CSIC 2014( September ) - Computer Society Of India

Transcription

CSIC 2014( September ) - Computer Society Of India
` 50/ISSN 0970-647X | Volume No. 38 | Issue No. 6 | September 2014
www.csi-india.org
The Doyen's Recollections
(Reminiscences of
Prof. V. Rajaraman) 7
Research Front
Parallel Computing with Message
Passing Interface-Part II 32
Cover Story
History of the Computers,
GUI and Devices 19
Security Corner
A Review of Cyber Security
Curriculum in Indian Context 38
Cover Story
Looking Back at the
Evolution of the Internet 21
Security Corner
A Case Study of Orbit
Offshore Services 41
CSI Communications | September 2014 | 1
CSI-2014 STUDENT CONVENTION
Hosted by and at:
Guru Nanak Institutions Technical Campus
(Formerly Guru Nanak Engineering College)
(Affiliated to Jawaharlal Technological University, Hyderabad)
Ibrahimpatnam, Hyderabad.
Theme: Campus to Corporate and Beyond
Dates: 10 - 11 December 2014
As a part of Golden Jubilee Celebrations of Computer Society of India and 49th Annual Convention of Computer Society of India, the Student Convention
of CSI will be held at Guru Nanak Institutions Technical Campus, Ibrahimpatnam, Hyderabad..
Last date for submission of papers: Nov 10, 2014.
Fees (incl of Service Tax) for registration: Rs. 400 for CSI members and Rs. 500/- for non-CSI members. There is no fees for paper presentations.
Papers should be submitted in A4 paper size and as per IEEE format and sent by e-mail given below. Acceptances of the papers will be communicated
on or before 15th November, 2014.
Free Accommodation will be made available from 9th night to 11th Dec., 2014 evening at Guru Nanak Institutions, Ibrahimpatnam, Hyderabad or nearby venue.
For further details contact:
[email protected]
CSI Communications - Call for Articles for forthcoming issues
Please note that Cover Themes for forthcoming issues are planned as follows:
•
October 2014 - SMAC (Send your articles for October 14 issue latest before 23rd September 2014)
•
November 2014 – Visualization Technologies
•
December 2014 – Algorithmic Computing
•
January 2015 – IT Infrastructure
•
February 2015 – Quantum Computing
•
March 2015 – Machine Translation
In order to provide a fair opportunity to all for contribution, we are making an open appeal to all of you to send your articles for CSI Communications magazine.
Kindly note that the Editorial Board of CSI Communications is looking for high quality technical articles for different columns pertaining to the above themes
or other themes of emerging and current interests. The articles should cover all aspects of computing, information and communication technologies that
should be of interest to readers at large and member fraternity of CSI and around. The articles shall be peer reviewed by experts decided by the Editorial
Board and the selected ones shall be published. Both theoretical and practice based articles are welcome but not research papers. The articles and
contributions may be submitted in the following categories: Cover Story, Research Front, Technical Trends and Article.
CIOs/Senior IT/IS personnel/consultants of the companies, who are managing technologies/projects related to the cover themes are welcome to contribute
under the CIO Perspective - Managing Technology section. Similarly, HR Senior Managers/ Personnel/ Consultants are invited to contribute under HR section.
Letters to the Editors for ReaderSpeak(), questions to be answered in Ask an Expert, your experience of Programming Tips under the Practitioner Workbench:
Programming.Tips(), your memories of yesteryears of computing for IT.Yesterday(), theme based crossword puzzle and theme based cartoon for Brain Teaser
column are also welcome.
Here are article submission guidelines for your information:
•
The articles may be long (2500-3000 words) or short (1000-1500 words) authored in as the original text. (Plagiarism is strictly prohibited.)
•
The articles may be sent to the CSI Editorial Board via email [email protected].
•
All manuscripts should be written at the level of the general audience of varied level of members.
•
Equations and mathematical expressions within articles are not recommended, however, if absolutely necessary, should be minimum.
•
List of references is preferred and it is recommended that list not more than 10 references at the end of your manuscript. Please don’t include
any embedded reference numbers within the text of your article. If you would to like to refer, you may state names in the text and provide full
reference at the end. The reference must state the names of the authors, title, publisher’s name, complete publication reference with month and
year. Web URLs should be there for website references with accessed date.
