Tuesday 25 June 2013

Property attachment of fake IT companies mulled

HYDERABAD: Waking up to the racket of fly-by-night IT companies that are doing a vanishing act after collecting huge sums of money from job-seekers, the state government has decided to appoint a high-powered committee to check the rampant menace.

Among the options that the committee, which would include cyber crime experts from the police department and officials from the IT department, has been asked to consider is attachment of the property of the offenders.

The first meeting of the committee is scheduled to be held in the last week of March.

The meeting is likely to discuss various issues including selection of panel members, modalities for preventing such crimes and also on punishing the white collar criminals. The action plan would also include empowering CID with additional power to attach properties of white collar criminals in order to reimburse the victims of such crimes.

The decision to appoint a committee was taken at a meeting on Tuesday which was attended by IT minister Ponnala Lakshmaiah, IT secretary, and officials from enforcing agencies such as the home department, CB-CID and cyber crime wing of the police. At the meeting, the economic offences wing of the CID explained various types of crimes committed by spurious IT companies in the last few years.

The IT minister then advised the IT secretary to constitute a committee and prepare an action plan to curtail these activities.

Meanwhile, the IT department has launched the first rural BPO in the country at Challapalli village in Krishna district. The Sunflower IT BPO project became functional on Monday.

Ponnala said the government would replicate this model in setting up similar rural BPOs in other towns and villages in the state.

Source jnworld

Why Indian IT companies stare at a less profitable life

Indian software companies are searching for answers to the conundrum of how to price their services as the market shifts irrevocably from a time-tested model which has served them well for several decades. More exacting clients and technological changes have meant that the traditional model of charging for labour is giving way but no single replacement has been found yet.

The popularity of cloud-based delivery of services over the internet is reshaping the pricing landscape along with what is being called an "outcome-based model" of paying for predetermined business results.

"Clients are looking at their IT partners being responsible for delivering on business or process outcomes beyond managing specific technology mandates," said Chandrashekhar Kakal, senior vice-president and head of business IT services at Infosys, India's second-largest software exporter.

Buyers are increasingly looking to link payments to business outcomes, which indirectly also transfers some of their risks to service providers, who for years have been charging clients based on number of hours worked by engineers on a project. But, given the shaky macroeconomic environment and shrinking technology budgets, corporations are insisting that service providers deliver tangible, measurable value and not merely technology.

The push to revisit outsourcing industry pricing models comes at a time India's $108 billion (Rs 6.4 lakh crore) IT industry is facing fundamental shifts in the way technology services are bought. Once known for growing at a double-digit pace year after year and generating employment for hundreds of thousands of engineers, the sector has now slowed down considerably and may even see shrinkage in employment.

Kakal is confident that large IT providers, including Infosys, Wipro and TCS, are best placed to manage the change in pricing models due to their scale and ability to experiment. "A shared partnership (where risk is shared) will ensure that the client and the IT partners bring in their best abilities to ensure that gains of growth and efficiency are enjoyed in equal measure by both."

Noida-based HCL Technologies, India's fourth-largest IT outsourcer, sees a possible dent in profit margins in the short term as the industry transitions to an outcome-based pricing model.

"There are huge challenges that come with an outcome-based model, especially with the ability to handle the market and the large number of service lines that it will impact. But if you look at the way things are moving, outcome-based model is here to stay and it will only gain in significance," said Krishnan Chatterjee, vice-president and head of strategic marketing at HCL Technologies.
For HCL, which has about $5 billion in annual sales, only 47% of sales came from the traditional time and materials model in the March quarter, compared to 57% two years ago.

Wipro and Tata Consultancy Services declined participate in the story.

For an industry that was built on labour arbitrage made possible by the abundant supply of inexpensive engineering talent, the new pricing models are a result of the way they envisage and sell technology services. To be able to commit to get paid only for defined business outcomes, the IT providers must have engineers with excellent domain expertise and salesmen capable of identifying gaps in clients' existing systems and pitching improvements, industry observers said.

"The outcome-based model is rather complicated and many clients are still learning about it," said Peter Bendor-Samuel, chief executive officer at Everest Group, a technology researcher and advisory. "While there is some uptick in the outcome-based model, its adoption has been slow." In the interim, he said, increasingly, companies are moving towards a usage-based model, especially in infrastructure services, which can now be consumed like a utility, thanks to cloud computing.

