Wednesday, December 25, 2013

Install Telnet Client in Operating System


On Windows 7, Windows Server 2008 R2, Windows Server 2008 or Windows Vista you can use the following command line procedure to install Telnet Client.
  1. Open a command prompt window. Click Start, type cmd in the Start Search box, and then press ENTER.
  2. Type the following command:
    pkgmgr /iu:"TelnetClient"
    
  3. If the User Account Control dialog box appears, confirm that the action it displays is what you want, and then click Continue.
  4. When the command prompt appears again, the installation is complete.

    On Windows Server 2008, you can use the Role Management tool to install optional components.
    1. Start Server Manager. Click Start, right-click Computer, and then click Manage.
    2. If the User Account Control dialog box appears, confirm that the action it displays is what you want, and then click Continue.
    3. In the Features Summary section, click Add features.
    4. In the Add Features Wizard, select Telnet Client, and then click Next.
    5. On the Confirm Installation Options page, click Install.
    6. When installation finishes, on the Installation Results page, click Close.


    Telnet is a simple but extremely popular protocol for exchanging data between two computers. It is often used for testing computer programs and the Telnet utility is included with Vista, Windows 7 and Windows 8 computers as well though it is not enabled by default.
    Windows Telnet Client

    How to Install Telnet in Windows

    If you would like to use the Telnet command from the DOS (command) prompt, follow these steps to re-enable the Telnet client on your Windows machine:
  5. Go to Control Panel – > Programs and Features.
  6. Click Turn Windows Features on or off.
  7. Enable Telnet Client and click OK.
That’s it. Open the command prompt, type telnet to make sure it works.

Wednesday, December 4, 2013

Windows 8: Enable .NET Framework 3.5 (includes .NET 2.0 and 3.0)


 i.e. (NetFx3) feature in Online & Offline mode!

Obviously the first step for us is to check the Program and Features to enable any available additional features in an Operating System. This is what you see in your Control Panel –> Program and Features. Click on Turn Windows features on or off. 

Here you can see .NET Framework as a feature and by default the feature is disabled. You can enable this particular right away using this GUI Tool but in order to do that you need to be connected to internet i.e. Online Mode. Other way is using DISM Command and this can be done in an Offline Mode using Windows 8 installation media. Let’s see these 2 methods.
Method 1: When you are Online, connected to Internet.
In order to install the following window click on the .NET Framework 3.5 (included .NET 2.0 and 3.0) select it & click OK
image
Now, it will download the entire package from the internet & install the .NET Framework feature.
Method 2: When you are Offline and not connected to Internet
If you open CMD.EXE with Administrative Privileges i.e. at elevated level & run the this DISM command dism /online /get-features you will see that from the State that .NET Framework is not part of the Operating System.
image
image
So the first thing you need to do is to copy the required package to local machine before you run the command to install .NET Framework. To do that use Windows 8 ISO/DVD/USB Media. You need to copy SXS folder to local machine located at D:\sources\sxs (In this case D: your drive letter on which you have loaded Windows 8 Media)
image
You can also use the following command to copy this folder locally. xcopy d:\sxs\*.* c:\sxs /s
Once completed, in order to install this feature you can run the following command dism /online /enable-feature /featurename:NetFx3 /All /SourceC:\sxs /LimitAccess  and hit Enter
image
After completing the installation of .NET Framework 3.5 you can see that the feature is enabled in the Control Panel –> Program and Features
image
Bingo. Now you can enable .NET Framework feature on Windows 8 without needing of an internet connection.
Enjoy

Friday, November 8, 2013

WINDOWS RUN Commands !!!


