50/- `

ISSN 0970-647X | Volume No. 38 | Issue No. 6 | September 2014 38 | Issue No. No. | Volume 0970-647X ISSN The Doyen's Recollections Research Front (Reminiscences of Parallel Computing with Message Prof. V. Rajaraman) 7 Passing Interface-Part II 32

Cover Story Security Corner History of the Computers, A Review of Cyber Security GUI and Devices 19 Curriculum in Indian Context 38

Cover Story Security Corner Looking Back at the A Case Study of Orbit Evolution of the Internet 21 Offshore Services 41

www.csi-india.org www.csi-india.org CSI Communications | September 2014 | 1 CSI-2014 STUDENT CONVENTION Hosted by and at: Guru Nanak Institutions Technical Campus (Formerly Guru Nanak Engineering College) (Affi liated to Jawaharlal Technological University, Hyderabad) Ibrahimpatnam, Hyderabad. Theme: Campus to Corporate and Beyond Dates: 10 - 11 December 2014 As a part of Golden Jubilee Celebrations of Computer Society of India and 49th Annual Convention of Computer Society of India, the Student Convention of CSI will be held at Guru Nanak Institutions Technical Campus, Ibrahimpatnam, Hyderabad..

Last date for submission of papers: Nov 10, 2014. Fees (incl of Service Tax) for registration: Rs. 400 for CSI members and Rs. 500/- for non-CSI members. There is no fees for paper presentations. Papers should be submitted in A4 paper size and as per IEEE format and sent by e-mail given below. Acceptances of the papers will be communicated on or before 15th November, 2014. Free Accommodation will be made available from 9th night to 11th Dec., 2014 evening at Guru Nanak Institutions, Ibrahimpatnam, Hyderabad or near- by venue. For further details contact: [email protected] CSI Communications - Call for Articles for forthcoming issues Please note that Cover Themes for forthcoming issues are planned as follows: • October 2014 - SMAC (Send your articles for October 14 issue latest before 23rd September 2014) • November 2014 – Visualization Technologies • December 2014 – Algorithmic Computing • January 2015 – IT Infrastructure • February 2015 – Quantum Computing • March 2015 – Machine Translation In order to provide a fair opportunity to all for contribution, we are making an open appeal to all of you to send your articles for CSI Communications magazine. Kindly note that the Editorial Board of CSI Communications is looking for high quality technical articles for diff erent columns pertaining to the above themes or other themes of emerging and current interests. The articles should cover all aspects of computing, information and communication technologies that should be of interest to readers at large and member fraternity of CSI and around. The articles shall be peer reviewed by experts decided by the Editorial Board and the selected ones shall be published. Both theoretical and practice based articles are welcome but not research papers. The articles and contributions may be submitted in the following categories: Cover Story, Research Front, Technical Trends and Article. CIOs/Senior IT/IS personnel/consultants of the companies, who are managing technologies/projects related to the cover themes are welcome to contribute under the CIO Perspective - Managing Technology section. Similarly, HR Senior Managers/ Personnel/ Consultants are invited to contribute under HR section. Letters to the Editors for ReaderSpeak(), questions to be answered in Ask an Expert, your experience of Programming Tips under the Practitioner Workbench: Programming.Tips(), your memories of yesteryears of computing for IT.Yesterday(), theme based crossword puzzle and theme based cartoon for Brain Teaser column are also welcome. Here are article submission guidelines for your information: • The articles may be long (2500-3000 words) or short (1000-1500 words) authored in as the original text. (Plagiarism is strictly prohibited.) • The articles may be sent to the CSI Editorial Board via email [email protected]. • All manuscripts should be written at the level of the general audience of varied level of members. • Equations and mathematical expressions within articles are not recommended, however, if absolutely necessary, should be minimum. • List of references is preferred and it is recommended that list not more than 10 references at the end of your manuscript. Please don’t include any embedded reference numbers within the text of your article. If you would to like to refer, you may state names in the text and provide full reference at the end. The reference must state the names of the authors, title, publisher’s name, complete publication reference with month and year. Web URLs should be there for website references with accessed date. • Figures and Images used should be limited to maximum of three (only high resolution images need to be sent, and the image needs to be sent separately also). • Only MS-Word and PDF submissions are allowed. • Include a brief biography of four to six lines for each author with author picture (high resolution). • Please note that Editors will edit the contents as felt necessary. • Editorial board will notify the authors of selected articles and authors will be asked to fi ll up the copyright transfer form before accepting the article. Please note that months for various cover themes are tentative and may change depending on prevailing circumstances. (Issued on behalf of Editorial Board of CSI Communications)

CSI Communications | September 2014 | 3 CSI Communications Contents

Volume No. 38 • Issue No. 6 • September 2014

Editorial Board The Doyen's Recollection Prof. Dr. V Rajaraman: A brief Strolling Down the Memory Lane Chief Editor biographical sketch Dr. S. Natarajan Dr. R M Sonar 7 30 The First Book on Programming in India Editors 8 Research Front Dr. Debasish Jana Parallel Computing with Message Dr. Achuthsankar Nair How Computer Society of India got 32 Passing Interface its Name Manu K. Madhu and Biji C.L. Resident Editor How the MCA Programme Started Mrs. Jayshree Dhere Practitioner Workbench 9 Programming.Tips() » History of the Establishment of the Fun with C Centre for Development of Advanced 36 10 Amitava Nag Computing Programming.Learn(“R”) » Published by Time-Line – Development of Computing Executive Secretary Regression Analysis with R 12 in India (1955-2010) Umesh P and Silpa Bhaskaran Mr. Suchit Gogwekar Dr. V Rajaraman 37 For Computer Society of India Cover Story Security Corner Design, Print and Information Security » History of the Computers, GUI and Dispatch by Devices A Review of Cyber Security CyberMedia Services Limited 19 38 Radharaman Mishra Curriculum in Indian Context C. R. Suthikshn Kumar Looking Back at the Evolution of the Case Studies in IT Governance, IT Risk Internet 21 and Information Security » Hardik A Gohel 41 A Case Study of Orbit Off shore A Brief History of BIDW (Business Services 25 Intelligence and Data Warehousing) Dr. Vishnu Kanhere Mr. K. V. N. Rajesh and Mr. K. V. N. Ramesh

Please note: CSI Communications is published by Computer Society of India, a non-profi t organization. Views and opinions expressed in the CSI Communications are those of individual authors, contributors and advertisers and they may diff er from policies and offi cial statements of CSI. These should not be construed as legal or professional advice. The CSI, the publisher, the editors and the contributors are not responsible for any decisions taken by readers on the basis of PLUS these views and opinions. Although every care is being taken to ensure genuineness of the writings in this publication, User Readership Survey 2014: CSI Communications & Members Data Updation 26 CSI Communications does not attest to the originality of the respective authors’ content. © 2012 CSI. All rights reserved. Brain Teaser Dr. Debasish Jana 43 Instructors are permitted to photocopy isolated articles for non-commercial classroom use Happenings@ICT without fee. For any other copying, reprint or 44 republication, permission must be obtained H R Mohan in writing from the Society. Copying for other than personal use or internal reference, or of CSI Report - CSI Golden Tech Bridge Program 45 articles or columns not owned by the Society without explicit permission of the Society or the copyright owner is strictly prohibited. CSI News 47

Published by Suchit Gogwekar for Computer Society of India at Unit No. 3, 4th Floor, Samruddhi Venture Park, MIDC, Andheri (E), Mumbai-400 093. Tel. : 022-2926 1700 • : 022-2830 2133 • Email : [email protected] Printed at GP Off set Pvt. Ltd., Mumbai 400 059.

CSI Communications | September 2014 | 4 www.csi-india.org Know Your CSI

Executive Committee (2013-14/15) »

President Vice-President Hon. Secretary Hon. Treasurer Mr. H R Mohan Prof. Bipin V Mehta Mr. Sanjay Mohapatra Mr. Ranga Rajagopal [email protected] [email protected] [email protected] [email protected] Immd. Past President Prof. S V Raghavan [email protected]

Nomination Committee (2014-2015) Prof. P. Kalyanaraman Mr. Sanjeev Kumar Mr. Subimal Kundu

Regional Vice-Presidents Region - I Region - II Region - III Region - IV Mr. R K Vyas Mr. Devaprasanna Sinha Prof. R P Soni Mr. Hari Shankar Mishra Delhi, Punjab, Haryana, Himachal Assam, Bihar, West Bengal, Gujarat, Madhya Pradesh, Jharkhand, Chattisgarh, Pradesh, Jammu & Kashmir, North Eastern States Rajasthan and other areas Orissa and other areas in Uttar Pradesh, Uttaranchal and and other areas in in Western India Central & South other areas in Northern India. East & North East India [email protected] Eastern India [email protected] [email protected] [email protected] Region - V Region - VI Region - VII Mr. Raju L kanchibhotla Dr. Shirish S Sane Mr. S P Soman Publication Committee (2014-15) Karnataka and Andhra Pradesh Maharashtra and Goa Tamil Nadu, Pondicherry, [email protected] [email protected] Andaman and Nicobar, Dr. S S Agrawal Chairman Kerala, Lakshadweep Prof. R K Shyamasundar Member [email protected] Prof. R M Sonar Member Dr. Debasish Jana Member Division Chairpersons Dr. Achuthsankar Nair Member Dr. Anirban Basu Member Division-I : Hardware (2013-15) Division-II : Software (2014-16) Division-III : Applications (2013-15) Prof. A K Saini Member Prof. M N Hoda Dr. R Nadarajan Dr. A K Nayak Prof. M N Hoda Member [email protected] [email protected] [email protected] Dr. R Nadarajan Member Division-IV : Communications Division-V : Education and Research Dr. A K Nayak Member (2014-16) (2013-15) Dr. Durgesh Kumar Mishra Member Dr. Durgesh Kumar Mishra Dr. Anirban Basu Mrs. Jayshree Dhere Member [email protected] [email protected] Important links on CSI website » About CSI http://www.csi-india.org/about-csi Membership Subscription Fees http://www.csi-india.org/fee-structure Structure and Orgnisation http://www.csi-india.org/web/guest/structureandorganisation Membership and Grades http://www.csi-india.org/web/guest/174 Executive Committee http://www.csi-india.org/executive-committee Institutional Membership http://www.csi-india.org/web/guest/institiutional- Nomination Committee http://www.csi-india.org/web/guest/nominations-committee membership Statutory Committees http://www.csi-india.org/web/guest/statutory-committees Become a member http://www.csi-india.org/web/guest/become-a-member Who's Who http://www.csi-india.org/web/guest/who-s-who Upgrading and Renewing Membership http://www.csi-india.org/web/guest/183 CSI Fellows http://www.csi-india.org/web/guest/csi-fellows Download Forms http://www.csi-india.org/web/guest/downloadforms National, Regional & State http://www.csi-india.org/web/guest/104 Membership Eligibility http://www.csi-india.org/web/guest/membership-eligibility Student Coordinators Code of Ethics http://www.csi-india.org/web/guest/code-of-ethics Collaborations http://www.csi-india.org/web/guest/collaborations From the President Desk http://www.csi-india.org/web/guest/president-s-desk Distinguished Speakers http://www.csi-india.org/distinguished-speakers CSI Communications (PDF Version) http://www.csi-india.org/web/guest/csi-communications Divisions http://www.csi-india.org/web/guest/divisions CSI Communications (HTML Version) http://www.csi-india.org/web/guest/csi-communications- Regions http://www.csi-india.org/web/guest/regions1 html-version Chapters http://www.csi-india.org/web/guest/chapters CSI Journal of Computing http://www.csi-india.org/web/guest/journal Policy Guidelines http://www.csi-india.org/web/guest/policy-guidelines CSI eNewsletter http://www.csi-india.org/web/guest/enewsletter Student Branches http://www.csi-india.org/web/guest/student-branches CSIC Chapters SBs News http://www.csi-india.org/csic-chapters-sbs-news Membership Services http://www.csi-india.org/web/guest/membership-service Education Directorate http://www.csi-india.org/web/education-directorate/home Upcoming Events http://www.csi-india.org/web/guest/upcoming-events National Students Coordinator http://www.csi-india.org/web/national-students- Publications http://www.csi-india.org/web/guest/publications coordinators/home Student's Corner http://www.csi-india.org/web/education-directorate/student-s-corner Awards and Honors http://www.csi-india.org/web/guest/251 CSI Awards http://www.csi-india.org/web/guest/csi-awards eGovernance Awards http://www.csi-india.org/web/guest/e-governanceawards CSI Certifi cation http://www.csi-india.org/web/guest/csi-certifi cation IT Excellence Awards http://www.csi-india.org/web/guest/csiitexcellenceawards Upcoming Webinars http://www.csi-india.org/web/guest/upcoming-webinars YITP Awards http://www.csi-india.org/web/guest/csiyitp-awards About Membership http://www.csi-india.org/web/guest/about-membership CSI Service Awards http://www.csi-india.org/web/guest/csi-service-awards Why Join CSI http://www.csi-india.org/why-join-csi Academic Excellence Awards http://www.csi-india.org/web/guest/academic-excellence- Membership Benefi ts http://www.csi-india.org/membership-benefi ts awards BABA Scheme http://www.csi-india.org/membership-schemes-baba-scheme Contact us http://www.csi-india.org/web/guest/contact-us Special Interest Groups http://www.csi-india.org/special-interest-groups Important Contact Details » For queries, correspondence regarding Membership, contact [email protected]

CSI Communications | September 2014 | 5 H R Mohan President’s Message From : President’s Desk:: [email protected] Subject : President's Message Date : 1st September, 2014

Dear Members I am happy to inform that the National Final Competition for Young Talent Search Computer Programming 2014 was successfully conducted at the Rajalakshmi Engineering College (REC) on 31st Aug 2014 with CSI veterans Mr. G. Ramachandran, Mr. S. Venkatakrishnan and Ms. Latha Ramesh as judges. Ten teams selected out of 200+ from the prelims conducted at 21 centres across the country participated in the fi nals. While the team from St. Jude’s Public School & Junior College, Kotagiri stood fi rst, the team from Rishy Valley School (KFI). Madanapalle was the runner up. I could witness the keen & competitive interest of the teams participated in the contest. Cash awards along with trophies were presented to both the winning teams who will represent India in the SEARCC ISSC-2014 to be held at Chennai during October 2014. Let us wish these teams all the very best in the ISSC-2014. Our thanks to the management of REC for supporting the contest for several years and also for consenting to host ISSC-2014. The Div IV supported International Conference on Innovations in Computer Science & Engineering – ICICSE 2014 took place at Gurunanak Institutions at Hyderabad during 8-9, Aug 2014. The conf. attracted about 200 to suit all the SEARCC economies. Few divisions and SIGs may plan for these papers of which 60 were presented in parallel sessions. The conf. proceedings SEARCC 2014 online events. Depending on the success of this initiative, it was of the papers presented and the souvenir with the abstracts of all the papers deliberated whether we can make SEARCC conf. an online only event involving submitted have come out very well and they are being added in our reference other economies also to make them participate to start with and facilitating library at CSI ED. Dr. H.S. Saini & Dr. D.D. Sarma and their team had run the them to become members of SEARCC subsequently. As the World Computer conf. in a splendid manner and this has given us the confi dence that the Student Congress WCC-2015 of IFIP is being held in South Korea, the SEARCC 2015 may Convention to be hosted by GNI during CSI 2014 is in safe hands. Vice President become the fi rst full-fl edged online conference. Mr. Bipin Mehta and the Chair, Div Iv Dr. Durgesh Kumar Mishra participated in On the invitation from the Computer Society of Sri Lanka, the undersigned the conf. along with the President. attended and presented a session on “ICT growth and challenges in India” in their Hyderabad witnessed one more event supported by CSI – a National annual fl agship event National Information Technology Conference NITC-2014 Workshop on Big Data – BiDA2014 which was held during 22-24, August held prior to SEARCC EXCO during 25-27 Aug 2014. The inauguration ceremony 2014 at CR Rao Advanced Institute of Mathematics, Statistics and Computer of the NITC-2014 was held at the Main Conference Hall of the Bandaranaike Science. This intensive workshop inaugurated by the CSI President had invited International Conference Hall (BMICH), Colombo and was attended by about talks on various aspects of Big Data from seasoned academic and professional 800 participants. The conference had 15 international speakers including community such as IIITH, IISc, UOH, BITS, AIMSCS, CDAC and hands-on Mr. Leon Strous, IFP President, Mr. H.R. Mohan, CSI President, Ms Brenda Aynsley, sessions at Centre for Modelling, Simulation and Design at Univ. of Hyderabad. ACS President, Prof. Tim Unwin, Secretary General of the Commonwealth Dr. Saumyadipta Pyne, the key anchor for this workshop has in principle agreed Telecommunication Organisation & Unesco chair In ICT4D, Mr. Tim Greisinger, to run similar workshops and also an online course for CSI through the proposed Vice President, IBM, Mr. Anthony Ming, Adviser (Informatics), Commonwealth Special Interest Group on Data Science and Analytics or joining with the existing Secretariat, Dr. Nick Tate, Imm. Past President, ACS, Mr. Yohan, Secretary SIG DATA. General, SEARCC. Considering the relevance of CHOGM 2013 theme “Growth Dr. Bagga and Dr. Ashok Agarwal, the veterans who had played major and Equity: Inclusive Development”, NITC 2014 was positioned as an ICT forum roles in organizing few highly successful CSI annual conventions at Hyderabad for commonwealth nations organized by the Computer Society of the CHOGM had organised a brainstorming session at IIITH on 22nd Aug in connection host country to create a platform to deliberate on the role of ICT in citizen centric with the eGovernance Track and Knowledge Sharing Summit during CSI 2014. development in the commonwealth beyond Millennium Development Goals It may be noted that CSI eGovernance State/Project Awards are being given (MDG) of which deadline reaches in 2015. The conference agenda has focused during annual conventions for the last 12 years and the SIG eGOV has been deliberations on topics relevant to commonwealth countries on developing spearheading the major activities in sharing knowledge in eGov domain in a collaborative and connected commonwealth to ICT knowledge and Knowledge Sharing Summits. Along with the President, CSI 2014 team and the resources to synergize eff orts to advance the social development. eGov awards team consisting of Dr. Surendra kappor, Dr. Harish Iyer and Mr. As the revenues from IT services are under stress, the only way to achieve Vijaya Sekhar deliberated on the modalities and the events to be organized in our projected growth in IT revenues is by innovation and IP development. In this the context of divided Andhra. All the teams were sensitized to organize a great context, it is a timely initiative by CSI Kochi to start an innovation hub on an eGov awards event at CSI 2014. experimental basis with the support of Startup Village at Kochi. Mr. Santosh The CSI ED supported Golden Tech Bridge event held on 9th Aug was Kumar, Secretary of CSI Kochi is taking the lead in this initiative. Based on its a great success and it has made a signifi cant impact among the public at success, we would like to replicate it in other chapters. large. Over 60 institutions organized this programme which was attended by I am happy to note that the newly formed SIGs – Indic Computing and housewives, retired people, people from lower strata including shopkeepers and Technology Enhanced Learning are coming out with their newsletters – “Indic auto drivers. Apart from providing basic computer skills and knowledge, the News” and “Title” respectively. Thanks to Dr. B. Kannan and Dr. M. Sasikumar for participants were taught how to use various eServices of the Govt., railway ticket their sustained interest in SIG activities. Members may look forward to receive booking, online banking etc., The reports received from the institutions highlight them soon. the appreciations by the participants and the demand to run similar events at Digital India, the dream project of our PM, announced in Aug 2014 will regular intervals. This is a great step towards bridging the digital divide. While be the umbrella programme for the government’s initiatives in the area Digital we have a long way to go. I am sure with the support of our SBs we can achieve Literacy for all and transparent eGovernance and will entail an expenditure of our objectives. Rs 1.13 lakh crore in existing and new plans. More about Digital India initiatives In the EXCO of the SEARCC held at Colombo on 28th Aug, the possibility in the next month. of hosting the SEARCC 2014 by Malaysia was discussed. As MNCC had Let us promote the individual life membership in CSI at a 15% discount expressed their inability to host the event in 2014 and the possibility of being off ered for a limited period from 1st Aug to 31st Dec 2014. organizing it during Feb 2015 only, it was decided to run SEARCC 2014 in online mode with few online video streaming sessions covering technology trends and country initiatives presented by SEARACC member counties. India, Australia With best regards and Srilanka have come forward to take this initiative forward and make it a standard feature to share the knowledge among its members. The undersigned H R Mohan suggested that these online sessions relating to SERACC 2014 may be organized President in the fi rst week of Dec 2014 to coincide with CSI 2014 at some convenient time Computer Society of India

CSI Communications | September 2014 | 6 www.csi-india.org Rajendra M Sonar, Achuthsankar S Nair, Debasish Jana and Jayshree Dhere Editorial Editors

Dear Fellow CSI Members,

We are glad to bring this special issue on IT History to you. Our model used in high performance computing. The second part previous issue on this theme had seen tremendous infl ow of appearing in this issue provides information on writing MPI contributions and also many responses from readers. We had subroutines and presents toy examples to illustrate the concept. decided at that time itself that we would repeat the history theme In the Information Security section of Security Corner column once again and so there is this special issue on IT History for all we have an article written by Dr. C. R. Suthikshn Kumar titled of you. It’s an absolute pleasure to put on record that this time “A Review of Cyber Security Curriculum in Indian Context”. In also we received a good response for this theme in terms several the light of growing need of cyber security professionals to help contributions. guard country’s cyber boundaries, the article focuses on how the This month’s highlight is many reminiscences of the doyen of Indian curriculum should be designed for creating highly skilled cyber computing fraternity, Prof. V. Rajaraman. In the special section security professionals. Dr. Vishnu Kanhere of CSI-SIG on Humane called “The Doyen’s Recollections”, we have an assortment of 5 Computing continues to contribute to section of ‘Case Studies in crisp articles by Prof. Rajaraman, which spans the academia, R & D IT Governance, IT Risk and Information Security’ under Security and also CSI itself. These articles - “The First Book of Programming Corner column. This time Dr. Kanhere writes about the case study in India”, “How CSI got its name”, “How MCA program started”, of Orbit Off shore Services, which highlights how history can “Establishment of CDAC” and “Timeline of development of computing in India” are all collectors’ pieces. We are sure that This time Dr. Kanhere writes about the case study these articles have made this issue a very precious one. of Orbit Off shore Services, which highlights how In addition to Prof. Rajaraman’s contributions, under the Cover Story section, we have four articles. First is on “History of history can serve the purpose of an early warning Computers, GUI and Devices” written by Radharaman Mishra system and how important learning from historical of iGate. This is a very well-written article that describes history events can be. and timeline of computers and related devices through various generations and also peeks into the future at the end. Second article is on “Looking Back at the Evolution of Internet” by Hardik serve the purpose of an early warning system and how important Gohel. It tells us about the history of the Internet and of course learning from historical events can be. the Web which greatly revolutionalized the way information is In our regular section called Programming.Tips() under Practitioner accessed today online all over the globe. The article talks about Workbench column, we have an article written by Amitava Nag electronic mail, social networking, various versions of Web – Web on “Fun with C” where he discusses whether it is possible to 1.0, Web 2.0, Web 3.0 (Semantic Web) etc and fi nally speaks have a function in C program that accepts variable number of about the future of the Web in terms of Web Intelligence. parameters. As usual Umesh P. and Silpa Bhaskaran continue their The third article under the cover story section is about “Brief write-ups under Programming.Learn(“R”) and this time they write History of BIDW (Business Intelligence and Data Warehousing)” about “Regression Analysis in R”. written by K.V.N. Rajesh and K.V.N. Ramesh. The article traces the Dr. Debasish Jana, Editor, CSI Communications presents timeline of how BIDW technology has come way forward from crossword for those who want to challenge themselves under the time of advent of computers to the state in which we see it Brain Teaser column. CSI President H. R. Mohan brings us the ICT now and concludes saying that the usage and support for BIDW News Briefs in August 2014 at a glance under various sectors in in Businesses is only expected to grow in future. The fourth article his regular column Happenings@ICT. Due to shortage of space we “Strolling down the Memory Lane” is written Dr. S. Natarajan, who are omitting Innovations in India, Ask an Expert and On the Shelf takes us 42 years back in time when he worked in DRDL and tells Columns in this issue. us about the way computing was being done then. However, we have other regular features like CSI Announcements, Our Research Front section carries an article titled “Parallel CSI Reports and Chapter and Student Branch News. We also have Computing with Message Passing Interface” written by Manu Call for Contributions where we provide tentative list of future K. Madhu and Biji C.L. The article is continuation of the fi rst part cover themes of CSIC. which was published in last month’s issue i.e. CSIC August 2014 There is a special user readership survey being carried out and we request you all to respond to it wholeheartedly and provide This month’s highlight is many reminiscences of details that are asked for. Please remember we do welcome your the doyen of Indian computing fraternity, Prof. feedback and responses at the email id [email protected] V. Rajaraman. In the special section called “The We wish all readers pleasant and fruitful reading. Doyen’s Recollections”, we have an assortment of 5 crisp articles by Prof. Rajaraman, which spans the academia, R & D and also CSI itself. With warm regards, Rajendra M Sonar, Achuthsankar S Nair, issue. The fi rst part provided introduction to parallel computing Debasish Jana and Jayshree Dhere and use of MPI (Message Passing Interface) which is a dominant Editors

CSI Communications | September 2014 | 7 It’s a pleasure to receive several contributions from Prof. V. Rajaraman for CSI Communications’ special issue on IT History. Very recently Prof V. Rajaraman was honored with the award of D. Sc. (Honoris Causa) from IIT Kanpur on June 18th, 2014. A link to the video coverage of the award ceremony is available at iitk.vmukti.com. He has contributed five articles for this issue providing information on –First programming book in India, How CSI got its name, How MCA program started, Establishment of CDAC and Timeline of development of computing in India.