Some companies are more aggressive than others as a means of differentiating themselves, especially as competitive intensity rises. Last year, US-based iGate ran a multi-million-dollar advertising campaign in leading newspapers and magazines in the US urging corporations to insist on outcome-based pricing models.

Some industry experts warn that new pricing models come with challenges that undermine the interests of service providers. "Service providers have to balance long-term staffing structures with short-term changes in pricing models," said Ray Wang, chief executive officer at Constellation Research. "If the client is purely cost-focussed, then it could quickly become a race to the bottom."

Source : TOI

IT companies gear up to tackle fake interviews

Fake job interview letters and agents claiming to be working on behalf of companies to hire people have become a menace again, and those looking for jobs should watch out. It's expected to get particularly bad this year with fewer jobs on offer and many more students passing out of colleges.

Intel India has just filed a police complaint in Bangalore, after it found that at least two people had received fraudulent letters calling them for interviews at the company's office and asking them to make a security deposit of Rs 7,850 prior to the interview.

Bosch, which perhaps has been the biggest victim of this in recent weeks, has issued public messages warning people about fraudulent interview calls. Maruti Suzuki, Hyundai, HCL Technologies are others whose names have been used to send out such mails, as per complaints on the online platform cybercrimecomplaints.com.

Preethi Madappa, director-HR in Intel South Asia, said the company was using its Facebook page also to warn people about it. IBM said it has a 'fraud alert' section in its recruitment portal and Facebook page, and since most of those who are duped are freshers, it has sent fraud alerts to all registered engineering colleges.

Nasscom vice president K S Viswanathan, who is leading an initiative to curb people-related malpractices in the IT industry, said these problems peak at the beginning of the academic session (June-August), when companies start making campus offers. He said the problem was grave, and the IT industry body was set to launch a massive public campaign to make everybody aware that the industry does not have a practice of having an agent in between to collect money for employment.

The fraudsters' methods are the same in most cases. Mails are drafted on what look like genuine letterheads with the company's logo. One such letter purportedly from Bosch says, "Your resume has been selected from one of the various job sites we hire for our plant. Bosch HRD selected 52 candidates...Designation and job location will be fixed byBosch HRD at the time of final process."

The letters then invariably ask the candidate to make a refundable security deposit, only in cash, into a certain HR manager's account. The amounts that TOI has seen ranges from Rs 6,725 to Rs 15,890. The amount, the letters say, will pay for the air ticket, accommodation and food during the interview period, and will be refunded in full as soon as the interview is over. It even provides an explanation for why the money needs to be deposited into the HR manager's account and not a company account: "because it will be easier to refund the money immediately after the interview".

Many will immediately recognize the letter to be a fraud, considering the quality of its language, and the effort to get the candidate to put money into a non-company account. But many who are desperate for jobs do succumb. One victim, Santosh Kumar Patel, who complained on cybercrimecomplaints.com, said he deposited Rs 6,725 towards an " HCL interview" only to find later when he went to HCL that there was no such interview.

Intel's Madappa advices candidates to apply for jobs only through the company's own jobs website.

Nasscom's Viswanathan said he was glad companies were recognizing the need to take the matter up strongly, noting that Tata Technologies in Pune had previously filed an FIR on a similar issue. He said 10-15 IT companies had recently come together to conduct an awareness campaign among students and authorities of 10-15 colleges this academic year. "It's a pilot project that we are leading," he said.

Source : TOI

Friday 21 June 2013

JNTU-HYD : Academic Calendar For B.Tech / B.Pharmacy 2,3,4 Years (I & II Sem) For the Academic Year 2013-2014

B.Tech & B.Pharmacy 2,4 Years-I semester (2013-2014)
Event From To No.of Weeks/Days
Commencement of class work 01.07.2013 - -
I Spell of Instructions 01.07.2013 24.08.2013 8 Weeks
I mid examinations 26.08.2013 28.08.2013 3 Days
II Spell of Instructions 29.08.2013 11.10.2013 6 Weeks 3 Days
Dussehra Holidays 12.10.2013 20.10.2013 9 Days
II Spell of Instructions (Continued) 21.10.2013 26.10.2013 1 Week
II mid examinations 28.10.2013 30.10.2013 3 Days
Preparations & Practical examinations 31.10.2013 08.11.2013 9 Days
End semester examinations 11.11.2013 23.11.2013 2 Weeks
Supplementary Examinations 25.11.2013 07.12.2013 2 Weeks
Commencement of class work for II semester 09.12.2013 - -

