Wednesday 22 August 2012

High Value Infrastructure Protection System


Abstract: Businesses are increasing their application infrastructure, where adopting and advancing the security layer is mandatory. In computing environment, security advancement is a mandatory requirement for any application infrastructure, where we are formulating a robust solution using open source packages. With our solution, we are using Open Source packs including open LDAP and ACL framework to extend the security concept, a step ahead to the middleware applications hosted in the data centre in an IT organization.

Our solution is to security advancement is based on the “Open Source Framework” and consume the benefits of “Open Source” packs to fulfill the security requirements.

Environment challenges – Big myth

Security Vulnerabilities:

The software infrastructure carrying out customer’s business critical data involves huge risk, by considering the level of security layer implementation. This would involve security loop holes such as hacking, data stolen by unknown and handling data in an inappropriate way .In such cases, it is mandatory for the organization to continuously improve the security layer.

Huge Investments:

To set up this advanced security layer, the organization needs to procure high value licensed software packs which would in turn increase the overall IT investments.

Lacking of in-house skill:

It is important to identify the vulnerabilities and react to the critical outages. At the same time it is very hard to build an in house skill portfolio because of unavailability of highly skilled resources. Hence

organizations are completely dependent on the security software vendors which in turn would cost more for their application infrastructure maintenance and support for their longer business operations.

Solution Proposal:

The Open Source community attracts very bright, very motivated developers, who although frequently unpaid, are often much disciplined. In addition, these developers are not part of corporate cultures where the best route to large salaries is to move into management; hence many open Source developers are amongst the most experienced in the industry. In addition all users of Open Source products have access to the source code and debugging tools, thereby we often suggest both bug fixes and enhancements as actual changes to the source code. Consequently the quality of software produced by the Open Source community sometimes exceeds the products produced by purely commercial organizations.

When several authors work in parallel, the best-of-crop solution can be chosen in place of the only solution (as would be typical for a commercial product), where source code is freely published and widely distributed. Users of the product will often discover and correct defects themselves. If no commercial entity benefits from that work, the motivation to do so for the common well is much higher.

Our Idea is to explore the benefits of Open Source Security Framework software products and integrate the Open Source Security benefits to implement the same / higher level of Software Infrastructure Security.

The Open Source Software Products mainly are categorized for,

1.    LDAP – Light Weight Directory Access Protocol
2.    ACL – Access Control Lists
For the above areas in Software Infrastructure Security, we have already many standard Open Source Production products readily available for usage.
We are considering mainly JAVA/Microsoft application workload for this open source security products integration Framework.

Business Results:
       
By adopting our Open Source Framework, we can earn all of the following organizational benefits such as Reliability, Stability, Audit ability, Cost, Flexibility and Freedom, Support and Accountability.

Summary:

            The comprehensive approach provides the extensive features in security layer using open source products including open LDAP and ACL products. We are customizing the customer’s security according to how it depends and providing a robust solution for the business on a longer run. We are decoupling the dependencies of exiting security product vendors and gaining the advantage of available open source product features.

Profile:

Usha: Usha is working as an Assistant Professor from Department of Computer Science in National Engineering College, K.R.Nagar, Kovilpatti. Her areas of interests are “High Performance Computing”, “Large Scale Computing”, “Wireless and Sensor Network Security”. She is currently working in “High Value Infrastructure (HAI)” security consolidation projects. Usha is perusing PhD in “Wireless and Sensor Networks” and she has graduated MCA, MPhil and M. Tech.