Prof. Dr. V Rajaraman: A brief biographical sketch Prof. Rajaraman was awarded the Padma Bhushan by the President of India in 1998. He V. Rajaraman, PhD(Wisconsin) is a Fellow of the Computer Society is Honorary Professor of India, the Indian National in the Supercomputer Science Academy, the Indian Education and Research Academy of Sciences, Centre(SERC) at National Academy the Indian Institute of of Sciences,Indian Science, Bangalore. He National Academy of was previously TataChem Engineering, and the Professor and Chairman of Institution of Electronics and SERC, IISc (1982-1994), Telecommunication Engineers. IBM Professor of Prof. V.Rajaraman giving acceptance speech aft er receiving Among the many honours IT at the Jawaharlal honorary D.Sc. of IIT,Kanpur on 18 June 2014 and prizes that he has Nehru Centre for received are Shanti Swarup Advanced Scientifi c Research, Bangalore (1994- Bhatnagar Prize (1976), 2001), and Professor of Electrical Engineering Homi Bhabha Prize (1984) by UGC, Indian and Computer Science at IIT,Kanpur (1966- Society of Technical Education award for 1982). He was an Assistant Professor of Statistics excellence in Teaching (1988), Om Prakash at the University of Wisconsin, Madison (1961- Bhasin Prize (1992), Rustom Choksi Award 62), a visiting Assistant Professor of Electrical (1993) by IISc, Zaheer Medal (1998) by the Engineering and Computer Science at the Indian National Science Academy, and the University of California, Berkeley (1965-66), Life Time Contributions award by the Indian and an IBM Research Fellow at the IBM National Academy of Engineering, Dataquest, Systems Development Institute, Canberra, Computer Society of India, and the Systems Australia (1973-74). He is an author of 23 Society of India. He was awarded an Honorary widely used text books and numerous research DSc (Engineering) by the Bengal Science and papers in computer science and has guided 30 Engineering University, Sibpur in 2012, and an PhD students. Honorary DSc by IIT/Kanpur in 2014. n

CSICCSSI CoCommunicationsommmuunniccatatioonss | SeptemberSeS ptp emmbeb r 220140014 | 8 wwwwww.csi-india.orgwww.csc i--indiaa.orrg Doyen's Prof. V. Rajaraman Recollections Supercomputer Education and Research Centre, Indian Institute of Science, Bangalore

The First Book on Programming in India

It all started with the arrival of an IBM called FORGO, one lecture on numerical book published so that more persons can 1620 mainframe computer at IIT/Kanpur methods and the third on computer logic. read it. I sent the book to several publishers in August 1963. This computer was the This was followed by 3 hour laboratory but they were not interested in publishing fi rst one with a compiler to sessions on programming for batches of 20 it. They felt that there was no market in be installed in India. It was gifted to IIT/ participants. The batch size was limited to India for a book on computer programming. Kanpur by the Kanpur Indo American 20 as we had only 25 key punch machines Only one publisher, Prentice-Hall of India, Programme (KIAP) funded by the using which participants in the course showed some interest. I insisted that the United States Agency for International punched their programs on 80 column book should be priced below Rs.15 so that it Development. KIAP was a consortium of cards. Program decks of participants will be aff ordable to students. Prentice-Hall nine top U.S. universities including MIT, were submitted as a batch to computer of India Managing Director at that time CalTech, University of California, Berkeley, operators who ran them. Mr. Neville Gosling fi nally agreed in August Princeton, and Purdue. The computer was As no inexpensive books were available 1967 to publish the book (after getting the installed by the engineers of IBM (India). to teach programming I was persuaded to book reviewed) with the stipulation that KIAP had sent three Professors during write notes on programming. Originally I give a “camera ready” copy by getting it 1963-64 to help in installing the software they were distributed as cyclostyled notes typed using an IBM electric typewriter. It and teach how to program the computer. to the participants. At the same time, IIT/ was done on A4 size paper with drawings Professor Harry Huskey from the University Kanpur faculty decided to teach a course on drawn using India ink on tracing paper. of California, Berkeley was the head of computer programming as a compulsory The book titled “Principles of Computer the team. Prof. Huskey was a pioneer in course to all engineering students. Each Programming” was fi nally published in July computing, having been a member of the batch had 300 students and the notes 1969. The fi rst print run was 3000 copies. ENIAC team and also a member of the were used to teach the course beginning Prentice-Hall of India had hoped that they team which built the ACE computer at in 1964/65. The notes titled “Principles will be able to sell the fi rst print in three the National Physical Laboratories, U.K., of Computer Programming” was printed in years. To their utter surprise and mine by under the leadership of Alan Turing. He the graphic arts section of IIT/Kanpur and December 1969, 2500 copies were sold was one of the early Presidents of the sold by the campus book store for Rs.5/-. and a second printing came out in May Association for Computing Machinery The book was bought not only by IIT/ 1970. Even though there were not many (ACM), U.S.A. The other members of the Kanpur students but also by outsiders who computers in India there was tremendous team were Prof.Forman Acton, a numerical visited IIT/Kanpur. curiosity and eagerness to lean about analyst, and Prof. Irving Rabinowitz, a I spent the year 1965-66 at the computers and programming. The book systems programmer both from Princeton University of California, Berkeley, as a fulfi lled that need. University. As soon as the computer Visiting Assistant Professor and showed This book was followed by a revised was installed, Prof.Huskey and his team my programming notes to some colleagues edition titled “Computer Programming in planned a course in programming for IIT/ there for their comments. They suggested FORTRAN IV”, and later as FORTRAN 77 Kanpur faculty and research students. He small changes and I polished the notes. On (including an introduction to FORTRAN then took a pro-active step in spreading return to India in August 1966, I got involved 90). The 51st printing of this book appeared computer education not only to the IIT/ again in teaching the programming course in July 2013. Even today the latest version Kanpur community but also to researchers to students as well as the participants of the fi rst programming book is being sold in CSIR, DRDO, and other laboratories of the intensive courses. I requested my steadily, although not in large numbers, in and Universities. Beginning in December colleague Prof. H N Mahabala to review spite of FORTRAN having been superseded 1963, IIT/Kanpur started 10 day intensive my notes and he did a commendable by Pascal, C, C++, and Java. It is also gratifying courses in computing which was continued job and gave numerous suggestions for that whenever I meet engineers/scientists and given thrice a year by the IIT/Kanpur improvement as he was also teaching in their 50s they remember that they learnt faculty till 1972. Sixty participants were the intensive course as well as the programming using the FORTRAN book admitted to each course and it consisted undergraduate course on computing. The describing its unusual A4 size and the colour of three lectures, one on programming thought then occurred, with persuasion by of its cover which changed from silver grey using a load and go version of FORTRAN my wife Dharma, that I should try to get the to chocolate to yellow and fi nally blue. n How Computer Society of India got its Name

Indian Institute of Technology, Kanpur was an IBM 1620 with 60K digit memory, three engineers in a large air conditioned room. the fi rst educational institution in India tapes, punched card I/O and an arithmetic IIT/Kanpur was assisted by a consortium to install a mainframe computer with a unit which did arithmetic by table look of nine top Universities including FORTRAN compiler in August 1963. It was up! The computer was installed by IBM MIT, CalTech, Princeton, University of

CSI Communications | September 2014 | 9 California, Berkeley, and Purdue University. organized an International Conference on Friday, December 14, 1964 afternoon Prof.Harry Huskey of the University of Computers at IIT/Kanpur, funded by the where a consensus was reached that the California, Berkeley, was the leader of an United States Agency for International All India Computer Users’ Group was American faculty team who had come Development and the Ford Foundation, not an appropriate forum for scholarly to help install the computer and to teach with the primary goal of discussing discussions and for presenting results of programming, numerical methods, and the latest trends in computing. All research in the area of computing. It was computer logic to the students and speakers to this conference were invited decided to form a professional society in faculty at IIT/Kanpur. Prof. Huskey was speakers. Among the speakers were Prof. computing. The question then arose about a pioneer in computing, having worked Maurice Wilkes of Cambridge University, naming the society. Indian Computer with the ENIAC team and later with Alan Prof. John Bennet, of the University of Association, and Indian Computer Society, Turing designing the ACE computer at the Sydney, Australia, Prof. J Beltran from among other names were proposed. National Physical Laboratory, U.K. He was Mexico who was famous for spreading Indian Computer Society was rejected as also a Past President of the Association computer education in Mexico by the abbreviation ICS reminded everyone for Computing Machinery (ACM), U.S.A. transporting an IBM 1620 on an air about our colonial past, and ICA was With his vast experience in managing conditioned truck to various universities too close to the Institute of Chartered computing facilities and infl uence there, Dr. S. Barton, a computer designer Accountants. Dr. P P Gupta, who was with IBM he requested IBM to gather from CDC, besides Prof. Harry Huskey, sitting next to me, then suggested the IBM computer users to exchange their Prof Forman.Acton, and Prof. Irving name Computer Society of India (CSI) and experiences and to request IBM for some Rabinowitz (from Princeton). Almost it was fi nally agreed as the appropriate improved services. The group of 16 persons 60 participants were invited from India name by all who were present. Major from seven IBM computer installations among whom, I remember, were Major A.Balasubramanian, who was at that time including representatives from IIT Kanpur, A Balasubramanian (DRDO), Dr. P P in-charge of the IBM 1620 installation at DRDO, PRL, and some other organizations Gupta(CDC), Dr. S R Thakore (PRL), DRDO, Hyderabad, volunteered to get fi rst met at the IBM Education Centre at Dr. P V S Rao (TIFR), Dr. N Srinivasan the new society registered as soon as Faridabad on 6 June 1964. At the end of (NAL), Prof. B Nag (Jadavpur University), he returned to Hyderabad. (At that this meeting it was decided to form an All Prof. J Roy (ISI), besides Prof. H K Kesavan time all of us did not realize that CSI was India Computer Users’ Group (AICUG). and I from IIT/ Kanpur. At the end of used as an abbreviation by the Church of In mid December 1964, Prof. Huskey the conference a meeting was held on South India!). n How the MCA Programme Started

In 1979 the Electronic Commission of the convener of the panel. programmes primarily emphasized the Government of India, of which I was a The terms of reference given to the design of computers rather than their member, felt that several computer based panel and the full report of the panel may applications in industry and government. projects were not progressing fast enough be found in[1]. The panel held nine meetings The committee felt that there was a due to the paucity of trained human during January-July 1980. On 21 and 22 need for a large number of systems resource. The then Chairman of the April 1980 it held a Computer Science analysts and application programmers Electronics Commission Prof. Biswajit Nag and Engineering curriculum development particularly to fulfi ll the requirements set up a panel with me as its Chairman seminar at IIT/Delhi. Opinions of CSI of the data processing departments of to project the demand for manpower members were solicited at the Annual companies which were primarily users and suggest appropriate educational Convention of CSI held at Mumbai on of computers rather than designers of programmes to meet the requirements February 9, 1980. The panel found that computers. A minicomputer policy which of Human Resource. The other members there was a scarcity of Computer Science was in limbo for a long time was just about of the panel were Prof. S Ghosh of professional all over the world. Further to be announced based on the Sondhi Jadavpur University, Prof. K K Bhutani of most predictions made of requirements of committee[2] recommendations which was J K Institute of Technology and Applied human resources in the area of computing expected to allow many private companies Physics, Allahabad, Prof. S K Lakshmana all over the world were underestimates. to enter computer manufacture. There Rao of REC, Warrangal, Prof. M V Pitke of While reviewing the situation it was found was no formal educational program Bombay University, Prof. P C P Bhatt of IIT, that very few institutions in India had a to create a cadre of systems analysts Delhi (who was at that time the Director formal degree programs in Computer and application programmers. Systems of Computer Division of the Department Science. M.Tech/ME programs were being analysts are expected to have breadth of of Electronics), Dr. D Shankar Narayan off ered by about a dozen institutions in knowledge and maturity as their main job of the University Grants Commission, India with an intake of 152 and B.Tech was requirement is to interview personnel of Dr. S M Vaidya of the Regional Computer off ered only at seven institutions with an various types of organizations and arrive Centre, Pune University, Prof. P G Reddy intake of 122. Further, B.Tech and M.Tech at Systems Requirement Specifi cation of IIT, Delhi, Mr. S S Oberoi of DOE and programmes were engineering oriented (SRS) before embarking on systems Dr. Om Vikas of the Electronics with emphasis on computer architecture, design and programming. Persons Commission who was the member hardware, and systems software. These developing information systems for

CSI Communications | September 2014 | 10 www.csi-india.org organizations need not only knowledge was the panel’s conviction that the MCA the ten institutions chosen should be of computers and computing but also course must have three components: fully funded for fi ve years to create the business practices such as accountancy, strong mathematics base, broad general infrastructure including hiring teachers stores, purchase, organizational structure knowledge on the management structure and buying computers. Department of and related organizational governance of organizations including fi nance, and a Electronics agreed to meet 90% of the practices. The course was primarily strong grounding in computers as a tool funding requirement and 10% was to be meant to fulfi ll the needs of Management in solving problems. The panel felt that funded by UGC/Ministry of HRD. These Information Systems departments of the course must include programming, recommendations were presented to the organizations[3] and develop Information systems analysis and design, operating Electronic Commission and the UGC and systems for the clients of software systems, and basic ideas on architecture they approved the MCA program and companies. The committee felt that a of computers. The panel also felt strongly the funding requested. Subsequently ten basic B.Sc/B.Com degree would give the that at least six months of the course must institutions submitted proposals, got the students some breadth of knowledge be spent by the students in an organization funding and the MCA course was started and maturity. Further a large number of understudying an experienced systems in 1982-83. B.Sc/B.Com students did not have enough analyst. The approval of this course References employment opportunities and a program by UGC was expedited as Dr. Shankar [1] Report of the Panel on Computer Manpower to give them an orientation in a profession Narayan who was an Additional Secretary Development, Electronic Information and would make them employable in the of UGC was a member of the panel. The Planning, IPAG, Electronics Commission, nascent fi eld of computer applications. panel suggested that the MCA programme Vol.8, No.2, November 1980, pp.56-70. This led to the idea of 3 year post graduate should be started at ten institutions [2] Virendra Kumar, Committees and Commissions in India: 1978. programme which the panel decided to with an intake of 30 each. The panel had [3] V.Rajaraman, “A Curriculum Proposal for name Master of Computer Applications hoped that among the ten would be the a Degree Program in Information Systems (MCA). This course was of special three IIMs. IIMs were not interested but Design”, CSI Communications, Vol.5, No.4, relevance to conditions in India and did many other colleges were. To kick start Oct.1981. not mimic any course in the west. It the programme it was suggested that n History of the Establishment of the Centre for Development of Advanced Computing

Introduction leading supercomputer centres in U.K and of these conditions were unacceptable In 1983 the Indian Institute of Science, U.S.A and the two major manufacturers of to the Institute and the Government of Bangalore, gave a proposal to the supercomputers, namely, Cray and Control India. After extensive negotiations on Department of Science and Technology, Data Corporation(CDC) both located in relaxing some of the conditions an order Government of India, to set up a Minnesota, U.S.A. A report was submitted was placed for the purchase of a Cray- supercomputer facility at the Institute. to the Government by the Indian Institute YMP computer with the condition that it The contention of the Institute was that of Science and fi nal approval for buying a should be installed within one year. Cray cutting edge research in science and supercomputer with a budget allocation could not get an export clearance within engineering required such a machine at of Rs.60 crores including special building, the stipulated time and the order was the Institute as modeling and simulation technical staff , faculty etc., came in late cancelled. It was clear to the Institute of complex systems depended heavily on 1985. The institute started the process and to the Government of India that a supercomputer. All major universities of tendering etc. and soon found that the unless we become self-reliant in building in the west had supercomputers. This process of importing a supercomputer supercomputers, we will be forever at the was duly considered by the secretary, was tortuous. Getting an export mercy of the U.S. government. Prof. C N Department of S&T and as the fi nancial clearance from the U.S. government was R Rao who was the then Director of the outlay required was over Rs.25 crores he becoming diffi cult. Even when quoting Indian Institute of Science and who was suggested that a committee of secretaries for the computer Cray and CDC indicated also the Chairman of the Science Advisory consisting of the secretaries of the then the problems with export controls and Council to the Prime Minister (SAC-PM) Department of Electronics, Ministry wanted the Institute to sign an agreement was convinced of the need for India to of Human Resource Development and which included surprise inspection of become self-reliant in building and using S&T should consider the proposal. The the use of the computer including the supercomputers. SAC-PM formed a proposal was approved in principle by source codes of the programs being run, committee with me as Chairman and this committee of secretaries. Then restriction on its use by organizations Prof.P.C.P.Bhatt of IIT, Delhi, Dr. N Seshagiri started a series of steps beginning with outside the Institute, restrictions on its of the Department of Electronics, and a visit by a group led by the Director of use by visiting Professors from the then Dr. P N Shankar of the National Aeronautical the Indian Institute of Science to some Soviet Union and its allies etc. Many Laboratories, Bangalore, as members to

CSI Communications | September 2014 | 11 suggest ways and means of meeting this mode model and the fl exibility in the very expensive. Microcomputers were goal. The committee was set up some management structure of CDOT in the doubling their speed every 2 years and time in December 1986 and held several new centre was emphasized. The need for were inexpensive. Numerous start ups meetings. One of the meetings was held collaboration between various scientifi c in U.S.A were exploring the possibility of with Prof.Roddam Narasimha, a members institutions and a distributed structure to building supercomputers using parallel of SAC-PM, in which he talked about the expedite application developments on a processing and were building prototypes. need of a high performance computer parallel machine was also desired by the The committee felt that it was easier for solving complex computational fl uid committee. to build parallel computers having a dynamics problems in aerospace and During the period 1984-86 performance approaching the speed of research in atmospheric sciences which technology was rapidly changing. supercomputers of the day at a fraction of had relevance to the important problem of Computer architects all over the the cost. Further, there were fortunately monsoon prediction. He also mentioned World were looking for alternatives no embargos on buying microcomputers. the need of a high performance to vector supercomputers of the type The committee submitted a report in computer to solve problems in structural manufactured by Cray and CDC in February 1987 to the SAC-PM entitled engineering, molecular biophysics etc. In the U.S.A., and NEC and Fujitsu in “Technology Mission to develop a Parallel the deliberations of the committee the Japan, which required special cooling, Computer”. The executive summary of need to emulate the successful mission consumed enormous power and were the report is reproduced below:

TECHNOLOGY MISSION TO DEVELOP A PARALLEL COMPUTER SUMMARY

With the advent of inexpensive powerful microprocessors it has give us a leadership position in this area. It is thus proposed now become feasible to build a computer by interconnecting that commercially available parallel computers be distributed a large number of microprocessors. Such a computer, called a to fourteen organizations and individual goals be defi ned for parallel computer, can be designed to solve problems requiring each organization to develop parallel programs in their area of numerically intensive computing. There are a large number competence. These programs should be implemented on the of applications critical to India’s development, which requires prototype parallel computer developed by the mission. sustained numerical speeds in the range of 10 to 100 million It is proposed that the mission be coordinated and executed arithmetic operations per second. It is thus necessary to initiate under the umbrella of the Centre for Development of a technology mission with a goal of building such parallel Advanced Computer Technology (CDACT) of the Department computers by 1990. The potential hardware speed of parallel of Electronics and that it must have a separate identity and computers cannot be utilized unless new algorithms tuned to the autonomy of operation. The proposed budget for the mission parallel structure of these computers are developed. Research in is Rs.32 crores of which USD 14.25 million will be in foreign parallel algorithms is at its infancy and major eff ort can potentially exchange.

On March 31, 1987, I received a letter from the Secretary of SAC- tentatively suggested a discussion on this item for 30 minutes PM which stated “It has been decided that SAC-PM’s work on including a presentation of 10 minutes”. I prepared 3 slides Parallel Computing be included as an item for discussion with for presentation which are reproduced below. (An OHP was the Prime Minister, in a meeting of SAC-PM members to be used for the presentation as the use of PPTs had not become held with him on 21st April 1987 at 18.05 hours. SAC-PM has common in 1987).

PRESENTATION TO PM ON 21.4.1987 ON PARALLEL COMPUTER MISSION

SLIDE 1 ☛ DEVELOP PARALLEL ALGORITHMS AND SOFTWARE IN MISSION TO BUILD A PARALLEL COMPUTER DIVERSE DISCIPLINES ☛ DEVELOP SOFTWARE TO RESTRUCTURE LARGE SERIAL ☛ BUILD PARALLEL COMPUTER WITH MINIMUM PROGRAMS TO PARALLEL PROGRAMS FOR COMPTUER SUSTAINED SPEED OF 50M FLOPS BEING DESIGNED

SLIDE 2 ☛ HARDWARE SYSTEM DESIGN RELATIVELY EASY ISSUES IN PARALLEL COMPUTING CRUCIAL PROBLEMS ARE IN SOFTWARE ☛ PROCESSORS BECOMING FASTER AND CHEAPER ☛ MODELLING PROBLEMS ☛ OUR INDUSTRY ABLE TO USE THEM QUICKLY ☛ RETHINKING SOLUTION HARDWARE ISSUES ☛ PARTITIONING JOBS TO TASKS ☛ ASSIGNING TASKS ☛ INTERCONNECTION STRATEGEIS ☛ COORDINATION OF TASKS ☛ COMMUNICATION STRATAGIES ☛ PICKING RIGHT NOTATION

CSI Communications | September 2014 | 12 www.csi-india.org SLIDE 3 GOAL IN TIME IMPLEMENTATION ☛ INTERCONNECT ALL CENTRES BY A COMPTUER NETWORK WITH CONFERENCING FACILITY ☛ CREATE A CENTRE TO DESIGN DEVELOP AND FABRICATE • TIME LINE IN REPORT A PROTOTYPE SYSTEM • BUDGET $7..25M + RS.935 LAKHS IMMEDIATELY ☛ CENTRE SHOULD HAVE OPERATIONAL AUTONOMY ☛ TOTAL PROJECT COST $14.25 MILLION +RS.12.85 CRORES INTERACT WITH IDENTIFIED MANUFACTURERS = 32 CRORES ☛ ASSIGN APPLICATION DEVELOPMENT TASKS TO R&D ☛ 14 SOFTWARE DEVELOPMENT CENTRES SPREAD ORGANIZATIONS THROUGH INDIA ☛ PROVIDE THEM WITH INFRASTRUCTURE TO ATTAIN

The report of the committee was accepted by the Prime Minister’s Technology” was changed to the “Centre for Development offi ce. Immediately steps were initiated by the Department of of Advanced Computing” by DOE. As the working group had Electronics (DOE) whose secretary was Mr. K P P Nambiar and suggested that closely working with a University would be additional secretary Dr. N Seshagiri. DOE proceeded to form a benefi cial, CDAC was established at the campus of the University registered society under its control. The name suggested by the of Pune in mid April 1988. working group “Centre for Development of Advanced Computer n Time-Line – Development of Computing in India (1955-2010)

This time line lists chronologically various developments which took place in computing in India. In developing this, I have used many sources including the books listed in the references. A complete list of references may be found in the monograph “History of Computing in India (1955-2010)” written by me on the invitation of IEEE Computer Society- History Committee whose URL is given in the References.

Year Important Events

1955 • HEC-2M arrives in India. 16 bit tube/drum machine designed by A D Booth at Birbek College, London, and ordered by ISI, Kolkata from the British Tabulating Machines. • Beginning of the design of TIFRAC prototype at the TIFR, Mumbai (R.Narasimhan leads the team). 1956 • HEC-2M installed at the ISI and used to program statistical calculations in machine language.

