CSIC 2014( September ) - Computer Society Of India
Transcription
CSIC 2014( September ) - Computer Society Of India
` 50/ISSN 0970-647X | Volume No. 38 | Issue No. 6 | September 2014 www.csi-india.org The Doyen's Recollections (Reminiscences of Prof. V. Rajaraman) 7 Research Front Parallel Computing with Message Passing Interface-Part II 32 Cover Story History of the Computers, GUI and Devices 19 Security Corner A Review of Cyber Security Curriculum in Indian Context 38 Cover Story Looking Back at the Evolution of the Internet 21 Security Corner A Case Study of Orbit Offshore Services 41 CSI Communications | September 2014 | 1 CSI-2014 STUDENT CONVENTION Hosted by and at: Guru Nanak Institutions Technical Campus (Formerly Guru Nanak Engineering College) (Affiliated to Jawaharlal Technological University, Hyderabad) Ibrahimpatnam, Hyderabad. Theme: Campus to Corporate and Beyond Dates: 10 - 11 December 2014 As a part of Golden Jubilee Celebrations of Computer Society of India and 49th Annual Convention of Computer Society of India, the Student Convention of CSI will be held at Guru Nanak Institutions Technical Campus, Ibrahimpatnam, Hyderabad.. Last date for submission of papers: Nov 10, 2014. Fees (incl of Service Tax) for registration: Rs. 400 for CSI members and Rs. 500/- for non-CSI members. There is no fees for paper presentations. Papers should be submitted in A4 paper size and as per IEEE format and sent by e-mail given below. Acceptances of the papers will be communicated on or before 15th November, 2014. Free Accommodation will be made available from 9th night to 11th Dec., 2014 evening at Guru Nanak Institutions, Ibrahimpatnam, Hyderabad or nearby venue. For further details contact: [email protected] CSI Communications - Call for Articles for forthcoming issues Please note that Cover Themes for forthcoming issues are planned as follows: • October 2014 - SMAC (Send your articles for October 14 issue latest before 23rd September 2014) • November 2014 – Visualization Technologies • December 2014 – Algorithmic Computing • January 2015 – IT Infrastructure • February 2015 – Quantum Computing • March 2015 – Machine Translation In order to provide a fair opportunity to all for contribution, we are making an open appeal to all of you to send your articles for CSI Communications magazine. Kindly note that the Editorial Board of CSI Communications is looking for high quality technical articles for different columns pertaining to the above themes or other themes of emerging and current interests. The articles should cover all aspects of computing, information and communication technologies that should be of interest to readers at large and member fraternity of CSI and around. The articles shall be peer reviewed by experts decided by the Editorial Board and the selected ones shall be published. Both theoretical and practice based articles are welcome but not research papers. The articles and contributions may be submitted in the following categories: Cover Story, Research Front, Technical Trends and Article. CIOs/Senior IT/IS personnel/consultants of the companies, who are managing technologies/projects related to the cover themes are welcome to contribute under the CIO Perspective - Managing Technology section. Similarly, HR Senior Managers/ Personnel/ Consultants are invited to contribute under HR section. Letters to the Editors for ReaderSpeak(), questions to be answered in Ask an Expert, your experience of Programming Tips under the Practitioner Workbench: Programming.Tips(), your memories of yesteryears of computing for IT.Yesterday(), theme based crossword puzzle and theme based cartoon for Brain Teaser column are also welcome. Here are article submission guidelines for your information: • The articles may be long (2500-3000 words) or short (1000-1500 words) authored in as the original text. (Plagiarism is strictly prohibited.) • The articles may be sent to the CSI Editorial Board via email [email protected]. • All manuscripts should be written at the level of the general audience of varied level of members. • Equations and mathematical expressions within articles are not recommended, however, if absolutely necessary, should be minimum. • List of references is preferred and it is recommended that list not more than 10 references at the end of your manuscript. Please don’t include any embedded reference numbers within the text of your article. If you would to like to refer, you may state names in the text and provide full reference at the end. The reference must state the names of the authors, title, publisher’s name, complete publication reference with month and year. Web URLs should be there for website references with accessed date. • Figures and Images used should be limited to maximum of three (only high resolution images need to be sent, and the image needs to be sent separately also). • Only MS-Word and PDF submissions are allowed. • Include a brief biography of four to six lines for each author with author picture (high resolution). • Please note that Editors will edit the contents as felt necessary. • Editorial board will notify the authors of selected articles and authors will be asked to fill up the copyright transfer form before accepting the article. Please note that months for various cover themes are tentative and may change depending on prevailing circumstances. (Issued on behalf of Editorial Board of CSI Communications) CSI Communications | September 2014 | 3 CSI Communications Contents Volume No. 38 • Issue No. 6 • September 2014 Editorial Board Chief Editor Dr. R M Sonar Editors Dr. Debasish Jana Dr. Achuthsankar Nair Resident Editor Mrs. Jayshree Dhere Published by Executive Secretary Mr. Suchit Gogwekar For Computer Society of India Design, Print and Dispatch by CyberMedia Services Limited Please note: CSI Communications is published by Computer Society of India, a non-profit organization. Views and opinions expressed in the CSI Communications are those of individual authors, contributors and advertisers and they may differ from policies and official statements of CSI. These should not be construed as legal or professional advice. The CSI, the publisher, the editors and the contributors are not responsible for any decisions taken by readers on the basis of these views and opinions. Although every care is being taken to ensure genuineness of the writings in this publication, CSI Communications does not attest to the originality of the respective authors’ content. © 2012 CSI. All rights reserved. Instructors are permitted to photocopy isolated articles for non-commercial classroom use without fee. For any other copying, reprint or republication, permission must be obtained in writing from the Society. Copying for other than personal use or internal reference, or of articles or columns not owned by the Society without explicit permission of the Society or the copyright owner is strictly prohibited. 7 8 The Doyen's Recollection Prof. Dr. V Rajaraman: A brief biographical sketch 19 21 25 Strolling Down the Memory Lane 32 Parallel Computing with Message Passing Interface The First Book on Programming in India How Computer Society of India got its Name 9 10 12 30 Dr. S. Natarajan Research Front Manu K. Madhu and Biji C.L. How the MCA Programme Started History of the Establishment of the Centre for Development of Advanced Computing Time-Line – Development of Computing in India (1955-2010) Dr. V Rajaraman Cover Story History of the Computers, GUI and Devices Radharaman Mishra Looking Back at the Evolution of the Internet Hardik A Gohel A Brief History of BIDW (Business Intelligence and Data Warehousing) 36 37 38 Practitioner Workbench Programming.Tips() » Fun with C Amitava Nag Programming.Learn(“R”) » Regression Analysis with R Umesh P and Silpa Bhaskaran Security Corner Information Security » A Review of Cyber Security Curriculum in Indian Context C. R. Suthikshn Kumar 41 Case Studies in IT Governance, IT Risk and Information Security » A Case Study of Orbit Offshore Services Dr. Vishnu Kanhere Mr. K. V. N. Rajesh and Mr. K. V. N. Ramesh PLUS User Readership Survey 2014: CSI Communications & Members Data Updation Brain Teaser Dr. Debasish Jana Happenings@ICT 26 43 H R Mohan 44 CSI Report - CSI Golden Tech Bridge Program 45 CSI News 47 Published by Suchit Gogwekar for Computer Society of India at Unit No. 3, 4th Floor, Samruddhi Venture Park, MIDC, Andheri (E), Mumbai-400 093. Tel. : 022-2926 1700 • Fax : 022-2830 2133 • Email : [email protected] Printed at GP Offset Pvt. Ltd., Mumbai 400 059. CSI Communications | September 2014 | 4 www.csi-india.org Know Your CSI Executive Committee (2013-14/15) President Mr. H R Mohan [email protected] » Vice-President Prof. Bipin V Mehta [email protected] Hon. Secretary Mr. Sanjay Mohapatra [email protected] Hon. Treasurer Mr. Ranga Rajagopal [email protected] Immd. Past President Prof. S V Raghavan [email protected] Nomination Committee (2014-2015) Prof. P. Kalyanaraman Mr. Sanjeev Kumar Mr. Subimal Kundu Region - I Mr. R K Vyas Delhi, Punjab, Haryana, Himachal Pradesh, Jammu & Kashmir, Uttar Pradesh, Uttaranchal and other areas in Northern India. [email protected] Region - II Mr. Devaprasanna Sinha Assam, Bihar, West Bengal, North Eastern States and other areas in East & North East India [email protected] Region - III Prof. R P Soni Gujarat, Madhya Pradesh, Rajasthan and other areas in Western India [email protected] Region - V Mr. Raju L kanchibhotla Karnataka and Andhra Pradesh [email protected] Region - VI Dr. Shirish S Sane Maharashtra and Goa [email protected] Region - VII Mr. S P Soman Tamil Nadu, Pondicherry, Andaman and Nicobar, Kerala, Lakshadweep [email protected] Division-I : Hardware (2013-15) Prof. M N Hoda [email protected] Division-II : Software (2014-16) Dr. R Nadarajan [email protected] Division-III : Applications (2013-15) Dr. A K Nayak [email protected] Division-IV : Communications (2014-16) Dr. Durgesh Kumar Mishra [email protected] Division-V : Education and Research (2013-15) Dr. Anirban Basu [email protected] Regional Vice-Presidents Division Chairpersons Region - IV Mr. Hari Shankar Mishra Jharkhand, Chattisgarh, Orissa and other areas in Central & South Eastern India [email protected] Publication Committee (2014-15) Dr. S S Agrawal Prof. R K Shyamasundar Prof. R M Sonar Dr. Debasish Jana Dr. Achuthsankar Nair Dr. Anirban Basu Prof. A K Saini Prof. M N Hoda Dr. R Nadarajan Dr. A K Nayak Dr. Durgesh Kumar Mishra Mrs. Jayshree Dhere Chairman Member Member Member Member Member Member Member Member Member Member Member Important links on CSI website » About CSI Structure and Orgnisation Executive Committee Nomination Committee Statutory Committees Who's Who CSI Fellows National, Regional & State Student Coordinators Collaborations Distinguished Speakers Divisions Regions Chapters Policy Guidelines Student Branches Membership Services Upcoming Events Publications Student's Corner CSI Awards CSI Certification Upcoming Webinars About Membership Why Join CSI Membership Benefits BABA Scheme Special Interest Groups http://www.csi-india.org/about-csi http://www.csi-india.org/web/guest/structureandorganisation http://www.csi-india.org/executive-committee http://www.csi-india.org/web/guest/nominations-committee http://www.csi-india.org/web/guest/statutory-committees http://www.csi-india.org/web/guest/who-s-who http://www.csi-india.org/web/guest/csi-fellows http://www.csi-india.org/web/guest/104 http://www.csi-india.org/web/guest/collaborations http://www.csi-india.org/distinguished-speakers http://www.csi-india.org/web/guest/divisions http://www.csi-india.org/web/guest/regions1 http://www.csi-india.org/web/guest/chapters http://www.csi-india.org/web/guest/policy-guidelines http://www.csi-india.org/web/guest/student-branches http://www.csi-india.org/web/guest/membership-service http://www.csi-india.org/web/guest/upcoming-events http://www.csi-india.org/web/guest/publications http://www.csi-india.org/web/education-directorate/student-s-corner http://www.csi-india.org/web/guest/csi-awards http://www.csi-india.org/web/guest/csi-certification http://www.csi-india.org/web/guest/upcoming-webinars http://www.csi-india.org/web/guest/about-membership http://www.csi-india.org/why-join-csi http://www.csi-india.org/membership-benefits http://www.csi-india.org/membership-schemes-baba-scheme http://www.csi-india.org/special-interest-groups Membership Subscription Fees Membership and Grades Institutional Membership Become a member Upgrading and Renewing Membership Download Forms Membership Eligibility Code of Ethics From the President Desk CSI Communications (PDF Version) CSI Communications (HTML Version) CSI Journal of Computing CSI eNewsletter CSIC Chapters SBs News Education Directorate National Students Coordinator Awards and Honors eGovernance Awards IT Excellence Awards YITP Awards CSI Service Awards Academic Excellence Awards Contact us http://www.csi-india.org/fee-structure http://www.csi-india.org/web/guest/174 http://www.csi-india.org /web/guest/institiutionalmembership http://www.csi-india.org/web/guest/become-a-member http://www.csi-india.org/web/guest/183 http://www.csi-india.org/web/guest/downloadforms http://www.csi-india.org/web/guest/membership-eligibility http://www.csi-india.org/web/guest/code-of-ethics http://www.csi-india.org/web/guest/president-s-desk http://www.csi-india.org/web/guest/csi-communications http://www.csi-india.org/web/guest/csi-communicationshtml-version http://www.csi-india.org/web/guest/journal http://www.csi-india.org/web/guest/enewsletter http://www.csi-india.org/csic-chapters-sbs-news http://www.csi-india.org/web/education-directorate/home http://www.csi-india.org /web/national-studentscoordinators/home http://www.csi-india.org/web/guest/251 http://www.csi-india.org/web/guest/e-governanceawards http://www.csi-india.org/web/guest/csiitexcellenceawards http://www.csi-india.org/web/guest/csiyitp-awards http://www.csi-india.org/web/guest/csi-service-awards http://www.csi-india.org/web/guest/academic-excellenceawards http://www.csi-india.org/web/guest/contact-us Important Contact Details » For queries, correspondence regarding Membership, contact [email protected] CSI Communications | September 2014 | 5 President’s Message H R Mohan From : President’s Desk:: [email protected] Subject : President's Message Date : 1st September, 2014 Dear Members I am happy to inform that the National Final Competition for Young Talent Search Computer Programming 2014 was successfully conducted at the Rajalakshmi Engineering College (REC) on 31st Aug 2014 with CSI veterans Mr. G. Ramachandran, Mr. S. Venkatakrishnan and Ms. Latha Ramesh as judges. Ten teams selected out of 200+ from the prelims conducted at 21 centres across the country participated in the finals. While the team from St. Jude’s Public School & Junior College, Kotagiri stood first, the team from Rishy Valley School (KFI). Madanapalle was the runner up. I could witness the keen & competitive interest of the teams participated in the contest. Cash awards along with trophies were presented to both the winning teams who will represent India in the SEARCC ISSC-2014 to be held at Chennai during October 2014. Let us wish these teams all the very best in the ISSC-2014. Our thanks to the management of REC for supporting the contest for several years and also for consenting to host ISSC-2014. The Div IV supported International Conference on Innovations in Computer Science & Engineering – ICICSE 2014 took place at Gurunanak Institutions at Hyderabad during 8-9, Aug 2014. The conf. attracted about 200 papers of which 60 were presented in parallel sessions. The conf. proceedings of the papers presented and the souvenir with the abstracts of all the papers submitted have come out very well and they are being added in our reference library at CSI ED. Dr. H.S. Saini & Dr. D.D. Sarma and their team had run the conf. in a splendid manner and this has given us the confidence that the Student Convention to be hosted by GNI during CSI 2014 is in safe hands. Vice President Mr. Bipin Mehta and the Chair, Div Iv Dr. Durgesh Kumar Mishra participated in the conf. along with the President. Hyderabad witnessed one more event supported by CSI – a National Workshop on Big Data – BiDA2014 which was held during 22-24, August 2014 at CR Rao Advanced Institute of Mathematics, Statistics and Computer Science. This intensive workshop inaugurated by the CSI President had invited talks on various aspects of Big Data from seasoned academic and professional community such as IIITH, IISc, UOH, BITS, AIMSCS, CDAC and hands-on sessions at Centre for Modelling, Simulation and Design at Univ. of Hyderabad. Dr. Saumyadipta Pyne, the key anchor for this workshop has in principle agreed to run similar workshops and also an online course for CSI through the proposed Special Interest Group on Data Science and Analytics or joining with the existing SIG DATA. Dr. Bagga and Dr. Ashok Agarwal, the veterans who had played major roles in organizing few highly successful CSI annual conventions at Hyderabad had organised a brainstorming session at IIITH on 22nd Aug in connection with the eGovernance Track and Knowledge Sharing Summit during CSI 2014. It may be noted that CSI eGovernance State/Project Awards are being given during annual conventions for the last 12 years and the SIG eGOV has been spearheading the major activities in sharing knowledge in eGov domain in Knowledge Sharing Summits. Along with the President, CSI 2014 team and the eGov awards team consisting of Dr. Surendra kappor, Dr. Harish Iyer and Mr. Vijaya Sekhar deliberated on the modalities and the events to be organized in the context of divided Andhra. All the teams were sensitized to organize a great eGov awards event at CSI 2014. The CSI ED supported Golden Tech Bridge event held on 9th Aug was a great success and it has made a significant impact among the public at large. Over 60 institutions organized this programme which was attended by housewives, retired people, people from lower strata including shopkeepers and auto drivers. Apart from providing basic computer skills and knowledge, the participants were taught how to use various eServices of the Govt., railway ticket booking, online banking etc., The reports received from the institutions highlight the appreciations by the participants and the demand to run similar events at regular intervals. This is a great step towards bridging the digital divide. While we have a long way to go. I am sure with the support of our SBs we can achieve our objectives. In the EXCO of the SEARCC held at Colombo on 28th Aug, the possibility of hosting the SEARCC 2014 by Malaysia was discussed. As MNCC had expressed their inability to host the event in 2014 and the possibility of organizing it during Feb 2015 only, it was decided to run SEARCC 2014 in online mode with few online video streaming sessions covering technology trends and country initiatives presented by SEARACC member counties. India, Australia and Srilanka have come forward to take this initiative forward and make it a standard feature to share the knowledge among its members. The undersigned suggested that these online sessions relating to SERACC 2014 may be organized in the first week of Dec 2014 to coincide with CSI 2014 at some convenient time CSI Communications | September 2014 | 6 to suit all the SEARCC economies. Few divisions and SIGs may plan for these SEARCC 2014 online events. Depending on the success of this initiative, it was deliberated whether we can make SEARCC conf. an online only event involving other economies also to make them participate to start with and facilitating them to become members of SEARCC subsequently. As the World Computer Congress WCC-2015 of IFIP is being held in South Korea, the SEARCC 2015 may become the first full-fledged online conference. On the invitation from the Computer Society of Sri Lanka, the undersigned attended and presented a session on “ICT growth and challenges in India” in their annual flagship event National Information Technology Conference NITC-2014 held prior to SEARCC EXCO during 25-27 Aug 2014. The inauguration ceremony of the NITC-2014 was held at the Main Conference Hall of the Bandaranaike International Conference Hall (BMICH), Colombo and was attended by about 800 participants. The conference had 15 international speakers including Mr. Leon Strous, IFP President, Mr. H.R. Mohan, CSI President, Ms Brenda Aynsley, ACS President, Prof. Tim Unwin, Secretary General of the Commonwealth Telecommunication Organisation & Unesco chair In ICT4D, Mr. Tim Greisinger, Vice President, IBM, Mr. Anthony Ming, Adviser (Informatics), Commonwealth Secretariat, Dr. Nick Tate, Imm. Past President, ACS, Mr. Yohan, Secretary General, SEARCC. Considering the relevance of CHOGM 2013 theme “Growth and Equity: Inclusive Development”, NITC 2014 was positioned as an ICT forum for commonwealth nations organized by the Computer Society of the CHOGM host country to create a platform to deliberate on the role of ICT in citizen centric development in the commonwealth beyond Millennium Development Goals (MDG) of which deadline reaches in 2015. The conference agenda has focused deliberations on topics relevant to commonwealth countries on developing a collaborative and connected commonwealth to share ICT knowledge and resources to synergize efforts to advance the social development. As the revenues from IT services are under stress, the only way to achieve our projected growth in IT revenues is by innovation and IP development. In this context, it is a timely initiative by CSI Kochi to start an innovation hub on an experimental basis with the support of Startup Village at Kochi. Mr. Santosh Kumar, Secretary of CSI Kochi is taking the lead in this initiative. Based on its success, we would like to replicate it in other chapters. I am happy to note that the newly formed SIGs – Indic Computing and Technology Enhanced Learning are coming out with their newsletters – “Indic News” and “Title” respectively. Thanks to Dr. B. Kannan and Dr. M. Sasikumar for their sustained interest in SIG activities. Members may look forward to receive them soon. Digital India, the dream project of our PM, announced in Aug 2014 will be the umbrella programme for the government’s initiatives in the area Digital Literacy for all and transparent eGovernance and will entail an expenditure of Rs 1.13 lakh crore in existing and new plans. More about Digital India initiatives in the next month. Let us promote the individual life membership in CSI at a 15% discount being offered for a limited period from 1st Aug to 31st Dec 2014. With best regards H R Mohan President Computer Society of India www.csi-india.org Editorial Rajendra M Sonar, Achuthsankar S Nair, Debasish Jana and Jayshree Dhere Editors Dear Fellow CSI Members, We are glad to bring this special issue on IT History to you. Our previous issue on this theme had seen tremendous inflow of contributions and also many responses from readers. We had decided at that time itself that we would repeat the history theme once again and so there is this special issue on IT History for all of you. It’s an absolute pleasure to put on record that this time also we received a good response for this theme in terms several contributions. This month’s highlight is many reminiscences of the doyen of Indian computing fraternity, Prof. V. Rajaraman. In the special section called “The Doyen’s Recollections”, we have an assortment of 5 crisp articles by Prof. Rajaraman, which spans the academia, R & D and also CSI itself. These articles - “The First Book of Programming in India”, “How CSI got its name”, “How MCA program started”, “Establishment of CDAC” and “Timeline of development of computing in India” are all collectors’ pieces. We are sure that these articles have made this issue a very precious one. In addition to Prof. Rajaraman’s contributions, under the Cover Story section, we have four articles. First is on “History of Computers, GUI and Devices” written by Radharaman Mishra of iGate. This is a very well-written article that describes history and timeline of computers and related devices through various generations and also peeks into the future at the end. Second article is on “Looking Back at the Evolution of Internet” by Hardik Gohel. It tells us about the history of the Internet and of course the Web which greatly revolutionalized the way information is accessed today online all over the globe. The article talks about electronic mail, social networking, various versions of Web – Web 1.0, Web 2.0, Web 3.0 (Semantic Web) etc and finally speaks about the future of the Web in terms of Web Intelligence. The third article under the cover story section is about “Brief History of BIDW (Business Intelligence and Data Warehousing)” written by K.V.N. Rajesh and K.V.N. Ramesh. The article traces the timeline of how BIDW technology has come way forward from the time of advent of computers to the state in which we see it now and concludes saying that the usage and support for BIDW in Businesses is only expected to grow in future. The fourth article “Strolling down the Memory Lane” is written Dr. S. Natarajan, who takes us 42 years back in time when he worked in DRDL and tells us about the way computing was being done then. Our Research Front section carries an article titled “Parallel Computing with Message Passing Interface” written by Manu K. Madhu and Biji C.L. The article is continuation of the first part which was published in last month’s issue i.e. CSIC August 2014 This month’s highlight is many reminiscences of the doyen of Indian computing fraternity, Prof. V. Rajaraman. In the special section called “The Doyen’s Recollections”, we have an assortment of 5 crisp articles by Prof. Rajaraman, which spans the academia, R & D and also CSI itself. issue. The first part provided introduction to parallel computing and use of MPI (Message Passing Interface) which is a dominant model used in high performance computing. The second part appearing in this issue provides information on writing MPI subroutines and presents toy examples to illustrate the concept. In the Information Security section of Security Corner column we have an article written by Dr. C. R. Suthikshn Kumar titled “A Review of Cyber Security Curriculum in Indian Context”. In the light of growing need of cyber security professionals to help guard country’s cyber boundaries, the article focuses on how the curriculum should be designed for creating highly skilled cyber security professionals. Dr. Vishnu Kanhere of CSI-SIG on Humane Computing continues to contribute to section of ‘Case Studies in IT Governance, IT Risk and Information Security’ under Security Corner column. This time Dr. Kanhere writes about the case study of Orbit Offshore Services, which highlights how history can This time Dr. Kanhere writes about the case study of Orbit Offshore Services, which highlights how history can serve the purpose of an early warning system and how important learning from historical events can be. serve the purpose of an early warning system and how important learning from historical events can be. In our regular section called Programming.Tips() under Practitioner Workbench column, we have an article written by Amitava Nag on “Fun with C” where he discusses whether it is possible to have a function in C program that accepts variable number of parameters. As usual Umesh P. and Silpa Bhaskaran continue their write-ups under Programming.Learn(“R”) and this time they write about “Regression Analysis in R”. Dr. Debasish Jana, Editor, CSI Communications presents crossword for those who want to challenge themselves under Brain Teaser column. CSI President H. R. Mohan brings us the ICT News Briefs in August 2014 at a glance under various sectors in his regular column Happenings@ICT. Due to shortage of space we are omitting Innovations in India, Ask an Expert and On the Shelf Columns in this issue. However, we have other regular features like CSI Announcements, CSI Reports and Chapter and Student Branch News. We also have Call for Contributions where we provide tentative list of future cover themes of CSIC. There is a special user readership survey