patron : dr.n.raman m.b.a., m.com., m.phil., b.ed.,pgdca ... to sep 2012-2013.pdf · all the risks...

30
KONGU ARTS AND SCIENCE COLLEGE ERODE – 638107 DEPARTMENT OF COMPUTER TECHNOLOGY AND INFORMATION TECHNOLOGY IT Bulletin EDITORIAL BOARD Chief patron : Thiru. A.Venkatachalam B.Sc., Patron : Dr.N.Raman M.B.A., M.Com., M.Phil., B.Ed.,PGDCA.,Ph.D., Editor in Chief : Mr.S.Muruganantham M.Sc.,M.Phil., Staff Editor : Ms.C.Uma M.Sc., STUDENT EDITORS STUDENT EDITORS STUDENT EDITORS STUDENT EDITORS 1. 1. 1. 1. Chitra.D Chitra.D Chitra.D Chitra.D - II B.Sc(CT) II B.Sc(CT) II B.Sc(CT) II B.Sc(CT) 2. 2. 2. 2. Mythili Priya.K.P Mythili Priya.K.P Mythili Priya.K.P Mythili Priya.K.P - II B.Sc(CT) II B.Sc(CT) II B.Sc(CT) II B.Sc(CT) 3. 3. 3. 3. Isak Raja Karunya Prakash Isak Raja Karunya Prakash Isak Raja Karunya Prakash Isak Raja Karunya Prakash - II B.Sc(IT) II B.Sc(IT) II B.Sc(IT) II B.Sc(IT) 4. 4. 4. 4. Yakavi.G Yakavi.G Yakavi.G Yakavi.G - II B.Sc(IT) II B.Sc(IT) II B.Sc(IT) II B.Sc(IT)

Upload: others

Post on 24-Aug-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Patron : Dr.N.Raman M.B.A., M.Com., M.Phil., B.Ed.,PGDCA ... to Sep 2012-2013.pdf · All the risks to sensitive corporate data associated with outsourcing apply to cloud computing,

KONGU ARTS AND SCIENCE COLLEGE

ERODE – 638107

DEPARTMENT OF COMPUTER TECHNOLOGY AND

INFORMATION TECHNOLOGY

IT Bulletin

EDITORIAL BOARD

Chief patron : Thiru. A.Venkatachalam B.Sc.,

Patron : Dr.N.Raman M.B.A., M.Com., M.Phil., B.Ed.,PGDCA.,Ph.D.,

Editor in Chief : Mr.S.Muruganantham M.Sc.,M.Phil.,

Staff Editor : Ms.C.Uma M.Sc.,

STUDENT EDITORSSTUDENT EDITORSSTUDENT EDITORSSTUDENT EDITORS

1.1.1.1. Chitra.DChitra.DChitra.DChitra.D ---- II B.Sc(CT)II B.Sc(CT)II B.Sc(CT)II B.Sc(CT)

2.2.2.2. Mythili Priya.K.PMythili Priya.K.PMythili Priya.K.PMythili Priya.K.P ---- II B.Sc(CT)II B.Sc(CT)II B.Sc(CT)II B.Sc(CT)

3.3.3.3. Isak Raja Karunya PrakashIsak Raja Karunya PrakashIsak Raja Karunya PrakashIsak Raja Karunya Prakash ---- II B.Sc(IT)II B.Sc(IT)II B.Sc(IT)II B.Sc(IT)

4.4.4.4. Yakavi.GYakavi.GYakavi.GYakavi.G ---- II B.Sc(IT) II B.Sc(IT) II B.Sc(IT) II B.Sc(IT)

Page 2: Patron : Dr.N.Raman M.B.A., M.Com., M.Phil., B.Ed.,PGDCA ... to Sep 2012-2013.pdf · All the risks to sensitive corporate data associated with outsourcing apply to cloud computing,

TABLE OF CONTENTS

S.NO

TITLE

PAGE NO

1 GOOLGE NEXUS

1

2 A NEW FRONTIER 2

3 WINDOWS 8 3

4 ADVANTAGES OF NANOTECHNOLOGY 4

5 IPHONE 5 5

6 4G Technology 6

7 GREEN COMPUTING 7

8 INFOPARK KOCHI 8

9 ANDROID 4.1, JELLY BEAN 9

10 GREEN COMPUTING 10

11 STEVE JOBS AFFECTS ON MARKET VALUE OF APPLE 11

12 QUANTUM COMPUTER USING MICROWAVE TECHNOLOGY

12

13 4G MOBILE TECHNOLOGY 13

14 4G WIRELESS TECHNOLOGY 14

15 HOW TO SECURE CLOUD COMPUTING 15

16 INTEL XEON PROCESSOR 16

17 UPEK FINGER PRINT READER SOFTWARE 17

Page 3: Patron : Dr.N.Raman M.B.A., M.Com., M.Phil., B.Ed.,PGDCA ... to Sep 2012-2013.pdf · All the risks to sensitive corporate data associated with outsourcing apply to cloud computing,

18 IPAD 18

19 iPhone 4s 19

20 PROCESSOR: WHAT TO EXPECT FROM CPU IN 2012 20

21 CLOUD COMPUTING STANDARD DEBASE HEATS UP WITH

CAMP FORMATION 21

22 ROBOTS CAN NOW LEARN AND UNDERSTAND NEW

PLACES 22

23 NEW ENCODING TO MAKE EMAILS HACKER PROOF 23

24 BLUETOOTH VERSIONS

24

Page 4: Patron : Dr.N.Raman M.B.A., M.Com., M.Phil., B.Ed.,PGDCA ... to Sep 2012-2013.pdf · All the risks to sensitive corporate data associated with outsourcing apply to cloud computing,

KONGU ARTS AND SCIENCE COLLEGE,ERODE.

DEPARTMENT OF COMPUTER TECHNOLOGY AND INFORMATION T ECHNOLOGY

IT BULLETIN DATE: 29.06.2012

GOOLGE NEXUS

Google Nexus 7

In a word, yes.the nexus 7 has elite features that make is not only great for its price, but

superb even when compared with very best tablets.

Packet inside are Components that

Its running the latest variation of android known as jellypean, which offer a clean and

simple interface that`s ideal for android beginners and hard core droiders alike. It brings a punch

of update including improved notification better voice such and smoother more battery

transitions. It also offer a new services called google, which aims to provide live, local

information based on your position and your habits. It “learns “ what you do and what you

search for, which the aim of providing information such a traffic update or your football team

source in it current state , it might not be a most impressive services, but its off to a good start

goolge is working and giving it lot more features. The nexus 7 is not just about the software

though. The inch tablet packs a high-definition screen, which make even small text and icons

look crisp and clear. If you hope to get through your favorites ebook on it, rest assured you`ll we

able to read for our without feeling strain. Its bright colorful too, making it great for renting

movies from the goolge play store are simply watching youtupe clips.