1. Accessibility Controls - access.cpl
2. Accessibility Wizard - accwiz
3. Add Hardware Wizard - hdwwiz.cpl
4. Add/Remove Programs - appwiz.cpl
5. Administrative Tools - control admintools
6. Automatic Updates - wuaucpl.cpl
7. Bluetooth Transfer Wizard - fsquirt
8. Calculator - calc
9. Certificate Manager - certmgr.msc
10. Character Map - charmap
11. Check Disk Utility - chkdsk
12. Clipboard Viewer - clipbrd
13. Command Prompt - cmd
14. Component Services - dcomcnfg
15. Computer Management - compmgmt.msc
16. Control Panel - control
17. Date and Time Properties - timedate.cpl
18. DDE Shares - ddeshare
19. Device Manager - devmgmt.msc
20. Direct X Troubleshooter - dxdiag
21. Disk Cleanup Utility - cleanmgr
22. Disk Defragment - dfrg.msc
23. Disk Management - diskmgmt.msc
24. Disk Partition Manager - diskpart
25. Display Properties - control desktop
26. Display Properties - desk.cpl
27. Dr. Watson System Troubleshooting Utility -
drwtsn32
28. Driver Verifier Utility - verifier
29. Event Viewer - eventvwr.msc
30. Files and Settings Transfer Tool - migwiz
31. File Signature Verification Tool - sigverif
32. Findfast - findfast.cpl
33. Firefox - firefox
34. Folders Properties - control folders
35. Fonts - control fonts
36. Fonts Folder - fonts
37. Free Cell Card Game - freecell
38. Game Controllers - joy.cpl
39. Group Policy Editor (for xp professional) -
gpedit.msc
40. Hearts Card Game - mshearts
41. Help and Support - helpctr
42. HyperTerminal - hypertrm
43. Iexpress Wizard - iexpress
44. Indexing Service - ciadv.msc
45. Internet Connection Wizard - icwconn1
46. Internet Explorer - iexplore
47. Internet Properties - inetcpl.cpl
48. Keyboard Properties - control keyboard
49. Local Security Settings - secpol.msc
50. Local Users and Groups - lusrmgr.msc
51. Logs You Out Of Windows - logoff
52. Malicious Software Removal Tool - mrt
53. Microsoft Chat - winchat
54. Microsoft Movie Maker - moviemk
55. Microsoft Paint - mspaint
56. Microsoft Syncronization Tool - mobsync
57. Minesweeper Game - winmine
58. Mouse Properties - control mouse
59. Mouse Properties - main.cpl
60. Netmeeting - conf
61. Network Connections - control netconnections
62. Network Connections - ncpa.cpl
63. Network Setup Wizard - netsetup.cpl
64. Notepad - notepad
65. Object Packager - packager
66. ODBC Data Source Administrator -
odbccp32.cpl
67. On Screen Keyboard - osk
68. Outlook Express - msimn
69. Paint - pbrush
70. Password Properties - password.cpl
71. Performance Monitor - perfmon.msc
72. Performance Monitor - perfmon
73. Phone and Modem Options - telephon.cpl
74. Phone Dialer - dialer
75. Pinball Game - pinball
76. Power Configuration - powercfg.cpl
77. Printers and Faxes - control printers
78. Printers Folder - printers
79. Regional Settings - intl.cpl
80. Registry Editor - regedit
81. Registry Editor - regedit32
82. Remote Access Phonebook - rasphone
83. Remote Desktop - mstsc
84. Removable Storage - ntmsmgr.msc
85. Removable Storage Operator Requests -
ntmsoprq.msc
86. Resultant Set of Policy (for xp professional) -
rsop.msc
87. Scanners and Cameras - sticpl.cpl
88. Scheduled Tasks - control schedtasks
89. Security Center - wscui.cpl
90. Services - services.msc
91. Shared Folders - fsmgmt.msc
92. Shuts Down Windows - shutdown
93. Sounds and Audio - mmsys.cpl
94. Spider Solitare Card Game - spider
95. SQL Client Configuration - cliconfg
96. System Configuration Editor - sysedit
97. System Configuration Utility - msconfig
98. System Information - msinfo32
99. System Properties - sysdm.cpl
100. Task Manager - taskmgr
101. TCP Tester - tcptest
102. Telnet Client - telnet
103. User Account Management - nusrmgr.cpl
104. Utility Manager - utilman
105. Windows Address Book - wab
106. Windows Address Book Import Utility - wabmig
107. Windows Explorer - explorer
108. Windows Firewall - firewall.cpl
109. Windows Magnifier - magnify
110. Windows Management Infrastructure -
wmimgmt.msc
111. Windows Media Player - wmplayer
112. Windows Messenger - msmsgs
113. Windows System Security Tool - syskey
114. Windows Update Launches - wupdmgr
115. Windows Version - winver

Tuesday, September 17, 2013

Top 10 Strategic Technology Trends for 2013: Big Data, Cloud, Analytics and Mobile

The top 10 technologies and trends that will be strategic for most organizations in 2013, presented during Gartner Symposium/ITxpo.

Gartner defines a strategic technology as one with the potential for significant impact on the enterprise in the next three years. Factors that denote significant impact include a high potential for disruption to IT or the business, the need for a major dollar investment, or the risk of being late to adopt.

A strategic technology may be an existing technology that has matured and/or become suitable for a wider range of uses. It may also be an emerging technology that offers an opportunity for strategic business advantage for early adopters or with potential for significant market disruption in the next five years. These technologies impact the organization's long-term plans, programs and initiatives.

“We have identified the top 10 technologies that will be strategic for most organizations, and that IT leaders should factor into their strategic planning processes over the next two years,” said David Cearley, vice president and Gartner fellow. “This does not necessarily mean enterprises should adopt and invest in all of the listed technologies; however companies need to be making deliberate decisions about how they fit with their expected needs in the near future.”

Cearley said that these technologies are emerging amidst a nexus of converging forces - social, mobile, cloud and information. Although these forces are innovative and disruptive on their own, together they are revolutionizing business and society, disrupting old business models and creating new leaders. As such, the Nexus of Forces is the basis of the technology platform of the future.
The top 10 strategic technology trends for 2013 include:

Mobile Device Battles

Gartner predicts that by 2013 mobile phones will overtake PCs as the most common Web access device worldwide and that by 2015 over 80 percent of the handsets sold in mature markets will be smartphones. However, only 20 percent of those handsets are likely to be Windows phones. By 2015 media tablet shipments will reach around 50 percent of laptop shipments and Windows 8 will likely be in third place behind Google’s Android and Apple iOS operating systems. Windows 8 is Microsoft’s big bet and Windows 8 platform styles should be evaluated to get a better idea of how they might perform in real-world environments as well as how users will respond. 

Consumerization will mean enterprises won't be able to force users to give up their iPads or prevent the use of Windows 8 to the extent consumers adopt consumer targeted Windows 8 devices. Enterprises will need to support a greater variety of form factors reducing the ability to standardize PC and tablet hardware. The implications for IT is that the era of PC dominance with Windows as the single platform will be replaced with a post-PC era where Windows is just one of a variety of environments IT will need to support.