being carried out and we request you all to respond to it wholeheartedly and provide details that are asked for. Please remember we do welcome your feedback and responses at the email id [email protected] We wish all readers pleasant and fruitful reading. With warm regards, Rajendra M Sonar, Achuthsankar S Nair, Debasish Jana and Jayshree Dhere Editors CSI Communications | September 2014 | 7 It’s a pleasure to receive several contributions from Prof. V. Rajaraman for CSI Communications’ special issue on IT History. Very recently Prof V. Rajaraman was honored with the award of D. Sc. (Honoris Causa) from IIT Kanpur on June 18th, 2014. A link to the video coverage of the award ceremony is available at iitk.vmukti.com. He has contributed five articles for this issue providing information on –First programming book in India, How CSI got its name, How MCA program started, Establishment of CDAC and Timeline of development of computing in India. Prof. Rajaraman was awarded the Padma Bhushan by the President of India in 1998. He is a Fellow of the Computer Society V. Rajaraman, PhD(Wisconsin) of India, the Indian National is Honorary Professor Science Academy, the Indian in the Supercomputer Academy of Sciences, Education and Research National Academy Centre(SERC) at of Sciences,Indian the Indian Institute of National Academy of Science, Bangalore. He Engineering, and the was previously TataChem Institution of Electronics and Professor and Chairman of Telecommunication Engineers. SERC, IISc (1982-1994), IBM Professor of Prof. V.Rajaraman giving acceptance speech after receiving Among the many honours honorary D.Sc. of IIT,Kanpur on 18 June 2014 and prizes that he has IT at the Jawaharlal received are Shanti Swarup Nehru Centre for Bhatnagar Prize (1976), Advanced Scientific Research, Bangalore (19942001), and Professor of Electrical Engineering Homi Bhabha Prize (1984) by UGC, Indian and Computer Science at IIT,Kanpur (1966- Society of Technical Education award for 1982). He was an Assistant Professor of Statistics excellence in Teaching (1988), Om Prakash at the University of Wisconsin, Madison (1961- Bhasin Prize (1992), Rustom Choksi Award 62), a visiting Assistant Professor of Electrical (1993) by IISc, Zaheer Medal (1998) by the Engineering and Computer Science at the Indian National Science Academy, and the University of California, Berkeley (1965-66), Life Time Contributions award by the Indian and an IBM Research Fellow at the IBM National Academy of Engineering, Dataquest, Systems Development Institute, Canberra, Computer Society of India, and the Systems Australia (1973-74). He is an author of 23 Society of India. He was awarded an Honorary widely used text books and numerous research DSc (Engineering) by the Bengal Science and papers in computer science and has guided 30 Engineering University, Sibpur in 2012, and an n Honorary DSc by IIT/Kanpur in 2014. PhD students. Prof. Dr. V Rajaraman: A brief biographical sketch C SI Co CSI CS Communications omm mun u n ic icat cat atio io onss | Se September S p em pt m ber be r 2 be 2014 014 | 8 01 014 ww w www.csi-india.org ww w..cs .cs csii--in indi dia a.or orrg Doyen's Recollections Prof. V. Rajaraman Supercomputer Education and Research Centre, Indian Institute of Science, Bangalore The First Book on Programming in India It all started with the arrival of an IBM 1620 mainframe computer at IIT/Kanpur in August 1963. This computer was the first one with a FORTRAN compiler to be installed in India. It was gifted to IIT/ Kanpur by the Kanpur Indo American Programme (KIAP) funded by the United States Agency for International Development. KIAP was a consortium of nine top U.S. universities including MIT, CalTech, University of California, Berkeley, Princeton, and Purdue. The computer was installed by the engineers of IBM (India). KIAP had sent three Professors during 1963-64 to help in installing the software and teach how to program the computer. Professor Harry Huskey from the University of California, Berkeley was the head of the team. Prof. Huskey was a pioneer in computing, having been a member of the ENIAC team and also a member of the team which built the ACE computer at the National Physical Laboratories, U.K., under the leadership of Alan Turing. He was one of the early Presidents of the Association for Computing Machinery (ACM), U.S.A. The other members of the team were Prof.Forman Acton, a numerical analyst, and Prof. Irving Rabinowitz, a systems programmer both from Princeton University. As soon as the computer was installed, Prof.Huskey and his team planned a course in programming for IIT/ Kanpur faculty and research students. He then took a pro-active step in spreading computer education not only to the IIT/ Kanpur community but also to researchers in CSIR, DRDO, and other laboratories and Universities. Beginning in December 1963, IIT/Kanpur started 10 day intensive courses in computing which was continued and given thrice a year by the IIT/Kanpur faculty till 1972. Sixty participants were admitted to each course and it consisted of three lectures, one on programming using a load and go version of FORTRAN called FORGO, one lecture on numerical methods and the third on computer logic. This was followed by 3 hour laboratory sessions on programming for batches of 20 participants. The batch size was limited to 20 as we had only 25 key punch machines using which participants in the course punched their programs on 80 column cards. Program decks of participants were submitted as a batch to computer operators who ran them. As no inexpensive books were available to teach programming I was persuaded to write notes on programming. Originally they were distributed as cyclostyled notes to the participants. At the same time, IIT/ Kanpur faculty decided to teach a course on computer programming as a compulsory course to all engineering students. Each batch had 300 students and the notes were used to teach the course beginning in 1964/65. The notes titled “Principles of Computer Programming” was printed in the graphic arts section of IIT/Kanpur and sold by the campus book store for Rs.5/-. The book was bought not only by IIT/ Kanpur students but also by outsiders who visited IIT/Kanpur. I spent the year 1965-66 at the University of California, Berkeley, as a Visiting Assistant Professor and showed my programming notes to some colleagues there for their comments. They suggested small changes and I polished the notes. On return to India in August 1966, I got involved again in teaching the programming course to students as well as the participants of the intensive courses. I requested my colleague Prof. H N Mahabala to review my notes and he did a commendable job and gave numerous suggestions for improvement as he was also teaching the intensive course as well as the undergraduate course on computing. The thought then occurred, with persuasion by my wife Dharma, that I should try to get the book published so that more persons can read it. I sent the book to several publishers but they were not interested in publishing it. They felt that there was no market in India for a book on computer programming. Only one publisher, Prentice-Hall of India, showed some interest. I insisted that the book should be priced below Rs.15 so that it will be affordable to students. Prentice-Hall of India Managing Director at that time Mr. Neville Gosling finally agreed in August 1967 to publish the book (after getting the book reviewed) with the stipulation that I give a “camera ready” copy by getting it typed using an IBM electric typewriter. It was done on A4 size paper with drawings drawn using India ink on tracing paper. The book titled “Principles of Computer Programming” was finally published in July 1969. The first print run was 3000 copies. Prentice-Hall of India had hoped that they will be able to sell the first print in three years. To their utter surprise and mine by December 1969, 2500 copies were sold and a second printing came out in May 1970. Even though there were not many computers in India there was tremendous curiosity and eagerness to lean about computers and programming. The book fulfilled that need. This book was followed by a revised edition titled “Computer Programming in FORTRAN IV”, and later as FORTRAN 77 (including an introduction to FORTRAN 90). The 51st printing of this book appeared in July 2013. Even today the latest version of the first programming book is being sold steadily, although not in large numbers, in spite of FORTRAN having been superseded by Pascal, C, C++, and Java. It is also gratifying that whenever I meet engineers/scientists in their 50s they remember that they learnt programming using the FORTRAN book describing its unusual A4 size and the colour of its cover which changed from silver grey to chocolate to yellow and finally blue. n How Computer Society of India got its Name Indian Institute of Technology, Kanpur was the first educational institution in India to install a mainframe computer with a FORTRAN compiler in August 1963. It was an IBM 1620 with 60K digit memory, three tapes, punched card I/O and an arithmetic unit which did arithmetic by table look up! The computer was installed by IBM engineers in a large air conditioned room. IIT/Kanpur was assisted by a consortium of nine top Universities including MIT, CalTech, Princeton, University of CSI Communications | September 2014 | 9 California, Berkeley, and Purdue University. Prof.Harry Huskey of the University of California, Berkeley, was the leader of an American faculty team who had come to help install the computer and to teach programming, numerical methods, and computer logic to the students and faculty at IIT/Kanpur. Prof. Huskey was a pioneer in computing, having worked with the ENIAC team and later with Alan Turing designing the ACE computer at the National Physical Laboratory, U.K. He was also a Past President of the Association for Computing Machinery (ACM), U.S.A. With his vast experience in managing computing facilities and influence with IBM he requested IBM to gather IBM computer users to exchange their experiences and to request IBM for some improved services. The group of 16 persons from seven IBM computer installations including representatives from IIT Kanpur, DRDO, PRL, and some other organizations first met at the IBM Education Centre at Faridabad on 6 June 1964. At the end of this meeting it was decided to form an All India Computer Users’ Group (AICUG). In mid December 1964, Prof. Huskey organized an International Conference on Computers at IIT/Kanpur, funded by the United States Agency for International Development and the Ford Foundation, with the primary goal of discussing the latest trends in computing. All speakers to this conference were invited speakers. Among the speakers were Prof. Maurice Wilkes of Cambridge University, Prof. John Bennet, of the University of Sydney, Australia, Prof. J Beltran from Mexico who was famous for spreading computer education in Mexico by transporting an IBM 1620 on an air conditioned truck to various universities there, Dr. S. Barton, a computer designer from CDC, besides Prof. Harry Huskey, Prof Forman.Acton, and Prof. Irving Rabinowitz (from Princeton). Almost 60 participants were invited from India among whom, I remember, were Major A Balasubramanian (DRDO), Dr. P P Gupta(CDC), Dr. S R Thakore (PRL), Dr. P V S Rao (TIFR), Dr. N Srinivasan (NAL), Prof. B Nag (Jadavpur University), Prof. J Roy (ISI), besides Prof. H K Kesavan and I from IIT/ Kanpur. At the end of the conference a meeting was held on Friday, December 14, 1964 afternoon where a consensus was reached that the All India Computer Users’ Group was not an appropriate forum for scholarly discussions and for presenting results of research in the area of computing. It was decided to form a professional society in computing. The question then arose about naming the society. Indian Computer Association, and Indian Computer Society, among other names were proposed. Indian Computer Society was rejected as the abbreviation ICS reminded everyone about our colonial past, and ICA was too close to the Institute of Chartered Accountants. Dr. P P Gupta, who was sitting next to me, then suggested the name Computer Society of India (CSI) and it was finally agreed as the appropriate name by all who were present. Major A.Balasubramanian, who was at that time in-charge of the IBM 1620 installation at DRDO, Hyderabad, volunteered to get the new society registered as soon as he returned to Hyderabad. (At that time all of us did not realize that CSI was used as an abbreviation by the Church of South India!). n How the MCA Programme Started In 1979 the Electronic Commission of the Government of India, of which I was a member, felt that several computer based projects were not progressing fast enough due to the paucity of trained human resource. The then Chairman of the Electronics Commission Prof. Biswajit Nag set up a panel with me as its Chairman to project the demand for manpower and suggest appropriate educational programmes to meet the requirements of Human Resource. The other members of the panel were Prof. S Ghosh of Jadavpur University, Prof. K K Bhutani of J K Institute of Technology and Applied Physics, Allahabad, Prof. S K Lakshmana Rao of REC, Warrangal, Prof. M V Pitke of Bombay University, Prof. P C P Bhatt of IIT, Delhi (who was at that time the Director of Computer Division of the Department of Electronics), Dr. D Shankar Narayan of the University Grants Commission, Dr. S M Vaidya of the Regional Computer Centre, Pune University, Prof. P G Reddy of IIT, Delhi, Mr. S S Oberoi of DOE and Dr. Om Vikas of the Electronics Commission who was the member convener of the panel. The terms of reference given to the panel and the full report of the panel may be found in[1]. The panel held nine meetings during January-July 1980. On 21 and 22 April 1980 it held a Computer Science and Engineering curriculum development seminar at IIT/Delhi. Opinions of CSI members were solicited at the Annual Convention of CSI held at Mumbai on February 9, 1980. The panel found that there was a scarcity of Computer Science professional all over the world. Further most predictions made of requirements of human resources in the area of computing all over the world were underestimates. While reviewing the situation it was found that very few institutions in India had a formal degree programs in Computer Science. M.Tech/ME programs were being offered by about a dozen institutions in India with an intake of 152 and B.Tech was offered only at seven institutions with an intake of 122. Further, B.Tech and M.Tech programmes were engineering oriented with emphasis on computer architecture, hardware, and systems software. These CSI Communications | September 2014 | 10 programmes primarily emphasized the design of computers rather than their applications in industry and government. The committee felt that there was a need for a large number of systems analysts and application programmers particularly to fulfill the requirements of the data processing departments of companies which were primarily users of computers rather than designers of computers. A minicomputer policy which was in limbo for a long time was just about to be announced based on the Sondhi committee[2] recommendations which was expected to allow many private companies to enter computer manufacture. There was no formal educational program to create a cadre of systems analysts and application programmers. Systems analysts are expected to have breadth of knowledge and maturity as their main job requirement is to interview personnel of various types of organizations and arrive at Systems Requirement Specification (SRS) before embarking on systems design and programming. Persons developing information systems for www.csi-india.org organizations need not only knowledge of computers and computing but also business practices such as accountancy, stores, purchase, organizational structure and related organizational governance practices. The course was primarily meant to fulfill the needs of Management Information Systems departments of organizations[3] and develop Information systems for the clients of software companies. The committee felt that a basic B.Sc/B.Com degree would give the students some breadth of knowledge and maturity. Further a large number of B.Sc/B.Com students did not have enough employment opportunities and a program to give them an orientation in a profession would make them employable in the nascent field of computer applications. This led to the idea of 3 year post graduate programme which the panel decided to name Master of Computer Applications (MCA). This course was of special relevance to conditions in India and did not mimic any course in the west. It was the panel’s conviction that the MCA course must have three components: strong mathematics base, broad general knowledge on the management structure of organizations including finance, and a strong grounding in computers as a tool in solving problems. The panel felt that the course must include programming, systems analysis and design, operating systems, and basic ideas on architecture of computers. The panel also felt strongly that at least six months of the course must be spent by the students in an organization understudying an experienced systems analyst. The approval of this course by UGC was expedited as Dr. Shankar Narayan who was an Additional Secretary of UGC was a member of the panel. The panel suggested that the MCA programme should be started at ten institutions with an intake of 30 each. The panel had hoped that among the ten would be the three IIMs. IIMs were not interested but many other colleges were. To kick start the programme it was suggested that the ten institutions chosen should be fully funded for five years to create the infrastructure including hiring teachers and buying computers. Department of Electronics agreed to meet 90% of the funding requirement and 10% was to be funded by UGC/Ministry of HRD. These recommendations were presented to the Electronic Commission and the UGC and they approved the MCA program and the funding requested. Subsequently ten institutions submitted proposals, got the funding and the MCA course was started in 1982-83. References [1] [2] [3] Report of the Panel on Computer Manpower Development, Electronic Information and Planning, IPAG, Electronics Commission, Vol.8, No.2, November 1980, pp.56-70. Virendra Kumar, Committees and Commissions in India: 1978. V.Rajaraman, “A Curriculum Proposal for a Degree Program in Information Systems Design”, CSI Communications, Vol.5, No.4, Oct.1981. n History of the Establishment of the Centre for Development of Advanced Computing Introduction In 1983 the Indian Institute of Science, Bangalore, gave a proposal to the Department of Science and Technology, Government of India, to set up a supercomputer facility at the Institute. The contention of the Institute was that cutting edge research in science and engineering required such a machine at the Institute as modeling and simulation of complex systems depended heavily on a supercomputer. All major universities in the west had supercomputers. This was duly considered by the secretary, Department of S&T and as the financial outlay required was over Rs.25 crores he suggested that a committee of secretaries consisting of the secretaries of the then Department of Electronics, Ministry of Human Resource Development and S&T should consider the proposal. The proposal was approved in principle by this committee of secretaries. Then started a series of steps beginning with a visit by a group led by the Director of the Indian Institute of Science to some leading supercomputer centres in U.K and U.S.A and the two major manufacturers of supercomputers, namely, Cray and Control Data Corporation(CDC) both located in Minnesota, U.S.A. A report was submitted to the Government by the Indian Institute of Science and final approval for buying a supercomputer with a budget allocation of Rs.60 crores including special building, technical staff, faculty etc., came in late 1985. The institute started the process of tendering etc. and soon found that the process of importing a supercomputer was tortuous. Getting an export clearance from the U.S. government was becoming difficult. Even when quoting for the computer Cray and CDC indicated the problems with export controls and wanted the Institute to sign an agreement which included surprise inspection of the use of the computer including the source codes of the programs being run, restriction on its use by organizations outside the Institute, restrictions on its use by visiting Professors from the then Soviet Union and its allies etc. Many of these conditions were unacceptable to the Institute and the Government of India. After extensive negotiations on relaxing some of the conditions an order was placed for the purchase of a CrayYMP computer with the condition that it should be installed within one year. Cray could not get an export clearance within the stipulated time and the order was cancelled. It was clear to the Institute and to the Government of India that unless we become self-reliant in building supercomputers, we will be forever at the mercy of the U.S. government. Prof. C N R Rao who was the then Director of the Indian Institute of Science and who was also the Chairman of the Science Advisory Council to the Prime Minister (SAC-PM) was convinced of the need for India to become self-reliant in building and using supercomputers. SAC-PM formed a committee with me as Chairman and Prof.P.C.P.Bhatt of IIT, Delhi, Dr. N Seshagiri of the Department of Electronics, and Dr. P N Shankar of the National Aeronautical Laboratories, Bangalore, as members to CSI Communications | September 2014 | 11 suggest ways and means of meeting this goal. The committee was set up some time in December 1986 and held several meetings. One of the meetings was held with Prof.Roddam Narasimha, a members of SAC-PM, in which he talked about the need of a high performance computer for solving complex computational fluid dynamics problems in aerospace and research in atmospheric sciences which had relevance to the important problem of monsoon prediction. He also mentioned the need of a high performance computer to solve problems in structural engineering, molecular biophysics etc. In the deliberations of the committee the need to emulate the successful mission mode model and the flexibility in the management structure of CDOT in the new centre was emphasized. The need for collaboration between various scientific institutions and a distributed structure to expedite application developments on a parallel machine was also desired by the committee. During the period 1984-86 technology was rapidly changing. Computer architects all over the World were looking for alternatives to vector supercomputers of the type manufactured by Cray and CDC in the U.S.A., and NEC and Fujitsu in Japan, which required special cooling, consumed enormous power and were very expensive. Microcomputers were doubling their speed every 2 years and were inexpensive. Numerous start ups in U.S.A were exploring the possibility of building supercomputers using parallel processing and were building prototypes. The committee felt that it was easier to build parallel computers having a performance approaching the speed of supercomputers of the day at a fraction of the cost. Further, there were fortunately no embargos on buying microcomputers. The committee submitted a report in February 1987 to the SAC-PM entitled “Technology Mission to develop a Parallel Computer”. The executive summary of the report is reproduced below: TECHNOLOGY MISSION TO DEVELOP A PARALLEL COMPUTER SUMMARY With the advent of inexpensive powerful microprocessors it has now become feasible to build a computer by interconnecting a large number of microprocessors. Such a computer, called a parallel computer, can be designed to solve problems requiring numerically intensive computing. There are a large number of applications critical to India’s development, which requires sustained numerical speeds in the range of 10 to 100 million arithmetic operations per second. It is thus necessary to initiate a technology mission with a goal of building such parallel computers by 1990. The potential hardware speed of parallel computers cannot be utilized unless new algorithms tuned to the parallel structure of these computers are developed. Research in parallel algorithms is at its infancy and major effort can potentially give us a leadership position in this area. It is thus proposed that commercially available parallel computers be distributed to fourteen organizations and individual goals be defined for each organization to develop parallel programs in their area of competence. These programs should be implemented on the prototype parallel computer developed by the mission. It is proposed that the mission be coordinated and executed under the umbrella of the Centre for Development of Advanced Computer Technology (CDACT) of the Department of Electronics and that it must have a separate identity and autonomy of operation. The proposed budget for the mission is Rs.32 crores of which USD 14.25 million will be in foreign exchange. On March 31, 1987, I received a letter from the Secretary of SACPM which stated “It has been decided that SAC-PM’s work on Parallel Computing be included as an item for discussion with the Prime Minister, in a meeting of SAC-PM members to be held with him on 21st April 1987 at 18.05 hours. SAC-PM has tentatively suggested a discussion on this item for 30 minutes including a presentation of 10 minutes”. I prepared 3 slides for presentation which are reproduced below. (An OHP was used for the presentation as the use of PPTs had not become common in 1987). PRESENTATION TO PM ON 21.4.1987 ON PARALLEL COMPUTER MISSION ☛ SLIDE 1 MISSION TO BUILD A PARALLEL COMPUTER ☛ BUILD PARALLEL COMPUTER SUSTAINED SPEED OF 50M FLOPS WITH ISSUES IN PARALLEL COMPUTING PROCESSORS BECOMING FASTER AND CHEAPER OUR INDUSTRY ABLE TO USE THEM QUICKLY HARDWARE ISSUES ☛ ☛ INTERCONNECTION STRATEGEIS COMMUNICATION STRATAGIES CSI Communications | September 2014 | 12 ☛ HARDWARE SYSTEM DESIGN RELATIVELY EASY MINIMUM SLIDE 2 ☛ ☛ ☛ DEVELOP PARALLEL ALGORITHMS AND SOFTWARE IN DIVERSE DISCIPLINES DEVELOP SOFTWARE TO RESTRUCTURE LARGE SERIAL PROGRAMS TO PARALLEL PROGRAMS FOR COMPTUER BEING DESIGNED CRUCIAL PROBLEMS ARE IN SOFTWARE ☛ ☛ ☛ ☛ ☛ ☛ MODELLING PROBLEMS RETHINKING SOLUTION PARTITIONING JOBS TO TASKS ASSIGNING TASKS COORDINATION OF TASKS PICKING RIGHT NOTATION www.csi-india.org SLIDE 3 IMPLEMENTATION ☛ ☛ ☛ ☛ CREATE A CENTRE TO DESIGN DEVELOP AND FABRICATE A PROTOTYPE SYSTEM CENTRE SHOULD HAVE OPERATIONAL AUTONOMY INTERACT WITH IDENTIFIED MANUFACTURERS ASSIGN APPLICATION DEVELOPMENT TASKS TO R&D ORGANIZATIONS PROVIDE THEM WITH INFRASTRUCTURE TO ATTAIN The report of the committee was accepted by the Prime Minister’s office. Immediately steps were initiated by the Department of Electronics (DOE) whose secretary was Mr. K P P Nambiar and additional secretary Dr. N Seshagiri. DOE proceeded to form a registered society under its control. The name suggested by the working group “Centre for Development of Advanced Computer ☛ ☛ ☛ GOAL IN TIME INTERCONNECT ALL CENTRES BY A COMPTUER NETWORK WITH CONFERENCING FACILITY • TIME LINE IN REPORT • BUDGET $7..25M + RS.935 LAKHS IMMEDIATELY TOTAL PROJECT COST $14.25 MILLION +RS.12.85 CRORES = 32 CRORES 14 SOFTWARE DEVELOPMENT CENTRES SPREAD THROUGH INDIA Technology” was changed to the “Centre for Development of Advanced Computing” by DOE. As the working group had suggested that closely working with a University would be beneficial, CDAC was established at the campus of the University of Pune in mid April 1988. n Time-Line – Development of Computing in India (1955-2010) This time line lists chronologically various developments which took place in computing in India. In developing this, I have used many sources including the books listed in the references. A complete list of references may be found in the monograph “History of Computing in India (1955-2010)” written by me on the invitation of IEEE Computer Society- History Committee whose URL is given in the References. Year 1955 Important Events • • HEC-2M arrives in India. 