erode 638 107. p.g. department of computer ...taiwanese consumer electronics vendor benq plans to...
TRANSCRIPT
1
KONGU ARTS AND SCIENCE COLLEGE
ERODE – 638 107.
P.G. DEPARTMENT OF COMPUTER SCIENCE
MCA – News Bulletin (2010-2011)
EDITORIAL BOARD
PATRON : A.VENKADACHALAM B.Sc., Correspondent.
CONVENER : Dr. N.RAMAN MBA., M.Com., M.Phil., B.Ed.,PGDCA Principal
ADVISOR : Ms. D. GAYATHRI DEVI M.C.A., M.Phil. Prof. and Head.
COORDINATOR
& : Ms. B. JAYANTHI M.C.A., M.Phil., Associate Professor
EDITOR
STUDENT EDITORS
1. S.BAGAVATHSINGH - II - M.C.A
2. R.SAMPATHKUMAR - II - M.C.A
3. G.ARUNKUMAR –I MCA
4. K.SANKAR – I MCA
2
News Bulletin
(2010-2011)
3
S.NO DATE PARTICULARS P.NO
1. 29.12.2010 COMPUTER ASSISTED TRANSLATION 7
2. 29.12.2010 KEY FEATURES AND BENEFITS OF BIT
DEFENDER ANTIVIRUS 2010 8
3. 30.12.2010 COMPUTER BASED TRAINING 9
4. 30.12.2010 INTEL® CORE™ I7 PROCESSOR
FEATURES AND BENEFITS 10
5. 31.12.2010 MICROSOFT CONFIRMS CRITICAL IE
BUG,WORKS ON FIX 11
6. 31.12.2010 LINUX 12
7. 03.01.2011
BENQ TO LANUCH R100 TABLET PC IN
EARLY 2011 13
8. 03.01.2011
BEAST TROJAN- MOST DANGEROUS
COMPUTER VIRUS 14
9. 04.01.2011 IT NEWS 15
10. 04.01.2011 FACE BOOK PASSES GOOGLE AS MOST
VISITED SITE OF 2010 16
11. 05.01.2011
LA CINEMA RUGGED HARD DRIVE
CONNECTS TO TV 17
12. 05.01.2011 FEATURES OF SOUND TECHNOLOGY 18
13. 06.01.2011
THE IPHONE AND IPOD COULD SOON
HIT VERIZON WITH 4G 19
4
14. 06.01.2011 MICROSOFT PROTOCOLS 20
15. 08.01.2011 SHORTCUT KEYS 21
16. 08.01.2011 GRID COMPUTING 22
17. 10.01.2011 SMTP SERVER 23
18. 10.01.2011 TYPES OF SERVER 24
19. 11.01.2011 BANG, THERE GOES YOUR iPOD! 25
20. 11.01.2011 JAVA CARD 26
21. 12.01.2011 COMPANY PROFILE 27
22. 12.01.2011 ABOUT WIKILEAKS 28
23. 18.01.2011 TCS PROFILE 29
24. 18.01.2011 WIKILEAKS 30
25. 19.01.2011 COMPRO LANCHES NETWORK CAMERA 31
26. 19.01.2010 AIRBORNE INTERNET 32
27. 20.01.2011 ANDROID 3.0 33
28. 20.01.2011 BUBBLE SENSING 34
29. 21.01.2011 SKY X TECHNOLOGY 35
30. 21.01.2011
INFRASECURE
SOFTWARE TO CUT PC POWER 36
31. 22.01.2011 CLOUD COMPUTING 37
32. 22.01.2011 ABOUT CLOUD COMPUTING 38
5
33. 24.01.2011 POWER MACINTOSH G3 39
34. 24.01.2011 TOSHIBA CANVIO 3.0 PORTABLE
DRIVES 40
35. 25.01.2011 STRATA FLASH MEMORY 41
36. 25.01.2011 TYPES OF COMPUTER VIRUS 42
37. 27.01.2011 APPLE REVEALS OS X 10.7 43
38. 27.01.2011 TASK MANAGER 44
39. 28.01.2011 PI4-WORKERBOT 45
40. 28.01.2011 HONEYPOT (COMPUTING) 46
41. 31.01.2011 TOP EIGHT IT COMPANIES IN INDIA 47
42. 31.01.2011 HACKERS TURN BACK THE CLOCK
WITH TELNET ATTACKS 48
43. 01.02.2011 COMPANY PROFILE 49
44. 01.02.2011 USB FLASH DRIVE 50
45. 03.02.2011 AMPLITUBE UPDATE ADDS RECORDING
FEATURES TO iPOD 51
46. 03.02.2011 IRIS RECOGNITION 52
47. 05.02.2011 GIANT RING OF BLOCK HOLES 53
48. 05.02.2011 AVAST ANTI-VIRUS 54
49. 07.02.2011
3D GAMING WONT PERMENANTLY
DAMAGE YOUR EYES 55
6
50. 07.02.2011 SOFTWARE OF LASER PRINTER 56
51. 08.02.2011 TCS 57
52. 08.02.2011 CRYPTOGRAPHIC ALGORITHMS 58
53. 09.02.2011 JOB SEARCHING WEBSITE 59
54. 09.02.2011 HP LAUNCHES CLOUD SERVICES 60
55. 11.02.2011 IBM DEVELOP DENSER,FASTER CHIP
MEMORY 61
56. 11.02.2011 BLU-RAY DISC 62
57. 12.02.2011 INTEL DESKTOP BOARD DP55KG
EXTREME SERIOUS 63
58. 12.02.2011 SELF-RECONFIGURING ROBOTIC
SYSTEMS 64
59. 14.02.2011 NANO ROBOTICS 65
60. 15.02.2011 CYBER CRIME 66
61. 17.02.2011 APPLICATIONS OF NANOTECHNOLOGY 67
7
KONGU ARTS AND SCIENCE COLLEGE
P.G DEPARTMENT OF COMPUTER SCIENCE
ERODE – 638107
News Bulletin: MCA DATE: 29.12.2010
COMPUTER-ASSISTED TRANSLATION
Spell checkers, either built into word processing software, or add-on programs.
Grammar checkers, again either built into word processing software, or add-on
programs.
Terminology managers, allowing the translator to manage his own terminology bank in
an electronic form. Dictionaries on CD-ROM, either unilingual or bilingual.
Full-text search tools (or indexers), which allow the user to query already translated
texts or reference documents of various kinds. In the translation industry one finds such
indexers as Natural, ISYS Search Software and dtSearch.
Bitexts, a fairly recent development, the result of merging a source text and its
translation, which can then be analyzed using a full-text search tool or a concordancer.
Translation memory managers (TMM), tools consisting of a database of text segments
in a source language and their translations in one or more target languages.
G.ANANTHI
II – MCA
8
KONGU ARTS AND SCIENCE COLLEGE
P.G DEPARTMENT OF COMPUTER SCIENCE
ERODE – 638107
News Bulletin: MCA DATE: 29.12.2010
Key Features and Benefits of Bit Defender Antivirus 2010
Bit Defender is an antivirus software suite developed by Romania-based software
company SOFTWIN.
It was launched in November 2001.
It is one of the top ten antiviruses in 2010.
Protection against viruses and other malware.
Scans all Web, e-mail and instant messaging traffic in real-time.
Blocks spyware programs that track your online activities.
Blocks web pages that attempt to steal your credit card data.
Prevents personal information from leaking via e-mail.
Instant Messaging Encryption keeps your conversations private on Yahoo! and MSN
Messenger.
Reduces the system load and avoids requesting user interaction during game play.
Suitable for Windows 7.
M.ANANTHARAJ
I – MCA
9
KONGU ARTS AND SCIENCE COLLEGE
P.G DEPARTMENT OF COMPUTER SCIENCE
ERODE – 638107
News Bulletin: MCA DATE: 30.12.2010
COMPUTER-BASED TRAINING
Computer-Based Trainings (CBTs) are self-paced learning activities accessible via a
computer or handheld device.
CBTs typically present content in a linear fashion, much like reading an online book or
manual. For this reason they are often used to teach static processes, such as using
software or completing mathematical equations.
The term Computer-Based Training is often used interchangeably with Web-based
training (WBT) with the primary difference being the delivery method.
CBTs provide learning stimulus beyond traditional learning methodology from
textbook, manual, or classroom-based instruction. For example, CBTs offer user-
friendly solutions for satisfying continuing education requirements.
CBTs can be a good alternative to printed learning materials since rich media,
including videos or animations, can easily be embedded to enhance the learning.
Another advantage to CBTs are that they can be easily distributed to a wide audience at
a relatively low cost once the initial development is completed.
G.ARULMURUGAN
II - MCA
10
KONGU ARTS AND SCIENCE COLLEGE
P.G DEPARTMENT OF COMPUTER SCIENCE
ERODE – 638107
News Bulletin: MCA DATE: 30.12.2010
Intel® Core™ i7 Processor Features and Benefits
Go to the next level of multi-core performance. Intel Core i7 processors deliver an
incredible breakthrough in quad-core performance and feature the latest innovations in
processor technologies:
Intel Turbo Boost technology maximizes speed for demanding applications,
dynamically accelerating performance to match your workload—more performance
when you need it the most.
Intel Hyper-Threading technology enables highly threaded applications to get more
work done in parallel. With 8 threads available to the operating system, multi-tasking
becomes even easier.
Intel QuickPath Interconnect is designed for increased bandwidth and low latency. It
can achieve data transfer speeds as high as 25.6 GB/sec with the Extreme Edition
processor.
Integrated memory controller enables three channels of DDR3 1066 MHz memory,
resulting in up to 25.6 GB/sec memory bandwidth. This memory controller's lower
latency and higher memory bandwidth delivers amazing performance for data-intensive
applications.
Intel HD Boost significantly improves a broad range of multimedia and compute-
intensive applications. The 128-bit SSE instructions are issued at a throughput rate of
one per clock cycle, allowing a new level of processing efficiency with SSE4 optimized
applications.