1957 • Design of a full-fl edged computer similar to ILLIAC begins at the TIFR (R.Narasimhan’s group).

1958 • URAL-1 a Russian machine installed at the ISI, Kolkata. Has assembly language.

1959 • TIFRAC fabrication completed. • IBM starts manufacturing key punch machines in India. 1960 • TIFRAC starts working. Assembler developed for TIFRAC.

1961 • ISIJU Project to make transistorized computer begins at ISI and Jadavpur University. • First IBM 1401 installed at the ESSO Standard Oil Co., Mumbai.

1962 • TIFRAC dedicated to the nation by Jawaharlal Nehru the Prime Minister of India. • IBM 1401 refurbishing starts at Mumbai. 1963 • IBM 1620 installed at the IIT at Kanpur. First computer with FORTRAN in India. Education using FORTRAN begins. • Bhabha committee set up to review electronics in India.

1964 • IBM 1401 installed in ISI, Kolkata. • A large number of intensive courses on computing given at IIT/Kanpur. • CDC 160A-3600, a large mainframe computer, installed at the TIFR, Mumbai. • First International Conference on Computing held at IIT/Kanpur. Organized by Harry Huskey with fi nancial support from the Ford Foundation. At the end of the conference decision taken to start Computer Society of India. 1965 • 30 IBM 1401s and 12 ICL 1901s installed in India. • Computer Society of India registered in Hyderabad.

CSI Communications | September 2014 | 13 1966 • Report of the Electronics Committee (Bhabha Committee) submitted (February). • IBM 7044 installed at IIT/Kanpur. • Rupee devalued from Rs.4.5 per USD to Rs.7.5 per USD. Windfall profi t to IBM as rentals were quoted in dollars. • ISIJU project complete. • M.Tech program in computers in the Electrical Engineering Department started at IIT/Kanpur.

1967 • ECIL established at Hyderabad by the Department of Atomic Energy to commercialize electronic instruments designed at the Atomic Research Centre at Mumbai. • Dept. of Statistics, Government of India, installs 10 Honeywell computers.

1968 • TCS established in Mumbai by Tata Sons with an IBM 1401. • IBM 1401 installed as I/O computer for the IBM 7044 at IIT/Kanpur. • Narasimhan committee report suggests self-reliant production of small and medium computers within 10 years. Opines no need for foreign collaboration in design and development.

1969 • TDC 12 computer commissioned at the Bhabha Atomic Research Centre, Mumbai. A real-time data acquisition computer. • Committee on Automation set up by the Ministry of Labour, Employment and Rehabilitation (called Dandekar Committee on Automation). • HP Time sharing computers installed in IIM/Ahmedabad.

1970 • Department of Electronics (DoE) established by the Government of India with M G K Menon as its Secretary. • Foreign companies asked to dilute equity. IBM declines. ICL agrees and collaborates with the Bharat Electronics Ltd. (BEL) to manufacture ICL 1901A – 48 computers manufactured. • National conference on Electronics under the Chairmanship of Vikram Sarabhai held at Mumbai to elicit comments on the development of electronics and computers. Self-reliant development of computers in India proposed.

1971 • Electronics Commission established by the Government of India in Delhi as policy making body for electronics and computers with M G K Menon as its Chairman. • IBM 1401 withdrawn in the USA. • 14 IBM 1401s installed by the Indian Railways for accounting, freight etc. • TDC 12 marketed by ECIL.

1972 • DEC 1077 installed at NCSDCT at TIFR with UNDP assistance. Groups in graphics, networks, databases, and compilers formed to do research in these areas. • Panel on minicomputers constituted by the DoE to formulate a strategy for the development of small and medium computers by Indian companies. • Separate Computer Science Programme starts at IIT/Kanpur. Masters and Phd degrees off ered. First such programme in India.

1973 • Report of the panel on minicomputers submitted. Opines that minicomputers can be made in India without any know-how being imported from abroad. No collaboration should be allowed. Demand for the period 1974-79 projected around 1400 minicomputers. • Santacruz Electronic Export Promotion Zone (SEEPZ) established in Mumbai to promote export of electronic items and software. • Foreign Exchange Regulation Act (FERA) passed. • IBM asked to dilute equity again. Declines. • Air Defence Ground Environment Systems (ADGES) design begins at TIFR. Plans to use ruggedized ECIL TDC 316 computers, display devices developed by Tata Electric Company, Radar from Electronics and Radar Development Establishment (LRDE) Bangalore with the user agency, namely, the Indian Air Force giving requirement specifi cations and test data. Entire system to be developed and fabricated with Indian engineers and Indian made subsystems. • IIT/Madras installs IBM 370/155 with fi nancial assistance from the Federal Republic of Germany. Fastest computer in south India. 1974 • TDC 312 marketed by ECIL (uses imported ICs, local components locally made PCBs, and imported peripherals.) • Regional Computer Centre (RCC) set up at Pune with an ICL mainframe. RCC to give low cost computer time to students and software exporters. • ECIL imports IRIS 55 (from France), a 32 bit computer to expedite software development and reverse engineered to make TDC 332. • Computer Imports for software export policy. TCS uses the scheme to import a Burroughs mainframe computer. • Minicomputer policy not implemented – delayed due to indecision and foreign exchange problems.

CSI Communications | September 2014 | 14 www.csi-india.org 1975 • Tata Burroughs established in SEEPZ. Burroughs B1728 and B6738 installed to export software. F C Kohli of TCS prime mover of the idea. • DoE issues guidelines for import of computers costing more than Rs. 500,000. Foreign exchange diffi culties. • National Informatics Centre (NIC) established with UNDP assistance (USD 4.4 million). • TDC 316 produced and sold. • Engineers India installs Ryad 1040 from East Germany to export engineering design software to East European countries. • Ryad 1030, 1020 computers from the USSR also installed for software export to the USSR (Rupee trade with the USSR eases import of machines).

1976 • CMC established by the DoE. • CMS formed by some IBM employees to maintain IBM 1401 computers. • Report on the operation of IBM and ICL by the Public Accounts Committee of the Indian Parliament. Report criticizes companies. • Patni Computers collaborates with Data General Computers for software development. • DoE starts Appropriate Automation Promotion Program (AAPP), later renamed Industrial Electronics Promotion Programme (IEPP).

1977 • IBM announces intention of closing operations in India. • Regional Computer Centre, Calcutta, established with Burroughs B-6738 computer. • Minicomputer policy continues to be in limbo. 1978 • IBM closes operations in June. • CMC takes over maintenance of IBM computers. • IDM, a company formed by ex-IBM employees takes over IBM’s data centres and card plant. • Biswajit Nag takes over as Secretary DoE from M G K Menon. • A S Rao retires from ECIL. • Minicomputer Policy announced opening the fi eld of computer manufacture to private industry, breaking public sector (ECIL) monopoly. • IIT/Kanpur starts the fi rst B.Tech programme in CSc at an IIT.

1979 • Sondhi Committee on Electronics report suggests liberalization of import of large computers and allowing private sector to enter computer and peripheral manufacture. • Bharat Electronics Ltd. (BEL – a public sector company specializing in defence electronics systems) decides to quit from computer and peripherals development. • 4 companies, ORG, DCM, HCL, and IDM, start manufacturing minicomputers. Adopt UNIX as O.S. • TCS opens Offi ce in New York for software export. • Patni Computers develops comprehensive Apparel Development Software Package for Data General Computers. • Regional Computer Centre, Chandigarh established with DEC 2050 system.

1980 • Rajaraman’s manpower committee report accepted by the Electronic Commission. A new programme called Master of Computer Applications to be started. Bachelor’s programme in CSc to be expanded. • Software services export by a number of companies start primarily by sending software engineers to client sites (pejoratively called “body shopping”). • Tata Research Design and Development Centre (TRDDC) of Tata Sons established (mostly with funding by TCS). • TALLY, an accounting software product company established.

1981 • Rajaraman committee report on import of computers for software export. • P P Gupta takes over as DoE secretary from B Nag. • Decision to use computers in the organization of the Asian Games. Rajiv Gandhi takes this decision. • INFOSYS established. • Wipro markets 8086 based minicomputer (Wipro 86 series). • Reserve Bank of India computerizes clearing houses and ledger posting after agreement with the labour unions that not more than 10% of staff will be displaced. • NIIT starts private computer training school.

1982 • Asian Games held in New Delhi. Organizer Rajiv Gandhi decides to computerize games schedules, event records, result announcement etc. DCM computers used as terminals, networked with HP machines. Entire software developed locally by NIC engineers in 6 months. Seshagiri interacts with Rajiv Gandhi. • Import of Colour television tubes allowed; colour television arrives in India to telecast Asian Games.

CSI Communications | September 2014 | 15 • NCST establishes VSAT network with 32 Kbps packet switching. • MASTEK starts software company in Mumbai. • Electronic voting machine using a microprocessor designed and developed in India used in a state election for the fi rst time in the world. • UNDP funding (USD 653,200) for Appropriate Automation Promotion Programme (AAAP) with centres at Delhi, Ahmedabad, Calcutta, and Trivandrum. Training in microprocessor use in automation.

1983 • NCSDCT hived off from TIFR to form NCST. • Bank Unions agree to limited computerization in public sector banks. 1984 • Indira Gandhi assassinated. Rajiv Gandhi becomes Prime Minister. Rajiv Gandhi is computer savvy. • Rajiv Gandhi initiates liberalization of computer industry with Seshagiri of the DoE as his informal adviser. • Trade unions observe 1984 as “anti computerization year”. • Gateway Design automation starts software development work for export in Delhi • Citibank sets up software development unit in SEEPZ, Mumbai. • Inter-ministerial standing committee (IMSC) formed to regulate computer import and licensing industry. • Railway passenger reservation project given to CMC by the Railways. • Rangarajan Committee on bank computerization gives report. EDP cells in all banks recommended. • SOFTEK fi rst company to develop compilers for COBOL, BASIC, and FORTRAN for locally made computers • CDOT set up to design electronic telephone exchanges by Indian engineers. • CAD Centres at IISc/Bangalore, IIT/Kanpur, IIT/Bombay and Jadavpur University at Kolkata. UNDP grant USD 1.5 million plus Rs.340 million grant from the DoE. • Computer Assisted Literacy And Study in Schools (CLASS) programme launched by the DoE to cover 250 schools all over India. Uses BBC Acorn microcomputers – 4 given per school. The UK government gives UK Pounds 1.3 Million for the project. • Government of India approves setting up of a National Supercomputer Centre at the Indian Institute of Science at Bangalore with a grant of Rs.500 million.

1985 • Department of Telecommunication (DoT) established. • Telephone services corporatized (earlier telephones were monopoly of a government department). • Software export USD 30 million (CMC, TCS, and TBL main contributors). • Texas Instruments facility at Bangalore established to export electronic CAD software using satellite communication with its Dallas Centre in the USA. • ERNET project starts with UNDP assistance. • Sampath committee on education – teacher training programme suggested. • KBCS project funded by UNDP and the DoE. USD 5.2 million + Rs.140 million grant from the DoE. IIT,Madras, IISc, Bangalore, ISI, Kolkata, NCST, Mumbai, TIFR, Mumbai and IIT, Bombay participated. • UNDP assisted Microprocessor Applications Engineering Program (USD 1.53 million) – 5 regional centres at Jabalpur, Bangalore, Ranchi, Pune and Delhi.

1986 • VSNL (Videsh Sanchar Nigam Ltd.) set up for overseas communication. • INDONET established by CMC. SNA network with IBM computers and leased lines from the DoT. • New policy on computer software export, software development and training. • Project to computerize reservation of tickets in the Indian Railways completed. Reservation offi ce in New Delhi with 50 windows started. • NIC acquires SX1000 mainframe computers from Japan for software development for government departments. • NIIT starts franchising training centres. • Rajaraman committee submits report to the Science Advisory Committee to the Prime Minister to establish a centre for developing high performance parallel computers.

1987 • Sterling Computers sells PCs for Rs.29, 000. • TI’s Satellite link to Dallas offi ce starts the revolution of “off shore” software development. • Foreign collaboration for branded workstations begins in earnest. Hinditron-DEC, HCL-HP, and PSI-Honeywell Bull established. • NICNET established. • Indian Banks’ Association agreement with Bank Unions on Computerization. Standardizes use of UNIX, Micro focus COBOL, and X .25 for networking. IBM PC clones in all banks. • Software India Conference in the USA to promote software companies.

CSI Communications | September 2014 | 16 www.csi-india.org 1988 • National Association of Software and Service Companies (NASSCOM) established. • NIC hived off from the DoE and placed in the Planning Commission. • Excise duty exemption for software. • RCC Calcutta machine replaced with CDC 180/840A mainframe. • Cray XMP 14 installed in the Centre for Medium Range Weather Forecasting-number of conditions applies on usage. • Centre for Development of Advanced Computers (CDAC) established in Pune to design and fabricate parallel computers with 1Gfl op speed.

1989 • Indian Administrative Service offi cer takes over from technocrats as DoE secretary. DoE becomes a "non-scientifi c” department. S Rajamani IAS takes over from technocrat K P P Nambiar when he retires. • VSNL sets up 64 Kbps link to the USA. • NCST connects ERNET to Internet via UUNET. • Electronics Commission abolished. • Datamatics, a software services company, uses satellite link to the USA to export software. • India’s software services export reaches USD 100 Million.

1990 • N.Vittal, an Indian Administrative Service offi cer, takes over as the DoE Secretary. • Software Technology Parks set up by the DoE with shared satellite communication links to promote software export. • Companies established in STPs expected to export software each year equal to 4.5 times the salary paid to their employees. • MNCs enter India for off shore software development.

1991 • India nearly defaults in repaying loan. Forced by the International Monetary Fund (IMF) to liberalize. Rupee devalued and fl oated. • New industrial policy – Multi National Companies (MNCs) welcomed. • Reduced tariff , simplifi ed procedures, and devalued Rupee attract MNCs. • NICNET used to disseminate results of general elections. • Export of software USD 164 million. • IIS is the fi rst software services company to get ISO 9001 Quality Certifi cation. • Software “development centres” set up for individual Fortune 500 companies by TCS (Each centre secure). • National Supercomputer Centre at the IISc, Bangalore starts functioning with a Cyber 992, 2 CDC4360, a VAX8810, 9 IBM6000/580s connected with a fi bre optic net to work in parallel, 48 IBM RS6000/340, 24 Silicon graphics workstations, 25 Sun workstations, and a campus-wide fi bre optics network. • CDAC completes design of PARAM parallel computer with 1 Gfl op speed.

1992 • VSNL introduces 64 kbps leased line services. • Tata group and IBM form a 50:50 joint venture company. • Software product Flexcube for banks developed by Rajesh Hukku of IFlex.

1993 • EDI introduced by VSNL. • Private software companies allowed dedicated satellite links with customers in the USA. • India fi rst company in the world to get CMM level 5 certifi cation for software quality. • Import of software packages allowed on regular duty. Duplicating copies allowed. Duplicates permitted to be sold in the local market and royalty less than 30% of the local price allowed to be paid to the owner of the package. • INFOSYS becomes a publicly listed company • Indian Satellite Development Centre at Bangalore installs a distributed computer system with 9 IBM RS6000/530s, 9 RS6000/220s and 33 RS6000/220s.

1994 • Government monopoly in telecommunication ends. Private companies allowed starting mobile communication services. • American Express sets up Business Process Outsourcing Centre in Mumbai. • 200 satellite links installed by software companies to facilitate off shore software development. • Quality consciousness makes software companies obtain ISO/CMM certifi cation. • Oracle sets up development centre in Bangalore. • Indian copyright act amended – stiff er penalties for infringement.

CSI Communications | September 2014 | 17 1995 • First commercial Internet service started by VSNL. • 100% tax holiday for software export earnings. • Private e-mail service introduced (non Internet). • DoE launches programme to accredit private computer training institutes due to proliferation of below par training institutes (named DOEACC scheme).

1996 • NASSCOM sets up Special Interest Group (SIG) to solve Y2K problem. Indian software companies advertised as Y2K solvers. • Indian software companies improve systems while fi xing Y2K bug at little extra cost as strategy to get customers. • Rediff .com established – fi rst e-commerce portal in India. • Software export reaches USD 1 Billion.

1997 • Digital Signal Processing chip “Ankur” designed by TI India centre at Bangalore. • Compaq and IBM overtake sales of PCs by local manufacturers. • 23% of INFOSYS revenue due to Y2K. • GE Capital International Services starts back-offi ce services centre. 1998 • Prime Minister of India declares “IT India’s Tomorrow”. • IT task force set up by the government – comes up with 108 recommendations to promote IT among which is setting up of one Indian Institute of Information Technology in each state. • 109 companies receive IS0 quality certifi cation. • WIPRO the second IT company in India to get CMM level 5 quality certifi cate. • IIIT/Allahabad established. • VSNL establishes connection to Global One’s 1400 points of presence worldwide. • Microsoft Software Development Centre started at Hyderabad. • Motorola Design Centre established in Delhi. • IBM Research Centre set up in New Delhi. 1999 • INFOSYS listed in NASDAQ. • IBM sets up fully owned subsidiary in India. Tata’s stake in TATA- IBM bought by IBM. • 100% Foreign Direct Investment in IT allowed paving way for MNCs entry into India. • 6 out of 12 SEI CMM level 5 companies in India. • Nationwide linking of Railway Reservation System. 2000 • IT Act 2000 passed by Parliament to facilitate e-commerce. • Software export reaches USD 5 billion. • HP Global sets up BPO in Bangalore. • 12 Software Technology Parks host 1196 software companies. • Startup company Spectramind gets venture capital funding of Rs. 1 billion (USD 23 million) to set up back-offi ce to process transactions of Internet portals worldwide. • Private companies allowed setting up international gateways.

2001 • Tata group takes over 51% of CMC Ltd. from the government. • Tata group takes over VSNL. • 10 companies obtain CMM level 5 certifi cates. 14 companies obtain CMM level 4 certifi cates. • Dell sets up R&D centre. • Simputer, a hand-held multilingual computer, designed by a group of IISc and Encore Software Ltd. engineers at Bangalore. Attracts worldwide attention. • Accenture starts centre in Mumbai. 2002 • Agrawal-Kayal-Saxena algorithm:”Primes in P” attracts worldwide attention. • National Institute for Smart Governance set up in Hyderabad (joint initiative of NASSCOM, Government of India and Government of Andhra Pradesh). • Internet based booking of tickets on the Indian Railways. 2003 • Bharati Airtel (largest mobile telephone provider in India) outsources all IT work to IBM India. • CDAC’s PARAM PADMA ranks 171 in top 500 high performance computers. • High performance DSP chip designed at TI India at Bangalore. • Software Technology Parks India (STPI) centres across India reach 44. • Yahoo sets up R and D Centre at Bangalore (fi rst outside the USA).

CSI Communications | September 2014 | 18 www.csi-india.org 2004 • National E-Governance plan announced. • General Elections held using only Electronic Voting Machines (1,075,000 EVMs deployed all over India). • TCS, INFOSYS and WIPRO all cross USD 1 Billion revenue. • TCS becomes a publicly listed company. • Government of India announces Broadband Policy; fi bre to home, DSL, cable to home etc. Targets 40 million Internet users and 40 million broadband users by 2010. • Google sets up fi rst R&D Centre outside the USA in Bangalore. • IBM acquires Daksh, the largest Indian BPO company. • Number of employees in IT industry reaches 1 million. • State Wide Area Network for each state to be set up with minimum bandwidth of 2Mbps. • Mobilis, a low cost mobile tablet computer designed by Encore Software Ltd., Bangalore, attracts wide attention.

2005 • Oracle acquires IFlex an Indian Banking software product company. • Special Economic Zone (SEZ) Act passed. SEZ defi ned as “specifi cally demarked duty-free enclave deemed to be foreign territory (out of customs jurisdiction) for trade, duties and tariff s”.

2006 • CISCO establishes Globalization Centre East in Bangalore. • IBM announces plans to invest USD 5 billion in India. • SAP (German ERP major) announces USD 1 billion investment in India over next 5 years. • India’s software and services export revenue reaches USD 10 billion.

2007 • 257 IT companies set up in SEZ. • Special incentive package announced by the Department of Information Technology to encourage investments in semi-conductor fabrication industry. • EKA supercomputer fourth fastest in the world and fastest in Asia built by the Computational Research Laboratory of the Tata group. 2008 • TI (India) designs single-chip solution for ultra-low-cost mobile handset. • Accenture opens Technology lab in Bangalore (Fourth in the world after the USA and France). • 2G spectrum allocation on fi rst come fi rst served basis. • IT (amendment) Act passed by Parliament to strengthen IT Act 2000. • National Knowledge Network project started by the Government of India.

2009 • IBM has second largest workforce in India after the USA. Will invest USD 100 million for global mobile services research in India. • SAP’s third co-innovation lab in Bangalore (other labs in Palo Alto and Tokyo).

2010 • IT exports including software, services and BPO reaches USD 50 billion. • IT domestic revenue USD 24 billion. • 55% of the global outsourcing market sourced from India. • Indian IT companies present in 52 countries and have 400 of the Fortune 500 companies as clients. • Direct employment 2.4 million in IT and 8.2 million in support services. • 6.5% of GDP earned by IT industry. • Rs.600 billion allocated over a 10 year period for the National Knowledge Network.