16 bit tube/drum machine designed by A D Booth at Birbek College, London, and ordered by ISI, Kolkata from the British Tabulating Machines. Beginning of the design of TIFRAC prototype at the TIFR, Mumbai (R.Narasimhan leads the team). 1956 • HEC-2M installed at the ISI and used to program statistical calculations in machine language. 1957 • Design of a full-fledged computer similar to ILLIAC begins at the TIFR (R.Narasimhan’s group). 1958 • URAL-1 a Russian machine installed at the ISI, Kolkata. Has assembly language. 1959 • • TIFRAC fabrication completed. IBM starts manufacturing key punch machines in India. 1960 • TIFRAC starts working. Assembler developed for TIFRAC. 1961 • • ISIJU Project to make transistorized computer begins at ISI and Jadavpur University. First IBM 1401 installed at the ESSO Standard Oil Co., Mumbai. 1962 • • TIFRAC dedicated to the nation by Jawaharlal Nehru the Prime Minister of India. IBM 1401 refurbishing starts at Mumbai. 1963 • • IBM 1620 installed at the IIT at Kanpur. First computer with FORTRAN in India. Education using FORTRAN begins. Bhabha committee set up to review electronics in India. 1964 • • • • IBM 1401 installed in ISI, Kolkata. A large number of intensive courses on computing given at IIT/Kanpur. CDC 160A-3600, a large mainframe computer, installed at the TIFR, Mumbai. First International Conference on Computing held at IIT/Kanpur. Organized by Harry Huskey with financial support from the Ford Foundation. At the end of the conference decision taken to start Computer Society of India. 1965 • • 30 IBM 1401s and 12 ICL 1901s installed in India. Computer Society of India registered in Hyderabad. CSI Communications | September 2014 | 13 1966 • • • • • Report of the Electronics Committee (Bhabha Committee) submitted (February). IBM 7044 installed at IIT/Kanpur. Rupee devalued from Rs.4.5 per USD to Rs.7.5 per USD. Windfall profit to IBM as rentals were quoted in dollars. ISIJU project complete. M.Tech program in computers in the Electrical Engineering Department started at IIT/Kanpur. 1967 • ECIL established at Hyderabad by the Department of Atomic Energy to commercialize electronic instruments designed at the Atomic Research Centre at Mumbai. Dept. of Statistics, Government of India, installs 10 Honeywell computers. • 1968 • • • TCS established in Mumbai by Tata Sons with an IBM 1401. IBM 1401 installed as I/O computer for the IBM 7044 at IIT/Kanpur. Narasimhan committee report suggests self-reliant production of small and medium computers within 10 years. Opines no need for foreign collaboration in design and development. 1969 • TDC 12 computer commissioned at the Bhabha Atomic Research Centre, Mumbai. A real-time data acquisition computer. Committee on Automation set up by the Ministry of Labour, Employment and Rehabilitation (called Dandekar Committee on Automation). HP Time sharing computers installed in IIM/Ahmedabad. • • 1970 • • • 1971 • • • • 1972 • • • 1973 • • • • • • 1974 • • • • • Department of Electronics (DoE) established by the Government of India with M G K Menon as its Secretary. Foreign companies asked to dilute equity. IBM declines. ICL agrees and collaborates with the Bharat Electronics Ltd. (BEL) to manufacture ICL 1901A – 48 computers manufactured. National conference on Electronics under the Chairmanship of Vikram Sarabhai held at Mumbai to elicit comments on the development of electronics and computers. Self-reliant development of computers in India proposed. Electronics Commission established by the Government of India in Delhi as policy making body for electronics and computers with M G K Menon as its Chairman. IBM 1401 withdrawn in the USA. 14 IBM 1401s installed by the Indian Railways for accounting, freight etc. TDC 12 marketed by ECIL. DEC 1077 installed at NCSDCT at TIFR with UNDP assistance. Groups in graphics, networks, databases, and compilers formed to do research in these areas. Panel on minicomputers constituted by the DoE to formulate a strategy for the development of small and medium computers by Indian companies. Separate Computer Science Programme starts at IIT/Kanpur. Masters and Phd degrees offered. First such programme in India. Report of the panel on minicomputers submitted. Opines that minicomputers can be made in India without any know-how being imported from abroad. No collaboration should be allowed. Demand for the period 1974-79 projected around 1400 minicomputers. Santacruz Electronic Export Promotion Zone (SEEPZ) established in Mumbai to promote export of electronic items and software. Foreign Exchange Regulation Act (FERA) passed. IBM asked to dilute equity again. Declines. Air Defence Ground Environment Systems (ADGES) design begins at TIFR. Plans to use ruggedized ECIL TDC 316 computers, display devices developed by Tata Electric Company, Radar from Electronics and Radar Development Establishment (LRDE) Bangalore with the user agency, namely, the Indian Air Force giving requirement specifications and test data. Entire system to be developed and fabricated with Indian engineers and Indian made subsystems. IIT/Madras installs IBM 370/155 with financial assistance from the Federal Republic of Germany. Fastest computer in south India. TDC 312 marketed by ECIL (uses imported ICs, local components locally made PCBs, and imported peripherals.) Regional Computer Centre (RCC) set up at Pune with an ICL mainframe. RCC to give low cost computer time to students and software exporters. ECIL imports IRIS 55 (from France), a 32 bit computer to expedite software development and reverse engineered to make TDC 332. Computer Imports for software export policy. TCS uses the scheme to import a Burroughs mainframe computer. Minicomputer policy not implemented – delayed due to indecision and foreign exchange problems. CSI Communications | September 2014 | 14 www.csi-india.org 1975 • • • • • • 1976 • • • • • Tata Burroughs established in SEEPZ. Burroughs B1728 and B6738 installed to export software. F C Kohli of TCS prime mover of the idea. DoE issues guidelines for import of computers costing more than Rs. 500,000. Foreign exchange difficulties. National Informatics Centre (NIC) established with UNDP assistance (USD 4.4 million). TDC 316 produced and sold. Engineers India installs Ryad 1040 from East Germany to export engineering design software to East European countries. Ryad 1030, 1020 computers from the USSR also installed for software export to the USSR (Rupee trade with the USSR eases import of machines). CMC established by the DoE. CMS formed by some IBM employees to maintain IBM 1401 computers. Report on the operation of IBM and ICL by the Public Accounts Committee of the Indian Parliament. Report criticizes companies. Patni Computers collaborates with Data General Computers for software development. DoE starts Appropriate Automation Promotion Program (AAPP), later renamed Industrial Electronics Promotion Programme (IEPP). 1977 • • • IBM announces intention of closing operations in India. Regional Computer Centre, Calcutta, established with Burroughs B-6738 computer. Minicomputer policy continues to be in limbo. 1978 • • • • • • IBM closes operations in June. CMC takes over maintenance of IBM computers. IDM, a company formed by ex-IBM employees takes over IBM’s data centres and card plant. Biswajit Nag takes over as Secretary DoE from M G K Menon. A S Rao retires from ECIL. Minicomputer Policy announced opening the field of computer manufacture to private industry, breaking public sector (ECIL) monopoly. IIT/Kanpur starts the first B.Tech programme in CSc at an IIT. • 1979 • • • • • • 1980 • • • • 1981 • • • • • • • 1982 • • Sondhi Committee on Electronics report suggests liberalization of import of large computers and allowing private sector to enter computer and peripheral manufacture. Bharat Electronics Ltd. (BEL – a public sector company specializing in defence electronics systems) decides to quit from computer and peripherals development. 4 companies, ORG, DCM, HCL, and IDM, start manufacturing minicomputers. Adopt UNIX as O.S. TCS opens Office in New York for software export. Patni Computers develops comprehensive Apparel Development Software Package for Data General Computers. Regional Computer Centre, Chandigarh established with DEC 2050 system. Rajaraman’s manpower committee report accepted by the Electronic Commission. A new programme called Master of Computer Applications to be started. Bachelor’s programme in CSc to be expanded. Software services export by a number of companies start primarily by sending software engineers to client sites (pejoratively called “body shopping”). Tata Research Design and Development Centre (TRDDC) of Tata Sons established (mostly with funding by TCS). TALLY, an accounting software product company established. Rajaraman committee report on import of computers for software export. P P Gupta takes over as DoE secretary from B Nag. Decision to use computers in the organization of the Asian Games. Rajiv Gandhi takes this decision. INFOSYS established. Wipro markets 8086 based minicomputer (Wipro 86 series). Reserve Bank of India computerizes clearing houses and ledger posting after agreement with the labour unions that not more than 10% of staff will be displaced. NIIT starts private computer training school. Asian Games held in New Delhi. Organizer Rajiv Gandhi decides to computerize games schedules, event records, result announcement etc. DCM computers used as terminals, networked with HP machines. Entire software developed locally by NIC engineers in 6 months. Seshagiri interacts with Rajiv Gandhi. Import of Colour television tubes allowed; colour television arrives in India to telecast Asian Games. CSI Communications | September 2014 | 15 • • • • NCST establishes VSAT network with 32 Kbps packet switching. MASTEK starts software company in Mumbai. Electronic voting machine using a microprocessor designed and developed in India used in a state election for the first time in the world. UNDP funding (USD 653,200) for Appropriate Automation Promotion Programme (AAAP) with centres at Delhi, Ahmedabad, Calcutta, and Trivandrum. Training in microprocessor use in automation. 1983 • • NCSDCT hived off from TIFR to form NCST. Bank Unions agree to limited computerization in public sector banks. 1984 • • • • • • • • • • • Indira Gandhi assassinated. Rajiv Gandhi becomes Prime Minister. Rajiv Gandhi is computer savvy. Rajiv Gandhi initiates liberalization of computer industry with Seshagiri of the DoE as his informal adviser. Trade unions observe 1984 as “anti computerization year”. Gateway Design automation starts software development work for export in Delhi Citibank sets up software development unit in SEEPZ, Mumbai. Inter-ministerial standing committee (IMSC) formed to regulate computer import and licensing industry. Railway passenger reservation project given to CMC by the Railways. Rangarajan Committee on bank computerization gives report. EDP cells in all banks recommended. SOFTEK first company to develop compilers for COBOL, BASIC, and FORTRAN for locally made computers CDOT set up to design electronic telephone exchanges by Indian engineers. CAD Centres at IISc/Bangalore, IIT/Kanpur, IIT/Bombay and Jadavpur University at Kolkata. UNDP grant USD 1.5 million plus Rs.340 million grant from the DoE. Computer Assisted Literacy And Study in Schools (CLASS) programme launched by the DoE to cover 250 schools all over India. Uses BBC Acorn microcomputers – 4 given per school. The UK government gives UK Pounds 1.3 Million for the project. Government of India approves setting up of a National Supercomputer Centre at the Indian Institute of Science at Bangalore with a grant of Rs.500 million. • • 1985 • • • • • • • • 1986 • • • • • • • 1987 • • • • • • Department of Telecommunication (DoT) established. Telephone services corporatized (earlier telephones were monopoly of a government department). Software export USD 30 million (CMC, TCS, and TBL main contributors). Texas Instruments facility at Bangalore established to export electronic CAD software using satellite communication with its Dallas Centre in the USA. ERNET project starts with UNDP assistance. Sampath committee on education – teacher training programme suggested. KBCS project funded by UNDP and the DoE. USD 5.2 million + Rs.140 million grant from the DoE. IIT,Madras, IISc, Bangalore, ISI, Kolkata, NCST, Mumbai, TIFR, Mumbai and IIT, Bombay participated. UNDP assisted Microprocessor Applications Engineering Program (USD 1.53 million) – 5 regional centres at Jabalpur, Bangalore, Ranchi, Pune and Delhi. VSNL (Videsh Sanchar Nigam Ltd.) set up for overseas communication. INDONET established by CMC. SNA network with IBM computers and leased lines from the DoT. New policy on computer software export, software development and training. Project to computerize reservation of tickets in the Indian Railways completed. Reservation office in New Delhi with 50 windows started. NIC acquires SX1000 mainframe computers from Japan for software development for government departments. NIIT starts franchising training centres. Rajaraman committee submits report to the Science Advisory Committee to the Prime Minister to establish a centre for developing high performance parallel computers. Sterling Computers sells PCs for Rs.29, 000. TI’s Satellite link to Dallas office starts the revolution of “off shore” software development. Foreign collaboration for branded workstations begins in earnest. Hinditron-DEC, HCL-HP, and PSI-Honeywell Bull established. NICNET established. Indian Banks’ Association agreement with Bank Unions on Computerization. Standardizes use of UNIX, Micro focus COBOL, and X .25 for networking. IBM PC clones in all banks. Software India Conference in the USA to promote software companies. CSI Communications | September 2014 | 16 www.csi-india.org 1988 • • • • • • National Association of Software and Service Companies (NASSCOM) established. NIC hived off from the DoE and placed in the Planning Commission. Excise duty exemption for software. RCC Calcutta machine replaced with CDC 180/840A mainframe. Cray XMP 14 installed in the Centre for Medium Range Weather Forecasting-number of conditions applies on usage. Centre for Development of Advanced Computers (CDAC) established in Pune to design and fabricate parallel computers with 1Gflop speed. 1989 • Indian Administrative Service officer takes over from technocrats as DoE secretary. DoE becomes a "non-scientific” department. S Rajamani IAS takes over from technocrat K P P Nambiar when he retires. VSNL sets up 64 Kbps link to the USA. NCST connects ERNET to Internet via UUNET. Electronics Commission abolished. Datamatics, a software services company, uses satellite link to the USA to export software. India’s software services export reaches USD 100 Million. • • • • • 1990 • • • • 1991 • N.Vittal, an Indian Administrative Service officer, takes over as the DoE Secretary. Software Technology Parks set up by the DoE with shared satellite communication links to promote software export. Companies established in STPs expected to export software each year equal to 4.5 times the salary paid to their employees. MNCs enter India for offshore software development. • India nearly defaults in repaying loan. Forced by the International Monetary Fund (IMF) to liberalize. Rupee devalued and floated. New industrial policy – Multi National Companies (MNCs) welcomed. Reduced tariff, simplified procedures, and devalued Rupee attract MNCs. NICNET used to disseminate results of general elections. Export of software USD 164 million. IIS is the first software services company to get ISO 9001 Quality Certification. Software “development centres” set up for individual Fortune 500 companies by TCS (Each centre secure). National Supercomputer Centre at the IISc, Bangalore starts functioning with a Cyber 992, 2 CDC4360, a VAX8810, 9 IBM6000/580s connected with a fibre optic net to work in parallel, 48 IBM RS6000/340, 24 Silicon graphics workstations, 25 Sun workstations, and a campus-wide fibre optics network. CDAC completes design of PARAM parallel computer with 1 Gflop speed. 1992 • • • VSNL introduces 64 kbps leased line services. Tata group and IBM form a 50:50 joint venture company. Software product Flexcube for banks developed by Rajesh Hukku of IFlex. 1993 • • • • EDI introduced by VSNL. Private software companies allowed dedicated satellite links with customers in the USA. Motorola India first company in the world to get CMM level 5 certification for software quality. Import of software packages allowed on regular duty. Duplicating copies allowed. Duplicates permitted to be sold in the local market and royalty less than 30% of the local price allowed to be paid to the owner of the package. INFOSYS becomes a publicly listed company Indian Satellite Development Centre at Bangalore installs a distributed computer system with 9 IBM RS6000/530s, 9 RS6000/220s and 33 RS6000/220s. • • • • • • • • • 1994 • • • • • • Government monopoly in telecommunication ends. Private companies allowed starting mobile communication services. American Express sets up Business Process Outsourcing Centre in Mumbai. 200 satellite links installed by software companies to facilitate offshore software development. Quality consciousness makes software companies obtain ISO/CMM certification. Oracle sets up development centre in Bangalore. Indian copyright act amended – stiffer penalties for infringement. CSI Communications | September 2014 | 17 1995 • • • • First commercial Internet service started by VSNL. 100% tax holiday for software export earnings. Private e-mail service introduced (non Internet). DoE launches programme to accredit private computer training institutes due to proliferation of below par training institutes (named DOEACC scheme). 1996 • • • • NASSCOM sets up Special Interest Group (SIG) to solve Y2K problem. Indian software companies advertised as Y2K solvers. Indian software companies improve systems while fixing Y2K bug at little extra cost as strategy to get customers. Rediff.com established – first e-commerce portal in India. Software export reaches USD 1 Billion. 1997 • • • • Digital Signal Processing chip “Ankur” designed by TI India centre at Bangalore. Compaq and IBM overtake sales of PCs by local manufacturers. 23% of INFOSYS revenue due to Y2K. GE Capital International Services starts back-office services centre. 1998 • • • • • • • • • Prime Minister of India declares “IT India’s Tomorrow”. IT task force set up by the government – comes up with 108 recommendations to promote IT among which is setting up of one Indian Institute of Information Technology in each state. 109 companies receive IS0 quality certification. WIPRO the second IT company in India to get CMM level 5 quality certificate. IIIT/Allahabad established. VSNL establishes connection to Global One’s 1400 points of presence worldwide. Microsoft Software Development Centre started at Hyderabad. Motorola Design Centre established in Delhi. IBM Research Centre set up in New Delhi. 1999 • • • • • INFOSYS listed in NASDAQ. IBM sets up fully owned subsidiary in India. Tata’s stake in TATA- IBM bought by IBM. 100% Foreign Direct Investment in IT allowed paving way for MNCs entry into India. 6 out of 12 SEI CMM level 5 companies in India. Nationwide linking of Railway Reservation System. 2000 • • • • • IT Act 2000 passed by Parliament to facilitate e-commerce. Software export reaches USD 5 billion. HP Global sets up BPO in Bangalore. 12 Software Technology Parks host 1196 software companies. Startup company Spectramind gets venture capital funding of Rs. 1 billion (USD 23 million) to set up back-office to process transactions of Internet portals worldwide. Private companies allowed setting up international gateways. • 2001 • • • • • • 2002 2003 • • Tata group takes over 51% of CMC Ltd. from the government. Tata group takes over VSNL. 10 companies obtain CMM level 5 certificates. 14 companies obtain CMM level 4 certificates. Dell sets up R&D centre. Simputer, a hand-held multilingual computer, designed by a group of IISc and Encore Software Ltd. engineers at Bangalore. Attracts worldwide attention. Accenture starts centre in Mumbai. • Agrawal-Kayal-Saxena algorithm:”Primes in P” attracts worldwide attention. National Institute for Smart Governance set up in Hyderabad (joint initiative of NASSCOM, Government of India and Government of Andhra Pradesh). Internet based booking of tickets on the Indian Railways. • • • • • Bharati Airtel (largest mobile telephone provider in India) outsources all IT work to IBM India. CDAC’s PARAM PADMA ranks 171 in top 500 high performance computers. High performance DSP chip designed at TI India at Bangalore. Software Technology Parks India (STPI) centres across India reach 44. Yahoo sets up R and D Centre at Bangalore (first outside the USA). CSI Communications | September 2014 | 18 www.csi-india.org 2004 • • • • • • • • • • National E-Governance plan announced. General Elections held using only Electronic Voting Machines (1,075,000 EVMs deployed all over India). TCS, INFOSYS and WIPRO all cross USD 1 Billion revenue. TCS becomes a publicly listed company. Government of India announces Broadband Policy; fibre to home, DSL, cable to home etc. Targets 40 million Internet users and 40 million broadband users by 2010. Google sets up first R&D Centre outside the USA in Bangalore. IBM acquires Daksh, the largest Indian BPO company. Number of employees in IT industry reaches 1 million. State Wide Area Network for each state to be set up with minimum bandwidth of 2Mbps. Mobilis, a low cost mobile tablet computer designed by Encore Software Ltd., Bangalore, attracts wide attention. 2005 • • Oracle acquires IFlex an Indian Banking software product company. Special Economic Zone (SEZ) Act passed. SEZ defined as “specifically demarked duty-free enclave deemed to be foreign territory (out of customs jurisdiction) for trade, duties and tariffs”. 2006 • • • • CISCO establishes Globalization Centre East in Bangalore. IBM announces plans to invest USD 5 billion in India. SAP (German ERP major) announces USD 1 billion investment in India over next 5 years. India’s software and services export revenue reaches USD 10 billion. 2007 • • 257 IT companies set up in SEZ. Special incentive package announced by the Department of Information Technology to encourage investments in semi-conductor fabrication industry. EKA supercomputer fourth fastest in the world and fastest in Asia built by the Computational Research Laboratory of the Tata group. • 2008 • • • • • TI (India) designs single-chip solution for ultra-low-cost mobile handset. Accenture opens Technology lab in Bangalore (Fourth in the world after the USA and France). 2G spectrum allocation on first come first served basis. IT (amendment) Act passed by Parliament to strengthen IT Act 2000. National Knowledge Network project started by the Government of India. 2009 • • IBM has second largest workforce in India after the USA. Will invest USD 100 million for global mobile services research in India. SAP’s third co-innovation lab in Bangalore (other labs in Palo Alto and Tokyo). • • • • • • • IT exports including software, services and BPO reaches USD 50 billion. IT domestic revenue USD 24 billion. 55% of the global outsourcing market sourced from India. Indian IT companies present in 52 countries and have 400 of the Fortune 500 companies as clients. Direct employment 2.4 million in IT and 8.2 million in support services. 6.5% of GDP earned by IT industry. Rs.600 billion allocated over a 10 year period for the National Knowledge Network. 2010 References [1] This material is taken from History of Computing in India (1955-2010) by V.Rajaraman published in the World Wide Web. See: (URL:www.cbi. umn.edu/hostedpublications/pdf/ Rajaraman_Histcomputingindia.pdf) [2] Dinesh Sharma, “The Long Revolution – the Birth and Growth of India’s IT Industry”, Harper-Collins India, New Delhi, 2009 [3] C R Subramanian, “India and the Computer – A Study of Planned Development”, Oxford University Press, New Delhi, 1992. [4] R.K.Shyamasundar and M A Pai, “Homi Bhabha and the Computer Revolution”, Oxford University Press, New Delhi, 2011. Acknowledgment I thank the following persons (in alphabetical order) who read the monograph from which this material is taken and gave many constructive suggestions: S Bhatnagar, P C P Bhatt, H K Kesavan, R Krishnamurthy, F C Kohli, H N Mahabala, S K Nandy, N R Narayana Murthy, Anand Parthasarathy, T Radhakrishnan, N Ramani, S Ramani, P V S Rao, Andy Russell, Veer Sagar, N Seshagiri, Dinesh Sharma, Lalit Shawney, Om Vikas, David Walden, and Jeff Yost. n CSI Communications | September 2014 | 19 Cover Story Radharaman Mishra Senior Technical Architect, Research & Innovation Tech CoE Group, IGATE History of the Computers, GUI and Devices Introduction History never looks like history when you are living through it- John W. Gardner History, by definition is associated with the past, and we need a gap of time between us and what we call the history, to have a “historical perspective” towards it. History is also about changes, changes that mattered, and influenced the future one way or the other. History, of the computing is very interesting in many ways. It has shaped the present of humanity and will definitely shape its future in significant ways. Although we hardly have a distance of 60 years with the birth of the modern computing, the astounding pace of changes therein has created a great history within this short timeframe. In computing, history has created a history for itself. Nicholas Negroponte said, “Computing is not about computers any more. It is about living.” In the early days of the computing it was not so, since they were considered (and for good reasons) highly sophisticated machines that only trained professionals could work with for high tech or scientific (or military) purposes. It required many historic developments before we had a computer in every home and a computer that will do everything, from complex mathematics to buying groceries and sending mails to playing songs or video. Computers have evolved to become a significant part of our lives. Two things apart from the power of the computing technology itself that contributed to their acceptance in everyday lives are the intuitive user interface (often referred as Graphical User Interface or GUI) and the devices attached to the computer that lets users interact with it. Each of these has their own story to tell. In this article we will hear the story of the computers, the GUI and some of these devices that enable us to use the computers. The story is not only fascinating but also some of us have lived through it. Brief History and Timeline of the Computers Computers or no computers, we were always in dire need of making calculations (remember we came out of the cave and have to pay the tax!). People have used marking the wall to making knots in the rope for doing the counting. Abacus was in use until recently. Interestingly the digital calculators that we use now days are a new development and share a common historical period with modern computers. Here is a snapshot of the devices that became popular with the different generations of the computers. • The First Generation (1950s): Punch card and magnetic tapes for inputs, supervisory typewriter for control • The Second Generation (early 1960s): Punched cards for input, printers, tape storage, and disk storage • The Third Generation (mid-1960s to mid-1970s): Minicomputers (smaller), simple monitors, keyboard • The Fourth Generation (1975 to the present): GUI, mouse, color monitors, touch screens, gesture and voice recognition It has been long since people were counting on their thumbs and making complex calculations on their abacus. It was inefficient and boring. The giant machines developed until 60s were just big calculators. Apart from being oversized and overfed (they consumed terrible amount of electricity and had frequent breakdowns) they couldn’t play videos and send emails. They needed someone