Under the hoot is a quat-core processor that gives the nexus 7 some serious power. My

benchmark test but the nexus performances along side the power house asus transformer prime,

which costs a whole lot more. It also beat the pricier 7 inch Samsung galxy tap 27.0 by a country

mile. With such a huge serving of power, it easily capable of tackling most tasks you can

through at it. Best of although , It comes with bargain basement price take of only 160.

Submitted By

S.Anjuka

II B.Sc(CT).

Page 5: Patron : Dr.N.Raman M.B.A., M.Com., M.Phil., B.Ed.,PGDCA ... to Sep 2012-2013.pdf · All the risks to sensitive corporate data associated with outsourcing apply to cloud computing,

KONGU ARTS AND SCIENCE COLLEGE,ERODE.

DEPARTMENT OF COMPUTER TECHNOLOGY AND INFORMATION T ECHNOLOGY

IT BULLETIN DATE:02.07.2012

A NEW FRONTIER

The tradition of science and technology (S &T) in india is over 5000 years old. A

renaissance was witnessed in the first half of the 20th century. The S&T infrastructure has grown

up from about Rs.10 million at the time independence in 1947 to Rs 30 billion. Significant

achievements have been made in the areas of nuclear and space science, electronics and defense.

The government is committed to making S*T an integral part of the socio-economic

development of the country.

India has the third largest scientific and technical manpower in the world:162 universites

award 4000 doctorates and 35000 post graduate degrees and the council of scientific and

industrial runs 40 research laboratories which have made some significant

achievements.”Param” the parallel super computer development by india.In the field of missile

launch technology, India is among the five top nations of the world.

Submitted By

R.Agalya

II B.Sc(IT).

Page 6: Patron : Dr.N.Raman M.B.A., M.Com., M.Phil., B.Ed.,PGDCA ... to Sep 2012-2013.pdf · All the risks to sensitive corporate data associated with outsourcing apply to cloud computing,

KONGU ARTS AND SCIENCE COLLEGE,ERODE.

DEPARTMENT OF COMPUTER TECHNOLOGY AND INFORMATION T ECHNOLOGY

IT BULLETIN DATE:03.07.2012

WINDOWS 8

Windows8 is a operating system produced by Microsoft for use on personal computers,

including home and business desktop,laptop,tablets and home theater PCs.

Development of this operating system started before the release of its predecessor in

2009. Its existence was first announced in Jan 2011 at consumer electronic show. During its

development and test phases, Microsoft released three pre-release version: Developer

preview(Sep 13,2011), Consumer preview(Feb 29,2012),and Release preview(May 31,2012).On

Aug 1, 2012,Windows 8 graduated from the development stage and was released to

manufacturing. Windows 8 is slated for general availability on Oct 26,2012.

Windows8 introduces significant changes to the operating system graphical user interface

and platform; such as a new interface design incorporating a new design language used by

Microsoft products, anew start screen to replace the start menu used by previous versions of

windows, a new online store that can be used to obtain new applications, along with a new

platform for apps that can provide what developers described as a ”fast and fluid” experience

with emphasis on touch screen input. Additional security features were also added to the

operating system, such as a build-in antivirus program and a secure boot feature on system with

UEFI firmware. Secure boot requires the operating system to be digitally signed to protect

malware from infecting the boot process. The implementation of this features has sparked

controversy among supporters of free software. Windows 8 also introduces an edition of the

operating system designed to run on devices that utilize the ARM architecture, Known as

Windows RT.

Submitted By

N.Arun Kumar

II B.Sc(CT).

Page 7: Patron : Dr.N.Raman M.B.A., M.Com., M.Phil., B.Ed.,PGDCA ... to Sep 2012-2013.pdf · All the risks to sensitive corporate data associated with outsourcing apply to cloud computing,

KONGU ARTS AND SCIENCE COLLEGE,ERODE.

DEPARTMENT OF COMPUTER TECHNOLOGY AND INFORMATION T ECHNOLOGY

IT BULLETIN DATE:26.07.2012

HOW TO SECURE CLOUD COMPUTING

Cloud computing is attractive, seductive and perhaps irresistible. The benefits are

compelling, particularly the pay-as-you-go model that has been linked to buying

electricity(or,if,you,prefer,buying your drinks by the glass rather than the bottle).

There is a powerful business case for buying computational power,disk

storage,collaboration,appliacation development resources,CRM on demand. Rather than buying

more servers and disks or expanding or deploying expensive infrastructure and programs,cloud

computing is flexible and scalable. It can meet short-term initiatives and requirements and deal

with peaks and valleys in business cycles.

But where does security fit into all this? Security analysts and practitioners generally say

proceed, but proceed with caution. All the risks to sensitive corporate data associated with

outsourcing apply to cloud computing, and then some. Enforcing security policy and meeting

compliance requirements and tough enough when you deal with third parties and their known or

unknown subcontractors, especially on a global scale. Add the blurry characteristics of the entry

of non-traditional vendors into the technology market, and some red flags go up. In an IDC

survey of 244 IT executives/CIOs published last fall,75 percent of the respondents cited security

as a significant or very significant challenge with cloud computing. Compare that with 63

percent cited for the next two concerns performance and availability.

Submitted By

J.Isakraja Karunya Prakash

II B.Sc(IT).

Page 8: Patron : Dr.N.Raman M.B.A., M.Com., M.Phil., B.Ed.,PGDCA ... to Sep 2012-2013.pdf · All the risks to sensitive corporate data associated with outsourcing apply to cloud computing,

KONGU ARTS AND SCIENCE COLLEGE,ERODE.

DEPARTMENT OF COMPUTER TECHNOLOGY AND INFORMATION T ECHNOLOGY

IT BULLETIN DATE:28.07.2012

TRANSCEND LAUNCHES 128GB CLASS 10 SDXC MEMORY CARD

With the latest source, Transcend information,Inc. has announced 128GB SDXC memory

card. Perfect for consumers who need vast storage space and high-speed performance.

Transcend`s new128GB ultimate series class 10SDXC cards boast an incredible amount of

storage capacity for extended full HD video recording and help improve camera response with

ultra fast transfer rates up to 22 MB/s.

Transcends SDCX cards provide an enormous 128GB of storage space. 128GB SDXC

card can store a full 32 hours of 1080p High-definition footage (phased on 1920*10809Mpps

H264 ABC compression) or over eight thousand high-definition mega pixel raw image(based on

14MP total size), eliminating the need to pause and switch memory cards during recording.

Sessions or photo shoots.Additialally, with the use of the exFACT fill the system that supports

file larger than 4GB, today`s professional photographers and videographers can enjoy prolonged

periods of purst- mode shooting and non stop 1080P HT or even 3D video recording.

Transcends ultimate 128GB SDXC cards fully comply with the SD 3.0 classes 10 speed

rating, with guarantees write speeds of at least 10 MP/s. This not only allows users of digital

single lens reflex cameras (DSLR ) and HD camcorders to easily capture fast-moving subjects in

stunning detail, but also greatly reduces wait time when copying, saving or uploading stord

content.

Submitted By

S.Divakar II B.Sc(CT).