G.ARUNKUMAAR
I - MCA
11
KONGU ARTS AND SCIENCE COLLEGE
P.G DEPARTMENT OF COMPUTER SCIENCE
ERODE – 638107
News Bulletin: MCA DATE: 31.12.2010
Microsoft Confirms Critical Ie Bug, Works On Fix
Microsoft late Wednesday confirmed that all versions of Internet Explorer (IE)
contain a critical vulnerability that attackers can exploit by persuading users to visit
a rigged Web site.
Although the company said it would patch the problem, it is not planning to rush
out an emergency update.
"The issue does not currently meet the criteria for an out-of-band release," said
Carlene Chmaj, a spokeswoman for the Microsoft Security Response Center
(MSRC), in an entry on the center's blog. "However, we are monitoring the threat
landscape very closely and if the situation changes, we will post updates."
Chmaj also downplayed the threat posed by the bug. "Currently the impact of this
vulnerability is limited and we are not aware of any affected customers or active
attacks targeting customers," she said.
The vulnerability in IE6, IE7 and IE8 surfaced several weeks ago when French
security firm Vupen disclosed a flaw in IE's HTML engine. Tuesday, researchers
posted a video demonstration of an attack, and added a reliable exploit to the
Metasploit penetration toolkit.
That exploit used a technique revealed earlier this year by McAfee researchers that
defeats a pair of important Windows defensive technologies -- ASLR (address
S.BAGAVATHSINGH
II – MCA
12
KONGU ARTS AND SCIENCE COLLEGE
P.G DEPARTMENT OF COMPUTER SCIENCE
ERODE – 638107
LINUX
News Bulletin: MCA DATE: 31.12.2010
It’s Free. You don’t have to pay for it.
Linux requires minimal hardware configuration. You can run it on your old systems
and it will work fine.
No virus or spyware can affect systems running on Linux. Linux systems are virus free.
Linux can run almost forever without any reboot. It’s stable.
When working on Linux, your operating system does not slow down with time.
Linux is having an active forum
Whenever you need help, post it there and you can expect a reply within minutes from
the helpful geeks on Linux forums.
Linux operating systems comes with some inbuilt softwares like open office for Word,
Power-point, Excel, Firefox, CD/DVD burner etc.
Ubuntu (Linux’s operating system) gets updated automatically with latest bug patches,
security patches automatically.
Linux never gets corrupted due to any third party software. Its security stability is top
notch.
S.CHITRA
I - MCA
13
KONGU ARTS AND SCIENCE COLLEGE
P.G DEPARTMENT OF COMPUTER SCIENCE
ERODE – 638107
News Bulletin: MCA DATE: 03.01.2011
BenQ to launch R100 tablet PC in early 2011
Taiwanese consumer electronics vendor BenQ plans to launch its first tablet PC in
China and Taiwan during the first quarter of 2011, a company representative confirmed
Wednesday.
The R100 tablet boasts a 10.1-inch LCD touchscreen with 1024 x 600 resolution and
runs Google's Android mobile OS.
It also has an ARM-based processor made by Samsung Electronics that runs at
833MHz, according to information provided by BenQ.
With the R100, BenQ will join the ranks of other companies around the world putting
out tablet PCs to compete with Apple's iPad.
The company said the R100's battery can run for up to 12 hours when the device is
being used for reading.
The R100 will come with 8GB of internal storage as well as an SD slot able to handle
up to 16GB SD cards. BenQ added mini-USB and mini-HDMI ports to the device as
well as a 3.5-millimeter earphone jack.
It works with Wi-Fi 802.11 b/g/n and Bluetooth wireless data transfer protocol.
The R100 is 15mm thick and is 191mm by 244mm in size. It weighs 720 grams.
BenQ has not yet set a price for the R100 and a company representative said pictures
would be available when the device is officially launched.
P.BALUKUMAR
II - MCA
14
KONGU ARTS AND SCIENCE COLLEGE
P.G DEPARTMENT OF COMPUTER SCIENCE
ERODE – 638107
News Bulletin: MCA DATE: 03.01.2011
Beast Trojan- Most Dangerous Computer Virus
Beast is a Windows-based backdoor trojan horse more commonly known in the
underground "script-kiddie" community as a RAT (Remote Administration Tool).
It is capable of infecting almost all Windows versions i.e. 95 through XP. Written in
Delphi and released first by its author Tataye in 2002, it became quite popular due to its
unique features.
It used the typical client/server mechanism where the client would be under operation
by the attacker and the server is what would infect the victim.
Beast was one of the first trojans to feature a 'reverse connection' to its victims and
once established, it gave the attacker complete control over the infected computer.
Using the 'reverse connection' there was no need for the attacker to know the target IP,
instead the server itself connected to a predefined DNS, which was redirected to the
attacker IP.
Its targeted infection sites were mainly three:
C:\Windows\msagent\ms****.com (Size ranging from 30KB to 49KB)
C:\Windows\System32\ms****.com (Size ranging from 30KB to 49KB)
C:\Windows\dxdgns.dll or C:\Windows\System32\dxdgns.dll (Location dependent on
attacker's choice)
It also came with a binder that could be used to join two or more files together and then
change their icon.
N.DHINESH
I - MCA
15
KONGU ARTS AND SCIENCE COLLEGE
P.G DEPARTMENT OF COMPUTER SCIENCE
ERODE – 638107
News Bulletin: MCA DATE: 04.01.2011
IT NEWS
Google #1 in Search Engine Satisfaction, AOL in Last Place
A new report on consumer satisfaction with search engines and Internet portals says we like
them more they now than this time last year. Of the major engines, only last-place AOL
improved its score. The big winner? "All others."
Beyond HandBrake's defaults
If you're a Mac user interested in ripping your commercial DVDs to a format playable on an
Apple TV, iPod, or iPhone, the free video transcoder, HandBrake 0.9.3, is one of the easiest
ways to go about it. With a copy of the free VLC installed on your Mac, HandBrake can rip
most DVDs made today, and the results it produces are quite watchable.
Casio Announces New Entry-Level Exilim Cameras
Casio is the latest big-name company to announce new point-and-shoot cameras for the fall,
chipping in with two entry-level models that carry advanced automatic features.
New China Mobile app store supports Dell device
A Dell mobile device is listed beside handsets supported by the China Mobile application store
launched this week.
D.BOOPATHI
II - MCA
16
KONGU ARTS AND SCIENCE COLLEGE
P.G DEPARTMENT OF COMPUTER SCIENCE
ERODE – 638107
News Bulletin: MCA DATE: 04.01.2011
Face book passes Google as most visited site of 2010
For the first time ever, U.S. Web surfers visited the social networking site more than
any other site in 2010, beating out Internet behemoth Google, according to a report
from Hit wise, an Internet analytics firm.
Face book, which had a flood of good and bad publicity last year, grabbed 8.93% of all
U.S. visits between January and November 2010. Google, which had been in the top
spot in 2009, slipped to the No. 2 position with 7.19% of all visits, Hit wise said.
The analytics firm also reported that Yahoo! Mail came ranked third with 3.52% of all
visits, while the main Yahoo! site was fourth with 3.3%. You Tube rounded out the top
five with 2.65% of all site visits.
In September, Online researcher COM Score reported that for the month of August,
Face book edged out Google in terms of how much time U.S. users spent on a Web site.
U.S. users spent a total of 41.1 million minutes on Face book in August, compared with
39.8 million minutes on Google's various sites, including Google News and You Tube.
Hit wise reported over the weekend that Face book marked another small victory for
the year. After analyzing the top 1,000 search terms for 2010, Hit wise calculated that
the word "Face book" was the top search term for the year.
"This is the second year that the social networking Web site has been the top search
term overall, accounting for 2.11% of all searches," Hit wise reported.
G.DIVYA
I - MCA
17
KONGU ARTS AND SCIENCE COLLEGE
P.G DEPARTMENT OF COMPUTER SCIENCE
ERODE – 638107
News Bulletin: MCA DATE:05.01.2011 LaCinema Rugged Hard Drive Connects to TV
LaCie on Monday announced the release of the LaCinema Rugged, a USB 2.0 hard
disk drive equipped with a High Definition.
LaCie on Monday announced the release of the LaCinema Rugged, a USB 2.0 hard
disk drive equipped with a High Definition Multimedia Interface (HDMI) connector.
It's priced starting at US$199.
Compatible with Macs and PCs, the LaCinema Rugged sports an aluminum shell and
internal anti-shock absorbers, along with a shock-resistant rubber bumper.
It comes in 250GB, 320GB and 500GB capacities.
Data transferred to the drive is visible on any display. Equipped with an HDMI
interface, you can connect the drive directly to a high-definition TV display, or you can
connect to other TVs using a composite video connection.
The drive manages 1080i upscaling itself. It also includes a wireless remote control,
and is equipped with analog stereo and optical audio connections.
MPEG-1, MPEG-2 and MPEG-4 video codecs, and JPEG, GIF, PNG and BMP digital
image formats.
S.ELUMALAI
II - MCA
18
KONGU ARTS AND SCIENCE COLLEGE
P.G DEPARTMENT OF COMPUTER SCIENCE
ERODE – 638107
News Bulletin: MCA DATE:05.01.2011
FEATURES OF SOUND TECHNOLOGY
Datacenter consolidation and the growth in 10-Gigabit Ethernet networks is leading
switch vendors and network appliance providers to outfit new products with high-
performance features to handle these more demanding environments.
This week Force10 Networks will increase the density of its TeraScale E-Series family
of switch/routers to more than 1,260 Gigabit Ethernet ports per chassis with a new line
of High Density 90-port line cards.
―These systems are designed to accommodate the increasing demand for bandwidth and
have the capacity to accommodate growth for what we estimate to be 10 years,‖ said
Andrew Feldman, vice president of marketing at Force10.
―These types of networks used to be relegated to the scientific and research areas, but
now we’re seeing more commercial applications.‖
―Many companies can save money by reducing the number of datacenters they have
when they move to these high-capacity systems, but they also receive just as much if
not more benefit from the reduced management load,‖ he said.