to do something about it. Two young entrepreneurs, Steve Jobs and Steve Wozniak, who were looking for more interesting things than the schools (seems schools were not popular even in the historical period) thought of this problem. They left the school, sold their Volkswagen and calculator (to raise a fund) and established a company that later became famous as Apple Computer, Inc. The company launched its first product, the Apple I in the year 1976 and discontinued it next year. It was assembled by hand and encased in a wooden box. Now these machines are collectors’ items. They learnt from this experience and released another version Apple II in the same year. Apple II was a huge success and soon it became the most selling personal computer and established Apple as a successful commercial company. In 1980, IBM understanding the potential of the rapidly increasing personal computers market asked Microsoft CSI Communications | September 2014 | 20 Corporation to develop a new operating system for the microcomputers. What Microsoft came up with was named MSDOS, a command line interface for the microcomputers. And thus the race was already picking up. Graphics that Changed the Graph of Computers Xerox Corporation’s Palo Alto Research Center (PARC), was established in 1970 as a division of Xerox Corporation. It has a legacy of gifting the world of computing and information systems with their innovations. The scientists at PARC were working on a project that allowed computer users running programs in their own sizeable windows. A window that was capable of holding symbols for the programs (called icons) and documents that were clickable. They also developed the concept of showing the documents that looked like as they would appear when printed (we say it print preview now) and also a printer to actually print the documents. They called it a WIMP system (Windows, Icons, Menus, and a Pointing device), and later the concept became famous as the Graphical User Interface (GUI). Like a really adventurous movie script the pieces of the stories were moving fast. While the scientists at PARC were working hard on their program, Steve Jobs managed to get permission to have a look at what they were doing. He wasted no time in realizing what their work meant for the personal computers and started working on a totally new line of minicomputers that were leveraging all the features of the GUI. Apple released first version of the Macintosh in 1984 having all the GUI features and instantly became hit. Later on Microsoft launched its own line of operating systems, Microsoft Windows, which implemented the concepts of GUI, which is now the most widely used operating system for the personal computers worldwide. The concept of GUI has contributed the most in bringing the computers out of the lab and making it a household item. It allowed the innovators to think and develop applications that could be used by non-technical users (word processors, spreadsheets, drawing www.csi-india.org programs and games etc.). It made the learning computers so intuitive and fun that eventually computers turned to be the most effective tools for self-learning. A Mouse for Every Computer Interestingly historically mouse has its roots in devices that were being developed for military purposes as part of a plotting device that could show the trajectory of the aircraft. Even more interestingly in early days researchers have tried to build tracking devices that could have been tied to your hand or even mounted on your head. The first mouse of the kind we know was invented by Douglas Engelbart in 1964, it has two metal wheels packed into a wooden shell along with a circuit board. Most of us might not have a chance to work with it. What many of us might have seen was developed 8 years later in 1972 by Bill English and had a ball that could rotate in any direction and was known as “Ball Mouse”. The kind of optical mouse we use now days has evolved from many of predecessors that needed a specific surface (with specific marks to detect the movements) to work with. It was not until 1999, when Microsoft introduced optical mouse that was based on the technology developed by Hewlett-Packard. And now we have an assortment of mouse kinds: laser mouse (optical mouse that usages laser light for better precision), ergonomic mouse (especially designed for the hand comfort), tactile mouse (that provides hepatic feedback on movements), inertial and gyroscopic mouse (that can be made to work in the air). Apart from that there are mouse designed for games having customized controls to suit the game. As an alternative we also had something called the touchpad that allows controlling the computer functions (cursor movements, and selections etc.) through finger movements on a designated surface. Apart from a change in the internal workings of the mouse it has also evolved in functions it provides. Most the mouse today has 2 to 3 buttons and a wheel. It has also evolved the way it is connected to the computer. Nowadays, we use the mouse that is often connected to a USB port either through a wire of through a wireless connection whereas earlier they used to get connected with serial ports. This apparently simple down to earth small device simplified and improved the efficiently of the tasks like drawings, selections and clicks, scrolling and so on. It also made possible to develop applications that were aware exactly where the user was pointing. Users were able to do lot many things by simple hand and finger movements in a faster and efficient way using it. Where is My Monitor? Reading what the computer has to say was not as neat as reading this article in early days of computers. Early computers used to communicate using punched cards. There was a typewriter like machine to punch holes patterns into the paper cards. They were fed to the computer that punched the results onto similar empty cards. The result was fed into another machine (often called tabulators) that read the punches and printed the results in human readable format on paper. Some other computers used long rolls of papers instead of cards. CRTs (Cathode Ray Tubes) that were used as memory in the computers gradually were used for creating very primitive displays. Eventually CRT based display evolved to show character based outputs on the screen. All this was not working well and finally Lee Felsenstein, and Steve Wozniak (yes, Wozniak again!) got on the idea of using the CCTV monitor for using the computer display. And successfully did it in the year 1976. As the computer market grew gradually computer manufacturers started building monitors with higher resolutions, both monochrome and color versions. Innovators and the manufacturers were always looking for the improvisations and concepts of plasma and LCD based displays were evolving behind the scene. But these technologies were too expensive then. The problem with these monitors was that they were built on different standards and there were a lot of them in the market. It was not until 1987 when IBM introduced the VGA video standard that became the standard for most of the computer monitors built. Apple Macintosh II that was released in the same year started supporting color videos. Meanwhile, the LCD technology was being perfected and it was in late 1990s that manufacturers started offering LCD based monitors as they were less bulky and consumed lesser electricity. As computing technology evolved into different other areas like manufacturing, point of sales, handheld devices, gaming consoles etc. where the users have to repetitively make same or similar inputs for longer periods, researchers were looking for smart ways to input using the hand directly to the screen. Research work from academics to industries evolved and multiple approaches were developed to make this happen. Interestingly, the touch screens were widely used in the POS machines before they were adapted for the phones. The first touchscreen phone (IBM Simon) was released in 1993. The popularity of smart phones has made the touch screens very popular. Advent of the tablets and “phablets” is only adding to the ever rising usages and popularity of the touch screens. The technology is quite mature now for the touch screens and recently both the software and hardware vendors have launched the computers products that are touch enabled. Microsoft Windows 8 series of operating system has been specifically designed for touch enabled devices including computers, laptops and hand held devices. Due to the technological innovations in the area of display it is now possible to build larger still lighter screens that can display lot many things and also high resolution video contents. Touch enabled screens have opened the possibilities that have just begun to get explored. Since, users can use their fingers (or a stylus) for making direct inputs there is no need of a mouse. The screen itself can open up as a virtual keyboard and that removes the need of a physical keyboard. Taking it even further it opens the door for the technologies that allow recognizing your handwriting to become commonplace and that will change how the applications are built and used in significant ways. A Peek into the Future We have seen how dramatically computers have changed themselves from a big giant number crunching machines to little device that can fit into any hand and can do amazing things. This change both necessitated and has been fueled by the research in the areas of technologies that allow better human computer interactions. Ok, so we have thin monitors with crystal clear display, cordless USB based fancy mouse, ergonomic keyboards and ultra slim laptops. Where do we go from here now? We human beings spend more and more of our time with computers and depend more and more upon it for CSI Communications | September 2014 | 21 About the Author carrying out our day to day activities. Researchers have started realizing that computers are becoming a natural part of our lives. And that demands a shift in the ways we interact with it. Advancements in the technologies like touch, sensors, gesture and voice recognition, virtual reality etc. is paving way for a new era for the computing or rather the human computer interaction. Current gesture recognition technologies work in tandem with advanced cameras having sensors and a possible device in the hand. But as the technology advances further the cameras with sensors that don’t need any devices to be worn on the hand are getting popular. Gesture and voice recognition will change the way we talk to the computer. Similarly developments in the field of 3D and holographic display will revolutionize the way we look at things. These technologies taken together are all set to take the text and GUI based interface to next level. It holds potential of not only making many of the hardware components redundant but also revolutionizes the way we interact with the computers. For example, it will allow users to interact from a distance with UI without being in touch with the computer, and so even more than one people can work together on a big surface. Technologies that can project the display output to any surface and holographic display etc. combined together with gesture recognition will remove the requirement of a fixed sized monitor component and any surface of any size could potentially become a monitor. Latest researches in the area of Biochips and Artificial Intelligence (AI) are the promises for the future of the computing. Computers developed in near future will be super speed biochip equipped, project 3D holographic display, understand our gestures and voice with precision, would be brain controlled and who knows may be will understand human emotions as well. Working with the computers will be more direct, like working with a human being (and so with little of the additional devices). We are really witnessing the history as it is taking place just in front of our eyes. References [1] [2] [3] [4] [5] [6] History of Computers and the Internet http://vig.prenhall.com/ samplechapter/0130898155.pdf History of the Computer Mouse http://www.computinghistory.org.uk/ det/613/the-history-of-the-computermouse/ Future of the Mouse and Keyboard http://www.pcadvisor.co.uk/features/pcperipheral/3424183/whats-future-forkeyboard-mouse/ History of Computer Display http://www.pcworld.com/ article/209224/historic_monitors_ slideshow.html GUI Timeline http://toastytech.com/guis/guitimeline. html Various References http://en.wikipedia.org n Radharaman Mishra is a Senior Technical Architect with the Research & Innovation Tech CoE Group of IGATE. With over 14 years of experience in the IT services industry, he has worked on software application architecture and design, development, architecture assessment and consulting. His expertise includes .Net, ASP.Net and Microsoft SQL Server. He has been working with IGATE’s Fortune 500 customers on various Microsoft-specific enterprise application architectures and design. He has also published papers of technical interests in various external and internal forums. CSI Communications | September 2014 | 22 www.csi-india.org Cover Story Hardik A Gohel Assistant Professor, Faculty of Computer Applications (FCA), Marwadi Education Foundation Group of Institutions Looking Back at the Evolution of the Internet Introduction World Wide Web, mostly known by its abbreviation WWW and universally known as Web, has plaiting solution variety for various problems and for gathering global audience information requirements. Web is an interlinked hypertext document system via internet, also defined as network of networks, for multimedia access. Since 1989, Web is the highest data ordnance in existing world and providing main force for large scale of Information Communication Technology & Networking (ICTN). It is a very tough job to analyse large content, usage patterns or hidden content structures. Further crucial job is to generate knowledge from it. World Wide Web was invented by Tim Berners-Lee then and after 20 years first connection was established known as Internet. Many scientists with Tim at CERN, Switzerland participated in experiments of exchanging data and results which were otherwise difficult for them and that helped Tim understand the unrealized impending demand of millions of interconnections of computers through internet. At present, Tim is director of World Wide Web Consortium, abbreviated W3C and working to add semantics in existing web. History of Web Tim-Berners-Lee built ENQUIRE, during 1980, as a personal database of people in which hypertext and software utilities for accessing database was key stream. The main objective was global sharing of data without presentation software as well as common machine. First development by him was NeXT Workstation. Then after first web server and page with support of HTTP and web browser named World Wide Web was a project by itself. Rather than NeXT it was modified further to be used on other machine. On 6th August 1991 there was a short summery posted by BernersLee on the project of WorldWideWeb on alt.hypertext newsgroup. The project intended to allow all links to be accessed from anywhere with any information, and for that they invited energy physicists with Fig. 1 : First website other experts to share data, information, documentation and news. Fig. 1 shows snapshot of CERN website, the first website created in November 1992 which was publicly announced in August 1991. There was still no browser with graphical UI existing for NeXT. This gap was filled with Erwise, an application developed by Helsinki University of Technology, Finland and ViolaWWW by Pei-Yuan Wei in 1992 with ads on feature of scripting, graphics as well as animation. There was rising interest in the development of web browser after incorporation of graphical, scripting as well as animation concept in web browser. Netscape Navigator was based on the Mosaic web browser which was first graphical web browser. Then W3C (World Wide Web Consortium) was founded by MIT (Massachusetts Institute of Technology) in 1994 with support of DARPA (Defence Advance Research Project Agency) as well as European Fig. 2 : First Web Browser - MOSAIC browser V.1 released in April 1993 CSI Communications | September 2014 | 23 Table 1 : The Evolution of the web Year 1991 1992 1994 1995 1996 1997 1998 1999 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 Growth of web in Browsers & Technologies HTTP (Hyper Text Transfer Protocol) HTML 1 (Hyper Text Mark-up Language – Version 1) & MOSAIC – The first web browser Netscape with HTML 2 Opera & Internet Explorer (IE)with concept of Cookies & SSL JAVA with JavaScript as an HTML 3 Flash & XML and HTML 3.2 HTML 4 with CSS2 AJAX SVG Safari Browser Firefox Browser Canvas, Initial version of Opera Mini XMLHTTPRequest2 First Iphone released with Safari Browser Chrome Browser with HTML 5 and Request Protocol Handler as well as Offline web Apps : AppCache CSS3 with 2D & 3D Transforms and Animation, Geolocation Date & Time Input types, Audio-Video elements, CSS3 Flexbox and Index DB and First Firefox Browser for Mobile Touch events, Chrome OS v1, Web RTC, File System API, WEB GL(Inbuilt Graphics support) Chrome for Android Beta released, Content security policy, Full Screen API, CSS3 Filters, Web Audio API, Commission. At the end of 1994 web was made freely available by Berners-Lee without claiming patent and royalty due which has motivated people to publish information online and instantly for worldwide consumption. At present, web has opened doors for direct web based commerce. The utilities like search engine and emails reached to common man. Social networking includes facebook, blogs, tweeter, LinkedIn and other popular web-based applications are examples of web evolution. There are some typical areas of web utilization that include online learning and tutorials, E-Governance, E-Commerce, services and manufacturing as well as research and development. The table 1 shows evolution of web in the terms of technology as well as browsers. Now let us refer WWW in the terms of invention includes social networking, tweets, blogs, wikis and videos. Video Web Evolution Shareyourworld was the first website for sharing video in 1997. There were many plagued problems because of not having advanced internet technologies and shareyourworld is no longer available since 2001 due to bandwidth as well as financial problems of the company. It was started by Chase Norlin who is head now at audio/video search company pixsy. Chase takes us down memory lane, during the last internet boom when he launched shareyourworld whose time was not quite right. In the interview with Andy Plesser (2007), Chase talks about challenges in bandwidth. He wonders about success of YouTube which picked up but this was not possible for him in 2001. Video sharing sites were not accepted until YouTube. YouTube changed video sharing forever. On 14th February 2005 YouTube was launched by 3 former PayPal employees Chad Hurley, Steve Chen, and Jawed Karim. “Me at the Zoo, in Fig. 3, was the first video of YouTube which was uploaded at 8:27 pm on Saturday 23rd April 2005. The video was having very poor quality and it was shot by Yakov Lapitsky at San Diego Zoo on elephants. The duration of video is 18 seconds.“ Presently, high definition (HD) video with high quality of resolution is available and streaming of video also uses intelligent web aspects. Additionally, there are web applications which generate professionally produced videos automatically by using patent-pending cinematic Artificial Intelligence technology as well as high-end motion design. Web Based Electronic Mail Evolution Email is as old as ARPANet or Internet. It was not invented but has evolved from simple to highly digital form. After the foundation of WWW, two companies - one is Hotmail and another is Yahoo - made CSI Communications | September 2014 | 24 emails available with friendly web interface. Hotmail was the first email service of email founded by Sabeer Bhatia and Jack Smith. The limitation for storage was 2MB only. In December 1997 more than 8.5 million subscribers were there with Hotmail. Hotmail previously ran on Solaris for mail services and Apache on FreeBSD for web services. After 1997 Hotmail is now known as MSN Hotmail due to its tie-up with Microsoft Corporation. Rocketmail, Now Yahoo Mail, was founded by Yahoo in March 2002 which was paid mail service with charge of $29. Yahoo Mail was having new design with additional features. Later Hotmail included dropdown menus in DHTML Fig. 3 : First video of YouTube www.csi-india.org and different categories of tabs with new user customization in colour schemes. In November 2002 Yahoo launched Yahoo Mail Plus which was also a paid service provifing high storage capacity and other additional features like attachments and multiple domain sending, filtering of addresses and its storage. Google mail, abbreviated with Gmail, is a free email service run with the support of advertisements as well as Email clients. It has been founded in 2004 by Paul Buchheit who explored the idea of web based mail in 1990. Google started its work on Gmail in August 2001. Yahoo and Hotmail, who were ruling the market at that time, were using HTML which requires reloading entire webpage to provide different services. In Gmail it is given feature of HTML with supported JavaScript which is known as AJAX. Furthermore “Google mail is having high storage capacity, which is now available in Yahoo and Hotmail too, but Gmail is providing advanced search capabilities”. Email evolution continues till date. Today’s research direction says that email service should improve in terms of knowledge mining to provide workflow enhancement. It also includes machine learning filter, smart screen and spam trigger for more security. Social Media Evolution Social networking sites are web based service that helps to construct public or semi-public profile within bounded system. The first site of social networking was SixDegrees. com created in 1997 which allows students to create profiles and list their friends. The purposes of these sites were to provide online dating of different profiles with each other. Classmate.com allowed people to affiliate with their high school and college buddies with surfing facility of other list. In 2000 the service of SixDegrees.com was closed. During the period from 1997 to 2001 there were many community tools available with support of combination of profiles and publicly articulated friends. AsianAvenue, BlackPlanet and MiGente allowed users to create professional as well as personal profile for dating. In January 2004, Orkut, social networking website was launched by Google Inc, and was made available worldwide in September 2004. The service was designed to help users to maintain existing relationships as well as to create new relations. The creator of Orkut is one of the employees of Google named Orkut Büyükkökten. It was the most popular website in Brazil and India Google+ service was invented by with 48.0% and 39.2% users respectively. Google with Invitation only feature in The numbers of users in US were only 2011. The purpose of invention was to 2.2%. Users of Orkut can add videos in give an invitation to increase number of their profiles form YouTube and Google users for Google circle which was the old Videos. The supplementary option is name of Google+. But because of having creating restricted or unrestricted polls limitations to send number of requests, for polling community of users. There is Google has now launched Google+ for the one integrated option with GTalk enabling users having age of 18 years and above chatting and file sharing with like button. without having any kind of invitation. On June 2014 Google announced closure Wiki Evolution with Wikipedia of Orkut by upcoming September. Service that enables to add information to a Facebook is a synonym of social centralized place in attractive manner from networking presently. It was founded by different locations by multiple users with Mark Zuckerberg in October 2003 with collaborative web platform is known as the name of Facemash. Previously it was Wiki. In this, user doesn’t require any kind for Harvard University only. Later on it was of training. This concept was introduced by expanded to other colleges in Boston area Ward Cunningham in 1995 as “The Simplest and then afterwards it was made available online database that could possibly work”. worldwide. In February 2004 Facebook He has given the name “WikiWikiWeb”. service was been launched by Facebook This is also known as writable web as well Company. It was based on “HOT or NOT” as open editing concept. game for Harvard students which allowed Jimmy Wales and Larry Sanger, visitors to compare two pictures side by American entrepreneurs and founders of side and let them choose who is HOT and Wikipedia, launched Wikipedia in January who is NOT. At present, Facebook with 2001. Previously in 1993 Rick Gates gave 792,999,000 visitors is a leading social the concept of online encyclopedia but networking website because of its unique actual free encyclopedia was proposed features that include News Feed, Friend by Richard Stallman, president of free and Unfriend capabilities, Wall, Timeline, software foundation, in the year 2000. The Like, Messages and inbox Notifications etc. project named as Wikipedia, previously It also supports applications such as Event, Nupedia which was not a Wiki, with Marketplace, Notes, Places, Platforms, domain Wikipedia.com was started on Photos, Videos and Facebook Paper. Some January 2001. Server located at San Diego of the group functionalities are like listen was donated by Bomis. Bomis was dot with friends, Facebook live, Mood faces, com company that supported free online Poke, URL shorter etc. From March 2011 content. Many former employees of Bomis. onwards Facebook started supporting 70+ com contributed content to encyclopedia. languages to prop up global audience. In February 2001, totally 1000 articles were There are other sites of social media received by the project. It reached up to such as Twitter, LinkedIn, Google+, 10,000 in September and 20,000 within a MySpace which are very popular. Small year. Then afterwards, there was a ratio of messages, known as Tweet, become 1500 articles per month and in August 2002 popular by social networking site Twitter number reached to 40,000. Presently in Inc., at San Francisco. It was created “English Wikipedia total number of articles by Jack Dorsey in 2006. Jack Dorsey is is 4,583,831 with 33,571,242 pages and very reputed businessman in USA, and 835,702 files. There are total 731,253,050 an American software architect as well. edits since the beginning and number of Twitter.com site offers to post messages users is 22,202,218. In Wikipedia there online up to 140 characters long. are 1,401 administrators who are handling LinkedIn is another popular social Wikipedia’s 129,524 active users”. networking website Table 2 : Service stacked up against Competitors (in 2011) founded in December 2002 and launched in May 2003. This site is Sr.No Worldwide Unique Visitors (in 000) available in 20 different 1 Facebook 792,999 languages and is having 2 Twitter 167,903 259 million users across 3 LinkedIn 94,823 the world. Jeff Weiner is Google+ 66,756 the CEO of LinkedIn who 4 5 MySpace 61,037 was previously working 6 Others 255,539 with Yahoo. CSI Communications | September 2014 | 25 Study of Web Generation Web 1.0 In 1990s the first generation of web has introduced with Netscape browser. As we have discussed in introduction section the purpose of this web was free information sharing online. This web was very unattractive with slow turnaround, low quality of pictures, unreliable web hosting as well as email, terrible customer services, not or very little search engine optimization. Web 2.0 Second generation of web was beyond static web pages as well as web design. It allowed users to interact and collaborate with one another. The concept of Web 2.0 was initiated in late 2004. Although it suggests new version of World Wide Web, it not only includes technical specification but also