Page 9: Patron : Dr.N.Raman M.B.A., M.Com., M.Phil., B.Ed.,PGDCA ... to Sep 2012-2013.pdf · All the risks to sensitive corporate data associated with outsourcing apply to cloud computing,

KONGU ARTS AND SCIENCE COLLEGE,ERODE.

DEPARTMENT OF COMPUTER TECHNOLOGY AND INFORMATION T ECHNOLOGY

IT BULLETIN DATE: 30.07.2012

UPEK FINGER PRINT READER SOFTWARE

Russian security firm ElcomSoft has posed a Blog Entry, courtesy of marketing director

Olga Koksharova, Claiming that UPEK software that was preloaded on laptop and others

computer to run hardware finger printer readers, has a huge security hole in it. In the blog enter,

Koksharova says her company has found that the UPEK code saves user passwords in the

windows registry in a “Barely scrambled” form, and thus is obviously not encrypted, meaning

those that gain physical access to the computer can very easily circumvent the fingerprint login

and Gain access to all user files.

UPEK software has been until recently, the leading supplier of preloaded software that

connects to hardware to allow users to swipe their finger over a device to gain access to a locked

computer rather than typing in a password. The ides is that it`s easier for users to swipe a finger

then to remember and enter sometimes long and complicated password. And until now, swiping

with a finger has been thought to be more secure than using a password because of the

uniqueness of finger print and the sometimes simple password that people use.

ElcomSoft is waring that all computers with UPEK software installed(and in use)rae at

risk,and user should take steps to have a passwords files to moved and software disabled. New

laptops are not at risk as UPEK was purchased by other company and now different

software(true suite ) is preinstalled on computer that come with finger print reading

software(which means most laptop). Elcomsoft says they tested a number of laptop and found

they where able to break into every one of them with relative ease due to the security hole

they`ve found. The note also that windows itself never stores passwords in plain text, with the

exception of machines that do not require a password for entry.

Submitted By

V.L Jayanth.

II B.Sc(IT).

Page 10: Patron : Dr.N.Raman M.B.A., M.Com., M.Phil., B.Ed.,PGDCA ... to Sep 2012-2013.pdf · All the risks to sensitive corporate data associated with outsourcing apply to cloud computing,

KONGU ARTS AND SCIENCE COLLEGE,ERODE.

DEPARTMENT OF COMPUTER TECHNOLOGY AND INFORMATION T ECHNOLOGY

IT BULLETIN DATE:03.08.2012

CLOUD COMPUTING STANDARD DEBASE HEATS UP WITH CAMP

FORMATION

• Email LinkedIn • Print Facebook • A Twitter • AA RSS • AAA Reprints

IT experts and cloud consumers understand the need for the cloud standards, but

standardization seems like an elusive possibility when the objectives of those standards remain

undefined. Cloud computing standards proponents, however, disagree.”For the cloud to operate,

to deliver on the promise, there absolutely has to be standard” said Andrew Watson, liaison for

cloud standards customer council are simply necessary for something like cloud.

The fear is that by standardizing the cloud, domainant vendors might lose customers.And

losing customers means losing business.

Cloud computing standards take shape

In a surprising move to improve interoperability and portability between public and

private clouds, seven cloud services providers took off their competitive gloves and formed

cloud application management for platform (CAMP) last week, the first platform as a services

(PaaS) management API.

Submitted By

A.Kannan

II B.Sc(IT).

Page 11: Patron : Dr.N.Raman M.B.A., M.Com., M.Phil., B.Ed.,PGDCA ... to Sep 2012-2013.pdf · All the risks to sensitive corporate data associated with outsourcing apply to cloud computing,

KONGU ARTS AND SCIENCE COLLEGE,ERODE.

DEPARTMENT OF COMPUTER TECHNOLOGY AND INFORMATION T ECHNOLOGY

IT BULLETIN DATE:13.07.2012

4G Technology:

Fourth generation communication technology is the next step for wireless communication system.This 4G system is 200 times faster than present 2G mobile data rates and 10 times faster than present 3G broadband mobile.The data rate for present 3G broadband mobile rate is 2 Mbit/sec, where as 2G mobile data rate is 9.6 kbit/sec.4G data rates and its merit:4G mobile data transmission rates are planned to be up to 20 megabits per second which means that it will be about 10-20 times faster than standard ASDL services.The main objectives of 4G are:1)4G will be a fully IP-based integrated system.

2)This will be capable of providing 100 Mbit/s and 1 Gbit/s speeds both indoors and outdoors.3)It can provide premium quality and high security.4)4G offer all types of services at an affordable cost.4G technology allow high-quality smooth video transmission. It will enable fast downloading of full-length songs or music pieces in real time.

New Operating System:

Windows is an world wide famous and realiable operating system for Computers.Microsoft launches its first widows operating system on 1985.Till now Microsoft presented various kind of windows operating system like windows 2000,Xp,Vista ..But In 2010 Microsoft totally going to change these concept by launching Cloud Based Operating System and rumors are there that MIDORI will be their first such operating system, which will replace Windows fully from computer map.

3D Processor Chip:

Scientist at University of Rochesterb have developed a new generation of Computer Processors. These processors are based on 3-Dimensional Circuits in contrary to 2-Dimensional Circuits of today.

This can be said as the next major advance in computer processors technology. The latest 3-D processor is running at 1.4 gigahertz in the labs of University.This design means that every tasks such as Synchronicity, Power Distribution, and Long-Distance Signaling are all fully functioning in three dimensions for the first time.

Page 12: Patron : Dr.N.Raman M.B.A., M.Com., M.Phil., B.Ed.,PGDCA ... to Sep 2012-2013.pdf · All the risks to sensitive corporate data associated with outsourcing apply to cloud computing,

KONGU ARTS AND SCIENCE COLLEGE,ERODE.

DEPARTMENT OF COMPUTER TECHNOLOGY AND INFORMATION T ECHNOLOGY

IT BULLETIN DATE:06.07.2012

ADVANTAGES OF NANOTECHNOLOGY

Nanotechnology can actually revolutionize a lot of electronic products, procedures, and

applications. The areas that benefit from the continued development of nanotechnology when it

comes to electronic products include nano transistors, nano diodes, OLED, plasma displays,

quantum computers, and many more.

Nanotechnology can also benefit the energy sector. The development of more effective

energy-producing, energy-absorbing, and energy storage products in smaller and more efficient

devices is possible with this technology. Such items like batteries, fuel cells, and solar cells can

be built smaller but can be made to be more effective with this technology.

Another industry that can benefit from nanotechnology is the manufacturing sector that

will need materials like nanotubes, aerogels, nano particles, and other similar items to produce

their products with. These materials are often stronger, more durable, and lighter than those that

are not produced with the help of nanotechnology.

In the medical world, nanotechnology is also seen as a boon since these can help with

creating what is called smart drugs. These help cure people faster and without the side effects

that other traditional drugs have. You will also find that the research of nanotechnology in

medicine is now focusing on areas like tissue regeneration, bone repair, immunity and even cures

for such ailments like cancer, diabetes, and other life threatening diseases.