B.Tech & B.Pharmacy 2,4 Years-II Semester (2013-2014)

Event From To No.of Weeks/Days
Commencement of class work 09.12.2013

I Spell of Instructions 09.12.2013 10.01.2014 5 Weeks
Pongal Holidays 11.01.2014 19.01.2014 9 Days
I Spell of Instructions (Continued) 20.01.2014 07.02.2014 3 Weeks
I mid examinations 10.02.2014 12.02.2014 3 Days
II Spell of Instructions 13.02.2014 05.04.2014 7 Weeks 3 Days
II mid examinations 07.04.2014 09.04.2014 3 Days
Preparations & Practical examinations 10.04.2014 19.04.2014 9 Days
End semester examinations 21.04.2014 03.05.2014 2 Weeks
Supplementary Examinations 05.05.2014 17.05.2014 2 Weeks
Summer vacation 18.05.2014 15.06.2014 4 Weeks
Commencement of class work for Next Semester 16.06.2014 - -

 B. Tech and B. Pharmacy 3 year – I semester for the academic year 2013-14

Event From To No.of Weeks/Days
Commencement of class work 01.07.2013 - -
I Spell of Instructions 01.07.2013 28.08.2013 8 Weeks 3 Days
I mid examinations 29.08.2013 31.08.2013 3 Days
II Spell of Instructions 02.09.2013 11.10.2013 6 Weeks
Dussehra Holidays 12.10.2013 20.10.2013 9 Days
II Spell of Instructions (Continued) 21.10.2013 30.10.2013 1 Week 3 Days
II mid examinations 31.10.2013 02.11.2013 3 Days
Preparations & Practical examinations 04.11.2013 09.11.2013 1 Week
End semester examinations 11.11.2013 23.11.2013 2 Weeks
Supplementary Examinations 25.11.2013 07.12.2013 2 Weeks
Commencement of class work for II semester 09.12.2013 - -

B.Tech & B.Pharmacy 3 Years-II Semester

Event From To No.of Weeks/Days
Commencement of class work 09.12.2013 - -
I Spell of Instructions 09.12.2013 10.01.2014 5 Weeks
Pongal Holidays 11.01.2014 19.01.2014 9 Days
I Spell of Instructions (Continued) 20.01.2014 12.02.2014 3 Weeks 3 Days
I mid examinations 13.02.2014 15.02.2014 3 Days
II Spell of Instructions 17.02.2014 09.04.2014 7 Weeks 3 Days
II mid examinations 10.04.2014 12.04.2014 3 Days
Preparations & Practical examinations 14.04.2014 19.04.2014 1 Week
End semester examinations 21.04.2014 03.05.2014 2 Weeks
Supplementary Examinations 05.05.2014 17.05.2014 2 Weeks
Summer vacation 18.05.2014 15.06.2014 4 Weeks
Commencement of class work for Next Semester 16.06.2014 - -

All Linux/Unix Commands.



UNIX / Linux Command Summary

Some of the available options are :
Cat [-options] filename(S)
-s silent about files that
cannot be accessed
-v enables display of non printinging characters (except tabs, new lines, form-

feeds)
-t when used with –v, it causes tabs to be printed as ^I’s
-e when used with –v, it causes $ to be printed at the end of each line
The –t and –e options are ignored if the –v options is not specified.

cd
Used to change directories

chgrp
Changes the group that owns a file.
Chgrp [grou –id] [filename]

chmod
Allows file permissions to be changed for each user. File permissions can be changed only by the owner (s).
Chmod [+/-][rwx] [ugo] [filename]

chown
Used to change the owner of a file.
The command takes a file(s) as source files and the login id of another user as the target.
Chown [user-id] [filename]

cmp
The cmp command compares two files (text or binary) byte-by-byte and displays the first occurrence where the files differ.
Cmp [filename1] [filename2] -1 gives a long listing

comm.
The comm command compares two sorted files and displays the instances that are common. The display is separated into 3 columns.
Comm. filename1 filename2
first displays what occurs in first files but not in the second
second displays what occurs in second file but not in first
third displays what is common in both files

continue statement
The rest of the commands in the loop are ignored. It moves out of the loop and moves on the next cycle.