Mobile Applications and HTML5

The market for tools to create consumer and enterprise facing apps is complex with well over 100 potential tools vendors. Currently, Gartner separates mobile development tools into several categories. For the next few years, no single tool will be optimal for all types of mobile application so expect to employ several. Six mobile architectures – native, special, hybrid, HTML 5, Message and No Client will remain popular. However, there will be a long term shift away from native apps to Web apps as HTML5 becomes more capable. 

Nevertheless, native apps won't disappear, and will always offer the best user experiences and most sophisticated features. Developers will also need to develop new design skills to deliver touch-optimized mobile applications that operate across a range of devices in a coordinated fashion.

Personal Cloud

The personal cloud will gradually replace the PC as the location where individuals keep their personal content, access their services and personal preferences and center their digital lives. It will be the glue that connects the web of devices they choose to use during different aspects of their daily lives. 

The personal cloud will entail the unique collection of services, Web destinations and connectivity that will become the home of their computing and communication activities. Users will see it as a portable, always-available place where they go for all their digital needs. 

In this world no one platform, form factor, technology or vendor will dominate and managed diversity and mobile device management will be an imperative. The personal cloud shifts the focus from the client device to cloud-based services delivered across devices.

Enterprise App Stores

Enterprises face a complex app store future as some vendors will limit their stores to specific devices and types of apps forcing the enterprise to deal with multiple stores, multiple payment processes and multiple sets of licensing terms. 

By 2014, Gartner believes that many organizations will deliver mobile applications to workers through private application stores. With enterprise app stores the role of IT shifts from that of a centralized planner to a market manager providing governance and brokerage services to users and potentially an ecosystem to support apptrepreneurs.

The Internet of Things

The Internet of Things (IoT) is a concept that describes how the Internet will expand as physical items such as consumer devices and physical assets are connected to the Internet. Key elements of the IoT which are being embedded in a variety of mobile devices include embedded sensors, image recognition technologies and NFC payment. 

As a result, mobile no longer refers only to use of cellular handsets or tablets. Cellular technology is being embedded in many new types of devices including pharmaceutical containers and automobiles. Smartphones and other intelligent devices don't just use the cellular network, they communicate via NFC, Bluetooth, LE and Wi-Fi to a wide range of devices and peripherals, such as wristwatch displays, healthcare sensors, smart posters, and home entertainment systems. The IoT will enable a wide range of new applications and services while raising many new challenges.

Hybrid IT and Cloud Computing

As staffs have been asked to do more with less, IT departments must play multiple roles in coordinating IT-related activities, and cloud computing is now pushing that change to another level.
A recently conducted Gartner IT services survey revealed that the internal cloud services brokerage (CSB) role is emerging as IT organizations realize that they have a responsibility to help improve the provisioning and consumption of inherently distributed, heterogeneous and often complex cloud services for their internal users and external business partners. The internal CSB role represents a means for the IT organization to retain and build influence inside its organization and to become a value center in the face of challenging new requirements relative to increasing adoption of cloud as an approach to IT consumption.

Big Data is moving from a focus on individual projects to an influence on enterprises’ strategic information architecture. Dealing with data volume, variety, velocity and complexity is forcing changes to many traditional approaches. This realization is leading organizations to abandon the concept of a single enterprise data warehouse containing all information needed for decisions. Instead they are moving towards multiple systems, including content management, data warehouses, data marts and specialized file systems tied together with data services and metadata, which will become the "logical" enterprise data warehouse.

Actionable Analytics

Analytics is increasingly delivered to users at the point of action and in context. With the improvement of performance and costs, IT leaders can afford to perform analytics and simulation for every action taken in the business. The mobile client linked to cloud-based analytic engines and big data repositories potentially enables use of optimization and simulation everywhere and every time. This new step provides simulation, prediction, optimization and other analytics, to empower even more decision flexibility at the time and place of every business process action.

In Memory Computing

In memory computing (IMC) can also provide transformational opportunities. The execution of certain-types of hours-long batch processes can be squeezed into minutes or even seconds allowing these processes to be provided in the form of real-time or near real-time services that can be delivered to internal or external users in the form of cloud services. Millions of events can be scanned in a matter of a few tens of millisecond to detect correlations and patterns pointing at emerging opportunities and threats "as things happen." The possibility of concurrently running transactional and analytical applications against the same dataset opens unexplored possibilities for business innovation. Numerous vendors will deliver in-memory-based solutions over the next two years driving this approach into mainstream use.

Integrated Ecosystems

The market is undergoing a shift to more integrated systems and ecosystems and away from loosely coupled heterogeneous approaches. Driving this trend is the user desire for lower cost, simplicity, and more assured security. Driving the trend for vendors the ability to have more control of the solution stack and obtain greater margin in the sale as well as offer a complete solution stack in a controlled environment, but without the need to provide any actual hardware. 

The trend is manifested in three levels. Appliances combine hardware and software and software and services are packaged to address and infrastructure or application workload. Cloud-based marketplaces and brokerages facilitate purchase, consumption and/or use of capabilities from multiple vendors and may provide a foundation for ISV development and application runtime. In the mobile world, vendors including Apple, Google and Microsoft drive varying degrees of control across and end-to-end ecosystem extending the client through the apps.