N.ELAVARASI
I - M.C.A
19
KONGU ARTS AND SCIENCE COLLEGE
P.G DEPARTMENT OF COMPUTER SCIENCE
ERODE – 638107
News Bulletin: MCA DATE: 06.01.2011
The iPhone and iPad could soon hit Verizon with 4G
It's been another busy and interesting day when it comes to speculation about Apple's
relationship with Verizon both in terms of the carrier getting a CDMA version of the
iPhone early next year .
First off, the news about a Verizon iPhone. While speculation's been brewing for
months about a CDMA iPhone 4 to deployed on the largest U.S. carrier .
A recent analyst report noted that Verizon was willing to make concessions and put
Apple in "the driver's seat" of negotiations in return for promising that exclusivity
wouldn't expand beyond Verizon and AT&T, the current exclusive U.S. carrier.
More recently, reports of Verizon's smartphone sales have indicated that the company
may need to offer the iPhone if it wants to remain the largest U.S. mobile carrier.
Sales of BlackBerries for Verizon have slipped significantly and while Android has
become the lead platform for Verizon, it is becoming accepted wisdom that this is only
because Android handsets are the most iPhone-like devices that Verizon can offer.
If true, then it would certainly be in the company's interest to try and secure as
exclusive a deal as possible and to give into Apple's demands. In more recent and
significant reports, a Verizon iPhone would support LTE, Verizon's 4G-branded
service, which went live just over a week ago.
C.GOWRISHANKAR
II - MCA
20
KONGU ARTS AND SCIENCE COLLEGE
P.G DEPARTMENT OF COMPUTER SCIENCE
ERODE – 638107
News Bulletin: MCA DATE: 06.01.2011
MICROSOFT PROTOCOLS
NetBIOS-Network Basic Input/Output allows browsing of network resources and
handles basic functions of a Windows network.Two many acknowledged data transfer
is used.It is a Microsoft protocol used to support Microsoft Networking.Works at the
session layer.Controls the sessions between computers and maintains connections.
NetBEUI-NetBIOS Extended User Interface.Microsoft Protocol used to support
Microsoft Networking.Provides data transpotation.It is not a routable transport protocol
which is why NBT exists on large networks to use routable TCP Protocol on large
networks.This protocol may sometimes be called the NetBIOS frame (NBF)
protocol.Works at the Transport and Network layers.NetBEUI-The main protocol used
for networking in the transport layer and provides data transportation.It is not a routable
transport protocol.
SMB-Microsoft Protocol used to support Microsoft Networking by providing redirector
client to server communication.Works at the presentation layer.
Other-Network Support
NBT-NetBIOS over TCP/IP refers to NetBIOS being transported by TCP/IP rather than
NetBEUI defined by RFC 1002.
Redirector-Directs requests for network resources to the appropriate server and makes
network resources seem to be local resources.
NDIS and NIC driver-NDIS allows several adapter drivers to use any number of
transport protocols.The NIC driver is the driver software for the network card.
S.GOMATHI
I - MCA
21
KONGU ARTS AND SCIENCE COLLEGE
P.G DEPARTMENT OF COMPUTER SCIENCE
ERODE – 638107
News Bulletin: MCA DATE: 08.01.2011
SHORTCUT KEYS Microsoft Word shortcut keys :
Ctrl + Shift + > : Increase selected font +1pts up to 12pt and then increases
font +2pts.
Ctrl + Shift + < : Decrease selected font -1pts if 12pt or lower, if above 12
decreases font by +2pt.
Ctrl+1 ,Ctrl+2 : Single-space lines , Double-space lines.
Ctrl + 5 : 1.5-line spacing.
Ctrl + Shift + * : View or hide non printing characters.
Ctrl+Alt+1, 2, 3 : Changes text to heading 1, heading 2, heading 3.
Shift+Alt+D or T: Insert the current date. Or Insert the current time.
Alt + Ctrl + F2 : Open new document.
Ctrl +Shift +F6 : Opens to another open Microsoft Word document.
Other shortcut keys :
WINKEY + E : Open My Computer.
WINKEY + U : Open Utility Manager.
Alt + double - click : Display the properties of the object you double-click.
WINKEY + Pause / Break key : Open the system properties window.
Left Alt+left Shift+Print screen : Switch High Contrast either on or off.
Left Alt + left Shift + Num lock : Switch the MouseKeys either on or off.
P.HEMACHANDRAN.,
II - MCA
22
KONGU ARTS AND SCIENCE COLLEGE
P.G DEPARTMENT OF COMPUTER SCIENCE
ERODE – 638107
News Bulletin: MCA DATE: 08.01.2011
GRID COMPUTING
Grid computing is a term referring to the combination of computer resources from
multiple administrative domains to reach a common goal.
The Grid can be thought of as a distributed system with non-interactive workloads that
involve a large number of files. What distinguishes grid computing from conventional
high performance computing systems such as cluster computing is that grids tend to be
more loosely coupled, heterogeneous, and geographically dispersed.
A grid can be dedicated to a specialized application; Grids are often constructed with
the aid of general-purpose grid software libraries known as middleware. Grid size can
vary by a considerable amount.
Grids are a form of distributed computing whereby a ―super virtual computer‖ is
composed of many networked loosely coupled computers acting together to perform
very large tasks.
―Distributed‖ or ―grid‖ computing in general is a special type of parallel computing
thatrelies on complete computers (with onboard CPUs, storage, power supplies,
network interfaces, etc.) connected to a network (private, public or the Internet) by a
conventional network interface, such as Ethernet.
K.S GOPALAKRISHNAN
I - MCA
23
KONGU ARTS AND SCIENCE COLLEGE
P.G DEPARTMENT OF COMPUTER SCIENCE
ERODE – 638107
News Bulletin: MCA DATE: 10.01.2011
SMTP Server
Sends your Mail with Lightening Fast Speed
Computers have dominated the present world. Be it the business sector, the educational
arena or the medical world, computers are everywhere.
A wide range of technological developments has bettered the modes of communication
in between countries.
The SMTP or Simple Mail Transfer Protocol is one such brilliant technology through
which you can send mails.
Related Coverage
Sending SMTP Mails through C# Application
SMTP Mail Server – Make Your Email Communication Successful
The way a SMTP server works
SMTP Mail server – Sends Your Email Successfully
SMTP Relay Server is a type of a SMTP server program for Windows that allows you
to transform any Windows based PC into an SMTP server.
SMTP Relay server helps you to send mails through your personal email account with
the help of your current email service.
K.KALAIVANI
II – MCA
24
KONGU ARTS AND SCIENCE COLLEGE
P.G DEPARTMENT OF COMPUTER SCIENCE
ERODE – 638107
News Bulletin: MCA DATE: 10.01.2011
TYPES OF SERVER
A SERVER is any machine that provides a service for other users on the network.
Application server, a server dedicated to running certain software applications
Communications server, carrier-grade computing platform for communications
networks
Database server, see file AB2
Fax server, provides fax services for clients
File server, provides file services
Game server, a server that video game clients connect to in order to play online
together
Home server, a server for the home
ISA server, provides the two basic services of an enterprise firewall and a Web
proxy/cache server
Name server or DNS server
Print server, provides printer services
Proxy server, provides database server in services
Sound server, provides multimedia broadcasting / streaming.
Standalone server, an emulator for client–server (web-based) programs
Web server, a server that HTTP clients connect to in order to send commands
and receive responses along with data contents.
N.HEMALATHA
I - MCA
25
KONGU ARTS AND SCIENCE COLLEGE
P.G DEPARTMENT OF COMPUTER SCIENCE
ERODE – 638107
News Bulletin: MCA DATE: 11.01.2011
BANG, THERE GOES YOUR iPOD!
Apple tried to prevent a father from publicising that his daughter's iPod MP3
player blew up last month, according to new reports today.The Times said that
47 year old Ken Stanborough from Liverpool reported to Apple that his
daughter's device had begun to hiss and overheat, so he threw it into the garden
where it exploded in a puff of smoke. However, the hardware giant apparently
sent Stanborough a letter offering a refund only if he kept the settlement
confidential.
In what appears to be an attempt by Cupertino to hush up any incidents where
its devices are seen to have overheated, the firm warned Stanborough that any
breach of this confidentiality "may result in Apple seeking injunctive relief,
damages and legal costs against the defaulting persons or parties".
Apple has since told Sky News that it is "standard practice to have a letter of
settlement" in these cases, and that it wasn't an attempt to gag the family. You
know how they say that there's no such thing as bad publicity? Er, that might
not strictly speaking be true.
K.KANIMOZHI
II - MCA
26
KONGU ARTS AND SCIENCE COLLEGE
P.G DEPARTMENT OF COMPUTER SCIENCE
ERODE – 638107
News Bulletin: MCA DATE: 11.01.2011
JAVA CARD
Java Card refers to a technology that allows Java-based applications (applets) to be run
securely on smart cards and similar small memory footprint devices.
Java Card is the tiniest of Java targeted for embedded devices. Java Card gives the user
ability to program the device and make them application specific.
It is widely used in SIM cards (used in GSM mobile phones) and ATM cards. The first
Java Card was introduced in 1996 by Schlumberger's card division which later merged
with Gemplus to form Gemalto. Java Card products are based on the Java Card
Platform specifications developed by Sun Microsystems, a subsidiary of Oracle
Corporation.
Many Java card products also rely on the GlobalPlatform specifications for the secure
management of applications on the card (download, installation, personalization,
deletion)
Java Card aims at defining a standard smart card computing environment allowing the
same Java Card applet to run on different smart cards, much like a Java applet runs on
different computers.
Java Card technology was originally developed for the purpose of securing sensitive
information stored on smart cards. Security is determined by various aspects of this
technology (Data encapsulation, Applet Firewall, Cryptography, Applet)
M.JAGADEESH
I - MCA
27
KONGU ARTS AND SCIENCE COLLEGE
P.G DEPARTMENT OF COMPUTER SCIENCE
ERODE – 638107
News Bulletin: MCA DATE: 12.01.2011
Wipro
What started off as a hydrogenated cooking fat company, Wipro is today is a $5 billion
revenue generating IT, BPO and R&D services organisation with presence in over 50
countries.