cumulative changes to the web. Web 2.0 includes social networking sites, blogs, wikis, video sharing, folksonomies, hosted services and web applications. Web 2.0 allows users to do much more than mere retrieving of information. Instead of only reading information users can publish comments and their views in articles. They can create profiles with login and password. There are browsers with user friendly interfaces, application software and file storage facilities. Therefore, web 2.0 is also called network as platform computing. Client side web, known as web browser, in Web 2.0 used Ajax and JavaScript framework for continued integration of users with web pages. Server side web in Web 2.0 includes same languages of web programming or designing but, with attractive data format. In Web 2.0 it is possible to share data among multiple sites. About the Author Web 3.0 (Semantic Web) Web 3.0 is also known as semantic web and it is a mutual movement of W3C (World Wide Web Consortium) international standard. Semantic web is an attempt to enhance current web so that computers can process the information existing on WWW, understand and fix it, help humans to discover required knowledge. It is proposed to form a huge distributed knowledge based system to share data instead of documents. In other words, we can say that semantic web is a common framework which allows data to be shared and reused across applications, enterprises and community boundaries. The aspect of semantic network was thought about by cognitive scientist Allan M. Collins, linguist M. Ross Quaillin and psychologist Elizabeth F. Loftus in 1960 in many publications to represent semantically structured knowledge. Tim Berners-Lee coined the term semantic web to extend the network of hyperlinked human readable content (web pages) by inserting machine readable content (metadata) about pages and their interaction by enabling agents to access the web more intelligently as well as perform tasks on behalf of users. “A Web of data that can be processed directly and indirectly by machines is semantic web” – Tim Berners-Lee Future of Web (Web Intelligence / Web Wisdom) Presently, Millions of developers are creating and using web in their desktop, tablets, phones, televisions, automobiles, digital billboards, watches and everywhere. According to Tim Berners Lee, very soon millions of sensors, appliances and other devices will take web to new places. He has mentioned that future of web is under threat from governments who are likely to misuse their power, from businesses who try to destabilize open market and from criminal activity. The future of web depends on normal people talking with responsibility for tremendous resource and on challenging those who seek to manipulate web against the public good. Tim has also mentioned that the improvement of the infrastructure to provide additional functional, robust, efficient and available service web will play very pivotal role. Furthermore, future web, apart from being a space browseable by humans, will contain rich data in a form understandable by machines, thus allowing machines to take a stronger part in analyzing the web, and solving problems for us. References [1] [2] [3] Tim Berners-Lee on “Past, Present and Future of Web” at http://www.w3.org/People/BernersLee/1996/ppf.html (Accessed on 17th August 2014). History Of Web (2014), Available at: http:// webfoundation.org/about/vision/history-ofthe-web/ (Accessed: 25th July 2014). Tim Berners-Lee (2013) Frequently asked questions, Available at: http://www.w3.org/ [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] [17] [18] [19] [20] People/Berners-Lee/FAQ.html#Influences (Accessed: 25th July 2014). Tim Berners-Lee: WorldWideWeb, the first Web client, Available at http://www.w3.org/People/ Berners-Lee/WorldWideWeb.html (Accessed: 30th July 2014). Berners-Lee, Tim (1991) On “Qualifiers on Hypertext links... - alt.hypertext”. Accessed on 11th July 2012 by Wikipedia. Browse the first website using the line-mode browser simulator, Available at http://linemode.cern.ch/www/hyper text /WWW/ TheProject.html (Accessed on 30th July 2014). Evolution of the web, browsers & Technologies, Available at http://www.evolutionofthe web. com/#/evolution/day (Accessed on 1st August 2014). Sajja P S, Akerkar R (2012) Intelligent Technologies for Web Applications, 1 edn., USA: CRC. Invention of YouTube and the First Video sharing site Ever.(2013) http://www.chess.com/ groups/forumview/invention-of-youtube-andthe-first-video-sharing-site-ever (Accessed on 12th August 2014). Andy Plesser (2007) First Video Sharing Site Paved the Way for YouTube — ShareYourWorld. com Was There First to Launch Ten Years Back http://www.beet.tv/2007/07/first-video-sha. html (Accessed on 12th August 2014). Hartley, Matt (2010). “Ten of YouTube’s most influential videos”. Canwest Global Communication, Toronto, Ontario, Canada. In Portuguese (2014) “Adeus ao Orkut” by Google on June 30, 2014. (Accessed on 13th August 2014). Paulo Golgher (2014), Tchau Orkut, available at http://en.blog.orkut.com (Accessed on 13th August 2014). Matheus Thomaz (2014), History of Orkut, at http://socialnetworks-tsi.blogspot.in/2011/06/ history-of-orkut.html (Accessed on 14th August 2014). Eric Eldon (2001), “ComScore: Google+ Grows Worldwide Users from 65 Million In October To 67 Million In November” at http://techcrunch. com/2011/12/22/googlesplus (Accessed on 14th August 2014). Danah M Boyd, Nicol Ellison (2010) “Social Network Site: Definition, History and Scholarship” at http://www.danah.org/papers/JCMCIntro.pdf (Accessed on 14th August 2014) “The Inventor of Email” at http://www. inventorofemail.com/history_of_email.asp (Accessed on 14th August 2014). Ian Peter (2004) “The History of Email” at http://www.nethistory.info/History%20of%20 the%20Internet/email.html (Accessed on 14th August 2014). “The Brief History of Social Media” at http:// www2.uncp.edu/home/acurtis/NewMedia/ S o c i a l M e d i a / S o c i a l M e d i a H i s t o r y. h t m l (Accessed on 14th August 2014). Mahesh Mohan (2013) “Gmail vs. Outlook.com vs. Yahoo! Mail: An Ultimate Comparison” at http://www.minterest.org/gmail-vs-hotmailoutlook-vs-yahoo-mail (Accessed on 14th August 2014). n Hardik A Gohel An academician and researcher, is active member as well as secretary of Computer Society of India Rajkot Chapter. He is also devoted Assistant Professor of Faculty of Computer Applications (FCA) at Marwadi Education Foundation Group of Institutions. His research spans Intelligent Web Technology, Applications and Services. He also focuses on “How to make popular, Artificial Intelligence in study of Computer Science for various reasons”. He has 22 publications in various impactful Journals and proceedings of national and international conferences. CSI Communications | September 2014 | 26 www.csi-india.org Cover Story Mr. K. V. N. Rajesh* and Mr. K. V. N. Ramesh** *Sr. Assistant Professor, Department of Information Technology, Vignan’s Institute of Information Technology, Visakhapatnam **Project Manager, Tech Mahindra, Visakhapatnam A Brief History of BIDW (Business Intelligence and Data Warehousing) Introduction Business Intelligence (BI) is a set of tools and techniques used to derive useful information from the vast amount of organizational data. Data Warehouse (DW) is a central repository of organizational data derived from various operational and other sources and structured in a way suitable for querying, analysis and reporting using BI tools. Business Intelligence and Data Warehouse are a necessity for all businesses of considerable size who aim to understand and grow their business. Also, they have become a necessity to support the day to day business in various verticals and to generate the reports necessary to comply with various Government norms. This article aims to present a brief history of Business Intelligence and Data Warehousing (or BIDW in short). It is not possible to present this history in strict chronological order since none of these techniques and concepts have been invented or discovered on any particular day. They have slowly evolved over a period of time ever since the data related to businesses and organizations has been collected and stored digitally using computers. Also, the history of both these systems is being presented in a single article since both of them are intertwined and it would convey the full purpose and meaning when both are discussed and presented together. This article also discusses the ideas and concepts proposed and propagated by various pioneers in the field of BIDW. Evolution Mainframes were one of the first computer systems used in Businesses. The organization data was stored centrally on Mainframes. COBOL was used then to create and deliver standard and custom reports. The Business Users were dependent on the Information Technology staff for generating these reports. Any changes to the existing reports or creation of new reports required a long lead time. Then, with the advent of Desktop and Personal computing in 1980s, the Business users too could do various kinds of analysis on their own, using spreadsheet software like Lotus 1-2-3 though they were still dependent on the IT to get the data to their Desktop. Then, came the era of client-server and distributed computing. With the data spread across the organization across different kinds of systems and databases, direct access of data from these systems using various end users tools became possible. But this came with its own set of problems like performance issues, data reconciliation issues across different systems and no availability of single version of truth. The need for the Data warehouse as the central repository of data which could provide an integrated view of Business, rose out of these issues related to operational data spread across systems. With the development and implementation of DW systems, the end users could connect to the DW using the BI tools to fetch and analyze data on their own with lesser support from the IT staff. Business Intelligence The earliest known usage of the term “Business Intelligence” dates back to the year 1865 in a book named “Cyclopædia of commercial and business anecdotes” by Richard Miller Devens. It mentions about a London banker and politician named Sir Henry Furnese (1658-1712) who maintained a communications network across Europe. He used this network to receive advance information about battles before others and used this to advantage to gain profits. The term Business Intelligence was used in the mentioned book in this context and we can clearly draw analogies of this to the present day usage of Business Intelligence to draw wealth out of information. The first documented usage of the term “Business Intelligence” in the era of automation was in year 1958 by H.P.Luhn in the paper titled “A Business Intelligence System” published in October 1958 edition of IBM Journal. It talks about the automation and information retrieval and dissemination using data processing machines. The term Business Intelligence is used in the context of automated document and knowledge management in a library setting. Analogies of current concepts of BIDW like extract, transfer, querying, scheduling, usage tracking can be drawn with the concepts mentioned in this paper. After this too, Business Intelligence as a term was used in many contexts and to mean different things. The first time usage of the term “Business Intelligence” with the meaning as we know now, was in 1989 by the Gartner Analyst Howard Dresner. He used it as an all-encompassing term to describe various methods in vogue for discovery of information and to support decision making. Data Warehousing Ever since computers were used commonplace, Businesses did collect data and analyze it for deriving business benefit out of the same. The need to report on the business data for carrying out the day-today operations and complying with the government norms was always there. Data-driven Decision Support Systems (DSSs) are earlier known examples of how analysis of stored data was used to aid decision making. One of the first known example is that of AAIMS, An Analytical Information Management System, developed by Richard Klass and Charles Weisss at American Airlines during the period 1970-1974. It was developed using the APL programming language. It consisted of a database of sales, price and employee data and aided in data analysis through data retrieval, manipulation and report generation. Pioneering efforts with respect to BIDW were carried out in Procter and Gamble in around 1985. A Data driven DSS that linked the sales information, scanner data, products and customer was built for P&G by Metaphor Computer Systems which was a spinoff of the Xerox’s Palo Alto Research Center. Later, many of the staff from Procter and Gamble and Metaphor Computer Systems like Ralph Kimball and Katherine Glassey went on to found BI vendors like Red Brick Systems and Brio. The Business Data Warehouse as a concept was first proposed formally in paper titled “An Architecture for a business and information system” by the IBM staff named B.A.Devlin and P.T. Murphy in 1988 CSI Communications | September 2014 | 27 in IBM SYSTEMS JOURNAL, VOL 27, NO 1. Many of the concepts related to BIDW as we know now, were discussed in this article. The need for DW as a separate system from the operational databases was discussed. The architecture of the Business Data Warehouse with raw data, detailed data, summary data and user view of data was discussed. The requirement of no change to public data in the Business Data Warehouse has been emphasized in this paper. The concepts related to Data design, user views and access and security, data loads and updates have also been elaborated in this paper. The subsequent discussion in the history of DW would invariably involve at least a brief mention of the approaches proposed by Bill Inmon and Ralph Kimball. Bill Inmon Bill Inmon is acknowledged by many in this field as the father of Data Warehousing. He proposed an approach which is known as Top-down approach. This involves building one centralized repository which will act as the enterprise-wide DW. The data in this DW would be normalized and follow the entity–relationship model (ER model). The Data marts following the dimensional modeling approach would be built out of this DW to satisfy the reporting needs of the individual departments. He published a book titled “Building the Data Warehouse” in the early 1990s detailing this approach. Ralph Kimball Ralph Kimball is another pioneer in the field of DW whose methodology is known as the Bottom-up approach. This approach involves building individual data marts for satisfying the reporting needs of individual departments. These Data marts are built using the dimensional modeling approach. The Data Marts are joined using the common dimensions to integrate them into a complete DW. He published a book titled “The Data Warehouse Toolkit” in the 1996 detailing this dimensional modeling approach. Both the Inmon and Kimball approaches have their own set of advantages and disadvantages. Inmon approach is a very sound approach leading to a large and integrated DW with an enterprise view of data. The main disadvantage is the high amount of initial cost and time required before it starts giving return on investment. Kimball approach has the clear advantage that the individual data marts are more easily built at a quicker pace leading to lower initial cost and quicker return on investment. The disadvantage is about how effectively individual and disparate data marts can integrate well and provide the full advantage of a complete DW in actual. In actual DW implementations, a hybrid approach having the advantage of both the approaches would be more workable keeping in view of the management and budgetary support required to build such a system. Relational Database Management Systems (RDBMS) Almost all the DWs that we know today are implemented on RDBMS. The relational model of building databases with tables of rows and columns was introduced by a IBMer named E.F.Codd in his paper titled “A Relational Model of Data for Large Shared Data Banks” which was published in June, 1970 in the Communications of the ACM journal. He proposed a set of 13 rules to which a database needs to confirm, for it to be considered as a RDBMS. These are known as the Codd’s twelve rules. The relational theory was given a physical form through the Structured English Query Language (SEQUEL) in the 1970s by IBMers named Donald Chamberlain and Raymond Boyce. This was later renamed as Structured Query Language (SQL). SQL consists of the Data Definition Language (DDL) and Data Manipulation Language (DML) used for creation and modification of schemas, and insert, update and delete the data and to control access to data. SQL is the language used by the ETL tools to insert data into the DW and is also used by the BI tools to query the data stored in the DW. Data in DW is structured to aid bulk insert of data by ETL tools and fast querying of the data by the BI tools. Some of the features of the RDBMS which aid Data Warehousing are Indexing, Caching, Partitioning, Parallelism, and Materialized Views. The top databases for BIDW are Oracle, DB2, MySQL, SQL Server, Teradata. Oracle released the first commercial SQL relational database management named Oracle Version 2 in 1979. It holds the number one position in Database Management System (DBMS) market as on date. IBM released its version of the DBMS known as the DB2 or the IBM Database 2 in 1983 on its MVS mainframe platform. CSI Communications | September 2014 | 28 The name DB2 was used to indicate its shift from the hierarchical databases to the relational database. MySQL was created by a Swedish company and its first internal release was in May, 1995. It was released over the internet as an open source software. It is a widely used Open Source RDBMS. The SQL Server was co-developed by Microsoft and Sybase for use on OS/2 platform in 1988. Initially, it was developed in 1987 by Sybase as “Sybase SQL Server” for UNIX. Microsft SQL Server has specialized edition with Multiple Parallel Processing (MPP) Architecture which is optimized for large Data Warehouses. Teradata is a RDBMS from a company of the same name and aimed at Data Warehouses and Data Marts. The first beta version of the product was released during Christmas of 1983 for Wells Fargo Bank. Extract, Load, Transform (ETL) Tools The DWs source data from multiple and different types of sources. The sources could be RDBMS, flat files and also nonrelational databases. Initially, the ETL process was carried out using custom scripts and SQLs and procedural language extensions of SQLs. But now-a-days most of the organizations go for ETL tools for creating the ETL tasks and running the ETL processes. Informatica, IBM, SAP, Oracle and SAS are the top vendors of the ETL tools. Informatica PowerCenter, IBM InfoSphere DataStage, Oracle Data Integrator are the popular ETL tools. Business Intelligence (BI) Tools BI tools are used for querying, reporting and analysis of the data stored in the Databases and DWs and other sources. SAP Business Objects, Oracle OBIEE, IBM Cognos, Microstrategy, Microsoft SQL Server Reporting Services, TIBCO Spotfire, Tableau are the BI Tools currently popular in market. Online Analytical Processing (OLAP) OLAP is the approach to do multidimensional analysis on data structures known as cubes. The term OLAP was coined by E.F.Codd in 1993. He proposed the “twelve laws of online analytical processing”. Oracle Hyperion Essbase and Microsoft SQL Server Analysis Services are popular OLAP tools. Data Warehouse Appliances (DWA) The term Data Warehouse Appliance was coined in early 2000s by Foster www.csi-india.org Hinshaw, a founder of Netezza. DW Appliances are packaged hardware (servers, storage) plus software (operating system, DBMS) architected for huge data volumes and high performance and hence are very useful for deploying large Data warehouses on them. They usually use the massively parallel processing (MPP) architecture. Netezza, Greenplum and Oracle Exadata are popular examples of DWA. About the Authors Conclusion Survival of the Businesses depends on staying one step ahead of the competition by understanding the internal and external environment. BIDW tools provide the power to understand the past and analyze the present. They also provide the ability to compare different parameters and the potential outcomes using What-if analysis. Users of the BIDW tools go up to the level of CEO. This only explains how important these tools are to Business. This article has traced the timeline of how BIDW technology has come way forward from the time of advent of computers to the state in which we see it now. The usage and support for BIDW in Businesses is only expected to grow in future. References [1] Codd, E F (1970). A relational model of data for large shared data banks. Communications of the ACM, 13(6), 377-387. [2] [3] [4] [5] [6] [7] [8] Devens, R M (1868). Cyclopaedia of Commercial and Business Anecdotes: Comprising Interesting Reminiscences and Facts... of Merchants, Traders, Bankers... Etc. in All Ages and Countries... D. Appleton. Devlin, B A, & Murphy, P T (1988). An architecture for a business and information system. IBM systems Journal, 27(1), 60-80. Inmon, W H (2005). Building the data warehouse. John Wiley & Sons. Luhn, H P (1958). A business intelligence system. IBM Journal of Research and Development, 2(4), 314-319. Nylund, A (1999). Tracing the BI family tree. Knowledge Management, 70-71 Ralph, K, & Ross, M (1996). The data warehouse toolkit. John Wiley & Sons. http://www.oracle.com/us/corporate/ history/index.html n Mr. K. V. N. Rajesh has obtained his B.Tech in Computer Science and Engineering from Jawaharlal Nehru Technological University in 2005. He obtained his M.Tech in Computer Science and Technology from Andhra University in 2010. He is working as Senior Assistant Professor in department of information technology at Vignan’s institute of information technology, Visakhapatnam since 2005. He is a member of Computer Society of India. His research interests include Business Intelligence, Location Intelligence and Big Data and he has published papers in the respective areas. He can be reached at [email protected]. Mr. K. V. N. Ramesh is a M.E in Structural Engineering from Andhra University. He has 14 years of experience in IT industry with expertise in the area of Data Warehousing and Business Intelligence. He has worked on UNIX, Oracle, Sybase, Business Objects and OBIEE during these years. He is an Oracle certified professional in Oracle DW and OBIEE. He is currently working as Project Manager at Tech Mahindra, Visakhapatnam. He can be reached at [email protected]. CSI Communications | September 2014 | 29 Dear Member, You must have observed the improvement in the quality and content of CSI-Communications. However we wish to have your valuable feedback for CSI-Communications. You may use this Business Reply Envelope or a link available at CSI website: http://www.csi-india.org/web/guest/publications CSI Executive Committee has decided to offer a complimentary CSI Membership I-Card during CSI Golden Jubilee Celebrations to all the Life Members, Corporate Members including Nominees of the institutes (academic and non academic) on receipt of duly filled in form with passport size color photographs latest by 30th September, 2014 at the CSI Head Quarters, Mumbai. We appreciate your time for your response. Sincerely, Suchit Gogwekar Executive Secretary, CSI YYYY 1. Since when are you a CSI Member? 2. Which other society’s membership do you have? ACM IEEE NASSCOM Any other 3. Do you get your monthly copy of CSI- Communications regularly? Yes No Date If Yes by what date of the month do you get it? 4. How do you rate the quality of content of CSI – Communications? Excellent Very Good Good Average Poor 5. Which sections of CSI- Communications do you find the most interesting? Cover Story Technical Trends Research Front Articles Security Corner Practitioner Workbench 6. What are the additions you would like to see in the current content of CSI- Communications? 7. Which theme of CSI-Communications you like the most up till August 2014 issue? 8. Would you like to suggest any specific theme for the upcoming issues of the Magazine? 9. Which other Technical Magazine you read often? Yes No Average Poor 10. Do you access CSI – Communications’s Digital version - DigiMag? If Yes, Rate your experience If No, Tick the reason – Excellent Not aware If No, Tick the reason – Excellent Not aware Good Not user Friendly 11. Do you access CSI- Communications App? If Yes, Rate your experience Very Good Yes Not Interested No Very Good Not user Friendly Good Average Not Interested 12. Have you ever referred CSI- Communications to your friends or Colleagues? 