Sunday, July 28, 2013

Top Trends in Cloud Computing 2013

In 2012, cloud computing became a much bigger trend in the business and networking world. IDC have predicted a 130% increase in cloud computing by 2016, meaning an increase to $43 billion. Here are some of the five trends to look out for that are coming in 2013 which are going to help boost cloud computing in the long term,

Subscription

With more and more companies beginning to look into cloud computing, the hype is growing every day and more businesses are using it. Colleges are using it more and more to help store lecture data for easy access to the class. Businesses are using it to work from home, pick up easy access to documents and for sharing important company information. One of the big changes expected to appear in 2013 is the subscription model for Cloud computing. The idea is that you will only pay for how much data you need, rather than buying bulk for space that may never be used. It gives you a powerful security measure as well, knowing that your paid-up data is protected and accessible at any given time.

Recovery Services

Cloud computing gives you so much freedom, it could eventually start to replace backup companies as a cost-effective and easy to use way to back-up your whole company. Using resources that are only stored on the company intranet, it would be very good to be able to have important company documents stored online, saved and updated regularly. There has been more and more talk and actual action of smaller to medium businesses moving toward the cheaper cloud alternative, and the trends are showing that larger businesses are beginning to see the potential in cloud computing, too.

Security

The one hold-back of cloud computing at this moment in time, is the lack of – or perceived lack of – quality in the defense it offers you and your data. Cloud computing however is improving all the time, and there is a continued effort to bring in new clients with more and more companies that provide cloud computing to produce a top quality safety structure. This is essential as cloud computing is all about protection and privacy anyway, so getting this right could really detonate the niche. This is surprising because you would imagine that a software as important as cloud computing would already have top-grade security.

Specific Designs

Much like when phone apps became big, more companies started to spend money on having a mobile app designed to complement the website. Restaurants perhaps seen the most use from this, as it gave them a new dimension and something to hook in potential customers with. Businesses are beginning to view cloud computing in the same light. It can be shifted and edited to make your organization more powerful and to give you a top of the range service which is very unique at present. As the trends show, more and more businesses are looking to leverage the power of the internet and using a modified version of cloud computing could be an extremely valuable tool for certain niches.

Hoarding

This may sound odd, but the term hoarders refers to people who just pile up crazy amounts of junk in their house and hold onto it for years, believing all of it to be extremely valuable. Well, cloud computing has been shown to be heading toward a budding trend of hoarders getting involved. More people are filling up their cloud compartments with random old files, and sentimental objects, that remind them of a previous time in their life. They do not want to delete these files permanently, but they don’t really intend on looking at them or using them ever again.

Cloud Computing and Mobile Technology in Indian Universities

Six universities in the northeast will adopt cloud and mobile phone technology in their curriculum in graduate, post graduate and diploma levels, becoming the only educational institutions in the country to offer such courses. The technology, part of Microsoft's Azure for Cloud computing, will be included in the July and August curriculum of the universities, and is intended to give an edge to students from the region looking to make a career in this burgeoning field.

The universities that have updated their curriculum with respect to the latest technology available in cloud computing and mobile technology are Rajiv Gandhi University, Manipur University, Tripura University, Mizoram University, Tezpur University and North East Hill University (NEHU).

Cloud technology is a standardized IT capability in the lines of software application platform and infrastructure delivered through the internet via pay-per-use or self-service mode. Cloud technology is also a marketing term referring to storage, computation and connection to multiple servers. There are three scenarios in which cloud technology is applicable and it focuses on public cloud, private cloud and cloud productivity.

"Cloud technology was developed only in 2010 and it is the current technological marvel through which users can make access their applications in a very conducive atmosphere. Microsoft is very serious about the educational scenario in the country. The reason that we have chosen the Northeast is because, compared to other parts of the country, the wave and the effects of economic liberalisation have been slow here. At the same time, the scenario is changing and to remove these deficiencies we have decided that this region should be given a fair chance of technological education. It is part of an initiative called Microsoft Faculty Connection, where we provide free training to faculties in terms of curriculum with commitments to educational institutions," said Venkatesh Sarvasiddhi, DPE, academic developer evangelist, Microsoft. "We are helping the institutions build resources, train and enhance the employability skills of students," he added. Imocha Singh, head of the computer science department at Manipur University, said: "This will help the students, especially those in the IT field, as they will equipped to handle this new technology. The course will give them an edge over others and students from the northeast. IT is a great opportunity for employees and one can address technological requirements through such updating of the curriculum. The students are definitely excited and full of enthusiasm."

Part of the curriculum will also include technology with respect to mobile phones and smart phones specifically focusing on Windows Phone, which has been designed to deliver a mobile experience in getting people together. "We will be using this as a platform in imparting the required education and for this purpose we will have a Faculty Connect Symposium in Manipur to train faculties. added Sarvasiddhi.



Sunday, June 2, 2013

Top Trends in Computer science 2013

Top trends in Computer Society

As a technology professional, keeping on top of trends is crucial. Below is a list of technology topics that Computer Society magazines, journals, and conferences will be focusing on next year:

1) Internet of Things

The Internet of Things is more than just the newest buzzword. The IoT promises to be the most disruptive technological revolution since the advent of the World Wide Web. Projections indicate that up to 100 billion uniquely identifiable objects will be connected to the Internet by 2020, but human understanding of the underlying technologies has not kept pace. This creates a fundamental challenge to researchers, with enormous technical, socioeconomic, political, and even spiritual consequences.
In recognition of the importance of IoT, Computer, the IEEE Computer Society's flagship magazine, is planning a special issue in February 2013. "The Internet of Things: The Next Technological Revolution" will offer a forum for highlighting what the IoT could bring to the end user. Recommended topics for this special issue include design and development methodology for a user-centered IoT; the dynamics of social media and connected objects; community programming for the IoT, including citizen science, citizen journalism, and social activism; opportunistic sensing, big data, and the IoT; and the impact of the IoT on the future networked society.