Submitted by,

DHIVYA.T

II B.Sc(IT)

Page 13: Patron : Dr.N.Raman M.B.A., M.Com., M.Phil., B.Ed.,PGDCA ... to Sep 2012-2013.pdf · All the risks to sensitive corporate data associated with outsourcing apply to cloud computing,

KONGU ARTS AND SCIENCE COLLEGE,ERODE.

DEPARTMENT OF COMPUTER TECHNOLOGY AND INFORMATION T ECHNOLOGY

IT BULLETIN DATE:23.08.2012

ANDROID

Android is a Linux-based operating system designed primarily for touchscreen mobile

devices such as smartphones and tablet computers, developed by Google in conjunction with the

Open Handset Alliance. Android was Initially developed by Android Inc, whom Google

financially backed and later purchased in 2005. Android was unveiled in 2007 along with the

founding of the Open Handset Alliance, a consortium of 86 hardware, software, and

telecommunication companies devoted to advancing open standards for mobile devices.

Android, Inc. was founded in Palo Alto, California in October 2003 by Andy Rubin (co-

founder of Danger), Rich Miner (co-founder of Wildfire Communications, Inc.), Nick Sears

(once VP at T-Mobile),and Chris White (headed design and interface development at WebTV) to

develop, in Rubin's words "...smarter mobile devices that are more aware of its owner's location

and preferences." Despite the obvious past accomplishments of the founders and early

employees, Android Inc. operated secretly, revealing only that it was working on software for

mobile phones. That same year, Rubin ran out of money. Steve Perlman, a close friend of Rubin,

brought him $10,000 in cash in an envelope and refused a stake in the company.

The android open source project(ASOP) is led by google, and is tasked with the

maintenance and development of android. According to the project the goal of the android open

source project is to create a successful real world product that improves the mobile experience

for the end user. ASOP also maintains the android compatibility program, defining an developers

using the android SDK and NDK, to prevent incompatible android implementations. The

compatibility program is also optional and free of charge, with the compatibility test suite also

free and open source. Submitted by,

S.Bharath Kumar

II B.Sc(IT)

Page 14: Patron : Dr.N.Raman M.B.A., M.Com., M.Phil., B.Ed.,PGDCA ... to Sep 2012-2013.pdf · All the risks to sensitive corporate data associated with outsourcing apply to cloud computing,

KONGU ARTS AND SCIENCE COLLEGE,ERODE.

DEPARTMENT OF COMPUTER TECHNOLOGY AND INFORMATION T ECHNOLOGY

IT BULLETIN DATE:11.07.2012

IPHONE 5

The iPhone 5 is a touchscreen-based smartphone developed by Apple. It is the sixth

iteration in the iPhone series succeeding the iPhone 4S. The phone is a slimmer, lighter model

that introduces a higher-resolution, 4-inch screen to the series with 16:9 widescreen aspect ratio

support. The phone also includes a custom-designed ARMv7 processor called the Apple A6, an

update to Apple's mobile operating system known as iOS 6, and support for LTE.

Apple held an event to formally introduce the phone on September 12, 2012. After Apple

began taking pre-orders on September 14, 2012, over two million were received within 24 hours.

Initial demand for the iPhone 5 exceeded the supply available at launch on September 21, 2012,

and has been described by Apple as "extraordinary", with pre-orders having sold twenty times

faster than its predecessors.

While reception to the iPhone 5 has been generally positive, the new Maps application

has been negatively received and was reported to contain many serious errors. Several hardware

issues have also received criticism from consumers and reviewers, including an unintended

purple hue in photos taken by the iPhone 5 and an issue with its coating being prone to chipping.

In addition, there have been a small number of reports claiming a light leak around the bezel near

the top of display on white models.[16] Also, some incompatibilities with certain LTE networks

are an issue, despite being the first Apple phone to support LTE.

Submitted by,

S.Baskar

II B.Sc(CT)

Page 15: Patron : Dr.N.Raman M.B.A., M.Com., M.Phil., B.Ed.,PGDCA ... to Sep 2012-2013.pdf · All the risks to sensitive corporate data associated with outsourcing apply to cloud computing,

KONGU ARTS AND SCIENCE COLLEGE,ERODE.

DEPARTMENT OF COMPUTER TECHNOLOGY AND INFORMATION T ECHNOLOGY

IT BULLETIN DATE:16.07.2012

GREEN COMPUTING

Green computing is the environmentally sustainable computing or IT. In the article

Harnessing Green IT: Principles and Practices, San Murugesan defines the field of green

computing as "the study and practice of designing, manufacturing, using, and disposing of

computers, servers, and associated subsystems—such as monitors, printers, storage devices, and

networking and communications systems — efficiently and effectively with minimal or no

impact on the environment." The goals of green computing are similar to green chemistry;

reduce the use of hazardous materials, maximize energy efficiency during the product's lifetime,

and promote the recyclability or biodegradability of defunct products and factory waste.

Industry

• Climate Savers Computing Initiative (CSCI) is an effort to reduce the electric power consumption

of PCs in active and inactive states.[9] The CSCI provides a catalog of green products from its

member organizations, and information for reducing PC power consumption. It was started on

2007-06-12. The name stems from the World Wildlife Fund's Climate Savers program, which

was launched in 1999.[10] The WWF is also a member of the Computing Initiative.[9]

• The Green Electronics Council offers the Electronic Product Environmental Assessment Tool

(EPEAT) to assist in the purchase of "greener" computing systems. The Council evaluates

computing equipment on 51 criteria - 23 required and 28 optional - that measure a product's

efficiency and sustainability attributes. Products are rated Gold, Silver, or Bronze, depending on

how many optional criteria they meet. On 2007-01-24, President George W. Bush issued

Executive Order 13423, which requires all United States Federal agencies to use EPEAT when

purchasing computer systems.

Submitted by,

C.Gowsalya

II B.Sc(IT)

Page 16: Patron : Dr.N.Raman M.B.A., M.Com., M.Phil., B.Ed.,PGDCA ... to Sep 2012-2013.pdf · All the risks to sensitive corporate data associated with outsourcing apply to cloud computing,

KONGU ARTS AND SCIENCE COLLEGE,ERODE.

DEPARTMENT OF COMPUTER TECHNOLOGY AND INFORMATION T ECHNOLOGY

IT BULLETIN DATE:18.07.2012

ANDROID 4.1, JELLY BEAN

Android 4.1, Jelly Bean, is the fastest and smoothest version of Android yet. Jelly Bean improves

on the simplicity and beauty of Android 4.0, and introduces a new Google search experience on

Android.

• Everything in Jelly Bean feels fast, fluid, and smooth. Moving between home screens and

switching between apps is effortless, like turning pages in a book.

• Jelly Bean features improved performance throughout the system, including faster

orientation changes, faster responses when switching between recent apps, and smoother

and more consistent rendering across the system through vsync and triple buffering.

