Executive Committee Volume No.34 Issue No. 4 July 2010 2010-11/12 CONTENTS President Dr. S Subramanian Division-III Prof. P Thrimurthy [email protected] (Applications) Theme Section : Women in ICT [email protected] Women in Information Technology (IT) Division-IV Mr. H R Mohan Netiva Caftori [email protected] (Communications) 04 Vice-President “Understanding the Expectations of Women Professionals in Mr. M D Agrawal Prof. Swarnalatha Rao Division-V [email protected] 06 Information Technology from their Organizations” – [email protected] (Edu. & Research) A Research Initiative of Empowering Women in IT (eWIT) Hon. Secretary Vijayalakshmi Rao, Sumitra Seshan Prof. H R Vishwakarma Increasing women’s employment in ITEC – [email protected] 09 overcoming the ‘revolving door syndrome’ Christina Evans Hon. Treasurer Nominations Committee Mr. Saurabh H Sonawala Role of Gender in Children’s Uses and Attitudes towards Technology [email protected] Dr. Shyam Sunder Agrawal 12 Vidal Adadevoh Immd. Past President Prof. (Dr.) U K Singh Men vs. Women – Supporting Your Computer Problems Mr. S Mahalingam 14 Pam Jensen [email protected] Dr. Suresh Chandra Bhatia Women in FOSS : Technology, Liberalization, Freedom and Women 15 Kadambari Devarajan Women in Computing Regional Vice-Presidents Publications Committee 20 Matthew Abbruscato

Chairman Women Leads on the early MicroVAX Chip Team Mr. M P Goel (Region I) Prof. S. V. Raghavan 21 Steve N Teicher [email protected] [email protected] HR Column Dr. D P Mukherjee (Region II) [email protected] HR & Legal Issues in IT Chief Editor 23 Prasanna Sai Dr. T V Gopal (Region III) Prof. S G Shah [email protected] [email protected] Articles Blog Analysis and Mining: Research and Applications Mr. Sanjay Mohapatra (Region IV) Director (Education) 25 Prabin K Panigrahi [email protected] Wg. Cdr. M Murugesan (Retd.) Connected Planet: The Mobility Revolution through Android [email protected] Dr. D B V Sarma (Region V) 30 Vijay Anand & Suman Kumar [email protected] Executive Secretary Departments Mr. C G Sahasrabuddhe (Region VI) Mr. Suchit Gogwekar Community Talk [email protected] [email protected] 02 President’s Desk Mr. S Ramanathan (Region VII) 03 [email protected] 40 ExecCom Transacts Mr. Jayant Krishna (Region VIII) [email protected] CSI Topics CSI Calendar 2010-11 (2nd Cover) Workshop on Cloud Computing – Call for Participation Division Chairpersons Published by 34 DWDM2010 – Call for Papers Division-I (Hardware) Dr. Deepak Shikarpur Mr. Suchit Gogwekar 35 [email protected] For Computer Society of India 36 National Conference on E-Government & E-Society Dr. T V Gopal Division-II (Software) Second International Conference on EAIT 2011 [email protected] 37 38 CONSEG-2011: International Conference on Software Engineering 39 CSI MoU with C-DAC & PMI 42 COMAD-2010: 16th International Conference on Management of Data 44 From CSI Chapters

CSI COMMUNICATIONS | AUGUST 2010 1 COMMUNITY TALK

A system exists and operates in time and space. of systems too complex for analytical solutions. A model is a simplified representation of a system Simulation shows how the answer was derived; it at some particular point in time or space intended enables the trace from cause to effect; and it allows to promote understanding of the real system. A generating explanations for decisions. Models define simulation is the manipulation of a model in such a the boundaries of the system to be simulated. way that it operates on time or space to compress it, Modeling and simulation is an essential process thus enabling one to perceive the interactions that in modern business management. Models allow would not otherwise be apparent because of their one to test ideas in a virtual world where mistakes separation in time or space. are inexpensive. They also provide a framework Modeling and Simulation is a discipline for for comparing competing alternatives, identifying developing a level of understanding of the interaction the potential risks and rewards of pursuing actions. of the parts of a system, and of the system as a whole. Simulation is a tool for managing the necessary change. This discipline accords valuable insights and a very A common mistake in modeling and simulation is to high degree of understanding systems. build an overly complex model, resulting in an over- Modeling and Simulation is a discipline, it is also abundance of data and great confusion in analysis of very much an art form. One has to physically ride a the results. bicycle to learn bicycling. Modeling and Simulation is As a matter of fact, Models are everywhere. similar. One can learn modeling and simulation from When someone in an organization builds a reading books and talking with other people. However, spreadsheet to “run the numbers”, they are building the practical skills are acquired only through the a model. Businesses invest significantly in shaping the building of models and simulating them. It is “a learn business strategies around the results that the models as you go” process. Gradually, one understands what generate. Modeling is an enterprise-wide, strategic makes sense and what doesn’t. initiative. Peter Senge, in “The Fifth Discipline: The Art & The Society for Modeling & Simulation Practice of the Learning Organization” talks about International (SCS) was established in 1952 as two types of complexity, detail and dynamic. Detail a nonprofit, volunteer-driven corporation called complexity is associated with systems which have Simulation Councils, Inc. Simulation Councils, Inc. many component parts. Dynamic complexity is became The Society for Computer Simulation [http:// associated with systems which have cause and effect www.scs.org]. Today, there are plenty of resources on separated by time and or space. Understanding the Internet covering a wide range of topics such as dynamic complexity is difficult as we are unable to Software libraries, Hybrid Simulation, Bond Graphs, readily see the connections between the parts of the Agent-based Simulation, Visual Simulation Tools and system and their interactions. Simulation has the Environments, Web based and distributed simulation, ability to effect a time and space compression on Simulation Languages and Integrated Environments, the system, essentially allowing one to perceive, in a Simulation Based on the World Dynamics Approach matter of minutes, interactions that would normally and Simulation of Industrial Processes and Networked unfold over very lengthy time periods. Modeling systems. and Simulation help us understand both detail and “All models are wrong, but some are useful.” dynamic complexity. - George Box Computer simulation was developed hand-in- hand with the rapid growth of the computer, following “Far better an approximate answer to the right its first large-scale deployment during the Manhattan question, than the exact answer to the wrong question, Project in World War II to model the process of which can always be made precise.” nuclear detonation. It was a simulation of 12 hard – John Tukey spheres using a Monte Carlo algorithm. Currently, Computer simulations are a useful part I thank Prof. R Nadarajan for readily agreeing to of mathematical modeling of many natural systems Guest Edit this issue amidst his busy schedules that in physics (computational physics), astrophysics, included plenty of travel in the past few months. chemistry and biology, human systems in economics, psychology, business, social science, and engineering. Dr. Gopal T V Simulations are used to explore and gain new insights Hon. Chief Editor into new technology, and to estimate the performance [email protected]

CSI COMMUNICATIONS | AUGUST 2010 2 PRESIDENT’S DESK

From : [email protected]

Subject : President’s Desk

Date : 1st July, 2010

Dear Affectionate Members of CSI Family,

While attempts are being made to promote regular activities in CSI, we CSI – CDAC MoU: Signed on 26th June 2010 at Trivandrum are continuing our efforts to promote RESEARCH in CSI. We are looking Mr. Rajan T. Joseph, Director General, CDAC signed the MoU for some of our members who had contributed in promoting research in with CSI. The scope of the MoU is to facilitate closer interacting their chosen disciplines that are relevant to the objectives of CSI and who between CSI and CDAC in research, designing and offering can contribute in promoting research activities in CSI. new courses in relevant topics, testing and certification of the Hon. Research Directors: successful candidates. The joint activities will be primarily in Happy to inform you that our distinguished members Dr. specialized areas such as Free/open source software, language Jayasri Choudhuri of Kolkata, Dr. Rattan K. Dutta and Dr. S. computing, cyber security, cloud computing and so on. This Ramakrishanan (Ramki) from Delhi, have kindly accepted our is to provide an opportunity to our members for attending/ request to be Hon. Research Directors in CSI. On similar lines, participating in research and education programs on continuous we shall consider nominations as Research Directors in CSI. basis. Thanks to the efforts put in by Shri M.D.Agrawal, Mr. Satish Nominations may be sent to [email protected] Babu, Mr.Srinivasan(past Chairman of Trivandrum Chapter), Mr. Brajesh Kaimal along with the team from C-DAC represented Knowledge Sharing SIG-e-GOV Summit at Bhopal: by Mr. Sasi P.M, Mr. George L. Arakal for their contributions in Government of Madhya Pradesh in association with Bhopal bringing up MOU on our request. chapter of CSI has hosted a Knowledge Sharing Summit on e-Governance that has been steered to success by our SIGeGOV CSI – PMI MoU: Signed on 26th June 2010 at Trivandrum team headed by Prof. Ashok Agarwal. The event has been Our professional members of CSI are required to have orientation exceptionally handled by a team of dedicated members of CSI and develop expertise on project management in order to come family. The experiences of using ICT for improving the quality up in the ladder of professionalism. Also it is required that our of services by Governments in different states and at Centre Institutional Members need to keep track of the latest research are shared. It has been a feast of Knowledge sharing experience. and developments on project management in order to modify Prof. Ashok Agarwal, Mr. Anurag Jain, Mr. Anurag Srivastav, Ms syllabus and organize training programs to faculty and student Avanthika, Mr. Vivek Dhavan and their teams have excelled in members. conducting Knowledge sharing process. The event was so good Our CSI members who are certified as Project Management that I was amused to see many visitors coming and asking for Professionals (PMPs) by Project Management Institute (PMI) becoming the members of CSI. Dr. Pukhraj Maru, Principal are requested to help us on the above requirements. Mr Brajesh Secretary, Technical Education paid his life membership fee and Kaimal, Shri Satish Babu and Shri Srinivasan of CSI and Mr. Raj joined CSI after the inauguration. He said that all educational Kalady and Mr Jacob Varghese on behalf of PMI have interfaced Institutions be promoted to become Institutional members of CSI this MOU between CSI and PMI. Mr. Raj Kalady, Managing so that teachers and students are connected to the practitioners Director, PMI signed the MoU with CSI. of ICT. It has been a great experience to listen to Mr. Kailash CSI and PMI Also would collaborate with each other in Research, Vijayvargia, honorable minister of IT in MP, Hon’ble Justice Education, exchange publications and involve members to Rajesh Tandon, Chairperson of Cyber Appellate Tribunal, Ministry participate in respective events & conferences. of CIT, Dr. S.S.Mantha, Chairman, AICTE who have valued the Mr Brajesh Kaimal, Prof. H.R.Viswakarma and Wg. .Cdr. M. contributions of CSI to the Nation. MP Government deserves my Murugesan would carry forward the process of implementing salute for successfully organizing the knowledge sharing process the activities on behalf of CSI and a working group from both on e-Governance. PMI and CSI would announce the programs. Presidents Council: A model worth considering: We would like to have the honor of bringing together our past We could meet Dr. Ajay Kumar, Principal Secretary, Kerala state, presidents of CSI and form Presidents Council, which would be who informed us that CSI Trivandrum chapter is contributing in convened by the immediate Past President. It is to pool their several initiatives of the state government. I am impressed that rich experiences and to help the CSI family on continuous basis CSI Trivandrum chapter is becoming a part of the IT Mission of in promoting the objectives of CSI. We have requested Shri S. the state. CSI objectives are appreciated by the state Government. Mahalingam to convene a meeting of the Presidents Council at Our professionals in the chapter are so dedicated that their the CSI 2010, Mumbai. contributions are appreciated by the state Government. Let this SEARCC International Schools Software Competition 2010 be a model to follow at other places. School Students below the age group of 18 would be participating from member countries of the South East Asia Regional Computer Reviews Confederation (SEARCC) at the International software I appreciate the efforts of our regional Vice-Presidents Mr Sanjay competition to compete and win the F.C.Kohli Challenge Trophy Mohapatra, Mr. D.P. Mukherjee and Shri Jayant Krishna for their during 22-23 October 2010. This trophy is named after the father good initiatives with respective chapters, divisional chairmen to of the SEARCC movement Dr. F.C.Kohli of TCS. identify new activities. RMK Engineering College, Chennai has kindly agreed to host the event. Dr. R.M.Suresh and Shri Ramasamy, Tamilnadu student coordinator would work on the modalities to make the event, a Prof. P. Thrimurthy grand success. President, Computer Society of India

CSI COMMUNICATIONS | AUGUST 2010 3 GUEST EDITORIAL

Women in Information Technology (IT)

R Nadarajan

Professor and Head, Department Mathematics and Computer Applications, PSG College of Technology, Coimbatore – 641 004, India. E-mail : [email protected], rn@ mca.psgtech.ac.in

First of all may I sincerely thank the Hon.Chief next decade to make game-changing advances in the Editor Dr.T.V.Gopal for the opportunity to address life sciences and medicine through simulation. the CSI Communication readers through this Guest Geographical boundaries have been lifted with Editorial. It is a real pleasure for me and I was delighted advances in simulation and modeling and simulations to accept the offer. are becoming a popular training tool in the domains Face complexity and kill complexity is the DNA of emergency management, homeland security and of problem solving. The problems facing industry, border patrol. A new generation which is accustomed society and government continue to grow in size to absorbing new information through interactive and complexity. Traditionally scientific discovery multidimensional methods would be entering has been classified as theoretical and experimental. the workforce very soon . This workforce would Modelling complex systems theoretically need too need continual interaction, visual information and many simplifications and the emerging models may multisensory stimulation in learning environments. not be valid. Visually rich simulations are necessary to captivate With the advent of digital computing, a new and train this group of multitaskers. Many critical approach based on simulation and modeling has technologies are on the horizon that cannot be emerged as one of the most successful methods for understood, developed, or utilized without simulation. experimental scientific discovery to solve complex real life problems. Simulation does not require that To be able to use modeling and simulation, a many simplifying assumptions. certain amount of expertise in the areas of modeling, programming and statistical interpretation is Problems ranging from finding alternative required. Simulation by the very nature of its inherent energy sources to global warming to sustainable randomness is a statistical experiment. Therefore the infrastructures, to curing disease and personalizing medicine, are complex problems and their solution output of simulation must be interpreted statistically. requires a partnership among experiment, theory, and All the statistical properties must be considered when simulation. interpreting the results. Nano scale systems are also a good example of a The importance of modeling and simulation complex system. It is difficult to model a nano scale could be understood by the Winter Simulation scale system. Simulation enables to reduce the time conference conducted annually and the journal ACM needed to design new materials, to develop nano scale Transactions of Modeling and Computer Simulation. devices from these new materials and to increase the We have included two papers one by Dr.Jerry reliability of these devices. Krasner Vice President Embedded Market Forecasters Parallel and distributed computing has gained a and was former Chairman of Biomedical Engineering lot of attention due to its application in many scientific at Boston University. He has described that model domains. Performance studies are being aimed at based design provides a single design environment improving system performance by improving the that enables developers to use a single model of their performance of its individual components. Simulation entire systems which saves cost by cutting design models can help to evaluate the performance and time and providing final designs that more closely provide a basis for refining system configuration. approximate pre-design expectations for performance There is an unprecedented opportunity in the and systems functionality.

CSI COMMUNICATIONS | AUGUST 2010 4 About the Guest Editor R Nadarajan has obtained his Ph.D from Annamalai University. He has 26 years of teaching MCA and M.Sc [Software Engineering]. Nadarajan has more than 73 Research Papers in refereed International Journals. Nadarajan has guided 13 Ph.Ds and currently supervising the research work of 9 candidates in the fields of Computer Science. He guided over 14 M.Phil in Computer Science and more than 430 MCA and M.Sc(SE) Projects. Nadarajan is a Member / Chair person in Board of Studies of Computer Science of various Universities. His current research interests include Object Computing, Data Mining and Stochastic Models. He has visited USA, UK, France and Malaysia on academic grounds. He has been organizing many summer schools and technical symposia. Nadarajan is Member of ACM, Life Member of ISTE, Life Member of Computer Society of India and Life Member of OR Society of India.

CSI COMMUNICATIONS | AUGUST 2010 5 THEME ARTICLE

Simulation versus Analytic Modeling inLarge Computing Environments Predicting the Performance Impact of Tuning Changes A White Paper from the Responsive Systems Company

Bernie Domanski

Professor & CS Chair, [Recipient of the CSI 2000 Dolphin Award for Outstanding Teaching], College of Staten Island, The City University of New York. 2800 Victory Boulevard, Staten Island NY 10314 E-mail: [email protected]

With complex, heterogeneous computing architectures drawing much attention of late, capacity managers are faced with interesting new challenges. What methodology(ies) should be used to for capacity planning and tuning of large database applications? In this paper, our focus is on the strengths and weaknesses of analytic modeling versus simulation particularly for these environments.

1. Model Types and the Modeling Process And because they are simple equations, they are To help illustrate some of the basic concepts solved rapidly on a computer. The set of relationships behind modeling, we’ll consider the problem of represented by these equations - the methodology evaluating workloads over time. If we look at historical - is called operational analysis and was developed by performance data, and perform some statistical Jeff Buzen (the B of BGS Systems) and Peter Denning forecasting (i.e. linear regression), then we can define (who created the concepts of paging and swapping a capacity exhaust volume: the point at which our in operating systems). Operational analysis was existing system no longer provides acceptable service. extended to encompass devices that don’t have Here, throughput has peaked at a specific level and/or service times, e.g. memory, but the equations directly response time is too high and is no longer acceptable. represent how workloads operate in a system of When workload volumes approach capacity exhaust, queues. But the equations represent that snapshot of we need to evaluate alternative physical configurations, e.g. activity -no detail as to what happens moment-to- ƒƒ add memory to a server, or moment is considered. Thus, when you execute a ƒƒ add buffers where they are needed while reducing queuing model, questions that drive the model usually the buffer count in other areas, or involve workload volumes - e.g. what will response time ƒƒ alter the number or type of workloads presented be if I run 10,000 transactions an hour? These volumes to a system, or are usually for workload averages. In addition, and this ƒƒ buy a whole new machine. is key, is that a “transaction” is the average transaction. These what-if alternatives are best examined The resources used by what the “average” transaction using either analytic modeling or simulation modeling. is defined to be are what drive the queuing model. Analytic models (also referred to as queuing Thus, any “batch”-type transactions (long running models) represent the activity in a queuing system at or resource intensive transactions) are not really a particular moment in time; almost like a snapshot. considered if they are not “average”. For the question Mainframe systems have been typified for nearly 25 we’ve posed, 10,000 is the average number of years by devices with inherent queues, like a CPU or “average” transactions arriving during a peak hour. a disk. Modelers concern themselves here primarily This implies that the actual distribution of workload This paper is reprinted with special permission with how long a request for service lives in the queue, volume is ignored - at times within the hour it is higher from Dr. Bernard Domanksi and and how fast the server delivers service to a request. than the average, and sometimes it’s lower. Thus, Mr. Joel Goldstein Queuing relationships are represented by a set of queuing models ignore the structure of workloads, Responsive Systems, IBM Gold Consultant simple algebraic equations for computer systems. and therefore cannot answer all questions regarding

CSI COMMUNICATIONS | AUGUST 2010 6 the possible behavior of a system. Analytic now nearly always provides more the interested reader is again strongly models sacrifice accuracy, but gain in detailed results than do analytic models encouraged to examine that work. execution speed. when built correctly. Prediction with The calibrated model is often called the Simulation models do take workload simulation-based model area has the baseline, and it is used for what-if questions distributions into account; in fact, they ability for more complex predictions of interest: consider each event (or state transition) than just what would happen when • what if I add more buffers, a transaction that goes through as it visits • what if I move some objects from one increasing a workload. In the case of different servers in a complex computing buffer pool into another, environment. But simulation models DB2, only simulation-based product • what if I create a new buffer pool and historically take longer to build (because like Responsive Systems’ Buffer Pool move some objects there, you have to understand the workflow Tool can predict what would happen if • what if I add more memory to the behind each application), and take longer to we move some objects from one buffer processor, execute (because there are so many events pool into another, or into a new pool • which objects are monopolizing current to be simulated). Unfortunately, simulation that does not exist yet. resources, was given a “bad wrap” early • which objects will gain the most from 1 No matter what type of model on. In 1978, Kobayashi stated is used, we still must go through a increased resources, the then perception of simulation - “… • which objects will not gain from calibration step; that is, we must verify It is quite often found, however, that a increased resources. that the model can reproduce reality simulation model takes much longer to The results generated often are before it is used to predict the future construct, requires much more computer used to formulate a plan for a new (see Figure 1 above). Note, calibration is time to execute, and yet provides much configuration. Analytic as well as required for analytic models; simulation less information than the model writer simulation models have traditionally models, once calibrated, can be used for expected.” As time moved forward, ignored cost, as no modeling package prediction immediately. Usually, we run and more models were built, it was has ever adequately factored cost the model using the current physical 3 found that simulation would be used against capacity . However, in the case configuration and the current workload. where no analytic solution existed. of the Buffer Pool Tool, a companion If the model produces results that are Within a database-driven application, white paper “The Value of Measurement, close (within 15%-25% for response only simulation can deal with multiple Analysis, and Modeling” discusses the time; 5%-10% for utilizations) to what transaction types effectively. How value gained from using the product in the actual system characteristics are, can we size a buffer pool for a single both quality as well as to the long term we consider the model calibrated. Black “homogenized” average transaction? budget. magic is usually practiced when the Simulation models began to be results are not (a common practice 2. How Has Performance Been constructed that were extremely for analytic models). Calibration Modeled? accurate general-purpose simulation There have been very few commercially techniques for analytic models are well tools evolved positively. Simulation 2 available modeling packages that allowed covered in the paper by Carroll and modeling of a complex database-driven computing environment. Thus, a variety of techniques have thus far emerged. At first, the traditional analytic techniques were used primarily to examine database workloads at a high level. The objective was to see how more work would effect the service delivered. But applications that deployed a large DBMS like IBM’s DB2 were modeled at the system level, and provided little to no detail of what the underlying DBMS was doing to response time. While this provides some adequate results for those capacity planners working on the acquisition of new mainframe hardware, these results are suspect for use by a performance analyst because all of the internal events happening in the DBMS were virtually ignored. Without recognizing all the DBMS resources contributing to the service achieved, this very traditional mainframe approach had limited accuracy. In the late 1970’s, IBM recognized this modeling shortcoming for IMS, and created a simulation tool - SNAP/ SHOT - that would address the contribution of the DBMS (IMS in this case) to the Figure 1 -The Modeling Proces service levels the application would achieve.