Tuesday 21 August 2012

CONVERSATION BETWEEN A TECHNICAL SUPPORT AND A CUSTOMER

Tech Support : "I need you to right-click on the Open Desktop."
Customer : "Ok."
Tech Support : "Did you get a pop-up menu?"
Customer : "No."
Tech Support : "Ok. Right click again. Do you see a pop-up menu?"
Customer : "No."
Tech Support : "Ok, sir. Can you tell me what you have done up until this point?"
Customer : "Sure, you told me to write 'click' and I wrote 'click'."
**************************************************************************************************************************************

A ERP Project Manager is the one who thinks 9 women can deliver a baby in 1 month.
An Onsite Coordinator is the one who thinks 1 woman can deliver 9 babies in 1 month.
A Developer is the one who thinks it will take 18 months to deliver 1 baby.
A Marketing Manager is the one who thinks he can deliver a baby even if no man and woman are available.
A Client is the one who doesn't know why he wants a baby.
A Tester is the one who always tells his wife that this is not the right baby


                                                           ~N.VINODHINI
                                                                  3rd CSEB

The next advent of Reality


To imagine a world similar to a movie like  “Harry Potter” around you might sound a lot weird but we have a question “why not?” and yes we have a technology that can answer it. An experimental technology that has been in labs for years and required high levels of expertise and knowledge to create new application. This has finally made its way through the hands of people like Pranav Mistry. Well it is not the so called “sixth sense” technology but it is one of the technologies that served the purpose of the sixth sense technology. Imagine reading a story book and you are able to see the characters enact their roles. If this was possible then the learning process which includes listening to long lectures and reading textbooks would rather become giving a glance at your book and it realistically showing whatever you need to know. This has been made possible by the augmented technology where the real world and the virtual environment are combined together. AUGMENTED REALITY in other ways is a toy for advertising.

            The only difference between the virtual reality and augmented reality is that in virtual reality there is a virtual environment and we become a part of the virtual environment but in augmented reality there is a virtual character and the virtual character is made a part of the real world.
           
            The augmented Reality is a visualization technology that allows the user to experience the virtual experience added over real world in real time. With the help of advanced AR technology the information about the surrounding real world of the user becomes interactive and digitally usable. Artificial information about the environment and the objects in it can be stored and retrieved as an information layer on top of the real world view. When we compare the spectrum between virtual reality, which creates immersive, computer-generated environments, and the real world, augmented reality is closer to the real world. Augmented reality adds graphics, sounds, haptic feedback and smell to the natural world as it exists. Both video games and cell phones are driving the development of augmented reality. The augmented systems will also superimpose graphics for every perspective available and try adjust to every movement of the user’s head and eyes. The three basic components of an augmented reality system are the head-mounted display, tracking system and mobile computer for the hardware. The main goal of this new technology is to merge these three components into a highly portable unit much like a combination of a high tech Walkman and an ordinary pair or eyeglasses. The head-mounted display used in augmented reality systems will enable the user to view superimposed graphics and text created by the system.


 

By:
Y.CATHERIN BALIKA
S.ANNE REJULA
IIIyr CSE-A

Cell phones have more effect on the world than computers


Once arose a statement when computers started dominating “ Everything at your doorsteps”, now its time to say “Everything in your palms” or even better would be “Everything by a touch”. The world has shrunken into the so called cellular phones which has yet been modified to be called the SMART PHONES.
            
           Gone are the days when you had to run back home to switch on the T.V to watch your favorite television show now its time to use the internet , you had to ask the way to a new city you've never been before now just switch on the Google map , you forgot your watch no problem your phone shows it , you all of a sudden see a celebrity on road but you don't have your camera its easy your phone's camera has got a thousand options for a better picture . Now these so called SMART PHONES are killing watches, cameras , changing the T.V industry , destroying the payphone .
                  
          It was once a better choice to buy a laptop rather than a desktop and now why go for a giant laptop it has been shrunk further to a TAB or a SMART PHONE. Laptops were advertised once as carry them in your hands where ever u want , now its the time to advertise these smart phones or tabs as have the world in your pockets.
                      
          There might be a near future where smart phones would be also used to check the heartbeat, blood pressure or in a broader sense instead of money payment people would start transferring them just like that through their phones.



By:                                  
Y.CATHERIN BALIKA     
IIIyr CSE-A                

Wednesday 8 August 2012

Hello Technofolks



This is a blog created by the members of editorial board of CSEA in NEC with a motto of creating a forum for showcasing the real skills of the members and to update members about the current CSEA activities.
This blog will have some articles that are rich technically and worthy to read as we choose only articles with original content.