cp
The cp (copy) command is used to copy a file.
Cp [filename1] [filename2]

cpio(copy input/output)

Utility program used to take backups.
Cpio operates in three modes:
-o output
-i input
-p pass

creat()
the system call creates a new file or prepares to rewrite an existing file. The file pointer is set to the beginning of file.
#include<sys/tyes.h>
#include<sys/stat.h>
int creat(path, mode)

char *path;
int mode;

cut
used to cut out parts of a file. It takes filenames as command line arguments or input from standard input. The command can cut columns as well as fields in a file. It however does not delete the selected parts of the file.
Cut [-ef] [column/fie,d] filename
Cut-d “:” –f1,2,3 filename
Where –d indicates a delimiter specified within “:”

df
used to find the number of free blocks available for all the mounted file systems.
#/etc/df [filesystem]

diff
the diff command compares text files. It gives an index of all the lines that differ in the two files along with the line numbers. It also displays what needs to be changed.
Diff filename1 filename2

echo
The echo command echoes arguments on the command line.
echo [arguments]

 What is a static IP address/dynamic IP address?

A static IP address is a number (in the form of a dotted quad) that is assigned to a computer by an Internet service provider (ISP) to be its permanent address on the Internet. Computers use IP addresses to locate and talk to each other on the Internet, much the same way people use phone numbers to locate and talk to one another on the telephone. When you want to visit whatis.com, your computer asks a domain name system (DNS) server (think telephone information operator) for the correct dotted quad number (think phone number) for whatis.com and your computer uses the answer it receives to connect to the whatis.com server.
It would be simple if every computer that connects to the Internet could have its own static IP number, but when the Internet was first conceived, the architects didn;t foresee the need for an unlimited number of IP addresses. Consequently, there are not enough IP numbers to go around. To get around that problem, many Internet service providers limit the number of static IP addresses they allocate, and economize on the remaining number of IP addresses they possess by temporarily assigning an IP address to a requesting Dynamic Host Configuration Protocol (DHCP) computer from a pool of IP addresses. The temporary IP address is called a dynamic IP address.

Requesting DHCP computers receive a dynamic IP address (think temporary phone number) for the duration of that Internet session or for some other specified amount of time. Once the user disconnects from the Internet, their dynamic IP address goes back into the IP address pool so it can be assigned to another user. Even if the user reconnects immediately, odds are they will not be assigned the same IP address from the pool. To keep our telephone telephone analogy going, using a dynamic IP address is similar to using a pay phone. Unless there is a reason to receive a call, the user does not care what number he or she is calling from.

There are times, however, when users who connect to the Internet using dynamic IP wish to allow other computers to locate them. Perhaps they want to use CU-SeeMe or use a VoIP application to make long distance phone calls using their IP connection. In that case, they would need a static IP address. The user has two choices; they can contact their ISP and request a static IP address, or they can use a dynamic DNS service. Either choice will probably involve an additional monthly fee.

Using a dynamic DNS service works as if there was an old-fashioned telephone message service at your computers disposal. When a user registers with a DNS service and connects to the Internet with a dynamic IP address, the users computer contacts the DNS service and lets them know what IP address it has been assigned from the pool; the service works with the DNS server to forward the correct address to the requesting DHCP computer. (Think of calling the message service and saying "Hi. I can be reached at 435.44.32.111 right now. Please tell anyone who tries to reach me to call that number.) Using a dynamic DNS service to arrange for computers to find you even though you are using a dynamic IP address is the next-best thing to having a static IP.

IPv6, which has also been called "IPng" (IP Next Generation), lengthens IP addresses from 32 bits to 128 bits and increasesthe number of available IP addressess significantly, making static IP addresses easier and less expensive to obtain and maintain.

Win Xp Tablet PC and Cable Internet

Do you have a desktop or laptop with a wired internet connection at your home??

did you purchase or planning to purchase a tablet pc??

then how do you connect internet to a tablet pc ?? many think Wi-Fi is the only answer, but you can still access the wired internet to your tablet pc...

this is done by AD-HOC networks. Ad-Hoc network is a kind of personalized private network where you can create a wifi access point through cable internet.