2) Cyber security

Recent technological advances in computing, communications, software, and hardware have enabled the significant growth of cyberspace, an important aspect of modern life that continues to transform the way citizens, business, and governments interact, collaborate, and conduct business. Our heavy dependence on various digital infrastructures has made them strategic national assets that must be protected to ensure economic growth, prosperity, and safety in the future.
Cyber security is an emerging area of intense activity that endeavors to provide innovative solutions to ensure uninterrupted communications and service availability. The latest advances in cyber security that is critical in thwarting future threats, attacks, fraud, and damage. It focuses on effective techniques and approaches that have the potential to ensure a safe, trustworthy, secure, and resilient cyberspace.

3) Big Data Visualization

We've entered a data-driven era, in which data are continuously acquired for a variety of purposes. The ability to make timely decisions based on available data is crucial to business success, clinical treatments, cyber and national security, and disaster management. Additionally, the data generated from large-scale simulations, astronomical observatories, high-throughput experiments, or high-resolution sensors will help lead to new discoveries if scientists have adequate tools to extract knowledge from them.
However, most data have become simply too large and often have too short a lifespan. Almost all fields of study and practice sooner or later will confront this big data problem. Government agencies and large corporations are launching research programs to address the challenges presented by big data. Visualization has been shown to be an effective tool not only for presenting essential information in vast amounts of data but also for driving complex analyses. Big data analytics and discovery present new research opportunities to the computer graphics and visualization community. It aims to highlight the latest advancements in solving the big data problems via visual means. 

4) Cloud Computing in Science and Engineering

Cloud computing has emerged as a dominant paradigm, widely adopted by enterprises. Clouds provide on-demand access to computing utilities, an abstraction of unlimited computing resources, and support for on-demand scale-up, scale-down, and scale-out. Cloud platforms are also rapidly becoming viable for scientific exploration and discovery, as well as education. As a result, it is critical to understand application formulations and usage modes that are meaningful in such a hybrid infrastructure, the fundamental conceptual and technological challenges, and ways that applications can effectively utilize clouds.
The goal is to explore how cloud platforms and abstractions, either by themselves or in combination with other platforms, can be effectively used to support real-world science and engineering applications. Topics of interest include algorithmic and application formulations, programming models and systems, runtime systems and middleware, end-to-end application workflows, and experiences with real applications.

5) Mobile Computing Meets the Cloud

It could be argued that two of the most important technological developments of the last few years are the emergence of mobile and cloud computing. By shifting the hardware and staffing costs of managing computational infrastructure to third parties such as Google, Microsoft, or Amazon, cloud computing has made it possible for small organizations and individuals to deploy world-scale services; all they need to pay is the marginal cost of actual resource usage. At the same time, the deployment of 3G and 4G networks, the rapid adoption of feature-rich smartphones, and the growing integration of computation into consumer products such as cars and home appliances, have brought mobile and pervasive computing into the mainstream.
The aim is to explore the intersections of these two trends. Mobile and embedded devices make it possible for users to access cloud-based services and data anywhere and anytime, extending their reach into everyday life. Simultaneously, cloud computing platforms are a natural fit to remedy the lack of local resources in mobile and pervasive devices, while enabling resource-intensive next generation applications. We invite original and high-quality submissions addressing all aspects of this field, as long as the connection to the focus topic is clear and emphasized. 

6) Internet Censorship and Control

The Internet is a battleground where fights for technical, social, and political control are waged, including between governments and their citizens, separate governments, and competing commercial interests. These fights take many forms, including Internet filtering versus circumvention, surveillance versus anonymization, denial of service attacks and intrusion attempts versus protection mechanisms, and on- and offline persecution and defense of online activists. These battles impact and are impacted by the Internet's technical structure. As the Internet continues to embed itself into our world, its structural changes will have an increasing effect on our social and political structures, and our social and political structures will have increasing impact on the Internet's technical structure. It explores the technical, social, and political mechanisms and impacts of Internet censorship and control.

7) Interactive Public Displays 

Recent trends show an increasing prevalence of interactive displays of varying sizes in public and urban life. With their prominent visibility and the integration of diverse methods for interaction, they can offer new opportunities to enrich user experiences beyond the personal sphere, for instance in public knowledge institutions such as museums and libraries, or integrated within public plazas or architectural facades. The public context with its social and cultural particularities and constraints provides a large variety of intriguing but challenging settings and use-case scenarios for interactive displays of varying sizes. It focuses on research that addresses the opportunities and challenges around public indoor and outdoor urban display installations. 