CSI COMMUNICATIONS | AUGUST 2010 7 Users, unfortunately, could not use the tool So which method should we choose simulation. Thus, instantaneous utilizations themselves; they had to schedule time at to model a complex database-driven as well as averages could be seen for any an IBM facility and work hand-in-hand with environment? The real truth tells us that resource involved in the simulation. IBM system engineers to build and run the queuing models provide average & standard 4. What is Really Needed? model. deviation types of statistics. From our ƒƒ Ideally, we want the speed of execution By using discrete-event simulation, knowledge of I/O systems, we know that of queuing models - especially as we can define, in general, each critical the arrival process for I/O is not exactly we’re in the “what-if” stage of building component of the DBMS, and follow each distributed as a Poisson distribution - the buffer pool configuration. We object as it visits each of these components hence a built-in inaccuracy. In addition, could use the queuing approach to within that environment. This completely we know that service times for I/O are quickly build models of nearly all- captures the object’s use of DBMS resources, not quite distributed exponentially. Again, possible configurations, and evaluate but runs the risk of generating a long-running this leaves room for additional inaccuracy. these quickly. Poorly performing simulation model. Fortunately, commercial Analytic modeling packages have developed configurations should stand out simulation-based tools are emerging in this proprietary heuristics to help compensate immediately, thus leading to creating area that execute rapidly on workstations. for these inaccuracies. Finally, analytic a “short list” of possible “real” algorithms get more involved and complex 3. Limitations and Efficiency configurations to analyze further. as the model grows more elaborate. Let’s take a moment to examine analytic ƒƒ We want the accuracy and detail of Thus, if we’re trying to see when techniques versus simulation techniques simulation models - especially when analytic models break down, we find it in today’s environments with emerging we’re close to settling on a final occurs when the capacity planner is trying technologies. As we stated earlier, analytic configuration. Each of the resulting to evaluate non-average conditions, e.g. or queuing models are characterized “real” configurations could be conditions “at-the-edge”. For example, by equations to express steady-state evaluated for “at-the-edge” conditions ƒƒ How long will it take to process a batch- conditions giving results of limited accuracy. with simulation, thus completing the type workload while the queues are full? In the real world of enterprise computing, analysis process by illustrating the best ƒƒ How long will it take to get a backup done? systems don’t often experience steady state configuration for our environment in What confounds the analytic situation conditions. Questions are usually directed even the most convoluted situations. even more is factoring in any activities that at peak conditions - sometimes called With the proliferation of fast look like a network. Packets move at different conditions at the “edge-of-the-envelope” workstations, we fully expect to see speeds, and often using different protocols, - and are usually beyond the capabilities emerging simulation tools that will combine making the analytic modeling of pipelining of the queuing model. The queuing model the positive features of both simulation impossible. Piggybacking is the process of assumes that expected service times are and analytic modeling for general modeling putting packets onto other packets - saving exponentially distributed, and that arrival applications. We fully expect domain- some setup overhead - that just happen times are Poisson distributed. This means specific simulation tools to be so fast that to be headed for the same destination. that the expected service times and arrival the speed usually expected from solving a Sometimes piggybacking occurs, and times for service are independent of all queuing model would be achievable through sometimes it doesn’t. In addition, if you previous events. These types of queuing simulation (as is the case with Buffer Pool know of a situation where you have non- systems are often called memory less Tool). Again, the key for the capacity planner exponential patterns of service time, you because each event has nothing to do would be to use a rapidly solvable modeling know your results will be suspect. For with events that have previously occurred. approach to eliminate poor configuration example, consider network access - the time Consider an I/O in mainframe system: it alternatives quickly. When left with only it takes to access the network depends on would be great if the next I/O would be several remaining configuration alternatives, the load that is present, which is anything automatically routed to the disk that is the the capacity planner would turn to least busy. But that dependency on previous but memory-less! Finally, if you want to 4 simulation to evaluate those environments events just does not occur. Salsburg and model a situation where you know you have 5 under different “at-the-edge” conditions to McNutt have both shown that the arrival non-exponential arrivals, e.g. a print server get the more detailed and accurate results. process in an I/O subsystem is anything but comes on every 5 minutes, this too can 6 Poisson. And Serrazi discussed the amount lead to less than adequate results with an 5. Conclusion: Who Have We Been of error inherent in assuming a fixed, non- analytic model. Listening To? changing population in a closed queuing Simulation seems to be the obvious Capacity Management techniques system. Nevertheless, queuing models are analysis choice ... but it’s not an easy choice have been developed focusing on system solved quickly compared to other methods, to make. On the positive side, simulation will resources used over the last 25 years. While and historically easy to construct. be able to provide not only average response IBM provided the necessary operating Executing a given list of events one at times, but also maximum values. A system, the necessary resource management a time, thus recreating the actual system complete analysis of service time at varying infrastructure emerged primarily from third interactions solves simulation models. Thus, levels of resource availability (in the case of party companies. As the old saying goes, they can provide much more accurate results. Buffer Pool Tool, the number of buffers) can history does repeat itself! From the humble Historically, they are more time consuming be provided, which would include: beginnings of SNAP/SHOT to evaluate to construct because the set of events must • I/O rates per second IMS-based applications, we come again to be built based on a thorough understanding • Buffer Pool hit ratios consider the use of simulation for capacity of the underlying application. While solving • Object working set sizes planning. So whom do we listen to as far 7 an analytic model is equivalent to solving a • Average page residency time as capacity planning goes? Artis , nearly set of equations, solving a simulation model For some environments, graphic-based fifteen years ago, discussed the maturity requires executing each event which can simulation tools have the additional ability levels of organizations as their capacity require more time for execution. to allow the capacity planner to watch the planning efforts mature. Amazingly, his

CSI COMMUNICATIONS | AUGUST 2010 8 analysis holds up well today for database- commodity shopping, managers took on Planning, CMG Proceedings, 1985, p.564 centric environments. At the Vendor stage, that responsibility. For More Information all capacity planning services are provided This notion of hardware being a We provide unique solutions for your as part of a hardware vendors’ marketing commodity has thrust capacity management difficult DB2 performance problems. Our effort. This was in large part due to the fact under the microscope - do we need capacity worldwide client base and proven track that we did not know what to buy or how planning any more? Capacity Planning is record ensures that you can improve your to set it up, so we used trust in our favorite now going through a re-engineering process. system and application performance, just vendor. As the organization grew and Simply stated, we need, to be able to first, as our other clients have done. To learn matured, we’ve assigned more people and quickly identify system resources being used more about Responsive System’s software importance to the capacity management and whether those resources are degrading products, performance solutions, or function, until at the Mature stage, corporate performance. Then, once identified, we need consulting services, visit our web site and executives perceive capacity planning tools that can offer solutions - that is, the contact us either by email or by calling one results as essential to the decision making methods employed by today’s tools should of the telephone numbers below. . process. While many organizations would rapidly identify alternative configurations References: consider their mainframe capacity planning that will immediately improve performance. 1. Kobayashi, Modeling and Analysis, efforts as mature, these same organizations What becomes more important are Addision-Wesley, 1978. are at the vendor stage as far as purchasing questions like “Is the configuration providing 2. Carroll, J., Calibrating a Baseline Model, configuring a mission-critical database- adequate performance?” or “Which database CMG 93 Proceedings, page 936. centric application! Primarily due to the resource will become the critical bottleneck 3. One might recall the product ISS3 once ever dropping cost of hardware, individual and under what load conditions?” We need marketed by Computer Associates. managers have gone out to their favorite to understand how to grow key database- Through the use of an expert system, vendors, listened to a marketing pitch, and centric applications; that is, is a particular ISS3 tried to provide recommendations have made the buy decision for database application scalable? How many more users that weighed cost vs performance. Its gear. Unfortunately, the traditional capacity can be added, and what is ratio of users primary problem was keeping the cost planner has not always been included in the to memory or processor. These questions figures of equipment current. process. Thus, the next few years will see force the capacity planner to seek a new 4. Salsburg, M. A., Disk Cache the planning function return to central IS perspective. Simulation models comprise Performance Modeling, CMG87 management in many shops. a technology that will help answer these Proceedings, p. 423-431. In recent times, we must ask how we questions - if applied at the appropriate time 5. McNutt, B., Large Capacity DASD: Is evolved to this point? Primarily cost; the in the planning process. Performance Something to be Afraid hardware has, for the most part, become The ability to predict, accurately, the Of?, CMG87 Proceedings, p. 399-404. a commodity, like bread or eggs in the effect of changes - and to provide guidance 6. Serrazi, Workload Characterization grocery store! A 16 Megabytes upgrade on how to accomplish complex tasks is a of Computer Systems and Computer to the mainframe once required a 2month key requisite for improving performance, Networks, North-Holland, p. 159-176, justification study; today, we can buy improving the ability of the analyst to 1986 16 Megabytes of memory for a PC at complete their job, and optimizing the 7. Artis, Dr. H.P., The Five Stages of our local computer store for about $40! 7performance/hardware trade-offs. Capacity Planning, CMG Proceedings, So rather than burden the planner with Artis, Dr. H.P., The Five Stages of Capacity 1985, p.564

CSI COMMUNICATIONS | AUGUST 2010 9 THEME ARTICLE

Model-Based Design and Beyond: Solutions for Today’s Embedded Systems Requirements Jerry Krasner*

Founder and Principal Analyst, Embedded Market Forecasters, 1257 Worcester Road, #500 Framingham, MA 01701. E-mail: [email protected]

Overview that are time consuming and error prone. There is Complexities and uncertainties surrounding little tracking to ensure that changes are correctly embedded software developments continue to implemented. escalate development costs and frequently challenge Designs, such as those for avionics and product “windows of opportunity”. Engineering automotive systems, have become too complex to costs associated with design delays are further develop and coordinate without the creation of a design exacerbated by the failure of most embedded designs environment common to all involved developers. to approximate predesign expectations. Model-based design, used to its fullest, provides Annual surveys by Embedded Market Forecasters a single design environment that enables developers (EMF) of embedded developers have clearly shown to use a single model of their entire system for data that software development is responsible for more analysis, model visualization, testing and validation, than 80% of design delays and associated design and ultimately product deployment, with or without complications. Whether the system is poorly conceived automatic code generation. and specified or whether crucial algorithms fail to At a minimum model-based design can be used adequately address systems performance, traditional as a specification that contains greater detail than methods of embedded software development are text-based specifications. In real-time applications, yielding to a process known as “model-based design”. it enables developers to evaluate multiple options, Model-based design is used to more clearly define predict systems performance, test systems design specifications, to test systems concepts and to functionality by imposing I/O conditions that might be automatically develop code for rapid prototyping and operationally expected (before product deployment), for software development. and test designs. Data is presented to demonstrate that model- Once the model is built and completely tested, based design technologies, including simulation- accurate real-time software for the production modeling, rapid prototyping, hardware-in-the-loop embedded design is automatically generated, testing and automatic code generation offers better thereby saving time and reducing costs compared to design results and considerable savings to OEM traditional manual coding. Model-based design with developers. automatic code generation can also be used in rapid Data is also presented to show how developers– prototyping, enabling subsystem­ designs to be tested even those using model-based design-can further and optimized. enhance their design efforts by utilizing the Although it is very important in highly complex comprehensive set of model-based design tools. design applications (e.g., guidance systems, engine What is Model-Based Design? controls, autopilots, anti-lock braking systems) Model-based design emerged as a means of that otherwise might be difficult to realize without addressing the difficulties and complexities inherent it, model-based design can be used effectively and in control systems designs. Developers recognized economically for less complex designs. that software design needs to start before physical Furthermore, model-based design creates a prototypes and systems are available. Traditional structure for software reuse that permits established design processes resulted in the discovery of design designs to be effectively and reliably upgraded in a and requirements errors late in the design cycle more simplistic and cost effective manner. resulting in expensive delays and missed windows of Model-based design works in the following manner: opportunities. ƒƒ The entire system model is visualized via block This paper is reprinted with In traditional design processes, design diagrams and state charts to describe knowledge special permission from Dr. JERRY KRASNER. information is communicated and managed as text and implementation details Please visit: www.embeddedforecast.com based documentation. Frequently this documentation ƒƒ Design options can be evaluated and systems www.embeddedmarketintelligence.com - blog is difficult to comprehend. Code is created manually performance predicted via simulation of the for more papers and insights. from specification and requirements documents system model

CSI COMMUNICATIONS | AUGUST 2010 10 ƒƒ Algorithm and behavioral models are Ahead Behind Cancelled Outsourced optimized and refined yielding a fully tested specification 32-bit 15.4% 53.5% 13.1% 11.4% ƒƒ Production quality software is 64-bit 17.7% 47.3% 11.9% 16.8% automatically created for real-time DSP 17.2% 54.8% 12.9% 11.3% testing and deployment from the fully tested specification FPGA 15.8% 54.3% 12.6% 11.0% Model-based design saves money Auto-Transport 14.8% 55.4% 15.1% 13.1% by cutting design time and providing final designs that more closely approximate Avionics 15.1% 52.0% 11.8% 15.2% pre-design expectations for performance, Bus Mach & Peripherals 15.1% 52.9% 14.8% 11.6% systems functionality, and features and Consumer Electronics 17.2% 52.3% 14.8% 11.9% schedule. It provides: Faster design iterations that produce Datacom 11.8% 57.2% 16.5% 13.2% desired performance, functionality and Telecom 10.6% 60.2% 18.3% 7.5% capabilities. Electronic Instrumentation 18.3% 57.3% 13.3% 11.1% Design cycles that are more predictable and result in faster product shipments Industrial Automation 19.1% 51.3% 13.0% 8.1% Reduction in design, development and Medical 18.1% 56.2% 11.6% 11.3% implementation costs. Military 17.6% 52.1% 8.3% 14.3% Model-Based Design Enables OEMs to Retain Legacy Code Table 1 : Percentage of Design Completions According to Schedule An important feature of model-based design tools is the ability to reuse existing accomplished more easily and with less features and other non-productive actions. pre-tested and deployed code as part of the testing required. In a survey of 947 embedded model. In this way, existing applications can Looking at Embedded Design Processes developers, each was asked to reply to the be updated or enhanced without having to The following information was question “how close to your pre-design model the complete design. Or put another developed from the Embedded Market expectation was your final design?” Three way, it allows the developer the capability Forecasters 2003 Survey of Embedded categories were presented (Performance, of more completely modeling the system Developers (www.embeddedforecast.com­ ). Systems Functionality, and Features and without having to represent everything The results presented are consistent with Schedule). Developers were given the from scratch in the model-based design. the results derived from surveys conducted following choices: within 10%; within 20%; A good example is the need to update or over the past 24 months. within 30%; within 40%; within 50%; and, replace a user interface for an application Table 1 presents a summary of design “not within 50%”. while maintaining a majority of the existing results according to schedule. The results are In such, a developer responding, say, design. For example, you can encapsulate also cross tabbed according to architecture to performance with “within 30%” was the production code that will remain and vertical markets. Approximately 60% of indicating that the design was within 30% unchanged and execute it as part of the respondent use FPGAs in their designs. but not within 20%. model, easily make the changes, and do less The cost of delays and cancellations Table 2 presents the results from the system-level testing before deploying the were established in an EMF report “2003: 2003 EMF embedded developer survey. updated application. Embedded Hardware/Software Design Cross tabulations were run according The developer can encapsulate the Preferences”, which took into account to 10 vertical markets, 7 microprocessor production or legacy code modules using the number of developers per project, the families, bus architecture, microprocessor wrappers, usually written in ‘C’ that provide average cost per developer and the period architecture, and 5 types of engineers. the appropriate interface to the model- of delay (be it a delay in design completion Over the preceding two year’s of based design tools. The developer needs or the period between design start and surveys, the comparison continues to only to describe the inputs, outputs, and cancellation). By assigning a cost per worsen. It is clear that with over 30% of timing required for the encapsulated code to developer, the reader can calculate the costs designs failing to approximate 50% of insure that the timing and execution of the of delays and cancellations. pre-design expectations (and 40% not model is precise. Of further concern to an OEM is the being within 40% of expectations) that as There are some aspects of system relationship between final design results designs become more complex OEM design design that may be difficult to accurately and pre-design expectations. Failure to expenditures will increase while windows and precisely model using model-based approximate pre-design expectations can of opportunity and product features will be design tools. These include hardware device result in design delays, removal of product challenged. drivers and interrupt service routines, which are typically hand coded by software Comparing Final Design Result to Pre-Design Expectations designers who have intimate knowledge Within Within Within Within Within Within of the hardware and system requirements 10% 20% 30% 40% 50% 50% in order to meet timing and performance Performance 31.7% 19.3% 8.7% 2.3% 6.7% 31.3% constraints. These routines can also be encapsulated using the same interface and Systems Functionality 39.0% 14.0% 6.6% 1.9% 5.8% 32.8% be incorporated into the model. Features & Scheduling 19.8% 18.6% 13.8% 5.4% 15.8% 26.6% By using this method, code reuse is realized and design iterations can be Table 2 : Comparing Final Design Results to Pre-Design Expectations