YOUR COMPUTER SHOULD HAVE WIFI CHIP CARD INSTALLED AND SHOULD BE ABLE TO DETECT WIRELESS NETWORKS .. ONLY THEN YOU CAN CREATE AD HOC NETWORK

to create a wifi access point through ad hoc network.. first enable wifi on your computer.

"THE FOLLOWING PROCEDURE IS FOR WINDOWS XP PROFESSSIONAL OPERATING SYSTEM"

1. Go to control panel >> Network connections

2. Right click on "Wireless Internet Connection" and select "properties"

3. Go to "Advanced" tab and select the check box " allow other users to connect through this computer connection"

4. From the drop down list menu, select "wireless Internet Connection" Now go to "wireless networks" tab

5. select the check box "use windows to configure my computer network settings"

6. select "add" button and give your SSID i.e the name of the network (Example: Ravindra_wireless) and select the check box " Connect even if it is not broadcasting"

7. Select Network Authentication as "OPEN" and Data Encryption as "Disabled", now go to the Connection tab in the same window.. and select the check box "connect even if it is in range"

8. Now click "ok" and again Click "ok" , go to windows firewall and select "advanced" tab.

9. Select "wireless connection" and click on "Settings", Check all the boxes you got under "Service" tab and click ok.

now you are ready to use your ad-hoc network, refresh your wifi networks list and you can see your own ad hoc network in the list.

WARNING: the concept of ad hoc networks is not supported by Android Operating system. only IOS [i pad] and Black berry can detect the ad hoc networks !!!

Java One India 2013 Returns...!!!

It’s great to see that a dedicated JavaOne conference is going to happen!! Hope this momentum will keep going and hope to see developers sharing knowledge after the event. Join JavaOne India 2013 8-9 May in Hyderabad at JavaOne India. You can Sign up here http://bit.ly/YMPeJ8 to find out more details and launch date for the 2013 JavaOne.

 Fb's new messaging system: More than just email?

Facebook, with more than 500 million users communicating with each other daily, is looking to reinvent communications - and not just email.

The company today is introducing a three-pronged system that strives to not necessarily change the way we communicate but to make it more efficient, more personal and definitely simpler. And, of course, Facebook wants to make it seamless across the platforms and devices we’re already using.

At a press event in San Francisco this morning, Facebook CEO Mark Zuckerberg stressed that this is not “Facebook email,” which was the general belief in the guessing game that surrounded this event. Yes, everyone will soon have the option of securing an @facebook.com email address if they so choose - but it’s more than that. He said:

We’re using a mechansism that’s much simpler, like SMS or IM. We spent a lot of time building a handful of products that fit what we think of as a modern day messaging system.

At the heart of it all is the “social inbox,” a place where messages - again,not just email - are housed and filtered. Because Facebook already knows who your “friends” are, it can filter messages that it believes to be important to you. Everything else - not necessarily junk but maybe a newsletter or a bank statement or something from a family member who’s not on Facebook - goes into an “other” folder
And if one of those messages from a friend would be better for the “other” folder or a message from someone who landed in “other” should be in the social inbox, the user can move them back and forth, adjusting how those emails are handled in the future.

In terms of the seamless integration that Zuckerberg and team talked about, the idea is that users should be able to have an IM appear as an SMS or an SMS appear as an email, giving people a way to use the communication tool they prefer without worrying about how the recipient will see it or respond to it.

That can be pretty powerful. The company said the rollout to users will be a slow one - over the next couple of months - and initially will be spread via invitations. The idea is to let people get used to it and offer some feedback to Facebook about it.

Overall, I like what Facebook is doing here. For some time now, I’ve been squawking about how cumbersome and inefficient email continues to be - despite some of the breakthroughs that companies like Yahoo and Google have been pitching lately, such as Gmail’s Priority Inbox.

The jury will be out for a bit on whether Facebook’s effort is a winning solution or whether people will actually start using it. Zuckerberg stressed that no one at Facebook is expecting users to dump their Gmail or Yahoo mail accounts any time soon.

But the idea that some users, including the younger users who already prefer SMS and Facebook over traditional email systems, will shift the winds for future generations is something that makes me hopeful - hopeful that the clunky e-mail systems of today will someday be history.