• Jelly Bean has more reactive and uniform touch responses, and makes your device even

more responsive by boosting your device's CPU instantly when you touch the screen, and

turns it down when you don't need it to improve battery life.

Accessibility

• With Jelly Bean, blind users can use 'Gesture Mode' to reliably navigate the UI using touch and

swipe gestures in combination with speech output.

• With the new accessibility focus feature, you can move a cursor between controls to maintain a

target for the next action or a source for the next navigation event. You can double tap anywhere

to launch the current item with accessibility focus.

• Text traversal in accessibility now gives you more control – choose to move between pages,

paragraphs, lines, words or characters.

• TalkBack, a screenreader for Android, now supports gestures to trigger actions, to navigate

applications, and traverse text.

Submitted By,

Haritha.K

II B.Sc(IT)

Page 17: Patron : Dr.N.Raman M.B.A., M.Com., M.Phil., B.Ed.,PGDCA ... to Sep 2012-2013.pdf · All the risks to sensitive corporate data associated with outsourcing apply to cloud computing,

KONGU ARTS AND SCIENCE COLLEGE,ERODE.

DEPARTMENT OF COMPUTER TECHNOLOGY AND INFORMATION T ECHNOLOGY

IT BULLETIN DATE:19.07.2012

GREEN COMPUTING

Green computing is the environmentally responsible use of computers and related

resources. Such practices include the implementation of energy-efficient central processing units

(CPUs), servers and peripherals as well as reduced resource consumption and proper disposal of

electronic waste (e-waste).

One of the earliest initiatives toward green computing in the United States was the

voluntary labeling program known as Energy Star. It was conceived by the Environmental

Protection Agency (EPA) in 1992 to promote energy efficiency in hardware of all kinds. The

Energy Star label became a common sight, especially in notebook computers and displays.

Similar programs have been adopted in Europe and Asia.

Government regulation, however well-intentioned, is only part of an overall green computing

philosophy. The work habits of computer users and businesses can be modified to minimize

adverse impact on the global environment. Here are some steps that can be taken:

• Power-down the CPU and all peripherals during extended periods of inactivity.

• Try to do computer-related tasks during contiguous, intensive blocks of time, leaving

hardware off at other times.

• Power-up and power-down energy-intensive peripherals such as laser printers according

to need.

• Use liquid-crystal-display (LCD) monitors rather than cathode-ray-tube (CRT) monitors.

• Use notebook computers rather than desktop computers whenever possible.

Submitted By

C.Bharani

II B.Sc(CT)

Page 18: Patron : Dr.N.Raman M.B.A., M.Com., M.Phil., B.Ed.,PGDCA ... to Sep 2012-2013.pdf · All the risks to sensitive corporate data associated with outsourcing apply to cloud computing,

KONGU ARTS AND SCIENCE COLLEGE,ERODE.

DEPARTMENT OF COMPUTER TECHNOLOGY AND INFORMATION T ECHNOLOGY

IT BULLETIN DATE:20.07.2012

STEVE JOBS AFFECTS ON MARKET VALUE OF APPLE

FOR IMMEDIATE RELEASE — Technoreporter.com (Press Release) – Nov 04, 2011

-Steve Jobs, died recently. We all know that, but we do not know what will happen with the

market value of Apple after the death of Steve Jobs.

Apple is a technology company that has the largest market value since 1999 after beat

Microsoft from throne of market. The victory of Apple is long enough, about 12 years. Wow! Its

amazing! FactSet Research Based on Friday’s close (30/09/2011), Apple’s market value reached

362 billion U.S. dollars. Ranked second was IBM with 208.84 billion U.S. dollars, as well as the

Microsoft of 208.54 billion U.S. dollars.

No doubt that Steve Jobs is the central figure at Apple, but Mark Gongloff (market

analysts) has argued that the death of Steve Jobs less impact on Apple’s market value changes.

Mark Gongloff in his blog, MarketBeat in The Wall Street Journal Online, argued that investors

had anticipated in its own way as the title of CEO Steve Jobs gave to Tim Cook, the end of

August 2011.

Facts prove when Steve Jobs back from Apple, the company’s stock did not fall and instead

create a new record for the increase. But in a few weeks later, it turns out Apple’s stock slumped,

making all parties miss on Steve Jobs.

Author is freelancer technical writer and writing for Oracle Database Services, Oracle

DBA Interview Questions and also editor in Overce Web Directory with Free Web Directory and

Oracle DBA Forums.

Submitted by, N.Abinaya,

II B.Sc(CT)

Page 19: Patron : Dr.N.Raman M.B.A., M.Com., M.Phil., B.Ed.,PGDCA ... to Sep 2012-2013.pdf · All the risks to sensitive corporate data associated with outsourcing apply to cloud computing,

KONGU ARTS AND SCIENCE COLLEGE,ERODE.

DEPARTMENT OF COMPUTER TECHNOLOGY AND INFORMATION T ECHNOLOGY

IT BULLETIN DATE:17.07.2012

INFOPARK KOCHI

Infopark, Kochi is an information technology park situated in Kakkanad, a suburb of the

city of Kochi, India. Established in 2004 by the Government of Kerala, Infopark Phase I is

spread over a 100 acres (40.5 ha) campus with more than 3,200,000 sq ft (297,300 m2) of built

up area,[2] housing over 80 companies which employ around 17,000 people.[3] The park is

currently in expansion mode and is adding another 160 acres (64.7 ha) as part of the Phase II

expansion. The notable companies in the park include TCS, Cognizant, Wipro, Ernst & Young,

Arbitron, Etisalat DB Telecom, IBS Software Services, UST Global, EXL Service and Xerox

ACS to name a few.

Revenue & Growth

Over the last few years revenues from Infopark has been growing at an impressive rate.

In FY 2008-2009 the park reported a growth of 87% to 463 crore. Infopark has registered

almost a four-fold growth in software exports during the last five years. The total exports from

the park in FY 2010-2011 was 900 crores. The software exports from Infopark is expected to

touch Rs 1,300 crore in 2012. The IT park which is just seven years old has shown tremendous

growth in the number of companies and software exports than any other park in the state. Kochi

offers good opportunities for companies keen on reducing operational costs, hiring talented

professionals, and reducing the rate of attrition.Apart from the built-up space for IT, Infopark

plans to have a large business convention centre, budget hotels, shopping complexes,

commercial centers, recreation and entertainment facilities. Infrastructure development is

ongoing

Submitted by,

M.Bharani Babu

II B.Sc(CT)

Page 20: Patron : Dr.N.Raman M.B.A., M.Com., M.Phil., B.Ed.,PGDCA ... to Sep 2012-2013.pdf · All the risks to sensitive corporate data associated with outsourcing apply to cloud computing,

KONGU ARTS AND SCIENCE COLLEGE,ERODE.