CSI COMMUNICATIONS | AUGUST 2010 11 Cross tabulations were conducted Percent of Total Respondents that use a in order to compare final design results/ Model-Based Design Tool pre­design expectations between all respondents and those that use simulation- Type of Developer/Engineer modeling, rapid prototyping and automatic Tool Hardware Software Systems Firmware Manager All code generation in their designs. Simulation Modeling 36.9% 28.0% 44.7% 36.3% 57.0% 35.0% There are important aspects of this data need to be emphasized: Automatic Code Gen 7.8% 11.6% 12.0% 8.7% 17.0% 11.5% • Most developers use simulation- Rapid Prototyping Tool 3.9% 7.9% 15.3% 2.6% 14.1% 9.3% modeling as a systems development Hdw in Loop Simulation 8.7% 8.2% 20.0% 5.2% 8.9% 10.1% tool rather than as a software development tool Software Verification Tools 9.7% 13.3% 17.3% 10.4% 26.7% 15.5% • Final design/pre-design expectations Table 3 : Percent of Responding Developers that Use a Model-Based Design Tool are software development related • 35% of embedded developers use simulation-modeling in their design engineers) and 12.0% (11.6% for a clear case for developers to realize practices, but only 11.5% also use software engineers) use automatic code immediate payback from using the panoply automatic code generation generation in their designs of available Model-Based Design tools. ƒƒ The EMF 2003 survey is responded to • Of the developers that use automatic Examples of How Model-Based Design by a broad cross-section of embedded code generation in their design Tools Function in Developmental developers and applications. Hence the practices, 58% use it in conjunction Applications numbers reported herein are significant with simulation-modeling (34% use it Model-based design tools can ƒƒ The use of automatic code generation in conjunction with rapid prototyping) be invaluable in providing early design for software development is growing And equally important, developers who verification and a true executable rapidly in certain industries, such as use these model-based design technologies specification. This is very important if a aerospace and automotive in their design practices indicate that they design has one or more of the following have a higher pre-design expectation than How Different Developers Use Model- characteristics: when they are not using these technologies. Based Design Tools ƒƒ Expensive or impractical to build early It is clear from EMF surveys that: The 2003 Survey of Embedded prototypes ƒƒ Embedded developers that use Developers tracked the broad use of ƒƒ Complex system with multivariable simulation-modeling in their designs different tools that are used by developers. and/or multi-rate subsystems have a higher pre-design expectation This data was examined by cross tabbing ƒƒ Subject to governmental or other than non-model-based design each of the respondent’s answers to each regulatory constraints developers question posed according to engineering ƒƒ Proof of concept must be demonstrated ƒƒ Developers that use automatic code type, 10 vertical market design applications, prior to full project funding generation for their designs experience processor architecture utilized in the ƒƒ Failure of the system or subsystems in final designs much closer to pre-design primary design (including FPGAs and DSPs), testing could cause injury or liability expectations than those that don’t and by seven microprocessor families (e.g., ƒƒ Product design cycles are compressed incorporate automatic code generation Motorola, Intel, ARM, etc.). and testing and validation cannot be into their designs Table 3 presents the breakout use of A typical example of the type ƒƒ Developers that use rapid prototyping model-based design tools (and software of application well suited for Model- in their designs experience the greatest verification tools as a comparison) according Based Design tools are automotive improvement between pre-design and to developer specialty. applications: power plant (engine), drive final design results In Table 3 it is evident that 44.7% train, transmission, electrical, engine Most simulation-modeling users do not of systems engineers use some form of control, braking systems, and telematics incorporate rapid prototyping or automatic simulation modeling in their designs, while (communications, A/C, heating, ventilation, code generation into their designs – they only 12% use automatic code generation etc.). There are many other applications that may not be aware of design enhancements and 15.3% use a rapid prototyping tool. The have the same types of systems: aerospace, that accrue from such use. use of software verification tools is used as trains, light rail, and ships. By no means is There may be several reasons for this. a comparison. transportation the only application well ƒƒ Simulation-modeling is (according to Recalling that the use of rapid suited for model-based design. Almost EMF data) used largely as a systems- prototyping and automatic code generation any embedded application can be modeled based tool and is less frequently resulted in superior design results that accurately using model-based design. The used as a software development more closely approximated pre-design systems modeled can include both physical tool. Enhanced systems design is an expectations, it is nonetheless clear from and electrical components. essential component of good design Figure 2 that only a fraction of developers The following table shows how model- practices using simulation modeling tools in their based design is used in developing real ƒƒ From the 2003 EMF embedded designs also use automatic code generation applications. developer survey: Systems Engineers and rapid prototyping, notwithstanding the ­44.7% use simulation modeling (25.4% improvements in design results that are Other Application Examples for software engineers), 15.3% use shown to be evident. Military COTS: Current DoD primes rapid prototyping (7.9% for software EMF believes that this data makes and subs have not established methods

CSI COMMUNICATIONS | AUGUST 2010 12 Which Simulation Modeling Tool Vendors Have You Used In The Last 12 Months?

• 69.8% indicated that they used MATLAB from The MathWorks • 29.5% indicated that they used Simulink and Stateflow – both MathWorks model-based design products • 49.4% of respondents indicated that they will use Simulink and Stateflow in the ensuing 12-month period

The MathWorks ranked ahead of all competitors in this market segment.

To compare the entire model-based design process from the viewpoint of the comprehensive model-based design product line from The MathWorks, Figure 2 illustrates MathWorks model-based design product line, and Figure 3 illustrates MathWorks model-based design product line superimposed on the product lifecycle.

for COTS evolution in order to address obsolescence and IC replacements. Model- based design can contribute significantly to establishing an evolutionary process. Model-Based Design in the Product Model-BasedLifecycle Design in the Product Lifecycle The product lifecycleThe productutilizing model-based lifecycle design utilizing is presented model- in Figure 1. based design is presented in Fig. 1.

Fig. 2 : MathWorks Model-Based Design Product Line Figure 2 MathWorks Model-Based Design Product Line

Figure 1 Model-Based Design in Product Lifecycle Figure 1 TheModel-Based shaded Design area in Productrepresents Lifecycle those The shadedaspects area represents of a product’s those aspects lifecycle of a product’s that lifecycle can that be can be successfully addressed using model-based design. Different vendors offer tools that addresssuccessfully specific aspects addressed of the model-based using design model-based process, but very few can offerdesign. an array ofDifferent model-based vendorsdesign tools thatoffer comprehensively tools that address the product lifecycle. address specific aspects of the model- Toolsbased that Support design the process, Model-Based but very Design few Process can – The MathWorksoffer an array of model-based design tools In the EMFthat 2003 comprehensively Survey of Embedded Developers address (947 the respondents product 12 representing a broad cross-section of the embedded marketplace) 414 developerslifecycle. responded to the question: Tools that Support the Model-Based Design Process – The MathWorks 11 In the EMF 2003 Survey of Embedded Developers (947 respondents representing a broad cross-section of the embedded marketplace) 414 developers responded to the question: Fig. 3 : MathWorks Tools in Product Lifecycle Which Simulation Modeling Tool Vendors Have You Used In The Last 12 Months? Figure 3 ƒƒ 69.8% indicated that they used design product line, andMathWorks Figure 3 illustrates Tools in Productpoints during Lifecycle the design cycle enables MATLAB from The MathWorks MathWorks model-based design product management to more accurately forecast ƒƒ 29.5% indicated that they used Simulink line superimposed on the product lifecycle. duration and costs. Model-based design and Stateflow – both MathWorks SummarySummary also brings the concept of “design reuse” model-based design products Model-based design offers developers into the design cycle creating a framework ƒƒ 49.4% of respondents indicated that Model-baseda distinct advantage design over offers traditional developers product a distinctfor future advantage savings. over traditional they will use Simulink and Stateflow in productdevelopment development techniques. techniques. The ability The to ability to Aperform standard design metric validation in andproduct the ensuing 12-month period verificationperform design at the validation onset of and a project verification as well asdevelopment the ability is to thetest number system of segments lines of The MathWorks ranked ahead of all usingat the rapid onset prototyping of a project and as automatic well as the code debuggedgeneration code (production per developer code) per day. Assume a typical application generates a competitors in this market segment. providesability to a test distinct system advantage segments usingto the rapid developer. To compare the entire model-based prototyping and automatic code generation million lines of code. If model-based design design process from the viewpoint of (production code) provides a distinct tools are used to generate a portion of From a design/project management viewpoint,production the ability code to –say validate 30%, at this different relieves the comprehensive model-based design pointsadvantage during to the developer.design cycle enables management to more accurately forecast product line from The MathWorks, Figure From a design/project management programmers from having to write 330,000 duration and costs. Model-based design alsolines brings of code. the concept of “design 2 illustrates MathWorks model-based reuse”viewpoint, into the abilitydesign to cyclevalidate creating at different a framework for future savings.

A standard metric in product development is the number of lines of debugged code per developer per day. Assume a typical application generates a million lines of code. If model-based design tools are used to generate a portion of production code –say 30%, this relieves programmers from having to write 330,000 lines of code.

91218v00 3/04

CSI COMMUNICATIONS | AUGUST 2010 13 13 THEME ARTICLE

WEBtop (Operating Systems on Web)

M K Sharma

Associate Professor, Department of Computer Science, Amrapali Institute, Shiksha Nagar, Kaladhungi Road, Haldwani - 263139, Uttarakhand, INDIA. [email protected]

WebOS (Web based operating system) is a new form of Operating Systems. You can use your desktop as a virtual desktop on the web, accessible via a browser, with multiple integrated built-in applications that allow the user to easily manage and organize her data from any location. Desktop on web can be named as WEBtop. This paper starts with a introduction of WebOS and its benefits. For this paper. We have reviewed some most interesting WebOS available nowadays and tried to provide a detailed description of their features. We have identified some parameters as a comparison criteria among them. A technical review is given with research design and future goals to design better web based operating systems is a part of this study .Findings of the study conclude this paper. Keywords : WEBtop WebOS Cloud Computing User interface Open source.

1. Introduction basic operating systems services needed to build The web operating system is evolving as a form applications that are geographically distributed, highly at a rapid pace, promising to free us from Windows available, incrementally scalable, and dynamically once and for all. If you want to take the desktop to reconfiguring.” your , one contender is well on the way Now you can think WebOS as a virtual desktop to making it possible. on the web, accessible via a browser, with multiple Web Operating Systems (WebOS) is: “A integrated built-in applications that allow the user software platform that interacts with the user through to easily manage and organize her data from any a web browser and does not depend on any particular location. local operating system.”Web operating systems 2. Benefits of WebOS are also commonly referred to as Web desktops or In a normal window based operating system, WEBTOPS. you need to use your own resources like hard disk, “A or webtop is a network memory and only your OS based applications can application system for integrating web applications run, like you can not work with MS office in Linux. A into a web based work space. It is a virtual desktop on WebOS gives you freedom of work from any terminal the web, running in a web browser as software. Web from any location using a web browser. The notion desktops often are characterized by an environment of the web operating system attempts to unify your similar to that of Windows, Mac, or Linux, but are now web applications to some extent, providing you with considered to have much more functionality being a single point of access through which you can utilize dependent on the internet. Typical benefits include tools and services, store your files, read your emails the ability to save work and settings over the internet and return to and from any computer on the planet. rather than to the local desktop.” Just as you can store your Google documents The first occurrence of the term “WebOS” and spreadsheets on the web, and access them from is in the name of a computer research project any terminal, irrespective of its operating system started by University of California, Berkeley in using , is a good example of a web based OS . This is 1996 (that is now continuing at Duke University), a new form of work with computers and an attempts which describes it this way: “WebOS provides to make your entire desktop a WEBTOP .

CSI COMMUNICATIONS | AUGUST 2010 14 3. Research Methodology own server, EyeOS offers a credible amount part of the OS itself – rather, they launch For this paper, We have reviewed of customization options as long as your outside of it, making Online OS a sort of a some most interesting WebOS available web server runs PHP5 and Apache. EyeOS portal to these apps. nowadays and tried to provide a detailed also offers GUI customization options qWikiOffice description of their features. You will find which means that you can set up an OS This is one of those few online operating out that some of them have already reached the way you and your users want it – highly systems that make use of the EXT-JS library a good level of implementation, while recommended for those who need to set up for its functioning. Coupled with cutting- others are still at their early stages. While their own Web OS. edge GUI, qWikiOffice is indistinguishable reviewing these services We have identified from an ordinary OS when it works. the following parameters as a comparison However, it is still under development and criteria for this list: there are no releases as yet. • Open API: the typology of Application Programming Interface that it uses Windows4all • Open-source: the possibility for users and developers to contribute to the enrichment of the WebOS by creating new applications and widgets • Integrated apps: the applications that the WebOS features by default (which could be a text editor, an instant messenger, etc.) Fig 1.1 : Screenshot of the EyeOS • Audio-video Player: the availability of a media player within the WebOS • Photo editing tool: the availability of a G.ho.st tool that allows the user to edit images Short for “Global Hosted Operating • E-mail client: the presence of an email SysTem”, Ghost Inc.’s web-based operating Fig 1.2 : Windows4All - client system is built for all those consumers who The Silverlight based Web OS • Instant Messaging: the availability of need to set up an online cloud-computing an integrated instant messenger base without any hassles. The working Using Microsoft’s Silverlight • Calendar: the existence of a calendar environment is very similar to most technology, Windows4all is an online virtual • Collaboration - Conferencing tools: operating systems that users use, and users operating system. With a Vista-like GUI the presence of online collaboration can add more applications in the near future. and desk bar, this is for all those Windows fanatics who need to use their favourite OS tools (such as VoIP, web conferencing Glide OS on computers that do not have Windows tools, etc.) TransMedia’s Glide OS is yet another installed. • Mini-Browser: the integration of a web entrant into the competitive world of cloud browser computing. However, with Intel’s plans of DesktopTwo • File storage: the amount of space – if putting Glide into their ultra-mobile PCs, Labelled a “Webtop”, this cloud OS is available – to store files online this is one online OS that is not to be trifled one of the premier services offered online, • File sharing support: the support for with. Packing a host of applications in its developed by Sapotek. The goal of the file sharing with other users basic version, Glide does an admirable job of developers is to convert the internet into a • Desktop Search: the presence of a providing easy cloud computing for its users full fledged platform for working instead of desktop search engine within the on both the PC and mobile platforms. relying on hard-drive based applications. It WebOS is a playground for developers as they have A technical review is given with Lucid Desktop released their code under AGPL license. research design and future goals to design Lucid Desktop (formerly known as the Google Chrome OS better web based operating systems is a Psych Desktop) is built on a base of PHP5 Google’s highly anticipated (slated for part of this study. Findings of the study and is a prosumer-oriented web desktop release in 2010) cloud computing OS is still conclude this paper. service. This desktop can be installed on to largely open to speculation as Google has 4. Review of 10 web OS a web server like EyeOS, and is remarkably not released much information since its blog Cloudo simple to use and write code for. With its post on the Chrome OS and we have reason Formerly known as Xindesk, Cloudo proximity to Linux’s code, Lucid Desktop will to believe that it will be as groundbreaking is an open internet-based operating be a sure hit with the Linux-loving masses. as its Browser. system that is written in PHP and runs the Online OS LAMP software bundle. It makes full use A welcome departure from the masses, Technical Review of the area of the browser and seamlessly Online OS is written in Javascript and uses WebOS provides OS services using integrates with the iPhone’s mobile browser. AJAX for its fast and user-friendly work. The wide-area network and applications, there is Written using open technologies, this demo desktop looks like the Windows XP a need to include mechanisms for resource browser based OS is high on features and desktop (the registered version can be made discovery, a global namespace, remote usability. Currently in Public Beta, it opens to look like KDE or Mac OSX) and loads very process execution, resource management, to consumers next year. fast (although there are a few glitches here authentication, and security. On a single EyeOS and there when components fail to load machine, application developers can rely on One of the first implementations of quickly). It has file-management and other the local operating system to provide these the web-based OS that you can run on your abilities, but most of its applications are not abstractions. In the wide area, however,

CSI COMMUNICATIONS | AUGUST 2010 15 application developers are forced to build ƒƒ The window manager will handle 7. Conclusion these abstractions themselves or to do user interaction with multiple client In Future you will work with many without. This ad-hoc approach wastes windows much like other X window WebOS, We should think for the future programmer effort and system resources. To managers . design and risks involve to develop a next- address these problems, WebOS provides generation operating system. However, we 6. Findings basic operating systems services needed wonder if the lack of offline capability might We find out that most of the Web OS, to build applications that are geographically hinder its adoption since most of the time are based on the Internet browser interface distributed, highly available, incrementally PC users take their machine overseas where which almost every PC user is familiar with scalable, and dynamically reconfiguring. An Internet access may be spotty or expensive. and having with their PC. WebOS are faster application that demonstrates the utility Still, there is about many years to go to take then normal OS as most of the web OS of WebOS tested using Rent-A-Server full advantages of Web based operating version boots up in under 10 seconds as we application , which is a web server capable of systems. tested, some Web-based program leverages dynamically replicating itself geographically The conclusion is that a web-based the advantages of cloud computing, so in response to client access patterns. operating system will imminent in Web that all your data is located online and can 2.0’s age, and we should design new WebOS 5. Design goals and direction be accessed via any computer. In fact, a based on reviewed services that will give Chrome-based Netbook will save the last 5.1 User interface users the power of computing on the Web. The study indicate that a suitable user open Web page or application online such No more hard-drive backups required – just interface is a prime design goals for any that you can log into any portable using turn on your browser and get going with Web OS ,user interface should be in a form Google’s OS and resume exactly where you these Web OS services after some years. that include using minimal screen space left off. References : by combining applications and standard Security is also tight, as all applications 1. “Operating System Services For Wide Web pages into a single tab strip, rather are Web-based and sandboxed. Hence, Area Applications,’’ Amin Vahdat. than separating the two. Designers should programs do not have the ability to corrupt November 1998., PhD Dissertation, consider a reduced window management the machine’s operating system with Department of Computer Science, scheme that would operate only in full- viruses or malware. Some WebOS based University of California, Berkeley screen mode. Secondary tasks would be applications claimed that all firmware 2. “WebOS: Operating System Services handled with “panels”: floating windows upgrades are free and automatically For Wide Area Applications,” Amin that dock to the bottom of the screen for downloaded, unlike normal windows based Vahdat, Thomas Anderson, Michael tasks like chat and music players. Split OS which demand hundreds of dollars for Dahlin, David Culler, Eshwar Belani, screens can be used for viewing two pieces new OS versions. Paul Eastham, and Chad Yoshikawa. of content side-by-side. We propose the 6.1 Some Limitations reviewed July 1998. The Seventh IEEE Symposium use of search and pinned tabs as a way to Due to the tight integration between on High Performance Distributed quickly locate and access applications after the operating system and the Internet, Computing review some web OS. what happens when one is cut off from the 3. “Transparent Result Caching,” 5.2 Architecture Web? Despite high Net penetration rates Amin Vahdat and Thomas The study shows that in preliminary worldwide, a traveler to a foreign land may Anderson. June 1998. design we should use a three-tier not want to pay for online access, which, in Proceedings of the 1998 USENIX architecture: firmware, browser and window some countries, can be very expensive. We Technical Conference manager, with system-level software and tested that Chrome-based Netbook is able 4. “The CRISIS Wide Area Security user end services. to open multimedia files and play videos, Architecture,” Eshwar Belani, ƒƒ The firmware contributes to fast boot but there is no built-in application to open Amin Vahdat, Thomas Anderson, time by not probing for hardware. The Word or PDF documents. The fact is that and Michael Dahlin. January 1998. firmware will also contribute security some currently available WebOS have no Proceedings of the 1998 USENIX services by verifying each step in the provisions for installing third-party software Security Symposium boot process and incorporating system is another limitation. 5. “Using Smart Clients to Build Scalable recovery. Further concern is data security. With Services,” Chad Yoshikawa, Brent Chun, ƒƒ System-level software will include the traffic taking place between the WebOS Paul Eastham, Amin Vahdat, Thomas OS kernel that has been patched to and the Internet cloud, hackers can sniff out Anderson, and David Culler. January improve boot performance. User end Internet packages and intercept information 1997. Proceedings of USENIX ‘97 software has been trimmed to essentials, between a PC and a Wi-Fi router. Most 6. “WebFS: A Global Cache Coherent with management by Upstart, which companies use encryption via VPN software Filesystem,” Amin Vahdat, Paul can launch services in parallel, re- to hinder hacking attempts, but this may not Eastham, and Thomas Anderson. spawn crashed jobs, and defer services be possible with some WebOS like Chrome December 1996. Technical Draft in the interest of faster booting. OS. About the Author Dr. M K Sharma is working as Asst. Professor and Head MCA program with, Department of Computer Science, Amrapali Institute of Management and Computer Applications, Haldwani (Uttarakhand). He has contributed many research papers and articles in international ,national journals and magazine including E-gov Asia, CSI communication, Macmillion Advance Research Series. He is study material writer for Distance Education programs of Chaudhary Devi Lal University, Sirsa (Hariyana), IASE University, Punjab Technical University and Uttarakhand Open University. He is active member of CSI and IBM Academic Initiatives.

