Case No. 99 of 2016 Page 1 of 11 COMPETITION COMMISSION of INDIA Case No. 99 of 2016 in Re: Shri Vinod Kumar Gupta, Chartered Ac
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Uila Supported Apps
Uila Supported Applications and Protocols updated Oct 2020 Application/Protocol Name Full Description 01net.com 01net website, a French high-tech news site. 050 plus is a Japanese embedded smartphone application dedicated to 050 plus audio-conferencing. 0zz0.com 0zz0 is an online solution to store, send and share files 10050.net China Railcom group web portal. This protocol plug-in classifies the http traffic to the host 10086.cn. It also 10086.cn classifies the ssl traffic to the Common Name 10086.cn. 104.com Web site dedicated to job research. 1111.com.tw Website dedicated to job research in Taiwan. 114la.com Chinese web portal operated by YLMF Computer Technology Co. Chinese cloud storing system of the 115 website. It is operated by YLMF 115.com Computer Technology Co. 118114.cn Chinese booking and reservation portal. 11st.co.kr Korean shopping website 11st. It is operated by SK Planet Co. 1337x.org Bittorrent tracker search engine 139mail 139mail is a chinese webmail powered by China Mobile. 15min.lt Lithuanian news portal Chinese web portal 163. It is operated by NetEase, a company which 163.com pioneered the development of Internet in China. 17173.com Website distributing Chinese games. 17u.com Chinese online travel booking website. 20 minutes is a free, daily newspaper available in France, Spain and 20minutes Switzerland. This plugin classifies websites. 24h.com.vn Vietnamese news portal 24ora.com Aruban news portal 24sata.hr Croatian news portal 24SevenOffice 24SevenOffice is a web-based Enterprise resource planning (ERP) systems. 24ur.com Slovenian news portal 2ch.net Japanese adult videos web site 2Shared 2shared is an online space for sharing and storage. -
AVG Android App Performance and Trend Report H1 2016
AndroidTM App Performance & Trend Report H1 2016 By AVG® Technologies Table of Contents Executive Summary .....................................................................................2-3 A Insights and Analysis ..................................................................................4-8 B Key Findings .....................................................................................................9 Top 50 Installed Apps .................................................................................... 9-10 World’s Greediest Mobile Apps .......................................................................11-12 Top Ten Battery Drainers ...............................................................................13-14 Top Ten Storage Hogs ..................................................................................15-16 Click Top Ten Data Trafc Hogs ..............................................................................17-18 here Mobile Gaming - What Gamers Should Know ........................................................ 19 C Addressing the Issues ...................................................................................20 Contact Information ...............................................................................21 D Appendices: App Resource Consumption Analysis ...................................22 United States ....................................................................................23-25 United Kingdom .................................................................................26-28 -
Cisco SCA BB Protocol Reference Guide
Cisco Service Control Application for Broadband Protocol Reference Guide Protocol Pack #60 August 02, 2018 Cisco Systems, Inc. www.cisco.com Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco website at www.cisco.com/go/offices. THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB’s public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. -
Security System for Mobile Messaging Applications Pejman Dashtinejad
Security System for Mobile Messaging Applications Pejman Dashtinejad Master of Science Thesis Stockholm, Sweden TRITA–ICT–EX-2015:2 Introduction | 1 Security System for Mobile Messaging Applications Pejman Dashtinejad 8 January 2015 Master of Science Thesis Examiner Professor Sead Muftic Department of ICT KTH University SE-100 44 Stockholm, Sweden TRITA–ICT–EX-2015:2 Abstract | iii Abstract Instant messaging (IM) applications are one of the most popular applications for smartphones. The IMs have the capability of sending messages or initiating voice calls via Internet which makes it almost cost free for the users to communicate with each other. Unfortunately, like any other type of applications, majority of these applications are vulnerable to malicious attacks and have privacy issues. The motivation for this thesis is the need to identifying security services of an IM application and to design a secure system for any mobile messaging application. This research proposes an E2EE (End-to-End Encryption) approach which provides a secure IM application design which protects its users with better integrity, confidentiality and privacy. To achieve this goal a research is conducted to investigate current security features of popular messaging applications in the mobile market. A list of requirements for good security is generated and based on those requirements an architecture is designed. A demo is also implemented and evaluated. Keywords: Mobile, Application, messaging, Chat, Encryption, Security Acknowledgments | v Acknowledgments First and foremost, thank you God to give me another chance to complete my higher education and to learn enormous skills and knowledge through all these years of study at the university. -