•
Figures and Images used should be limited to maximum of three (only high resolution images need to be sent, and the image needs to be sent
separately also).
•
Only MS-Word and PDF submissions are allowed.
•
Include a brief biography of four to six lines for each author with author picture (high resolution).
•
Please note that Editors will edit the contents as felt necessary.
•
Editorial board will notify the authors of selected articles and authors will be asked to fill up the copyright transfer form before accepting the article.
Please note that months for various cover themes are tentative and may change depending on prevailing circumstances.
(Issued on behalf of Editorial Board of CSI Communications)
CSI Communications | September 2014 | 3
CSI Communications
Contents
Volume No. 38 • Issue No. 6 • September 2014
Editorial Board
Chief Editor
Dr. R M Sonar
Editors
Dr. Debasish Jana
Dr. Achuthsankar Nair
Resident Editor
Mrs. Jayshree Dhere
Published by
Executive Secretary
Mr. Suchit Gogwekar
For Computer Society of India
Design, Print and
Dispatch by
CyberMedia Services Limited
Please note:
CSI Communications is published by Computer
Society of India, a non-profit organization.
Views and opinions expressed in the CSI
Communications are those of individual authors,
contributors and advertisers and they may
differ from policies and official statements of
CSI. These should not be construed as legal or
professional advice. The CSI, the publisher, the
editors and the contributors are not responsible
for any decisions taken by readers on the basis of
these views and opinions.
Although every care is being taken to ensure
genuineness of the writings in this publication,
CSI Communications does not attest to the
originality of the respective authors’ content.
© 2012 CSI. All rights reserved.
Instructors are permitted to photocopy isolated
articles for non-commercial classroom use
without fee. For any other copying, reprint or
republication, permission must be obtained
in writing from the Society. Copying for other
than personal use or internal reference, or of
articles or columns not owned by the Society
without explicit permission of the Society or the
copyright owner is strictly prohibited.
7
8
The Doyen's Recollection
Prof. Dr. V Rajaraman: A brief
biographical sketch
19
21
25
Strolling Down the Memory Lane
32
Parallel Computing with Message
Passing Interface
The First Book on Programming in India
How Computer Society of India got
its Name
9
10
12
30
Dr. S. Natarajan
Research Front
Manu K. Madhu and Biji C.L.
How the MCA Programme Started
History of the Establishment of the
Centre for Development of Advanced
Computing
Time-Line – Development of Computing
in India (1955-2010)
Dr. V Rajaraman
Cover Story
History of the Computers, GUI and
Devices
Radharaman Mishra
Looking Back at the Evolution of the
Internet
Hardik A Gohel
A Brief History of BIDW (Business
Intelligence and Data Warehousing)
36
37
38
Practitioner Workbench
Programming.Tips() »
Fun with C
Amitava Nag
Programming.Learn(“R”) »
Regression Analysis with R
Umesh P and Silpa Bhaskaran
Security Corner
Information Security »
A Review of Cyber Security
Curriculum in Indian Context
C. R. Suthikshn Kumar
41
Case Studies in IT Governance, IT Risk
and Information Security »
A Case Study of Orbit Offshore
Services
Dr. Vishnu Kanhere
Mr. K. V. N. Rajesh and Mr. K. V. N. Ramesh
PLUS
User Readership Survey 2014: CSI Communications & Members Data Updation
Brain Teaser
Dr. Debasish Jana
Happenings@ICT
26
43
H R Mohan
44
CSI Report - CSI Golden Tech Bridge Program
45
CSI News
47
Published by Suchit Gogwekar for Computer Society of India at Unit No. 3, 4th Floor, Samruddhi Venture Park, MIDC, Andheri (E), Mumbai-400 093.
Tel. : 022-2926 1700 • Fax : 022-2830 2133 • Email : [email protected] Printed at GP Offset Pvt. Ltd., Mumbai 400 059.