ZUCKERBERG was a Harvard graduate and during his college times he created a site called "facemash" which let other people choose who is looking good from the available photos which were alleged that,they have been uploaded with out their permission.so it was forced to shutdown but the students opined that there must be a site which host their photos and details and mark ZUCKERBERG along with his other mates setup the site The Photo Address Book which students referred to as “The Facebook.” which grabbed the attention of people from surroundings,other cities,states,countries and it spread world wide.initially it was allowed only to harvard students then to students of other universities and now the eligibility criteria is "above 13 yr old" 

  How to Know Your Computer Has Been Hacked

1 Log in to your computer as an Administrator.

2 Click "Start," then type "run" into the search box. on the "Run" window. Type "cmd" into the text field and press Enter. A new Command window will open.

3 Click on the newly-opened Command window to select it, then type the following command : net user

4 Press "Enter." Windows will list all existing accounts on the computer.


5 Check if an account has been created without your permission. Verify that all accounts in the output of "net user" have either been created legitimately. If there are additional accounts, those accounts were likely created by a hacker.

Examine all legitimate accounts to see if any have been misused. Check the date and time of the last log-in. If the most recent log-in occurred at an abnormal time, a hacker is likely responsible.

  Myths about INDIA

So you’re traveling to India, the land of myth and foible. You’ve done your research, you’ve had your shots, you’ve learned how to say “No” in seven Indian languages. But India has a surprise around every pile of rubble, and around every overgrown bush. Here are 10 myths you’ve conquered... you think!

1. India is one huge country
You’ve cracked this most basic myth haven’t you? You’ve learned to approach India as a continent rather than a country. You’ve broken it up – first into north and south, and then into states, cultures, languages.

And then you enter Karnataka and find somebody speaking, not Kannada, not Hindi, not Konkani, not Tulu, but a whole new language called Kodavatakku.


Subscribe to our
Expat Newsletter with special focus on Bangalore!

2. India is hot
You’re moving to Bangalore. Nice move. Okay, it gets hot, but never ‘heat and dust’ hot. And if it ever gets unbearable, the rains always oblige. Bangalore is beautiful and cool after the rain.

3. India is spiritual
Goes without saying. Land of the vedas, yoga, karma and meditation.

And then you come here and meet the Indian Government Official. There’s nothing spiritual about a system that needs money for every move. There’s nothing otherworldly about men who need to be bribed just to do their job.

And when you discover that through inattention they’ve lost everything you’ve given them, they look to the sky. They say it’s written in your fate. They tell you not to get angry – what’s done is done. It may be your karma. God put it on your forehead at birth. You are insignificant – it was to happen. It’s probably happened for the best. Learn and move on. Become a better person. Oh, and while you’re at it, apply for replacement passports. India is indeed spiritual!

4. India is filled with nasty disease-carrying insects
Okay, there are mosquitoes. But you know the drill: deet repellents, sprays and maybe even a mosquito net.

Then, as you sit down in the restroom, a panicked periplaneta americana (that’s whacking great cockroach to you and me) leaves its sewery footprints across your back.

5. The water will kill you
You know the safe word: Bisleri. You don’t go anywhere without a bottle of mineral water clasped in your hands.

And then you read about an entire industry that has sprung up re-bottling “mineral” water from railway station taps. In “sealed” Bisleri bottles.

6. It’s a country of faded splendor
You’ve read all the guidebooks, seen the beautiful photographs. You know the glory that remains. After all, the awe those monuments inspire is shiny and new.

Then you go in for a closer look. You find that Raju loves Shoba so much, he needs to write it everywhere he goes. And his brother Ramu, well he’s a bit incontinent and has to relieve himself in every dark corner he finds. Indian history is entwined with the smell of ammonia.

7. Indians have no concept of personal space
You know that they are often overfriendly, but that’s only because they’re such a warm, hospitable people. They open their hearts, houses and lunch boxes to you. You know that if you open your mind in return, you’ll never feel violated.

And then, after feeding you, the family you met on the train treats you like a waxwork – each member poses with you for a souvenir photograph.

8. Indians speak a funny English
Not at all. You’ve read Chillibreeze.com, Seth, Roy… you know it’s funny only if it’s intended to be.

And then a national English newspaper carries a photograph of a family looking out across Taj Mahal with the caption: “A family watches the lawns of Taj Mahal”. A feature in the same paper shows complete (and often ungrammatical) disrespect for the power of the phrase “he says”. A person quoted goes through every shade of human expression: “he asserts”, “he opines”, “he believes”, “he informs” and best of all: “he feels”. As in: “India is a beautiful country,” he feels.