Contextual Typeahead Sticker Suggestions on Hike Messenger
Contextual Typeahead Sticker Suggestions on Hike Messenger Mohamed Hanoosh1 , Abhishek Laddha1 and Debdoot Mukherjee1 1Hike Messenger, New Delhi, India fmoh.hanoosh, abhishekl, [email protected], Abstract In this demonstration, we present Hike’s sticker recommendation system, which helps users choose the right sticker to substitute the next message that they intend to send in a chat. We describe how the system addresses the issue of numerous ortho- graphic variations for chat messages and operates under 20 milliseconds with low CPU and memory footprint on device. 1 Introduction In messaging apps such as Facebook Messenger, WhatsApp, Line and Hike, new modalities such as emojis, gifs and stick- Figure 1: Sticker Recommendation UI and a high level flow diagram ers are extensively used to visually express thoughts and emo- tions [Lim, 2015; Donato and Paggio, 2017; Barbieri et al., the most relevant stickers for a given chat context defined by 2017]. While emojis are mostly used in conjunction with text, the previous message(s) and the text typed in the chat input stickers can provide a graphic alternative for text messages box. However, due to frequent additions to the sticker inven- altogether. Hike1 stickers are composed of an artwork (e.g., tory and a massive skew in historical usage toward a hand- cartoonized characters and objects) and a stylized text for a ful of popular stickers, it becomes difficult to collect reliable, commonly used chat phrase (See stickers in Fig. 1). Hike unbiased data to train such an end-to-end model. Moreover, has tens of thousands of such stickers in different languages an end-to-end model will need to be retrained frequently to so that its users can engage in rich conversations by chatting support new stickers and the updated model will have to be with stickers back to back. -
Contextual Typeahead Sticker Suggestions on Hike Messenger
Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence (IJCAI-19) Contextual Typeahead Sticker Suggestions on Hike Messenger Mohamed Hanoosh , Abhishek Laddha and Debdoot Mukherjee Hike Messenger, New Delhi, India fmoh.hanoosh, abhishekl, [email protected] Abstract In this demonstration, we present Hike’s sticker recommendation system, which helps users choose the right sticker to substitute the next message that they intend to send in a chat. We describe how the system addresses the issue of numerous ortho- graphic variations for chat messages and operates under 20 milliseconds with low CPU and memory footprint on device. 1 Introduction In messaging apps such as Facebook Messenger, WhatsApp, Line and Hike, new modalities such as emojis, gifs and stick- Figure 1: Sticker Recommendation UI and a high level flow diagram ers are extensively used to visually express thoughts and emo- tions [Lim, 2015; Donato and Paggio, 2017; Barbieri et al., the most relevant stickers for a given chat context defined by 2017]. While emojis are mostly used in conjunction with text, the previous message(s) and the text typed in the chat input stickers can provide a graphic alternative for text messages box. However, due to frequent additions to the sticker inven- altogether. Hike1 stickers are composed of an artwork (e.g., tory and a massive skew in historical usage toward a hand- cartoonized characters and objects) and a stylized text for a ful of popular stickers, it becomes difficult to collect reliable, commonly used chat phrase (See stickers in Fig. 1). Hike unbiased data to train such an end-to-end model. -
United States District Court for the Eastern District of Texas Marshall Division