References [3] C R Subramanian, “India and the monograph from which this material [1] This material is taken from History of Computer – A Study of Planned is taken and gave many constructive Computing in India (1955-2010) by Development”, Oxford University suggestions: S Bhatnagar, P C P Bhatt, V.Rajaraman published in the World Press, New Delhi, 1992. H K Kesavan, R Krishnamurthy, F C Wide Web. See: (URL:www.cbi. [4] R.K.Shyamasundar and M A Pai, Kohli, H N Mahabala, S K Nandy, N R umn.edu/hostedpublications/pdf/ “Homi Bhabha and the Computer Narayana Murthy, Anand Parthasarathy, T Rajaraman_Histcomputingindia.pdf) Revolution”, Oxford University Press, Radhakrishnan, N Ramani, S Ramani, P V S [2] Dinesh Sharma, “The Long Revolution New Delhi, 2011. Rao, Andy Russell, Veer Sagar, N Seshagiri, – the Birth and Growth of India’s IT Acknowledgment Dinesh Sharma, Lalit Shawney, Om Vikas, Industry”, Harper-Collins India, New I thank the following persons (in David Walden, and Jeff Yost. Delhi, 2009 alphabetical order) who read the n

CSI Communications | September 2014 | 19 Cover Radharaman Mishra Story Senior Technical Architect, Research & Innovation Tech CoE Group, IGATE History of the Computers, GUI and Devices

Introduction marking the wall to making knots in the Corporation to develop a new operating History never looks like history when you rope for doing the counting. Abacus was in system for the microcomputers. What are living through it- John W. Gardner use until recently. Interestingly the digital Microsoft came up with was named MS- History, by defi nition is associated calculators that we use now days are a DOS, a command line interface for the with the past, and we need a gap of new development and share a common microcomputers. And thus the race was time between us and what we call the historical period with modern computers. already picking up. Here is a snapshot of the devices that history, to have a “historical perspective” Graphics that Changed the Graph became popular with the diff erent towards it. History is also about changes, of Computers generations of the computers. changes that mattered, and infl uenced Xerox Corporation’s Palo Alto Research • The First Generation (1950s): Punch the future one way or the other. History, Center (PARC), was established in card and magnetic tapes for inputs, of the computing is very interesting in 1970 as a division of Xerox Corporation. supervisory typewriter for control many ways. It has shaped the present It has a legacy of gifting the world of • The Second Generation (early 1960s): of humanity and will defi nitely shape its computing and information systems with Punched cards for input, printers, future in signifi cant ways. Although we their innovations. The scientists at PARC tape storage, and disk storage hardly have a distance of 60 years with were working on a project that allowed • The Third Generation (mid-1960s the birth of the modern computing, the computer users running programs in their astounding pace of changes therein has to mid-1970s): Minicomputers (smaller), simple monitors, keyboard own sizeable windows. A window that created a great history within this short was capable of holding symbols for the timeframe. In computing, history has • The Fourth Generation (1975 to the present): GUI, mouse, color programs (called icons) and documents created a history for itself. that were clickable. They also developed Nicholas Negroponte said, monitors, touch screens, gesture and voice recognition the concept of showing the documents “Computing is not about computers any that looked like as they would appear more. It is about living.” In the early days It has been long since people were counting on their thumbs and making when printed (we say it print preview of the computing it was not so, since they now) and also a printer to actually print were considered (and for good reasons) complex calculations on their abacus. It was ineffi cient and boring. The giant the documents. They called it a WIMP highly sophisticated machines that only system (Windows, Icons, Menus, and a trained professionals could work with machines developed until 60s were just big calculators. Apart from being Pointing device), and later the concept for high tech or scientifi c (or military) became famous as the Graphical User purposes. It required many historic oversized and overfed (they consumed terrible amount of electricity and had Interface (GUI). developments before we had a computer Like a really adventurous movie in every home and a computer that will do frequent breakdowns) they couldn’t play videos and send emails. They needed script the pieces of the stories were everything, from complex mathematics moving fast. While the scientists at PARC to buying groceries and sending mails someone to do something about it. Two young entrepreneurs, Steve Jobs were working hard on their program, to playing songs or video. Computers Steve Jobs managed to get permission to have evolved to become a signifi cant and Steve Wozniak, who were looking for more interesting things than the schools have a look at what they were doing. He part of our lives. Two things apart from wasted no time in realizing what their the power of the computing technology (seems schools were not popular even in the historical period) thought of this work meant for the personal computers itself that contributed to their acceptance and started working on a totally new line in everyday lives are the intuitive user problem. They left the school, sold their Volkswagen and calculator (to raise a of minicomputers that were leveraging all interface (often referred as Graphical fund) and established a company that the features of the GUI. Apple released User Interface or GUI) and the devices later became famous as Apple Computer, fi rst version of the Macintosh in 1984 attached to the computer that lets users Inc. The company launched its fi rst having all the GUI features and instantly interact with it. Each of these has their product, the Apple I in the year 1976 and became hit. Later on Microsoft launched own story to tell. In this article we will discontinued it next year. It was assembled its own line of operating systems, hear the story of the computers, the GUI by hand and encased in a wooden box. Microsoft Windows, which implemented and some of these devices that enable us Now these machines are collectors’ items. the concepts of GUI, which is now the to use the computers. The story is not only They learnt from this experience and most widely used operating system for the fascinating but also some of us have lived released another version Apple II in the personal computers worldwide. through it. same year. Apple II was a huge success The concept of GUI has contributed Brief History and Timeline of and soon it became the most selling the most in bringing the computers out the Computers personal computer and established Apple of the lab and making it a household Computers or no computers, we were as a successful commercial company. item. It allowed the innovators to always in dire need of making calculations In 1980, IBM understanding the and develop applications that could (remember we came out of the cave and potential of the rapidly increasing personal be used by non-technical users (word have to pay the tax!). People have used computers market asked Microsoft processors, spreadsheets, drawing

CSI Communications | September 2014 | 20 www.csi-india.org programs and games etc.). It made the the effi ciently of the tasks like drawings, consoles etc. where the users have to learning computers so intuitive and fun selections and clicks, scrolling and so repetitively make same or similar inputs that eventually computers turned to be on. It also made possible to develop for longer periods, researchers were the most eff ective tools for self-learning. applications that were aware exactly looking for smart ways to input using the A Mouse for Every Computer where the user was pointing. Users were hand directly to the screen. Research work Interestingly historically mouse has its able to do lot many things by simple hand from academics to industries evolved and roots in devices that were being developed and fi nger movements in a faster and multiple approaches were developed to for military purposes as part of a plotting effi cient way using it. make this happen. Interestingly, the touch device that could show the trajectory of Where is My Monitor? screens were widely used in the POS the aircraft. Even more interestingly in Reading what the computer has to say was machines before they were adapted for early days researchers have tried to build not as neat as reading this article in early the phones. The fi rst phone tracking devices that could have been tied days of computers. Early computers used to (IBM Simon) was released in 1993. The to your hand or even mounted on your communicate using punched cards. There popularity of smart phones has made the head. The fi rst mouse of the kind we know was a typewriter like machine to punch touch screens very popular. Advent of the was invented by Douglas Engelbart in holes patterns into the paper cards. They tablets and “phablets” is only adding to 1964, it has two metal wheels packed into were fed to the computer that punched the ever rising usages and popularity of a wooden shell along with a circuit board. the results onto similar empty cards. The the touch screens. The technology is quite Most of us might not have a chance to result was fed into another machine (often mature now for the touch screens and work with it. What many of us might have called tabulators) that read the punches recently both the software and hardware seen was developed 8 years later in 1972 and printed the results in human readable vendors have launched the computers by Bill English and had a ball that could format on paper. Some other computers products that are touch enabled. Microsoft rotate in any direction and was known as used long rolls of papers instead of cards. Windows 8 series of operating system “Ball Mouse”. The kind of optical mouse CRTs (Cathode Ray Tubes) that were used has been specifi cally designed for touch we use now days has evolved from many as memory in the computers gradually enabled devices including computers, of predecessors that needed a specifi c were used for creating very primitive laptops and hand held devices. surface (with specifi c marks to detect the displays. Eventually CRT based display Due to the technological innovations movements) to work with. It was not until evolved to show character based outputs in the area of display it is now possible 1999, when Microsoft introduced optical on the screen. All this was not working to build larger still lighter screens that mouse that was based on the technology well and fi nally Lee Felsenstein, and Steve can display lot many things and also high developed by Hewlett-Packard. Wozniak (yes, Wozniak again!) got on the resolution video contents. Touch enabled And now we have an assortment idea of using the CCTV monitor for using screens have opened the possibilities that of mouse kinds: laser mouse (optical the computer display. And successfully have just begun to get explored. Since, mouse that usages laser light for better did it in the year 1976. As the computer users can use their fi ngers (or a stylus) precision), ergonomic mouse (especially market grew gradually computer for making direct inputs there is no need designed for the hand comfort), tactile manufacturers started building monitors of a mouse. The screen itself can open up mouse (that provides hepatic feedback with higher resolutions, both monochrome as a virtual keyboard and that removes on movements), inertial and gyroscopic and color versions. Innovators and the the need of a physical keyboard. Taking mouse (that can be made to work in the manufacturers were always looking for the it even further it opens the door for the air). Apart from that there are mouse improvisations and concepts of plasma technologies that allow recognizing your designed for games having customized and LCD based displays were evolving handwriting to become commonplace and controls to suit the game. As an behind the scene. But these technologies that will change how the applications are alternative we also had something called were too expensive then. The problem built and used in signifi cant ways. the touchpad that allows controlling the with these monitors was that they were A Peek into the Future computer functions (cursor movements, built on diff erent standards and there We have seen how dramatically and selections etc.) through fi nger were a lot of them in the market. It was not computers have changed themselves from movements on a designated surface. until 1987 when IBM introduced the VGA a big giant number crunching machines to Apart from a change in the internal video standard that became the standard little device that can fi t into any hand and workings of the mouse it has also evolved for most of the computer monitors built. can do amazing things. This change both in functions it provides. Most the mouse Apple Macintosh II that was released in necessitated and has been fueled by the today has 2 to 3 buttons and a wheel. It the same year started supporting color research in the areas of technologies that has also evolved the way it is connected videos. Meanwhile, the LCD technology allow better human computer interactions. to the computer. Nowadays, we use the was being perfected and it was in late Ok, so we have thin monitors with crystal mouse that is often connected to a USB 1990s that manufacturers started off ering clear display, cordless USB based fancy port either through a wire of through a LCD based monitors as they were less mouse, ergonomic keyboards and ultra wireless connection whereas earlier they bulky and consumed lesser electricity. slim laptops. Where do we go from here used to get connected with serial ports. As computing technology evolved into now? We human beings spend more This apparently simple down to earth diff erent other areas like manufacturing, and more of our time with computers small device simplifi ed and improved point of sales, handheld devices, gaming and depend more and more upon it for

CSI Communications | September 2014 | 21 carrying out our day to day activities. potential of not only making many of the human emotions as well. Working with Researchers have started realizing that hardware components redundant but also the computers will be more direct, like computers are becoming a natural part of revolutionizes the way we interact with the working with a human being (and so with our lives. And that demands a shift in the computers. For example, it will allow users little of the additional devices). We are ways we interact with it. to interact from a distance with UI without really witnessing the history as it is taking Advancements in the technologies being in touch with the computer, and place just in front of our eyes. like touch, sensors, gesture and voice so even more than one people can work References recognition, virtual reality etc. is paving together on a big surface. Technologies [1] History of Computers and the Internet way for a new era for the computing or that can project the display output to http://vig.prenhall.com/ rather the human computer interaction. any surface and holographic display samplechapter/0130898155.pdf Current gesture recognition technologies etc. combined together with gesture [2] History of the Computer Mouse work in tandem with advanced cameras recognition will remove the requirement http://www.computinghistory.org.uk/ det/613/the-history-of-the-computer- having sensors and a possible device in of a fi xed sized monitor component and mouse/ the hand. But as the technology advances any surface of any size could potentially [3] Future of the Mouse and Keyboard further the cameras with sensors that don’t become a monitor. http://www.pcadvisor.co.uk/features/pc- need any devices to be worn on the hand Latest researches in the area of peripheral/3424183/whats-future-for- are getting popular. Gesture and voice Biochips and Artifi cial Intelligence (AI) keyboard-mouse/ [4] History of Computer Display recognition will change the way we talk to are the promises for the future of the http://www.pcworld.com/ the computer. Similarly developments in computing. Computers developed in article/209224/historic_monitors_ the fi eld of 3D and holographic display will near future will be super speed biochip slideshow.html revolutionize the way we look at things. equipped, project 3D holographic display, [5] GUI Timeline These technologies taken together understand our gestures and voice with http://toastytech.com/guis/guitimeline. html are all set to take the text and GUI precision, would be brain controlled [6] Various References based interface to next level. It holds and who knows may be will understand http://en.wikipedia.org n

Radharaman Mishra is a Senior Technical Architect with the Research & Innovation Tech CoE Group of IGATE. With over 14 years of experience in the IT services industry, he has worked on software application architecture and design, development, architecture assessment and consulting. His expertise includes .Net, ASP.Net and Microsoft SQL Server. He has been working with IGATE’s Fortune 500 customers on various Microsoft-specifi c enterprise application architectures and design. He has also published papers of technical interests in various external and internal forums. About the Author

CSI Communications | September 2014 | 22 www.csi-india.org Cover Hardik A Gohel Story Assistant Professor, Faculty of Computer Applications (FCA), Marwadi Education Foundation Group of Institutions

Looking Back at the Evolution of the Internet

Introduction World Wide Web, mostly known by its abbreviation WWW and universally known as Web, has plaiting solution variety for various problems and for gathering global audience information requirements. Web is an interlinked hypertext document system via internet, also defi ned as network of networks, for multimedia access. Since 1989, Web is the highest data ordnance in existing world and providing main force for large scale of Information Communication Technology & Networking (ICTN). It is a very tough job to analyse large content, Fig. 1 : First website usage patterns or hidden content structures. Further crucial job is to other experts to share data, information, There was rising interest in the generate knowledge from it. World Wide documentation and news. development of web browser after Web was invented by Tim Berners-Lee Fig. 1 shows snapshot of CERN website, incorporation of graphical, scripting then and after 20 years fi rst connection the fi rst website created in November 1992 as well as animation concept in web was established known as Internet. Many which was publicly announced in August browser. Netscape Navigator was based scientists with Tim at CERN, Switzerland 1991. There was still no browser with on the Mosaic web browser which was participated in experiments of exchanging graphical UI existing for NeXT. This gap was fi rst graphical web browser. Then W3C data and results which were otherwise fi lled with Erwise, an application developed (World Wide Web Consortium) was diffi cult for them and that helped Tim by Helsinki University of Technology, Finland founded by MIT (Massachusetts Institute understand the unrealized impending and ViolaWWW by Pei-Yuan Wei in 1992 of Technology) in 1994 with support of demand of millions of interconnections with ads on feature of scripting, graphics as DARPA (Defence Advance Research of computers through internet. At well as animation. Project Agency) as well as European present, Tim is director of World Wide Web Consortium, abbreviated W3C and working to add semantics in existing web. History of Web Tim-Berners-Lee built ENQUIRE, during 1980, as a personal database of people in which hypertext and software utilities for accessing database was key stream. The main objective was global sharing of data without presentation software as well as common machine. First development by him was NeXT Workstation. Then after fi rst web server and page with support of HTTP and web browser named World Wide Web was a project by itself. Rather than NeXT it was modifi ed further to be used on other machine. On 6th August 1991 there was a short summery posted by Berners- Lee on the project of WorldWideWeb on alt.hypertext newsgroup. The project intended to allow all links to be accessed from anywhere with any information, and for that they invited energy physicists with Fig. 2 : First Web Browser - MOSAIC browser V.1 released in April 1993

CSI Communications | September 2014 | 23 Table 1 : The Evolution of the web

Year Growth of web in Browsers & Technologies 1991 HTTP (Hyper Text Transfer Protocol) 1992 HTML 1 (Hyper Text Mark-up Language – Version 1) & MOSAIC – The fi rst web browser 1994 Netscape with HTML 2 1995 Opera & Internet Explorer (IE)with concept of Cookies & SSL 1996 JAVA with JavaScript as an HTML 3 1997 Flash & XML and HTML 3.2 1998 HTML 4 with CSS2 1999 AJAX 2002 SVG 2003 Safari Browser 2004 Firefox Browser 2005 Canvas, Initial version of Opera Mini 2006 XMLHTTPRequest2 2007 First Iphone released with Safari Browser 2008 Chrome Browser with HTML 5 and Request Protocol Handler as well as Offl ine web Apps : AppCache 2009 CSS3 with 2D & 3D Transforms and Animation, Geolocation 2010 Date & Time Input types, Audio-Video elements, CSS3 Flexbox and Index DB and First Firefox Browser for Mobile 2011 Touch events, Chrome OS v1, Web RTC, File System API, WEB GL(Inbuilt Graphics support) 2012 Chrome for Android Beta released, Content security policy, Full Screen API, CSS3 Filters, Web Audio API,

Commission. At the end of 1994 web the last internet boom when he launched emails available with friendly web interface. was made freely available by Berners-Lee shareyourworld whose time was not quite Hotmail was the fi rst email service of email without claiming patent and royalty due right. In the interview with Andy Plesser founded by Sabeer Bhatia and Jack Smith. which has motivated people to publish (2007), Chase talks about challenges in The limitation for storage was 2MB only. information online and instantly for bandwidth. He wonders about success of In December 1997 more than 8.5 million worldwide consumption. At present, web YouTube which picked up but this was not subscribers were there with Hotmail. has opened doors for direct web based possible for him in 2001. Video sharing Hotmail previously ran on Solaris for mail commerce. The utilities like search engine sites were not accepted until YouTube. services and Apache on FreeBSD for web and emails reached to common man. YouTube changed video sharing forever. services. After 1997 Hotmail is now known Social networking includes facebook, On 14th February 2005 YouTube was as MSN Hotmail due to its tie-up with blogs, tweeter, LinkedIn and other popular launched by 3 former PayPal employees Microsoft Corporation. web-based applications are examples of Chad Hurley, Steve Chen, and Jawed Karim. Rocketmail, Now Yahoo Mail, was web evolution. There are some typical “Me at the Zoo, in Fig. 3, was the fi rst founded by Yahoo in March 2002 which areas of web utilization that include online video of YouTube which was uploaded at was paid mail service with charge of learning and tutorials, E-Governance, 8:27 pm on Saturday 23rd April 2005. The $29. Yahoo Mail was having new design E-Commerce, services and manufacturing video was having very poor quality and it with additional features. Later Hotmail as well as research and development. was shot by Yakov Lapitsky at San Diego included dropdown menus in DHTML The table 1 shows evolution of web in Zoo on elephants. The duration of video the terms of technology as well as browsers. is 18 seconds.“ Presently, high defi nition Now let us refer WWW in the terms of (HD) video with high quality of resolution invention includes social networking, tweets, is available and streaming of video also blogs, wikis and videos. uses intelligent web aspects. Additionally, there are web applications which Video Web Evolution generate professionally produced videos Shareyourworld was the fi rst website for automatically by using patent-pending sharing video in 1997. There were many cinematic Artifi cial Intelligence technology plagued problems because of not having as well as high-end motion design. advanced internet technologies and shareyourworld is no longer available Web Based Electronic Mail Evolution since 2001 due to bandwidth as well as Email is as old as ARPANet or Internet. It fi nancial problems of the company. It was was not invented but has evolved from started by Chase Norlin who is head now simple to highly digital form. After the foundation of WWW, two companies - one at audio/video search company pixsy. Fig. 3 : First video of YouTube Chase takes us down memory lane, during is Hotmail and another is Yahoo - made

CSI Communications | September 2014 | 24 www.csi-india.org and diff erent categories of tabs with new most popular website in Brazil and India Google+ service was invented by user customization in colour schemes. In with 48.0% and 39.2% users respectively. Google with Invitation only feature in November 2002 Yahoo launched Yahoo The numbers of users in US were only 2011. The purpose of invention was to Mail Plus which was also a paid service 2.2%. Users of Orkut can add videos in give an invitation to increase number of provifi ng high storage capacity and other their profi les form YouTube and Google users for Google circle which was the old additional features like attachments and Videos. The supplementary option is name of Google+. But because of having multiple domain sending, fi ltering of creating restricted or unrestricted polls limitations to send number of requests, addresses and its storage. for polling community of users. There is Google has now launched Google+ for the Google mail, abbreviated with one integrated option with GTalk enabling users having age of 18 years and above Gmail, is a free email service run with chatting and fi le sharing with like button. without having any kind of invitation. the support of advertisements as well On June 2014 Google announced closure Wiki Evolution with Wikipedia as Email clients. It has been founded in of Orkut by upcoming September. Service that enables to add information to a 2004 by Paul Buchheit who explored the Facebook is a synonym of social centralized place in attractive manner from idea of web based mail in 1990. Google networking presently. It was founded by diff erent locations by multiple users with started its work on Gmail in August 2001. Mark Zuckerberg in October 2003 with collaborative web platform is known as Yahoo and Hotmail, who were ruling the the name of Facemash. Previously it was Wiki. In this, user doesn’t require any kind market at that time, were using HTML for Harvard University only. Later on it was of training. This concept was introduced by which requires reloading entire webpage expanded to other colleges in Boston area Ward Cunningham in 1995 as “The Simplest to provide diff erent services. In Gmail it and then afterwards it was made available online database that could possibly work”. is given feature of HTML with supported worldwide. In February 2004 Facebook He has given the name “WikiWikiWeb”. JavaScript which is known as AJAX. service was been launched by Facebook This is also known as writable web as well Furthermore “Google mail is having high Company. It was based on “HOT or NOT” as open editing concept. storage capacity, which is now available game for Harvard students which allowed Jimmy Wales and Larry Sanger, in Yahoo and Hotmail too, but Gmail is visitors to compare two pictures side by American entrepreneurs and founders of providing advanced search capabilities”. side and let them choose who is HOT and Wikipedia, launched Wikipedia in January Email evolution continues till date. who is NOT. At present, Facebook with 2001. Previously in 1993 Rick Gates gave Today’s research direction says that 792,999,000 visitors is a leading social the concept of online encyclopedia but email service should improve in terms of networking website because of its unique actual free encyclopedia was proposed knowledge mining to provide workfl ow features that include News Feed, Friend by Richard Stallman, president of free enhancement. It also includes machine and Unfriend capabilities, Wall, Timeline, software foundation, in the year 2000. The learning fi lter, smart screen and spam Like, Messages and inbox Notifi cations etc. project named as Wikipedia, previously trigger for more security. It also supports applications such as Event, Nupedia which was not a Wiki, with Social Media Evolution Marketplace, Notes, Places, Platforms, domain Wikipedia.com was started on Social networking sites are web based service Photos, Videos and Facebook Paper. Some January 2001. Server located at San Diego that helps to construct public or semi-public of the group functionalities are like listen was donated by Bomis. Bomis was dot profi le within bounded system. The fi rst with friends, Facebook live, Mood faces, com company that supported free online site of social networking was SixDegrees. Poke, URL shorter etc. From March 2011 content. Many former employees of Bomis. com created in 1997 which allows students onwards Facebook started supporting 70+ com contributed content to encyclopedia. to create profi les and list their friends. The languages to prop up global audience. In February 2001, totally 1000 articles were purposes of these sites were to provide There are other sites of social media received by the project. It reached up to online dating of diff erent profi les with each such as Twitter, LinkedIn, Google+, 10,000 in September and 20,000 within a other. Classmate.com allowed people to MySpace which are very popular. Small year. Then afterwards, there was a ratio of affi liate with their high school and college messages, known as Tweet, become 1500 articles per month and in August 2002 popular by social networking site Twitter buddies with surfi ng facility of other list. In number reached to 40,000. Presently in Inc., at San Francisco. It was created 2000 the service of SixDegrees.com was “English Wikipedia total number of articles by Jack Dorsey in 2006. Jack Dorsey is closed. During the period from 1997 to 2001 is 4,583,831 with 33,571,242 pages and very reputed businessman in USA, and there were many community tools available 835,702 fi les. There are total 731,253,050 an American software architect as well. with support of combination of profi les and edits since the beginning and number of Twitter.com site off ers to post messages publicly articulated friends. AsianAvenue, users is 22,202,218. In Wikipedia there online up to 140 characters long. BlackPlanet and MiGente allowed users are 1,401 administrators who are handling LinkedIn is another popular social to create professional as well as personal Wikipedia’s 129,524 active users”. networking website profi le for dating. Table 2 : Service stacked up against Competitors (in 2011) In January 2004, Orkut, social founded in December networking website was launched by 2002 and launched in Google Inc, and was made available May 2003. This site is Sr.No Worldwide Unique Visitors (in 000) worldwide in September 2004. The available in 20 diff erent 1 Facebook 792,999 service was designed to help users to languages and is having 2 Twitter 167,903 259 million users across maintain existing relationships as well as 3 LinkedIn 94,823 to create new relations. The creator of the world. Jeff Weiner is the CEO of LinkedIn who 4 Google+ 66,756 Orkut is one of the employees of Google 5 MySpace 61,037 named Orkut Büyükkökten. It was the was previously working with Yahoo. 6 Others 255,539

