Battery Include)
Keyboard : Backlit Buttons
S.PRABAKARAN
I-MCA
URL-REF: http://www.eurotech.com/en/innovation/wearable
34
KONGU ARTS AND SCIENCE COLLEGE
P.G DEPARTMENT OF COMPUTER SCIENCE
ERODE – 638 107
News Bulletin: MCA Date: 20.02.2012
Tripwire
• Tripwire is an intrusion detection system. It is a software tool that checks to see what has changed on your system.
• The program monitors the key attributes of files that should not change, including the size, binary signature, expected change of size, and other related emportant data.
• Tripwire is an open source program created to monitor changes in a key subset of files identified by the user and report on any changes in any of those files.
• When changes are detected the system Administrator can determine whether those changes occurred due to normal, permitted activity, or whether they were caused by a break-in.
• The former, the administrator can update the system baseline to the new files. If the latter, then repair and recovery activity begins.
• Tripwire’s principle is simple enough. The system administrator identifies key files and causes Tripwire to record checksum for those files.
• Administrator also puts a cron job to scan those files at intervals (daily or more frequency0m comparing to the original checksum. Any changes, addition, or deletion are reported, so the proper action can be taken.
L.RAMESH
II-MCA
http://seminars4you.wordpress.com/2010/02/23/tripwire/
35
KONGU ARTS AND SCIENCE COLLEGE
P.G DEPARTMENT OF COMPUTER SCIENCE
ERODE – 638 107
News Bulletin: MCA Date: 21.02.2012
CAT-7
• Short for Category 7, Cat-7 network cabling is used as a cabling infrastructure for 1000BASE-T (Gigabit Ethernet, or GbE) and 10GBASE-T (10-Gigabit Ethernet, or 10 GbE) networks.
• The Cat 7 standard provides performance of up to 600 MHz (1000 MHz for the Cat-7a, or Augmented Category 7 standard) and can be used up to a maximum length of 100 meters.
• Category 7 cable is able to achieve higher performance than preceding Ethernet standards such as Cat 5, Cat 5e and Cat 6 by requiring each of its twisted wire pairs to be fully shielded.
• This is known as Screen Shielded Twisted Pair (SSTP) or Screened Foiled Twisted Pair (SFTP) wiring, and it almost completely eliminates alien crosstalk while significantly improving noise resistance.
• The Cat 7 standard was published in 2002 by the International Organization for Standardization (ISO) and is also known as Class F cabling.
• While more expensive than Cat 5e and Cat 6 cabling, Cat-7 cabling does have a 15-year lifecycle (compared to estimated 10-year lifecycles for Cat 5e and Cat 6), which helps improve its overall return on investment (ROI).
C.RAMESH
II-MCA
URL REF:http://www.webopedia.com/TERM/C/Cat_7.html
36
KONGU ARTS AND SCIENCE COLLEGE
P.G DEPARTMENT OF COMPUTER SCIENCE
ERODE – 638 107
News Bulletin: MCA Date: 22.02.2012
openSUSE
• openSUSE is a general purpose operating system built on top of the Linux kernel, developed by the community-supported openSUSE Project and sponsored by SUSE.
• The initial release of the community project was a beta version of SUSE Linux 10.0, and as of November 16,2011 the current stable release is openSUSE 12.1.
• openSUSE is fully and freely available for immediate download, and is also sold in retail box to the general public. It comes in several editions for the x86-64 architectures (as for version 11.4):
• SUSE includes an installation and administration program called YaST which handles hard disk partitioning, system setup.
• Auto YaST is part of YaST2 and is used for automatic installation. The configuration is stored in an XML file.
T.RAMYA
II-MCA
http://en.wikipedia.org/wiki/OpenSUSE
37
KONGU ARTS AND SCIENCE COLLEGE
P.G DEPARTMENT OF COMPUTER SCIENCE
ERODE – 638 107
News Bulletin: MCA Date: 25.02.2012
Thunderbolt Technology: The Fastest Data Connection to Your PC
� Thunderbolt (codenamed Light Peak) technology is a new high-speed PC connection
technology that runs at 10Gbps developed by Intel.
� Thunderbolt technology supports both data and display on a single cable, enabling greater
simplicity, flexibility and new and exciting ways to use a PC.
� Apple is the first customer to offer Thunderbolt technology, coming first on its new line
of Mac Book Pro laptops.
� Thunderbolt technology, a new high-speed PC connection technology that brings together
high-speed data transfer and high-definition (HD) display on to a single cable.
� Running at 10gbps, Thunderbolt technology can transfer a full-length HD movie in less
than 30 seconds.
� Thunderbolt technology delivers this via two communications methods, or protocols-PCI
Express for data transfer and Display Port for displays.