CSI COMMUNICATIONS | AUGUST 2010 16 ARTICLE

Software Security: A Quantitative Approach

S. Chandra1 & R A Khan2

Department of Information Technology, Babasaheb Bhimrao Ambedkar University, (A Central University), Vidya Vihar, Rai Bareilly Road, Lucknow-226 025, India. E-mail: [email protected], [email protected]

Software based on new technologies provides interactive, multi-user, online and real time computing systems. An increased use of software systems has surely improved productivity and efficiency. Hackers and attackers are challenging the development of secure software. Software security mechanism inspires developers to build secure software. Measurement is the most powerful technique to control an activity. Aim of the article is to provide a methodology to estimate security during development. A quantitative approach has been presented in this paper. Checks have been proposed to be implemented at various steps of the methodology. Steps used in this method are very generic in nature and may be used to estimate security. Quantitative assessment polishes the role of software security estimation during development life cycle.

Keyword : Software security, security metric, security quantification, security parameters, security challenges.

1 Introduction A quantitative approach of predicting security of As world is growing to be hi-tech, all software has been proposed. Rest of the paper is communications, transactions has become more organized as follows: Second section presents an dependent on computer software. Software based overview of software security. Third section presents on new technologies provides interactive, multi- the need of security estimation and brief description user, online and real time computing systems. No of some severe virus attacks and economic losses in doubt, increased use of software systems has surely industries have been showed. In addition to this, some improved productivity and efficiency, but it gives security challenges have been listed in this section. chance to hackers and attackers to make system Fourth section presents background and motivation of insecure [1]. Hackers continue try to expose existing the methodology. Fifth section describes the proposed vulnerabilities. End users want to keep safe their method at length. Sixth section presents discussion information and data at any cost. Software engineers, and future work. The seventh section concludes with project managers, and software developers are in summarizing the developed process to estimate heavy demand of delivering secured software. software security. Historically, security experts carry out security 2 Software Security assessment process through the qualitative analysis. Software security is an approach to maintain Undoubtedly, measurable activity can easily and risk and protect from security failures in order to accurately be controlled is a well established increase systems reliability. Software security unifies paradigm. Security of the software comes in this knowledge architecture, includes seven knowledge rubric. Software security estimation may help to catalogs: principles, guidelines, rules, attack patterns, meet the requirements of software. It is a process historical risks, vulnerabilities, and exploits. It is divided of quantitative assessment of software security [2, into three knowledge categories including prescriptive, 3]. Security estimation method may help to increase diagnostic, and historical [4]. To maintain software security assurance keeping developers and end users security only considering some security attributes in view. During development of the software, security such as authentication, encryption, and integrity is estimation polishes the role of security enhancement. not sufficient [5]. Maintaining security is a complex In this paper, a security estimation method has issue because it is not possible to maintain security been developed to estimate security of the software. at a glance. For getting security higher is harder, on

CSI COMMUNICATIONS | AUGUST 2010 17 the other hand complex architecture of become imperative. Estimation is the great impact on security. Sometimes, it software does not allow getting security at valuable technique to understand for is even hard to decide what decision will a given point of time. improving, guiding, and controlling be beneficial in order to improve security. Strong software security awareness security integration at the early stage of Different processes of software interact to the developers leads to a better software development. Several software with each other in complex ways, and make understanding of security considerations and measurements and quality estimation it hard to figure out only by scrutinizing provides platform to develop more secure methods are available. Literature survey architecture. A proper method is required software. It also supports to design a better reveals that even though plenty of security to analyze the impact of the software way in order to recover system from all kinds problems have been fixed. Still we are left attributes on security and make suggestion of defects and damages. Researcher and with some of the issues, discussed below, to change in architecture in order to improve practitioner strongly believe that security that makes software unsafe and insecure. security. Quantitative results, analysis and needs to be integrated at every phase of ƒƒ There is need to bridge the gap interpretations of relationship between software development life cycle. In terms between design principles and design security attributes and design attributes will of quantity and exposure, vulnerabilities metrics. It is also required to bridge the help in making decisions that may facilitate minimization can be made possible using gap between what we measure and to prevent software from major damages. security measures and countermeasures what is important in design [12]. In 1997, Wang & wolf motivated [6]. As reported in literature [7, 8], security ƒƒ Development of metrics framework is the rationale for theoretical validation of is still in its infancy and only quantitative a challenging task and needs in depth security metrics and suggested possible assessment of security may facilitate to analysis of metrics to be used [13]. For attribute [15]. There are lots of measures deduce the mechanism on predicting how security estimation mechanism, there and metrics available in literature. R. B much the software under development is is need to develop efficient security Vaughn emphasizes that these measures secured. Security quantification at the early metrics, and for the development of and metrics may be useful in predicting stage may facilitate software to come into security metrics, metric development system characteristics such as penetration erroneous stage and prevent from heavy framework is required. success rates, coupling and cohesion of losses. ƒƒ To achieve the desired level of security relevant software, testing defect security, complete knowledge has to rates, process quality and so on [16]. 3 Need and Challenges be collected on security algorithms, Security assessment methodologies, both From the last several years, the role network products, user behavior, qualitative and quantitative, are still missing of software has rapidly evolved from tools applications, and experiences from [17]. Undoubtedly, security concerns are for scientific calculations into a market virus and worm attacks and so on. All popping up everywhere but the field of providing software for different processes these important issues may contribute security metrics is still young. Quantitative of every field. This rapid growth on software in security maintenance [13]. assessment of security is a complex process. dependency increased the life expectancy of ƒƒ To understand the user’s expectations As stated earlier, exploitation of vulnerability software quality and security. Security is a towards security. Identifying and may result attack at any stage of software crucial issue for all organizations; security designing optimum path to meet these development. Widely accepted approaches of business processes is success key of an expectations. to maintain and improve security are still enterprise. Therefore, organizations are ƒƒ To bridge the gap between application’s missing [18]. continuously increasing their resources task and security actions. In order to achieve the objective to protect their business process against ƒƒ It is required that end users should be of securing architecture of software, a malevolent approaches and security capable to understand both threats and systematic guideline and approach is threats. In March 1999, the Melissa macro the techniques to handle it which is a required on urgent basis. M. Y. liu reveals that virus within a Microsoft Word document cumbersome task. the area is untouched and very little amount has been distributed via the email program of work has been carried out measuring Microsoft Outlook. The impact of this severe 4 Background and Motivations properties from security point of view damage is near about 80 million dollars. In Both users and developers [8]. Many researchers and practitioners March 2000, the Love Letter virus caused are demanding for secure software believed that security should be integrated a damage of 10 billion dollars [9]. Due to development. It is believed that delivering within the software development life cycle. malicious code, loss exceeded, by $13 billion secure software not only involves corporate; Literature survey strengthens the author’s in 2001. 4,129 vulnerabilities identified and the development team plays a critical role. claim, and validates the facts that most reported in CERT coordination centre which Exploitation of vulnerability may result of the work focuses primarily on system- are 70 percent more than that of 2002 and attack at any stage of software. Therefore, level security without considering design four times more than that of 2001. Security considering security as a serious factor attributes [8]. However, design attributes expenditures are estimated to be more than during development is must. There has been have great impact on security. The entire $3billion in 2004 [10]. The worldwide total a lot of deliberation on where to incorporate area of metrics and measures in security revenue for security products and service security during development process. An assurance is an interesting one and largely vendors increase to $21,1 billion by 2005 exhaustive review of the literature reveals unsolved. Quantification of security will help but neglect the definition of holistic security the fact that design time developer may to dissolve tradeoffs between security goals safeguards. Recent virus attacks showed contribute improving security effectively and cost. the vulnerability of professional e-business [14]. Many promising techniques have environments, e.g. the economic impact of Security is directly influenced by design grown unifying security attributes, security the Love bug virus is estimated to amount architecture of software. Design attributes metrics, and security functions. It is $8.7 billion [11]. of object oriented software including difficult to estimate the effect of security Software quality and security has coupling, cohesion and inheritance, have technologies. The effect depends on how

CSI COMMUNICATIONS | AUGUST 2010 18 well they mitigate risk and to recover validated; 5.4 Quantify Parameters defects from the damages. Quantitative ƒƒ Objective has been specified; Whenever there is a discussion on analysis of software security at early stage ƒƒ Security level is indexed; software security, emphasis is always on enables the evaluation and assessment ƒƒ Premises are designed; the security features such as authentication, of security and provides the basis for ƒƒ Industry regulations, corporate policies, encryption, and access control. These assessment of security technologies. It is and other business-specific needs are features are important but they cannot strongly believed that results of qualitative satisfied; make system fully secured alone [5]. analysis may no longer be acceptable and This step concentrates on quantification 5.2 Set Parameters as a result changes made at final stage of security parameters. Quantification of It is important to list out the measures of software development life cycle is security parameters supports during rating of security of the software and how to go comparatively costlier than changes made of product security. It will not exactly predict about measuring them. To solve the purpose at the early stage of software development security of software but data provided with there is need to figure out what behavior is [19]. Due to the lack of quantitative analysis quantification results of security parameters expected to the software. Security factors methods or mechanism, developers and give the basis for security estimation. such as confidentiality, integrity, availability, project managers are unable to estimate Only few studies took into consideration maintainability and so on, are composed of the effectiveness of security techniques the quantification of security factors. lower-level criteria including structuredness used [20]. In order to improve efficiency Bharat B. Madan proposed SMP model and conciseness. Security factors are of the software from the security point of for quantification of security factors for higher-level entities and may not be directly view security quantification is required. intrusion tolerant system [19] and Shawn measurable. Lower-level criteria are easier Therefore, there is need to develop a method A. butler proposed a security attribute to understand and measure than the factors to estimate software security quantitatively. evaluation method [2]. Some suggestive themselves [19]. In order to verify whether checks to verify the implementation of step 5 The Methodology the parameters are set properly, the in proper way are tested as follows. Security estimation of software helps following suggestive checks are proposed: ƒƒ Parameters are measurable directly or to identify vulnerability and mitigate it [21]. ƒƒ Security considerations are covered indirectly; Security estimation method as shown in fig and satisfied; ƒƒ Dependency of parameters has been 1 is to be broken-down into its constituent ƒƒ A parameter selection criterion has checked; phases. There are only six basic steps been designed; ƒƒ Correlation has been established; in the proposed method including set ƒƒ Set of parameters are identified; ƒƒ Regression has been set; goals, set parameters, identify security ƒƒ Parameters are prioritized; ƒƒ Quantitative value has been obtained; metrics, quantify parameters, analysis and ƒƒ Parameters are measurable interpretation, and validation. These steps quantitatively; 5.5 Analysis and Interpretation are elaborated in the following section. Analysis process deals with the 5.3 Identify Security Metrics quantitative data, once measurements have Security metric is a quantitative been done. Parameters have been quantified measure of the degree to which a system, using metrics; analysis process is carried out component, or process possesses a given to see how data and events are processed. attribute. At the early stage of software For effective data analysis, it is required to development life cycle, it is recommended have efficient statistical techniques. During to assess risk management capabilities of this process, input-output functionality software, which it not yet developed [2]. of its components is checked. Analysis Security metrics may be used to assess the process provides strong base for making risk management capability of software. interpretation of results obtained. Security metrics can help to evaluate Interpretation process is performed to security of the software and get an idea of assign a meaning to obtained data and security maintenance cost. Security metrics explain the results. During interpretation, are higher-level quantifiable measures. real cause of the obtained data can be 5.1 Set Goals Parameters can be quantified using security identified and corrective actions may be Goals are recommendation for things metrics. Security metrics needs to be suggested to achieve target level of security to do. Set of goals provide guidelines to identified in order to quantify parameters [22]. In order to verify the step some checks developers. Security goals can be set [3]. The key idea behind the use of metrics are suggested: based on environment, assumptions, and is that it encourages the applications of a ƒƒ Statistical data has been collected; software objectives. It includes objective more correct and improved measurement ƒƒ Source of statistical data is reliable; analysis of software, development scenario, process. Some suggestive checks are ƒƒ Impact of attributes has been analyzed; related principles, related rules, security noticed here in order to verify the step: ƒƒ Test cases have been designed; requirements, and software design. Desired ƒƒ Premises have been set for metric; ƒƒ Results are correct and consistent; security level should be defined in terms of ƒƒ Metric measures security attribute set of goals. The set of goals will support to efficiently; 5.6 Validation diagnosing architectural flaws in software ƒƒ Metric are related to software Validation process needs to be carried and practicing good security estimation characteristics; out throughout the estimation process. engineering. The following suggestive ƒƒ Metric gives correct, complete and Validation, after analysis process is common checks are proposed in order to verify the consistent values; in practice. Validation process is used to step to be followed in better way: ƒƒ If required metric is not available, new evaluate the performance of software from ƒƒ Requirements has been defined and metric is designed; the security point of view and demonstrate

CSI COMMUNICATIONS | AUGUST 2010 19 that results meet the set objectives. issues is presented in the following section. concern for software industries. Each sector is dependent on software, in this scenario; all Validation process must be inevitable 6.1 Design and Development Issues end users want to assure that the software, part of every measurement process. Some Software security and secure design is which they are going to use, is secured. suggestive checks are proposed that may an important issue of increasingly practical To meet the objectives of the software it support to verify the step: concern and research attention. Software ƒƒ Theoretical validation is carried out; security emphasizes on traditional security is required that software should be able to ƒƒ Pre-tryout data has been collected; attributes and classical dependability stay in competitive environment and work ƒƒ Revision, if necessary, has been attributes [23]. Features of software properly even in the presence of malevolent incorporated; product are not directly influenced by approaches, hackers, and attackers. Software ƒƒ Tryout on a large scale data has been external attributes such as maintainability, security estimation method may help to performed; readability etc. Therefore, there is need to achieve the purpose. The ultimate goal of ƒƒ Security level is satisfied; identify such attributes having direct impact the method is to satisfy the security needs 5.7 Review and Revision on internal features of software such as at the desired level including confidentiality, This step is introduced as seventh step size of software, complexity of control flow, integrity, authentication, authorization, non- of the methodology in order to reexamine inter-component coupling etc [24, 25]. repudiation, and so on. Much cannot be said the correction make in the previous steps. Security attributes play a major role during until the method is implemented. This step is flexible in nature and free to security estimation and help to maintain Reference enter at any of the earlier steps. The main target level of security. Many software 1. Khan, R.A.; Mustafa, K. (2008): strength of the step is that it supports developers and practitioners believed that Software Vulnerability Life Cycle, In: rollback, if required. so many measures and metrics available in Developer IQ, Vol.8, pp. 27-30. Each and every phase has its own literature are underutilized. These measures 2. Chandra, S.; Khan, R.A. (2008): impact on its successive phase. But it has and metrics may be used in prediction Software Security Estimation in Early been noticed that design phase has some of security characteristics including Stage of Development Life Cycle. In: additional advantage and therefore all of the penetration success rates, coupling and Proceedings of National Conference other phases got more dependency on it. In cohesion of security relevant software, on Emerging Technologies (NCET 08), order to achieve the objective of delivering testing defect rates, process quality and so 29-30 March 2008, pp.1-3. secure software, an effort to quantify security on [8]. Quantification of security attributes 3. Chandra S., Khan, R. A. (2008): Object of design phase seems to be worthwhile, and presents a base in order to check robustness Oriented Software Security Estimation even is feasible too. It has been a common of security. Life Cycle - Design Phase Perspective, practice of considering security and quality Several software measurement Journal of Software Engineering, 2008 after or before deployment of software, methods at system level and quality (available online). leading to an increase in time, budget and quantification methodologies are available in 4. Mcgraw, G. (2005): Knowledge for effort in rectify the flaws identified too late. literature. However, very little attention has software security, IEEE security and On the other hand, being most flexible been given towards security quantification. privacy, Vol.3, pp. 74-78. phase implementing security mechanism Most of the research work related to security 5. Beznosov, k.; Chess, B. (2008): at design phase, reduces the resources in quantification is focused on quantitative Security for the Rest of Us: An Industry terms of money, manpower and time. The estimation of security attributes at the final Perspective on the Secure-Software methodology proposed in this paper may stage of software. The proposed method Challenge, IEEE Software, Vol.25, pp. be used in design phase in order to get its presents systematic method to drive 10-12. optimal and best utilization. It is believed security estimation process. The work is 6. Jarzombek, j.; Goertzel, K.M.; Hamilton that security quantification of software in a step towards security estimation of the B. A. (2006): Security in the software life this phase will sure support to identify and software during development. Improving cycle, The journal of defense software mitigate risks, threats, and vulnerabilities. security through practical concern during engineering, Available at: http:// development of software will get more 6. Discussion www.stsc.hill.af.mil/Crosstalk/2006 interest from developers. Controlling and improving software /09/0609JarzombekGoertzel.html Quantitative estimation of security design security have been an important 7. Mcgraw, G. (2003): From the Ground at early stage will support to improve the issue in software security engineering. Up: The DIMACS Software Security internal architecture of software which Security estimate may heavily affect Workshop, IEEE security and privacy, influence internal security attributes. A set security of software. The analysis of security Vol.1, pp. 59-66. of check is suggested for every step of the parameters and their impact on security 8. Liu, M.Y. (2008): Quantitative methodology in order to verify and make will ease up to uncover the strengths and Security Analysis for Service-Oriented successive measures. It will help to ensure weaknesses of software and provide the base Software Architectures, Ph D. Thesis, the consistency and completeness of the for carrying out cost and benefit analysis Department of Electrical and Computer results. Experimental validation of the [19]. The paper introduces fundamental Engineering, University of Victoria. proposed methodology will be the next step. concepts of software security that may be 9. Schumacher, M.; Roedig, U. (2001): These experiments should provide better required for quantitative estimation. Brief Security Engineering with Patterns, In: understanding of the behavior of software description on its goals, challenges, and Proceedings of 8th Annual Conference from security point of view. It may help to needs have been discussed earlier. Some on The Pattern Languages of Programs, change in software architecture in order to important facts that may help to understand PLoP 2001, 27 july 2001. Available at: improve security. the software architecture and to improve http://www.uml.org.cn/sjms/pdf/ software security have been presented. A 7 Conclusion PLoP2001_mschumacher0_1.pdf brief overview on design and development Security is now becoming foremost 10. Mercuri, R. T. (2003): Analyzing

CSI COMMUNICATIONS | AUGUST 2010 20 security costs, Communications of the 533. Available at: http://citeseer.ist. 240. Available at: http://reports- ACM 46, Vol. 46, pp.15–18. psu.edu/wang97framework.html archive.adm.cs.cmu.edu/anon/anon/ 11. Neubauer, T.; Klemen, M.; Biffl, S. 16. Vaughn, R. B. (2001): Are Measures usr/ftp/2003/CMU-CS-03-132.pdf (2006): Secure Business Process and Metrics for Trusted Information 21. Agrawal A.; Khan, R A (2008): Management: A Roadmap, In: Systems Possible?, Workshop on Software Security Process- Proceedings of the First International Information Security System Scoring Development Life Cycle Perspective, Conference on Availability, Reliability and Ranking, Williamsburg, VA, USA, CSI communications, August 2008, and Security (ARES’06), IEEE, pp. 457- May 21-23. pp.39-42. 464. 17. Scandariato, R.; Win, B. D.; Distrinet, 22. Roche, J.; Jackson, M.; M. Shepperd 12. Marinescu R.; Ratiu, D. (2004): W. J. (2006): Towards a Measuring Quantifying the Quality of Object- Framework For Security Properties (1994): Software measurement Oriented Design: The Factor-Strategy of Software, In: Proceedings of the methods: an evaluation and Model, In: Proceedings of 11th Working 2nd ACM workshop on Quality of perspective, In: Proceedings of Third Conference on Reverse Engineering Protection, pp. 27 – 30. symposium on assessment of Quality (WCRE 2004), IEEE. pp. 192-201. 18. Savola, R. (2007): Towards a Security Software Development Tools, 7-9 Jun 13. Savola, R.; Holappa, J. (2005): Self- Metrics Taxonomy for the Information 1994, Washington, DC, USA, pp. 50- Measurement of the Information and Communication Technology, 69. Security Level in a Monitoring System International Conference on Software 23. Liu, M.Y.; Traor´e, I. (2007): Properties Based on Mobile Ad Hoc Networks, Engineering Advances (ICSEA 2007), for Security Measures of Software In: IEEE International Workshop on IEEE, August 2007. pp. 60-60. Product, Applied Mathematics & Measurement Systems for Homeland 19. Madan, B.B.; Popstojanova, K.G.; Information Sciences, Vol.1, pp.129- Security, Contraband Detection and Vaidyanathan K.; Trivedi, K.S. (2002): 156. Personal Safety, , IMS 2005, FL, USA, Modeling and Quantification of Security 24. Yacoub, S. M.; Ammar, H. H.; Robinson 29-30 March 2005, pp. 42-49. Attributes of Software Systems, In: T. (1999): Dynamic Metrics for Object 14. Peterson, G. (2004): Collaboration in Proceedings of the International Oriented Designs, In: Proceedings of a secure development process, part Conference on Dependable Systems 1, Information Security bulletin, June and Networks (DSN’02), IEEE, pp. the 6th International Symposium on 2004, vol. 9, pp 165-172. 505-514. Software Metrics, pp.50 -61. 15. Wang, C.; Wulf, W. A. (1997): A 20. Butler, S. A. (2002): Security 25. Mei, H.; Xie, T.; Yang, F. (2002): A Framework for Security Measurement, attribute evaluation method: a cost- Model-based Approach to Object- In: Proceedings of National Information benefit approach, In: Proceedings of Oriented Software Metrics, Journal Systems Security Conference, International Conference on Software of Computer Science and Technology, Baltimore, MD, Oct. 1997, pp. 522- Engineering, ICSE 2002. IEEE, pp.232- Vol.17, November 2002, pp:757 – 769.