CSI Communications | September 2014 | 25 Study of Web Generation be shared and reused across applications, People/Berners-Lee/FAQ.html#Influences enterprises and community boundaries. (Accessed: 25th July 2014). Web 1.0 [4] Tim Berners-Lee: WorldWideWeb, the fi rst Web In 1990s the fi rst generation of web The aspect of semantic network was client, Available at http://www.w3.org/People/ has introduced with Netscape browser. thought about by cognitive scientist Allan Berners-Lee/WorldWideWeb.html (Accessed: As we have discussed in introduction M. Collins, linguist M. Ross Quaillin and 30th July 2014). psychologist Elizabeth F. Loftus in 1960 in [5] Berners-Lee, Tim (1991) On “Qualifi ers on section the purpose of this web was free Hypertext links... - alt.hypertext”. Accessed on information sharing online. This web was many publications to represent semantically 11th July 2012 by Wikipedia. very unattractive with slow turnaround, low structured knowledge. Tim Berners-Lee [6] Browse the fi rst website using the line-mode quality of pictures, unreliable web hosting coined the term semantic web to extend browser simulator, Available at http://line- the network of hyperlinked human readable mode.cern.ch/www/hypertext/WWW/ as well as email, terrible customer services, TheProject.html (Accessed on 30th July 2014). not or very little search engine optimization. content (web pages) by inserting machine [7] Evolution of the web, browsers & Technologies, readable content (metadata) about pages Web 2.0 Available at http://www.evolutionofthe web. and their interaction by enabling agents to com/#/evolution/day (Accessed on 1st August Second generation of web was beyond access the web more intelligently as well as 2014). static web pages as well as web design. It [8] Sajja P S, Akerkar R (2012) Intelligent Technologies perform tasks on behalf of users. allowed users to interact and collaborate for Web Applications, 1 edn., USA: CRC. with one another. The concept of Web “A Web of data that can be processed [9] Invention of YouTube and the First Video directly and indirectly by machines is sharing site Ever.(2013) http://www.chess.com/ 2.0 was initiated in late 2004. Although it groups/forumview/invention-of-youtube-and- suggests new version of World Wide Web, semantic web” – Tim Berners-Lee the-fi rst-video-sharing-site-ever (Accessed on it not only includes technical specifi cation Future of Web (Web Intelligence / Web 12th August 2014). but also cumulative changes to the web. [10] Andy Plesser (2007) First Video Sharing Site Wisdom) Paved the Way for YouTube — ShareYourWorld. Web 2.0 includes social networking sites, Presently, Millions of developers are com Was There First to Launch Ten Years Back blogs, wikis, video sharing, folksonomies, creating and using web in their desktop, http://www.beet.tv/2007/07/first-video-sha. hosted services and web applications. Web tablets, phones, televisions, automobiles, html (Accessed on 12th August 2014). 2.0 allows users to do much more than [11] Hartley, Matt (2010). “Ten of YouTube’s digital billboards, watches and everywhere. most infl uential videos”. Canwest Global mere retrieving of information. Instead of According to Tim Berners Lee, very soon Communication, Toronto, Ontario, Canada. only reading information users can publish millions of sensors, appliances and other [12] In Portuguese (2014) “Adeus ao Orkut” by comments and their views in articles. They devices will take web to new places. He Google on June 30, 2014. (Accessed on 13th can create profi les with login and password. August 2014). has mentioned that future of web is under [13] Paulo Golgher (2014), Tchau Orkut, available There are browsers with user friendly threat from governments who are likely to at http://en.blog.orkut.com (Accessed on 13th interfaces, application software and fi le misuse their power, from businesses who August 2014). storage facilities. Therefore, web 2.0 is also try to destabilize open market and from [14] Matheus Thomaz (2014), History of Orkut, at called network as platform computing. http://socialnetworks-tsi.blogspot.in/2011/06/ criminal activity. The future of web depends history-of-orkut.html (Accessed on 14th August Client side web, known as web browser, on normal people talking with responsibility 2014). in Web 2.0 used Ajax and JavaScript for tremendous resource and on challenging [15] Eric Eldon (2001), “ComScore: Google+ Grows framework for continued integration of those who seek to manipulate web against Worldwide Users from 65 Million In October To users with web pages. Server side web 67 Million In November” at http://techcrunch. the public good. Tim has also mentioned com/2011/12/22/googlesplus (Accessed on in Web 2.0 includes same languages of that the improvement of the infrastructure 14th August 2014). web programming or designing but, with to provide additional functional, robust, [16] Danah M Boyd, Nicol Ellison (2010) “Social attractive data format. In Web 2.0 it is effi cient and available service web will Network Site: Defi nition, History and Scholarship” possible to share data among multiple sites. at http://www.danah.org/papers/JCMCIntro.pdf play very pivotal role. Furthermore, future (Accessed on 14th August 2014) Web 3.0 (Semantic Web) web, apart from being a space browseable [17] “The Inventor of Email” at http://www. Web 3.0 is also known as semantic by humans, will contain rich data in a form inventorofemail.com/history_of_email.asp (Accessed on 14th August 2014). web and it is a mutual movement of understandable by machines, thus allowing [18] Ian Peter (2004) “The History of Email” at W3C (World Wide Web Consortium) machines to take a stronger part in analyzing http://www.nethistory.info/History%20of%20 international standard. Semantic web is the web, and solving problems for us. the%20Internet/email.html (Accessed on 14th an attempt to enhance current web so that August 2014). [19] “The Brief History of Social Media” at http:// computers can process the information References [1] Tim Berners-Lee on “Past, Present and Future of www2.uncp.edu/home/acurtis/NewMedia/ existing on WWW, understand and fi x Web” at http://www.w3.org/People/Berners- SocialMedia/SocialMediaHistory.html it, help humans to discover required Lee/1996/ppf.html (Accessed on 17th August (Accessed on 14th August 2014). knowledge. It is proposed to form a huge 2014). [20] Mahesh Mohan (2013) “Gmail vs. Outlook.com vs. Yahoo! Mail: An Ultimate Comparison” at distributed knowledge based system to [2] History Of Web (2014), Available at: http:// webfoundation.org/about/vision/history-of- http://www.minterest.org/gmail-vs-hotmail- share data instead of documents. In other the-web/ (Accessed: 25th July 2014). outlook-vs-yahoo-mail (Accessed on 14th words, we can say that semantic web is a [3] Tim Berners-Lee (2013) Frequently asked August 2014). common framework which allows data to questions, Available at: http://www.w3.org/ n

Hardik A Gohel An academician and researcher, is active member as well as secretary of Computer Society of India Rajkot Chapter. He is also devoted Assistant Professor of Faculty of Computer Applications (FCA) at Marwadi Education Foundation Group of Institutions. His research spans Intelligent Web Technology, Applications and Services. He also focuses on “How to make popular, Artifi cial Intelligence in study of Computer Science for various reasons”. He has 22 publications in various impactful Journals and proceedings of national and international conferences. About the Author

CSI Communications | September 2014 | 26 www.csi-india.org Cover Mr. K. V. N. Rajesh* and Mr. K. V. N. Ramesh** *Sr. Assistant Professor, Department of Information Technology, Vignan’s Institute of Information Technology, Visakhapatnam Story **Project Manager, Tech Mahindra, Visakhapatnam A Brief History of BIDW (Business Intelligence and Data Warehousing)

Introduction of analysis on their own, using spreadsheet of current concepts of BIDW like extract, Business Intelligence (BI) is a set of software like Lotus 1-2-3 though they were transfer, querying, scheduling, usage tools and techniques used to derive still dependent on the IT to get the data to tracking can be drawn with the concepts useful information from the vast their Desktop. mentioned in this paper. amount of organizational data. Data Then, came the era of client-server and After this too, Business Intelligence as Warehouse (DW) is a central repository distributed computing. With the data spread a term was used in many contexts and to of organizational data derived from across the organization across diff erent mean diff erent things. The fi rst time usage various operational and other sources kinds of systems and databases, direct of the term “Business Intelligence” with the and structured in a way suitable for access of data from these systems using meaning as we know now, was in 1989 by the querying, analysis and reporting using various end users tools became possible. Gartner Analyst Howard Dresner. He used BI tools. Business Intelligence and But this came with its own set of problems it as an all-encompassing term to describe Data Warehouse are a necessity for all like performance issues, data reconciliation various methods in vogue for discovery of businesses of considerable size who aim issues across diff erent systems and no information and to support decision making. to understand and grow their business. availability of single version of truth. Data Warehousing Also, they have become a necessity The need for the Data warehouse Ever since computers were used to support the day to day business in as the central repository of data which commonplace, Businesses did collect data various verticals and to generate the could provide an integrated view of and analyze it for deriving business benefi t reports necessary to comply with various Business, rose out of these issues out of the same. The need to report on the Government norms. This article aims related to operational data spread across business data for carrying out the day-to- to present a brief history of Business systems. With the development and day operations and complying with the Intelligence and Data Warehousing (or implementation of DW systems, the end government norms was always there. BIDW in short). It is not possible to users could connect to the DW using the Data-driven Decision Support present this history in strict chronological BI tools to fetch and analyze data on their Systems (DSSs) are earlier known order since none of these techniques own with lesser support from the IT staff . examples of how analysis of stored data and concepts have been invented or Business Intelligence was used to aid decision making. One of discovered on any particular day. They The earliest known usage of the term the fi rst known example is that of AAIMS, have slowly evolved over a period of time “Business Intelligence” dates back to the An Analytical Information Management ever since the data related to businesses year 1865 in a book named “Cyclopædia System, developed by Richard Klass and and organizations has been collected and of commercial and business anecdotes” by Charles Weisss at American Airlines stored digitally using computers. Also, Richard Miller Devens. It mentions about during the period 1970-1974. It was the history of both these systems is being a London banker and politician named Sir developed using the APL programming presented in a single article since both of Henry Furnese (1658-1712) who maintained language. It consisted of a database of them are intertwined and it would convey a communications network across Europe. sales, price and employee data and aided the full purpose and meaning when both He used this network to receive advance in data analysis through data retrieval, are discussed and presented together. information about battles before others and manipulation and report generation. This article also discusses the ideas and used this to advantage to gain profi ts. The Pioneering eff orts with respect to concepts proposed and propagated by term Business Intelligence was used in the BIDW were carried out in Procter and various pioneers in the fi eld of BIDW. mentioned book in this context and we can Gamble in around 1985. A Data driven DSS Evolution clearly draw analogies of this to the present that linked the sales information, scanner Mainframes were one of the fi rst day usage of Business Intelligence to draw data, products and customer was built computer systems used in Businesses. wealth out of information. for P&G by Metaphor Computer Systems The organization data was stored centrally The fi rst documented usage of the which was a spinoff of the Xerox’s Palo Alto on Mainframes. COBOL was used then term “Business Intelligence” in the era of Research Center. Later, many of the staff to create and deliver standard and automation was in year 1958 by H.P.Luhn from Procter and Gamble and Metaphor custom reports. The Business Users were in the paper titled “A Business Intelligence Computer Systems like Ralph Kimball and dependent on the Information Technology System” published in October 1958 edition Katherine Glassey went on to found BI staff for generating these reports. Any of IBM Journal. It talks about the automation vendors like Red Brick Systems and Brio. changes to the existing reports or creation and information retrieval and dissemination The Business Data Warehouse as a of new reports required a long lead time. using data processing machines. The term concept was fi rst proposed formally in Then, with the advent of Desktop Business Intelligence is used in the context paper titled “An Architecture for a business and Personal computing in 1980s, the of automated document and knowledge and information system” by the IBM staff Business users too could do various kinds management in a library setting. Analogies named B.A.Devlin and P.T. Murphy in 1988

CSI Communications | September 2014 | 27 in IBM SYSTEMS JOURNAL, VOL 27, initial cost and quicker return on investment. The name DB2 was used to indicate its NO 1. Many of the concepts related to The disadvantage is about how eff ectively shift from the hierarchical databases to BIDW as we know now, were discussed in individual and disparate data marts can the relational database. this article. The need for DW as a separate integrate well and provide the full advantage MySQL was created by a Swedish system from the operational databases of a complete DW in actual. company and its fi rst internal release was was discussed. The architecture of the In actual DW implementations, a in May, 1995. It was released over the Business Data Warehouse with raw data, hybrid approach having the advantage internet as an open source software. It is a detailed data, summary data and user view of both the approaches would be widely used Open Source RDBMS. of data was discussed. The requirement of more workable keeping in view of the The SQL Server was co-developed no change to public data in the Business management and budgetary support by Microsoft and Sybase for use on OS/2 Data Warehouse has been emphasized required to build such a system. platform in 1988. Initially, it was developed in this paper. The concepts related to in 1987 by Sybase as “Sybase SQL Server” Relational Database Management Data design, user views and access and for UNIX. Microsft SQL Server has Systems (RDBMS) security, data loads and updates have also specialized edition with Multiple Parallel Almost all the DWs that we know today are been elaborated in this paper. Processing (MPP) Architecture which is implemented on RDBMS. The relational The subsequent discussion in the optimized for large Data Warehouses. model of building databases with tables history of DW would invariably involve at Teradata is a RDBMS from a company of rows and columns was introduced by a least a brief mention of the approaches of the same name and aimed at Data IBMer named E.F.Codd in his paper titled proposed by Bill Inmon and Ralph Kimball. Warehouses and Data Marts. The fi rst “A Relational Model of Data for Large beta version of the product was released Bill Inmon Shared Data Banks” which was published during Christmas of 1983 for Wells Fargo Bill Inmon is acknowledged by many in this in June, 1970 in the Communications of the Bank. fi eld as the father of Data Warehousing. He ACM journal. He proposed a set of 13 rules proposed an approach which is known as to which a database needs to confi rm, for Extract, Load, Transform (ETL) Tools Top-down approach. This involves building it to be considered as a RDBMS. These are The DWs source data from multiple and one centralized repository which will act known as the Codd’s twelve rules. diff erent types of sources. The sources as the enterprise-wide DW. The data in The relational theory was given a could be RDBMS, fl at fi les and also non- this DW would be normalized and follow physical form through the Structured relational databases. Initially, the ETL the entity–relationship model (ER model). English Query Language (SEQUEL) in process was carried out using custom The Data marts following the dimensional the 1970s by IBMers named Donald scripts and SQLs and procedural language modeling approach would be built out of Chamberlain and Raymond Boyce. This extensions of SQLs. But now-a-days most this DW to satisfy the reporting needs of was later renamed as Structured Query of the organizations go for ETL tools for the individual departments. He published a Language (SQL). SQL consists of the Data creating the ETL tasks and running the book titled “Building the Data Warehouse” Defi nition Language (DDL) and Data ETL processes. Informatica, IBM, SAP, in the early 1990s detailing this approach. Manipulation Language (DML) used for Oracle and SAS are the top vendors of Ralph Kimball creation and modifi cation of schemas, the ETL tools. Informatica PowerCenter, Ralph Kimball is another pioneer in the and insert, update and delete the data and IBM InfoSphere DataStage, Oracle Data fi eld of DW whose methodology is known to control access to data. Integrator are the popular ETL tools. as the Bottom-up approach. This approach SQL is the language used by the ETL Business Intelligence (BI) Tools involves building individual data marts for tools to insert data into the DW and is BI tools are used for querying, reporting satisfying the reporting needs of individual also used by the BI tools to query the data and analysis of the data stored in the departments. These Data marts are built stored in the DW. Databases and DWs and other sources. using the dimensional modeling approach. Data in DW is structured to aid SAP Business Objects, Oracle OBIEE, IBM The Data Marts are joined using the bulk insert of data by ETL tools and fast Cognos, Microstrategy, Microsoft SQL common dimensions to integrate them querying of the data by the BI tools. Some Server Reporting Services, TIBCO Spotfi re, into a complete DW. He published a book of the features of the RDBMS which Tableau are the BI Tools currently popular titled “The Data Warehouse Toolkit” in the aid Data Warehousing are Indexing, in market. 1996 detailing this dimensional modeling Caching, Partitioning, Parallelism, and Online Analytical Processing (OLAP) approach. Materialized Views. OLAP is the approach to do multi- Both the Inmon and Kimball The top databases for BIDW are dimensional analysis on data structures approaches have their own set of advantages Oracle, DB2, MySQL, SQL Server, Teradata. known as cubes. The term OLAP was and disadvantages. Inmon approach is a Oracle released the fi rst commercial coined by E.F.Codd in 1993. He proposed very sound approach leading to a large and SQL relational database management the “twelve laws of online analytical integrated DW with an enterprise view of named Oracle Version 2 in 1979. It holds processing”. Oracle Hyperion Essbase and data. The main disadvantage is the high the number one position in Database Microsoft SQL Server Analysis Services amount of initial cost and time required Management System (DBMS) market as are popular OLAP tools. before it starts giving return on investment. on date. Kimball approach has the clear advantage IBM released its version of the DBMS Data Warehouse Appliances (DWA) that the individual data marts are more known as the DB2 or the IBM Database 2 The term Data Warehouse Appliance easily built at a quicker pace leading to lower in 1983 on its MVS mainframe platform. was coined in early 2000s by Foster

CSI Communications | September 2014 | 28 www.csi-india.org Hinshaw, a founder of Netezza. DW power to understand the past and analyze [2] Devens, R M (1868). Cyclopaedia of Appliances are packaged hardware the present. They also provide the ability Commercial and Business Anecdotes: (servers, storage) plus software to compare diff erent parameters and Comprising Interesting Reminiscences and Facts... of Merchants, Traders, Bankers... Etc. (operating system, DBMS) architected the potential outcomes using What-if in All Ages and Countries... D. Appleton. for huge data volumes and high analysis. Users of the BIDW tools go up to [3] Devlin, B A, & Murphy, P T (1988). An performance and hence are very useful the level of CEO. This only explains how architecture for a business and information for deploying large Data warehouses on important these tools are to Business. system. IBM systems Journal, 27(1), 60-80. them. They usually use the massively This article has traced the timeline of how [4] Inmon, W H (2005). Building the data warehouse. John Wiley & Sons. parallel processing (MPP) architecture. BIDW technology has come way forward [5] Luhn, H P (1958). A business intelligence Netezza, Greenplum and Oracle Exadata from the time of advent of computers system. IBM Journal of Research and are popular examples of DWA. to the state in which we see it now. The Development, 2(4), 314-319. [6] Nylund, A (1999). Tracing the BI family tree. Conclusion usage and support for BIDW in Businesses is only expected to grow in future. Knowledge Management, 70-71 Survival of the Businesses depends on [7] Ralph, K, & Ross, M (1996). The data staying one step ahead of the competition References warehouse toolkit. John Wiley & Sons. by understanding the internal and external [1] Codd, E F (1970). A relational model of data [8] http://www.oracle.com/us/corporate/ history/index.html environment. BIDW tools provide the for large shared data banks. Communications of the ACM, 13(6), 377-387. n

Mr. K. V. N. Rajesh has obtained his B.Tech in Computer Science and Engineering from Jawaharlal Nehru Technological University in 2005. He obtained his M.Tech in Computer Science and Technology from Andhra University in 2010. He is working as Senior Assistant Professor in department of information technology at Vignan’s institute of information technology, Visakhapatnam since 2005. He is a member of Computer Society of India. His research interests include Business Intelligence, Location Intelligence and Big Data and he has published papers in the respective areas. He can be reached at [email protected].

Mr. K. V. N. Ramesh is a M.E in Structural Engineering from Andhra University. He has 14 years of experience in IT industry with expertise in the area of Data Warehousing and Business Intelligence. He has worked on UNIX, Oracle, Sybase, Business Objects and OBIEE during these years. He is an Oracle certifi ed professional in Oracle DW and OBIEE. He is currently working as Project Manager at Tech Mahindra, Visakhapatnam. He can be reached at [email protected]. About the Authors

CSI Communications | September 2014 | 29 Dear Member, You must have observed the improvement in the quality and content of CSI-Communications. However we wish to have your valuable feedback for CSI-Communications. You may use this Business Reply Envelope or a link available at CSI website: http://www.csi-india.org/web/guest/publications CSI Executive Committee has decided to offer a complimentary CSI Membership I-Card during CSI Golden Jubilee Celebrations to all the Life Members, Corporate Members including Nominees of the institutes (academic and non academic) on receipt of duly filled in form with passport size color photographs latest by 30th September, 2014 at the CSI Head Quarters, Mumbai. We appreciate your time for your response. Sincerely, Suchit Gogwekar Executive Secretary, CSI

1. Since when are you a CSI Member? YYYY

2. Which other society’s membership do you have?

ACM IEEE NASSCOM Any other

3. Do you get your monthly copy of CSI- Communications regularly? Yes No

If Yes by what date of the month do you get it? Date 4. How do you rate the quality of content of CSI – Communications?

Excellent Very Good Good Average Poor 5. Which sections of CSI- Communications do you find the most interesting?

Cover Story Technical Trends Research Front Articles Security Corner Practitioner Workbench 6. What are the additions you would like to see in the current content of CSI- Communications?

7. Which theme of CSI-Communications you like the most up till August 2014 issue?

8. Would you like to suggest any specific theme for the upcoming issues of the Magazine?

9. Which other Technical Magazine you read often?

10. Do you access CSI – Communications’s Digital version - DigiMag? Yes No

If Yes, Rate your experience Excellent Very Good Good Average Poor If No, Tick the reason – Not aware Not user Friendly Not Interested

11. Do you access CSI- Communications App? Yes No

If Yes, Rate your experience Excellent Very Good Good Average Poor

If No, Tick the reason – Not aware Not user Friendly Not Interested

12. Have you ever referred CSI- Communications to your friends or Colleagues? Yes No

13. What version of CSI – Communications would you prefer? Hard copy Soft copy (CSI’s “Go Green” initiative encourages members to opt for the soft copy. Those members who DO NOT return this form duly filled, will be automatically moved to the “Soft Copy” option and will cease to receive the hardcopy of CSIC after the September issue).

CSI Communications | September 2014 | 30 www.csi-india.org We appreciate your time to fill up following information which is required to update your Membership record with us to serve you better and send you CSI Golden Jubilee Celebration I-Card. Affix your Date : ddmmyy photograph. Please do not CSI Membership Number: staple and do not sign on it. Chapter:

Name:

Address:

City: Pin :

Email id :

Mobile No: Signature :

Postage No postage will be BUSINESS REPLY ENVELOPE Stamp paid by the Permit No. Necessary Addressee Mumbai if Posted in India To, Mr. Suchit Gogwekar Executive Secretary Computer Society of India Samruddhi Venture Park, Unit No.3, 4th floor, MIDC, Andheri (E).

Mumbai-400093

CSI Communications | September 2014 | 31 Computer Society of India TM Education Headquarters, Chennai Invites applications for the post of Regional Education Offi cer at Delhi, Kolkata & Bhubaneswar Minimum Qualifi cation: MBA with 5 yrs. experience Maximum Age limit: 40 years Last date of receiving application via e-mail: 30th September, 2014. Send your bio data to: [email protected] For details, visit: https://www.csi-india.org Sanjay Mohapatra Hony. Secretary

CSI Communications | September 2014 | 32 www.csi-india.org Cover Dr. S. Natarajan Story R & D and Teaching Professor and Key Resource Person, Department of Information Science and Engineering, PESIT, Bangalore

Strolling Down the Memory Lane

If I look back about 42 years in my life, I can bring back those days when we were simulating the trajectories of the missiles. The work was carried out Defence Research and Development Laboratory (DRDL) situated in Hyderabad. This was the birth place of Computer Society of India. As compared to the current scenario, we hardly had any computing resources with us. I joined the Computer Centre at DRDL in 1972. Before this, Col Balasubramaniam the then Head of Computer Centre went to Delhi on promotion. I missed the opportunity to work with him as my seniors used to fondly remember him. We had at our disposal an IBM 1620 computer for all the computing needs of not only DRDL as well as other Laboratories like Defence Electronics Research Laboratory (DLRL) and Defence Metallurgical Research Laboratory (DMRL). I saw in the log of late 60s that we were also catering to Fig. 1: IBM 1620 system with Card Reader in the left prestigious institutions like Tata Institute of Fundamental Research (TIFR). It will be interesting to note that all of software relating to aerodynamics, structures, control and guidance systems, propulsion (solid and liquid) systems, simulation etc., was carried out in IBM 1620. This computer is a 8 bit system with memory of 40K. All the programs were written in FORTRAN II language. We needed a full- fl edged Air-Conditioning system which was provided by Military Engineering Group (MEG). The console of the computer had multiple lamps and buttons. Perhaps the computer operator in those days had a lot of work to do. With our experience we were able to decipher the operations that are currently executed. The input for this system was the source code in punched cards. The picture of the system is in Fig. 1 and the expanded picture of the console is in Fig. 2. One may wonder how the computer processing for the missile development was done in those days. Having gained experience in scientifi c computing I joined National Remote Fig. 2: Console of IBM 1620 Sensing Agency (NRSA) now called NRSC, in 1977. a medium sized computer was a days at NRSA we did not have general In those days importing even cumbersome process. During the initial purpose computer at our disposal. So we

CSI Communications | September 2014 | 33 data processing of the LANDSAT Satellite of USA were done in this system during that time. The staff in the lodge where we stayed used to wonder as to what we were engaged in those unearthly hours. Our rooms were locked in the day as we were sleeping. A partial view of the system is in Fig. 4. The computing facilities were added in our office were of PDP- Fig. 3: IRIS 55 Computer 11 families from Digital Equipment Corporation were using the IRIS 55 System (French) at Electronics Corporation of India (ECIL), Hyderabad. This was a 16 bit system with 256 K memory. When we were sending our source cards to the console operator, Fig. 7: VAX 11/730 computer the errors of compilation were printed in French and needed translation for the (DEC) which were the work horse for correction process. A typical IRIS 55 satellite data acquisition at Shadnagar system is displayed in Fig. 3. Earth Station situated about 60 Kms from Hyderabad as well as at Balanagar, Hyderabad. Whenever, a prospective Fig. 5: PDP 11/40 customer wishes to evaluate PDP systems our vendor M/S Hinditron Computers used to bring them to our premises as we had the PDP family of systems with us. Some of these systems are in the following figures. This was followed by the acquisition of VAX Series of Computers of DEC. This was used when our first Indian Remote Sensing Satellite (IRS- Fig. 4: Parti al view of IBM 370/155 1A) was launched in 1988. A typical view of VAX 11/730 is below. Now you may imagine that any of the current day desktop with 2 GB RAM and We were also booking time on IBM 500 GB of Memory installed in homes is 370/155 at IIT Chennai. The booking slots much more powerful than any of these are for a minimum of 1 hour and usually systems but still good scientifi c work was start at mid night. Normally our timings carried out in those days. were between 2:00 AM and 4:00 AM. . Fig. 6: PDP 11/70 system n All the software programs for the satellite

Dr. S Natarajan holds Ph. D. (Remote Sensing) from JNTU Hyderabad India. His experience spans 33 years in R&D and 10 years in Teaching. He worked in Defence Research and Development Laboratory (DRDL), Hyderabad for Five years and later worked for Twenty Eight years in National Remote Sensing Centre (NRSC) at Hyderabad, India. He was trained in Digital Image Processing in DLR, Germany and in Automated Cartography at IFAG, Germany during 1979 and 1980. His areas of interest are Soft Computing, Data Mining and Geographical Information System. About the Author

CSI Communications | September 2014 | 34 www.csi-india.org Manu K. Madhu* and Biji C.L.** Research *M. Tech Student, MG University, Kottayam Front **PhD., University of Kerala, Thiruvananthapuram Parallel Computing with Message Passing Interface

This article is the second in the series of articles, focusing on Message passing interface programming for parallel computing paradigm. A general introduction to parallel computing and message passing interface was covered in the previous issue. Current issue focuses more on programming for MPI Subroutines with toy examples.