13. What version of CSI – Communications would you prefer? Poor Hard copy Yes No Soft copy (CSI’s “Go Green” initiative encourages members to opt for the soft copy. Those members who DO NOT return this form duly filled, will be automatically moved to the “Soft Copy” option and will cease to receive the hardcopy of CSIC after the September issue). CSI Communications | September 2014 | 30 www.csi-india.org We appreciate your time to fill up following information which is required to update your Membership record with us to serve you better and send you CSI Golden Jubilee Celebration I-Card. Date : d d m m y Affix your photograph. Please do not staple and do not sign on it. y CSI Membership Number: Chapter: Name: Address: City: Pin : Email id : Mobile No: Postage will be paid by the Addressee Signature : No postage Stamp Necessary if Posted in India BUSINESS REPLY ENVELOPE Permit No. Mumbai To, Mr. Suchit Gogwekar Executive Secretary Computer Society of India Samruddhi Venture Park, Unit No.3, 4th floor, MIDC, Andheri (E). Mumbai-400093 CSI Communications | September 2014 | 31 Computer Society of India TM Education Headquarters, Chennai Invites applications for the post of Regional Education Officer at Delhi, Kolkata & Bhubaneswar Minimum Qualification: MBA with 5 yrs. experience Maximum Age limit: 40 years Last date of receiving application via e-mail: 30th September, 2014. Send your bio data to: [email protected] For details, visit: https://www.csi-india.org Sanjay Mohapatra Hony. Secretary CSI Communications | September 2014 | 32 www.csi-india.org Cover Story Dr. S. Natarajan R & D and Teaching Professor and Key Resource Person, Department of Information Science and Engineering, PESIT, Bangalore Strolling Down the Memory Lane If I look back about 42 years in my life, I can bring back those days when we were simulating the trajectories of the missiles. The work was carried out Defence Research and Development Laboratory (DRDL) situated in Hyderabad. This was the birth place of Computer Society of India. As compared to the current scenario, we hardly had any computing resources with us. I joined the Computer Centre at DRDL in 1972. Before this, Col Balasubramaniam the then Head of Computer Centre went to Delhi on promotion. I missed the opportunity to work with him as my seniors used to fondly remember him. We had at our disposal an IBM 1620 computer for all the computing needs of not only DRDL as well as other Laboratories like Defence Electronics Research Laboratory (DLRL) and Defence Metallurgical Research Laboratory (DMRL). I saw in the log of late 60s that we were also catering to prestigious institutions like Tata Institute of Fundamental Research (TIFR). It will be interesting to note that all of software relating to aerodynamics, structures, control and guidance systems, propulsion (solid and liquid) systems, simulation etc., was carried out in IBM 1620. This computer is a 8 bit system with memory of 40K. All the programs were written in FORTRAN II language. We needed a fullfledged Air-Conditioning system which was provided by Military Engineering Group (MEG). The console of the computer had multiple lamps and buttons. Perhaps the computer operator in those days had a lot of work to do. With our experience we were able to decipher the operations that are currently executed. The input for this system was the source code in punched cards. The picture of the system is in Fig. 1 and the expanded picture of the console is in Fig. 2. One may wonder how the computer processing for the missile development was done in those days. Having gained experience in scientific computing I joined National Remote Sensing Agency (NRSA) now called NRSC, in 1977. In those days importing even Fig. 1: IBM 1620 system with Card Reader in the left Fig. 2: Console of IBM 1620 a medium sized computer was a cumbersome process. During the initial days at NRSA we did not have general purpose computer at our disposal. So we CSI Communications | September 2014 | 33 Fig. 3: IRIS 55 Computer data processing of the LANDSAT Satellite of USA were done in this system during that time. The staff in the lodge where we stayed used to wonder as to what we were engaged in those unearthly hours. Our rooms were locked in the day as we were sleeping. A partial view of the system is in Fig. 4. The computing facilities were added in our office were of PDP11 families from Digital Equipment Corporation were using the IRIS 55 System (French) at Electronics Corporation of India (ECIL), Hyderabad. This was a 16 bit system with 256 K memory. When we were sending our source cards to the console operator, the errors of compilation were printed in French and needed translation for the correction process. A typical IRIS 55 system is displayed in Fig. 3. Fig. 7: VAX 11/730 computer Fig. 5: PDP 11/40 Fig. 4: Partial view of IBM 370/155 About the Author We were also booking time on IBM 370/155 at IIT Chennai. The booking slots are for a minimum of 1 hour and usually start at mid night. Normally our timings were between 2:00 AM and 4:00 AM. . All the software programs for the satellite Fig. 6: PDP 11/70 system (DEC) which were the work horse for satellite data acquisition at Shadnagar Earth Station situated about 60 Kms from Hyderabad as well as at Balanagar, Hyderabad. Whenever, a prospective customer wishes to evaluate PDP systems our vendor M/S Hinditron Computers used to bring them to our premises as we had the PDP family of systems with us. Some of these systems are in the following figures. This was followed by the acquisition of VAX Series of Computers of DEC. This was used when our first Indian Remote Sensing Satellite (IRS1A) was launched in 1988. A typical view of VAX 11/730 is below. Now you may imagine that any of the current day desktop with 2 GB RAM and 500 GB of Memory installed in homes is much more powerful than any of these systems but still good scientific work was carried out in those days. n Dr. S Natarajan holds Ph. D. (Remote Sensing) from JNTU Hyderabad India. His experience spans 33 years in R&D and 10 years in Teaching. He worked in Defence Research and Development Laboratory (DRDL), Hyderabad for Five years and later worked for Twenty Eight years in National Remote Sensing Centre (NRSC) at Hyderabad, India. He was trained in Digital Image Processing in DLR, Germany and in Automated Cartography at IFAG, Germany during 1979 and 1980. His areas of interest are Soft Computing, Data Mining and Geographical Information System. CSI Communications | September 2014 | 34 www.csi-india.org Research Front Manu K. Madhu* and Biji C.L.** *M. Tech Student, MG University, Kottayam **PhD., University of Kerala, Thiruvananthapuram Parallel Computing with Message Passing Interface This article is the second in the series of articles, focusing on Message passing interface programming for parallel computing paradigm. A general introduction to parallel computing and message passing interface was covered in the previous issue. Current issue focuses more on programming for MPI Subroutines with toy examples. MPI Subroutines MPI subroutine communicates among different processors in the MPI communication world for performing jobs in parallel. MPI subroutine can be called from languages such as C, C++, FORTRAN77 and FORTRAN90. As shown in Fig. 1, During the MPI subroutine call in the main program, compiler will execute the function and returns result back to the main program. be initialized only once and should be called before any other subroutine. Subsequent calls to this routine is erroneous. Users can select the number of processors for executing the task through command line arguments. The syntax is int MPI_Init(int *argc, char **argv). The input parameters are ‘argc’- pointer to the number of arguments and ‘argv’- pointer to the argument vector. MPI_COMM_size The MPI_COMM_size subroutine determines the size of the group associated with a communicator. The syntax is int MPI_Comm_size(MPI_Comm comm, int *size), where MPI_Comm is a MPI object, comm represents communicator and size represents the number of processors in the group of comm. MPI_Comm_rank MPI_Comm_rank subroutine is used to distinguish each processor of the communicator; an ID is assigned to each processor and is called rank of the processor. One processor communicate explicitly to another processor using rank as its ID and the syntax is in t MPI_Comm_ rank(MPI_Comm comm, int *rank) MPI_Finalize MPI_Finalize subroutine will terminate the MPI execution environment. No other MPI call can be made after calling MPI_ Finalize() Collective Communication Subroutines For executing jobs in parallel, it is required to communicate with different processors. The subroutines used to perform collective communication are listed below. Fig. 1: Flow of program with MPI_Subroutine MPI_Reduce This subroutine performs a global reduction operation across all the members of a group, and brings the Subroutines defined inside MPI can be classified as Environmental Subroutines Collective Communication Subroutines Point to point Communication Subroutines Environmental Subroutines These include a group of subroutines, which helps to initialize & finalize the MPI execution environment, querying processor’s rank and querying the total number of processors in the MPI communication world. The various environmental subroutines is listed below. MPI_Init The MPI execution environment is initialized using the MPI_Init subroutine. MPI should Fig. 2: Schematic representation of process behind MPI_Reduce subroutine CSI Communications | September 2014 | 35 result to the master node.Figure2 shows schematic representation of process behind MPI_Reduce subroutine. In this example values 10, 40, 20 and 30 are fetched from each processor for performing a specific operation and results returned to the output buffer of the processor 0 or root node. That is, when MPI_Reduce subroutine is called it will combine the inputs provided in the input buffer of each processor in the communicator, using the operation ‘*’, then returns the result after the operation to the output buffer of the root node. Syntax-intMPI_Reduce(void *sendbuf, void *recvbuf, int count, MPI_Datatype datatype, MPI_Op op, int root, MPI_Comm comm) Input Parameters sendbuf: Address of send buffer (choice). count :Number of elements in send buffer (integer). Datatype: Data type of elements of send buffer (handle). op :Reduce operation (handle). Root: Rank of root process (integer). comm :Communicator (handle). Output Parameters recvbuf:Address of receive buffer (choice, significant only at root). Reduce operations can be any of the following MPI_Reduce support a set of predefined operations, which are listed below. Table 1: Possible MPI_Reduce Operations Point to point Communication Subroutine It includes the subroutines used to perform point to point communication MPI_Send MPI_Send performs a standard mode block send operation, i.e. these functions do not return value until the communication is finished. The syntax is Int MPI_Send(void *sendbuf, int count, MPI_ Datatype datatype, int dest, int tag, MPI_Comm comm), where MPI_ Datatype and MPI_Comm are object. Fig. 3: Data movement during MPI_Send and MPI_Recv function calls Input Parameters sendbuf :Initial address of send buffer (choice) count: Number of elements in send buffer (nonnegative integer) datatype :Datatype of each send buffer element (handle) dest :Rank of destination (integer) tag: Message tag (integer) comm : communicator (handle) MPI_Recv Performs a blocking receive operation. Receive buffer is a storage for count number of consecutive elements of type specified by data type. Message received must be less than or equal to the length of the receive buffer. The syntax is int MPI_Recv(void *recvbuf, int count, MPI_Datatype datatype, int source, int tag, MPI_Comm comm, MPI_Status *status) MPI Name Function MPI_MAX Maximum MPI_MIN Minimum MPI_SUM Sum MPI_PROD Product MPI_LAND Logical AND MPI_BAND Bitwise AND MPI_LOR Logical OR MPI_BOR Bitwise OR MPI_LXOR Logical exclusive OR MPI_BXOR Bitwise exclusive OR MPI_MAXLOC Maximum & location MPI_MINLOC Minimum & location CSI Communications | September 2014 | 36 Input Parameters Count: Maximum number of elements to receive (integer). Datatype: Datatype of each receive buffer entry (handle). source: Rank of source (integer). tag :Message tag (integer). Comm: Communicator (handle). Output Parameters recvbuf: Initial address of receive buffer (choice). Status: Status object (status). The data flow during MPI_Send and MPI_Recv function call is depicted below. When the processor 0 calls an MPI_Send, the data stored in sendbuf(send buffer) is copied into the sysbuf (system buffer). And when processor 1 makes a MPI_Recv function call, data from sysbuf of processor0 will be copied into processor 1’s sysbuf. Then from the sysbuf data is copied into recvbuf (receive buffer) of processor 0. Now, let us start MPI programming with some toy examples. For better understanding even, an ordinary C program is included before the MPI program. We have included three different examples to brief the concept of MPI programming. Example 1: The trivial hello world program. An ordinary Hello world program in C is #include <stdio.h> int main(intargc,char **argv) { printf(“Hello world\n”); } The command line syntax for the compilation of C program and the output is listed below. $ gcc hello.c $ ./a.out Hello world The parallelized Hello world program with the MPI subroutines is as follows. The command line syntax for the compilation of MPI program and the www.csi-india.org #include <stdio.h> #include <mpi.h> int main(intargc,char **argv) { intmyid, numprocs,i; MPI_Init(&argc,&argv); MPI_Comm_size(MPI_COMM_WORLD,&numprocs); MPI_Comm_rank(MPI_COMM_WORLD,&myid); printf(“Hello from processor %d of %d\n”,myid,numprocs); MPI_Finalize(); } output is listed. In the above example, number of process defined is 4. Hence, four different copies of the program is generated and will be distributed to the 4 processors for executing the jobs in parallel. $ mpicc hello.c $ mpirun -np 4 ./a.out Hello from processor 0 of 4 Hello from processor 1 of 4 Hello from processor 2 of 4 Hello from processor 3 of 4 As next instance, let us try to analyse the importance of MPI_Reduce, used when a collective communication is required. Example 2:MPI Program to find sum of marks obtained in 1st 2nd and 3rd years and total marks obtained in degree exam Table 2 shows the marks scored by Rinky in her degree exams. Sub1 Sub2 Sub3 Sub4 Sub5 1st year 40 30 50 30 40 2nd year 50 30 50 40 40 3rd year 30 30 40 50 50 A linear code will be like this #include <stdio.h> int main(intargc,char **argv) { intmyid, numprocs,i,j,sum[3],tsum=0; intdegreeMarks[3][5]= { {40, 30, 50, 30,40} , //Degree first year marks {50, 30, 50, 40,40} , //Degree second year marks {30, 30, 40, 50,50} //Degree third year marks }; for(i=0;i<3;i++) { sum[i]=0; } for(i=0;i<3;i++) { for(j=0;j<5;j++) { sum[i]=sum[i]+degreeMarks[i][j]; } printf(“Year %d total marks=%d\n”,i+1,sum[i]); } for(i=0;i<3;i++) { tsum=tsum+sum[i]; } printf(“Total marks obtained in Degree Examinations=%d\n”,tsum); } OUTPUT $ gccdegreeMarksN.c $ ./a.out Year 1 total marks=190 Year 2 total marks=210 Year 3 total marks=200 Total marks obtained in Degree Examinations=600 CSI Communications | September 2014 | 37 Parallelized code will be like this #include <stdio.h> #include <mpi.h> int main(intargc,char **argv) { intmyid, numprocs,i,sum=0,tsum=0; intdegreeMarks[3][5]= { {40, 30, 50, 30,40} , // Degree first year marks {50, 30, 50, 40,40} , //Degree second year marks {30, 30, 40, 50,50} //Degree third year marks }; MPI_Init(&argc,&argv); MPI_Comm_size(MPI_COMM_WORLD,&numprocs); MPI_Comm_rank(MPI_COMM_WORLD,&myid); for(i=0;i<5;i++) { sum=sum+degreeMarks[myid][i]; } printf(“Year %d total marks=%d\n”,myid+1,sum); MPI_Reduce(&sum, &tsum, 1, MPI_INT, MPI_SUM, 0,MPI_COMM_WORLD); if(myid==0) { printf(“Total marks obtained in Degree Examinations=%d\n”,tsum); } MPI_Finalize(); } OUTPUT $ mpicc degreeMarks.c $ mpirun -np 3 ./a.out Year 1 total marks=190 Year 2 total marks=210 Year 3 total marks=200 Total marks obtained in Degree Examinations=600 Let us focus on MPI_Send and MPI_Recv subroutine used for point to point communication. These subroutines are used to pass a message from one processor to another. Example 3: Write a MPI program to send the message “Message from Neymar is: Hi Messi, welcome to MPI WORLD “ from Processor 0 to processor 1. #include <stdio.h> #include <mpi.h> #define MESSY 0 #define NEYMAR 1 int main(intargc,char **argv) { intmyid, numprocs; char *msg; MPI_Init(&argc,&argv); MPI_Comm_size(MPI_COMM_WORLD,&numprocs); MPI_Comm_rank(MPI_COMM_WORLD,&myid); MPI_Status status; if(myid==MESSY) { MPI_Recv(&msg, 30, MPI_CHAR, 1, 123, MPI_COMM_WORLD, &status); printf(“\nMessage from Neymar is:%s”,msg); } if(myid==NEYMAR) { msg=”Hi Messy, welcome to MPI WORLD”; MPI_Send(&msg, 30, MPI_CHAR, 0, 123, MPI_COMM_WORLD); } MPI_Finalize(); } CSI Communications | September 2014 | 38 www.csi-india.org OUTPUT $ mpicc Message.c $ mpirun -np 2 ./a.out Message from Neymar is: Hi Messi, welcome to MPI WORLD About the Authors Fig. 4: Messy and Neymar Acknowledgement We thank the campus computing facility, University of Kerala for all the technical support. References [1] Yukiya Aoyama, Jun Nakano “RS/6000 SP: Practical MPI Programming” IBM Redbooks Vervante, 1999. [2] http://159.226.149.45/kizsjzx/hpc/ mpi-course.pdf n Manu K. Madhu is an M Tech student of School of Computer Sciences, M G University, Kottayam. Apart from the academic life, he is a passionate poem writer and he enjoys cooking. Biji C.L. is currently working towards her PhD from University of Kerala. She is interested in communicating science through popular science magazines and has earlier contributed to CSI communications. CSI Communications | September 2014 | 39 Practitioner Workbench Amitava Nag Assistant Professor, Head in Dept., IT, Academy Technology, India Programming.Tips() » Fun with C #include <stdio.h> #include <stdarg.h> double average (int count,...) { va_list arg; int i; double sum; va_start (arg, count); for (sum = 0, i = 0; i < count; i++) sum += va_arg (arg, double); va_end (arg); return sum / count; } main () { printf (“%f\n”, average (5, 5.2, 6.5, 9.6,7.1,.3)); printf (“%f\n”, average 4.6)); (4, 2.1, 6.2, 4.3, } CSI Communications | September 2014 | 40 When the above code is compiled and executed, it produces the following output: 5.75000 4.30000 Inside main(), in first function call average (5, 5.2, 6.5, 9.6,7.1,.3), the first argument (here 5) indicates the number of arguments to be accepted by this call. Similarly, in second function call average (4, 2.1, 6.2, 4.3, 4.6) the first argument (here 4) indicates the number of to be accepted by this call which is here 4. In 3rd line of the program, in the statement double average (int count,...) ellipsis (‘...’) is used to pass variable number of arguments. In this program one data type va_list and three macros va_start(),va_arg() and va_ end are used which are defined in the header file `stdarg.h’. The data type va_list is used for argument pointer variables. The macros va_start(),va_arg() and va_end () are used for initialize the argument list, Get the next argument value and Clean up the list respectively. n About the Author Is it possible to have a function in ‘C’ program that can accept variable number of arguments? It is possible using an ellipsis (which looks like ‘...’) in place of the last argument. The program below is a complete sample ‘C’ program that accepts a variable number of arguments. Amitava Nag is working as an Assistant Professor and Head in Dept. of IT, Academy of Technology, India and is a member of CSI, IEEE and ACM. He is one of the authors of the books Data Structures and Algorithms Using C, Numerical Methods and Programming, Basic Computation and Principles of Computer Programming, Operating System etc. www.csi-india.org Practitioner Workbench Umesh P and Silpa Bhaskaran Department of Computational Biology and Bioinformatics, University of Kerala Programming.Learn("R") » Regression Analysis with R Regression analysis is one of the most widely used statistical methods to estimate the relationship between the variables. The objective of regression analysis is to find the relationship between the independent variable (usually denoted as x) and dependent variable (of x, usually denoted as y). Thus through regression analysis, we try to find a function which relates x and y, which is called a regression model. In this tutorial, we focus on the simplest regression modellinear regression and its analysis. As the name indicates, the linear regression model is expected to behave like a straight line. Linear relationship can be of two types- Positive correlation, which means the increase in the values of x will result in an increase in the value of y and negative correlation, which means the increase in the value of x will result in a decrease in the value of y. By regression analysis, we intend to find equation of the function which relates x and y. i.e., in case of linear regression, we will find equation of line that fits on the given data. A typical linear regression model will be of the form y= ax+b, where, ‘a’ is the slope of the line, ‘b’ is the y intercept of the line. Now let us look into one typical data. The following is the data of samples collected from people of different ages and their cholesterol levels in mmol/L. > age = c(19,22,25,30,35,41,46,48,50,53,57,60,64,70) > chol_level = c(4.1,4.3,4.3,4.4,4.5,4.6,4.7,4.6,5,5,5.1,5.3,5.5, 5.6) First, let us see how these values are distributed. For this, let us plot the values as a scatter plot. In R, type the following command to obtain the plot. > plot(age ~ chol_level, main=”Age Vs Cholesterol Level”) This will give you a plot as in Fig. 1. cholesterol levels and age. For this, R has a simple commandlm( ). For this, use the following code in R. Here we store the regression model in the variable, lm.out. Fig. 2: Regression model So our regression function will be, Age= 33.25 * (chol_level)+ (-114.83) Now, Let us plot our regression line over the scatter plot. > plot(age ~ chol_level, main=”Age Vs Cholesterol Level”) > abline(lm.out, col=”red”) Fig. 3: Regression line of Age Vs. chol_ levels Fig. 1: Scatter plot of Age vs. cholesterol levels From the graph itself, we can say that behavior of values is almost linear. Now we will find the regression model for the Linear regression, which model the linear relationship between variables, fails to model the variables that are related nonlinearly. For variables that possess nonlinear relationship, we have to apply nonlinear regression model. In R, this is done using the nls( ) command in a similar way like that of the linear n regression model we explained above. Ask an Expert (Your Question, Our Answer), On the Bookshelf and Innovations in India columns are excluded in this issue due to want of space. Do ask your questions and send them to [email protected] for receiving replies. - Editorial Team CSI Communications | September 2014 | 41 Security Corner C. R. Suthikshn Kumar Dept of Computer Engineering, Defence Institute of Advanced Technology, Girinagar, Pune Information Security » A Review of Cyber Security Curriculum in Indian Context Abstract: Cyber Security curriculum has vital role in tackling cyber threats. A highly trained cyber security workforce is essential to meet today’s cyber security challenges. The Cyber Security curriculum should ideally help to build Knowledge, Skills and Abilities (KSAs) in all aspects of cyber security both theoretical and practical. This article reviews the Cyber security curriculum from Indian perspective and provides comments and suggestions for enhancing them further. Introduction The term cyber security has originated from ‘cyber space’. The word ‘cyber’ means computer and ‘cyber space’ would mean computer network according to dictionary. The word ‘cyber’ is also used as an adjective to relate a term to computer. With rapid diffusion of internet and world wide web, the ‘cyberspace’ is where people do online transactions, data communication, emails, web based shopping, chatting, video conferencing, etc. Cyber space has been there for only couple decades while there has been rapidly growing cyber threats, cyber attacks, cyber terrorism, cyber espionage, all of which undermine the security of cyber space. While the army secures land, navy secures the sea, air force secures the sky, coast guard secure the coastal areas, cyber security force secures the cyber space. While army, navy, air force and coast guard are defending the tangible land, sea, sky and coast, the cyber space is an intangible asset and is much more complex to defend and secure. Cyber Security can be defined as[5] ‘Measures relating to the confidentially, availability and integrity of information that is processed, stored and communicated by computing devices such as computers, smart phones etc.’ A country’s national security, economic prosperity, global reputation and social wellbeing rely on cyber security to a large extent. Cyber Security is a field which is receiving attention recently. Cyber Security related articles have been given headline news coverage in leading news papers and magazines. There is growing concern regarding the cyber threats, cyber attacks, cyber warfare, cyber terrorism, Cyber espionage. With awareness about cyber security growing among public, there is increasing use of cyber security applications such as Anti-virus software installed on PCs, Spam Filters for emails, Password authentication for login, Firewalls for intranets, Digital signatures etc. With banking transactions going online for credit cards, money transfer, online shopping etc., the internet security using secure networking protocols, encryption/authentication using public key cryptographic systems are becoming order of the day. Recent attempts at e-governance, i.e., using the internet for administration provides impetus to the importance of Cyber security. As the use of information technology expands exponentially, the consequences of cyber attacks also grow rapidly. Hence there is a need for skilled workforce of cyber security professionals to prevent and defend against such cyber attacks. These cyber Security professionals build and certify applications designed to withstand attacks, diagnose and prevent security intrusions, and defend against cyber attacks. Pro-active and reactive deployment of cyber security requires high levels of knowledge and skill sets. With the shortage of trained cyber security professionals, the lacuna can be filled through various measures to educate fresh graduates and working professionals. According to the recent national cyber security policy[6] published by Dept of Electronics and IT, an important objective is to “create a workforce of 500,000 professionals skilled in cyber security in the next 5 years through capacity building, skill development and training”. However, policy does not discuss the level of skills. The Human Resource Development strategies to meet the objective set in the policy consist of four steps as listed below: 1. 2. 3. CSI Communications | September 2014 | 42 To encourage cyber security programs both in institutes and universities to support the Nation’s cyber security needs. To establish cyber security training infrastructure across the country by way of public private partnership arrangements. To establish cyber security concept labs for awareness and skill development in key areas. To establish institutional mechanisms for capacity building for Law Enforcement Agencies While establishing Cyber security Institutes, one should ensure that the curriculum adapted is adequate to meet the real world challenges. The subjects, syllabus, lab experiments which need to be included in such a program of study need to be deliberated upon in detail. While Computer science curriculum has been studied and latest curriculum structures are made available through ACM/IEEE task forces[8], the Cyber Security curriculum is still being debated[9][10]. This paper is an attempt to review the Cyber security curriculum based on the current programs being offered, review papers and reports published. A review of infrastructure/Lab to provide hands on experience on cyber security is also presented. This paper is organized as follows: In the next section, the challenges of cyber security are presented in national context. The section 3 discusses the various dimensions of cyber security. In section 4, a review of current cyber security curriculums in leading universities is presented. The summary and conclusions are presented in the section 5. 