Case 2:13-cv-00948-JRG-RSP Document 18 Filed 07/21/14 Page 1 of 14 PageID #: 158 UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF TEXAS MARSHALL DIVISION MOBILE TELECOMMUNICATIONS § TECHNOLOGIES, LLC, § Plaintiff, § Civil Action No. 2:13-cv-948-JRG-RSP v. § § JURY TRIAL REQUESTED HTC AMERICA, INC., § Defendant. § PLAINTIFF MOBILE TELECOMMUNICATIONS TECHNOLOGIES, LLC’S AMENDED COMPLAINT Plaintiff Mobile Telecommunications Technologies, LLC (“MTel” or “Plaintiff”) by and through its undersigned attorneys, hereby pleads the following claims for patent infringement against Defendant HTC America, Inc. (“HTC” or “Defendant”) and alleges as follows. THE PARTIES 1. Plaintiff MTel is a Delaware limited liability company having a principal place of business at 1720 Lakepointe Drive, Suite 100 Lewisville, TX 75057. MTel is a wholly owned subsidiary of United Wireless Holdings, Inc. (“United Wireless”). In 2008, United Wireless, through another of its wholly owned subsidiaries, Velocita Wireless, LLC, purchased the SkyTel wireless network from Bell Industries, including assets related to SkyTel’s more than twenty year history as a wireless data company. Velocita Wireless, LLC, continued to operate the SkyTel wireless data network after the acquisition. As a result of that transaction, United Wireless gained ownership and control over the portfolio of intellectual property, including patents, developed over the years by several SkyTel-related entities, including Mobile Telecommunication Technologies Corp. (“MTEL Corp.”), Destineer Corporation, and SkyTel Communications. United Wireless subsequently assigned certain of the patent assets, including PLAINTIFF MOBILE TELECOMMUNICATIONS TECHNOLOGIES, LLC’S AMENDED COMPLAINT 740352V.1 Case 2:13-cv-00948-JRG-RSP Document 18 Filed 07/21/14 Page 2 of 14 PageID #: 159 the patents-in-suit, together with all rights of recovery related to those patent assets to its wholly owned subsidiary, MTel, which is the plaintiff here. -
Hike: a Pedagogical Tool for Language Learning A
VEDA’S JOURNAL OF ENGLISH LANGUAGE AND LITERATURE (JOELL) Vol.3 An International Peer Reviewed Journal Spl.Issue 1 http://www.joell.in 2016 RESEARCH ARTICLE HIKE: A PEDAGOGICAL TOOL FOR LANGUAGE LEARNING A. Sherlin Raja (Research Scholar, Department of English, The American college,Madurai.) ABSTRACT “One can’t spell TEACH without T-E-C-H” Kevin Jarrett Technology plays a dynamic role in education but immense change in technology and the growing presence of the Internet has changed students for the past few decades.In the present scenario, young generation runs behind technology as technology rules in the 21st century.They are familiar with mobile phones, computers and digital cameras even from their childhood. There are some advantages and disadvantages in using social networks. Particularly, by using Hike messenger in the classroom,students’ participation will be more interactive, collaborative,and exploratory.They will become better problem solvers and autonomous learners. Connectivity means a lot to them and learning process will be student-centered. Without having an Internet connection the classroom learning can be effective by using hike.In addition to text messaging, image, video and audio, the learners can also send Pdf or any file document. This paper talks about student’s expectation and interest over Hike. Everyone has hike in his/her mobile phones or gadgets, which can provide a good access to teaching methods through Hike. Keywords: Technology, Mobile Phone, Hike, Collaborative Learning. © Copyright VEDA Publication 126 A. Sherlin Raja VEDA’S JOURNAL OF ENGLISH LANGUAGE AND LITERATURE (JOELL) Vol.3 An International Peer Reviewed Journal Spl.Issue 1 http://www.joell.in 2016 BACKGROUND OF THE STUDY everyday communication. -
Exinda Applications List
Application List Exinda ExOS Version 6.4 © 2014 Exinda Networks, Inc. 2 Copyright © 2014 Exinda Networks, Inc. All rights reserved. No parts of this work may be reproduced in any form or by any means - graphic, electronic, or mechanical, including photocopying, recording, taping, or information storage and retrieval systems - without the written permission of the publisher. Products that are referred to in this document may be either trademarks and/or registered trademarks of the respective owners. The publisher and the author make no claim to these trademarks. While every precaution has been taken in the preparation of this document, the publisher and the author assume no responsibility for errors or omissions, or for damages resulting from the use of information contained in this document or from the use of programs and source code that may accompany it. In no event shall the publisher and the author be liable for any loss of profit or any other commercial damage caused or alleged to have been caused directly or indirectly by this document. Document Built on Tuesday, October 14, 2014 at 5:10 PM Documentation conventions n bold - Interface element such as buttons or menus. For example: Select the Enable checkbox. n italics - Reference to other documents. For example: Refer to the Exinda Application List. n > - Separates navigation elements. For example: Select File > Save. n monospace text - Command line text. n <variable> - Command line arguments. n [x] - An optional CLI keyword or argument. n {x} - A required CLI element. n | - Separates choices within an optional or required element. © 2014 Exinda Networks, Inc. -
Dara: a Chatbot to Help Indian Artists and Designers Discover International Opportunities