MPI Subroutines be initialized only once and should be called determines the size of the group associated MPI subroutine communicates among before any other subroutine. Subsequent with a communicator. The syntax is int different processors in the MPI calls to this routine is erroneous. Users MPI_Comm_size(MPI_Comm comm, int communication world for performing can select the number of processors for *size), where MPI_Comm is a MPI object, jobs in parallel. MPI subroutine can executing the task through command line comm represents communicator and size be called from languages such as C, arguments. The syntax is int MPI_Init(int represents the number of processors in C++, FORTRAN77 and FORTRAN90. *argc, char **argv). The input parameters are the group of comm. As shown in Fig. 1, During the MPI ‘argc’- pointer to the number of arguments MPI_Comm_rank subroutine call in the main program, and ‘argv’- pointer to the argument vector. MPI_Comm_rank subroutine is used compiler will execute the function and MPI_COMM_size to distinguish each processor of the returns result back to the main program. The MPI_COMM_size subroutine communicator; an ID is assigned to each processor and is called rank of the processor. One processor communicate explicitly to another processor using rank as its ID and the syntax is in t MPI_Comm_ rank(MPI_Comm comm, int *rank) MPI_Finalize MPI_Finalize subroutine will terminate the MPI execution environment. No other MPI call can be made after calling MPI_ Finalize() Collective Communication Subroutines For executing jobs in parallel, it is required to communicate with diff erent processors. The subroutines used to perform collective communication are listed below. MPI_Reduce Fig. 1: Flow of program with MPI_Subrouti ne This subroutine performs a global reduction operation across all the members of a group, and brings the Subroutines defi ned inside MPI can be classifi ed as Environmental Subroutines Collective Communication Subroutines Point to point Communication Subroutines Environmental Subroutines These include a group of subroutines, which helps to initialize & fi nalize the MPI execution environment, querying processor’s rank and querying the total number of processors in the MPI communication world. The various environmental subroutines is listed below. MPI_Init The MPI execution environment is initialized Fig. 2: Schemati c representati on of process behind MPI_Reduce subrouti ne using the MPI_Init subroutine. MPI should

CSI Communications | September 2014 | 35 result to the master node.Figure2 shows Point to point schematic representation of process Communication behind MPI_Reduce subroutine. In Subroutine this example values 10, 40, 20 and 30 It includes the subroutines are fetched from each processor for used to perform point to performing a specific operation and point communication results returned to the output buffer of MPI_Send the processor 0 or root node. That is, MPI_Send performs a when MPI_Reduce subroutine is called standard mode block it will combine the inputs provided in send operation, i.e. the input buffer of each processor in the these functions do communicator, using the operation ‘*’, not return value until then returns the result after the the communication is operation to the output buffer of the fi nished. The syntax is root node. Int MPI_Send(void Syntax-intMPI_Reduce(void *sendbuf, *sendbuf, int count, MPI_ void *recvbuf, int count, Datatype datatype, int MPI_Datatype datatype, MPI_Op op, dest, int tag, MPI_Comm int root, MPI_Comm comm) comm), where MPI_ Input Parameters Datatype and MPI_Comm Fig. 3: Data movement during MPI_Send and MPI_Recv sendbuf: Address of send buff er are object. functi on calls (choice). Input Parameters count :Number of elements in send sendbuf :Initial address and MPI_Recv function call is depicted buff er (integer). of send buff er (choice) below. When the processor 0 calls an Datatype: Data type of elements of count: Number of elements in send MPI_Send, the data stored in sendbuf(send send buff er (handle). buff er (nonnegative integer) buff er) is copied into the sysbuf (system op :Reduce operation (handle). datatype :Datatype of each send buff er). And when processor 1 makes a Root: Rank of root process (integer). buff er element (handle) MPI_Recv function call, data from sysbuf of comm :Communicator (handle). dest :Rank of destination (integer) processor0 will be copied into processor 1’s Output Parameters tag: Message tag (integer) sysbuf. Then from the sysbuf data is copied recvbuf:Address of receive buff er comm : communicator (handle) into recvbuf (receive buff er) of processor 0. (choice, signifi cant only at root). MPI_Recv Now, let us start MPI programming Reduce operations can be any of the Performs a blocking receive operation. with some toy examples. For better following Receive buff er is a storage for count understanding even, an ordinary C MPI_Reduce support a set of predefi ned number of consecutive elements of type program is included before the MPI operations, which are listed below. specifi ed by data type. Message received program. We have included three diff erent examples to brief the concept of MPI Table 1: Possible MPI_Reduce Operations must be less than or equal to the length of the receive buff er. The syntax is programming. int MPI_Recv(void *recvbuf, int Example 1: The trivial hello world program. MPI Name Function count, MPI_Datatype datatype, An ordinary Hello world program in C is MPI_MAX Maximum int source, int tag, MPI_Comm #include comm, MPI_Status *status) MPI_MIN Minimum int main(intargc,char Input Parameters **argv) MPI_SUM Sum Count: Maximum number of { MPI_PROD Product elements to receive (integer). printf(“Hello world\n”); Datatype: Datatype of each } MPI_LAND Logical AND receive buff er entry (handle). The command line syntax for the MPI_BAND Bitwise AND source: Rank of source compilation of C program and the output (integer). MPI_LOR Logical OR is listed below. tag :Message tag (integer). MPI_BOR Bitwise OR Comm: Communicator $ gcc hello.c $ ./a.out MPI_LXOR Logical exclusive OR (handle). Hello world Output Parameters MPI_BXOR Bitwise exclusive OR recvbuf: Initial address of The parallelized Hello world program with MPI_MAXLOC Maximum & location receive buff er (choice). the MPI subroutines is as follows. The command line syntax for the MPI_MINLOC Minimum & location Status: Status object (status). The data fl ow during MPI_Send compilation of MPI program and the

CSI Communications | September 2014 | 36 www.csi-india.org #include #include int main(intargc,char **argv) { intmyid, numprocs,i; MPI_Init(&argc,&argv); MPI_Comm_size(MPI_COMM_WORLD,&numprocs); MPI_Comm_rank(MPI_COMM_WORLD,&myid); printf(“Hello from processor %d of %d\n”,myid,numprocs); MPI_Finalize(); } output is listed. In the above example, As next instance, let us try to Example 2:MPI Program to fi nd sum number of process defi ned is 4. Hence, analyse the importance of MPI_Reduce, of marks obtained in 1st 2nd and 3rd years four diff erent copies of the program is used when a collective communication and total marks obtained in degree exam generated and will be distributed to the is required. 4 processors for executing the jobs in Table 2 shows the marks scored by Rinky in her degree exams. parallel. $ mpicc hello.c $ mpirun -np 4 ./a.out Sub1 Sub2 Sub3 Sub4 Sub5 Hello from processor 0 of 4 1st year 40 30 50 30 40 Hello from processor 1 of 4 2nd year 50 30 50 40 40 Hello from processor 2 of 4 Hello from processor 3 of 4 3rd year 30 30 40 50 50

A linear code will be like this

#include int main(intargc,char **argv) { intmyid, numprocs,i,j,sum[3],tsum=0; intdegreeMarks[3][5]= { {40, 30, 50, 30,40} , //Degree fi rst year marks {50, 30, 50, 40,40} , //Degree second year marks {30, 30, 40, 50,50} //Degree third year marks }; for(i=0;i<3;i++) { sum[i]=0; } for(i=0;i<3;i++) { for(j=0;j<5;j++) { sum[i]=sum[i]+degreeMarks[i][j]; } printf(“Year %d total marks=%d\n”,i+1,sum[i]); } for(i=0;i<3;i++) { tsum=tsum+sum[i]; } printf(“Total marks obtained in Degree Examinations=%d\n”,tsum); }

OUTPUT $ gccdegreeMarksN.c $ ./a.out Year 1 total marks=190 Year 2 total marks=210 Year 3 total marks=200 Total marks obtained in Degree Examinations=600

CSI Communications | September 2014 | 37 Parallelized code will be like this

#include #include int main(intargc,char **argv) { intmyid, numprocs,i,sum=0,tsum=0; intdegreeMarks[3][5]= { {40, 30, 50, 30,40} , // Degree fi rst year marks {50, 30, 50, 40,40} , //Degree second year marks {30, 30, 40, 50,50} //Degree third year marks }; MPI_Init(&argc,&argv); MPI_Comm_size(MPI_COMM_WORLD,&numprocs); MPI_Comm_rank(MPI_COMM_WORLD,&myid); for(i=0;i<5;i++) { sum=sum+degreeMarks[myid][i]; } printf(“Year %d total marks=%d\n”,myid+1,sum); MPI_Reduce(&sum, &tsum, 1, MPI_INT, MPI_SUM, 0,MPI_COMM_WORLD); if(myid==0) { printf(“Total marks obtained in Degree Examinations=%d\n”,tsum); } MPI_Finalize(); }

OUTPUT $ mpicc degreeMarks.c $ mpirun -np 3 ./a.out Year 1 total marks=190 Year 2 total marks=210 Year 3 total marks=200 Total marks obtained in Degree Examinations=600 Let us focus on MPI_Send and MPI_Recv subroutine used for point to point communication. These subroutines are used to pass a message from one processor to another. Example 3: Write a MPI program to send the message “Message from Neymar is: Hi Messi, welcome to MPI WORLD “ from Processor 0 to processor 1.

#include #include #defi ne MESSY 0 #defi ne NEYMAR 1 int main(intargc,char **argv) { intmyid, numprocs; char *msg; MPI_Init(&argc,&argv); MPI_Comm_size(MPI_COMM_WORLD,&numprocs); MPI_Comm_rank(MPI_COMM_WORLD,&myid); MPI_Status status; if(myid==MESSY) { MPI_Recv(&msg, 30, MPI_CHAR, 1, 123, MPI_COMM_WORLD, &status); printf(“\nMessage from Neymar is:%s”,msg); } if(myid==NEYMAR) { msg=”Hi Messy, welcome to MPI WORLD”; MPI_Send(&msg, 30, MPI_CHAR, 0, 123, MPI_COMM_WORLD); } MPI_Finalize(); }

CSI Communications | September 2014 | 38 www.csi-india.org OUTPUT References $ mpicc Message.c [1] Yukiya Aoyama, Jun Nakano $ mpirun -np 2 ./a.out “RS/6000 SP: Practical MPI Message from Neymar is: Hi Messi, Programming” IBM Redbooks welcome to MPI WORLD Vervante, 1999. [2] http://159.226.149.45/kizsjzx/hpc/ Acknowledgement mpi-course.pdf We thank the campus computing n Fig. 4: Messy and Neymar facility, University of Kerala for all the technical support.

Manu K. Madhu is an M Tech student of School of Computer Sciences, M G University, Kottayam. Apart from the academic life, he is a passionate poem writer and he enjoys cooking.

Biji C.L. is currently working towards her PhD from University of Kerala. She is interested in communicating science through popular science magazines and has earlier contributed to CSI communications. About the Authors

CSI Communications | September 2014 | 39 Practitioner Amitava Nag Workbench Assistant Professor, Head in Dept., IT, Academy Technology, India

Programming.Tips() » Fun with C

Is it possible to have a function in ‘C’ program that can accept When the above code is compiled and executed, it produces variable number of arguments? the following output: It is possible using an ellipsis (which looks like ‘...’) in place of 5.75000 the last argument. The program below is a complete sample ‘C’ 4.30000 program that accepts a variable number of arguments. Inside main(), in fi rst function call average (5, 5.2, 6.5, 9.6,7.1,.3), the fi rst argument (here 5) indicates #include the number of arguments to be accepted by this call. Similarly, in #include second function call average (4, 2.1, 6.2, 4.3, 4.6) double average (int count,...) the fi rst argument (here 4) indicates the number of to be accepted { by this call which is here 4. va_list arg; In 3rd line of the program, in the statement double int i; average (int count,...) ellipsis (‘...’) is used to pass double sum; variable number of arguments. In this program one data type va_start (arg, count); va_list and three macros va_start(),va_arg() and va_ end are used which are defi ned in the header fi le `stdarg.h’. for (sum = 0, i = 0; i < count; i++) The data type va_list is used for argument pointer variables. The sum += va_arg (arg, double); macros va_start(),va_arg() and va_end () are used for va_end (arg); initialize the argument list, Get the next argument value and Clean return sum / count; up the list respectively. } n

main () { printf (“%f\n”, average (5, 5.2, 6.5, Amitava Nag is working as an Assistant Professor and 9.6,7.1,.3)); Head in Dept. of IT, Academy of Technology, India and is a member of CSI, IEEE and ACM. He is one of the printf (“%f\n”, average (4, 2.1, 6.2, 4.3, authors of the books Data Structures and Algorithms 4.6)); Using C, Numerical Methods and Programming, Basic Computation and Principles of Computer Programming, } Operating System etc. About the Author

CSI Communications | September 2014 | 40 www.csi-india.org Practitioner Umesh P and Silpa Bhaskaran Workbench Department of Computational Biology and Bioinformatics, University of Kerala

Programming.Learn("R") » Regression Analysis with R Regression analysis is one of the most widely used statistical cholesterol levels and age. For this, R has a simple command- methods to estimate the relationship between the variables. The lm( ). objective of regression analysis is to fi nd the relationship between For this, use the following code in R. Here we store the the independent variable (usually denoted as x) and dependent regression model in the variable, lm.out. variable (of x, usually denoted as y). Thus through regression analysis, we try to fi nd a function which relates x and y, which is called a regression model. In this tutorial, we focus on the simplest regression model- linear regression and its analysis. As the name indicates, the linear regression model is expected to behave like a straight line. Linear relationship can be of two types- Positive correlation, which means the increase in the values of x will result in an increase in the value of y and negative correlation, which means the increase in the value of x will result in a decrease in the value of y. By regression analysis, we intend to fi nd equation of the function which relates x and y. i.e., in case of linear regression, we will fi nd equation of line that fi ts on the given Fig. 2: Regression model data. A typical linear regression model will be of the form y= ax+b, where, ‘a’ is the slope of the line, ‘b’ is the y intercept of the line. Now let us look into one typical data. The following is the So our regression function will be, Age= 33.25 * (chol_level)+ data of samples collected from people of diff erent ages and their (-114.83) cholesterol levels in mmol/L. Now, Let us plot our regression line over the scatter plot. > age = c(19,22,25,30,35,41,46,48,50,53,57,60,64,70) > plot(age ~ chol_level, main=”Age Vs Cholesterol Level”) > chol_level = c(4.1,4.3,4.3,4.4,4.5,4.6,4.7,4.6,5,5,5.1,5.3,5.5, > abline(lm.out, col=”red”) 5.6) First, let us see how these values are distributed. For this, let us plot the values as a scatter plot. In R, type the following command to obtain the plot. > plot(age ~ chol_level, main=”Age Vs Cholesterol Level”) This will give you a plot as in Fig. 1.

Fig. 3: Regression line of Age Vs. chol_ levels

Linear regression, which model the linear relationship between variables, fails to model the variables that are related Fig. 1: Scatt er plot of Age vs. cholesterol levels nonlinearly. For variables that possess nonlinear relationship, we have to apply nonlinear regression model. In R, this is done From the graph itself, we can say that behavior of values using the nls( ) command in a similar way like that of the linear is almost linear. Now we will find the regression model for the regression model we explained above. n

Ask an Expert (Your Question, Our Answer), On the Bookshelf and Innovations in India columns are excluded in this issue due to want of space. Do ask your questions and send them to [email protected] for receiving replies. - Editorial Team

CSI Communications | September 2014 | 41 C. R. Suthikshn Kumar Security Corner Dept of Computer Engineering, Defence Institute of Advanced Technology, Girinagar, Pune

Information Security » A Review of Cyber Security Curriculum in Indian Context

Abstract: Cyber Security curriculum has vital role in tackling cyber threats. A highly trained cyber security workforce is essential to meet today’s cyber security challenges. The Cyber Security curriculum should ideally help to build Knowledge, Skills and Abilities (KSAs) in all aspects of cyber security both theoretical and practical. This article reviews the Cyber security curriculum from Indian perspective and provides comments and suggestions for enhancing them further.

Introduction online for credit cards, money transfer, development in key areas. The term cyber security has originated online shopping etc., the internet security 4. To establish institutional from ‘cyber space’. The word ‘cyber’ means using secure networking protocols, mechanisms for capacity building computer and ‘cyber space’ would mean encryption/authentication using public for Law Enforcement Agencies computer network according to dictionary. key cryptographic systems are becoming While establishing Cyber security The word ‘cyber’ is also used as an adjective order of the day. Recent attempts at Institutes, one should ensure that the to relate a term to computer. With rapid e-governance, i.e., using the internet for curriculum adapted is adequate to meet diff usion of internet and world wide web, administration provides impetus to the the real world challenges. The subjects, the ‘cyberspace’ is where people do online importance of Cyber security. As the syllabus, lab experiments which need to be transactions, data communication, emails, use of information technology expands included in such a program of study need web based shopping, chatting, video exponentially, the consequences of cyber to be deliberated upon in detail. While conferencing, etc. Cyber space has been attacks also grow rapidly. Hence there Computer science curriculum has been there for only couple decades while there is a need for skilled workforce of cyber studied and latest curriculum structures has been rapidly growing cyber threats, security professionals to prevent and are made available through ACM/IEEE task cyber attacks, cyber terrorism, cyber defend against such cyber attacks. These forces[8], the Cyber Security curriculum espionage, all of which undermine the cyber Security professionals build and is still being debated[9][10]. This paper is security of cyber space. While the army certify applications designed to withstand an attempt to review the Cyber security secures land, navy secures the sea, air force attacks, diagnose and prevent security curriculum based on the current programs secures the sky, coast guard secure the intrusions, and defend against cyber being off ered, review papers and reports coastal areas, cyber security force secures attacks. published. A review of infrastructure/Lab the cyber space. While army, navy, air force Pro-active and reactive deployment to provide hands on experience on cyber and coast guard are defending the tangible of cyber security requires high levels security is also presented. land, sea, sky and coast, the cyber space of knowledge and skill sets. With the This paper is organized as follows: In is an intangible asset and is much more shortage of trained cyber security the next section, the challenges of cyber complex to defend and secure. professionals, the lacuna can be fi lled security are presented in national context. Cyber Security can be defi ned as[5] through various measures to educate fresh The section 3 discusses the various ‘Measures relating to the confi dentially, graduates and working professionals. dimensions of cyber security. In section availability and integrity of information that According to the recent national cyber 4, a review of current cyber security is processed, stored and communicated security policy[6] published by Dept of curriculums in leading universities is by computing devices such as computers, Electronics and IT, an important objective presented. The summary and conclusions smart phones etc.’ A country’s national is to “create a workforce of 500,000 are presented in the section 5. security, economic prosperity, global professionals skilled in cyber security in reputation and social wellbeing rely on the next 5 years through capacity building, Challenges in Cyber Security cyber security to a large extent. skill development and training”. However, The exponentially growing number Cyber Security is a fi eld which policy does not discuss the level of skills. of computers, smart phones, tablet is receiving attention recently. Cyber computers poses a ever growing The Human Resource Development Security related articles have been given challenge for cyber security professionals strategies to meet the objective set in the headline news coverage in leading news in safeguarding the data and traffi c. The policy consist of four steps as listed below: papers and magazines. There is growing important cyber security challenges can concern regarding the cyber threats, cyber 1. To encourage cyber security be enlisted as follows: attacks, cyber warfare, cyber terrorism, programs both in institutes and • Designing the curriculum to meet Cyber espionage. With awareness about universities to support the Nation’s the requirements for continuously cyber security growing among public, cyber security needs. evolving computer and networking there is increasing use of cyber security 2. To establish cyber security training technology. applications such as Anti-virus software infrastructure across the country by • Keeping abreast with the latest installed on PCs, Spam Filters for emails, way of public private partnership developments in Cyber Security. Password authentication for login, arrangements. • Developing practical skills and Firewalls for intranets, Digital signatures 3. To establish cyber security concept ‘adversarial thinking’ techniques. etc. With banking transactions going labs for awareness and skill • Developing laboratory facilities to

CSI Communications | September 2014 | 42 www.csi-india.org research the latest cyber threats, • Enterprise Continuity in Computer Science or related fi eld, an attacks. • Incident Management additional two years of education could • Developing library of books, ebooks, • IT Security Training and Awareness cover important technical cybersecurity reports, white papers, journals/ • IT Systems operation and topics. A two years master’s degree magazines, case studies with proper Maintenance program in cybersecurity would allow classifi cation to aid in teaching and • Personnel security students to master the knowledge, skills, research. • Physical and Environment Security and abilities (KSAs) specifi c to advanced • Developing and retaining project and • Procurement topics in cybersecurity. supervision skills related to cyber • Risk Management The MTech/MS program specializing security. • Strategtic Security Management Cyber Security for Computing professionals: • Assessing and certifying the faculty, While a cyber security professional A strong technical cybersecurity-specifi c students and practitioners of cyber is expected to be skilled and have degree programs focusing on cybersecurity security. practical knowledge in handling top ten built upon a rigorous undergraduate The main goals of Cyber Security vulnerabilities and risks in cyber space[3] background in computer engineering, measures are to ensure Confi dentiality, as shown in the following table: computer science, or software engineering. Integrity and Availability of the computer Government/Private corporations should systems, data, databases, networks, Rank Name encourage and improve cyber expertise by applications, etc. The growing fi eld of funding scholarships to help students aff ord knowledge and sophistication of threats 1 Injection graduate-level courses in cybersecurity. and attacks requires that the training 2 Broken authentication and Cybersecurity specialization requires a lot of and skill levels of the Cyber security session management hands-on activities; experiential, supervised professionals are competitive. The 3 Cross-site scripting (XSS) learning. By analyzing the current cyber curriculum design and delivery of Cyber security challenges and risks, the curriculum Security courses, supervision of research 4 Insecure direct object for the Cyber Security specialization can be students, administration of Cyber security references evolved. programs at post graduate level, are very 5 Security misconfi guration While there are very good cyber important academic challenges. security Masters programs around 6 Sensitive data exposure the world at leading Universities and Dimensions of Cyber Security institutions, we review three such Cyber Security is a multi-disciplinary 7 Missing function-level access programs. The following table gives the subject[3]. There are many dimensions control detailed comparison of the programs. of cyber security and these according 8 Cross-site request forgery Additional topics on Reverse to Essential Body of Knowledge[4] and (CSRF) engineering can play an important role curricular guidelines[3] consist of following 9 Using components with in investigating security breaches. Hence areas i.e., : known vulnerabilities formal training in reverse engineering topics • Fundamental concepts are to be included in the curriculum. Lab • Cryptography 10 Unvalidated redirects and sessions for analyzing network traffi c will • Security ethics forwards build an important skill. Working knowledge • Security policy of where to position an audit function • Digital forensics Adversarial thinking skills[2]: The • Access control (operating system, database, etc.), when it cyber security professionals should have • Security architecture and systems should be turned on, what it should record, adversarial thinking capabilities, so that • Network security how does an operating system protect itself system builders can view system designs • Risk management from attack, and many more are to be built through the same lens attackers do. • Attack/defense through practical sessions. Training in cyber These professionals should also focus • Secure software design and defense as well as attacks and cyber warfare on principles and abstractions that bring engineering gaming off er important opportunities to discipline to the art of building secure • Data security develop and refi ne appropriate skills. systems. The adversarial thinking training • System and Application Security Cyber Security Lab: The cyber can be imparted through a set a case • Telecommunication and Mobile Security Lab may consist of several studies. While in Management schools, Communication Security open source and commercial software we observe the use of case studies, the • Regulatory Standards and applications. The Network Defence Cyber Security institutes also need to have Compliance Trainer, Qualnet from Scalable Network access to good quality case studies. Game • Penetration testing Technologies, Encase for Digital forensics, Theoritic based studies of Cyber Security • E-evidence open source PGP suite, Matlab, nikto topics can contribute to developing • Perimeter defense (web vulnerability analysis tool), Nessus adversarial thinking skills[14]. • Secure coding and software security from Tenable Networks etc are some of Apart from the knowledge, following Cyber Security Curriculum the example software which are useful are operational areas where skill sets Master’s degrees provide a cybersecurity for hands on experiments. The students of system administrators, managers, IT workforce with advanced capabilities[3]. should be encouraged to spend time in the personnel come into picture: Building on a sound basic BS or BE degree lab exploring these and similar software.

