News Bulletin (2010-2011)
Total Page:16
File Type:pdf, Size:1020Kb
KONGU ARTS AND SCIENCE COLLEGE ERODE – 638 107. P.G. DEPARTMENT OF COMPUTER SCIENCE MCA – News Bulletin (2010-2011) EDITORIAL BOARD PATRON : A.VENKADACHALAM B.Sc., Correspondent. CONVENER : Dr. N.RAMAN MBA., M.Com., M.Phil., B.Ed.,PGDCA Principal ADVISOR : Ms. D. GAYATHRI DEVI M.C.A., M.Phil. Prof. and Head. COORDINATOR & : Ms. B. JAYANTHI M.C.A., M.Phil., Associate Professor EDITOR STUDENT EDITORS 1. S.BAGAVATHSINGH - II - M.C.A 2. R.SAMPATHKUMAR - II - M.C.A 3. G.ARUNKUMAR –I MCA 4. K.SANKAR – I MCA 1 News Bulletin (2010-2011) 2 S.NO DATE PARTICULARS P.NO 1. 29.12.2010 COMPUTER ASSISTED TRANSLATION 7 KEY FEATURES AND BENEFITS OF BIT 2. 29.12.2010 DEFENDER ANTIVIRUS 2010 8 3. 30.12.2010 COMPUTER BASED TRAINING 9 INTEL® CORE™ I7 PROCESSOR 4. 30.12.2010 FEATURES AND BENEFITS 10 MICROSOFT CONFIRMS CRITICAL IE 5. 31.12.2010 11 BUG,WORKS ON FIX 6. 31.12.2010 LINUX 12 BENQ TO LANUCH R100 TABLET PC IN 7. 03.01.2011 EARLY 2011 13 BEAST TROJAN- MOST DANGEROUS 8. 03.01.2011 COMPUTER VIRUS 14 9. 04.01.2011 IT NEWS 15 FACE BOOK PASSES GOOGLE AS MOST 10. 04.01.2011 16 VISITED SITE OF 2010 LA CINEMA RUGGED HARD DRIVE 11. 05.01.2011 CONNECTS TO TV 17 12. 05.01.2011 FEATURES OF SOUND TECHNOLOGY 18 THE IPHONE AND IPOD COULD SOON 13. 06.01.2011 HIT VERIZON WITH 4G 19 3 14. 06.01.2011 MICROSOFT PROTOCOLS 20 15. 08.01.2011 SHORTCUT KEYS 21 16. 08.01.2011 GRID COMPUTING 22 17. 10.01.2011 SMTP SERVER 23 18. 10.01.2011 TYPES OF SERVER 24 19. 11.01.2011 BANG, THERE GOES YOUR iPOD! 25 20. 11.01.2011 JAVA CARD 26 21. 12.01.2011 COMPANY PROFILE 27 22. 12.01.2011 ABOUT WIKILEAKS 28 23. 18.01.2011 TCS PROFILE 29 24. 18.01.2011 WIKILEAKS 30 25. 19.01.2011 COMPRO LANCHES NETWORK CAMERA 31 26. 19.01.2010 AIRBORNE INTERNET 32 27. 20.01.2011 ANDROID 3.0 33 28. 20.01.2011 BUBBLE SENSING 34 29. 21.01.2011 SKY X TECHNOLOGY 35 INFRASECURE 30. 21.01.2011 36 SOFTWARE TO CUT PC POWER 31. 22.01.2011 CLOUD COMPUTING 37 32. 22.01.2011 ABOUT CLOUD COMPUTING 38 4 33. 24.01.2011 POWER MACINTOSH G3 39 TOSHIBA CANVIO 3.0 PORTABLE 34. 24.01.2011 40 DRIVES 35. 25.01.2011 STRATA FLASH MEMORY 41 36. 25.01.2011 TYPES OF COMPUTER VIRUS 42 37. 27.01.2011 APPLE REVEALS OS X 10.7 43 38. 27.01.2011 TASK MANAGER 44 39. 28.01.2011 PI4-WORKERBOT 45 40. 28.01.2011 HONEYPOT (COMPUTING) 46 41. 31.01.2011 TOP EIGHT IT COMPANIES IN INDIA 47 HACKERS TURN BACK THE CLOCK 42. 31.01.2011 48 WITH TELNET ATTACKS 43. 01.02.2011 COMPANY PROFILE 49 44. 01.02.2011 USB FLASH DRIVE 50 AMPLITUBE UPDATE ADDS RECORDING 45. 03.02.2011 FEATURES TO iPOD 51 46. 03.02.2011 IRIS RECOGNITION 52 47. 05.02.2011 GIANT RING OF BLOCK HOLES 53 48. 05.02.2011 AVAST ANTI-VIRUS 54 3D GAMING WONT PERMENANTLY 49. 07.02.2011 DAMAGE YOUR EYES 55 5 50. 07.02.2011 SOFTWARE OF LASER PRINTER 56 51. 08.02.2011 TCS 57 52. 08.02.2011 CRYPTOGRAPHIC ALGORITHMS 58 53. 09.02.2011 JOB SEARCHING WEBSITE 59 54. 09.02.2011 HP LAUNCHES CLOUD SERVICES 60 IBM DEVELOP DENSER,FASTER CHIP 55. 11.02.2011 61 MEMORY 56. 11.02.2011 BLU-RAY DISC 62 INTEL DESKTOP BOARD DP55KG 57. 12.02.2011 EXTREME SERIOUS 63 SELF-RECONFIGURING ROBOTIC 58. 12.02.2011 SYSTEMS 64 59. 14.02.2011 NANO ROBOTICS 65 60. 15.02.2011 CYBER CRIME 66 61. 17.02.2011 APPLICATIONS OF NANOTECHNOLOGY 67 6 KONGU ARTS AND SCIENCE COLLEGE P.G DEPARTMENT OF COMPUTER SCIENCE ERODE – 638107 News Bulletin: MCA DATE: 29.12.2010 COMPUTER-ASSISTED TRANSLATION Spell checkers, either built into word processing software, or add-on programs. Grammar checkers, again either built into word processing software, or add-on programs. Terminology managers, allowing the translator to manage his own terminology bank in an electronic form. Dictionaries on CD-ROM, either unilingual or bilingual. Full-text search tools (or indexers), which allow the user to query already translated texts or reference documents of various kinds. In the translation industry one finds such indexers as Natural, ISYS Search Software and dtSearch. Bitexts, a fairly recent development, the result of merging a source text and its translation, which can then be analyzed using a full-text search tool or a concordancer. Translation memory managers (TMM), tools consisting of a database of text segments in a source language and their translations in one or more target languages. G.ANANTHI II – MCA 7 KONGU ARTS AND SCIENCE COLLEGE P.G DEPARTMENT OF COMPUTER SCIENCE ERODE – 638107 News Bulletin: MCA DATE: 29.12.2010 Key Features and Benefits of Bit Defender Antivirus 2010 Bit Defender is an antivirus software suite developed by Romania-based software company SOFTWIN. It was launched in November 2001. It is one of the top ten antiviruses in 2010. Protection