Premji started Wipro with the 'idea of building an organisation which was deeply committed to
values, in the firm belief that success in business would be its inevitable, eventual outcome'.
The company has over 72,000 employees.
Wipro's revenues grew by 33 per cent to Rs 19,957 crore (Rs 200 billion) for the year ended
March 31, 2008. The net profit grew by 12 per cent to Rs. 3,283 crore (Rs. 32.83 billion). The
revenues of the combined IT businesses was $4.3 billion with 43 per cent YoY growth.
Wipro was the only Indian company to be ranked among the top 10 global outsourcing
providers in IAOP's 2006 Global Outsourcing 100 listing. Wipro has also won the International
Institute for Software Testing's Software Testing Best Practice Award.
Infosys
Infosys Technologies Ltd was started in 1981 by seven people with $250. Today, the company
boasts of revenues of over $ 4 billion and 94,379 employees.
Under the leadership of N R Narayana Murthy, the company has become a global brand. The
company is now headed by Kris Gopalakrishnan. The income for the quarter ended June 30
2008 was Rs 4,854 crore (Rs 48.54 billion). The net profit stood at Rs 1,302 crore (Rs 13.02
billion).
Forbes magazine named Infosys in its list of Global High Performers. Waters magazine rated
Infosys as the Best Outsourcing Partner. The Banker magazine conferred two Banker
Technology Awards on Infosys to acclaim its work in wholesale and capital markets in two
categories - Payments and Treasury Services, and Offshoring and Outsourcing.
The International Association of Outsourcing Professionals (IAOP) ranked Infosys at No. 3 in
its '2008 Global Outsourcing 100'.
K.KARTHIKEYAN
II - MCA
28
KONGU ARTS AND SCIENCE COLLEGE
P.G DEPARTMENT OF COMPUTER SCIENCE
ERODE – 638107
News Bulletin: MCA DATE: 12.01.2011
ABOUT WIKILEAKS
URL : Wikileaks.org(originally)
Slogan : We open Governments
Commercial? : No
Type of site : Document archive & disclosure
Owner : The sunshine Press
Created by : Julian assange
Launched : 4 October 2006
Alexa rank :861(December 2010)
Current status : Active
Julian Assange, the main spokesperson and editor-in-chief for WikiLeaks.
WikiLeaks is an international non-profit organisation at publishes submissions of
private, secret, and classified media from anonymous news sources and news leaks.
In April 2010, WikiLeaks posted video from a 2007 incident in which Iraqi civilians
and journalists were killed by US forces, on a website called Collateral Murder.
In October 2010, the group released a package of almost 4,00,000 documents called
the Iraq War Logs in coordination with major commercial media organisations.
P.JAYAPRIYA
I - MCA
29
KONGU ARTS AND SCIENCE COLLEGE
P.G DEPARTMENT OF COMPUTER SCIENCE
ERODE – 638107
News Bulletin: MCA DATE: 18.01.2011
COMPANY PROFILE OF TCS Tata Consultancy Services started in 1968. Mr.F.C Kohli who is presently the Deputy
Chairman was entrusted with the job of steering TCS. The early days marked TCS
resonsibility in managing the punch card operations of Tisco. The company, which was into
management consultancy from day one, soon felt the need to provide solutions to its clients as
well.TCS was the first Indian company to make forays into the US market with clients ranging
from IBM,American Express, Sega etc.
During the Y2K buildup, TCS had setup a Y2K factory in Chennai as a short-term strategy.
Now, with E-business being the buzzword, the factory is developing solutions for the dotcom
industries. Today, about 90 percent of TCS' revenue comes from consulting, while the rest
from products. TCS has great training facilities. In addition to training around 5 percent of the
revenue is spent upon its R&D centers like the Tata Research Design and Development Centre
at Pune, along with a host of other centers at Mumbai and Hyderabad.
Over $25 million were spent on enhancing hardware and software infrastructure. The company
now has 72 offices worldwide. As many as seven centers were assessed at SEI CMM Level 5
last year(3.4 mistakes in a million opportunities). These include Chennai, Mumbai, Bangalore,
Calcutta, Hyderabad and Lucknow. Several business and R&D relationship with global firms
like IBM, General Electric, Unigraphics Solutions have been made.
The present CEO of the company is Mr. S. Ramadorai. The companies strength is about
14,000.
G.LAKSHMANAN
II - M.C.A
30
KONGU ARTS AND SCIENCE COLLEGE
P.G DEPARTMENT OF COMPUTER SCIENCE
ERODE – 638107
News Bulletin: MCA DATE: 18.01.2011
WIKILEAKS
WikiLeaks is an international non-profit organisation that publishes submissions of
private, secret, and classified media from anonymous news sources and news leaks.
Its website, launched in 4 October 2006 under The Sunshine Press organisation,
claimed a database of more than 1.2 million documents within a year of its launch.
It is created by Julian Assange.
The website was unveiled, and published its first document in December 2006.
The site claims to have been "founded by Chinese dissidents, journalists,
mathematicians and start-up company technologists, from the US, Taiwan, Europe,
Australia and South Africa".
In 2008, Index on Censorship presented WikiLeaks with their inaugural
Economist New Media Award.
In 2009, Amnesty International awarded WikiLeaks their Media Award for
exposing "extra judicial killings and disappearances" in Kenya.
N.JAGADHEESH
I – MCA
31
KONGU ARTS AND SCIENCE COLLEGE
P.G DEPARTMENT OF COMPUTER SCIENCE
ERODE – 638107
News Bulletin: MCA DATE: 19.01.2011
COMPRO LAUNCHES NETWORK CAMERA
Compro Technology recently announced the launch of IP70 network camera with 1/3-
inch CMOS megapixel sensor.
The advanced H.264 video compression and IR technology, it can transfer HD video at
a lower bit-rate.
The camera features the function of professional light sensor IR solution.
It provides user 365x24x7 complete protection, making it more suitable for network
surveillance.
Compro IP70 provides 1280x1024 image quality, and dual H.264, MJPEG or MPEG-4
streams.
IP70 also has the function to connect sirens and sensing devices. Optional WL155 USB
upgrade module provides 802.11 b/g/n wireless transfer functions.
Compro IP70 network camera is touted an ideal surveillance solution for securing
locations such as home, small business, hotel, shop or restaurant.
It features 32 channels professional grade multi-camera video management solution for
business surveillance.
S.LALETHAPPRIYA
II - MCA
32
KONGU ARTS AND SCIENCE COLLEGE
P.G DEPARTMENT OF COMPUTER SCIENCE
ERODE – 638107
News Bulletin: MCA DATE: 19.01.2011
AIRBORNE INTERNET The Airborne Internet is network in which all nodes would be located in aircraft. The
network is intended for use in aviation communications, navigation, and surveillance
(CNS) and would also be useful to businesses, private Internet users, and military.
In time of war, for example, an airborne network might enable military planes to
operate without the need for a communications infrastructure on the ground.
The aircrafts will carry the "hub" of a wireless network having a star topology. The
aircrafts will fly in shifts to provide continuous service, 24 hour per day by 7 days per
week, with an overall system reliability of 99.9% or greater.
At least three different methods have been proposed for putting communication nodes
aloft. The first method would employ manned aircraft, the second method would use
unmanned aircraft, and the third method would use blimps.
The nodes would provide air-to-air, surface-to-air, and surface-to-surface
communications. The aircraft or blimps would fly at altitudes of around 16 km, and
would cover regions of about 40 mi (64 mi) in radius.
Any subscriber within this region will be able to access the network„ ubiquitous multi-
gigabit per second "bit cloud" upon demand. What the airborne internet will do is
provide an infrastructure that can reach areas that don't have broadband cables & wires.
K.KARTHIKA
I - MCA
33
KONGU ARTS AND SCIENCE COLLEGE
P.G DEPARTMENT OF COMPUTER SCIENCE
ERODE – 638107
News Bulletin: MCA DATE: 20.01.2011
ANDROID 3.0 (HONEYCOMB)
Android is a mobile operating system initially developed by Android Inc. Android was
bought by Google in 2005
Android is based upon a modified version of the Linux kernel. Google and other
members of the Open Handset Alliance collaborated on Android's development and
release
HARDWARE RUNNING ANDROID 3.0
The Android OS can be used as an operating system for cellphones, netbooks and
tablets, including the Dell Streak, Samsung Galaxy Tab and other devices.
The world's first TV running Android, called Scandinavia, has also been launched by
the company People of Lava.
The first commercially available phone to run the Android operating system was the
HTC Dream, released on 22 October 2008
FEATURES OF ANDROID 3.0
Optimized tablet support with a new user interface. Three-dimensional desktop with
redesigned widgets purportedly taken from BumpTop, the 3D desktop acquired by
Google in 2010.
Refined multi-tasking. Google Maps 5 with 3D interactions and offline reliability.Video
S.MAIYAPPAN
II - M.C.A
34
KONGU ARTS AND SCIENCE COLLEGE
P.G DEPARTMENT OF COMPUTER SCIENCE
ERODE – 638107
News Bulletin: MCA DATE: 20.01.2011
BUBBLE SENSING
We propose bubble-sensing, a new sensor network abstraction that allows mobile
phone users to create a binding between sensing tasks and the physical world at
locations of interest, that remains active for a duration set by the user.
We envision mobile phones being able to affix sensing task bubbles at places of interest
and then receive sensed data as it becomes available in a delay-tolerant fashion, in
essence, creating a living documentary of places of interest in the physical world.
The system relies on other mobile phones that opportunistically pass through bubble-
sensing locations to acquire tasks and do the sensing on behalf of the initiator, and
deliver the data to the bubble-sensing server for retrieval by the user who initiated the
task.
We describe an implementation of the bubble-sensing system using sensor-enabled
mobile phones, specifically, Nokia’s N80 and N95 (with GPS, accelerometers,
microphone, camera).
Task bubbles are maintained at locations through the interaction of ‖bubble carriers‖,
which carry the sensing task into the area of interest, and ‖bubble anchors‖, which
maintain the task bubble in the area when the bubble carrier is no longer present.