8) Next-Generation Mobile Computing

Ubiquitous, pervasive mobile computing is all around us. We use mobile computing not only when we interact with our smartphones to connect with friends and family across states and countries, but also when we use ticketing systems on a bus or train to work or home, purchase food from a mobile vendor at a park, watch videos and listen to music on our phones and portable music playing devices. In other words, mobile computing is not only the interaction of smart phones with each other. Any computation system that is expected to move and interact with end users or other computational systems despite potential changes in network connectivity—including loss of connectivity or changes in type of connectivity or access point—participates in mobile computing infrastructure, and the number of such systems is expected to grow significantly each year over the coming decades.
Many of these systems in urban areas take advantage of robust networking infrastructure, gigabit bandwidth backbones, high-speed relays, and unlimited power and recharging capabilities. However, many of these systems operate within degraded network, power, or computing environments, such as for first-responders in a catastrophe, mobile phone users in remote regions or in countries where communication infrastructure is degraded or even millions of people watching fireworks along a river and overwhelming the local networking infrastructure in a major metropolitan area. IEEE Software seeks submission of articles that explore the next generation of mobile computing within the contexts of mission-critical scenarios, quality-of-service differentiation, and resource constraints. 

9) 3D Imaging Techniques and Multimedia Applications

With the advances in sensing, transmission, and visualization technology, 3D information has become increasingly incorporated into real-world applications—from architecture to entertainment, manufacturing, and security. Integrating depth perception into such application can help present an even richer media interface. For example, in immersive telecommunication, spatialized audio and 3D parallax increases the effectiveness of communication; in medicine, 3D instrument tracking enables more precise and safer operations; and new low-cost 3D cameras are starting a new chapter in interactive gaming and human-computer interaction.
One of the fundamental requirements of these applications is the estimation of scene depth information. The extraction of 3D information has been studied in the field of computer vision for more than three decades, but it remains a challenging problem, in particular under unconstrained environments that can include variable lighting, specular and deforming scene surfaces, and occluded objects, among other things. Multimedia researchers must account for imperfect depth information when designing their systems, making this a unique research opportunity.  Overview of recent rapid advances in 3D acquisition systems and the many multimedia applications that can benefit from 3D integration and understanding.

10) Safety-Critical Systems: The Next Generation

Safety-critical computer-based systems are woven into the fabric of our lives. These days, they can't be safe without being secure—yet security is just one of many challenges. These systems must be trusted to work adequately given user behavior, system interactions, changing environment and expectations, organizational turbulence, regulatory caution, routine component and operator failure, the complexity of international projects, and adaptation and refurbishment. In addition, there are the security-related issues such as intentional, malicious attacks and supply-chain risks.

11) Reliability

Over the past decade, designers have sought after efficient design points with respect to power, performance and cost. Of these, power has undoubtedly emerged as a first-order design challenge. In the coming era, this challenge may be subsumed by the challenge of building robust and reliable systems. As technology advances, susceptibility of systems to transient errors, such as timing violations, parameter variations, aging and infant mortality, is steadily increasing. Without innovations in the areas of microprocessor and software reliability, future systems may face continuous failure. Thus, new computing paradigms are required that incorporate adaptive techniques at both the hardware and software layers to ensure robust and resilient execution. The system, as a whole, must dynamically detect and recover from errors to meet historically established high reliability standards without exceeding power budgets and cost constraints, and violating performance targets. Topics related to reliability that span the spectrum of layers in the system stack, from device, circuit and architecture design to the role of software in enabling robust and reliable computing. 

12) Haptics in Rehabilitation

Robotic devices have been shown to be effective at delivering the intensive and repetitive therapy that is known to induce brain plasticity and foster restoration of motor coordination after stroke, spinal cord injury, and other neural impairments. Engagement of the sensorimotor system, including haptic feedback to the participant during rehabilitation, is an important factor in regaining motor control. Further, haptic feedback can enhance the natural control, utility, and efficacy of advancement of prosthetic and orthotic devices that restore mobility and manipulability to lower- and upper-extremity amputees.  However, advanced prosthetic devices, for example, have decoupled the normal afferent-efferent loop and rely heavily on visual feedback to the amputee for control in the absence of haptics. The science and technology of haptics thus has great potential to affect the outcomes of rehabilitation and adoption of advanced prosthetic and orthotic devices. About understanding the role of touch in sensorimotor coordination, including rehabilitation of motor deficits and use of advanced prostheses and orthoses. 

13) Multicore Memory Coherence

As we enter an era of large multicores, the question of efficiently supporting a shared memory model has become of paramount importance. Massively parallel architectures lacking coherent shared memory have enjoyed great success in niche applications such as 3D rendering, but general programming developers still demand the convenience of a shared memory abstraction.
Efficiently using a message passing interface requires that the individual computation tasks must be relatively large to overcome the communication latencies, and it becomes difficult to use MPI at the fine-grained level when fast on-chip communication is available. Higher-level mechanisms like MapReduce or shard-based databases are popular in particular application domains but researchers have not yet efficiently applied them at the chip/node level.