CSI COMMUNICATIONS | AUGUST 2010 21 SPECIAL SPONSORED FEATURE

GPU Computing - Interview with Mr. Shankar Trivedi Vice President, Worldwide PSG Sales, NVIDIA Corporation

Manish Bali

Sales Director, Professional Solutions Business - India. NVIDIA Corporation, 322 Mhatre Pen Building, B-Wing, Senapati Bapat Road, Dadar (W), Mumbai – 400 028, India. E-mail: [email protected]. http://www.nvidia.in

1. Why is the GPU Architecture Codenamed second) “Fermi”? 3. Is GPU technology meant to replace Actually, all of NVIDIA’s current and future GPU conventional CPU technology for HPC over a architecture codenames are based on famous scientists period of time? If so why? if not, why not? who did incredible ground-breaking work. Enrico Fermi was As parallel processors, GPUs excel at tackling particularly known for his work on the development of the large amounts of similar data because the problem first nuclear reactor, but also contributed greatly to fields can be split into hundreds or thousands of pieces and such as quantum theory, particle physics and statistical calculated simultaneously. As sequential or serial mechanics– areas where NVIDIA Tesla GPUs, based on the processors, CPUs are not designed for this type of Fermi architecture, are having an impact today. computation, but they are adept at more serial based 2. What are the key innovations in the GPU tasks such as running operating systems, organizing Architecture? Will Moore’s Law hold good for data. NVIDIA believes in the concept of ‘Hybrid GPU technology also? Computing’ or ‘Co-processing’ where GPUs and CPUs work together, applying the most relevant processor to As the foundation for NVIDIA’s entire family of the specific task in hand. next generation GPUs, “Fermi” features a host of new technologies that are “must-have” features for the 4. Traditionally, the functionality of GPU was very computing space, including: limited – advance graphics accelerator. How ƒƒ C++, complementing existing support for C, does CUDA improve the functionality? Fortran, Java, Python, OpenCL and DirectCompute. In 2006, NVIDIA introduced the CUDA parallel ƒƒ ECC, a critical requirement for datacenters and computing architecture. Unlike earlier attempts supercomputing centers deploying GPUs on a to use the GPU for general purpose computation, large scale which involved the need to “translate” computational ƒƒ 7x the peak double precision arithmetic problems into graphics languages that GPUs could performance over NVIDIA’s last generation GPU. understand, CUDA enabled the programming of GPUs Double precision is critical for high-performance in industry standard C. This was a very significant computing (HPC) applications such as linear change for developers as it opened up the GPU to a algebra, numerical simulation, and quantum much larger community who could now leverage the chemistry parallel architecture of GPUs with languages and tools ƒƒ NVIDIA Parallel DataCache - the world’s first that were much more familiar to them. true cache hierarchy in a GPU that speeds up With millions of CUDA-enabled GPUs sold to algorithms such as physics solvers, raytracing, date, software developers, scientists and researchers and sparse matrix multiplication where data from a broad range of fields, including image and video addresses are not known beforehand processing, computational biology and chemistry, fluid NVIDIA has always been ahead of the curve with dynamics simulation, CT image reconstruction, seismic regards to Moore’s Law as our GPUs typically increase by analysis, and much more, can get transformative more than 2X within 12-18 months. This is not true of CPUs performance increases in their work and applications. that are today hitting both the memory and speed wall 5. Please share breakthrough results with GPU and are no longer scaling in performance in line with the Computing in Bio-Technology, Drug Discovery escalating demands being placed on them. GPUs offer one and Medical Imaging. of the only viable paths today to reach exascale computing In the area of Medical Imaging, many healthcare (systems capable of 1 million trillion calculations per equipment manufacturers are leveraging GPUs and

CSI COMMUNICATIONS | AUGUST 2010 22 CUDA to provide patients with accurate 7. What are the features of the certified status. This is wonderful news results, faster, in fields such as CT, MRI, programming support environment on for companies looking to move to GPU Surgery, radiation therapy, etc. This TESLA? Computing as they will soon have a pool of technology is also helping to administer The below image provides a high level highly qualified programmers to pull from. lower radiation dosages for patients, overview of the CUDA hardware/software 9. What is the scope of GPU Computing thereby reducing their exposure to harmful environment. in Indian Academia and R&D Labs? side-effects NVIDIA GPUs are the only language/ Extensive. The CUDA programming For more details visit http://www. API agnostic GPUs available today, with model is being taught at more than 350 nvidia.com/object/medical_imaging.html support for C/C++, OpenCL, DirectCompute, universities worldwide. In India, CUDA is or please read the attached story about Fortran and other standards. being taught at IIT in Powai, Delhi, Kanpur, TechniScan Medical Systems for one such For more detailed information on the Roorkee, Madras, the Delhi Institute of example. NVIDIA CUDA programming environment, Technology and many more. please go to http://developer.nvidia.com/ 10. Are you planning any Faculty Training 6. Please name a few of your top rung object/gpucomputing.html customers and the applications they Programmes in India? If yes, are running on TESLA? 8. What will be the efforts required by We have a very strong academic relations program in the country. We Possibly our most notable customer the users to migrate their applications ( in-house codes, community codes frequently conduct CUDA workshops at to date is the Shenzhen Supercomputing and ISV codes) from CPUs to GPUs? various Universities and top rung Educational Center in China. Their new “Nebulae” The largest challenge in migrating Institutes like IITs, NIT’s etc. And the Faculty supercomputer, built by Dawning, recently legacy code is thinking about the problem, plays a big part in this initiative. We currently entered the Supercomputing Top500 at which has historically been done in serial, in have 75+ Professor partnerships, 15 CUDA the #2 position. The system will be used parallel. Once you have figured this out, then labs and 10 Institutes where CUDA is being for a wide range of scientific research CUDA enables you to use familiar industry taught in India. applications, uses 4640 NVIDIA Fermi standard languages to program it, making 11. Please indicate a price range. GPUs and delivers 1.27 Petaflops of the transition relatively simple. We carry 3 series of products based on sustained performance. What is even more Massachusetts Institute of Technology Tesla 20-series GPUs: impressive is that the system consumes just (MIT) did some research into this and ¬¬ Tesla C-Series – workstation-class PCI- 2.55 Megawatts, making it the most power compared the development time required Express boards efficient Supercomputer on the Top500 list, against the performance numbers achieved. ¬¬ Tesla S-series – datacenter-class 1U as compared to the #1 Jaguar system that They concluded that GPUs were no harder system solutions delivers 1.75 Petaflops but uses 7 Megawatts to program than CPUs but delivered more ¬¬ Tesla M-Series – a passively cooled power. So, GPUs enable Nebulae to be twice than 10 times the performance. module for OEM design into hybrid 1U as power-efficient. As an example, ISRO Dept. of Space systems (containing GPUs and CPUs) Other customers that have spoken was able to port a large and complex CFD The C1060, 4GB costs US $1299, publically about their use of GPUs include code onto GPU’s in just 4 months. the C2050, 3GB costs US $ 2500 and Bloomberg, Siemens Medical, BAE Systems, NVIDIA has a large team internally the S2050, 12GB costs US $ 12,062 FOB Hess, Beckman-Coulter, BNP Paribas, ffA and many consultants externally to help Taiwan/HK basis from our Distributor and and many more-Closer to home ISRO, Dept. customers in this effort and we are also are all available now of Space built a 200-node cluster with 400 launching a new certification program The C2070, 6GB and S2070, 24GB are Fermi GPU’s for CFD applications that will give trained developers officially slated for delivery in Oct 2010 timeframes

CSI COMMUNICATIONS | AUGUST 2010 23 SPECIAL SPONSORED FEATURE

HP Technology@Work 2010 – Interview with Mr. Prakash Krishnamoorthy

Country Manager, HP StorageWorks. Hewlett-Packard India Sales Pvt. Ltd., 24, Salarpuria Arena, Adugodi, Hosur Road, Bangalore - 560 030. E-mail: [email protected]

1. What is the HP’s Vision for the Data Centers of HP recently launched StoreOnce, which is a the Future? new generation of data deduplication software that The rapid growth of information and the constant can be deployed at multiple points in a converged fluctuations of business demand are two dynamic infrastructure, reducing the number of times data has forces that are shaping the future of storage and to be deduplicated and enabling customers to more data centre. To evolve to a technology that is elastic, efficiently manage and control data growth. a new approach for deploying servers, storage and Traditional data deduplication is inefficient as it networking needs to be adopted, one that does not requires multiple products and processes depending on create individual technology silos, but that integrates application, workload, network protocol and data type. resources into a more flexible and responsive state. Often, data is duplicated and deduplicated multiple Convergence of Infrastructure along with storage times during its life cycle. HP is the first company virtualization will be two key trends that will define the to eliminate this complexity with a single, unified future. architecture for deduplication called HP StoreOnce. Data centers of the future will align facility design By eliminating the complexity of multiple with business priorities which will save customers deduplication processes and products, HP StoreOnce millions in capital and operating costs. Multi-tiered provides improved productivity and data management hybrid design will play an important role in data centers efficiency. It also is higher performing than competitive as they deliver improved operations and energy offerings, showing up to 20 percent improvement in efficiency. This design approach also accelerates the performance for inline data deduplication. As a result, adoption of next-generation data center technologies customers can spend up to 95 percent less on storage and services. capacity, which can be reinvested in new IT projects to The design enables organizations to easily adapt drive organization innovation. data centers tiers for changing technology needs throughout the life of a facility. 3. What are the core products and technologies that make the HP Converged Infrastructure 2. What is special about HP Deduplication Engine? Strategy? Adoption of data deduplication is still at an early HP recently announced industry firsts in server, stage, but we can see interest especially from SMBs storage, network and power management technologies and growing business to implement these solutions to enable clients to shift millions of dollars in operational as a way of reducing costs. Most of the enterprises in costs to activities that drive business innovation. The India still have not deployed de-duplication, as more introductions include the HP BladeSystem, several enterprises reap the benefits of de-duplication and new servers as well as innovations in HP Virtual the gap it bridges with information management, the Connect and HP BladeSystem Matrix, HP Intelligent primary issue will become management of storage Power Discovery. HP BladeSystem Matrix software, resources. through new integration with HP Server Automation, HP provides two distinct methods of data simplifies IT environments with one-touch, self-service deduplication to address the demands of customers of provisioning of applications. HP BladeSystem Matrix different sizes. For small and midsize customers, HP has enables private clouds by allowing clients to deploy integrated this functionality into the HP StorageWorks complex IT environments in minutes. As a result, D2D Backup Systems. For enterprise customers, HP clients can reduce their total cost of ownership up to offers deduplication with the HP StorageWorks Virtual 56 percent compared to traditional IT infrastructures. Library Systems. HP Intelligent Power Discovery is advancement

CSI COMMUNICATIONS | AUGUST 2010 24 for green data centres that create an 5. Please name a few of your top rung company decided to implement SAP ERP on automated, energy-aware network between customers who migrated to HP Data DB2 and standardized on the HP platform. HP ProLiant servers, third-party facility Storage technologies. For business continuity, CFCL is using a HP management tools and data centre power Eveready Industries India Ltd, one of EVA 8000 SAN solution to consolidate grids. India’s most reputed FMCG companies, was its storage resources. To back up data, it witnessing some good growth in its business; employs the HP MSL6030 tape library. 4. What is the core HP Technologies for however the IT infrastructure was unable to Comprehensive Data Protection? take the increased load reducing response 6. What are the plans of HP for HP is also expanding its Linear Tape times. HP provided the latest ProLiant “Academic Associations” in India? Open (LTO) technology portfolio with AMD servers and EVA 4400Tiered Storage Academic institutions play a very key the upgraded HP StorageWorks LTO-5 with a mix of Fibre Channel (FC) and Fibre part of the overall technology development Ultrium tape drives, which deliver improved Attached Technology Adapted (FATA) process and HP works with many of the data transfer speeds and management drives, which was able to offer very good capabilities. processing loads along with strong storage institutions in several ways. HP Labs, HP Available with the HP StorageWorks virtualization capabilities. Local replication Shared R and D, HP software, HP Networking MSL tape libraries, these new archive software, HP Business Copy EVA, protect - all these divisions have programs thru solutions enable businesses to better data so in the event of a service disruption, which they engage with the Academic manage information through enhanced recovery is quick and easy. institutions. And from the Product side of data protection, disaster recovery as well Ocher Studios, an India-based the organization we participate by way of as long-term data retention operations. As visual effects company, has deployed HP providing leadership products, platforms data grows and compliance and regulations StorageWorks MSA storage disk arrays to and infrastructure for the research programs tighten it is very important that we have enhance production processes of animated and students to further the cause of research the right infrastructure to provide data films and minimize service interruption. studies and technology advancements. protection and the right processes to Ocher Studios uses the HP StorageWorks Some of the most powerful compute provide business continuity. Investments 2000fc Modular Smart Array (MSA2000fc) clusters in the Academic community are in replication technology, investments to simplify the process of managing high- powered by HP Servers and Storage in clustering and cluster aware storage, end digital content. investments in backup and encryption will Chambal Fertilisers and Chemicals 7. Who are the other major players in Limited, (CFCL), the largest Urea provide the technology that customers can this field and how does HP plan to evaluate and deploy. The new launch of manufacturer in the private sector decided maintain its leadership over such the LTO GEN5 will help reduce the time to to standardize its business processes players? backup and the cost of backup. Disk based on mySAP ERP ECC, it wanted a solid backed and a combination of disk plus tape platform that could scale and ramp up its India is a large market for us and HP based backup would also be influencing business transactions with ease. To achieve continues to dominate this market with data protection design in the coming days. its business objectives and growth, the clear leadership across categories.

CSI COMMUNICATIONS | AUGUST 2010 25 CSI COMMUNICATIONS | AUGUST 2010 26 CSI COMMUNICATIONS | AUGUST 2010 27 CSI COMMUNICATIONS | AUGUST 2010 28 CSI COMMUNICATIONS | AUGUST 2010 29 INTERVIEW

‘The industry should step forward to help the academia’

Brian Pereira

[email protected]

The Computer Society of India (CSI) has been forward to help the academia. instrumental in guiding the IT industry on technical How many companies are going to colleges and innovation. CSI’s mission is to facilitate research, sharing what is happening in the industry? Vendors knowledge sharing, advanced learning and career like Cisco, Microsoft and others can provide faculty enhancement. enhancement or empowerment programs. We can CSI VP and President Elect M D Agrawal tells together create industry-specific courses for topics Brian Pereira about his vision and how he plans to such as software estimate, project management and revive this institution when he assumes the role of open source–at very nominal costs. president in nine months. My vision is to start a CSI Institute of Higher What’s the new objective of the CSI? Learning in Chennai. The other approaches are CSI was formed in 1965 with the objective of industry certifications, workshops, seminars and promoting the use of IT in business. We also want collaborations with international bodies like the British to create a knowledge society. CSI wants to focus on Computer Society, Singapore Computer Society, education/ knowledge and society. The community has Australian Computer Society, IEEE, BMI, ACM, C-DAC grown and is highly technical. So we have to consider and others. We’ll also consider a franchisee model and how to use technology to address the challenges faced work with third parties for workshops. In fact this is by society. Today we have 40,000 members and are already operational in Mumbai. expecting this count to reach 70,000 this year. We The research community is doing some excellent have 66 chapters. work, but how is this reaching your members? What platform will you use to disseminate and share We can bring the research community together information among CSI’s members and in society? and ask them to compile reports and create a We need to look at collaboration and networking knowledge base. This will then be accessible to our through seminars and conferences. One option is to members via our knowledge portal. Recently we did partner with institutions like IIT, C-DAC and even IT the IFIP Networking 2010 conference in Chennai. Four vendors. If you compare our conferences with those of months ago we organized India IT 2020. Through vendors you will observe that they are productfocused such conferences CSI is trying to identify emerging and linear. But we have what I call a ‘matrix focus.’ Our technologies and how our nation will benefit from conferences are multi-dimensional, addressing various these technologies and solutions. aspects of a technical topic. When you come to our CSI once had a research journal and we are trying conference you will find Google, Microsoft, IBM and to reintroduce it. There is a call for research papers on other vendors on the same platform. Over the course the CSI Knowledge Management Portal. Researchers of time, we have developed a certain loyalty among our can post abstracts of their work on this portal. members. To take this forward we will appoint research What is CSI doing to prepare students to work in the directors in different regions. We just appointed a industry? knowledge officer. If we are able to provide a good We will take a holistic approach to bring platform, I am sure many will come forward to the industry together and will announce contribute their research. A Special Interest Group an Industry Academy Interaction (SIG) is another way to promote research. And we Forum. The industry should step have started a number of SIGs.