CSI Communications | September 2014 | 43 Univ/Institute Boston University MS in CS with University of Southern California, DIAT, M.Tech Program in Computer Science Features Specialization in Cyber Security[16] MS in Cyber Security[17] and Engineering with Specialization in Cyber Security. Course 8 Courses: Five courses need to be 9 Courses : 6 Core Courses This a two year program with intake of Requirements from breadth Core list. The three consisting of Foundations of students from offi cers serving tri-services remaining courses are from non-core Information Security, Applications i.e., Army, Airforce and Navy, Scientists list. The breadth core courses are in of Cryptography and Cryptanalysis, and Technician serving in DRDO Labs, four listed areas i.e., Theory, Software, Foundations for Information open category GATE qualifi ed students. Systems and Applications. Further, Assurance, Applied Information The curriculum is unique in the country the students are adviced to select Security, Distributed Systems and consisting of 12 subjects ( with Core and Cyber Security related courses from Network Security, Secure Systems Electives). The fi rst semester has six core the Breadth and non-core courses. Engineering. subjects. The second semester has 2 core courses and four electives.

Lab Not stated Explicitly Not stated Explicitly Cyber security lab in the First semester Requirements Project A Thesis or project as per the Not Stated Explicitly Dissertation requirements in third and Reqruirements guidelines. fourth semester. Comments A strong program with very good A strong program with very good An attractive list of Electives. The Institute choice of electives. The faculty and electives. The university has very has very good faculty and infrastructure. infrastructure are excellent. good faculty and infrastructure. The course is also off ered through distance learning program.

Ethical hacking sessions can benefi t important case studies in Cyber security [6] K. Bajaj, “The Cyber Security Agenda: the student in better understanding of are necessary to build the proper context Mobilizing for International Action”, Report vulnerabilities and exploits. The cyber for the students. The adversarial thinking of East West Institute, NY, 2010. security students can be encouraged to ability is what diff erentiates a cyber security [7] “National Cyber Security Policy 2013”, Dept of Electronics and Information professional from a software professional. participate in various bounty programs of Technology( DEITY), www.deity.gov.in [12] [13] [11] google , facebook , Microsoft . This We have recommended introduction of [8] CS2013:Computer Science Curricula is benefi cial as they can build their KSAs subjects such as Fault Tolerant Computing 2013, ACM/IEEE Joint Task Force on related to latest technologies and security and Game theory as a part of the Cyber Computing Curricula, Final Report 0.9, concepts while also competing for prizes. Security Curriculum. Oct 2013. While, most of the programs focus Acknowledgement [9] National Initiative on Cyber Security Careers and Education: http://niccs.us- on the 2 of the 3 most important goals This article is based on the author’s of cyber security i.e., Confi dentiality and cert.gov/ presentation at the National Seminar on [10] National Initiative on Cyber Security Integrity, the third most important goal Cyber Security organized by Information Education: http://csrc.nist.gov/nice/ i.e., Availability needs to be addressed by Warfare School of Indian Air Force(IAF) [11] Microsoft Bounty program: http://technet. introducing subjects such as Fault Tolerant during 24th-25th July 2014. microsoft.com/en-in/security/ Computing, Reliability Engineering etc. [12] Google Vulnerability Program: http:// References www.google.co.in/about/appsecurity/ Summary and Conclusion [1] IDSA, “India’s Cyber Security Challenge”, rewardprogram/ IDSA Task Force Report, March 2012. The Cyber Security curriculum plays an [13] Facebook Bounty Program: https://www. [2] F. B. Schneider, “Cyber Security Education important role in improving the detection, facebook.com/whitehat in Universities”, IEEE Security and Privacy, analysis, mitigation and response to [14] T. Alpcan and T. Basar, “Network July/August 2013, pp. 3-4. sophisticated cyber threats, with a focus on [3] A. McGettrick, “Towards Curricular Security: A Decision and Game Theoritic government, critical infrastructure and other Guidelines for Cyber Security”, Report of Approach”, Cambridge University Press. systems of national interest. A highly trained a Workshop on Cyber Security Education [15] MK Sharma, “Cyber Warfare: The power cyber security workforce is essential to meet and Training, August 2013. of unseen”, Knowledge world Publishers, 2011. the today’s cyber security challenges. The [4] D. Shoemaker, A Conklin, “Cyber Security: [16] Boston University, “MS in CS with Cyber Security curriculum should build the Essential Body of Knowledge”, Cengage Learning, 2012. Specialization in Cyber Security”, Program knowledge, Skills and Abilities (KSAs) in all [5] Cyber Securirty page in Australian Brochure 2013. aspects of cyber security both theoretical Government website: http://www.ag.gov. [17] University of Southern California, “MS in and practical. The laboratory work augments au/rightsandprotections/cybersecurity/ Cyber Security”, Program Brochure, 2013. the class room discussions and review of pages/default.aspx n

Dr. CRS Kumar is currently Head of the Department of Computer Engineering and also Chairman of Data Center in Defence Institute of Advanced Technology (DIAT), DRDO, Ministry of Defence. He has received Ph.D., M.Tech and B.E. degrees from reputed Universities/Institutes. His areas of interest are in Cyber Security, Network Security, Game Theory and Wireless Networking. He is a senior member of CSI. About the Author

CSI Communications | September 2014 | 44 www.csi-india.org Dr. Vishnu Kanhere Security Corner Convener SIG – Humane Computing of CSI (Former Chairman of CSI Mumbai Chapter)

Case Studies in IT Governance, IT Risk and Information Security »

IT History – “A vast early warning system” : When one thinks of IT history it brings to mind a compilation of reminiscences and collective experience of people, personalities, development over the years in the fi eld of computing and information technology. It covers stories of technology innovations, initiatives, companies, institutions, academia, professionals, computers, devices, programming languages, OOPS, GUI, the internet, a kaleidoscope off ering myriad views – each diff erent from the other. History is seen and appreciated from diff erent perspectives by diff erent people. It provides lessons for the future – one learns from history, yet history repeats itself. In this context it lends strength to the words of Norman Cousins, political journalist, author, professor, and world peace advocate. – “History is a vast early warning system” Looked at from this angle, what does IT History contribute to IT Governance, IT Risk and Information Security? Governance has been with us since times immemorial when early mankind organized themselves into tribes. First it was Nature and its inexorable laws. That was followed by tribal laws and customs. Back home in India it was the Indus valley civilization, the Dharma of Manu and then on to the Panchayat form of governance, Autocracy, the rule of the few, the rule of the classes and now democracy - the rule of the masses. Risk is the fl ip side of change which is ever present and humans have dealt with it over the years in their own ways, dealing with risk using inherited and acquired (learned) behavior and skills. From superstitions and beliefs to algorithms and enterprise risk management systems, the decision making starts where the tools, techniques and formulae end. Be it the Mantra or the Management System – it is the gut feeling that is ultimately used to take decisions. Security comes from that feeling of familiarity and a sense of freedom from fear that the child gets when nestling in the lap of the mother. The sense of protection and wellbeing is what provides security to the child. In information security this trust is provided by the triad of confi dentiality, integrity and availability. Today we live in a world that is interconnected. The internet of computers is progressing to become the internet of things. The virtual world is both a refl ection of and represents the real world. Human interaction and humanity has not changed much at the core. The same emotions move it, the same challenges excite and threaten it, and the same ideals, aspirations and aims drive it. What has changed is the medium of interaction of social and cultural exchange, of business and commerce, of diplomacy and dialogue. In this changed world how signifi cant is our history? - The history of the successes and failures, of the peaks and nadirs of computing – Information Technology. Given this background the current Case in Information Systems is being presented. The facts of the case are based on the author’s own experiences and recollection of news, views and real life incidents. Although every case may cover multiple aspects it will have a predominant focus on some aspect which it aims to highlight. A case study cannot and does not have one right answer. In fact answer given with enough understanding and application of mind can seldom be wrong. The case gives a situation, often a problem and seeks responses from the reader. The approach is to study the case, develop the situation, fi ll in the facts and suggest a solution. Depending on the approach and perspective the solutions will diff er but they all lead to a likely feasible solution. Ideally a case study solution is left to the imagination of the reader, as the possibilities are immense. Readers’ inputs and solutions on the case are invited and may be shared. A possible way forward from the author’s personal viewpoint is also presented. A Case Study of Orbit Off shore Services Rocky Smith CEO of Orbit Offshore To achieve this he had consulted words to gain an insight. Services planned to overhaul his Arvind an IT Security expert who was Take the case of the Ramayana - it is a information security setup. The ITES / called in to meet Venkat, the CTO of story for young children, a commentary on BPO company was just recovering from the company, who also handled the life and values for the married, a philosophy a crisis. Sensitive personally identifiable information security portfolio. for the spiritually advanced, but it also information of over 40,000 customers Venkat was surprised to see Arvind, has lessons for the information security of three of their important clients in the a thin lanky man with greying hair wearing practitioner – ‘Sita’ represents ‘data,’ BFSI segment had been compromised. a white kurta and pajamas with a jute bag reposing in the ‘Ashram hut’ a ‘hardened The investigation was still underway carelessly slung over one shoulder. “Looks system’ with a ‘secure perimeter’. ‘Marich’ and various theories were being floated more the literary type to me” Venkat the demon deer’s cry was actually a ‘remote around, from suspected insider job by a thought to himself. call’, the ‘Laxman rekha’ a ‘fi rewall.’ ‘Ravana disgruntled employee to an attack by a Venkat was even more surprised the ‘Trojan’ used a ‘malicious code’ to hacker ring supported by the mafia. when the conversation began. Venkat was access the ‘data’. ‘Jatayu’ the ‘IDS (Intrusion Rocky believed that change has expecting an erudite presentation about Detection System)’ detected and reported to be fundamental and wanted the Information Security standards, protocols, the incident to ‘Rama’ who was ultimately information security to be built on tools and techniques and an action plan successful in recovering and securing sound foundations. The security had to be to protect the client data handled by the ‘Sita’ – the ‘data’ but not before it had been based on a sound governance framework, company. ‘tested for its integrity’ by ‘Agnipariksha’. coupled with scientifi c risk management “Information Security is as old as our Ever given a thought to why the perimeter and following policies, procedures, and ancient civilization” began Arvind. The security, the hardened systems, the fi rewall systems with awareness, understanding medium, methods, devices and the jargon and the IDS all failed at the same time and and regular monitoring and improvement. has changed but we can learn a lot yet sensitive data was compromised? He had noticed that although the company from the past. The ancient texts have a Arvind was of the view that to secure did possess the essential certifi cations wealth of information and history teaches information one had to work at many they were being maintained more for their us a lot. One has to have an open mind and levels. The ancients used code and layered own sake mechanically than in their spirit. see through the superfi cial meaning of the protocols involving metaphor and a tradition

CSI Communications | September 2014 | 45 that was never recorded, documented or about the situation and intends to do a The process is no longer asset centric written down, but passed to eligible tested complete overhaul. The company seems to but risk centric in terms of maintaining disciples, only by word of mouth where the have the option of continuing on the same the CIA triad, refl ected in the change intonation and sound was equally important path albeit with more eff ective monitoring from the requirement of identifying an to convey the meaning, to prevent their and greater adherence to standards and ‘asset owner’ to a ‘risk owner’. secret sensitive mantras from falling into the protocols, or else begin afresh by going 3. The interested parties are clients, wrong hands. We in modern times could not back to the planning board. customers, associates, regulatory just depend on encryption and VPN alone. The Consequences authorities, shareholders and other The fi rst step was to have the right Continuing in the same fashion with stakeholders who have their values, team who were focused, aligned and increased monitoring may not be enough perceptions and expectations. So is the affi liated to the organization by that special for the company and it may lead to more business environment with its social, bond as existed between the Guru who such breaches in the future aff ecting cultural, political, legal, regulatory, shared the knowledge and information economic, fi nancial, technological, the company’s business prospects and and the disciple who acquired it. Even natural and competitive environment. reputation. At the same time, going in the information had to be separated such These relationships and key drivers and for a complete overhaul from scratch and that any part of it at one location would external trends and issues as well as attempting to reinvent the wheel may not by itself be useless and unintelligible. The the organization’s own internal culture, be a very good idea either and the costs information itself would be ‘intelligent’ like formal and informal systems, values and time it may take will make the whole the ‘Astras’ of the Vedic times which did not perceptions and relationships should exercise prohibitive. work if they fell in the wrong hands or were form the inputs for the ISMS. attempted to be used for evil purposes. The Strategy 4. Implemented in this manner with Venkat was puzzled and approached The right strategy for the company at this greater emphasis on harmonization, Rocky. Venkat personally felt that in these stage would be human resources, addressing risks modern times it was best to keep following 1. Understand the shortcomings of the and utilizing opportunities the time tested currently accepted information present system - the framework, Company would be able to address security standards and techniques. Though policies, practices and procedures the concerns of its clients and not fool proof and despite admitting that in the context of what the IT expert customers, meet legal and regulatory they had failed once, he felt they were the has shared. The mention about requirements in a demonstrable best bet for the Company. history and learning lessons from it way, and help satisfy stakeholder Rocky on the other hand felt that as well as the allusions to the ways expectations at the same time meet if the approach suggested by Arvind of ancients to secure information its own objectives which will be could be integrated with the standard are an indication, a metaphor – not aligned to the external environment methodologies it would provide greater to discard the present system and and meet internal and external depth to their information security and certifi cations, but to think out of the issues. This will not only result in make it more robust. box, and understand assimilate and a continual improvement of its Venkat decides to call his mentor Mr. learn from the external and internal information security governance but Gopal who had taught him the basics of environment and experiences. also enable it to successfully meet information security. 2. The shortcomings of the Company are the requirements of the new 2013 Advice Mr. Venkat on the best probably an outcome of a mechanical version of the ISMS standard. strategy to follow. application of the 2005 version of the 5. The context, the perception, the Solution ISMS standard which was prescriptive values, the expectations, the issues The Situation in nature and tried to fi t one size to all. and the incidents both external and The company has currently faced and is The major changes in the 2013 version internal are all present in the ‘history’ recovering from a major IT security incident not only make it less prescriptive and it is an easy enough starting point that has aff ected its reputation and bottom but expect the entity to consider the for the entire exercise. No wonder line. It has the necessary certifi cations but external and internal context and experts often say that ‘one learns the top management is not too confi dent issues. It is these inputs that provide the from history.’ Yes, history is indeed ‘a about them and seems unsure of the basis for identifying risks and threats vast early warning system.’ security governance and risk framework. that provide a basis for risk assessment An eff ective solution is generally The good thing is that the CEO is proactive that is relevant for the organization. expected to proceed on these lines. n

Dr. Vishnu Kanhere Dr. Vishnu Kanhere is an expert in taxation, fraud examination, information systems security and system audit and has done his PhD in Software Valuation. He is a practicing Chartered Accountant, a qualifi ed Cost Accountant and a Certifi ed Fraud Examiner. He has over 30 years of experience in consulting, assurance and taxation for listed companies, leading players from industry and authorities, multinational and private organizations. A renowned faculty at several management institutes, government academies and corporate training programs, he has been a key speaker at national and international conferences and seminars on a wide range of topics and has several books and publications to his credit. He has also contributed to the National Standards Development on Software Systems as a member of the Sectional Committee LITD17 on Information Security and Biometrics of the Bureau of Indian Standards, GOI. He is former Chairman of CSI, Mumbai Chapter and has been a member of Balanced Score Card focus group and CGEIT- QAT of ISACA, USA. He is currently Convener of SIG on Humane Computing of CSI

About the Author and Topic Leader – Cyber Crime of ISACA(USA). He can be contacted at email id [email protected]

CSI Communications | September 2014 | 46 www.csi-india.org Dr. Debasish Jana Brain Teaser Editor, CSI Communications

Crossword » Test your Knowledge on IT History Solution to the crossword with name of fi rst all correct solution provider(s) will appear in the next issue. Send your answers to CSI Communications at email address [email protected] with subject: Crossword Solution - CSIC September 2014 CLUES

ACROSS 1. The person who developed the Complex Number Calculator, a foundation for digital computers (6, 7) 5. An early object typed programming language (3) 7. Beginner’s All-purpose Symbolic Instruction Language (5) 8. The Common Business-Oriented Language (5) 11. Claimed as fi rst object oriented language (6) 14. Inventor of FLOW-MATIC, a predecessor to COBOL (5, 6) 16. Considered as Father of Computer Science (4, 6) 18. Stored program architecture is commonly known as this architecture (3, 7) 19. The person who developed the logic gate (7, 5) 22. Early use of a special card that carried digital information (5, 4) 25. The American Standard Code for Information Interchange (5) 28. The encryption machine used by Adolf Hitler (6) 29. Data storage medium that used magnetic recording (8, 4) 30. First mechanical adding machine or calculator (9) DOWN 2. Co-founder of Computer Sciences Corporation and co-creator of FORTRAN (3, 4) 3. First Indian transistorized computer developed by ISI and JU at Kolkata (5) 4. An early Online Data Processor machine developed at TIFR (5) 6. A storage medium from early days (4, 9) 9. An early high level programming languages (7) 10. Workstation that introduced the fi rst GUI operating system (5, 4) 12. First network to use the Internet Protocol (7) 13. First Computer Programmer (3, 8) 15. The company formed by William Hewlett and David Packard (7, 7) 17. The person who built the fi rst machine that could play chess (6, 7) 20. The person who coined the name “COBOL” (3, 5) 21. The fi rst Indian software and management consultancy fi rm (3) 23. Size in inches for early fl oppy disks (5) 24. First computer game (8) 26. Manufacturer of fi rst single chip microprocessor (5) Did you know why is fl opply disk called as fl oppy? 27. The fi rst known calculator invented in Babylonia (6) The drive (FDD) invented at IBM by Alan Shugart in 1967,appeared as an 8-inch disk, later became smaller to 5.25-inch disk used on the first IBM PC in 1981. The name floppy was used Solution to August 2014 crossword to indicate flexibility. It could be bend enough that one could almost fold it in half. Even when it got smaller to 3.5-inch, the name remained as a legacy! (More details can be found in http://en.wikipedia.org/wiki/History_of_the_fl oppy_disk)

We are overwhelmed by the responses and solutions received from our enthusiastic readers Congratulations! NEAR ALL correct answers to August 2014 month’s crossword received from the following readers: Dr. Jayamol Mathews (Dept of Computer Science, University of Kerala, Kariavattom, Thiruvananthapuram, Kerala), Surendra Kumar Khatri (Affi liation unknown) and V. R. Mote, Y. S. Pagar and D. T. Rathod (P. E. S. College of Engineering, Aurangabad, Maharashtra)

CSI Communications | September 2014 | 47 H.R. Mohan Happenings@ICT ICT Consultant, Former AVP (Systems), The Hindu & President, CSI hrmohan.csi@gmail .com

ICT News Briefs in August 2014 The following are the ICT news and headlines Marathi, Konkani, Maithalai, Nepali, experts valuing it from a conservative of interest in August 2014. They have been Boro, Dogri and Sindhi from 27th Aug. Rs. 6,000 crore to Rs. 12,000 crore. compiled from various news & Internet sources Subsequently, domain names would be • IIM-B joins edX as contributing member including the dailies - The Hindu, Business Line, given in Bengali, Telugu, Gujarathi, Urdu, to deliver education via MOOCs to a large and Economic Times. Tamil and Punjabi. section of learners from around the world. • To create Hubli-Dharwad as the next IT • Ratan Tata expresses interest in ‘hot’ Voices & Views destination, the Karnataka Government has e-commerce sector. Reported to have • A recent Crisil study expects the Indian online selected four north Karnataka engineering invested in Snapdeal. retail market to touch Rs. 50,000 crore by colleges to set up incubation centres. • Motorola to launch smartwatch later this 2016 from the current Rs. 19,000 crore. • Indian IT fi rms eye opportunities in Japan. year. • Social media can make your life more • Govt to spend Rs. 20,000 cr for mobile • MapmyIndia launches rear-seat productive - LinkedIn connectivity in villages trough NOFN. infotainment system. • Coimbatore growing as a major IT • Soon, public Wi-Fi access in cities with over • Microsoft Ventures, iSPIRT to help startups exporter. It has managed to clock around 1 m people. become attractive. Rs. 4,000 crore from IT exports and • Google is conducting experiments with the Industry is confi dent to achieve export IT Manpower, Staffi ng & Top Moves IITs to fi nd out the best way to reach online target of Rs. 5000 crore this fi scal. IT • Firms that want to set up units at the education to a wider audience, given the exports from this region have grown proposed IT hub at Visakhapatnam will varied cultures and languages in India. 35-40% in the last two to three and the get a subsidy of Rs. 60,000 for every job • The Indian Institute of Information region has engaged over 20,000 people in they create. In other projects, they will Technology (IIIT-S) has commenced the IT SEZs. get a subsidy of Rs. 40,000 for a job, academic session at it campus in Sri City, • GSM operators have added a total of subject to a maximum of 80% of the Chittoor. 4.85 million subscribers in July, a 0.66% land cost. • Amazon to build a 1.6-million square feet rise from the previous month, taking their • Flat customer demand, mining more centre in Hyderabad for its biggest facility total user base to 744.42 million. work from employees and oversupply outside of its corporate headquarters in • According to industry estimates, the of software engineers have kept the Seattle. global speech analytics market will reach salaries of fresher’s at Rs. 3 lakhs per • Oxigen wallet, a mobile wallet from $1.33 billion by 2019, driven largely by year, unchanged in the $108-billion IT payment solutions fi rm Oxigen Services, corporate adoption. industry for the last six years. However, is being billed as India’s fi rst mobile wallet • The Indian e-commerce industry is with stability and growth returning, it is to enable money transfers through social expected to spend an additional $500- expected that freshers salaries will start networks. 1000 million on infrastructure, logistics moving upwards by 5-7% in 2015-16. • The Government launches eGreetings and warehousing, leading to a cumulative • Cognizant Technology Solutions portal www.egreetings.india.gov.in . spend of $950-1900 million till 2017-20 – recruited more employees in the quarter • TCS, Bharti pledge Rs. 100 cr each for Assocham & PWC study. . ended June when compared to the top Modi’s ‘Clean India’ initiative. • According to a study by Google and AT three Indian IT companies. The 8,800 • Indian start-ups bet on speech recognition Kearney, India will see a major mobile net new hires was the highest net tech. explosion as the Internet user base addition for the company since the third • Offl ine vendors using e-comm sites for bulk will swell to 480 million by 2017 from quarter of 2011. buying. 155 million at present on back of • KPO fi rm eClerx to hire 2,500 this fi scal. • Online restaurant discovery site Zomato is penetration, which will grow • Polaris downsizes BPO unit by nearly planning to start delivering food soon. six times to reach 385 million people. 1000 on poor revenue yield. • This social bot Bot-So, may watch over • After Bollywood, the booming your home someday. The basic prototype Govt, Policy, Telecom, Compliance e-commerce industry is emerging as a • The IT industry in Andhra Pradesh hardware to cost Rs. 5000 with software big employment opportunity for creative being open source, free. will have no power cuts and it will also professionals such as fashion designers, be exempt from Labour Laws and the • Swiss cement giant Holcim may consolidate photographers, Photoshop experts, its global data centre infrastructure in a Shops and Establishments Act allowing content writers, creative directors and for 24x7 operations throughout the move that presents a $200-million revenue even models. opportunity for home-bred information year. The new IT Policy also allows the • Chip-maker MediaTek plans to invest industry to utilise the services of women technology companies. $200 m on expansion and to recruit 500 • Email.biz off ers free website with e-mail in night shifts. It has been declared as chip design engineers at Bangalore by an Essential Service under Essential account. 2017. • Business directory for Services Maintenance Act. • ValueLabs wants to raise its employee • Spectrum held by the Defence sector should launched in Coimbatore. The download is strength to 8,000-9,000 from the current for free and would feature 90,000 listings be released to mobile fi rms - Idea MD 3000 in two-three years. • Telecom regulator TRAI insists on with 2,000 search categories. licence fee for tower fi rms. Government Company News: Tie-ups, Joint Ventures, • Flipkart to provide online platform for weavers. would get additional revenues of around New Initiatives Rs. 2,000 crore. • Tata Value Homes, Snapdeal tie up to sell • Flipkart, India’s largest online retailer, is homes online. • Modi to push for changes in US Immigration valued at an astonishing $7 billion (over Bill during his visit in Sep 2014. • Videocon, fi rst Indian in 4K ultra HD Rs. 42,500 crore) on the basis of two key television segment. • STPI fi rm on certifi cation for export invoices. numbers: its 2.2 crore registered users • 3G spectrum: Finance Ministry asks DoT to • 3D printing, big data can transform supply and the Rs. 6,000-crore revenue it earns chain industry. resolve issues with armed forces. annually. • Domain names with .Bharat will be • Facebook partners with Vodafone India for • IRCTC could turn out to be a hidden jewel in ad tool. in Indian languages such as Hindi, the Government’s asset basket, with market n

CSI Communications | September 2014 | 48 www.csi-india.org CSI Report

Computer Society of India CSI Golden Tech Bridge Programme

The Golden Tech-Bridge is now history! The programme was well conducted across the nation on Saturday 9 August 2014. It was indeed a befi tting tribute of the organization to the citizens of our country. The Student Branches captured the ideals of the event in letter and spirit, and paid attention to all aspects in detail and depth. There was participation from all segments of the community, such as housewives, elders, disadvantaged children, economically weak persons, people of diff erent vocations, many who had not used computers, and so on. The participants and the organizing institutions have expressed satisfaction and happiness about the structure and implementation of the programme. Several participants have been motivated to the usage of computers and IT, as they realized the potential and necessity. Many expressed the need for further interventions to create a technologically familiar society, where every citizen is benefi tted by IT for their day to day needs. We admire the incredible support from the CSI President, the ExecCom Members, NSC, RSCs, SSCs along all phases of the programme. The personal presence and participation of the President, OBs, NSC, RSCs, SSCs as well as several veteran members and Chapter OBs was an unparalleled encouragement and reinforcement to the activity, and a formidable testimonial of the CSI assurance and promise to the citizens of our nation. Your deep involvement in the project has been remarkable and exemplary. You made it a success by your sincere eff orts and attention to all parameters of implementation. It has been a very eff ective team work and co-operation. The CSI Education Directorate is overwhelmed at your dedication and services and conveys the profound appreciation and gratitude for your passionate partnership and total participation in the event. Many Many Thanks from CSI – ED to you, all your colleagues, volunteers and to your management !! Together, we will continue to strive to create more of such programmes and enhance the value, reputation and glory of CSI.