4. Challenges in Cyber Security The exponentially growing number of computers, smart phones, tablet computers poses a ever growing challenge for cyber security professionals in safeguarding the data and traffic. The important cyber security challenges can be enlisted as follows: • Designing the curriculum to meet the requirements for continuously evolving computer and networking technology. • Keeping abreast with the latest developments in Cyber Security. • Developing practical skills and ‘adversarial thinking’ techniques. • Developing laboratory facilities to www.csi-india.org research the latest cyber threats, attacks. • Developing library of books, ebooks, reports, white papers, journals/ magazines, case studies with proper classification to aid in teaching and research. • Developing and retaining project and supervision skills related to cyber security. • Assessing and certifying the faculty, students and practitioners of cyber security. The main goals of Cyber Security measures are to ensure Confidentiality, Integrity and Availability of the computer systems, data, databases, networks, applications, etc. The growing field of knowledge and sophistication of threats and attacks requires that the training and skill levels of the Cyber security professionals are competitive. The curriculum design and delivery of Cyber Security courses, supervision of research students, administration of Cyber security programs at post graduate level, are very important academic challenges. Dimensions of Cyber Security Cyber Security is a multi-disciplinary subject[3]. There are many dimensions of cyber security and these according to Essential Body of Knowledge[4] and curricular guidelines[3] consist of following areas i.e., : • Fundamental concepts • Cryptography • Security ethics • Security policy • Digital forensics • Access control • Security architecture and systems • Network security • Risk management • Attack/defense • Secure software design and engineering • Data security • System and Application Security • Telecommunication and Mobile Communication Security • Regulatory Standards and Compliance • Penetration testing • E-evidence • Perimeter defense • Secure coding and software security Apart from the knowledge, following are operational areas where skill sets of system administrators, managers, IT personnel come into picture: • • • • Enterprise Continuity Incident Management IT Security Training and Awareness IT Systems operation and Maintenance • Personnel security • Physical and Environment Security • Procurement • Risk Management • Strategtic Security Management While a cyber security professional is expected to be skilled and have practical knowledge in handling top ten vulnerabilities and risks in cyber space[3] as shown in the following table: Rank Name 1 Injection 2 Broken authentication and session management 3 Cross-site scripting (XSS) 4 Insecure direct object references 5 Security misconfiguration 6 Sensitive data exposure 7 Missing function-level access control 8 Cross-site request forgery (CSRF) 9 Using components with known vulnerabilities 10 Unvalidated redirects and forwards Adversarial thinking skills[2]: The cyber security professionals should have adversarial thinking capabilities, so that system builders can view system designs through the same lens attackers do. These professionals should also focus on principles and abstractions that bring discipline to the art of building secure systems. The adversarial thinking training can be imparted through a set a case studies. While in Management schools, we observe the use of case studies, the Cyber Security institutes also need to have access to good quality case studies. Game Theoritic based studies of Cyber Security topics can contribute to developing adversarial thinking skills[14]. Cyber Security Curriculum Master’s degrees provide a cybersecurity workforce with advanced capabilities[3]. Building on a sound basic BS or BE degree in Computer Science or related field, an additional two years of education could cover important technical cybersecurity topics. A two years master’s degree program in cybersecurity would allow students to master the knowledge, skills, and abilities (KSAs) specific to advanced topics in cybersecurity. The MTech/MS program specializing Cyber Security for Computing professionals: A strong technical cybersecurity-specific degree programs focusing on cybersecurity built upon a rigorous undergraduate background in computer engineering, computer science, or software engineering. Government/Private corporations should encourage and improve cyber expertise by funding scholarships to help students afford graduate-level courses in cybersecurity. Cybersecurity specialization requires a lot of hands-on activities; experiential, supervised learning. By analyzing the current cyber security challenges and risks, the curriculum for the Cyber Security specialization can be evolved. While there are very good cyber security Masters programs around the world at leading Universities and institutions, we review three such programs. The following table gives the detailed comparison of the programs. Additional topics on Reverse engineering can play an important role in investigating security breaches. Hence formal training in reverse engineering topics are to be included in the curriculum. Lab sessions for analyzing network traffic will build an important skill. Working knowledge of where to position an audit function (operating system, database, etc.), when it should be turned on, what it should record, how does an operating system protect itself from attack, and many more are to be built through practical sessions. Training in cyber defense as well as attacks and cyber warfare gaming offer important opportunities to develop and refine appropriate skills. Cyber Security Lab: The cyber Security Lab may consist of several open source and commercial software applications. The Network Defence Trainer, Qualnet from Scalable Network Technologies, Encase for Digital forensics, open source PGP suite, Matlab, nikto (web vulnerability analysis tool), Nessus from Tenable Networks etc are some of the example software which are useful for hands on experiments. The students should be encouraged to spend time in the lab exploring these and similar software. CSI Communications | September 2014 | 43 Univ/Institute Features Boston University MS in CS with Specialization in Cyber Security[16] University of Southern California, MS in Cyber Security[17] DIAT, M.Tech Program in Computer Science and Engineering with Specialization in Cyber Security. Course Requirements 8 Courses: Five courses need to be from breadth Core list. The three remaining courses are from non-core list. The breadth core courses are in four listed areas i.e., Theory, Software, Systems and Applications. Further, the students are adviced to select Cyber Security related courses from the Breadth and non-core courses. 9 Courses : 6 Core Courses consisting of Foundations of Information Security, Applications of Cryptography and Cryptanalysis, Foundations for Information Assurance, Applied Information Security, Distributed Systems and Network Security, Secure Systems Engineering. This a two year program with intake of students from officers serving tri-services i.e., Army, Airforce and Navy, Scientists and Technician serving in DRDO Labs, open category GATE qualified students. The curriculum is unique in the country consisting of 12 subjects ( with Core and Electives). The first semester has six core subjects. The second semester has 2 core courses and four electives. Lab Requirements Not stated Explicitly Not stated Explicitly Cyber security lab in the First semester Project Reqruirements A Thesis or project as per the guidelines. Not Stated Explicitly Dissertation requirements in third and fourth semester. Comments A strong program with very good A strong program with very good An attractive list of Electives. The Institute choice of electives. The faculty and electives. The university has very has very good faculty and infrastructure. good faculty and infrastructure. infrastructure are excellent. The course is also offered through distance learning program. important case studies in Cyber security are necessary to build the proper context for the students. The adversarial thinking ability is what differentiates a cyber security professional from a software professional. We have recommended introduction of subjects such as Fault Tolerant Computing and Game theory as a part of the Cyber Security Curriculum. Summary and Conclusion The Cyber Security curriculum plays an important role in improving the detection, analysis, mitigation and response to sophisticated cyber threats, with a focus on government, critical infrastructure and other systems of national interest. A highly trained cyber security workforce is essential to meet the today’s cyber security challenges. The Cyber Security curriculum should build the knowledge, Skills and Abilities (KSAs) in all aspects of cyber security both theoretical and practical. The laboratory work augments the class room discussions and review of [1] About the Author Ethical hacking sessions can benefit the student in better understanding of vulnerabilities and exploits. The cyber security students can be encouraged to participate in various bounty programs of google[12], facebook[13], Microsoft[11]. This is beneficial as they can build their KSAs related to latest technologies and security concepts while also competing for prizes. While, most of the programs focus on the 2 of the 3 most important goals of cyber security i.e., Confidentiality and Integrity, the third most important goal i.e., Availability needs to be addressed by introducing subjects such as Fault Tolerant Computing, Reliability Engineering etc. Acknowledgement This article is based on the author’s presentation at the National Seminar on Cyber Security organized by Information Warfare School of Indian Air Force(IAF) during 24th-25th July 2014. References [2] [3] [4] [5] IDSA, “India’s Cyber Security Challenge”, IDSA Task Force Report, March 2012. F. B. Schneider, “Cyber Security Education in Universities”, IEEE Security and Privacy, July/August 2013, pp. 3-4. A. McGettrick, “Towards Curricular Guidelines for Cyber Security”, Report of a Workshop on Cyber Security Education and Training, August 2013. D. Shoemaker, A Conklin, “Cyber Security: Essential Body of Knowledge”, Cengage Learning, 2012. Cyber Securirty page in Australian Government website: http://www.ag.gov. au/rightsandprotections/cybersecurity/ pages/default.aspx [6] K. Bajaj, “The Cyber Security Agenda: Mobilizing for International Action”, Report of East West Institute, NY, 2010. [7] “National Cyber Security Policy 2013”, Dept of Electronics and Information Technology( DEITY), www.deity.gov.in [8] CS2013:Computer Science Curricula 2013, ACM/IEEE Joint Task Force on Computing Curricula, Final Report 0.9, Oct 2013. [9] National Initiative on Cyber Security Careers and Education: http://niccs.uscert.gov/ [10] National Initiative on Cyber Security Education: http://csrc.nist.gov/nice/ [11] Microsoft Bounty program: http://technet. microsoft.com/en-in/security/ [12] Google Vulnerability Program: http:// www.google.co.in/about/appsecurity/ rewardprogram/ [13] Facebook Bounty Program: https://www. facebook.com/whitehat [14] T. Alpcan and T. Basar, “Network Security: A Decision and Game Theoritic Approach”, Cambridge University Press. [15] MK Sharma, “Cyber Warfare: The power of unseen”, Knowledge world Publishers, 2011. [16] Boston University, “MS in CS with Specialization in Cyber Security”, Program Brochure 2013. [17] University of Southern California, “MS in Cyber Security”, Program Brochure, 2013. n Dr. CRS Kumar is currently Head of the Department of Computer Engineering and also Chairman of Data Center in Defence Institute of Advanced Technology (DIAT), DRDO, Ministry of Defence. He has received Ph.D., M.Tech and B.E. degrees from reputed Universities/Institutes. His areas of interest are in Cyber Security, Network Security, Game Theory and Wireless Networking. He is a senior member of CSI. CSI Communications | September 2014 | 44 www.csi-india.org Security Corner Dr. Vishnu Kanhere Convener SIG – Humane Computing of CSI (Former Chairman of CSI Mumbai Chapter) Case Studies in IT Governance, IT Risk and Information Security » IT History – “A vast early warning system” : When one thinks of IT history it brings to mind a compilation of reminiscences and collective experience of people, personalities, development over the years in the field of computing and information technology. It covers stories of technology innovations, initiatives, companies, institutions, academia, professionals, computers, devices, programming languages, OOPS, GUI, the internet, a kaleidoscope offering myriad views – each different from the other. History is seen and appreciated from different perspectives by different people. It provides lessons for the future – one learns from history, yet history repeats itself. In this context it lends strength to the words of Norman Cousins, political journalist, author, professor, and world peace advocate. – “History is a vast early warning system” Looked at from this angle, what does IT History contribute to IT Governance, IT Risk and Information Security? Governance has been with us since times immemorial when early mankind organized themselves into tribes. First it was Nature and its inexorable laws. That was followed by tribal laws and customs. Back home in India it was the Indus valley civilization, the Dharma of Manu and then on to the Panchayat form of governance, Autocracy, the rule of the few, the rule of the classes and now democracy - the rule of the masses. Risk is the flip side of change which is ever present and humans have dealt with it over the years in their own ways, dealing with risk using inherited and acquired (learned) behavior and skills. From superstitions and beliefs to algorithms and enterprise risk management systems, the decision making starts where the tools, techniques and formulae end. Be it the Mantra or the Management System – it is the gut feeling that is ultimately used to take decisions. Security comes from that feeling of familiarity and a sense of freedom from fear that the child gets when nestling in the lap of the mother. The sense of protection and wellbeing is what provides security to the child. In information security this trust is provided by the triad of confidentiality, integrity and availability. Today we live in a world that is interconnected. The internet of computers is progressing to become the internet of things. The virtual world is both a reflection of and represents the real world. Human interaction and humanity has not changed much at the core. The same emotions move it, the same challenges excite and threaten it, and the same ideals, aspirations and aims drive it. What has changed is the medium of interaction of social and cultural exchange, of business and commerce, of diplomacy and dialogue. In this changed world how significant is our history? - The history of the successes and failures, of the peaks and nadirs of computing – Information Technology. Given this background the current Case in Information Systems is being presented. The facts of the case are based on the author’s own experiences and recollection of news, views and real life incidents. Although every case may cover multiple aspects it will have a predominant focus on some aspect which it aims to highlight. A case study cannot and does not have one right answer. In fact answer given with enough understanding and application of mind can seldom be wrong. The case gives a situation, often a problem and seeks responses from the reader. The approach is to study the case, develop the situation, fill in the facts and suggest a solution. Depending on the approach and perspective the solutions will differ but they all lead to a likely feasible solution. Ideally a case study solution is left to the imagination of the reader, as the possibilities are immense. Readers’ inputs and solutions on the case are invited and may be shared. A possible way forward from the author’s personal viewpoint is also presented. A Case Study of Orbit Offshore Services Rocky Smith CEO of Orbit Offshore Services planned to overhaul his information security setup. The ITES / BPO company was just recovering from a crisis. Sensitive personally identifiable information of over 40,000 customers of three of their important clients in the BFSI segment had been compromised. The investigation was still underway and various theories were being floated around, from suspected insider job by a disgruntled employee to an attack by a hacker ring supported by the mafia. Rocky believed that change has to be fundamental and wanted the information security to be built on sound foundations. The security had to be based on a sound governance framework, coupled with scientific risk management and following policies, procedures, and systems with awareness, understanding and regular monitoring and improvement. He had noticed that although the company did possess the essential certifications they were being maintained more for their own sake mechanically than in their spirit. To achieve this he had consulted Arvind an IT Security expert who was called in to meet Venkat, the CTO of the company, who also handled the information security portfolio. Venkat was surprised to see Arvind, a thin lanky man with greying hair wearing a white kurta and pajamas with a jute bag carelessly slung over one shoulder. “Looks more the literary type to me” Venkat thought to himself. Venkat was even more surprised when the conversation began. Venkat was expecting an erudite presentation about Information Security standards, protocols, tools and techniques and an action plan to protect the client data handled by the company. “Information Security is as old as our ancient civilization” began Arvind. The medium, methods, devices and the jargon has changed but we can learn a lot yet from the past. The ancient texts have a wealth of information and history teaches us a lot. One has to have an open mind and see through the superficial meaning of the words to gain an insight. Take the case of the Ramayana - it is a story for young children, a commentary on life and values for the married, a philosophy for the spiritually advanced, but it also has lessons for the information security practitioner – ‘Sita’ represents ‘data,’ reposing in the ‘Ashram hut’ a ‘hardened system’ with a ‘secure perimeter’. ‘Marich’ the demon deer’s cry was actually a ‘remote call’, the ‘Laxman rekha’ a ‘firewall.’ ‘Ravana the ‘Trojan’ used a ‘malicious code’ to access the ‘data’. ‘Jatayu’ the ‘IDS (Intrusion Detection System)’ detected and reported the incident to ‘Rama’ who was ultimately successful in recovering and securing ‘Sita’ – the ‘data’ but not before it had been ‘tested for its integrity’ by ‘Agnipariksha’. Ever given a thought to why the perimeter security, the hardened systems, the firewall and the IDS all failed at the same time and sensitive data was compromised? Arvind was of the view that to secure information one had to work at many levels. The ancients used code and layered protocols involving metaphor and a tradition CSI Communications | September 2014 | 45 that was never recorded, documented or written down, but passed to eligible tested disciples, only by word of mouth where the intonation and sound was equally important to convey the meaning, to prevent their secret sensitive mantras from falling into the wrong hands. We in modern times could not just depend on encryption and VPN alone. The first step was to have the right team who were focused, aligned and affiliated to the organization by that special bond as existed between the Guru who shared the knowledge and information and the disciple who acquired it. Even the information had to be separated such that any part of it at one location would by itself be useless and unintelligible. The information itself would be ‘intelligent’ like the ‘Astras’ of the Vedic times which did not work if they fell in the wrong hands or were attempted to be used for evil purposes. Venkat was puzzled and approached Rocky. Venkat personally felt that in these modern times it was best to keep following time tested currently accepted information security standards and techniques. Though not fool proof and despite admitting that they had failed once, he felt they were the best bet for the Company. Rocky on the other hand felt that if the approach suggested by Arvind could be integrated with the standard methodologies it would provide greater depth to their information security and make it more robust. Venkat decides to call his mentor Mr. Gopal who had taught him the basics of information security. Advice Mr. Venkat on the best strategy to follow. About the Author Solution The Situation The company has currently faced and is recovering from a major IT security incident that has affected its reputation and bottom line. It has the necessary certifications but the top management is not too confident about them and seems unsure of the security governance and risk framework. The good thing is that the CEO is proactive about the situation and intends to do a complete overhaul. The company seems to have the option of continuing on the same path albeit with more effective monitoring and greater adherence to standards and protocols, or else begin afresh by going back to the planning board. The Consequences Continuing in the same fashion with increased monitoring may not be enough for the company and it may lead to more such breaches in the future affecting the company’s business prospects and reputation. At the same time, going in for a complete overhaul from scratch and attempting to reinvent the wheel may not be a very good idea either and the costs and time it may take will make the whole exercise prohibitive. The Strategy The right strategy for the company at this stage would be 1. Understand the shortcomings of the present system - the framework, policies, practices and procedures in the context of what the IT expert has shared. The mention about history and learning lessons from it as well as the allusions to the ways of ancients to secure information are an indication, a metaphor – not to discard the present system and certifications, but to think out of the box, and understand assimilate and learn from the external and internal environment and experiences. 2. The shortcomings of the Company are probably an outcome of a mechanical application of the 2005 version of the ISMS standard which was prescriptive in nature and tried to fit one size to all. The major changes in the 2013 version not only make it less prescriptive but expect the entity to consider the external and internal context and issues. It is these inputs that provide the basis for identifying risks and threats that provide a basis for risk assessment that is relevant for the organization. The process is no longer asset centric but risk centric in terms of maintaining the CIA triad, reflected in the change from the requirement of identifying an ‘asset owner’ to a ‘risk owner’. 3. The interested parties are clients, customers, associates, regulatory authorities, shareholders and other stakeholders who have their values, perceptions and expectations. So is the business environment with its social, cultural, political, legal, regulatory, economic, financial, technological, natural and competitive environment. These relationships and key drivers and external trends and issues as well as the organization’s own internal culture, formal and informal systems, values perceptions and relationships should form the inputs for the ISMS. 4. Implemented in this manner with greater emphasis on harmonization, human resources, addressing risks and utilizing opportunities the Company would be able to address the concerns of its clients and customers, meet legal and regulatory requirements in a demonstrable way, and help satisfy stakeholder expectations at the same time meet its own objectives which will be aligned to the external environment and meet internal and external issues. This will not only result in a continual improvement of its information security governance but also enable it to successfully meet the requirements of the new 2013 version of the ISMS standard. 5. The context, the perception, the values, the expectations, the issues and the incidents both external and internal are all present in the ‘history’ and it is an easy enough starting point for the entire exercise. No wonder experts often say that ‘one learns from history.’ Yes, history is indeed ‘a vast early warning system.’ An effective solution is generally n expected to proceed on these lines. Dr. Vishnu Kanhere Dr. Vishnu Kanhere is an expert in taxation, fraud examination, information systems security and system audit and has done his PhD in Software Valuation. He is a practicing Chartered Accountant, a qualified Cost Accountant and a Certified Fraud Examiner. He has over 30 years of experience in consulting, assurance and taxation for listed companies, leading players from industry and authorities, multinational and private organizations. A renowned faculty at several management institutes, government academies and corporate training programs, he has been a key speaker at national and international conferences and seminars on a wide range of topics and has several books and publications to his credit. He has also contributed to the National Standards Development on Software Systems as a member of the Sectional Committee LITD17 on Information Security and Biometrics of the Bureau of Indian Standards, GOI. He is former Chairman of CSI, Mumbai Chapter and has been a member of Balanced Score Card focus group and CGEIT- QAT of ISACA, USA. He is currently Convener of SIG on Humane Computing of CSI and Topic Leader – Cyber Crime of ISACA(USA). He can be contacted at email id [email protected] CSI Communications | September 2014 | 46 www.csi-india.org Brain Teaser Dr. Debasish Jana Editor, CSI Communications Crossword » Test your Knowledge on IT History Solution to the crossword with name of first all correct solution provider(s) will appear in the next issue. Send your answers to CSI Communications at email address [email protected] with subject: Crossword Solution - CSIC September 2014 CLUES ACROSS 1. 5. 7. 8. 11. 14. 16. 18. 19. 22. 25. 28. 29. 30. The person who developed the Complex Number Calculator, a foundation for digital computers (6, 7) An early object typed programming language (3) Beginner’s All-purpose Symbolic Instruction Language (5) The Common Business-Oriented Language (5) Claimed as first object oriented language (6) Inventor of FLOW-MATIC, a predecessor to COBOL (5, 6) Considered as Father of Computer Science (4, 6) Stored program architecture is commonly known as this architecture (3, 7) The person who developed the logic gate (7, 5) Early use of a special card that carried digital information (5, 4) The American Standard Code for Information Interchange (5) The encryption machine used by Adolf Hitler (6) Data storage medium that used magnetic recording (8, 4) First mechanical adding machine or calculator (9) DOWN 2. Did you know why is flopply disk called as floppy? The floppy disk drive (FDD) invented at IBM by Alan Shugart in 1967,appeared as an 8-inch disk, later became smaller to 5.25-inch disk used on the first IBM PC in 1981. The name floppy was used to indicate flexibility. It could be bend enough that one could almost fold it in half. Even when it got smaller to 3.5-inch, the name remained as a legacy! Co-founder of Computer Sciences Corporation and co-creator of FORTRAN (3, 4) 3. First Indian transistorized computer developed by ISI and JU at Kolkata (5) 4. An early Online Data Processor machine developed at TIFR (5) 6. A storage medium from early days (4, 9) 9. An early high level programming languages (7) 10. Workstation that introduced the first GUI operating system (5, 4) 12. First network to use the Internet Protocol (7) 13. First Computer Programmer (3, 8) 15. The company formed by William Hewlett and David Packard (7, 7) 17. The person who built the first machine that could play chess (6, 7) 20. The person who coined the name “COBOL” (3, 5) 21. The first Indian software and management consultancy firm (3) 23. Size in inches for early floppy disks (5) 24. First computer game (8) 26. Manufacturer of first single chip microprocessor (5) 27. The first known calculator invented in Babylonia (6) Solution to August 2014 crossword (More details can be found in http://en.wikipedia.org/wiki/History_of_the_floppy_disk) We are overwhelmed by the responses and solutions received from our enthusiastic readers Congratulations! NEAR ALL correct answers to August 2014 month’s crossword received from the following readers: Dr. Jayamol Mathews (Dept of Computer Science, University of Kerala, Kariavattom, Thiruvananthapuram, Kerala), Surendra Kumar Khatri (Affiliation unknown) and V. R. Mote, Y. S. Pagar and D. T. Rathod (P. E. S. College of Engineering, Aurangabad, Maharashtra) CSI Communications | September 2014 | 47 Happenings@ICT H.R. Mohan ICT Consultant, Former AVP (Systems), The Hindu & President, CSI hrmohan.csi@gmail .com ICT News Briefs in August 2014 The following are the ICT news and headlines of interest in August 2014. They have been compiled from various news & Internet sources including the dailies - The Hindu, Business Line, and Economic Times. Voices & Views • • • • • • • A recent Crisil study expects the Indian online retail market to touch Rs. 50,000 crore by 2016 from the current Rs. 19,000 crore. Social media can make your life more productive - LinkedIn Coimbatore growing as a major IT exporter. It has managed to clock around Rs. 4,000 crore from IT exports and Industry is confident to achieve export target of Rs. 5000 crore this fiscal. IT exports from this region have grown 35-40% in the last two to three and the region has engaged over 20,000 people in the IT SEZs. GSM operators have added a total of 4.85 million subscribers in July, a 0.66% rise from the previous month, taking their total user base to 744.42 million. According to industry estimates, the global speech analytics market will reach $1.33 billion by 2019, driven largely by corporate adoption. The Indian e-commerce industry is expected to spend an additional $5001000 million on infrastructure, logistics and warehousing, leading to a cumulative spend of $950-1900 million till 2017-20 – Assocham & PWC study. . According to a study by Google and AT Kearney, India will see a major mobile explosion as the Internet user base will swell to 480 million by 2017 from 155 million at present on back of smartphone penetration, which will grow six times to reach 385 million people. Govt, Policy, Telecom, Compliance • • • • • • • The IT industry in Andhra Pradesh will have no power cuts and it will also be exempt from Labour Laws and the Shops and Establishments Act allowing for 24x7 operations throughout the year. The new IT Policy also allows the industry to utilise the services of women in night shifts. It has been declared as an Essential Service under Essential Services Maintenance Act. Spectrum held by the Defence sector should be released to mobile firms - Idea MD Telecom regulator TRAI insists on licence fee for tower firms. Government would get additional revenues of around Rs. 2,000 crore. Modi to push for changes in US Immigration Bill during his visit in Sep 2014. STPI firm on certification for export invoices. 