CSI COMMUNICATIONS | AUGUST 2010 30 Conceptual Architecture View of System Architecture

CSI COMMUNICATIONS | AUGUST 2010 31 CSI COMMUNICATIONS | AUGUST 2010 32 CSI COMMUNICATIONS | AUGUST 2010 33 CALL FOR PARTICIPATION Workshop on Cloud Computing 18-20, Aug 2010 at IIT Madras, Chennai, India. http://www.csi-chennai.org/wcc/ Organised by CSI Div. IV (Communication), Chennai Chapter and SIG-Distributed Systems and IEEE Computer Society, Madras Chapter Supported by : Platinum Sponsors: Yahoo, Google, HP, Amazon, IBM, HCL, TCS, Hitachi Gold Sponsors: Novell, VMware, CSS Corp, Ramco, Cognizant About the Workshop: Consultants, Entrepreneurs venturing into setting up their Cloud Computing is the latest innovation that has brought businesses by offering cloud based applications, Academic Faculty computing power within reach of every organization. Cloud and Researchers. computing describes a new supplement, consumption and delivery Venue: IC & SR Auditorium, IIT Madras, Chennai model for IT services over the Internet and offers the computing Dates & Timings: 18 – 20, Aug 2010 :: 09.30 to 17.30 hrs processing power, storage, network bandwidth, software usage, Takeaways: Apart from the opportunity to hear the technical software development, testing, security, identity etc., as services. presentations from the Industry leaders in Cloud Computing, This model offers unprecedented scalability wherein the user can each delegate will be provided with the following five items. add resources on demand and give them up when not needed, • Workshop Kit instead of the classical model of over-investing in infrastructure • Presentations along with white papers, user case studies, and managing at a huge cost; tremendous cost-effectiveness success stories on a CD (subject to the IPR guidelines by the by providing a “pay per use” model and ensures professional resource persons and their organizations) management of the infrastructure. This three day workshop on • AWS coupon worth USD 25 to try out Amazon Web Cloud Computing, organized by the Computer Society of India and Services IEEE Computer Society, provides a platform in which experts from • A hardcopy of the best selling book “Cloud Computing: top notch organizations that are rewriting computing history such A Practical Approach” by Anthony T. Velte, Toby J. Velte as Yahoo, Google, HP, IBM, Amazon, HCL, TCS, Hitachi, VMware, and Robert C. Elsenpeter, published by TMH and priced at Novell, CSS Corp, Ramco and Cognizant will share their experiences Rs.475/- or a standard book on Cloud Computing for reference apart from introducing various aspects of cloud computing. Some • Certificate of Participation of the typical sessions would include Virtualization and its effect Programme Fee: With the generous sponsorship from the on cloud; Yahoo’s Hadoop framework for cloud application organizations, we are able to offer subsidized fee for this THREE development; Google applications on cloud; Amazon’s EC2 and S3 days event with a no. of takeaways listed above. services; Storage as a Service; Cloud infrastructure and services • Industry Delegates: Rs. 1500 offerings; Open source stack for cloud computing and identity • Members of CSI, IEEE: Rs. 1250 services; Best practices, migration strategies, management & • Academic Faculty & Researchers: Rs. 1250 security issues for cloud applications. With a session on “Research • Student Members of CSI & IEEE: Rs. 1000 Trends in Cloud Computing” and a panel discussion on “Are we (Note: Students should attach a copy of the membership card and Ready for Cloud Computing” along with a few user experience a certificate from the HOD / Principal along with registration form sharing sessions, this workshop would offer the participants, the and payment. Right of acceptance is reserved based on the flow of best opportunity to get a first hand knowledge by hearing “from registrations.) the horse’s mouth”, the specifics of the emerging area of cloud Registration: Registration will be done on First Come First Served computing. basis. As seats are limited, early registration is recommended. Target Audience: DD/Cheque to be drawn in favour of “CSI Chennai Chapter” The workshop is designed to appeal to a wide variety of and payable at Chennai. Pl. mail your registration form with the participants and include: payment on or before 5th Aug 2010 to: CEOs, CIOs, CTOs, IT & Functional heads of corporate enterprises and SME organizations from all verticals such Mr. S. Ramasamy manufacturing, retail, healthcare, BFSI, telecom, hospitality, C/o Integrated Databases India Ltd. education, e-Governance etc., Project Managers, Application Rosy Towers, 3rd Floor, 7, Nungambakkam High Road, Developers from IT/ITES organizations, IT & Business Strategy Chennai – 600034 For registration related information, please contact Mr. S. Ramasamy, Mobile: +91 98400 09417 :: Email: [email protected] OR Mr. K. Adhivarahan, Mobile: +91 94442 75315 :: Email: [email protected] Website: http://www.csi-chennai.org/wcc/index.html For further assistance, please contact Mr. G. Ramesh Dr. D. Janakiram Dr. P. Sakthivel Mr. H. R. Mohan Chairman Chairman Chairman Chairman Programme SIG-DS CSI Chennai CSI Div IV & IEEE CS gopalaswamy_ramesh @yahoo.com [email protected] [email protected] [email protected]

CSI COMMUNICATIONS | AUGUST 2010 34 CALL FOR PAPERS

DWDM2010 Second National Conference on Data Warehouse, Data Mining and Data Modeling September 24-25, 2010 at Thapar University, Patiala

Organized by : SMCA, Thapar University, Patiala, Punjab, India and Computer Society of India (CSI) - Region I

About the Conference: Data Warehousing and Data Mining has been widely accepted as a key technology for enterprises and organizations to improve their abilities in data analysis, decision support, and the automatic extraction of knowledge from data. With the exponentially growing amount of information to be included in the decision making process, the data to be considered becomes more and more complex in both structure and semantics. New developments such as cloud computing add to the challenges with massive scaling, a new computing infrastructure, and new types of data. Consequently, the process of retrieval and knowledge discovery from this huge amount of heterogeneous complex data builds the litmus-test for the research in the area. With this view, first National Conference on Data Warehousing, Data Mining and Data modeling (DWDM 2008) was organized by CSI Dehradun Chapter and Forest Research Institute University, Dehradun during February 9-10, 2008. DWDM 2010 seeks to introduce innovative principles, methods, algorithms and solutions to challenging problems being faced in the development of data warehousing, knowledge discovery, data mining applications, and the emerging area of “cloud intelligence”. Submissions presenting current research work on both theoretical and practical aspects of data warehousing and knowledge discovery are encouraged. Particularly, we strongly welcome submissions dealing with emerging real world applications such as real-time data warehousing, analysis of spatial and spatiotemporal data, OLAP mining, mobile OLAP, and mining science data (e.g. bioinformatics, geophysics).

Call for Papers: Authors are invited to submit research review and application papers representing original, previously unpublished work. Papers should be submitted in PDF or Word format. The paper length of six pages is encouraged and a upper limit of 10 pages, including figures, tables and references shall be enforced. Authors of the selected papers are expected to personally attend the conference and present the paper at their own cost. Correspondence and Important Dates: All correspondence including paper submission should be by email and to be addressed to 2010dwdm@gmail. com. For further details, please visit www.thapar.edu.

Full paper Submission Aug 01, 2010 Confirmation of paper acceptance Aug 20, 2010 Submission of camera ready copy Sep 01, 2010 Early Registration ends Aug 28, 2010 Conference period Sep 24-25, 2010

For further details, please contact:

Conveners Joint Secretaries Prof. S. S. Bhatia; email: [email protected] Dr. M. K. Sharma; email: [email protected] Dr. Harish Kumar; email: [email protected] Ms. Neelam Gulati; email: [email protected] Organizing Secretary Ms. Sanmeet Kaur; email: [email protected] Prof. R. K. Sharma; email: [email protected]

CSI COMMUNICATIONS | AUGUST 2010 35 CALL FOR PARTICIPATIONPAPER CSI 2010 – 45th Annual National Convention The iGen –Technologies for the Next Decade 25th to 27th November 2010 Hotel Taj Lands End, Mumbai

The Computer Society of India (CSI) will be heralding this new decade of transformation by organizing its 45th Annual National Convention around emerging technologies, hosted by Mumbai Chapter. Christened The iGen, the convention, following CSI’s key mission to prepare the technology community in India for the future, will share insights with the participating delegates through iTech - six technology focused tracks; Future.Connect – sessions that focus on the foundation for the future; and CSI Awards – to honor exemplary contribution to the technology community in India.

Tech Tracks Future.Connect Tracks • Architecture Workshop.Connect • Outsource • Governance Risk & Compliance • Media • Building applications for the Cloud • Enterprise • Balance Scorecard – The Business Imperative • Solution • Software Lifecycle Management for the Next Decade • Connect

CSI Awards Education-Research. Connect • The National IT Award Student. Connect • Young IT Professional Awards • CSI-Nihilent e-Governance Award e-Governance. Connect

Call for Papers We invite researchers and practioners to submit technical papers describing original ideas, interesting results and/or quantified system experiences. This is open for contributions from professionals in India and abroad. Topics of interest include, but are not limited to, the following Themes: • Technology for Human Use • Technology for Participatory Citizenship • Technology for Communities • Technology for New Learning • Technology for Common Knowledge • Technology for Development Important Dates: Last date for Submission : 15th August 2010 Notification of Paper Acceptance : 30th August 2010 Email ID / link for submission : http://csi-2010.org/csi2010ocs/index.php/csi2010/CSI2010/login CSI2010>author Link for technical details: Referencing should be done according to the Harvard System which is available from the website: http://www.tvu.ac.uk/lrs/guides/harvard.html>

Please visit event website www.csi-2010.org for more details.

Suggestions for speakers & interest in sponsorships are welcome

Rajiv Gerela Dr.Vishnu Kanhere Chairman – Organizing Committee Host Chapter Chairman

CSI COMMUNICATIONS | AUGUST 2010 36 CALL FOR PAPERS

CSI COMMUNICATIONS | AUGUST 2010 37 SIG

Invitation for members to join new SIGs and research in this field is need of the hour. It gives me an immense pleasure to inform you that we at CSI Special Interest Group on Bioinformatics have decided to come up with seven new Self Interest Groups (SIGs). Convener- Dr. K R Pardasani The main objectives of these SIGs are to address various critical Bhopal, E-mail : [email protected] issues in the current scenario. Full details are available at CSI KM site at link http://www.csi-india.org/web/csi/383 . A SIG on Bioinformatics has been formed for promotion growth We would like to invite nomination from our members who and prosperity of bioinformatics in the country. It was launched/ are having relevant experience in the mentioned field and would like announced on 25th March2010 at SVNIT, Surat during the Inaugural to contribute in various activities of the respective SIG. Interested function of first IFIP International Conference on bioinformatics by members may submit their details to us ([email protected]) and the chief Guest of the Function Prof P Thrimurty, President of CSI. convener of the related SIG which are as follow: Dr K.R. Pardasani, Professor & Head, Department of Mathematics Future of Wireless Networks and Computer Applications, MANIT Bhopal is the Founder Chairman Convener - Dr. Dharam Singh and Dr Neeru Adlakha, Associate Professor, Applied Mathematics Udaipur, E-mail : [email protected] Department, SVNIT Bhopal is the Founder Secretary of the SIG. Technology for Social Science Research Wireless is the way of the future as the technology develops Convener- Prof. Bino Paul and transfer speeds increase, it looks increasingly likely that wireless Mumbai, E-mail : [email protected] will replace Ethernet in most home, education, rural areas and small business networks. This SIG intense to promote discussion on emerging challenges This SIG seeks to: Showcase and promote the use of wireless in organizaing and creating empirical knowledge for which IT tools communications in a broad range of markets including multimedia play a pivotal role. Considering the fact that transition economic like applications, rural development, education, consumer electronics, India is in need of creative knowledge management strategies with a enterprises, healthcare, industry and security. Explore new business clear focus on dismantling socio- economic data in a user- friendly and research opportunities for members in these technologies and manner to the society, insuring and inclusive data share. Scope of this their applications and share expertise on development issues of work covers popularization of open- source statistical programme wireless network standards. for fostering a knowledge society in addressing substantive issues Green IT relating to society. Convener- Mr. Himanshu Misra Web 2.0 and Social Networking Hyderabad, E-mail : [email protected] Convener- Mr. Hareesh Tibrewala Mumbai, E-mail : [email protected] A SIG on Green IT is an attempt to increase awareness, promote knowledge sharing and foster interaction between academia, industry Recognizing the growing importance of Social Networking and government around the role of IT in addressing challenges Sites, a SIG on “Web 2.0 and Social Networking Sites” has formed. associated with climate change. This will come under Division 1 Some of the objectives of this SIG will be to create awareness about (hardware) of CSI. the use of SNS by way of seminars, workshops and conferences This SIG will help drive awareness programs, offer venues for directed towards the end-user as well for corporate; collate best learning and information exchange and create forums/seminars for industry practices in creating and successfully using SNS platforms; interacting with thought leaders and industry practitioners. This SIG create awareness about technologies that can be used for setting will also be responsible for creating an annual publication with articles up SNS; address issues pertaining to privacy, security and identity and review papers from world-renowned technocrats. Students and management as well as researching on the long term impact of working professionals stand to gain from involvement in this SIG. social network sites on the social fabric of society across various communities. High Performance Cluster/ Grid Computing The details should contain following information - Convener- Mr Sushovan Saha 1) Name of Person Dehradun, E-mail : [email protected] 2) Location 3) Mobile Number Cluster computing has been attracting more and more attention 4) E mail ID from both the industrial and the academic world for its enormous 5) CSI membership number computing power and scalability. Beowulf type cluster, for example, 6) Academic Qualification is a typical High Performance Computing (HPC) cluster system. 7) Current position and Designation Availability, as a key attribute of the system, needs to be considered 8) Any contribution in the subject of SIG : (Such as published at the system design stage and monitored at mission time. Moreover, papers, seminar, workshop, conference, symposium etc) system monitoring is a must to help identify the defects and ensure 9) Objective for joining the respective SIG (Maximum four line) the system’s availability requirement. The decision of selection will be based on criteria set up by More and more complex application like weather forecasting, respective SIG convener. Disaster Management & Control System, Exploration of Minerals, Oil Last date for receipt of applications – 15th August, 2010 & Gas, Complex computation & analysis of new genetic materials are Note- SIG is a part of CSI divisions ever hungry for vast computational resources. To optimize in terms of S M Fahimuddin Pasha cost & efficiency, harnessing of High Performance Cluster Computing Assistant Manager, CSI is desired. To meet this objective, its time for collaborative learning CSI COMMUNICATIONS | JULY 2010 38

CSI COMMUNICATIONS | JULY 2010 40 CALL FOR PAPERS

ICRITO’2010 International Conference on Reliability, Infocom Technology and Optimization

(Trends and Future Directions) 4-6, November, 2010 at Faridabad, India Jointly Organized by : CSI Division II (Software), SIG-Data, Region VI and Nagpur Chapter Department of Computer Applications and Department of Information Technology, Lingaya’s University, Faridabad In Association with : CSI Delhi Chapter, Region – I

In this globally competitive environment, scientific analysis of system under study is the key issues in attaining market leadership. This competitive advantage through quality process, product and services in the market place is possible through the development of knowledge bases and easy access to structured databases on systems, processes and technology based on quantitative study. The Conference will not only take stock of trends and developments at the globally competitive environment, but will also provide future directions to researchers and practitioners.

Original papers are invited from research scholars, academicians, students and Industrialists. The topics of the Conference would include but not restricted to: Reliable and Secure Communications; Software Reliability and Testing; Infocom Systems Reliability; Power Systems Reliability; Reliability and Maintenance Models; Fault Tolerance in Hardware and Software systems; Free and Open Source Software; Natural Language Processing; Cloud Computing; Computer Architecture and Embedded Systems; Coding and Prototyping; Artificial Intelligence and Expert Systems; Data Mining & Data Warehousing; Network Technologies; Convergence Technologies; Information Security; Mobile Communications; Web Analytics; Advances on Computing Mechanisms; Software and Web Engineering; Soft Computing; Financial Optimization; Inventory Management; Fuzzy Systems; Supply Chain Management; Stochastic Petrinets; Risk Analysis; Infrastructure Systems Safety and Risk; Probabilistic Fracture Mechanism and Fatigue Analysis and Probabilistic Safety Assessment

Submissions: Submissions must be of original contributions and should not have been presented or published anywhere. Authors of the accepted papers must guarantee that at least one of the authors will attend the conference and present the paper. Paper should not exceed 10 pages following the IEEE format.

Important Dates Last date for receiving full paper September 30, 2010 E-mail notification of paper acceptance October 8, 2010 Last date for receiving camera-ready paper with modifications October 15, 2010 For Additional Details, please contact : Dr. Sunil Kumar Khatri Conference Secretary at [email protected] Phone: 0129-3064707, 9910206349(M), Website: www.lingayasuniversity.edu.in/icrito2010

CSI COMMUNICATIONS | AUGUST 2010 41 Timeline of Women in Computing [Excerpted from http://en.wikipedia.org/wiki/Women_in_computing]

• 1842: Ada Lovelace (1815–1852), analyst of Charles • 1985: Irma Wyman (~1927-), first Honeywell CIO Babbage’s analytical engine and described as the “first • 1986: Hannah Smith “Girlie tipster” for CRASH (magazine) computer programmer” • 1988: Eva Tardos (1957-), recipient of the Fulkerson Prize for • 1893: Henrietta Swan Leavitt joins the Harvard computers, a her research on design and analysis of algorithms group of women engaged in the production of astronomical • 1993: Shafi Goldwasser (1958-), theoretical computer data at Harvard; she is instrumental in discovery of the scientist, two-time recipient of the Gödel Prize for research cepheid variable stars, which were evidence for the on complexity theory, cryptography and computational expansion of the universe. number theory, and the invention of zero-knowledge proofs • 1942: Hedy Lamarr (1913–2000), Hollywood diva and co- • 1993: Barbara Liskov together with Jeannette Wing develops inventor of an early form of spread-spectrum broadcasting the Liskov substitution principle • 1943: WREN Colossus operators, during WW2 at Bletchley • 1994: Sally Floyd (~1953-), most renowned for her work on Park Transmission Control Protocol • 1946: Betty Jennings, Betty Snyder, Fran Bilas, Kay McNulty, • 1996: Xiaoyuan Tu (1967-), first female recipient of the Marlyn Wescoff, and Ruth Lichterman, original programmers ACM’s Doctoral Dissertation Award. of the ENIAC • 1997: Anita Borg (1949–2003), the founding director of the • 1949: Grace Hopper (1906–1992), first programmer for the Institute for Women and Technology (IWT) Mark I Calculator, known as the “Mother of COBOL” • 2004: Jeri Ellsworth (1974-), self-taught computer chip • 1962: Jean E. Sammet (1928-), mathematician and computer designer and creator of the C64 Direct-to-TV scientist; developed FORMAC programming language. Was • 2005: Mary Lou Jepsen (1965-), Founder and chief the first to write extensively about history and categorisation technology officer of One Laptop Per Child (OLPC) of programming languages (1969). • 2006: Frances E. Allen (1932-), first female recipient of the • 1965: Mary Allen Wilkes computer programmer; First person ACM’s Turing Award to use a computer in a private home and the first developer of Professor De Palma from Gonzaga University believes an operating system (LAP) for the first minicomputer (LINC) that more girls can be attracted into the study of computer • 1968: Barbara H. Liskov (1939-), first American female science by making it more like mathematics. He suggests five Doctorate of Computer Science (1968), winner of the Turing ways to improve the attraction of computer science to girls: prize 2009 1. Teach any girl with an aptitude for symbol manipulation • 1972: Karen Spärck Jones (1935–2007), pioneer of how to program. information retrieval and natural language processing 2. When teaching girls how to program, keep things • 1979: Carol Shaw (?), game designer and programmer for as close to pure logic as possible. Minimize reliance Atari Corp. and Activision on other clumsy software packages, fancy graphical • 1983: Adele Goldberg (1945-), one of the designers and interfaces, and powerful IDEs. developers of the Smalltalk language 3. Teach computing without microcomputers. • 1984: Roberta Williams (1953-), pioneering work in graphical Microcomputers tend to attract tinkering boys more adventure games for personal computers, particularly the than girls. King’s Quest series. 4. Keep the length of programming assignments as short • 1984: Susan Kare (1954-), created the icons and many of as possible, at least in the early stages. One aspect of the interface elements for the original Apple Macintosh in the mathematics discipline is that assignment problems the 1980s, was an original employee of NeXT, working as are hard enough to make a person think for a while, but the Creative Director. are not hard enough to get them frustrated and lose • 1985: Radia Perlman (1951-), invented the Spanning Tree interest in the problem. Protocol. Has done extensive and innovative research, 5. Treat a programming language as the notational system particularly on encryption and networking. USENIX Lifetime and avoid adopting new languages. Achievement Award 2007, among numerous others.

This article is licensed under the [GNU Free Documentation License] (http://www.gnu.org/copyleft/fdl.html).