DEPARTMENT OF COMPUTER TECHNOLOGY AND INFORMATION T ECHNOLOGY

IT BULLETIN DATE:20.07.2012

QUANTUM COMPUTER USING MICROWAVE TECHNOLOGY

Scientist has got success in linking the quantum properties of two separated ions using

microwaves to manipulate them. This is currently done with the help of laser beams and now this

advancement can shrink the size of quantum computers. This research has been done at NIST

(National Institute of Standards and Technology) which has been published in Nature.

Microwaves have been used previously in manipulating single ions, but this is the first

time when scientist from NIST used this on two separated ions places just 30 micrometers away.

This kind of process give rise to a quantum mechanism which is crucial for information

transportation and error correction in Quantum computers.

The mentioned experiment use desktop scale table of lasers and very small mirrors and

lenses that are around 1/10 th of the sizes that are actually used these days. Microwave

components can be easily expanded to make a practical quantum computer system. Also by

using microwaves they were able to reduce errors that are however caused by using laser beams

due to incorrect pointing issues and power.

Scientist Dietrich Leibfried said that it may be possible to have a quantum computer of a

size of smart phone in near future. More powerful quantum computer can be made up to a size of

Desktop PC.

Submitted by,

R.Hemalatha

II B.Sc(IT)

Page 21: Patron : Dr.N.Raman M.B.A., M.Com., M.Phil., B.Ed.,PGDCA ... to Sep 2012-2013.pdf · All the risks to sensitive corporate data associated with outsourcing apply to cloud computing,

KONGU ARTS AND SCIENCE COLLEGE,ERODE.

DEPARTMENT OF COMPUTER TECHNOLOGY AND INFORMATION T ECHNOLOGY

IT BULLETIN DATE:13.08.2012

ROBOTS CAN NOW LEARN AND UNDERSTAND NEW PLACES

If the current research of Dr. Ashutosh Saxena of Cornell’s Personal Robotics Laboratory

becomes successful then Robots of future will learn to manipulate objects and will develop the

ability of generalization. This learning procedure will help Robots to adapt according to new

environments.

The main theory behind this is the use of machine learning programming which leads to

observation of events by Robots and find commonalities. For an example a robot will see

different cups, learn the common characteristics of cups and will then identify cups in future no

matter what size and shape they will have. This kind of process will also teach robots to handle

cups correctly.

According to Saxsena, these new robots would be able to make decisions like how to

place cups on different places. Like a cup will be placed upright on table while upside down in

dishwasher. Robots will get training of placing strategies and will be able to apply then on other

objects by the process of generalization.

In testing process scientists placed different things like a plate, mug, glass, bowl, spoon

and some other objects at different surfaces like on flat surface, hook, stemware holder etc.

Robots then tested the suitable locations for placement of these objects after studying the

environment and gave priority to best locations to place an object.After such training Robot

placed objects 98% correct at previously seen environment and objects. This accuracy was 95%

for new objects and environments and that can be improved further by longer periods of training.

Submitted By,

M.Latha

B.Sc(IT)

Page 22: Patron : Dr.N.Raman M.B.A., M.Com., M.Phil., B.Ed.,PGDCA ... to Sep 2012-2013.pdf · All the risks to sensitive corporate data associated with outsourcing apply to cloud computing,

KONGU ARTS AND SCIENCE COLLEGE,ERODE.

DEPARTMENT OF COMPUTER TECHNOLOGY AND INFORMATION T ECHNOLOGY

IT BULLETIN DATE:23.07.2012

4G MOBILE TECHNOLOGY

The mobile communications comprise two steps: access to the mobile network, and

access to the mobile services. Traditionally, these two steps are all controlled by one operator in

a closed and proprietary way. In the 4G mobile era, the access to the mobile services will be

evolved to an open Mobile Cloud so that it is fully open to any developers and providers. In this

way, any non-wireless industries, such as Google, Microsoft, Oracle, SAP, GM, Bank of

America can provide services for their mobile users. The access to the mobile network is still

controlled by the traditional wireless operators such as AT&T, Verizon, T-Mobile and China

Mobile. Of course, the operators are very reluctant to go this trend, but for the mobile users and

for the future global movement, it is just a matter of time to do it.

The mobile device system architecture will be open in order to converge multiple RTTs

(radio transmission technologies) in one same device. Same as laptop computer, the future

Smartphone will be based on open wireless architecture (OWA) technology which means, when

you change the wireless standards, you do not need to change phone. It is totally different from

current multi-standards phone which is in closed system architecture, and users can not remove

the unused RTT modules and basically can not do anything on the mobile phone system. In the

OWA system, you can just change RTT card in your Smartphone to switch your wireless

standards, or you can integrate multiple wireless standards in one RTT SIM card. Based on this

OWA platform, you can integrate home phone, office phone and mobile phone into one common

Personal device - it is more beyond just a phone. In fact, this 4G mobile device is a system to

bring the world to your hand, or we call it iHand - the World in Hand, which is more better than

calling it an iPhone.

Submitted By,

A.S.Abbas Mandhir

II B.Sc(IT)

Page 23: Patron : Dr.N.Raman M.B.A., M.Com., M.Phil., B.Ed.,PGDCA ... to Sep 2012-2013.pdf · All the risks to sensitive corporate data associated with outsourcing apply to cloud computing,

KONGU ARTS AND SCIENCE COLLEGE,ERODE.

DEPARTMENT OF COMPUTER TECHNOLOGY AND INFORMATION T ECHNOLOGY

IT BULLETIN DATE:24.07.2012

4G WIRELESS TECHNOLOGY

Based on the study, 4G mobile technology is in a determining and standardization stage.

Although 4G wireless technology offers higher data rates and the ability to roam across multiple

heterogeneous wireless networks, several issues require further research and development. Since

4G is still in the cloud of the sensible standards creation, ITU and IEEE form several task forces

to work on the possible completion for the 4G mobile standards as well. 3GPP LTE is an

evolution standard from UMTS, and WiMAX is another candidate from IEEE. These

technologies have different characteristics and try to meet 4G characteristics to become a leading

technology in the future market. Under these circumstances, this paper will present about the

current trends and its underlying technologies to implement the 4G mobile technology. This

paper also shows some of the possible scenarios that will benefit the 4th generation technology.

In a world of fast changing technology, there is a rising requirement for people to

communicate and get connected with each other and have appropriate and timely access to

information regardless of the location of the each individuals or the information. The increasing

demands and requirements for wireless communication systems ubiquity have led to the need for

a better understanding of fundamental issues in communication theory and electromagnetic and

their implications for the design of highly-capable wireless systems. In continuous development

of mobile environments, the major service providers in the wireless market kept on monitoring

the growths of 4th generation (4G) mobile technology. 2G and 3G are well-established as the

mainstream mobile technology around the world. 3G is stumbling to obtain market share for a

different reasons and 4G is achieving some confidence.

Submitted By,

S.Indhumathi

II B.Sc(IT)

Page 24: Patron : Dr.N.Raman M.B.A., M.Com., M.Phil., B.Ed.,PGDCA ... to Sep 2012-2013.pdf · All the risks to sensitive corporate data associated with outsourcing apply to cloud computing,

KONGU ARTS AND SCIENCE COLLEGE,ERODE.