against viruses and other malware. Scans all Web, e-mail and instant messaging traffic in real-time. Blocks spyware programs that track your online activities. Blocks web pages that attempt to steal your credit card data. Prevents personal information from leaking via e-mail. Instant Messaging Encryption keeps your conversations private on Yahoo! and MSN Messenger. Reduces the system load and avoids requesting user interaction during game play. Suitable for Windows 7. M.ANANTHARAJ I – MCA 8 KONGU ARTS AND SCIENCE COLLEGE P.G DEPARTMENT OF COMPUTER SCIENCE ERODE – 638107 News Bulletin: MCA DATE: 30.12.2010 COMPUTER-BASED TRAINING Computer-Based Trainings (CBTs) are self-paced learning activities accessible via a computer or handheld device. CBTs typically present content in a linear fashion, much like reading an online book or manual. For this reason they are often used to teach static processes, such as using software or completing mathematical equations. The term Computer-Based Training is often used interchangeably with Web-based training (WBT) with the primary difference being the delivery method. CBTs provide learning stimulus beyond traditional learning methodology from textbook, manual, or classroom-based instruction. For example, CBTs offer user- friendly solutions for satisfying continuing education requirements. CBTs can be a good alternative to printed learning materials since rich media, including videos or animations, can easily be embedded to enhance the learning. Another advantage to CBTs are that they can be easily distributed to a wide audience at a relatively low cost once the initial development is completed. G.ARULMURUGAN II - MCA 9 KONGU ARTS AND SCIENCE COLLEGE P.G DEPARTMENT OF COMPUTER SCIENCE ERODE – 638107 News Bulletin: MCA DATE: 30.12.2010 Intel® Core™ i7 Processor Features and Benefits Go to the next level of multi-core performance. Intel Core i7 processors deliver an incredible breakthrough in quad-core performance and feature the latest innovations in processor technologies: Intel Turbo Boost technology maximizes speed for demanding applications, dynamically accelerating performance to match your workload—more performance when you need it the most. Intel Hyper-Threading technology enables highly threaded applications to get more work done in parallel. With 8 threads available to the operating system, multi-tasking becomes even easier. Intel QuickPath Interconnect is designed for increased bandwidth and low latency. It can achieve data transfer speeds as high as 25.6 GB/sec with the Extreme Edition processor. Integrated memory controller enables three channels of DDR3 1066 MHz memory, resulting in up to 25.6 GB/sec memory bandwidth. This memory controller's lower latency and higher memory bandwidth delivers amazing performance for data-intensive applications. Intel HD Boost significantly improves a broad range of multimedia and compute- intensive applications. The 128-bit SSE instructions are issued at a throughput rate of one per clock cycle, allowing a new level of processing efficiency with SSE4 optimized applications. G.ARUNKUMAAR I - MCA 10 KONGU ARTS AND SCIENCE COLLEGE P.G DEPARTMENT OF COMPUTER SCIENCE ERODE – 638107 News Bulletin: MCA DATE: 31.12.2010 Microsoft Confirms Critical Ie Bug, Works On Fix Microsoft late Wednesday confirmed that all versions of Internet Explorer (IE) contain a critical vulnerability that attackers can exploit by persuading users to visit a rigged Web site. Although the company said it would patch the problem, it is not planning to rush out an emergency update. "The issue does not currently meet the criteria for an out-of-band release," said Carlene Chmaj, a spokeswoman for the Microsoft Security Response Center (MSRC), in an entry on the center's blog. "However, we are monitoring the threat landscape very closely and if the situation changes, we will post updates." Chmaj also downplayed the threat posed by the bug. "Currently the impact of this vulnerability is limited and we are not aware of any affected customers or active attacks targeting customers," she said. The vulnerability in IE6, IE7 and IE8 surfaced several weeks ago when French security firm Vupen disclosed a flaw in IE's HTML engine. Tuesday, researchers posted a video demonstration of an attack, and added a reliable exploit to the Metasploit penetration toolkit. That exploit used a technique revealed earlier this year by McAfee researchers that defeats a pair of important Windows defensive technologies -- ASLR (address S.BAGAVATHSINGH II – MCA 11 KONGU ARTS AND SCIENCE COLLEGE P.G DEPARTMENT OF COMPUTER SCIENCE ERODE – 638107 LINUX News Bulletin: MCA DATE: 31.12.2010 It’s Free.