In our implementation, bubble carriers and bubble anchors implement a number of
simple mobile phone based protocols that refresh the task bubble state as new mobile
phones move through the area.
S.KARTHIKEYAN
I - MCA
35
KONGU ARTS AND SCIENCE COLLEGE
P.G DEPARTMENT OF COMPUTER SCIENCE
ERODE – 638107
News Bulletin: MCA DATE: 21.01.2011
SKY X TECHNOLOGY
Satellites are ideal for providing internet and private network access over long distance
and to remote locations.
The Sky X Gateway and Sky X Client/Servers systems replaces TCP over satellite link
with a protocol optimized for the long latency, high loss and asymmetric bandwidth
conditions of the typical satellite communication.
The Sky X Client and the Sky X Server enhance the performance of data transmissions
over satellites directly to end user PC's, thereby increasing Web performance by 3 times
or more and file transfer speeds by 10 to 100 timesThe geosynchronous satellites,
orbiting at an altitude of 22,300 miles has round trip times of approximately 540 m/s,
an order of magnitude larger than terrestrial networks.
The journey through the atmosphere can also introduce bit errors into the data stream.
These factors, combined with backchannel bandwidth typically much smaller than that
available on the forward channel.
But the satellite conditions adversely interact with a number of elements of the TCP
architecture, including it s window sizing, congestion avoidance algorithms, and data
acknowledgment mechanisms.
R.MEENAKSHI
II - MCA
36
KONGU ARTS AND SCIENCE COLLEGE
P.G DEPARTMENT OF COMPUTER SCIENCE
ERODE – 638107
News Bulletin: MCA DATE: 21.01.2011
INFRASECURE
-SOFTWARE TO CUT PC POWER
An Indian startup See Beyond Technologies (SBT) has developed a software named
Infrasecure, which can reduce the power consumption of desktops by 35-40 percent.
We launched Infrasecure in 2009, and since then we have won 15 large customers in
India and the Middle East with an average deal size of 2,500 desktops. MindTree is
the largest customer with deployment across 10,000 desktops.
According to SBT, Infrasecure can save Rs. 24 lakh per annum in electricity costs for
a company with 1,000-desktop infrastructure.
A typical PC uses three units of electricity for the entire day. By using the smart
power management features of Infrasecure, the consumption can be reduced by one-
third or one unit. At Rs. 5 per unit, this works out to a savings of Rs. 24 lakh per
annum for 1,000 nodes. In addition, this amounts to 300 tons of CO2 reduction per
annum.
At Rs. 1,200 for a perpetual license and Rs. 480 per year for a 3-year subscription
license, the ROI for a typical 1,000-node customer works out to less than six months.
The client can be remotely distributed by using Microsoft’s System Center Manager
on desktops with any Windows OS supporting ACPI Power Management.
It hibernates the desktop when not in use, and also wakes it up at predefined times to
run batch schedules like antivirus updates.
R.KAVITHA
I - MCA
37
KONGU ARTS AND SCIENCE COLLEGE
P.G DEPARTMENT OF COMPUTER SCIENCE
ERODE – 638107
News Bulletin: MCA DATE: 22.01.2011
CLOUD COMPUTING
Cloud Computing is Internet-based computing, whereby shared resources, software,
and information are provided to computers.
Cloud computing is a paradigm shift following the shift from mainframe to client–
server in the early 1980s.
The term "cloud" is used as a metaphor for the Internet, based on the cloud drawing
used in the past to represent the telephone network.
Cloud engineering is a field of engineering that generally deals with the lifecycle of
Cloud computing solutions, design, development, testing,delivery, operation and
consumption of Cloud products and services.
Cloud architecture, the systems architecture of the software systems involved in the
delivery of cloud computing, typically involves multiple cloud components.
Cloud platform services or "Platform as a Service (PaaS)" deliver a computing platform
and/or solution stack as a service.
Cloud computing types:
1. Public cloud or external cloud
2. A community cloud.
Cloud Storage is a model of networked Computer data storage.
K.MYTHILI
II - MCA
38
KONGU ARTS AND SCIENCE COLLEGE
P.G DEPARTMENT OF COMPUTER SCIENCE
ERODE – 638107
News Bulletin: MCA DATE: 22.01.2011
ABOUT CLOUD COMPUTING
Cloud computing is location independent computing, whereby shared servers provide
resources, software, and data to computers and other devices on demand, as with the
electricity guide.
Layers of cloud computing includes client, application, platform, infrastructure and
server.
Deployment models of cloud computing includes public cloud, community
cloud,hybrid cloud and private cloud.
Cloud engineering is the application of a systematic, disciplined, quantifiable, and
conceptualization, development, operation, and maintenance of cloud computing.
Cloud storage is a model of networked computer data storage where data is stored on
multiple virtual servers, generally hosted by third parties, rather than being hosted on
dedicated servers.
Hybrid storage clouds are often useful for archiving and backup functions, allowing a
hybrid storage cloud uses a combination of public & private storage clouds and the
local data to be replicated to a public cloud.
There are a number of open standards under development, including the OGF's Open
Cloud Computing Interface.
It losses out for Oracle (ORCL), SAP AG (SAP),BlackBaud(BLBK),Lawson
software(LSWN).
A.KAVITHA MANI
I - MCA
39
KONGU ARTS AND SCIENCE COLLEGE
P.G DEPARTMENT OF COMPUTER SCIENCE
ERODE – 638107
News Bulletin: MCA DATE: 24.01.2011
POWER MACINTOSH G3 The Power Macintosh G3, commonly called "beige G3s" or "platinum G3s" for the
color of their cases, was a series of personal computers designed, manufactured, and
sold by Apple Computer, Inc.
It was the first Macintosh to use the PowerPC G3 (PPC750) microprocessor, and
replaced a number of earlier Power Macintosh models, in particular the 7300, 8600 and
9600 models.
The introduction of the Desktop and Minitower G3 models coincided with Apple
starting to sell user-configurable Macs directly from its web site in an online store,
which was innovative for the time as Dell was the only other major manufacturer then
doing this.
The Power Mac G3 introduced a fast and large Level 2 backside cache to Apple's
product lineup, running at half processor speed. As a result, these machines were
widely considered to be faster than Intel PCs of similar CPU clock speed at launch, an
assertion that was backed up by benchmarks performed by Byte Magazine, which
prompted Apple to create the "Snail" and "Toasted Bunnies" television commercials.
The Power Macintosh G3 was originally intended to be a midrange series, between the
low-end Performa/LC models and the six-PCI slot Power Macintosh 9600.
Apple developed a prototype G3-based six-slot full tower to be designated the Power
Macintosh 9700. Despite demand from high-end users for more PCI slots in a G3
powered computer.
R.NITHYA
II – MCA
40
KONGU ARTS AND SCIENCE COLLEGE
P.G DEPARTMENT OF COMPUTER SCIENCE
ERODE – 638107
News Bulletin: MCA DATE: 24.01.2011
TOSHIBA CANVIO 3.0 PORTABLE DRIVES
Compatible with windows 7, windows Vista and windows XP.
KEY PRODUCT FEATURES:
Transfer karge media files at blazing fast speeds with USB3.0.
Backwards compatible with USB 2.0.
Secure backup with a password(Data encryption,upto 256-bit).
Alerts when running low on backup capacity (Drive Space Alert).
Protects the drive(Internal Shock sensor and Ramp Loading technology).
Gives you peace of mind(Toshiba 3-Year Limited Warranty).
SPECIFICATION:
Interface: USB 3.0.
Transfer Rate: Upto 5Gb/s.
Speed: 5,400 rpm.
Average seek time:12ms.
Cache Buffer:8Mb.
Size : 3.1in(W) X 0.53in(II)X 4.7in(D).
Color:Black with red/White/blue/silver/green accents.
Weight:5.2oz
E .KAVIYAVARSHINI
I - MCA
41
KONGU ARTS AND SCIENCE COLLEGE
P.G DEPARTMENT OF COMPUTER SCIENCE
ERODE – 638107
News Bulletin: MCA DATE: 25.01.2011
Strata flash Memory
The L18 flash memory device provides read-while-write and read-while-erase
capability with density upgrades through 256-Mbit.
This family of devices provides high performance at low voltage on a 16-bit data bus.
Individually erasable memory blocks are sized for optimum code and data storage.
The flash memory array is grouped into multiple 8-Mbit partitions.
By dividing the flash memory into partitions, program or erase operations can take
place at the same time as read operations.
The L18 flash memory device allows burst reads that cross partition boundaries.
A WAIT signal provides easy CPU-to-flash memory synchronization.
The L18 flash memory device incorporates technology that enables fast factory
program and erase operations.
Designed for low-voltage systems, the L18 flash memory device supports read
operations with VCC at 1.8 volt, and erase and program operations with VPP at 1.8
V or 9.0 V
G.RAMYA
II - MCA
42
KONGU ARTS AND SCIENCE COLLEGE
P.G DEPARTMENT OF COMPUTER SCIENCE
ERODE – 638107
News Bulletin: MCA DATE: 25.01.2011
TYPES OF COMPUTER VIRUS Virus:
A virus is an independent program that reproduces itself.It can attach itself to other
programs and make copies of itself(i.e.,companion viruses).
It can damage or corrupt data, or lower the performance of your system by using
resources like memory or disk space.
Trojans:
Another unsavory breed of malicious code are Trojans or Trojan horses,which
unlike viruses do not reproduce by infecting other files, nor do they self-replicate
like worms.
Boot Virus:
This type of virus affects the boot sector of a floppy or hard disk.This is a crucial
part of a disk, in which information on the disk itself is stored together with a
program that makes it possible to boot (start) the computer from the disk.
Examples: Poly boot B, Anti EXE .
Macro Virus:
Macro viruses infect files that are created using certain application programs that
contain macros. These mini-programs make it possible to automate series of
operations so that they are performed as a single actions, thereby saving the user
from having to carry them one by one.
Examples : Relax,MeliddsA,Bablas,O97M/Y2K.