DEPARTMENT OF COMPUTER TECHNOLOGY AND INFORMATION T ECHNOLOGY

IT BULLETIN DATE:27.07.2012

INTEL XEON PROCESSOR

Source: Performance comparison using geometric mean of SPECint*_rate_base2006,

SPECfp*_rate_base2006, STREAM*_MP Triad, and Linpack* benchmark results. Baseline

geometric mean score of 166.75 on previous-generation 2S Intel® Xeon® processor X5690

platform based on best published SPECrate* scores to www.spec.org and best Intel internal

measurements on STREAM*_MP Triad and Linpack as of December 5, 2011. New geometric

mean score of 306.74 based on Intel internal measured estimates using an Intel platform with two

Intel® Xeon® processor E5-2690, Intel® Turbo Boost Technology and Enhanced Intel

SpeedStep® Technology enabled, with Intel® Hyper-Threading Technology (Intel® HT

Technology), 128 GB RAM, Red Hat* Enterprise Linux* Server 6.1 beta for x86_6, Intel®

Compiler 12.1, THP disabled for SPECfp*_rate_base2006 and THP enabled for

SPECint*_rate_base2006. 2. Software and workloads used in performance tests may have been

optimized for performance only on Intel microprocessors. Performance tests, such as SYSmark

and MobileMark, are measured using specific computer systems, components, software,

operations, and functions. Any change to any of those factors may cause the results to vary.

You should consult other information and performance tests to assist you in fully

evaluating your contemplated purchases, including the performance of that product when

combined with other products. 3. Intel measurements of average time for an I/O device read to

local system memory under idle conditions. Improvement compares Intel® Xeon® processor

E5-2600 product family (230 ns) vs. Intel Xeon processor 5500 series (340 ns). Baseline

Configuration: An Intel system with two Intel® Xeon processor E5520 (2.26GHz, 4C), 12GB

memory @ 1333, C-States disabled, Intel® Turbo Boost Technology disabled, SMT disabled,

Rubicon* PCIe* 2.0 x8. Submitted By

S.Chanrasekar

II B.Sc(CT)

Page 25: Patron : Dr.N.Raman M.B.A., M.Com., M.Phil., B.Ed.,PGDCA ... to Sep 2012-2013.pdf · All the risks to sensitive corporate data associated with outsourcing apply to cloud computing,

KONGU ARTS AND SCIENCE COLLEGE,ERODE.

DEPARTMENT OF COMPUTER TECHNOLOGY AND INFORMATION T ECHNOLOGY

IT BULLETIN DATE:31.07.2012

IPAD

The iPad (EYE-pad) is a line of tablet computers designed and marketed by Apple Inc.

The iPad runs Apple's iOS operating system. The first iPad was released on April 3, 2010; the

most recent iPads, the fourth-generation iPad and iPad Mini, are expected to ship on November

2, 2012. The user interface is built around the device's multi-touch screen, including a virtual

keyboard rather than a physical one. The iPad has Wi-Fi and cellular connectivity (2G, 3G and

4G (third and fourth generations and iPad Mini only)).

An iPad can shoot video, take photos, play music, send and receive email, and browse the

web. Other functions—games, reference, GPS navigation, social networking, etc.—can be

enabled by downloading apps; as of 2012, the App Store offered more than 700,000 apps by

Apple and third parties.There are five generations of iPad models, each accompanied by one of

the six major releases of iOS: the original, the iPad 2, the third-generation iPad, the fourth-

generation iPad, and the iPad Mini.

iPad Mini

On October 23 2012, Apple announced a smaller version of the iPad. With a screen

measuring 7.9 inches, it is aimed at the emerging sector of smaller tablets such as the Kindle

Fire. The hardware of the new iPad Mini is similar to the iPad 2, with a 1024 by 768 pixel

resolution screen, and with a dual core A5 processor, but 53% lighter and 7.2mm thick. It is

scheduled to be released on November 2, in 16GB, 32GB, and 64GB capacities. There are both

WiFi and 4G versions, starting at $329 and $459 respectively

Submitted By

D.Chitra

II B.Sc(CT)

Page 26: Patron : Dr.N.Raman M.B.A., M.Com., M.Phil., B.Ed.,PGDCA ... to Sep 2012-2013.pdf · All the risks to sensitive corporate data associated with outsourcing apply to cloud computing,

KONGU ARTS AND SCIENCE COLLEGE,ERODE.

DEPARTMENT OF COMPUTER TECHNOLOGY AND INFORMATION T ECHNOLOGY

IT BULLETIN DATE:2.08.2012

iPhone 4s

The iPhone 4S is a touchscreen-based smartphone developed by Apple Inc. It is the fifth

generation of the iPhone[5], succeeding the iPhone 4, and was announced on October 4, 2011. It

became available for pre-order on October 7, 2011 in seven initial countries (United States,

Canada, Australia, United Kingdom, France, Germany and Japan) with the first delivery date set

for October 14, 2011, and available on that same day for direct in-store sales in those countries.

It was released in 22 more countries, including Ireland, Mexico, and Singapore, on October 28.[6]

The phone retains the exterior design of its predecessor, but hosts improved hardware

specifications and software updates.[7] It added a voice recognition system known as Siri from

which the "4S" designator came,[8] and a cloud storage service named iCloud. Some of the

device's functions may be voice-controlled through Siri. The phone is available for 100 cell

service carriers in 70 countries, including eight carriers in the United States.[9][10] For US

customers, unlocked (contract-free) sales started on November 11, 2011.[11][12] The Associated

Press said that AT&T described early iPhone 4S demand as "extraordinary".[13] Reception to the

iPhone 4S was generally favorable. Reviewers noted Siri, the new camera, and processing speeds

as significant advantages over the prior model.[14][15][16] Four million units of the iPhone 4S were

sold in the first three days of release.

The iPhone 4S uses iOS, Apple's mobile operating system.[31] The user interface of iOS is

based on the concept of direct manipulation, using multi-touch gestures. Interface control

elements consist of sliders, switches, and buttons. The response to user input is immediate and

provides a fluid interface.

Submitted By

M.Deepika

II B.Sc(CT)

Page 27: Patron : Dr.N.Raman M.B.A., M.Com., M.Phil., B.Ed.,PGDCA ... to Sep 2012-2013.pdf · All the risks to sensitive corporate data associated with outsourcing apply to cloud computing,

KONGU ARTS AND SCIENCE COLLEGE,ERODE.

DEPARTMENT OF COMPUTER TECHNOLOGY AND INFORMATION T ECHNOLOGY

IT BULLETIN DATE:3.08.2012

PROCESSOR: WHAT TO EXPECT FROM CPU IN 2012

As the brains of most every modern computing gadget, the central processing unit or

CPU is an indispensable part of every desktop, laptop, phone, or tablet. The processor crunches

the numbers and assigns the tasks, and it's one of the chief pieces of hardware that determine

how thick your laptop is or how long your phone’s battery will last.