3G spectrum: Finance Ministry asks DoT to resolve issues with armed forces. Domain names with .Bharat will be in Indian languages such as Hindi, • • • • Marathi, Konkani, Maithalai, Nepali, Boro, Dogri and Sindhi from 27th Aug. Subsequently, domain names would be given in Bengali, Telugu, Gujarathi, Urdu, Tamil and Punjabi. To create Hubli-Dharwad as the next IT destination, the Karnataka Government has selected four north Karnataka engineering colleges to set up incubation centres. Indian IT firms eye opportunities in Japan. Govt to spend Rs. 20,000 cr for mobile connectivity in villages trough NOFN. Soon, public Wi-Fi access in cities with over 1 m people. IT Manpower, Staffing & Top Moves • • • • • • • • Firms that want to set up units at the proposed IT hub at Visakhapatnam will get a subsidy of Rs. 60,000 for every job they create. In other projects, they will get a subsidy of Rs. 40,000 for a job, subject to a maximum of 80% of the land cost. Flat customer demand, mining more work from employees and oversupply of software engineers have kept the salaries of fresher’s at Rs. 3 lakhs per year, unchanged in the $108-billion IT industry for the last six years. However, with stability and growth returning, it is expected that freshers salaries will start moving upwards by 5-7% in 2015-16. Cognizant Technology Solutions recruited more employees in the quarter ended June when compared to the top three Indian IT companies. The 8,800 net new hires was the highest net addition for the company since the third quarter of 2011. KPO firm eClerx to hire 2,500 this fiscal. Polaris downsizes BPO unit by nearly 1000 on poor revenue yield. After Bollywood, the booming e-commerce industry is emerging as a big employment opportunity for creative professionals such as fashion designers, photographers, Photoshop experts, content writers, creative directors and even models. Chip-maker MediaTek plans to invest $200 m on expansion and to recruit 500 chip design engineers at Bangalore by 2017. ValueLabs wants to raise its employee strength to 8,000-9,000 from the current 3000 in two-three years. Company News: Tie-ups, Joint Ventures, New Initiatives • • CSI Communications | September 2014 | 48 Flipkart, India’s largest online retailer, is valued at an astonishing $7 billion (over Rs. 42,500 crore) on the basis of two key numbers: its 2.2 crore registered users and the Rs. 6,000-crore revenue it earns annually. IRCTC could turn out to be a hidden jewel in the Government’s asset basket, with market • • • • • • • • • • • • • • • • • • • • • • • experts valuing it from a conservative Rs. 6,000 crore to Rs. 12,000 crore. IIM-B joins edX as contributing member to deliver education via MOOCs to a large section of learners from around the world. Ratan Tata expresses interest in ‘hot’ e-commerce sector. Reported to have invested in Snapdeal. Motorola to launch smartwatch later this year. MapmyIndia launches rear-seat infotainment system. Microsoft Ventures, iSPIRT to help startups become attractive. Google is conducting experiments with the IITs to find out the best way to reach online education to a wider audience, given the varied cultures and languages in India. The Indian Institute of Information Technology (IIIT-S) has commenced academic session at it campus in Sri City, Chittoor. Amazon to build a 1.6-million square feet centre in Hyderabad for its biggest facility outside of its corporate headquarters in Seattle. Oxigen wallet, a mobile wallet from payment solutions firm Oxigen Services, is being billed as India’s first mobile wallet to enable money transfers through social networks. The Government launches eGreetings portal www.egreetings.india.gov.in . TCS, Bharti pledge Rs. 100 cr each for Modi’s ‘Clean India’ initiative. Indian start-ups bet on speech recognition tech. Offline vendors using e-comm sites for bulk buying. Online restaurant discovery site Zomato is planning to start delivering food soon. This social bot Bot-So, may watch over your home someday. The basic prototype hardware to cost Rs. 5000 with software being open source, free. Swiss cement giant Holcim may consolidate its global data centre infrastructure in a move that presents a $200-million revenue opportunity for home-bred information technology companies. Email.biz offers free website with e-mail account. Business directory for smartphones launched in Coimbatore. The download is for free and would feature 90,000 listings with 2,000 search categories. Flipkart to provide online platform for weavers. Tata Value Homes, Snapdeal tie up to sell homes online. Videocon, first Indian brand in 4K ultra HD television segment. 3D printing, big data can transform supply chain industry. Facebook partners with Vodafone India for ad tool. n www.csi-india.org CSI Report Computer Society of India CSI Golden Tech Bridge Programme The Golden Tech-Bridge is now history! The programme was well conducted across the nation on Saturday 9 August 2014. It was indeed a befitting tribute of the organization to the citizens of our country. The Student Branches captured the ideals of the event in letter and spirit, and paid attention to all aspects in detail and depth. There was participation from all segments of the community, such as housewives, elders, disadvantaged children, economically weak persons, people of different vocations, many who had not used computers, and so on. The participants and the organizing institutions have expressed satisfaction and happiness about the structure and implementation of the programme. Several participants have been motivated to the usage of computers and IT, as they realized the potential and necessity. Many expressed the need for further interventions to create a technologically familiar society, where every citizen is benefitted by IT for their day to day needs. We admire the incredible support from the CSI President, the ExecCom Members, NSC, RSCs, SSCs along all phases of the programme. The personal presence and participation of the President, OBs, NSC, RSCs, SSCs as well as several veteran members and Chapter OBs was an unparalleled encouragement and reinforcement to the activity, and a formidable testimonial of the CSI assurance and promise to the citizens of our nation. Your deep involvement in the project has been remarkable and exemplary. You made it a success by your sincere efforts and attention to all parameters of implementation. It has been a very effective team work and co-operation. The CSI Education Directorate is overwhelmed at your dedication and services and conveys the profound appreciation and gratitude for your passionate partnership and total participation in the event. Many Many Thanks from CSI – ED to you, all your colleagues, volunteers and to your management !! Together, we will continue to strive to create more of such programmes and enhance the value, reputation and glory of CSI. Rajan T Joseph CSI Education Directorate Chennai (RE GIO N-I) N-III) (REGIO BHARATI VIDYAPEETH'S INSTITUTE OF COMPUTER APPLICATIONS & MANAGEMENT - NEW DELHI (REGIO N-I) AES INSTITUTE OF COMPUTER STUDIES - AHMEDABAD (REGION (REGION-I) KRISHNA INSTITUTE OF ENGINEERING & TECHNOLOGY - GHAZIABAD N-II) (REGIO GOVT. COLLEGE OF ENGINEERING & CERAMIC TECHNOLOGY - KOLKATA DR. N.G.P INSTITUTE OF TECHNOLOGY - COIMBATORE (REGION-VII) -V) DRONACHARYA COLLEGE OF ENGINEERING - GURGAON II) ON-V (REGI SRI RAMAKRISHNA ENGINEERING COLLEGE COIMBATORE SRINIVASA RAMANUJAN INSTITUTE OF TECHNOLOGY - ANANTAPUR (REG (REGIO ION-V N-V) II) SHRI. S.S. SHASUN JAIN COLLEGE FOR WOMEN - CHENNAI RRS COLLEGE OF ENGINEERING & TECHNOLOGY - PATANCHERU (REGION-VII) (REGION-VI) ABHA GAIKWAD PATIL COLLEGE OF ENGINEERING - NAGPUR SHREE VENKATESHWARA HI-TECH ENGINEERING COLLEGE - ERODE CSI Communications | September 2014 | 49 (RE GIO N-V N-VII) II) (REGIO K.S RANGASAMY COLLEGE OF TECHNOLOGY TIRUCHENGODE SARANATHAN COLLEGE OF ENGINEERING TIRUCHIRAPALLI (REGIO N-VII) (REGION (REGION-VII) II) (REGION-VII) DR.MAHALINGAM COLLEGE OF ENGINEERING & TECHNOLOGY - POLLACHI (REGION-VII) RANGANATHAN ENGINEERING COLLEGE – COIMBATORE AMRITA SCHOOLS OF ARTS & SCIENCES - KOCHI KONGU ENGINEERING COLLEGE - ERODE (REG (REGIO ION-V N-VII) RATHINAM TECHNICAL CAMPUS COIMBATORE N-V (REGIO II) AMAL JYOTHI COLLEGE OF ENGINEERING - KOTTAYAM JAMAL MOHAMED COLLEGE TIRUCHIRAPALLI P.A. COLLEGE OF ENGINEERING & TECHNOLOGY - POLLACHI (REGION-VII) (REGION-VII) (REGION-VII) VIVEKANANDHA ENGINEERING COLLEGE FOR WOMEN - SALEM (REGION-VII) VELAMMAL INSTITUTE OF TECHNOLOGY – CHENNAI CSI Communications | September 2014 | 50 HINDUSTHAN COLLEGE OF ENGINEERING AND TECHNOLOGY COIMBATORE (REGION-VII) -VII) SRI SAI RAM INSTITUTE OF TECHNOLOGY - CHENNAI II) ON-V (REGI SNS COLLEGE OF TECHNOLOGY - COIMBATORE KNOWLEDGE INSTITUTE OF TECHNOLOGY - SALEM (REGION-VII) SARABHAI INSTITUTE OF SCIENCE & TECHNOLOGY - THIRUVANANTHAPURAM (REGION-VII) DR.M.G.R EDUCATIONAL AND RESARCH INSTITUTE - CHENNAI (REGION-VII) EINSTEIN COLLEGE OF ENGINEERING - TIRUNELVELI (REGION-VII) ERODE BUILDER EDUCATIONAL TRUST'S GROUP OF INSTITUTION – KANGAYAM www.csi-india.org CSI News From CSI Chapters » Please check detailed news at: http://www.csi-india.org/web/guest/csic-chapters-sbs-news SPEAKER(S) TOPIC AND GIST BANGALORE (REGION V) Mrs. Bhanumathi K S and Mr. B G Suresh 6 August 2014: Workshop on “Hands on Cloud Computing” Workshop covered several aspects of Cloud Computing such as What/ Why of Cloud Computing, Cloud Computing Stacks – IaaS, PaaS, and SaaS, Cloud Delivery in terms of Public / Private / Hybrid Clouds and some key contentious issues like Security, Vendor lock-in, Standardization of Cloud, Steps to migrate IT to Cloud and economics of Cloud Computing. Reference IaaS architecture from Amazon Web Services was taken and its various elements such as Elastic Computing, Simple Storage Service, Block Storage and Content Delivery Network were described. Hands-on opportunity was provided to participants to provision full blown server and to create full LAMP (Linux, Apache, MySql, PHP) stack on it. Participants could create small web page and update backend database. Participants and resource person during the workshop CHENNAI (REGION VII) Ramesh Narasimhan and Shiv Shankar 26 July2014: Workshop on “Statement of Purpose (SoP)” Half Day Workshop for admission to Universities abroad was conducted along with IEEE CS. It gave brief on five factors which decide outcome of getting admission to Master’s or Doctoral Program in a foreign University are - 1) Undergraduate record 2) Work experience or projects completed 3) GRE/GMAT/TOEFL Scores 4) Extra-curricular or Co-curricular Activities and 5) Personal Statement of Purpose(SoP). Workshop provided guidance on how to write the SoP that is successful differentiator to secure admission abroad. Students aspiring to study abroad with resource persons Ramesh Narasimhan and Shiv Shankar Maj Gen Balasubramaniam, HR Mohan, G Ramachandran, Pramod Mooriath, S Ramasamy and Parthasarahy 15 August 2014: Honouring Maj Gen Balasubramaniam – Founder Secretary of CSI As part of Golden Jubilee celebrations special meeting was organized by inviting Past Presidents, stalwarts and doyens of the Chapter on 13th Aug. Maj Gen Balasubramaniam, who was Founder Secretary in 1965 could not attend due to ill-health. So present CSI President HR Mohan along with others visited him at his residence and handed over the plaque to him and honoured him. CSI’s Founder Secretary Maj Gen Balasubramaniam being presented with Golden Jubilee Plaque at his residence Dr P Sekhar, Chairman, MicroTech Global Foundation & Advisory Board member of Cyber Security & Privacy Foundation 19 August 2013: Presentation on “Secured Governance for Techno-Economic Growth” Chapter along with Anna University, IEEE Computer Society and Cyber Security & Privacy Foundation were invited for this special presentation. The secured governance offers strategy for government to get all basic infrastructure development with negligible investment. The concept is to develop Techno Economic Corridors connecting hubs, which will act as growth centre for individual sectors. Organizers along with Dr. Sekhar and President HR Mohan CSI Communications | September 2014 | 51 CHENNAI (REGION VII) 23 August 2014: Presentation on “Intro to Cyber-Security 2014 Challenges” Dr. Col. (res.) Gabi Siboni Talk was about securing cyber-space. It provided an overview of evolving field of cybersecurity. Dr. Col. (res.) Gabi Siboni who gave the presentation is director of The Cyber Security Program at The Institute for National Security Studies, Tel Aviv University. He is a domain expert in national security, defense strategy, military technology and operation, cyber security and warfare, and a thought leader in business operations risk management. Speaker Dr. Gabi Siboni with HR Mohan & other organizers COCHIN (REGION VII) 7 May 2014: Technical Talk on “IPv6” Ms. C. Sunitha, ITS; DDG DOT (NT-KERAL) Internet has evolved into an important medium for voice and all types of data connectivity and it has put pressure on IPv4 addresses. IPv6 represents one of the most significant technology changes in the history of the Internet. With growing number of online users around the world and proliferation of smart devices, IPv4 exhaustion will become major technology issue in years to come. Since all existing IPv4-based infrastructures will continue to work after the last IPv4 address is issued, both IPv4 & IPv6 are going to coexist for some more years. To sustain seamless, pervasive connectivity with consumers, partners and businesses around the world, organizations need to be able to communicate in dual-protocol environment that will ultimately become IPv6 only. Speaker Ms. C. Sunitha TRIVANDRUM (REGION VII) Ramesh Chennithala, G Neelakantan, VK Mathews, Girish Babu, Renjith Balan, Sreekanth P Krishnan, N Vinayakumaran and C Balan 17 July 2014: Seminar on “Role of Cyber Forensics in Mitigation of Cyber Crimes” There was a session titled 'Was it a Cyber Crime? I didn’t know that!!' by Mr. Vinayakumaran Nair. There was also a session titled 'You will be caught./ You can catch. How?' By Mr. Balan. Third session was on ‘Tools and Demonstration’ also by Mr. Balan. Sessions were followed by a Panel Discussion where panel members were Mr. Jacob Punnoose, Mr. Satish Babu, Dr. Achuthsankar S Nair, Mr. Rajesh Babu, Mr. C Balan and Mr. Rajagopalan Nair Seminar inauguration by Ramesh Chennithala, Hon’ble Minister for Home Affairs, Govt. of Kerala From Student Branches » (REGION-III) IPS , COLLEGE OF TECHNOLOGY & MANAGEMENT - GWALIOR 30th July 14 : Guest Lecture on Nano Technology by Prof. Anurag Shrivastava and a section of Audience (REGION-IV) SILICON INSTITUTE OF TECHNOLOGY - BHUBANESWAR (REGION-V) ANITS CSI STUDENT BRANCH - VISAKHAPATNAM 2nd Aug, 2014 : Winner(L) and Runner up(R) 1st Aug, 2014 : Lecture on “Computability” by teams of LogiCoder with SBC Prof. Bimal Dr. Prasad Jayanthi, Professor, Dartmouth Kumar Meher(L) and Prof(Dr.) Bijan Bihari College, USA. Misra, Dean(Research) CSI Communications | September 2014 | 52 www.csi-india.org (REGION-V) VITS COLLEGE OF ENGINEERING – VISAKHAPATNAM (REGION-V) (REGION-V) ACHARYA INSTITUTE OF TECHNOLOGY - BANGALORE R.V. COLLEGE OF ENGINEERING - BANGALORE 1st Aug, 2014 : In Ethical Hacking and Security, 27th July, 2014 : SEARCC teams with Prof. Iqbal 25th & 26th July 2014,: Release of Proceeds in HOD-CSE Prof. G RajaSekharam & CSI SBC Prof. Ahmed, Dy. Director-Training & others who the National Conference on “Technological K Shankar felicitating the Speaker D Sai Satish organised Regional level contest. Advancement in Computing” (REGION-V) SRINIVASA INSTITUTE OF ENGINEERING AND TECHNOLOGY - AMALAPURAM (REGION-V) (REGION-VI) GODAVARI INSTITUTE OF ENGINEERING AND TECHNOLOGY - RAJAHMUNDRY S. N. J. B’S KBJ COLLEGE OF ENGINEERING , CHANDWAD, NASHIK 21st July, 2014 : Receiving CSI Student Branch 18th July, 2014 : In the International Conference and Institution Member certificates from Dr. K on Advanced Computer Technology, Mr. P K Rajasekara Rao Rao, ED- ONGC, ignites the lamp, SBC and Dr. V Venkata krishna , Principal are looking on (REGION-VI) (REGION-VI) 17th Aug 2014 : Prof. M R Sanghavi, Mr. Rahul Kotecha, Prof. M M Rathod, Prof. P R Bhaladare, Prof. D.P. Pawar in the Software Requirement Specification Lecture (REGION-VII) BHARATI VIDYAPEETH COLLEGE OF ENGINEERING NAVI MUMBAI R. H. SAPAT COLLEGE OF ENGINEERING, MANAGEMENT STUDIES & RESEARCH - NASIK SASTRA UNIVERSITY - KUMBAKONAM 1st Aug. 2014: Prof. Sonali Mane, Prof. S M Patil, Principal Dr. M Z Shaikh, Guest Mr. Rocky Jagtiani, Prof. D R Ingle, Prof. Vaishali Bodade(SBC). are in the “Android Application ” Workshop 28th July 2014 : Prof. N V Alone, Mr. Vinay Hinge, Dr. P C Kulkarni, Mr. Tanmay Dikshit, Mr. Paresh Chitnis, Prof. Archana Vaidya during the Seminar on “Digital Forensics & IT Security” 1st Aug,.2014 : Seminar on “I.T – Best Practices “ by Dr. V S Shankar Sriram, Dept. of Information Technology, School of Computing, SASTRA University, Thanjavur. (REGION-VII) (REGION-VII) (REGION-VII) ER. PERUMAL MANIMEKALAI COLLEGE OF ENGINEERING - HOSUR EINSTEIN COLLEGE OF ENGINEERING, - TIRUNELVELI CSI STUDENTS’ BRANCH, AVS ENGINEERING COLLEGE - SALEM 19th Aug, 2014: Special address by Principal Dr.S.Chitra on “YOUR UNIQUE IDENTITY”‘ seminar conducted by Mr.Y.Kathiresan, Senior Manager CSI ED 8th Aug, 2014 : Mr. Jegan Vincent, Dr. R 18th July, 2014 : Lecture on “Self evelopment” by Velayudham, Mr. NK MalarChelvan, Prof. A Mr. V P Soundararajan, Triumphant Institute of Amudhavanan, Dr. K Ramar during the seminar Management Education on “Guidelines for smart performance in the technical interview”. CSI Communications | September 2014 | 53 (REGION-VII) ADHIYAMAAN COLLEGE OF ENGINEERING – HOSUR (REGION-VII) E.G.S PILLAY ENGINEERING COLLEGE NAGAPATTINAM 25th March, 2014 : National Workshop on 9th Aug, 2014 : Dignitaries with Dr. Rajkamal, “Web Designing Tools” inaugurated by Dr. N S Chennai who delivers a lecture about “An Insight Badarinarayanan, Dean with Mr. StephenRaj, on Academic Projects” Ads-e-Park, Chennai . DR. NAVALAR NEDUNCHEZHIYAN COLLEGE OF ENGINEERING - THOLUDUR 2nd Aug, 2014: Mr. N Karthikeyan Head – Operations of Dream Effects Multimedia & IT Solutions, Chennai delivered the lecture on the topic “WORDPRESS (an open source)” CSI EDUCATION DIRECTORATE, CHENNAI (REGION-VII) NATIONAL ENGINEERING COLLEGE - KOVILPATTI (REGION-VII) 12th AUGUST, 2014 18th July, 2014: Mr. S.P.Soman RVP 7 along with Organisers with Mr. Kathiresan, Sr. Mgr, CSI ED, Mr.J.Jerart Julus, Dr.Kn. K.S.K.Chockalingam, at CSI Stall during Micro Entrepreneurship Expo Dr.Manimegalai, Prof L.M.Nirmal Lakshman by Puthiaya Thalaimurai Foundation in which CSI is a knowledge partner CSI Communications | September 2014 | 54 15th AUGUST, 2014 Independence Day was celebrated by Hoisting the National Flag by Mr. G. Ramachandran , Past Vice President and CSI Flag by Mr. H.R. Mohan, President www.csi-india.org Application for Travel Grants for Researchers Research Committee of Computer Society of India has decided to partly fund CSI Life Members to the extent of Rs. 25000/ for travelling abroad to present research papers at conferences. CSI Life Members who have been invited to present papers abroad and have received partial or no funding are eligible to apply for the same. They have to apply within December 31, 2014 to [email protected] and furnish: 1. 2. 3. 4. 5. 6. 7. 8. 9. Name of the Applicant, Organization Details and Bio Data of Applicant CSI Life Membership Number Name of the International Conference with details of the organizers Conference Venue and Date Copy of the Research Paper Copy of the Invitation Letter received from the organizers Details of funding received from/applied to for funding to any other agency Justification for requesting support (in 100 words). Two References (including one from head of the organization) Dr Anirban Basu Chairman, CSI Division V (Education and Research) CSI Communications | September 2014 | 55 CSI Calendar 2014 Date Prof. Bipin V Mehta Vice President, CSI & Chairman, Conf. Committee Email: [email protected] Event Details & Organizers Contact Information September 2014 events 19–20 Sep 2014 Two Day e-Seminar on Steps 2 Research conducted by Amal Jyothi College of Engineering, Shyam Gopi Computer Science & Engineering and Computer Applications in technical partnership with [email protected] the ISTE Kerala section and the CSI Cochin Chapter through AVIEW www.amaljyothi.ac.in 27 Sep 2014 ETIR-2014: National Workshop on “Emerging Trends in Information Retirival” at Mathura. [email protected] Organised by GLA University in technical association with CSI Mathura, Div I & Region I. http://www.gla.ac.in/IRWorkshop/ October 2014 events 10–11 Oct 2014 A conference on Advances in Cloud Computing (ACC) with special emphasis on Internet of Organizing Committee Things (IoT) organised by CSI Pune Chapter at Pune. http://csi-acc.in/ [email protected] 31 Oct–1 Nov 2014 National Seminar is “Web Technologies & Communication: Recent Trends and Social Sreeprakash T Impacts”., Cochin. Call for Papers. Details available at http://webcon2014.org/ [email protected] November 2014 events 14–16 Nov 2014 International Conference On Emerging Computing Technologies-2014 (ICECT-2014) Organized by Dept. of Computer Science and Applications, M. D. University, Rohtak in association with CSI Region – I and CS Division – I. 14–16 Nov 2014 International Conference on Information and Communication Technology for Competitive Prof. Amit Joshi strategies (ICTCS-2014) Organized by: Computer Society of India, Udaipur Chapter, Division Organizing Secretary IV, I, SIG-WNs ,Hosted by: Sunrise Group of Institutions, Udaipur. [email protected] http://www.csi-udaipur.org/ictcs-2014 28–30 Nov 2014 International Conference on Advance in Computing Communication and Informatics at COER Dr. Vishal Singhal, Convener School of Management, Roorkee , Uttrakhand http://coer.ac.in/ICACCI2014/index.html [email protected] Prof. R S Chhillar [email protected] December 2014 events 10–11 Dec 2014 49th Annual Student Convention, Organised by Computer Society of India, Hyderabad Chapter In association with GNIT, Hyderabad. Theme: “ Campus to Corporate” Venue: GNIT, Ibrahimpatnam, Rangareddy District Telangana. http://www.csihyderabad.org/csi-2014 12–14 Dec 2014 49th Annual Convention ,Organised by Computer Society of India, Hyderabad Chapter In Sri .J. A. Chowdary association with JNTU-Hyderabad & DRDO. Theme: Emerging ICT for Bridging Future Sri. Gautam Mahapatra Venue: JNTUH, Kukatpally, Hyderabad http://www.csihyderabad.org/csi-2014 [email protected] 12–14 Dec 2014 Special session on “Cyber Security and Digital Forensics” during Computer Society of India Dr. Vipin Tyagi Annual Convention - 2014 by CSI Special Interest Group on Cyber Forensics, JNTU Hyderabad [email protected] 16–20 Dec 2014 ICISS-2014: International Conference on Information Systems Security. At Institute for [email protected] Development & Research in Banking Technology (IDRBT), Hyderabad, India. Co-sponsored by CSI Division IV and CSI SIG-IS. http://www.idrbt.ac.in/ICISS_2014/ 19–21 Dec 2014 EAIT-2014: Fourth International Conference on Emerging Applications of Information Technology at Kolkata. Organized by CSI Kolkata at Indian Statistical Institute, Kolkata https://sites.google.com/site/csieait/ For paper submission : https://cmt.research.microsoft.com/EAIT2014 22–24 Dec 2014 ICHPCA-2014: International Conference on High Performance Computing and Applications Prof. (Dr .) Rachita Misra Organized by: CV Raman College of Engg. in association with CSI Div-V and IEEE Kolkata [email protected] Section http://www.ichpca-2014.in/ Dr. D D Sarma, Shri Raju Kanchibhotla Shri Chandra Sekhar Dasaka. http://www. csihyderabad.org/csi-2014 Prof. Aditya Bagchi Dr. Debasish Jana Prof. Pinakpani Pal Prof. R T Goswami [email protected] March 2015 events 11–13 Mar 2015 9th INDIACom; 2015 2nd International Conference on “Computing for Sustainable Global Prof. M N Hoda Development” Organized by Bharati Vidyapeeth’s Institute of Computer Applications and co n fe re n ce @ bv i c a m . a c . i n , Management (BVICAM), New Delhi [email protected] CSI Communications | September 2014 | 56 www.csi-india.org Registered with Registrar of News Papers for India - RNI 31668/78 Regd. No. MH/MR/N/222/MBI/12-14 Posting Date: 10 & 11 every month. Posted at Patrika Channel Mumbai-I Date of Publication: 10 & 11 every month If undelivered return to : Samruddhi Venture Park, Unit No.3, 4th floor, MIDC, Andheri (E). Mumbai-400 093 Computer Society of India has been honouring academic excellence through Academic Awards every year. The awards will be presented during the CSI Annual Convention to be held from 12th to 14th December, 2014 at Hyderabad. Applications are invited for the following awards for the period from April 2013 to June 2014 from the accredited student branches who meet the criteria and are currently in good standing. Sl. No. Name of the Award Criteria To be submitted by 1. Best Accredited Student Branch Award Good standing – during the award year and currently, large student strength & large number of activities as defined in the specified form Student Branch Counsellor (SBC) 2. Largest Student Branch Award Continuous good standing for the past 3 years with highest 3 years averaged strength Decided by ED 3. Best CSI International Students Event Host Award Institutional member hosted maximum students competition participated by minimum 10 foreign students SBC 4. Highest Sponsorship of CSI Events Award Institutional member extending maximum support for CSI events during the award year SBC 5. Longest Continuous SBC Award Longest continuous tenure as SBC over the last 3 years SBC 6. Faculty with maximum publishing in CSI Publications Publishing maximum articles in CSI publications during the award year Self 7. Paper Presenter at International Conference for Faculty Presentation of paper at prestigious International Conferences during the award year Self 8. Students with maximum publishing – CSI publications Publishing maximum articles in CSI publications during the award year SBC 9. Highest Committed Accredited Student Branch Activist Award Most active CSI Volunteer from the Student Branch during the award year SBC 10. Best Ph D Thesis Award CSI member, who submitted a high-quality thesis (Thesis quality to be evaluated by a panel of eminent research scientists) leading to acceptance for Ph D degree by a recognized University Research Scholar (who got the Ph D during the award year) / the Research Supervisor / Current Employer The applications for the awards are invited only from the CSI members or from CSI Accredited CSI Student Branches in good standing during the current year as well as during the Award year. Application Forms are available at http://www.csi-india.org/web/guest/academic-excellence-awards. The applications should reach Education Directorate as specified in the forms, latest by 6th October 2014. The Awardees will be invited to attend CSI 2014 @ Hyderabad and receive the awards in person. Regional Vice Presidents, RSCs, SSCs, SBCs and Chapter OBs are requested to give wide publicity and encourage applications. Please submit the applications for awards to [email protected], Awards Committee Rajan T Joseph Director (Education) Prof S.V. Raghavan - Chairman Prof Anirban Basu - Member Prof A K Nayak - Member Prof R P Soni - Member Ms. Mini Ulanat National Students’ Coordinator CSI Communications | September 2014 | 57