N.KIRUTHIKA
I - MCA
43
KONGU ARTS AND SCIENCE COLLEGE
P.G DEPARTMENT OF COMPUTER SCIENCE
ERODE – 638107
News Bulletin:MCA DATE: 27.01.2011
Apple Reveals OS X 10.7 ("Lion") With New Features: Ships Summer 2011
Apple said "Back to the Mac," they meant it. The company was talking software
this week at their mega event, with Mac OS X 10.7 being the star of the software
show.
Apple's calling the next major version of OS X "Lion," and while it will not ship to
consumers until summer of 2011, it promises to be the most significant Apple OS
yet.
Developers are expected to start getting an early look sometime soon, and the
added features are pretty impressive.
Lion includes system-wide support for full screen applications. With Lion, you can
enter full screen mode with just one click, switch from one full screen app to
another with just a swipe of the track pad.
Control presents you with a unified view of every app and window running on your
Mac, so you can instantly navigate anywhere.
Mission Control also incorporates the next generation of Exposé, presenting all the
windows running on your Mac grouped by application, alongside thumbnails of
full screen apps, Dashboard and other Spaces.
Launch pad, a new home for all of your Mac apps; system-wide support for full
screen apps; and Mission Control, which unifies Expose, Dashboard, Spaces and
full screen apps into an innovative new view of everything running on your Mac,
and allows you to instantly navigate anywhere.
G.N.SAI DIVYA
II - MCA
44
KONGU ARTS AND SCIENCE COLLEGE
P.G DEPARTMENT OF COMPUTER SCIENCE
ERODE – 638107
News Bulletin:MCA DATE: 27.01.2011
Task Manager
The Windows Task Manager allows you to monitor the programs running on your PC
and close them is needed.
It comes particularly in handy when a program completely stops responding or crashes.
To launch the Task Manager users press ctrl-alt-delete.
The Application tab will display a list of your currently running programs, and their
respective status.
If you opened the Task Manager because a program stopped responding and you want
to force it to close, highlight that program and select the End Task button.
The Processes tab is one of the most useful "utilities" that comes built into Windows.
It allows you to view all the running processes on your PC-both programs that you've
started and applications that Windows requires.
If you notice that after your PC has been in use for a while it starts to slow down, a
quick view of the Processes can help you understand why-and regain some of that lost
zip.
Select the Mem Usage column title ant the processes will be sorted by their memory
usage. Some programs suffer from a problem called "memory leaks".
Using the Task Manager you can determine if this has happened by sorting the
processes by their memory usage.
B.KOWSIKA
I - MCA
45
KONGU ARTS AND SCIENCE COLLEGE
P.G DEPARTMENT OF COMPUTER SCIENCE
ERODE – 638107
News Bulletin:MCA DATE:28.01.2011
PI4-WORKERBOT
At first sight, the pi4-workerbot looks like a clump of metal, but there’s something
extraordinary - it has fingertip sensitivity and a variety of facial expressions.
Designed by Dr Ing. Dragoljub Surdilovic at the Fraunhofer Institute for Production
Systems and Design Technology IPK in Berlin, the pi4-workerbot is capable of
complex movements and expressions.
The robot has three cameras - a 3D camera in its forehead that captures its general
surroundings and two others used for inspection purposes.
―It can measure objects or inspect a variety of surfaces. If you use two different
cameras, it can inspect one aspect with its left eye, and another with its right,‖ said
Matthias Krinke, managing director of pi4-Robotics.
―This allows it to carry out new kinds of operations. These robots can transfer a work
piece from one hand to the other,‖ said Surdilovic.
The researchers also endowed the robot with fingertip sensitivity.
If you set the strength of the grip correctly, it will take hold of an egg without cracking
it.
C.SANGATHAMIL
II - MCA
46
KONGU ARTS AND SCIENCE COLLEGE
P.G DEPARTMENT OF COMPUTER SCIENCE
ERODE – 638107
News Bulletin:MCA DATE:28.01.2011
HONEYPOT (COMPUTING)
In computer terminology, a honeypot is a trap set to detect,deflect,or in some manner
counteract attempts at unauthorized use of information system.
Generally it consists of a computer,data,or a network site that appears to be part of a
network,but is actually isolated and monitored,and which seems to contain information
or a resource of value to attackers.
A honeypot is valuable as a surveillance and early-warning tool.While it is often a
computer,a honeypot can take other forms,such as files or data records,or even unused
IP address space.
One practical application of this is a honeypot that thwarts spam by masquerading as a
type of system abused by spammers.These honeypots categorize trapped material 100%
accurately:it is all illicit
Honeypots can carry risks to a network,and must be handled with care.If they are not
properly walled off,an attacker can use them to break into a sytem.
TYPES
Production Honeypots
Research Honeypots
V.LOKESH
I - MCA
47
KONGU ARTS AND SCIENCE COLLEGE
P.G DEPARTMENT OF COMPUTER SCIENCE
ERODE – 638107
News Bulletin: MCA DATE: 31.01.2011
TOP EIGHT IT COMPANIES IN INDIA
The CEO of tcs is Mr.Natarajan Chandrasekaran. Services: Outsourcing, BPO.
The present CEO wipro is Mr.Azim Premji. Services: Application Development
and Maintenance, BPO, Product Engineering Solutions Technology, Infrastructure
Services Consulting.
The CEO of infosys is Mr. Kris GopalaKrishnan,. Services: Information
Technology, consulting services, solutions and outsourcing.
The CEO of satyam is A.S. murthi is the current ceo. Services: IT Services, IT
consulting, Software services.
The CEO of I-flex is N.R.K Raman, Services: Application lifecycle
management, financial services consulting, Business Transformation, Consulting,
TATA INFOTECH, Services: E-learning services and solutions.
The CEO of cmc is R. Ramanan. Consulting, IT, Outsourcing, BPO.
The CEO of Mphasis is Mr.Balu Ganesh Ayyar services: Information
services.
R.A.SANKARAPANDIAN
II - MCA
48
KONGU ARTS AND SCIENCE COLLEGE
P.G DEPARTMENT OF COMPUTER SCIENCE
ERODE – 638107
News Bulletin: MCA DATE: 31.01.2011
Hackers turn back the clock with Telnet attacks
A new report from Akamai Technologies shows that hackers appear to be increasingly
using the Telnet remote access protocol to attack corporate servers over mobile
networks.
Akamai, which specializes in managing content and Web traffic, issues quarterly
reports on Internet traffic trends.
The latest report, which covers the third quarter of 2010, shows that 10% of attacks that
came from mobile networks are directed at Port 23, which Telnet uses. That marks a
somewhat unusual spike for the aging protocol.
Telnet is a remote access tool used to log into remote servers, but it has been gradually
replaced by SSH, also known as Secure Shell.
Administrators are generally advised to disable Telnet if the protocol is not used to
prevent attacks targeting it, but some forget.
Including all types of attack traffic sources, about 17% of attacks were directed at
Telnet. Port 23 was "overwhelmingly the top targeted port for attacks" in Egypt, Peru
and Turkey, Akamai said.
"It is not clear if there is a common thread that connects these three countries, nor
whether these observed attacks were brute-force login attempts or some other botnet-
related traffic," the report said.
B.MANICKAVANNAN
I – MCA
49
KONGU ARTS AND SCIENCE COLLEGE
P.G DEPARTMENT OF COMPUTER SCIENCE
ERODE – 638107
News Bulletin: MCA DATE: 01.02.2011
Wipro
What started off as a hydrogenated cooking fat company, Wipro is today is a $5 billion
revenue generating IT, BPO and R&D services organisation with presence in over 50
countries.
Premji started Wipro with the 'idea of building an organisation which was deeply committed to
values, in the firm belief that success in business would be its inevitable, eventual outcome'.
The company has over 72,000 employees.
Wipro's revenues grew by 33 per cent to Rs 19,957 crore (Rs 200 billion) for the year ended
March 31, 2008. The net profit grew by 12 per cent to Rs. 3,283 crore (Rs. 32.83 billion). The
revenues of the combined IT businesses was $4.3 billion with 43 per cent YoY growth.
Wipro was the only Indian company to be ranked among the top 10 global outsourcing
providers in IAOP's 2006 Global Outsourcing 100 listing. Wipro has also won the International
Institute for Software Testing's Software Testing Best Practice Award.
Infosys
Infosys Technologies Ltd was started in 1981 by seven people with $250. Today, the company
boasts of revenues of over $ 4 billion and 94,379 employees.
Under the leadership of N R Narayana Murthy, the company has become a global brand. The
company is now headed by Kris Gopalakrishnan.
V.SANTHOSH
II - MCA
50
KONGU ARTS AND SCIENCE COLLEGE
P.G DEPARTMENT OF COMPUTER SCIENCE
ERODE – 638107
News Bulletin: MCA DATE: 01.02.2011
USB FLASH DRIVE
A USB flash drive consists of a flash memory data storage device integrated with a
USB (Universal Serial Bus) interface.
USB flash drives are typically removable and rewritable, and physically much
smaller than a floppy disk.
USB flash drives are often used for the same purposes as floppy disks or CD-
ROMs.
They are smaller, faster, have thousands of times more capacity, and are more
durable and reliable because of their lack of moving parts.
USB Flash drives use the USB mass storage standard, supported natively by
modern operating systems such as Linux, Mac OS X, Windows, and other Unix-like
systems.
A flash drive consists of a small printed circuit board carrying the circuit elements.
They should not be confused with some look-alike music player devices that
combine.
It requires a battery for the player function.
USB flash drives draw power from the computer via external USB connection.
M. MENAKA
I - MCA
51
KONGU ARTS AND SCIENCE COLLEGE
P.G DEPARTMENT OF COMPUTER SCIENCE
ERODE – 638107
News Bulletin: MCA DATE: 03.02.2011
AMPLITUBE UPDATE ADDS RECORDING FUTURE TO IPAD
The music software company released a major update to its AmpliTube for iPad app,
highlighted by the addition of 8-track recording as well as the availability of new
stompbox models.