It uses material from the Wikipedia article

Women in computing [http://en.wikipedia.org/wiki/Women_in_computing]

For more information please see: http://en.wikipedia.org/wiki/Wikipedia:Copyrights

CSI COMMUNICATIONS | AUGUST 2010 42 Coimbatore

ANITS

„„ BHOPAL • CIO Club Meet in association with Informatica, Singapore • Workshop on Business Analysis by Prof. Pradeep Pendse • Training on Project Management Planning by Prof.V.K.Garg • SPIN meeting on CMMI for Acquisitions • CSI exam for blind students at Victoria Memorial School Forthcoming activities in July 2010 • Workshop on Risk Management - ISO 31000: 2009 by Dr.Vishnu Kanhere • CSI Certificate course on Project Management as PMBOK Guide V.4 by Prof.V.K.Garg • Workshop on Best Practices in Document Management by Mr. BHOPAL : (Top) Dignitaries on the dais, (Bottom) Mr. Pradip N Jain, Chairman, Dilip Ganeriwal CSIAC, presenting the memento to Mr. Ram Rajput • Workshop on Datacenter Security By Mr. Ravikiran Mankikar • Certificate training on Peoplesoft by Mr. Bipin Pathare The Chapter organized a Young Talent Search in Computer • Workshop on MS Project 2007 by Dr. Mahendra Patel Programming Competition at Shree Bhavan’s Bharti Public School Bhopal on Sunday 25th July 2010.It was a first level Regional Forthcoming activities in August 2010 Competition. Five Schools from Indore, Bhopal and Gwalior • CIO Club Meet in association with Riverbed participated. They were from Choithram School 5, Manik Bagh • Training on Project Management Planning by Prof.V.K.Garg Road Indore, Rama Krishna Vidha Mandir RamakrishnaPuri Thatipur • Workshop on Used Cases by Prof.Chari Gwalior, Jawaharlal Nehru School Habibganj, BHEL Bhopal and • Training on Technical Writing by Mr.Shivram Iyer Shree Bhavan’s Bharti 46/2, Kerwa Dem Road Near Sakshi Dhaba • Training on ASP.Net by Mr.Bipin Pathare Bhopal participated Three students from each school took part in • Workshop on Datacenter Security By Mr. Ravikiran Mankikar the competition .The topic of the competition was C++, C and Java • Certificate training on Peoplesoft by Mr. Bipin Pathare .These kinds of Competitions are very helpful in building the future of • Workshop on MS Project 2007 by Dr. Mahendra Patel the students in the field of computers. The chapter organized one-day training on Documenting S/W „„ MUMBAI Requirements Using IEEE Standards 830-1998 on 25th March. 2010 at the chapter office. The training was conducted by Prof. V K Garg. The training helped the participants understand the concepts related with software requirement. Prof. Garg also gave a case study to thoroughly understand IEEE Standards 830-1998. The training also helped the participants to know how to prepare a good SRS The program was successful and was a value addition to the participants.

The chapter conducted four-day certification course on Project Management 4.0 from 22nd to 25th April 2010 at the chapter office. The training helped the participants learn the Fundamentals of project management skills, concepts and techniques, Identity stakeholder needs requirements and document project scope, Develop work breakdown structures, Document project management plan, Estimate project cost and schedule, Understand dynamics of project Mumbai : CIO Club Meet with Informatica management including HR and communication aspects of effective team building & management and Establish a dependable project The Chapter organised activities in June 2010 monitoring and control system. • CIO Club Meet in association with BCM

CSI COMMUNICATIONS | AUGUST 2010 43 The chapter organised a one-day seminar on Computer Requirements, Solution Visualisation & using Use Cases etc, Forensics on 27th April. 2010 at Hotel Tunga International, Andheri Considerations for interface Design – HCI concepts & Managing East, Mumbai. The speaker Dr. Vishnu Kanhere explained the Customer Needs and Expectations basics of Computer Forensics. Dr Kanhere aptly covered Forensics The workshop was well attended & helped the participants learn Investigation in different Operating systems. Dr. Kanhere also the Fundamentals of Business Analysis in an in-depth manner. showed a Demo of the Forensics Tools - EncaseTM and others. The chapter conducted four-day certification course on Project The seminar was very successful and well attended by Management 4.0 from 24th to 27th June 2010 at the chapter office. professionals from various facets of IT domain. The training helped the participants learn the Fundamentals of project The workshop was useful for both new practitioners and management skills, concepts and techniques, Identity stakeholder students to learn the basics as well as for seasoned experts to pick needs requirements and document project scope, Develop work up new insights and tips into computer forensics, incident response breakdown structures, Document project management plan, and investigations. Estimate project cost and schedule, Understand dynamics of project management including HR and communication aspects of effective The chapter organized one-day training on Developing and team building & management and Establish a dependable project Writing structured Use Cases on 27th April. 2010 at Hotel Suncity monitoring and control system. Residency, Andheri East, Mumbai. The workshop was conducted by Prof. V K Garg. The workshop gave the participants hands on „„ TIRUCHIRAPALLI understanding on skills in developing and writing usecases for variety A computer network is simply interconnection of computers. of software applications.The workshop also helped the participants Internet is a network of networks. Network security comprises gain an in depth understanding of use case methodology and to of provisions made in computer network infrastructure, policies estimate software development effotrts using Use Cases. adopted by the network administrator to protect the network from The program was successful and was a value addition to the unauthorized access and consistent and continuous monitoring & participants. measurement of its effectiveness. There are various security attacks in a network and solutions to come out of it. CSI Mumbai Chapter along with Informatica organized a CIO Club Meet in association with Informatica on 10th June ‘10 at Common Security attacks and their Counter Measures Intercontinental Marine Drive in Mumbai, to create awareness about • Finding a way into the network - Firewalls the criticality of trustworthy data & its timely availability for effective • Exploiting software bugs, buffer overflows - Intrusion Detection implementation. The Program was attended by about 100 IT heads/ Systems CIOs • Denial of Service - Ingress filtering The meet started with Dr.Vishnu Kanhere, Chairman, CSI • TCP hijacking - Encryption Mumbai Chapter, welcoming the delegates. The introduction • Packet sniffing - Encryption was given by Mr. M D Agrawal, Vice President, CSI. Ms.Suganthi Shivkumar, M.D., Informatica, gave an overview about the organization and its products & services. Key Note address was given by Mr. Girish Pancha, Executive Vice President, Informatica, who gave an insight on various data integration issues. Mr. Maulik Desai, Sr. Manager – System Development, Asian Paints shared the success story on “Informatica Paints a Colorful Picture at Asian Paints”. It was quite an interactive session where Maulik described how they managed 4000 + sku’s data. A very engrossing & informative panel discussion was held on “A Strategic Approach towards Achieving Trusted Data for Your Enterprise”. The session was chaired by Mr. Ravi Eppaturi, Vice TRICHY : The Speaker Ms. Sheba Selvam is delivering the lecture on “Recent Chairman Elect, CSI Mumbai Chapter. The eminent panelist were Trends in Network Security”. Mr. Munish Mittal, VP, IT, HDFC bank, Ms. Chhaya Pisupati, Senior VP & Head, ICICI Prudential Life Insurance Co. Ltd., Mr. Manoj Network security starts from authenticating the user commonly Chandiramani, Ex CIO, MF Global & Mr. Sanjeev Kumar, VP & MD, with a user name and a password. After authentication the user is R&D, Informatica. authorized with the right job for access. Integrity is maintained by protecting the user from unauthorized modifications to the data. The chapter conducted two-day workshop on Business Analysis The confidentiality is maintained by protecting the information from on 18th & 19th June 2010 at the chapter office. The workshop was being disclosed to unauthorized users. This data when needed by the conducted by Prof.Praddep Pendse, Dean – IT, Wellingkar Institute authorized user should be made available, which ensures availability. of Management. It provided a techno-behavioral perspective on the Lastly the user performing the action should not deny later that the above topics & adequate opportunity for experiencing some of these transaction was not performed by him. This is ensured by non – area by way of case studies and simulations. repudiation. The workshop gave an overview of Business Analysis and Recently in network security, authentication is ensured by reference to standard frameworks such as Zachmann and the combination of username/password and biometric techniques International Institute of Business Analysts (IIBA), Software Life (palm, iris, face region analysis etc). Confidentiality is ensured Cycles & Issues in IT Projects /Lifecycles, Role of a BA in articulating by various cryptographic techniques. One is symmetric key Project Goal/Vision –Understanding the client’s perspective, cryptography and the other is asymmetric key cryptography. In Stakeholder Analysis, Risks in Projects, Analysing Client’s IT symmetric key cryptography a single key called secret key is used Strategy - Aligning Project to company’s IT strategy, Determining for encryption. In asymmetric key cryptography each participant has

CSI COMMUNICATIONS | AUGUST 2010 44 two keys, one called public key and one called the private key (which – Reviving and updating your plan. the owner keeps secret). The sender sends the message encrypting • Broad areas of financial planning : using receiver’s public key and the receiver decrypts using receiver’s – Cash Flow Management. private key. DES (Data Encryption Standard) and RSA algorithms – Life Insurance. are used to ensure confidentiality. Non – repudiation is ensured by – Asset Allocation. DSA (Digital signature algorithm) . A malicious user could conduct – Investment Planning. a financial transaction with some entity, digitally sign the transaction – Retirement Planning. for payment and then later claim that his private key had been stolen – Taxation. before the transaction occurred. To limit this risk, a trusted Time – Estate Planning. Stamp Authority (TSA) would attest to the fact that a transaction • Who Requires Financial Planning : took place at certain time by attaching a digitally signed time record It is useful to everyone. Very few can consider themselves too to the original signature. rich to engage in financial planning. Wireless network security deals with providing secure access There are many instances of highly paid employees who came to Wi-Fi. It is a class of Wireless Local Area Network (WLAN), to financial grief merely because they did not plan for their post– which can connect to the internet when within range of wireless career years. network connected to the internet. Authentication and encryption Similarly people earning small amount of income should under are the two security mechanisms in wireless network. Wi – Fi has take this process, as it will help them in prioritizing their goals so that adopted Wi – Fi Protected Access (WPA) to WLAN hardware. WPA their limited income can be used more efficiently and effectively. strongly increases the level of data protection and access control. About 50 members participated & got benefitted from the Authentication is achieved by 3 ways, shared secrets (username/ lecture. password), certificates and SIM cards. Encryption is achieved by 2 Er P. Kothandaraman, Past Hon. Secretary IEI-TLC welcomed ways, weak key avoidance and key rotation mechanism. Extensible the gathering. Authentication Protocol (EAP) is used in wireless network security, Er K Ramadoss, Senior most member of IEI-TLC & former GM/ which periodically transports new encryption keys (session key) to BHEL/Tiruchirapalli introduced the speaker to the audience the station. Er D. Harsha, Past Chairman & Mr. N Kuppusamy, Secretary, About 50 Members Participated & got Benefitted from the CSI, Tiruchirapalli Chapter presented the momento on behalf of the lecture. participating Institutions. Er J Sankaran, Hon.Secretary IEI –TLC welcomed the gathering. Er. R. Selvaraj, Immd. Past Secretary, CSI Tiruchirapalli Chapter Er K Ramadoss,Senior most member of IEI-TLC & former GM/ proposed the vote of thanks. BHEL/Tiruchirapalli introduced the speaker to the audience & presented the momento on behalf of the participating Institutions. Er R Selvaraj, Immd. Past Secretary, CSI Tiruchirapalli Chapter Proposed the vote of thanks. STUDENTBranches „„ ALWAR INST. OF ENGG. AND TECH., ALWAR „„ (RAJASTHAN)

Tiruchirapalli : The Speaker Mr. Mahmood Sheriff, is delivering the lecture on “Financial Planning for the Serving & Retired Personnel”. ANITS, Visakhapatnam : Seminar on “Microcontroller Programming made easy and Robotics” given by esteemed speaker. Mr. Jayasurya Dutt M. Financial Planning is the process of Meeting your Life Goals through the Proper Management of your finances. It was a historical day for the Alwar Institute of Engineering It involves the process of assessing your financial situation, & Technology, Alwar (Rajasthan) when this Institute organized a Determining your objectives and formulating plan to achieve them. formal opening ceremony of its CSI Student Branch on 4th of May, The objective of financial planning is to ensure that the right 2010. At the time the inauguration, message from CSI President Prof amount of money is available in the right hand at the right point in P Thrimuthy was read which emphasized on students project be the future to achieve an individual’s life goal. handled in the live environment and hoped the AIET management It also allows you to understand how each financial decision you would provide the industry participation using CSI platform. Invited make affects other areas of your finances. guest Mr. Kuldeep Singh Dhull, Chairman CSI Delhi chapter explained • Steps in financial planning . how the CSI can provide its all academic and professional support in – Understanding your needs & setting up financial goals. building the student career. He also thanked the AIET management – Implementing your strategy. group Chairman Dr. V K Agarwal, Executive Director Dr. Manju

CSI COMMUNICATIONS | AUGUST 2010 45 Agarwal, Director Mr. S P Garg, and Prof. R M Bhatt. During the Then, the Course coordinator, Dr. P. Thangavelu, Professor & Head, session, Prof. G K Joshi, Principal of IET discussed the emergence Department of Computer Science proposed the entire plan for the of computer, intelligence and intuition. Mr. Shiv Kumar ,DGM, NIC, course and the dynamics of the course content. The chief guest of Delhi, explained the usage of large databases. Mr. Ravin Ahuja from the day Dr.Kandaswamy, Professor & Head, Department of Organic Govt. of Haryana, Faridabad briefed the research areas emerging Chemistry , University of Madras gave a thought provoking speech like grid computing etc. Prof S K Mehrotra, Dean Academic Dr.ew on the importance of trainings in higher education. He praised the attention towards the role of electronics at the architectural and University Grants Commission for its noble initiatives to upgrade computational level. Dean Student Welfare & Head, Dept. of CS Prof R knowledge of the trainers. He also emphasized on the importance M Bhatt, talked on professionalism. He urged the students to develop & role of Universities & Colleges to serve for the development of the their own areas of expertise and CSI will help them to grow like a nation. Finally the inaugural session ended up with a formal vote of professional. He also expressed his thanks to the management group thanks by Prof. Lavanya, Asst. Professor, Department of Computer of the AIET to provide all the facilities for successful organization of Science, University of Madras and followed by the National Anthem. the event. Dr. Bhatt has been associated with the CSI since 1996. In Dr. Kamalodaya from Institute of Mathematical Sciences has the last session, Mr. L K Sharma Head, IT dept. expressed thanks to specialised in Algorithms on Automata Theory. On 29th June 2010 all the august gathering and detailed about the forthcoming activities (FN), the differences between Non-Deterministic and Deterministic with the CSI. From all the departments several faculty members and finite automata were explored with basic mathematical operations. students were participating. Dr. R K Garg, Head Physics Dept., Mr. An insight of Turing machine and its applications were given. BhupeDr.a Sharma , Head, Mechanical Dept. and Mr. D V Yadav On 29th June 2010 (AN), a lecture was given by Dr.Saravanan were also present. of Vellore Institute of Technology, on the topic Overview of Cryptography. The lecture gave a detailed overview on Cryptography „„ ANITS, VISAKHAPATNAM and Cryptosystems. The Cryptosystems are the machines constructed for encryption and decryption of our data. It secures us from the security attacks namely, Interruption, Interception, Modification and Fabrication and attains the security goals like Confidentiality, Data Integrity and Data Availability. The Cryptosystems can use Private Key (Secret Key), Public Key or Hybrid Key for Encryption and Decryption. Various algorithms like Symmetric Key Algorithm, Conventional Single Key Algorithm and Secret Key Algorithm are available for Secret Key Cryptosystems. The drawbacks of Secret Key Cryptosystems are Key Distribution, Key Management, and Difficult to provide Digital Signature Schemes that provide non-repudiation services. The Solution is to go for Public Key Cryptography as it solves the source resolution problem and Key distribution problem. Dr. Kamalodaya, Institute of Mathematical Sciences on 30th June 2010 (FN) explained the concepts of Finite Automata. A pattern ANITS, Visakhapatnam : Seminar on “Microcontroller Programming made easy was taken and its membership was checked - whether it belongs and Robotics” given by esteemed speaker. Mr. Jayasurya Dutt M. to the automata language or not. It was supported with transition diagrams.Some examples were discussed. Arduino is an open-source electronics prototyping platform On 30th June 2010 (AN), a session on Pointers was dealt byProf. based on flexible, easy-to-use hardware and software. Sornam, Professor, Department of Computer Science, University of Arduino can sense the environment by receiving input from Madras. Interesting examples were discussed and followed by a a variety of sensors and can affect its surroundings by controlling practical session. lights, motors, and other actuators. The microcontroller on the board On 1st July 2010(FN), a talk on Information Security was dealt is programmed using the Arduino programming language (based in detail by Prof.T.Srinivasan, Rajalakshmi Engineering College with on Wiring) and the Arduino development environment (based explanation of Network, host addresses, subnetting etc., He has on Processing). Arduino projects can be stand-alone or they can given various dimensions to take up research. communicate with software on running on a computer (e.g. Flash, On 1st July 2010(AN), a lecture on Pattern Recognition was Processing). excellently given by Prof.Kathirvalavakumar, VHNSN College, The speaker showed simple examples of how to work with Virudhunagar with lot of interesting examples. the Arduino language and common electronic components to build On 2nd July 2010(FN) , the lecture was given by Prof. major projects. A major workshop on Microcontroller based building Kathirvalavakumar, VHNSN College, Virudhunagar on Neural robots is going to be conducted for students as a completely hands- Networks. The topic focused on Feed Forward Neural Networks etc., on activity in the college premises for 2 days.350 students attended On 2nd July 2010(AN), Prof.Lavanya, Assistant Professor, the seminar across all branches. University of Madras gave a lecture on “Data warehousing and Introduction to Data Mining” with examples. „„ LOYOLA COLLEGE, CHENNAI On 3rd July 2010 (FN), Prof.Abirami, Asst.Professor, Anna University gave an interesting talk on “Document Image Processing”. Report of the Refresher Course on Computer Science & On 3rd July 2010 (AN), Dr. Rajesh, Professor, Bharathiar Information Technology batch III at UGC Academic Staff College, University gave a talk on “Soft Computing” explaining fuzzy logic and University of Madras held from June 29, 2010 to July 19, 2010. its applications. The Inaugural session was started with Thamilzhthai Vazhthu On 5th July (FN), Dr.Saravanan, VIT University, Vellore gave his followed by the welcome address given by Dr. Gothandaraman, second talk on Cyrptography and Modular arithmetic. Deputy Director, UGC Academic Staff College, University of Madras. On 5th July(AN), there was an interesting lab session headed