Rajan T Joseph CSI Education Directorate Chennai

(REGION-I)

(REGION-III) AES INSTITUTE OF DR. N.G.P BHARATI (REGION-VII) COMPUTER STUDIES INSTITUTE OF VIDYAPEETH'S - AHMEDABAD TECHNOLOGY INSTITUTE OF - COIMBATORE COMPUTER APPLICATIONS & MANAGEMENT (REGION-I) - NEW DELHI (REGION-V) (REGION-VII)

DRONACHARYA SRI RAMAKRISHNA COLLEGE OF SRINIVASA ENGINEERING ENGINEERING RAMANUJAN COLLEGE - - GURGAON INSTITUTE OF COIMBATORE TECHNOLOGY - ANANTAPUR (REGION-V) (REGION-VII) (REGION-I) KRISHNA INSTITUTE OF ENGINEERING & TECHNOLOGY SHRI. S.S. SHASUN - GHAZIABAD RRS COLLEGE OF JAIN COLLEGE FOR ENGINEERING & WOMEN TECHNOLOGY - CHENNAI - PATANCHERU

(REGION-VI) (REGION-VII) (REGION-II) GOVT. COLLEGE OF ENGINEERING SHREE & CERAMIC ABHA GAIKWAD PATIL VENKATESHWARA TECHNOLOGY COLLEGE OF ENGINEERING HI-TECH ENGINEERING - KOLKATA - NAGPUR COLLEGE - ERODE

CSI Communications | September 2014 | 49 (REGION-VII) VII) (REGION- K.S RANGASAMY (REGION-VII) HINDUSTHAN COLLEGE OF COLLEGE OF SARANATHAN TECHNOLOGY - ENGINEERING COLLEGE OF TIRUCHENGODE AND ENGINEERING - TECHNOLOGY - TIRUCHIRAPALLI COIMBATORE (REGION-VII) (REGION- (REGION-VII) VII) SRI SAI RAM INSTITUTE OF TECHNOLOGY - CHENNAI AMRITA SCHOOLS KONGU ENGINEERING OF ARTS & COLLEGE - ERODE SCIENCES - KOCHI

(REGION- (REGION-VII) (REGION-VII) RATHINAM VII) TECHNICAL CAMPUS - COIMBATORE AMAL JYOTHI JAMAL MOHAMED COLLEGE OF COLLEGE - ENGINEERING TIRUCHIRAPALLI - KOTTAYAM

P.A. COLLEGE OF (REGION- (REGION-VII) (REGION-VII) VII) ENGINEERING & TECHNOLOGY SNS COLLEGE OF - POLLACHI KNOWLEDGE INSTITUTE TECHNOLOGY OF TECHNOLOGY - SALEM - COIMBATORE

(REGION-VII) (REGION-VII) (REGION-VII) (REGION-VII)

DR.MAHALINGAM COLLEGE VIVEKANANDHA ENGINEERING SARABHAI INSTITUTE OF EINSTEIN COLLEGE OF OF ENGINEERING & COLLEGE FOR WOMEN - SALEM SCIENCE & TECHNOLOGY ENGINEERING - TIRUNELVELI TECHNOLOGY - POLLACHI - THIRUVANANTHAPURAM

(REGION-VII) (REGION-VII) (REGION-VII) (REGION-VII)

RANGANATHAN ENGINEERING VELAMMAL INSTITUTE OF DR.M.G.R EDUCATIONAL AND ERODE BUILDER EDUCATIONAL COLLEGE – COIMBATORE TECHNOLOGY – CHENNAI RESARCH INSTITUTE - CHENNAI TRUST'S GROUP OF INSTITUTION – KANGAYAM

CSI Communications | September 2014 | 50 www.csi-india.org CSI News

From CSI Chapters » Please check detailed news at: http://www.csi-india.org/web/guest/csic-chapters-sbs-news

SPEAKER(S) TOPIC AND GIST BANGALORE (REGION V) Mrs. Bhanumathi K S and Mr. B G Suresh 6 August 2014: Workshop on “Hands on Cloud Computing” Workshop covered several aspects of Cloud Computing such as What/ Why of Cloud Computing, Cloud Computing Stacks – IaaS, PaaS, and SaaS, Cloud Delivery in terms of Public / Private / Hybrid Clouds and some key contentious issues like Security, Vendor lock-in, Standardization of Cloud, Steps to migrate IT to Cloud and economics of Cloud Computing. Reference IaaS architecture from Amazon Web Services was taken and its various elements such as Elastic Computing, Simple Storage Service, Block Storage and Content Delivery Network were described. Hands-on opportunity was provided to participants to provision full blown server and to create full LAMP (Linux, Apache, MySql, PHP) stack on it. Participants could create small web page and update backend database. Parti cipants and resource person during the workshop CHENNAI (REGION VII) Ramesh Narasimhan and Shiv Shankar 26 July2014: Workshop on “Statement of Purpose (SoP)” Half Day Workshop for admission to Universities abroad was conducted along with IEEE CS. It gave brief on fi ve factors which decide outcome of getting admission to Master’s or Doctoral Program in a foreign University are - 1) Undergraduate record 2) Work experience or projects completed 3) GRE/GMAT/TOEFL Scores 4) Extra-curricular or Co-curricular Activities and 5) Personal Statement of Purpose(SoP). Workshop provided guidance on how to write the SoP that is successful diff erentiator to secure admission abroad.

Students aspiring to study abroad with resource persons Ramesh Narasimhan and Shiv Shankar Maj Gen Balasubramaniam, HR Mohan, 15 August 2014: Honouring Maj Gen Balasubramaniam – Founder Secretary G Ramachandran, Pramod Mooriath, S Ramasamy and of CSI Parthasarahy As part of Golden Jubilee celebrations special meeting was organized by inviting Past Presidents, stalwarts and doyens of the Chapter on 13th Aug. Maj Gen Balasubramaniam, who was Founder Secretary in 1965 could not attend due to ill-health. So present CSI President HR Mohan along with others visited him at his residence and handed over the plaque to him and honoured him.

CSI’s Founder Secretary Maj Gen Balasubramaniam being presented with Golden Jubilee Plaque at his residence

Dr P Sekhar, Chairman, MicroTech Global Foundation 19 August 2013: Presentation on “Secured Governance for Techno-Economic & Advisory Board member of Cyber Security & Privacy Growth” Foundation Chapter along with Anna University, IEEE Computer Society and Cyber Security & Privacy Foundation were invited for this special presentation. The secured governance off ers strategy for government to get all basic infrastructure development with negligible investment. The concept is to develop Techno Economic Corridors connecting hubs, which will act as growth centre for individual sectors.

Organizers along with Dr. Sekhar and President HR Mohan

CSI Communications | September 2014 | 51 CHENNAI (REGION VII) Dr. Col. (res.) Gabi Siboni 23 August 2014: Presentation on “Intro to Cyber-Security 2014 Challenges” Talk was about securing cyber-space. It provided an overview of evolving fi eld of cybersecurity. Dr. Col. (res.) Gabi Siboni who gave the presentation is director of The Cyber Security Program at The Institute for National Security Studies, Tel Aviv University. He is a domain expert in national security, defense strategy, military technology and operation, cyber security and warfare, and a thought leader in business operations risk management.

Speaker Dr. Gabi Siboni with HR Mohan & other organizers

COCHIN (REGION VII) Ms. C. Sunitha, ITS; DDG DOT (NT-KERAL) 7 May 2014: Technical Talk on “IPv6” Internet has evolved into an important medium for voice and all types of data connectivity and it has put pressure on IPv4 addresses. IPv6 represents one of the most signifi cant technology changes in the history of the Internet. With growing number of online users around the world and proliferation of smart devices, IPv4 exhaustion will become major technology issue in years to come. Since all existing IPv4-based infrastructures will continue to work after the last IPv4 address is issued, both IPv4 & IPv6 are going to coexist for some more years. To sustain seamless, pervasive connectivity with consumers, partners and businesses around the world, organizations need to be able to communicate in dual-protocol environment that will ultimately become IPv6 only. Speaker Ms. C. Sunitha

TRIVANDRUM (REGION VII) Ramesh Chennithala, G Neelakantan, VK Mathews, 17 July 2014: Seminar on “Role of Cyber Forensics in Mitigation of Cyber Girish Babu, Renjith Balan, Sreekanth P Krishnan, N Crimes” Vinayakumaran and C Balan There was a session titled 'Was it a Cyber Crime? I didn’t know that!!' by Mr. Vinayakumaran Nair. There was also a session titled 'You will be caught./ You can catch. How?' By Mr. Balan. Third session was on ‘Tools and Demonstration’ also by Mr. Balan. Sessions were followed by a Panel Discussion where panel members were Mr. Jacob Punnoose, Mr. Satish Babu, Dr. Achuthsankar S Nair, Mr. Rajesh Babu, Mr. C Balan and Mr. Rajagopalan Nair

Seminar inaugurati on by Ramesh Chennithala, Hon’ble Minister for Home Aff airs, Govt. of Kerala

From Student Branches »

(REGION-III) (REGION-IV) (REGION-V) IPS , COLLEGE OF TECHNOLOGY & MANAGEMENT SILICON INSTITUTE OF TECHNOLOGY ANITS CSI STUDENT BRANCH - VISAKHAPATNAM - GWALIOR - BHUBANESWAR

30th July 14 : Guest Lecture on Nano Technology 2nd Aug, 2014 : Winner(L) and Runner up(R) 1st Aug, 2014 : Lecture on “Computability” by by Prof. Anurag Shrivastava and a section of teams of LogiCoder with SBC Prof. Bimal Dr. Prasad Jayanthi, Professor, Dartmouth Audience Kumar Meher(L) and Prof(Dr.) Bijan Bihari College, USA. Misra, Dean(Research)

CSI Communications | September 2014 | 52 www.csi-india.org (REGION-V) (REGION-V) (REGION-V) VITS COLLEGE OF ENGINEERING – VISAKHAPATNAM ACHARYA INSTITUTE OF TECHNOLOGY - BANGALORE R.V. COLLEGE OF ENGINEERING - BANGALORE

1st Aug, 2014 : In Ethical Hacking and Security, 27th July, 2014 : SEARCC teams with Prof. Iqbal 25th & 26th July 2014,: Release of Proceeds in HOD-CSE Prof. G RajaSekharam & CSI SBC Prof. Ahmed, Dy. Director-Training & others who the National Conference on “Technological K Shankar felicitating the Speaker D Sai Satish organised Regional level contest. Advancement in Computing” (REGION-V) (REGION-V) (REGION-VI) SRINIVASA INSTITUTE OF ENGINEERING AND GODAVARI INSTITUTE OF ENGINEERING AND S. N. J. B’S KBJ COLLEGE OF ENGINEERING , TECHNOLOGY - AMALAPURAM TECHNOLOGY - RAJAHMUNDRY CHANDWAD, NASHIK

21st July, 2014 : Receiving CSI Student Branch 18th July, 2014 : In the International Conference 17th Aug 2014 : Prof. M R Sanghavi, Mr. Rahul and Institution Member certifi cates from Dr. K on Advanced Computer Technology, Mr. P K Kotecha, Prof. M M Rathod, Prof. P R Bhaladare, Rajasekara Rao Rao, ED- ONGC, ignites the lamp, SBC and Dr. V Prof. D.P. Pawar in the Software Requirement Venkata krishna , Principal are looking on Specifi cation Lecture (REGION-VI) (REGION-VI) (REGION-VII) BHARATI VIDYAPEETH COLLEGE OF ENGINEERING - R. H. SAPAT COLLEGE OF ENGINEERING, SASTRA UNIVERSITY - KUMBAKONAM NAVI MUMBAI MANAGEMENT STUDIES & RESEARCH - NASIK

1st Aug. 2014: Prof. Sonali Mane, Prof. S M 28th July 2014 : Prof. N V Alone, Mr. Vinay Hinge, 1st Aug,.2014 : Seminar on “I.T – Best Practices “ Patil, Principal Dr. M Z Shaikh, Guest Mr. Dr. P C Kulkarni, Mr. Tanmay Dikshit, Mr. Paresh by Dr. V S Shankar Sriram, Dept. of Information Rocky Jagtiani, Prof. D R Ingle, Prof. Vaishali Chitnis, Prof. Archana Vaidya during the Seminar Technology, School of Computing, SASTRA Bodade(SBC). are in the “Android Application ” on “Digital Forensics & IT Security” University, Thanjavur. Workshop (REGION-VII) (REGION-VII) (REGION-VII) ER. PERUMAL MANIMEKALAI COLLEGE OF EINSTEIN COLLEGE OF ENGINEERING, - TIRUNELVELI CSI STUDENTS’ BRANCH, AVS ENGINEERING COLLEGE ENGINEERING - HOSUR - SALEM

19th Aug, 2014: Special address by Principal 8th Aug, 2014 : Mr. Jegan Vincent, Dr. R 18th July, 2014 : Lecture on “Self evelopment” by Dr.S.Chitra on “YOUR UNIQUE IDENTITY”‘ Velayudham, Mr. NK MalarChelvan, Prof. A Mr. V P Soundararajan, Triumphant Institute of seminar conducted by Mr.Y.Kathiresan, Senior Amudhavanan, Dr. K Ramar during the seminar Management Education Manager CSI ED on “Guidelines for smart performance in the technical interview”.

CSI Communications | September 2014 | 53 (REGION-VII) (REGION-VII) (REGION-VII) ADHIYAMAAN COLLEGE OF ENGINEERING – HOSUR E.G.S PILLAY ENGINEERING COLLEGE - DR. NAVALAR NEDUNCHEZHIYAN COLLEGE OF NAGAPATTINAM ENGINEERING - THOLUDUR

25th March, 2014 : National Workshop on 9th Aug, 2014 : Dignitaries with Dr. Rajkamal, 2nd Aug, 2014: Mr. N Karthikeyan Head – “Web Designing Tools” inaugurated by Dr. N S Chennai who delivers a lecture about “An Insight Operations of Dream Eff ects Multimedia & IT Badarinarayanan, Dean with Mr. StephenRaj, on Academic Projects” Solutions, Chennai delivered the lecture on the Ads-e-Park, Chennai . topic “WORDPRESS (an open source)”

(REGION-VII) CSI EDUCATION DIRECTORATE, CHENNAI NATIONAL ENGINEERING COLLEGE - KOVILPATTI 12th AUGUST, 2014 15th AUGUST, 2014

18th July, 2014: Mr. S.P.Soman RVP 7 along with Organisers with Mr. Kathiresan, Sr. Mgr, CSI ED, Independence Day was celebrated by Hoisting Mr.J.Jerart Julus, Dr.Kn. K.S.K.Chockalingam, at CSI Stall during Micro Entrepreneurship Expo the National Flag by Mr. G. Ramachandran , Past Dr.Manimegalai, Prof L.M.Nirmal Lakshman by Puthiaya Thalaimurai Foundation in which CSI Vice President and CSI Flag by Mr. H.R. Mohan, is a knowledge partner President

CSI Communications | September 2014 | 54 www.csi-india.org Application for Travel Grants for Researchers

Research Committee of Computer Society of India has decided to partly fund CSI Life Members to the extent of Rs. 25000/ for travelling abroad to present research papers at conferences. CSI Life Members who have been invited to present papers abroad and have received partial or no funding are eligible to apply for the same. They have to apply within December 31, 2014 to [email protected] and furnish: 1. Name of the Applicant, Organization Details and Bio Data of Applicant 2. CSI Life Membership Number 3. Name of the International Conference with details of the organizers 4. Conference Venue and Date 5. Copy of the Research Paper 6. Copy of the Invitation Letter received from the organizers 7. Details of funding received from/applied to for funding to any other agency 8. Justifi cation for requesting support (in 100 words). 9. Two References (including one from head of the organization)

Dr Anirban Basu Chairman, CSI Division V (Education and Research)

CSI Communications | September 2014 | 55 Prof. Bipin V Mehta CSI Calendar Vice President, CSI & Chairman, Conf. Committee 2014 Email: [email protected]

Date Event Details & Organizers Contact Information

September 2014 events

19–20 Sep 2014 Two Day e-Seminar on Steps 2 Research conducted by Amal Jyothi College of Engineering, Shyam Gopi Computer Science & Engineering and Computer Applications in technical partnership with [email protected] the ISTE Kerala section and the CSI Cochin Chapter through AVIEW www.amaljyothi.ac.in

27 Sep 2014 ETIR-2014: National Workshop on “Emerging Trends in Information Retirival” at Mathura. [email protected] Organised by GLA University in technical association with CSI Mathura, Div I & Region I. http://www.gla.ac.in/IRWorkshop/

October 2014 events

10–11 Oct 2014 A conference on Advances in Cloud Computing (ACC) with special emphasis on Internet of Organizing Committee Things (IoT) organised by CSI Pune Chapter at Pune. http://csi-acc.in/ [email protected]

31 Oct–1 Nov 2014 National Seminar is “Web Technologies & Communication: Recent Trends and Social Sreeprakash T Impacts”., Cochin. Call for Papers. Details available at http://webcon2014.org/ [email protected]

November 2014 events

14–16 Nov 2014 International Conference On Emerging Computing Technologies-2014 (ICECT-2014) Prof. R S Chhillar Organized by Dept. of Computer Science and Applications, M. D. University, Rohtak in [email protected] association with CSI Region – I and CS Division – I. 14–16 Nov 2014 International Conference on Information and Communication Technology for Competitive Prof. Amit Joshi strategies (ICTCS-2014) Organized by: Computer Society of India, Udaipur Chapter, Division Organizing Secretary IV, I, SIG-WNs ,Hosted by: Sunrise Group of Institutions, Udaipur. [email protected] http://www.csi-udaipur.org/ictcs-2014 28–30 Nov 2014 International Conference on Advance in Computing Communication and Informatics at COER Dr. Vishal Singhal, Convener School of Management, Roorkee , Uttrakhand http://coer.ac.in/ICACCI2014/index.html [email protected]

December 2014 events

10–11 Dec 2014 49th Annual Student Convention, Dr. D D Sarma, Shri Raju Organised by Computer Society of India, Hyderabad Chapter In association with GNIT, Kanchibhotla Shri Chandra Hyderabad. Theme: “ Campus to Corporate” Venue: GNIT, Ibrahimpatnam, Rangareddy Sekhar Dasaka. http://www. District Telangana. http://www.csihyderabad.org/csi-2014 csihyderabad.org/csi-2014 12–14 Dec 2014 49th Annual Convention ,Organised by Computer Society of India, Hyderabad Chapter In Sri .J. A. Chowdary association with JNTU-Hyderabad & DRDO. Theme: Emerging ICT for Bridging Future Sri. Gautam Mahapatra Venue: JNTUH, Kukatpally, Hyderabad http://www.csihyderabad.org/csi-2014 [email protected]

12–14 Dec 2014 Special session on “Cyber Security and Digital Forensics” during Computer Society of India Dr. Vipin Tyagi Annual Convention - 2014 by CSI Special Interest Group on Cyber Forensics, JNTU Hyderabad [email protected] 16–20 Dec 2014 ICISS-2014: International Conference on Information Systems Security. At Institute for [email protected] Development & Research in Banking Technology (IDRBT), Hyderabad, India. Co-sponsored by CSI Division IV and CSI SIG-IS. http://www.idrbt.ac.in/ICISS_2014/ 19–21 Dec 2014 EAIT-2014: Fourth International Conference on Emerging Applications of Information Prof. Aditya Bagchi Technology at Kolkata. Organized by CSI Kolkata at Indian Statistical Institute, Kolkata Dr. Debasish Jana https://sites.google.com/site/csieait/ For paper submission : Prof. Pinakpani Pal https://cmt.research.microsoft.com/EAIT2014 Prof. R T Goswami [email protected] 22–24 Dec 2014 ICHPCA-2014: International Conference on High Performance Computing and Applications Prof. (Dr .) Rachita Misra Organized by: CV Raman College of Engg. in association with CSI Div-V and IEEE Kolkata [email protected] Section http://www.ichpca-2014.in/

March 2015 events

11–13 Mar 2015 9th INDIACom; 2015 2nd International Conference on “Computing for Sustainable Global Prof. M N Hoda Development” Organized by Bharati Vidyapeeth’s Institute of Computer Applications and [email protected], Management (BVICAM), New Delhi [email protected]

CSI Communications | September 2014 | 56 www.csi-india.org Registered with Registrar of News Papers for India - RNI 31668/78 If undelivered return to : Regd. No. MH/MR/N/222/MBI/12-14 Samruddhi Venture Park, Unit No.3, Posting Date: 10 & 11 every month. Posted at Patrika Channel Mumbai-I 4th fl oor, MIDC, Andheri (E). Mumbai-400 093 Date of Publication: 10 & 11 every month

Computer Society of India has been honouring academic excellence through Academic Awards every year. The awards will be presented during the CSI Annual Convention to be held from 12th to 14th December, 2014 at Hyderabad. Applications are invited for the following awards for the period from April 2013 to June 2014 from the accredited student branches who meet the criteria and are currently in good standing.

Sl. No. Name of the Award Criteria To be submitted by Good standing – during the award year and currently, large Best Accredited Student Branch Student Branch Counsellor 1. student strength & large number of activities as defi ned in the Award (SBC) specifi ed form

Continuous good standing for the past 3 years with highest 2. Largest Student Branch Award Decided by ED 3 years averaged strength

Best CSI International Students Event Institutional member hosted maximum students competition 3. SBC Host Award participated by minimum 10 foreign students

Highest Sponsorship of CSI Events Institutional member extending maximum support for CSI 4. SBC Award events during the award year

5. Longest Continuous SBC Award Longest continuous tenure as SBC over the last 3 years SBC

Faculty with maximum publishing in Publishing maximum articles in CSI publications during the 6. Self CSI Publications award year

Paper Presenter at International Presentation of paper at prestigious International Conferences 7. Self Conference for Faculty during the award year

Students with maximum publishing – Publishing maximum articles in CSI publications during the 8. SBC CSI publications award year 9. Highest Committed Accredited Most active CSI Volunteer from the Student Branch during the SBC Student Branch Activist Award award year

10. Best Ph D Thesis Award CSI member, who submitted a high-quality thesis (Thesis quality Research Scholar (who got the to be evaluated by a panel of eminent research scientists) Ph D during the award year) leading to acceptance for Ph D degree by a recognized University / the Research Supervisor / Current Employer

The applications for the awards are invited only from the CSI members or from CSI Accredited CSI Student Branches in good standing during the current year as well as during the Award year. Application Forms are available at http://www.csi-india.org/web/guest/academic-excellence-awards. The applications should reach Education Directorate as specifi ed in the forms, latest by 6th October 2014. The Awardees will be invited to attend CSI 2014 @ Hyderabad and receive the awards in person. Regional Vice Presidents, RSCs, SSCs, SBCs and Chapter OBs are requested to give wide publicity and encourage applications. Please submit the applications for awards to [email protected],

Awards Committee

Rajan T Joseph Prof S.V. Raghavan - Chairman Ms. Mini Ulanat Director (Education) Prof Anirban Basu - Member National Students’ Coordinator Prof A K Nayak - Member Prof R P Soni - Member

CSI Communications | September 2014 | 57