Wednesday, May 22, 2013

Books for CSIR NET Computer Science

Exam
  • Discrete Structures
  • Computer Arithmetic
  • Programming with C and C++
  • Data and File structures
  • Relational Database Design and SQL
  • Computer Networks
  • System Software and Compiler
  • Operating System
  • Software Engineering
Books on Discrete Structures
  • Elements of Discrete Mathematics by C.L.Liu
  • Applied Discrete Structure for Computer Science by Alan Doerr and Kenneth Levassur
  • Discrete Computational Structure by Korfhage R.R
  • Discrete Mathematical Structure for Computer Science by Bernard Kolman & Robert C Busy
Books on Computer Arithmetic
  • Computer System Architecture by Morris Mano
  • Digital Logic and Computer Design by Morris Mano
Books on Programming with C and C++
  • ANSI C by Balagurusamy
  • C + + Printer Plus, Stephen Parata, Galgotia
  • The Annotated C + + Reference Manual, Manaret Ellis & Bjarne Strousstrup.
  • Object Oriented Programming in C + + by Robert Lafore, Galgotia
  • An Introduction to the OOP by K.V. Witt, Galgotia
  • Jamsa’s 1001 C/C + + Tips, by Kris Jamsa, Galgotia
  • A  Treaties on Object Oriented Programming Using C + + by B. Chandra
Books on Relational Database Design and SQL
  • Fundamental of Database Systems by R. Elmasri; S. Navate; Benjamin Cummings;
  • Introduction to database systems   by C. J .Date
  • Database system concept    by Korth
  • Principles of Database Management by James Martin
  • Relational database design for Microcomputers Application by Jackson
  • Database Management Systems   by Bipin Desai
Books on Data and File structures
  • Data Structure by Tremblay & Sorrenson
  • Fundamentals of Data Structure by S. Sawhney & E. Horowitch
Books on Computer Networks
  • Computer Networks by A. S. Tanenbaum
  • Modeling and Analysis of Computer Communication Networks by J.F. Hays
  • Data Network by D. Bertsekas and R. Gallager
  • Internet Working With TCP/IP by D.E. Comer
  • Local Area Networks by G. E. Keiser
  • Data and Computer Communication by W. Stalling
Books on System Software and Compiler
  • Compiler Construction - D.M.Dhandhere
  • Compiler Writing - Tremble-Sorenson
  • The Essence of Compilers by Hanter
  • Computers: Princ, Techniques cools by Aho
Books on Operating System
  • Operating System Concepts by James L. Peterson & A. Silberschatz
  • Modern Operating Systems by Andrew S. Tenenbaum
  • An Introduction to Operating Systems by Dietel H.M
  • Systems programming & operating systems by Dhamdhere
  • Operating System by Achyut Godbole
  • System Programming & OS by D.M. Dhamdhere
  • Operating System by Galvin
  • LAN Operating Systems by Michael Budnick L.,Et Al
Books on Software Engineering
  • Software Engineering – A Practitioners Approach by Roger S. Pressman
  • An Integrated Approach to S/W Engineering by Pankaj Jolote
  • Software Engineering – A Programming Approach, by D. Belie I. Moray, J. Rough
  • Software Testing Techniques by Barrios Bier
  • Software Engineering Concepts-Richard Fairley
These books help one to gain knowledge in core areas of computer science. Systematic preparation using these reference books will help the candidate to score well in the exam. There are also e-version of some of these books available for reference.

UGC NET in Computer Science

Exam pattern

The University Grants Commission National Eligibility Test has recently introduced a new exam pattern. All the questions will be multiple choice objective types. There will be 60 questions in paper 1. Of these candidates are required to attempt only 50 questions. Paper 2 and Paper 3 comprise of fifty and seventy five questions respectively. Candidates are required to answer all questions in these sections. The maximum marks allotted for Paper 1 and Paper 2 is two hundred. Paper 3 will contain questions for a maximum of 150 marks. There is no negative marking in this exam. Candidates are required to score a minimum of 40 % marks in paper 1 and paper 2 so as to clear the cut off. 50 % marks is required to qualify paper 3.

Reference books for UGC NET Computer Science
  • UGC University Grants Commission NET/SET for Lectureship Exam Paper I (Compulsory) - As per new syllabus by GKP
  • UGC NET/JRF/SLET Teaching & Research Aptitude (General Paper-I) by Lal Jain, K. C. Vashistha
  • UGC NET Digest Teaching and Research Aptitude (General Paper - I) by Dr. M. L. Kamlesh
  • UGC - JRF & Lectureship Paper I Teaching and Research Aptitude by Dr. M S Ansari
  • Discrete Mathematical Structures by Baker
  • Computer System Architecture by M.Morris Mano
  • Computer Organisation by Karl Hamachar,Zaky
  • DBMS by Raghu Rama Krishnan
  • Fundamental Of Databse System by Navathe
  • Database Concepts by Korth
  • Intro To Datastructures  By Trembley
  • Fundamentals Of Data structure By A M Padmareddy
  • Data communication by Forouzan
  • Unix Programming by R.Stevensons
  • Theory Of Langauages by Aho Ullman
  • System Programming by Jhon J Donovan
  • Software Engineering Concepts by Pressman Or Somerville
  • Principles Of Compiler Design by Aho Ullman R.Sethi
  • Operating System Concepts by A.Galvin
  • Neural Network Fundamentals With Graphs ,Algorithms by N.K.Bose ,P.Liang
  • Introduction To Algorithms by Coreman
  • Fundamental Of Algorithms by Sahani & Others
  • Computer Networks by Leon Garcia,Widja
  • Computer Graphics C Version by H.Backer
  • Comipiler Construction by D M Dhamdhere
  • Finite Automata And Languages by Am Padmareddy
Apart from these books, candidates are advised to refer textbooks studied during the Bachelor’s and Master’s programme in Computer Science. Besides this, candidates can also refer journals and websites on related topics for a more comprehensive overview.