CSI COMMUNICATIONS | AUGUST 2010 46 by Prof.Thangavel, HOD, University of Madras on Data Structures of Computer Science, Bharathiar University has motivated the and Algorithms. participants to do the medical image processing and thus caters the On 6th July 2010 (FN), Dr. Ramanujam from Institute of need of the society. He analysed the brain images through different Mathematical Sciences, a scholar in the field of Computation theory mathematical methodology. He has explained about the functionality very interestingly brought out the concept of Game Theory. The of brain using different modality images. With the help of BOLD session was interactive by practically playing few two player games. (blood oxygen level content) to judge the neuron responsibility for A resource allocation problem with at most clarity was explained with various sensory organs through various tools. an analogy to a cake cutting problem enriched with humour. The idea On July 13th 2010(AN), Dr. Rajdeep Niyogi from IIT, Roorekey of game computation was trained into the minds of the participants. On July 6th 2010 (AN), Prof.Dr.D.Christopher Durairajan has added a new concept of research into the minds of the participants. nicely brought about the importance of medical image processing The concept of automated planning was explained by taking a real to cater the needs of the society. He has explained clearly about life simple example. He described the concept about how a plan has the registration of multi modality images and challenges in image to be worked out with pre and post conditions for accomplishment of processing. He has dealt about the PCA analysis to transform the deterministic and non deterministic goals. high dimension of data to low dimension of data. On 14th July 2010(FN), Dr.T.Lakshmanasamy, Department of Image security, the process of quantization of organs and Econometrics, University of Madras gave a lecture on “The Science lesions of mice using Image MRI imaging, pseudo coloring and of Decision Making”. His focus was more on Neuroeconomics and various statistical analysis of images. How do we register the multi explained the concepts with various examples. He also emphasized modality images. The process of overlaying a structural image over on the happiness giving genes. functional image. Parallelization of image processing algorithm have On 14th July 2010(AN) , Dr. N.V. Raman continued the been discussed. analyzing of algorithms with tree structures. The systemic approach On 8th July 2010(FN), Dr. Ramanujam from Institute of in calculating the running time of various algorithms was captivating. Mathematical Sciences taught us the concept of Distributed Storage. The concept enhanced with various applications of the The way to choose a data structure based on its efficient operations internet, brought real life experience to the subject. Storage of e-mail was explored. The complexity of each algorithm was calculated. passwords, web files and data were explained in detail. On 15th July 2010(FN), Dr.Swaminathan , Assistant Professor, On 8th july in afternoon session Dr.Ravanan, Professor, Dept. Anna University gave a lecture on “Web Services” starting from the Of Statistics, Presidency college gave a talk on basics of statistics in I generation till the V generation. The focus was on RMI, Interfaces, the first session .He concentrated on sampling techniques of various Web standards etc., groups. He also showed a demo of problems in SPSS software. On 15th July 2010(AN) Dr. N.V. Raman reached the altitude On 9th july in the morning session Dr.Bhaskaran, Professor in analyzing algorithms. Various graph algorithms like Kruskal’s from Anna University focused on Human computer interaction . He algorithm, Prim’s algorithm, Dijkstra’s algorithm, Hamiltonian cycle focussed on content based image retrieval . He shared his research problem were explained in a lucid manner. The participants got a areas on Human gesture and posture recognition. At the end of the clear picture of polynomial time and exponential time algorithms. session he highlighted to us about how to write a Good Research On 16th July 2010 (FN), Dr.R.Saravanan, Senior Professor, VIT paper. gave a lecture on “WIRELESS NETWORKS”. The talk focused on Industrial trip to CTS: the difference between wireless and wired networks, the protocols As a part of the Refresher Course in “Computer Science and used in wireless networks, comparison of TCP in wireless and wired IT” organized by Academic Staff College UGC, University of Madras networks, etc., all the teaching faculty participants were taken for an industrial trip On 16th July 2010(AN), Dr.Swaminathan, Anna University to Cognizant Technology Solutions on 10th July 2010. The trip was presented a talk on the basic concepts of DBMS and recent trends headed by Prof.P.Thangavel, Head of the Department, University of in databases. Madras and organized by Mr. Jerald Inico, Lecturer, Loyola College. There was a special talk on “Object Oriented Analysis and On 17th July 2010, seminar and test were conducted for the Design” delivered by Mr.Sai, Academic Facilitator, CTS. The talk faculty participants. emphasised on the differences between Object Oriented Analysis ON 19th July 2010, the last day of the refresher course, a session and Design. Special focus was given on various UML diagrams on “Personal Effectiveness” was conducted by Dr.Swaminathan, with interesting case studies. It was an interactive session with the University of Madras very effectively. He emphasised on happiness complete participation of the professors with the speaker. and breathing techniques to bring in relaxation in life. The day ended with an entertainment trip to Kovalam and Followed by that, the valedictory function was organized in a Muttukadu. grand manner. The CD was released by Mr.Elango Madhivanan, On 12th July 2010, Dr.Swaminathan, Assistant Professor, Anna Senior Manager, Cognizant Technology Solutions and an inspiring University gave a talk on XML- Extensible Markup Language which talk was given related to simple and analogy based teaching focused on various web standards, markup languages, Structure of techniques. Director, UGC, Academic Staff College, University XML document, XML Schema, Querying an XML and retrieving the of Madras, Deputy Director, Prof.Thangavel, HOD, University of data ,XSL and XPath. Madras were also the speakers of this function. The function ended Dr. N V Raman, an expert in the field of data structures and algorithms from Institute of Mathematical Sciences kept us with a vote of thanks by the participants, Mr.Ravindran, Dr.Gladis spellbound with his knowledge of analyzing the algorithms. On 12th and Mrs.Hannah Vijayakumar and distribution of certificates. Thus July 2010(AN) the game of finding the complexity of an algorithm the refresher course ended in a grand manner. started. The basic data structures of stack, queue and arrays were discussed. On 13th July 2010 (FN), Prof Dr.Satheesh, Department „„ PUNE

CSI COMMUNICATIONS | AUGUST 2010 47 Persistent Systems, SNS Technology, Sun Microsystems, VeriSoft, Websym Technologies and Wipro have helped in organizing these programs. All these programs were conducted free of cost with the support from these industries. Dr. Anand Deshpande proposed the vote of thanks, while Dr.. Deepak Shikarpur introduced the chief guests.

„„ SURAT A seminar on “Wi-Fi security” was jointly held by CSI-Surat Chapter and Institute of Engineers-Surat on 3rd July. There was overwhelming response. Around 300+ people have participated in this event. Dr. Naren Burade, Chairman-CSI, Surat, talked about CSI and read message of Prof. Thrimurthy, President-CSI. Mr. U.K. Jethwa, Chairman-IEI, Surat , talked about IEI and needs of such programs. Pune : Hon Vice Chancellor distributing Certificate to a successful candidate. Mr. M D AGPatel, Secretary-CSI, D.V.Bhatt-Secretary, IEI presented flowers Agrawal, Dr. Deepak Shikarpur and Dr. Anand Deshpande look on. and momentos to the speakers. Education system should come out of merely exam centric Mr. Tejesh Patel, Proprietor, Strategic alliance, presented Wi- approach and provide a different kind of motivation for students said Fi Security for Home Users. With Wi-Fi networks readily and easily Dr. Raghunath Shevgaonkar, VC University of Pune. He was speaking available from all the major Internet providers, most of the home users at the certificate distribution function of Faculty development program now have the Wi-Fi Access points but still they don’t have necessary on design and analysis of algorithms organized by Computer Society of knowledge and skills to audit their Wi-Fi Security and if needed India (CSI) Pune chapter at Dewang Mehta Auditorium. MD Agarwal, configure it to be most secured. The topic was targeted to the general SoHo user using Wi-Fi Access points and the agenda was to make the VP–CSI and CIO BPCL, Dr. Deepak Shikarpur, Chairman Division users aware of the perils of Wi-Fi, how to audit it and how to secure 1-CSI and Dr. Anand Deshpande, CMD Persistant were present at the it. He covered aspects like vulnerabilities of Open Authenticatoin, occasion. MAC-Based filtering, WEP, WPA, WPA2, etc and demoed how those Dr. Shevgaonkar added that there should be a change in approach can be cracked. He also covered how data can be captured, decrypted to higher education. Curicullum is only a path. We have stagnated and analysed. He also provided tips on how to remain more secured the knowledge by becoming exam centric. There cant be engineering generally by taking simple steps in day to day operations of computers. without innovation. There should be focus on understanding for innovative research. The R&D centers have been pocketed to few labs. There should be a joint research program of industry-academia. Top industries always have a good R&D base and this can be useful for the Industry-academia interface. Free flow back and forth of personnel from industry - academia should be accepted.He added that there is a general perception that IITians are more employable than other engineering colleges. If this has to change teach something which is beyond space and time and emphasize on research in these colleges. Adapting to technologies is an easy job. The students should focus more on innovation and solid fundamentals of engineering. MD Agarwal said that CSI will soon start a social sector project where technologies and tools will be identified which can become a means for people from villages. An MOU with CDAC has been signed in this regard recently. Shekhar Sahasrabudhe, Regional VP CSI gave an overview of the Surat : (L to R) Nitin Oza, Shashin Patel, Tejesh Patel, Naren Burade, Kirtar Oza, Vinod faculty development program (FDP) which started in 2006. This is 14th Kumar, Arvind Patel, UK Jethwa. Program and 7th organized by Persistent. Computer Society of India (CSI) and Software Exporters Association of Pune (SEAP) started this Mr. Kirtar Oza, Sr. Executive, Gujarat Gas, delivered talk on Wi- initiative with an objective to bridge the Industry-Academic gap. Close Fi security for small businesses. He covered topics like Wardriving, interaction with Board of Studies is the key for this initiative. Initially Wireless Architectures, Security audits, Benefits of WLAN, etc. started for Engineering College teachers, later on expanded to include Mr. shashin Patel , DLink India, representing Transit Geo Systems MCA and MSc teachers also. Training is conducted by Industry experts talked on Unified switches and how to setup campus network with and many a times in the industry premises. guaranteed coverage even if user moves from one access point to Initiative started with a 10 day course in ‘Software Architecture’ in onother. He also covered Wifi security topics in such a network December 2006 which was hosted by Persistent. Since then, training including Rouge AP Detection, Wifi Policy deployment, Central and programs are being conducted in every summer and winter vacation. Edge deployments, etc. We have till now organized 13 training programs. Around 520 hours of Mr. Nitin Oza, Execom member of CSI-Surat did a great work training is imparted and more than 400 teachers have participated in organizing this seminar jointly with IEI and was instrumental in planning the training. Subjects covered are - Software Architecture, Embedded the seminar. Systems, Object Oriented Analysis and Design, Software Project Mr. Rajesh Mehta, Director, Transit-Geo system, Surat have Management, Software Testing, Data Base Management Systems, sponsored this event and also said that they are ready to sponsor Software Engineering, Information Security, Microsoft Technologies, events in the future as well. Java, Advanced DBMS and Programming and Problem Solving. Industry All execom members and members of advisory committee of CSI- Surat chapter worked hard to make this event a great success. involvement is the key in these trainings and many companies including Aftek, Amdocs, BladeLogic, Cognizant, IBM, KPIT Cummins, Microsoft, „„ TCE, MADURAI Licenced to Registered with Registrar of News Papers If undelivered return to : Post Without Prepayment for India - RNI 31668/78 CSI, 122, TV Indl. Estate, MR/TECH/WPP 241/WEST/09-11 Regd. No. MH/MR/WEST-76-2009-11 Mumbai - 400 030

team arrived on 26th morning and stayed over the weekend. The President, Prof. Thirumurthy and Vice President, Mr. M. D. Agarwal came early on 25th July to meet up with the Dr. Ajay Kumar, Principal Secretary, IT, Government of Kerala. The meeting was organised at the chamber of the IT Secretary and was also attended by Mr. Satish Babu, Mr. Brajesh Kaimal, President of CSI Trivandrum Chapter and Mr. Suchit, Executive Secretary of CSI. The IT Secretary acknowledged the contribution of CSI Trivandrum Chapter for the contributions made towards policy initiatives of Government of Kerala. President and Vice President assured all support from CSI side and requested the IT secretary to consider CSI services for any training requirements especially on the e-governance front for all the government employees of the state. The President presented a memento on behalf of CSI to the IT secretary. The President and Vice President visited the Trivandrum Chapter and interacted with the MC members and senior members As a part of CSI student branch activity, a software design of the chapter. The President and Vice President addressed queries contest was held on 17.02.2010 to test the students’ software- of members and spent quality time with the members of the Chapter. development skills. Around 25 teams from second year and pre-final The Chapter Secretary, Mr. Biju gave a brief of the Chapter activities year participated and presented their models. Final year coordinators and the President and Vice President appreciated the previous organized the event. and current chapter officers and senior members for the excellent It was a rare occasion for the students’ to develop their performance of the chapter. proficiency in software programming. The Trivandrum National Execom would have a special place in the CSI History as two MoUs were signed with two organisations As a part of CSI student branch activity, a crypt-analysis contest of significance, Centre for Development of Advanced Computing was held on 30.12.2009 to test the ingenuity of the students. Around (C-DAC) and The Project Management Institute (PMI) USA. The 30 teams from second year and pre-final year participated. Final MoU signing with C-DAC started before the Execom meeting and year coordinators organized the event. The students learnt how to was attended by Execom members of CSI, Senior members from crack cryptic codes hands on. C-DAC and the Chapter officers from Trivandrum Chapter. Mr. M. D. It was a great opportunity for the students’ to analyse their Agarwal gave a presentation on CSI and Mr. Rajan Joseph, Director creative-thinking ability. General C-DAC gave a presentation on C-DAC. Mr. George Arackal, Head Corporate HRD, C-DAC and Mr. Sasi P. M. were also present As a part of CSI student branch activity,a Web designing contest during the ceremony. was conducted to test the students’ HTML skills.The event was held The second MoU was signed between CSI and PMI. Mr. Raj in two rounds. The preliminary round,full of objective type questions, Kalady, Managing Director, PMI Organization Centre India and Mr. was held on 10.09.2009 while the final round,a practical one was Jacob Varghese from PMI were present. Mr. Raj Kalady gave an conducted on 15.09.2009.Around 30 CSI members from second and overview of the PMI and their activities in India. He also mentioned prefinal year participated. that the MoU with CSI is very important and is only the second MoU It was a wonderful opportunity for the students to test their html that PMI has signed with organisations in India. skills and improve upon web creation. The National Execom started after lunch on the 26th June 2010 and discussed many important items. The National Student „„ TRIVANDRUM Convention team consisting of Prof. Krishnankutty, Ms. Mini Ulanat, and Mr. Biju Varghese gave a presentation on the preparations for the student convention to be held in September in Mar Baselios College of Engineering and Technology (MBCET), Trivandrum. The meeting continued after dinner. The CSI Trivandrum Chapter organised a Kathakali performance during the dinner. The Trivandrum Chapter had organised a temple visit for Execom members early morning on 27th June 2010. The members proceeded to the Airport after a very successful visit to Trivandrum

Trivandrum : CSI and PMI team after signing the MoU

The National Execom of June 2010 was conducted in Trivandrum at Hotel Uday Samudra, Kovalam on 26th and 27th June 2010. The

Published by Suchit Gogwekar for Computer Society of India at 122, TV Indl. Estate, S K Ahire Marg, Worli, Mumbai-400 030 • Tel.: 022-249 34776 and Website : www.csi-india.org • Email : [email protected] and printed by him at GP Offset Pvt. Ltd., Mumbai 400 059. DWDM-2010: 2nd National Conference on “Applications and Trends in Data Warehousing, Data Mining and Data Modeling” Date: 24-25 September 2010 Hosted by: Thapar University, Patiala Organised by: CSI Region-I, Division-III and Chandigarh Chapter For details contact: Dr. R K Sharma at [email protected], Dr. Harish Kumar at [email protected] October 2010 National Conference on Mobile and Ad Hoc Networks Date : 22 and 23 October, 2010 Organized by : CSI Div. III, IV, Region-VII and CSI Coimbatore Chapter For details contact: Mr. S Mahendra Kumar, [email protected], Mr. Prashant R Nair, [email protected] National Conference on E-Governance Date : 8-9 October 2010 at Kolkata For details contact: Dr. A K Roy 24th CSI Karnataka Student Convention Date : 22-23 October 2010 Hosted by : SJCE Mysore August 2010 Organized by : CSI Bangalore Chapter Software 2.0 – Emerging Competencies for Software Engineering For details contact: B G Sangameshwara, [email protected], Date: 7 August 2010 Tel.: 0821-2548285, [email protected], Tel.: 080-22862215, 22860461 Organised by: Division II [Software] and Kolkata Chapter For details contact: Mr. Swarup Chakraborty , e-mail:[email protected] November 2010 5th CSI National Conference on IT for Defence DCMC-10: Divisional Conference on Mobile Computing Date : 12-13 November 2010 Host: CSI Bangalore Chapter Date: 11-12, August 2010 at Chennai Organized by: SIG-IS, Div.IV, CSI Organised by: Dept. of CSE & TIFAC CORE, Velammal Engineering College, Chennai For details contact: [email protected],[email protected], in association with Computer Society of India, Div. IV on Communications & Chennai Tel.: 080-22862215, 22860461 Chapter. National Conference on IT for Rural & Agriculture Development For details contact: Prof. B. Rajalakshmi, Convener, DCMC-10 at vecdcmc10@gmail. Date : 23-24 November 2010 com Phone: 044 - 26590579 OR Mr. H R Mohan, Chair Div IV at hrmohan.csi@ Host: Indian Institute of Business Management, Patna gmail.com Website: www.velammal.org Organized by: Patna Chapter NCRTIT-10: 2nd National Conference on Recent Trends in Information Technology For details contact: Prof. A K Nayak Date: 12–13, Aug 2010 at Chennai 45th Annual Convention Organised by: Dept. of IT, B.S. Abdur Rahman University in association with CSI Div. Date : 25-27 Nov. 2010, Mumbai Venue : Mumbai IV, Chennai Chapter and IEEE Computer Society, Madras Chapter Host: CSI Mumbai Chapter For details contact: www.csi-2010.org For details contact: Dr. T.R. Rangaswamy, convener at [email protected] Tel.: December 2010 044-2275 1347/48/50/75 Extn : 216 / 218 OR Mr. H.R. Mohan, Chair Div IV at COMAD-2010 International Conference on Management of Data [email protected] Website: www.bsauniv.ac.in Date : 8-10, December, 2010 1st CSI Goa State Student Convention Organized by: CSI Division II (Software), SIG-Data, Region VI and Nagpur Chapter Date: 16 August 2010 For details contact: P S Deshpande, VNIT Nagpur E-mail: [email protected] Hosted by: Goa University Region-I Student Convention Organised by: CSI Goa Chapter Date : 4-5 December 2010 For details contact: [email protected]; Hosted/Organized by: CSI Student Baanch at Graphic Era University, Dehradun For details contact: Dr. Harish Kumar, [email protected], Dr. R.K. Vyas, Workshop on Cloud Computing [email protected] Date: 18-20, Aug 2010 at IIT Madras, Chennai ICoAC 2010: 2nd International Conference on Advanced Computing Organised by: CSI Div IV, Chennai Chapter, SIG-Distributed Systems and IEEE Date: 14-16, Dec. 2010 at Chennai, India Computer Society, Madras Chapter Organised by: Dept. of Information Technology, Anna University Chennai, MIT Campus For details contact: Mr. S. Ramasamy, Email: [email protected] OR and IEEE Madras Section and Supported by Computer Society of India Div IV & Chennai Mr. H. R. Mohan, Chair Div.IV at [email protected] Chapter, IEEE Computer Society, Madras Chapter, Centre for Development of Advanced National Seminar on Emerging Trends in Cloud Computing, (Hot Cloud) Computing (CDAC) and University Grants Commission (UGC) Date: 20 August, 2010 at Trichy For details contact: Dr. S. Thamarai Selvi, Professor, Dept. of Information Technology, Organised by: Jayram College of Engg. and Tech, Trichy and CSI MIT Campus, Anna University Chennai, Chromepet, Chennai 600044, India. Phone: For details contact: Dr. N. Kannan 91-44-22516319 / 22516015. Email: [email protected] OR Mr. H.R. Mohan, Chair Div IV at [email protected] Website: www.annauniv.edu/icoac2010 All India Seminar on web Technologies: Emerging Trends and Social Impacts ICSIP-2010: International Conference on Signal and Image Processing Date: 30-31, Aug 2010 at Cochin Chapter Date : 15 – 17, Dec 2010 at Chennai, India Organised by: CSI Cochin Chapter, IEEE Kerla section, IETE, Cochin, The Institutions Organized by: RMD College of Engineering and University of Mysore in association of Engineers (India) with Computer Society of India Div IV & Chennai Chapter and IEEE Computer Society, For details contact: Mr. K S Mathew Madras Chapter September 2010 For details contact: Prof. Dr. R. M. Suresh, Chair – Programme Committee at [email protected] or [email protected] OR Mr. H R Mohan, Chair Div.IV at The 26th National Student Convention [email protected] Website: www.rmd.ac.in/icsip2010/ Date : 2-4 September, 2010 Hosted by : Mar Baselios College of Engineering and Technology, Trivandrum January 2011 Organized by : CSI Trivandrum Chapter ConfER-2011: The 4th National Conference on Education & Research For details contact: Prof. Krishnan Kutty, [email protected] Date : 23-24 January 2011 Ms. Mini Ulanat, E-mail: [email protected] Hosted by: Shambhunath Institute of Engineering & Technology, Allahabad CSI Region-VI Student Convention Organized by: CSI Division V, Region-I and Allahabad Chapter Date: 4-5 September 2010 For details contact: Prof. J P Mishra (e-mail: [email protected]), Hosted by: MIT Pune Mr. Zafar Aslam (e-mail: [email protected]) Organised by: CSI Pune Chapter February 2011 For details contact: [email protected]; CONSEG-2011 : International Conference on Software Engineering The 3rd Tamil Nadu Student Convention Date : 17-19 February, 2011 Date: 17-18 September 2010 Hosted by : Jayaram College of Engg. & Tech. Organized by: CSI Div. II (Software) and Bangalore Chapter Organised by: CSI Trichy Chapter For details contact: Dr. Anirban Basu, [email protected] Venue : Dr. S A Sahaaya Arul Mary, [email protected], Second International Conference on Emerging Applications of Information Mr. S Ramasamy, [email protected] Technology (EAIT 2011)” National Conference on Emerging Trends in Computing and Communication Date : 18-20 February 2011 (ETCC- 2010) Host: Kolkata Chapter Date: 18-19 September, 2010 For details contact: Mr. D P Sinha Organised by: Medi-Caps Institute of Technology and Management, Indore and CSI Indore Chapter. M D Agrawal Venue : Medi-Caps Institute of Technology and Management, Indore Vice President & Chair, Conference Committee, CSI