Dara: A Chatbot to Help Indian Artists and Designers Discover International Opportunities Archana Prasad Indrani Medhi Thies significant time and effort. Typically, this is best done via Sean Blagsvedt Microsoft Research a human matchmaker - someone who knows of Tej Pochiraju Bangalore, India opportunities and makes introductions. However, this Jaaga [email protected] person might be limited by their own social circles and Bangalore, India knowledge. The few websites available are usually [email protected] intimidating and not personalized. Our vision is to design [email protected] and develop Dara, a conversational chatbot that asks a [email protected] series of questions to its users and is able to suggest relevant opportunities. As a first step we built a Wizard- of-Oz prototype and interviewed 9 users about their experience. We then designed the personality, conversation flow and referral nomination system for our Abstract next-level prototype. We conducted a preliminary Many designers and artists in India, because of limited evaluation with 14 users in Bangalore, India. We discuss domestic patronage, are interested in international the implications for design of chatbots targeted at the opportunities. However, they experience difficulties in creative community in the developing world. discovering such opportunities. Finding relevant grants, funds, residencies, jobs, and collaborators takes Author Keywords Permission to make digital or hard copies of part or all of this work for Chatbots; artists; designers; India personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. -
The Most Favourable Mobile Messaging Apps Among IIUM Students
International Journal of Science and Research (IJSR) ISSN (Online): 2319-7064 Impact Factor (2012): 3.358 The Most Favourable Mobile Messaging Apps among IIUM Students Ayn Nur Azhana Azhar Amanullah1, Noor Azian Mohamad Ali2 Department of Information Systems, Kulliyyah of Information and Communication Technology, International Islamic University Malaysia Abstract: Mobile messaging applications is rapid adopted globally. They allow mobile users to send messages to individuals or groups for very minimal fee, even some are totally free as long as the smartphones are connected to internet. WhatsApp is one of the top mobile messaging applications among a handful number of applications that have entered the market. The goal of this paper is to investigate the most favourable mobile messaging apps among IIUM students and to provide a feature comparison between a few selected mobile messaging applications. Despite the obvious of being a free application, this paper intends to investigate the other factors causing the widespread adoption of this mobile application especially among students. An online survey was distributed to 52 students from IIUM by using Google Docs to validate which mobile messaging applications are mostly used. Keywords: Mobile messaging apps, mobile instant messaging, smartphones, SMS, WhatsApp, features, IIUM 1. Introduction Facebook on February 19, 2014 [18]. After WhatsApp was first introduced to the market, a lot of other similar mobile Mobile messaging applications is not a new technology. It messaging apps have been emerged and continuously has been widely used ever since the mobile phone technology evolved [4]. Different mobile messaging apps provide takes over the telecommunication industry across the world. -
Evaluating the Usability of Mobile Instant Messaging Apps on Ios Devices
ICSEA 2015 : The Tenth International Conference on Software Engineering Advances Evaluating the Usability of Mobile Instant Messaging Apps on iOS Devices Sergio Caro-Alvaro, Antonio Garcia-Cabot, Eva Garcia-Lopez, Luis de-Marcos, Jose-Javier Martinez-Herráiz Computer Science Department University of Alcala Alcala de Henares, Spain [email protected]; [email protected]; [email protected]; [email protected]; [email protected] Abstract— Instant messaging apps are experiencing a get some guidelines or good practices for developers of significant upturn in recent years in mobile devices. This paper mobile IM apps. This paper shows a systematic evaluation of shows the results of applying a systematic evaluation of these instant messaging apps and the results obtained during this applications on iOS platform that was performed to identify evaluation. Finally, some recommendations are proposed their main usability issues. As a result of this evaluation some from a viewpoint of mobile usability. guidelines for improving the usability of these applications are The paper is organized as follows: Section 2 shows the proposed, such as a carefully designing the interface or not evaluation carried out and the results obtained in the exceeding more than eight (and preferably not more than six) systematic evaluation. Section 3 presents a discussion of the interactions to perform the main tasks. The results and the results with previous work and, finally, Section 4 explains guidelines proposed will help in the future to create more the recommendations and conclusions obtained from the effective mobile applications for instant messaging. results. Keywords- Instant messaging; mobile usability; keystroke II.