CSI Communications | September 2014 | 4
www.csi-india.org
Know Your CSI
Executive Committee (2013-14/15)
President
Mr. H R Mohan
[email protected]
»
Vice-President
Prof. Bipin V Mehta
[email protected]
Hon. Secretary
Mr. Sanjay Mohapatra
[email protected]
Hon. Treasurer
Mr. Ranga Rajagopal
[email protected]
Immd. Past President
Prof. S V Raghavan
[email protected]
Nomination Committee (2014-2015)
Prof. P. Kalyanaraman
Mr. Sanjeev Kumar
Mr. Subimal Kundu
Region - I
Mr. R K Vyas
Delhi, Punjab, Haryana, Himachal
Pradesh, Jammu & Kashmir,
Uttar Pradesh, Uttaranchal and
other areas in Northern India.
[email protected]
Region - II
Mr. Devaprasanna Sinha
Assam, Bihar, West Bengal,
North Eastern States
and other areas in
East & North East India
[email protected]
Region - III
Prof. R P Soni
Gujarat, Madhya Pradesh,
Rajasthan and other areas
in Western India
[email protected]
Region - V
Mr. Raju L kanchibhotla
Karnataka and Andhra Pradesh
[email protected]
Region - VI
Dr. Shirish S Sane
Maharashtra and Goa
[email protected]
Region - VII
Mr. S P Soman
Tamil Nadu, Pondicherry,
Andaman and Nicobar,
Kerala, Lakshadweep
[email protected]
Division-I : Hardware (2013-15)
Prof. M N Hoda
[email protected]
Division-II : Software (2014-16)
Dr. R Nadarajan
[email protected]
Division-III : Applications (2013-15)
Dr. A K Nayak
[email protected]
Division-IV : Communications
(2014-16)
Dr. Durgesh Kumar Mishra
[email protected]
Division-V : Education and Research
(2013-15)
Dr. Anirban Basu
[email protected]
Regional Vice-Presidents
Division Chairpersons
Region - IV
Mr. Hari Shankar Mishra
Jharkhand, Chattisgarh,
Orissa and other areas in
Central & South
Eastern India
[email protected]
Publication Committee (2014-15)
Dr. S S Agrawal
Prof. R K Shyamasundar
Prof. R M Sonar
Dr. Debasish Jana
Dr. Achuthsankar Nair
Dr. Anirban Basu
Prof. A K Saini
Prof. M N Hoda
Dr. R Nadarajan
Dr. A K Nayak
Dr. Durgesh Kumar Mishra
Mrs. Jayshree Dhere
Chairman
Member
Member
Member
Member
Member
Member
Member
Member
Member
Member
Member
Important links on CSI website »
About CSI
Structure and Orgnisation
Executive Committee
Nomination Committee
Statutory Committees
Who's Who
CSI Fellows
National, Regional & State
Student Coordinators
Collaborations
Distinguished Speakers
Divisions
Regions
Chapters
Policy Guidelines
Student Branches
Membership Services
Upcoming Events
Publications
Student's Corner
CSI Awards
CSI Certification
Upcoming Webinars
About Membership
Why Join CSI
Membership Benefits
BABA Scheme
Special Interest Groups
http://www.csi-india.org/about-csi
http://www.csi-india.org/web/guest/structureandorganisation
http://www.csi-india.org/executive-committee
http://www.csi-india.org/web/guest/nominations-committee
http://www.csi-india.org/web/guest/statutory-committees
http://www.csi-india.org/web/guest/who-s-who
http://www.csi-india.org/web/guest/csi-fellows
http://www.csi-india.org/web/guest/104
http://www.csi-india.org/web/guest/collaborations
http://www.csi-india.org/distinguished-speakers
http://www.csi-india.org/web/guest/divisions
http://www.csi-india.org/web/guest/regions1
http://www.csi-india.org/web/guest/chapters
http://www.csi-india.org/web/guest/policy-guidelines
http://www.csi-india.org/web/guest/student-branches
http://www.csi-india.org/web/guest/membership-service
http://www.csi-india.org/web/guest/upcoming-events
http://www.csi-india.org/web/guest/publications
http://www.csi-india.org/web/education-directorate/student-s-corner
http://www.csi-india.org/web/guest/csi-awards
http://www.csi-india.org/web/guest/csi-certification
http://www.csi-india.org/web/guest/upcoming-webinars
http://www.csi-india.org/web/guest/about-membership
http://www.csi-india.org/why-join-csi
http://www.csi-india.org/membership-benefits