� PCI Express has the flexibility to connect to almost any type of device, and Display port
can drive greater than 1080p resolution displays and up to eight channels of audio
simultaneously Thunderbolt technology is compatible with existing Display Port displays
and adapters.
� Several innovative companies have announced Thunderbolt Technology-based products,
or currently plan to support Thunderbolt technology in upcoming product, including Aja,
Apogee, Avid, Black magic, LaCie, Promise, and Western Digital.
URL_REF:
1. http://en.wikepedia.org/wiki/Thunderbolt_(interf ace)
S.PRATHITHIBAVANA
I-MCA
38
KONGU ARTS AND SCIENCE COLLEGE
P.G DEPARTMENT OF COMPUTER SCIENCE
ERODE – 638 107
News Bulletin: MCA Date: 27.02.2012
Gecko
• Gecko is the open source, free software web browser layout engine used in all Mozilla-branded software and its derivatives, including later Netscape releases.
• Written in C++, Gecko is designed to support open Internet standards.
• Originally created by Netscape Communications Corporation, its development is now overseen by the Mozilla Foundation.
• Gecko offers a rich programming API that makes it suitable for a wide variety of roles in Internet enabled applications, such as web browsers, content presentation and client/server.
• Primarily it is used by Mozilla browser derivatives, such as Mozilla Firefox, K-Meleon and Netscape, to render websites and the browser user interface (written in XUL), but it is used elsewhere as well.
• Gecko is cross-platform and works on a number of different operating systems, including Microsoft Windows, BSDs, GNU/Linux and Mac OS X.
• Gecko is generally considered to be the second most-popular layout engine on the Web, after Trident (used by Internet Explorer for Windows since version 4), and followed by KHTML (used by Conqueror), Web core (used by Safari), Presto (used by Opera) and Tasman (used by Internet Explorer for Mac).
K.SABARIRAJAN
II- MCA
http://edufive.com/seminartopics/computer/Computer20.html
39
KONGU ARTS AND SCIENCE COLLEGE
P.G DEPARTMENT OF COMPUTER SCIENCE
ERODE – 638 107
News Bulletin: MCA Date: 28.02.2012
Breaking Administrator’s Password
� Administrator password can be broken by replacing Sam file in system32\config by the Sam file in repair folder of windows.
� It can be easily done on a machine with dual operating systems, simply log on to OS other than the one whose password is to be cracked the way is exactly same as written above but if there is a single OS on a machine then there is only one way.
� To use ms dos start up disk or some other boot disk and replace the Sam file in cong=fig folder with the one in repair folder.
Note:- this method works only if hard drive is FAT32 formatted because NTFS drive does not take boot from Ms DOS.
� This way you can remove the old administrator password as if the window is newly installed and the password was not set.
M.SANKAR
II-MCA
URL REF: http://hackingtriks.wordpress.com/2007/10/13/breaking-administrators-password-2/
40
KONGU ARTS AND SCIENCE COLLEGE
P.G DEPARTMENT OF COMPUTER SCIENCE
ERODE – 638 107
News Bulletin: MCA Date: 29.02.2012
SPYWARE TERMINATOR 3.0.0.61
• Millions of users worldwide rely on Spyware Terminator, winner of many awards and high ratings from industry experts and users.
• Its free comprehensive protection is comparable to competitors’ paid versions! Spyware Terminator includes
• Fast spyware scanning.
• 100% real-time protection. • HIPS protection.
• Antivirus protection. • Multilanguage support. • Free automatic updates.
• Free scheduled scans. • Free supports.
• Spyware Terminator will scan your computer for known threats and report findings in a manner that is easy to read and interpret.
• Every entry is given a rating and a classification, which makes it very easy to decide if a detected items should be removed.
• Unlike some free software titles, Spyware Terminator will remove all threats for free. • Spyware Terminator is licensed for free for both home and business use.
B.MUTHUGEETHA
I-MCA
URL:http://www.filehippo.com/download spyware terminator/
41
KONGU ARTS AND SCIENCE COLLEGE
P.G DEPARTMENT OF COMPUTER SCIENCE
ERODE – 638 107
News Bulletin: MCA Date: 29.02.2012
Apple Thunderbolt Display
� The Apple Thunderbolt Displays is the newest flat panel computer monitor sold by Apple Inc., introduced on July 20, 2011.
� The display model and the older Apple LED Cinema Display are the only two display models currently sold by Apple, both sharing the same technical specification for the display portion of the product.
� The increased bitrate from switching to Thunderbolt enables inclusion of a gigabit ethernet port and a Fire Wire 800 port on the display.
� Older mac models with mini Display Port, including all Mac models introduced in 2010, are incompatible with the Thunderbolt Display.
� The Thunderbolt port allows for the possibility of daisy chaining two Thunderbolt Displays from a supported Mac, or connecting other devices that have Thunderbolt ports, such as external hard drives and video capture devices.