Plug your instrument into Apple’s tablet with a cable—IK Multimedia offers a $40 iRig
adapter—and you can tap into a range of amplifiers and effects to customize your tone.
Image Caption: AmpliTube 2 adds recording capabilities, including an 8-track recorder
available as a $15 in-app purchase.
A single track comes with the 2.0 update, with the option to expand the feature to an 8-
track recorder with a master effects section via a $15 in-app purchase.
IK Multimedia says that each track features a button for enabling recording, an insert
effect, controls for volume and pan, solo and mute switches,
and two send-effect level controls to add ambience and depth with reverb, chorus, and
delay from the master effects section. There’s also a global equalizer and compressor in
the master effects section to tweak your final sound.
AmpliTube include the ability to import songs as backing tracks directly from the iPod
library on your iPad or from a computer using file-sharing or Wi-Fi
S.SARANYA
II - MCA
52
KONGU ARTS AND SCIENCE COLLEGE
P.G DEPARTMENT OF COMPUTER SCIENCE
ERODE – 638107
News Bulletin: MCA DATE: 03.02.2011
IRIS RECOGNITION
Iris recognition is a method of biometric authentication that uses pattern-recognition
techniques based on high-resolution images of the irides of an individual's eyes.
Not to be confused with another, less prevalent, ocular-based technology, retina
scanning, iris recognition uses camera technology, with subtle infrared illumination
reducing specular reflection from the convex cornea, to create images of the detail-rich,
intricate structures of the iris.
Converted into digital templates, these images provide mathematical representations of
the iris that yield unambiguous positive identification of an individual.
Iris recognition efficacy is rarely impeded by glasses or contact lenses. Iris technology
has the smallest outlier (those who cannot use/enroll) group of all biometric
technologies. A key advantage of iris recognition is its stability, or template longevity,
as, barring trauma, a single enrollment can last a lifetime.
Breakthrough work to create the iris-recognition algorithms required for image
acquisition and one-to-many matching was pioneered by John G. Daugman, Ph.D, OBE
(University of Cambridge Computer Laboratory).
These were utilized to effectively debut commercialization of the technology in
conjunction with an early version of the IrisAccess system designed and manufactured
by Korea's LG Electronics. Daugman's algorithms are the basis of almost all currently
(as of 2006) commercially deployed iris-recognition systems.
C.MOGANA
I - MCA
53
KONGU ARTS AND SCIENCE COLLEGE
P.G DEPARTMENT OF COMPUTER SCIENCE
ERODE – 638107
News Bulletin: MCA DATE: 05.02.2011
GIANT RING OF BLACK HOLES
This composite image of Arp 147, a pair of interacting galaxies located about 430
million light years from Earth, shows X-rays from the NASA's Chandra X-ray
Observatory (pink) and optical data from the Hubble Space Telescope (red, green, blue)
produced by the Space Telescope Science Institute (STScI) in Baltimore, Md.
Arp 147 contains the remnant of a spiral galaxy (right) that collided with the elliptical
galaxy on the left. This collision has produced an expanding wave of star formation that
shows up as a blue ring containing in abundance of massive young stars.
These stars race through their evolution in a few million years or less and explode as
supernovas, leaving behind neutron stars and black holes.
The nine X-ray sources scattered around the ring in Arp 147 are so bright that they
must be black holes, with masses that are likely ten to twenty times that of the Sun.
An X-ray source is also detected in the nucleus of the red galaxy on the left and may be
powered by a poorly-fed supermassive black hole.
D.SELVARAJ
II - MCA
54
KONGU ARTS AND SCIENCE COLLEGE
P.G DEPARTMENT OF COMPUTER SCIENCE
ERODE – 638107
News Bulletin: MCA DATE: 05.02.2011
AVAST ANTI-VIRUS
Avast! is an antivirus program developed by AVAST Software a.s. (former
ALWIL Software a.s.), a company based in Prague, Czech Republic. It was first
released in 1988.
Antivirus kernel based on certified antivirus engine.
File System Shield — Real-time protection against viruses and other malware
threats. Scans files as they run on your computer to keep viruses from being
able to execute.
Mail Shield — Scans messages and attachments in E-mail/Microsoft
Outlook/Exchange for viruses.
Web Shield — HTTP protection (local transparent proxy). Version 4.8 also
allows the blocking of URLs. Scans URLs and incoming data for viruses, and
aborts connections to the site if one is found.
P2P shield — Scans P2Pfiles from file share programs.
IM shield — Instant Messaging protection. (Scanning of files transferred
through instant messaging applications) Virus Chest — Quarantine; folder
where infected files can be stored. The virus chest also stores vital system files
to protect them from damage by malware.
A.MUTHUKUMAR
I - MCA
55
KONGU ARTS AND SCIENCE COLLEGE
P.G DEPARTMENT OF COMPUTER SCIENCE
ERODE – 638107
News Bulletin: MCA DATE: 07.02.2011
DOC: 3D GAMING WON'T PERMANENTLY DAMAGE YOUR EYES
Dr. Mark Borchert
An L.A.-based ophthalmologist has said that prolonged exposure to 3D images in
games consoles will not have any permanent adverse effects for adults and children
over four years of age.
Eye scientist Dr. Mark Borchert has refuted claims that upcoming 3D technology
for Sony's PlayStation 3 and Nintendo's 3DS will prove to be damaging for
hardcore games players.
"It's not likely to cause any permanent harm to vision," he said to Gamasutra. He
should know what he's talking about - the L.A.
Times ranked him as one of the best in the profession in the Southern California
area last year.
"There are people who get uncomfortable with it, and get eyestrain or headaches, or
on much rarer occasions, a sense of imbalance or nausea.
But there's no evidence it can cause permanent harm to your vision or use of both
eyes together or anything like that." Music to Sony and Nintendo's collective ears,
then.
R.YASODHA
II - MCA
56
KONGU ARTS AND SCIENCE COLLEGE
P.G DEPARTMENT OF COMPUTER SCIENCE
ERODE – 638107
News Bulletin: MCA DATE: 07.02.2011
Software of Laser Printer
MFPs also run a set of instructions from their internal storage, which is comparable to a
computer's operating system.
Generally, as the size and complexity of an MFP increases, the more like a computer
the device becomes. It is uncommon for a small AIO or even a SOHO MFP to use a
general purpose operating system, however many larger MFPs run GNU/Linux or
VxWorks
Additionally, many print controllers, separate, but integral to the MFP, also run
computer operating systems, with GNU/Linux and Microsoft Windows (often
Windows NT 4.0 Embedded, Windows XP Embedded).
On top of the core operating system and firmware, the MFP will also provide several
functions, equivalent to applications or in some cases daemons or services.
MFP Panel control for user input
Bytecode interpreters or virtual machines for internally hosted third party applications
Web server for remote management functions
Network service clients for sending of documents to different destinations
Network service ig functions
Raster image processing functions
K.MUTHUKUMAR
I - MCA
57
KONGU ARTS AND SCIENCE COLLEGE
P.G DEPARTMENT OF COMPUTER SCIENCE
ERODE – 638107
News Bulletin: MCA DATE: 08.02.2011
Tata Consultancy Services
The Indian software industry is set to keep up its growth rate despite the slowdown in the
economy. The National Association of Software and Services Companies (Nasscom) has
forecast a strong outlook for FY08-09 strong with software and services revenue seen growing
by 21-24 per cent. The software and services exports are set to hit the $50 billion-mark.
The software and services exports segment grew by 29 per cent (in USD) to register revenues
of $40.4 billion in FY07-08, up from $31.4 billion in FY06-07. The domestic segment grew by
26 per cent (in INR) to register revenues of $ 11.6 billion in FY07-08. According to the latest
Nasscom rankings, Tata Consultancy Services Ltd., Infosys Technologies Ltd. and Wipro
Technologies Ltd are the top 3 revenue generators in India.
TCS
Founded in 1968, TCS is one of India's largest corporate houses. It is also India's largest IT
employer with a staff strength of 111,000 employees.
The company began as a division of the Tata Group, called the Tata Computer Centre. Its main
business was to offer computer services to other group companies. Soon the company was spun
off as Tata Consultancy Services after it realised the huge potential of the booming IT services.
The company posted a consolidated net profit of Rs 1,290.61 crore (Rs 12.90 billion) for the
first quarter ended June 30, 2008, an increase of 7.3 per cent compared to the year-ago period.
Its annual sales worldwide stands at $5.7 billion for the fiscal year ending March 2008. During
the year 2007-08,TCS' consolidated revenues grew by 22 per cent to Rs 22,863 crore ($5.7
billion). S. Ramadorai, is the chief executive officer and managing director of TCS.
S.SATHYA
II – MCA
58
KONGU ARTS AND SCIENCE COLLEGE
P.G DEPARTMENT OF COMPUTER SCIENCE
ERODE – 638107
News Bulletin: MCA DATE: 08.02.2011
Cryptographic Algorithms
The conversion of data into a secret code for transmission over a public network. Its
purpose is Confidentiality, Non-refutation, Integrity and verification. There is wide range of
cryptographic algorithms in use.
DES :
This is the 'Data Encryption Standard'. This is a cipher that operates on 64-bit blocks of data,
using a 56-bit key. It is a 'private key' system.
HASH :
A 'hash algorithm' is used for computing a condensed representation of a fixed length
message/file. This is sometimes known as a 'message digest', or a 'fingerprint'..
MD5 :
MD5 is a 128 bit message digest function. It was developed by Ron Rivest.
SHA-1 :
It is a hashing algorithm similar in structure to MD5, but producing a digest of 160 bits.
Because of the large digest size, it is less likely that two different messages will have the same
SHA-1 message digest. For this reason it is recommended in preference to MD5.