9. India is cheap
Everybody knows that.

And then you move here and pay $20,000 for a car with no handling, no legroom, no bootspace, no leather and no style. Oh, and practically no engine. Soon after, looking at the traffic, you realise you need a
chauffeur. Surprise surprise, a full-time chauffer comes for less
money a month than you'd need for one meal at a decent restaurant.

10. And finally, the biggest myth of them all: India
There’s no such thing. You know it. Indians know it too. There are just too many differences in language and culture. Too many differences over rivers, states and boundaries. The real India is not the one you see when you travel nor the one you read about in your guidebooks. It is somewhere in between.

And then… in spite of all the vexation, the diseases, the myths that squish underfoot… Once you’ve crossed those first dark days, once you’ve flushed the digestive tract 10 times over, once you lose your fear of stray dogs, crowds and mosquito bites, you begin to realize, there is an India under all this. An India that is common across the land, across all the people in it. Because India is inside you. India is that love for a grainy, gritty immediateness to life that makes living worthwhile.

new avenues in research

As everyone of you know that the research in fields like Artificial Intellignce, VLSI ,embedded systems, etc have reached their saturation.So here I would like to introduce a new field of research that is NIBIA- Nature inspired bio inspired algorithms.The research in this field started 10 years back that is in 2000.It is an interdisciplinary domain where biology and technology are colloborated together.Interested students reply to the thread

Google launches scientific calculator

Next time, you need to do a quick calculation, you can head to Google. The search giant has added a scientific calculator to its varied array of features.

The company's new 34-button calculator appears the moment you type in the word "calculator" or a mathematical expression say "4x5" into the search box.

The calculator gives users ability to do everything from arithmetic to trigonometric calculations. The calculator has functions for calculating sines, cosines, square roots and tangents as well as also dedicated buttons for Pi and Euler's number.

Just follow these easy steps:

1. Open Google website (www.google.com)

2. Type "calculator"

3. The virtual calculator opens below

4. Do any calculation that you need to do

Not just this, Users can also use Google's voice search feature -- found in mobile version and in Chrome browser -- to do calculations without actually touching keyboard.

The search giant has also announced its Panda algorithm update (version 3.9) via its official Twitter account.

Launched in February 2011, Panda is aimed to lower the ranks of low-quality websites and list high-quality sites close to the top of the search results.

Source : TOI

 

Aakash 2's first lot not for students: Government

NEW DELHI: The recently developed Aakash-2 tablet is for the purpose of testing and empowerment of teachers and there is no proposal to provide these to students from poor and rural backgrounds, the government told Lok Sabha today.

In a written reply, Union Human Resource Development Minister, MM Pallam Raju said, "Presently there is no proposal in this regard... In the first phase one lakh tablets are for the purpose of testing and teacher empowerment. They would not be distributed to students in the first phase."

He was asked whether the government is planning to provide Aakash 2 tablets free of cost to students, particularly to the rural and poor students belonging to the weaker sections of the society.

The advanced version of low cost access device Aakash 2 tablet was launched by President Pranab Mujherjee on occasion of National Education Day on November 11, this year, Raju said.

"The salient features of Aakash-2 tablet includes seven inch multi-touch capacitive projective display with at least 800x480 resolution. It runs on Android 4.0 (ice-cream sandwich) operating system, powered by 1GHz processor and HD video playback support," the minister said.

The device has Wi-Fi support for internet connectivity with four GB internal memory storage and a microSD card slot that can support cards having capacities up to 32GB.

Source : TOI

 

Google makes '$100 laptop' a reality

BOSTON: Google began selling basic laptop computers to schools at a price of $99, meeting a price point that prominent MIT professor Nicholas Negroponte famously held out in 2005 as key to bringing computing power to the masses.

The internet giant said on Monday that it will be offering the steep educational discount on Series 5 Chromebooks from Samsung Electronics through December 21. They typically retail for $249.

Negroponte's One Laptop Per Child Foundation failed to meet his ambitious target, which critics said would be impossible to meet when he set it. His XO laptop currently sell for about $200.

Still, he is widely credited with helping to launch the era of low-cost portable computing.

The creation of relatively low-cost laptops from his foundation pressured industry giants including Intel, Microsoft, Hewlett-Packard and Dell to develop inexpensive versions of their products such as the netbook.

Source : TOI