� Apple Thunderbolt Displays, including the stand-alone display as well as the Thunderbolt iMacs, cut compatibilities with all previous standards, including VGA, DVI, and Display Port.
URL_REF:
http://en.wikipedia.org/wiki/Apple_Thunderbolt_Disp lay
S.SATHYA
II MCA
42
KONGU ARTS AND SCIENCE COLLEGE
P.G DEPARTMENT OF COMPUTER SCIENCE
ERODE – 638 107
News Bulletin: MCA Date: 01.03.2012
Ubuntu
• Ubuntu is a Linux-based Operating System that is open sourced (free).
• Ubuntu is a fork of the Debian project’s codebase.
• Edubuntu, a GNOME-based subproject and add-on for Ubuntu, designed for
school environment and home users.
• Kubuntu, a desktop distribution using the KDE Plasma Workspaces desktop
environment rather than GNOME.
• Lubuntu, a lightweight distribution using the LXDE desktop environment.
• Mythbuntu, designed for creating a home theater PC with Myth TV and uses
the Xfce desktop environment.
• Ubuntu Studio, a distribution made for professional video and audio editing.
V.SATHYA
II-MCA
http://en.wikipedia.org/wiki/Ubuntu_(operating _system)
43
KONGU ARTS AND SCIENCE COLLEGE
P.G DEPARTMENT OF COMPUTER SCIENCE
ERODE – 638 107
News Bulletin: MCA Date: 02.03.2012
Axialis Icon Workshop 6.70
• With Icon Workshop make your own icons for Windows, Macintosh and Unix.
• It creates Windows icons up to 256x256 for Windows Vista and Macintosh icons up to
512x512 for Leopard (Mac OS 10.5).
• Unix uses PNG icons. Icon Workshop creates PNG images with alpha channel in a few
clicks including from existing Windows and Mac OS icons.
• The new generation of icons uses variable transparency (alpha channel). This feature
permits creating beautiful icons with smooth borders and shadows.
• You need a professional tool to create such icons. Axialis Icon Work shop has been
designed with one goal in mind:” Icon Quality”.
• Enjoy the powerful editor which permits creating the various image formats of an icon
from an original drawing without quality loss.
• Five reasons to try Icon Workshop:
• One professional tool for all your needs.
• Create icons for both Windows and Macintosh OS.
• Be productive instantly – No complicated settings.
• Access to private images objects.
• Compatible with graphic industry standards.
M.PREMA
I-MCA
URL: http://www.filehippo.com/download_axialis_iconworkshop/
44
KONGU ARTS AND SCIENCE COLLEGE
P.G DEPARTMENT OF COMPUTER SCIENCE
ERODE – 638 107
News Bulletin: MCA Date: 03.03.2012
Multi-touch
• Multi-touch technology id an advanced human-computer interaction technique.
• It recognizes multiple touch points and also includes the hardware devices that implement
it, which allow users to compute without conventional input devices.
• Multi-touch consists of a touch screen (screen, table, wall, etc.) or touchpad, as well as
software that recognize multiple simultaneous touch points, as opposed to the standard
touch screen which recognizes only one touch point at a time.
• Multi touch using Frustrated Total Internal Reflection is a simple, inexpensive, and
scalable technique for enabling high-resolution multi touch sensing on rear-projected
interactive surfaces.
• Different applications for multi-touch interfaces both exist and are being proposed.
• Some uses are individualistic e.g. iPhone, iPod touch, MacBook Pro, MacBook Air. The
use of multi-touch technology is expected to rapidly become common place.
V.SENTHIL
II-MCA
http://seminars4you.wordpress.com/2009/06/25/multi-touch/
45
KONGU ARTS AND SCIENCE COLLEGE
P.G DEPARTMENT OF COMPUTER SCIENCE
ERODE – 638 107
News Bulletin: MCA Date: 07.03.2012
Intel core i9
• Core i9 Gulftown can be viewed as Core i7+2 with six physical cores, a total thread count
of 12 and a 50 percent L3 cache increase over Core i7 Bloomfield.
• The Core i9 CPUs fared well when it came to power usage, using less power and running
cooler compared to older chips.
• Certain resource-intensive tasks, such as editing video or 3D modeling, perform up to
50% faster than Intel’s current Core i7 chip.
• The new chips in a dual-socket motherboard that’s either an existing Xeon-based socket
LGA 1366 mob or a next-gen Skulltrail platform.
• Core i9 will not include an IGP core alongside the 32nm CPU, so nothing changes on the
graphics front,
� Intel Core i9 Processor Features
• Sockets LGA 1366 compatible Intel X58
• Motherboard compatible
• 32nm technology
• Six Core
• Speed 2.4 Ghz+
P.SUBIYA
II-MCA
URL REF:
www.maximumpc.com/.../intels_core_i9_gulftown_sixcore_processor