Every year, these slabs of silicon get smaller, stronger, and more energy-efficient. That’s

good news for gadget mavens, as devices become faster, lighter, and generally more impressive

as a result. Next year will be no exception. In this article, I’ll look at what’s expected from Intel,

AMD, and Nvidia. It’s a bit too soon to tell how things will shake out--expect big

announcements from the CES tech trade show in January--but I’ll try to fill in some of the

blanks.In the desktop and laptop markets, there are two major players: Intel and AMD. Of the

two, Intel has gained more traction this year, bringing a number of powerful, popular

components to market--with the promise of much more to come in the next year.

Intel operates on what it calls a “tick-tock” cycle. With every "tick," Intel introduces a

new manufacturing process. In 2010, Intel’s “Clarkdale” desktop processors reduced the

company’s Nehalem microarchitecture to 32 nanometers, delivering improved performance and

energy savings. With every "tock," Intel introduces a new microarchitecture. In 2011, we got

Sandy Bridge CPUs, which deliver superior performance to their Clarkdale predecessors while

cutting power costs and improving the integrated graphics performance.

Submitted By

D.Kiruthika

II B.Sc(IT)

Page 28: Patron : Dr.N.Raman M.B.A., M.Com., M.Phil., B.Ed.,PGDCA ... to Sep 2012-2013.pdf · All the risks to sensitive corporate data associated with outsourcing apply to cloud computing,

KONGU ARTS AND SCIENCE COLLEGE,ERODE.

DEPARTMENT OF COMPUTER TECHNOLOGY AND INFORMATION T ECHNOLOGY

IT BULLETIN DATE:7.08.2012

NEW ENCODING TO MAKE EMAILS HACKER PROOF

Computer scientists Duncan Wong and Xiaojian Tian of City University of Hong Kong,

explain how previous researchers had attempted to define perfect email privacy that utilizes PGP

by developing a technique that would preclude the decryption of other emails should a private

key be compromised, the International Journal of Security and Networks reports.

Unfortunately, say Wong and Tian, this definition fails if one allows the possibility that

the email server itself may be compromised by hackers or other malicious users, according to a

Hong Kong statement.

The team has now defined perfect forward secrecy for email as follows and suggested a

technical solution to enable email security to be independent of the server used to send the

message.

"An e-mail system provides perfect forward secrecy if any third party, including the e-

mail server, cannot recover previous session keys between the sender and the recipient even if

the long-term secret keys of the sender and the recipient are compromised," suggest Wong and

Tian.

The server creates a random session "hash" that is then used to encrypt the actual

encryption key for the email Alice is about to send. Meanwhile, Bob as putative recipient

receives the key used to create the hash and bounces back an identification tag. This allows Alice

and Bob to verify each other's identity.

Submitted By

R.Kowsalya

II B.Sc(IT)

Page 29: Patron : Dr.N.Raman M.B.A., M.Com., M.Phil., B.Ed.,PGDCA ... to Sep 2012-2013.pdf · All the risks to sensitive corporate data associated with outsourcing apply to cloud computing,

KONGU ARTS AND SCIENCE COLLEGE,ERODE.

DEPARTMENT OF COMPUTER TECHNOLOGY AND INFORMATION T ECHNOLOGY

IT BULLETIN DATE:21.08.2012

Bluetooth Versions

Bluetooth Specification Version 1.1 and Earlier

Several Bluetooth specification versions have been released since Bluetooth technology was introduced in 1998.

Versions 1.0 and 1.0B had too many problems and restraints for manufacturers to successfully develop Bluetooth devices. The main issue was the lack of interoperability among devices.

The Bluetooth Core Specification version 1.1 is the first truly successful operating version of Bluetooth technology. Bluetooth 1.1 corrected many of the problems found in the earlier versions. As a result: Devices using Bluetooth 1.1 have much greater interoperability.

Bluetooth Version 1.2

Many new Bluetooth devices, like the latest cell phones, are being sold with the newer Bluetooth specification version 1.2. So, what new features/benefits does Bluetooth 1.2 offer?

• Backward compatible with Bluetooth 1.1 • Adaptive Frequency Hopping - helps reduce radio interference by eliminating the use of

crowded frequencies in the hopping sequence • Faster transmission speeds (1 Mbps) • Extended Synchronous Connections Oriented links - improves voice quality of audio

connections by enabling retransmissions of corrupted data. • Received Signal Strength Indicator • Host Controller Interface (HCI) support for 3-wire UART • HCI access to timing information for Bluetooth applications

Bluetooth Version 2.0 + EDR (Enhanced Data Rate) There may be multiple communication technologies, but they all share one thing in common: Faster is better. The Bluetooth SIG realized this, and worked on improving the speeds of Bluetooth version 1.2. Bluetooth version 2.0 + EDR was announced by the Bluetooth SIG in June 2004 and began appearing in Bluetooth devices in late 2005.

Bluetooth version 2.0 + EDR delivers data transfer rates up to three times faster than the original Bluetooth specification. Bluetooth version 2.0 + EDR also provides enhanced multiple-connectivity. With Bluetooth 2.0 + EDR, users will be able to more efficiently run multiple

Page 30: Patron : Dr.N.Raman M.B.A., M.Com., M.Phil., B.Ed.,PGDCA ... to Sep 2012-2013.pdf · All the risks to sensitive corporate data associated with outsourcing apply to cloud computing,

Bluetooth devices at the same time. As a result, Bluetooth Personal-Area Networks (PAN) or Piconets will become more common.

Computers and computer related devices have been some of the 1st devices to use Bluetooth 2.0 + EDR, while audio and imaging devices are expected to follow shortly. Sony announced it will use Bluetooth 2.0 + EDR in its new PlayStation 3. The PlayStation 3 will reportedly use it for the wireless controllers.

Here is a listing of the main enhancements/features you will find with Bluetooth Specification Version 2.0 + EDR:

• Backward compatible with previous Bluetooth versions • Three times faster transmission speed (10 times in some cases) • Enhanced data rate of up to 3 Mbps • Lower power consumption due to reduced duty cycles • Broadcast/multicast support • Simplification of multi-link scenarios due to more available bandwidth • Distributed media-access control protocols • Further improved Bit Error Rate performance

Bluetooth Version 2.1 + EDR (Enhanced Data Rate)

Enhancements with Bluetooth Core Version 2.1 + EDR include:

• Improved Pairing • Enhanced Power Optimization

Bluetooth Version 3.0 + HS (High Speed)

Consumer devices using Bluetooth Version 3.0 + HS will take advantage of higher data rates utilizing the 802.11 radio while still maintaining the classic Bluetooth interface. With Version 3.0, high speed will no longer require an established network architechure.

There are two key features that consumers will benefit from Bluetooth 3.0 + HS:

• Unicast Connectionless Data - lowers latency and provides faster more reliable experiences

• Enhanced Power Control - ensures less dropouts; a common complaint amount Bluetooth users

Submitted By,

S.Manivasagam,

II - B.Sc (IT).