On examining the previous year papers, it has been observed that the following pattern has been followed in the Paper-II for Computer Science

Subject No. of Questions
Discrete Structures/ Mathematics 5
Computer Arithmetic 5
Programming in C & C++ 5
Relational DB Design & SQL 5
Data & File Structures 5
System Software & Compilers 5
Operating Systems 5
Software Engineering 5
Computer Networks 5
Current Trends & Technologies 5
Total Questions 50


To clear the paper-II a candidate must acquire 40 marks. You can select any six subjects of your choice and prepare these subjects  thoroughly to aim for an attempt of 60 marks. I have cleared NET in CS by following this strategy, So I hope it will work for others too.
Books recommended for the paper II
Most of the books that are recommended here contain large number of solved and unsolved problems. You must focus on the questions given at the back of chapters. In addition to these GATE( Computer Science) entrance test preparation book will be a good support to practice questions.
Subject Books
Discrete Structures/ Mathematics
1. Schaum's Outline Series, Discrete Mathematics.
2. 2000 Solved Problems in Discrete Mathematics, Schaum's Outline Series.
3. Discrete mathematical structures with applications to computer science,Jean-Paul Tremblay,R. Manohar.
Computer Arithmetic
1. Structured Computer Organization, Andrew S. Tanenbaum.
Programming in C & C++
1.Schaum's Outline of Programming with C,
Byron Gottfried.
2.Schaum's Outline of Programming with C++, John Hubbard
3.Let us C solution by Yashwant Kanetkar
4.Test Your C Skills - Yashavant Kanetkar
Yashwant Kanetkar
Relational DB Design & SQL
1. An introduction to database systems,C. J. Date
2.Schaum's Outline of Fundamentals of Relational Databases.by Ramon Mata-Toledo
Data & File Structures
1. Schaum's outline of theory and problems of data structures, Seymour Lipschutz
2. The Art of Computer Programming, Donald E. Knuth.
3. Data Structures and Algorithms, Alfred V. Aho, Jeffrey D. Ullman, John E. Hopcroft.
System Software & Compilers
1. Systems Programming and Operating Systems, D M Dhamdhere.
Operating Systems
1. Operating System Concepts, Silberschatz, Galvin, Gagne.
2. Operating Systems: Internals And Design Principles, Stallings
Software Engineering
1. Software engineering, Ian Sommerville.
2. An integrated approach to software engineering, Pankaj Jalote
3. Software engineering a practitioners approach - Roger S Pressman
Computer Networks
1. Computer Networks, Andrew S. Tanenbaum
2.Computer Networks, Behrouz Forouzan, Firouz Mosharraf
Current Trends & Technologies
Study about latest trends in computer Networks, Mobile computing, data mining and warehousing and the e-projects that are being initiated in India.
 

Tuesday, May 21, 2013

Intel Awards Winner 2013



Ionut Budisteanu, 19, of Romania was awarded first place for using artificial intelligence to create a viable model for a low-cost, self-driving car at this year's Intel International Science and Engineering Fair, a program of Society for Science & the Public.

Ionut said his research addresses a major global issue. In 2004, car accidents caused 2.5 million deaths worldwide1, and 87 percent of crashes resulted from driver error2. With 3-D radar and mounted cameras, Ionut created a feasible design for an autonomously controlled car that could detect traffic lanes and curbs, along with the real-time position of the car -- and it would only cost $4,000. He received the Gordon E. Moore Award of $75,000, named in honor of the Intel co-founder and fellow scientist

Videos link click here


Henry Lin, 17, of Shreveport, La. also received the Intel Foundation Young Scientist Award of $50,000. By simulating thousands of clusters of galaxies, Henry has provided scientists with valuable new data, allowing them to better understand the mysteries of astrophysics: dark matter, dark energy and the balance of heating and cooling in the universe's most massive objects.
 
Videos link click here

Eesha Khare is 18 years old, she starts college in the fall, and because of her, your next phone might charge in 30 seconds instead of 6 hours. Khare developed a super capacitor that is small enough to fit inside a phone. Super capacitors, which store lots of energy in a small space, are not new, but Khare's invention greatly improves on what's currently available, because her super capacitor charges mush more quickly, can theoretically be recharged 10,000 times, compared to 1,000 for a standard phone battery capacitor and is small enough to fit inside of a cell phone battery. It is also flexible enough to work on clothing and other non-flat surfaces.

"I developed a new supercapacitor, which is basically an energy storage device which can hold a lot of energy in a small amount of volume," Khare told KPIX 5.
 
Eesha Khare's invention could spark a technology and engineering revolution: battery life and charge speed are a major limiting factor with phones, computers and electric cars. Furthermore, the need to eventually replace the battery in fully electric cars makes cars such as the Tesla potentially less environmentally friendly than a hybird, like the Prius. A big upgrade in battery technology is what's needed to make the electric car the environmental slam dunk that many hope for.
 
More research and development is needed to get Eesha Khare's invention into your next phone, but a research breakthrough like this is just what's needed to get the mobile tech giants to invest in developing the first instantly (or close enough) charging phone.

Khare received $50,000 as an award from the Intel International Science and Engineering Fair. The best news of all? Khare's invention didn't even take first place. That went to Ionut Budisteanu, 19, of Romania, who Intel said used "artificial intelligence to create a viable model for a low-cost, self-driving car."
May these amazing kids go onto long careers of inventing more amazing devices, and may your next car be electric, fast-charging and self-driving.

Videos link click here