D.MYTHILI
I - MCA
59
KONGU ARTS AND SCIENCE COLLEGE
P.G DEPARTMENT OF COMPUTER SCIENCE
ERODE-638107
News Bulletin: MCA DATE: 09.02.2011 Job Seaching Web Sites
www.jobsDB.com
www.financialjobs.com
www.indiareference.com
www.acsjobs.com
www.Firmseekindia.com
www.kempegowda.com
www.acs4jobs.com
www.go4careers.com
www.jmjobs.com
www.alltimesjobs.com
www.globaljobsin.com
www.jobs4it.com
LIST OFCOMPANY MAIL SERVERS
N.SAKTHISARAVANAKUMAR
II - MCA
60
KONGU ARTS AND SCIENCE COLLEGE
P.G DEPARTMENT OF COMPUTER SCIENCE
ERODE-638107
News Bulletin: MCA DATE: 09.02.2011
Hp Launches Cloud Services Hp announced a suite of cloud enabled new products and services targeted at the
government and enterprise customers.
The service titled Hp Hybrid Delivery comes as a part of the Instant-on-Enterprises
strategy launched by Hp last year.
Hp Hybrid Delivery consists of HP Enterprises Cloud Services-Compute that
Deliver ―private cloud as a service‖ from HP’s datacenters.
Governed by specified policies for service, performance, security and privacy,
It provides clients with rapidly deployed, secure computing with scalable IT
Capacity.
The service is built on HP’s converged infrastructure platform and HP
Software.
Hp also announced HP cloud system as an integrated system to build, manage
And consume services across private, public and hybrid cloud environments.
HP cloud system supports HP cloud maps, which provide preconfigured
Service to automatically provision the optimized application and infrastructure
resources.
Nedungadi claimed that the HP cloud system enables new cloud services to be
Up and running in minutes.
HP is also organizing workshops called HP cloud discovery workshops to
Educate government and enterprise customers.
K.MYTHILI
I - MCA
61
KONGU ARTS AND SCIENCE COLLEGE
P.G DEPARTMENT OF COMPUTER SCIENCE
ERODE – 638107
News Bulletin: MCA DATE: 11.02.2011
IBM Develops Denser, Faster Chip Memory
IBM has developed a prototype of what the company claims is the smallest, densest and
fastest on-chip memory, which could lead to higher performing electronics from servers
to consumer gear.
IBM built the technology for use in next-generation 32-nanometer processors.
The embedded dynamic random access memory, or eDRAM, is integrated on the same
die as a multi-core processor, instead of using external DRAM modules and transistor-
based static random access memory, or SRAM, that's typically used for caches.
IBM built its eDRAM using 32-nm, silicon-on-insulator technology that protects the
transistors on the chip with a "blanket" of insulation that reduces electrical leakage.
In comparing its eDRAM cell with 32-nm embedded SRAM, IBM says its technology
is up to four times as dense, which means it can help produce smaller, more efficient
processors that can process more data.
IBM claims its embedded memory is the fastest today, achieving latency and cycle
times of less than 2 nanoseconds.
B.RAFFICRAJA
II - MCA
62
KONGU ARTS AND SCIENCE COLLEGE
P.G DEPARTMENT OF COMPUTER SCIENCE
ERODE – 638107
News Bulletin: MCA DATE: 12.02.2011
Intel Desktop Board DP55KG Extreme Series
Features and Benefits
Support for the Intel® Core™ i7 and Intel® Core™ i5 processors in the LGA1156 package:
Features Intel® Turbo Boost Technology3 and Intel® Hyper-Threading Technology4 for
exceptional performance and scalability, and 8 MB Shared Intel® Smart Cache, enabling
dynamic and efficient allocation of cache.
Intel® P55 Express Chipset: Revolutionary new single chip increases routing space for
additional onboard features and lowers power consumption.
Dual-Channel DDR 3 1600 / 1333 / 1066 MHz memory support: Four DIMM slots support up
to 16 GB5 memory connected directly to the processor via the Integrated Memory Controller. 4
One PCI Express 2.0 x4 slot, two PCI Express 2.0 x1 slots, and two PCI expansion slots:
Flexibility to support PCI Express and legacy PCI devices.
Eight SATA 3.0 GB/s ports, with two additional eSATA ports: Allows for a large addition of
external mass storage using either single hard drives or SATA enclosures supporting port
replication. 7
Six-phase improved voltage regulator: The addition of the CHiL* processor voltage regulator
allows for improved power and voltage delivery to reach even better performance while
running games and media applications.
V.RAGUVARAN
II - MCA
63
KONGU ARTS AND SCIENCE COLLEGE
P.G DEPARTMENT OF COMPUTER SCIENCE
ERODE – 638107
News Bulletin: MCA DATE: 11.02.2011
BLU-RAY DISC
It is an optical disc storage medium designed to supersede the DVD format.
The standard physical medium is a 12 cm plastic optical disc, the same size as DVDs
and CDs.
Discs contain 25 GB per layer, with dual layer discs (50 GB) the norm for feature-
length video discs and additional layers possible later.
A maximum data transfer rate of 36 Mbit/s, a maximum AV bitrate of 30.24 Mbit/s,
and a maximum video bitrate of 29.4 Mbit/s.
Blu-ray Disc recordable" refers to two optical disc formats that can be recorded with an
optical disc recorder.
BD-Rs can be written to once, whereas BD-REs can be erased and re-recorded multiple
times.
The current practical maximum speed for Blu-ray Discs is about 12×. Higher speeds of
rotation (10,000+ rpm).
Blu-ray equipment is encouraged to implement High-bandwidth Digital Content
Protection (HDCP).
Given certain flags in the media streams, a Blu-ray Disc can enforce its reproduction in
a lower resolution whenever a full HDCP-compliant link isn't established all the way
from the Blu-ray drive to the rendering devices (i.e. display and speakers).
S.NITHYA
I – MCA
64
KONGU ARTS AND SCIENCE COLLEGE
P.G DEPARTMENT OF COMPUTER SCIENCE
ERODE – 638107
News Bulletin: MCA DATE: 12.02.2011
SELF-RECONFIGURING ROBOTIC SYSTEMS
Modular self-reconfiguring robotic systems or self-reconfigurable modular robots
are autonomous kinematic machines with variable morphology.
Self-reconfiguring robots are also able to deliberately change their own shape by
rearranging the connectivity of their parts, in order to adapt to new
circumstances, perform new tasks.
They can contain electronics, sensors, computer processors, memory, and power
supplies; they can also contain actuators that are used for manipulating their
location.
A feature found in some cases is the ability of the modules to automatically
connect and disconnect themselves to and from each other, and to form into
many objects or perform many tasks moving or manipulating the environment.
The ―self-reconfiguring‖ or ―self-reconfigurable is a mechanism or device is
capable of utilizing its own system of control such as with actuators or
stochastic means to change its overall structural shape.
There are two basic types of methods of that self-reconfigurable mechanisms can
utilize to reshape their structures, chain reconfiguration and lattice
reconfiguration.
C .POOVIZHISELVI
I - MCA
65
KONGU ARTS AND SCIENCE COLLEGE
P.G DEPARTMENT OF COMPUTER SCIENCE
ERODE – 638107
News Bulletin: MCA DATE: 14.02.2011
NANO ROBOTICS
Nanorobotics is the emerging technology field of creating machines or robots
Whose components are at or close to the microscopic scale of a nanometer (10-9
meters).
More specifically,nanorobotics refer to the nanotecnology engineering discipline of
designing and building nanorobots,with devices ranging in size from 0.1-10.
Micrometers and constructed of nanoscale or molecular components the names
nanobots,nanoids,nanites,nanomachines or nanomites have also been used to describe
these device.
Currently under research and development Nanomachines are largely in the research –
and-development phase,but some primitive molecular machines have been tested.
An example is a sensor having a switch approximately 1.5 nano meters across,capable
of countings specfic molecules in a chemical sample.
The first useful applications of nanomachines might be in medical techonolgy which
could be used to identify and destroy cancer cells.
Another potential application is the detection of toxic chemicals,and the measurement
ot their concentrations,in the environment.
Recentily,Rice University has demonstrated a single-molecule car developed by a
checmical process and including buckybull for wheels.
K.PREMALATHA
I - MCA
66
KONGU ARTS AND SCIENCE COLLEGE
P.G DEPARTMENT OF COMPUTER SCIENCE
ERODE – 638107
News Bulletin: MCA DATE: 15.02.2011
CYBER CRIME
Computer crime, or cyber crime, refers to any crime that involves a computer and a
network. The computer may have been used in the commission of a crime, or it may be
the target.
Government officials and Information Technology security specialists have
documented a significant increase in Internet problems and server scans since early
2001.
But there is a growing concern among federal officials that such intrusions are part of
an organized effort by cyber terrorists, foreign intelligence services, or other groups to
map potential security holes in critical systems.
A cyber terrorist is someone who intimidates or coerces a government or organization
to advance his or her political or social objectives by launching computer-based attack
against computers, network, and the information stored on them.
Cyber terrorism in general, can be defined as an act of terrorism committed through the
use of cyberspace or computer resources (Parker 1983).
As such, a simple propaganda in the Internet, that there will be bomb attacks during the
holidays can be considered cyber terrorism.
K.PRIYADHARSHINI
I – MCA
67
KONGU ARTS AND SCIENCE COLLEGE
P.G DEPARTMENT OF COMPUTER SCIENCE
ERODE – 638107
News Bulletin: MCA DATE: 17.02.2011
APPLICATIONS OF NANOTECHNOLOGY
Diagnosis
Nanotech chip can easily detect the disease in early stages and it can tell what exact
stage of fatal disease like cancer is going on by scanning the human body cells.
Drug delivery.
Transfer of drug to the specific cells of human body suing Nano particles is another
dynamic application of nanotechnology.
Tissue engineering
Nanotechnology also helps the surgeons and doctors for reproducing and repairing the
damaged tissues.
Applications in chemistry.
Nanotechnology is used for exploring the chemical reactions in the field of chemistry
many stimulation models are based on chemical reactions such as nuclear rector, robot power
and many more.
Aapplications in communication sector
Present technologies in communication focuses on top to bottom but nanotechnology
created change when made use of bottom up approach.
Memory storage
Memory storage before the advent of nanotechnology relied on transistors .but now
reconfigurable arrays are formed for storing large amount of data in small space.
C.RAMESH
I - MCA