http://www.csi-india.org/membership-schemes-baba-scheme
http://www.csi-india.org/special-interest-groups
Membership Subscription Fees
Membership and Grades
Institutional Membership
Become a member
Upgrading and Renewing Membership
Download Forms
Membership Eligibility
Code of Ethics
From the President Desk
CSI Communications (PDF Version)
CSI Communications (HTML Version)
CSI Journal of Computing
CSI eNewsletter
CSIC Chapters SBs News
Education Directorate
National Students Coordinator
Awards and Honors
eGovernance Awards
IT Excellence Awards
YITP Awards
CSI Service Awards
Academic Excellence Awards
Contact us
http://www.csi-india.org/fee-structure
http://www.csi-india.org/web/guest/174
http://www.csi-india.org /web/guest/institiutionalmembership
http://www.csi-india.org/web/guest/become-a-member
http://www.csi-india.org/web/guest/183
http://www.csi-india.org/web/guest/downloadforms
http://www.csi-india.org/web/guest/membership-eligibility
http://www.csi-india.org/web/guest/code-of-ethics
http://www.csi-india.org/web/guest/president-s-desk
http://www.csi-india.org/web/guest/csi-communications
http://www.csi-india.org/web/guest/csi-communicationshtml-version
http://www.csi-india.org/web/guest/journal
http://www.csi-india.org/web/guest/enewsletter
http://www.csi-india.org/csic-chapters-sbs-news
http://www.csi-india.org/web/education-directorate/home
http://www.csi-india.org /web/national-studentscoordinators/home
http://www.csi-india.org/web/guest/251
http://www.csi-india.org/web/guest/e-governanceawards
http://www.csi-india.org/web/guest/csiitexcellenceawards
http://www.csi-india.org/web/guest/csiyitp-awards
http://www.csi-india.org/web/guest/csi-service-awards
http://www.csi-india.org/web/guest/academic-excellenceawards
http://www.csi-india.org/web/guest/contact-us
Important Contact Details »
For queries, correspondence regarding Membership, contact [email protected]
CSI Communications | September 2014 | 5
President’s Message
H R Mohan
From
: President’s Desk:: [email protected]
Subject : President's Message
Date
: 1st September, 2014
Dear Members
I am happy to inform that the National Final Competition for Young
Talent Search Computer Programming 2014 was successfully conducted at
the Rajalakshmi Engineering College (REC) on 31st Aug 2014 with CSI veterans
Mr. G. Ramachandran, Mr. S. Venkatakrishnan and Ms. Latha Ramesh as judges.
Ten teams selected out of 200+ from the prelims conducted at 21 centres across
the country participated in the finals. While the team from St. Jude’s Public School
& Junior College, Kotagiri stood first, the team from Rishy Valley School (KFI).
Madanapalle was the runner up. I could witness the keen & competitive interest
of the teams participated in the contest. Cash awards along with trophies were
presented to both the winning teams who will represent India in the SEARCC
ISSC-2014 to be held at Chennai during October 2014. Let us wish these teams
all the very best in the ISSC-2014. Our thanks to the management of REC
for supporting the contest for several years and also for consenting to host
ISSC-2014.
The Div IV supported International Conference on Innovations in
Computer Science & Engineering – ICICSE 2014 took place at Gurunanak
Institutions at Hyderabad during 8-9, Aug 2014. The conf. attracted about 200
papers of which 60 were presented in parallel sessions. The conf. proceedings
of the papers presented and the souvenir with the abstracts of all the papers
submitted have come out very well and they are being added in our reference
library at CSI ED. Dr. H.S. Saini & Dr. D.D. Sarma and their team had run the
conf. in a splendid manner and this has given us the confidence that the Student
Convention to be hosted by GNI during CSI 2014 is in safe hands. Vice President
Mr. Bipin Mehta and the Chair, Div Iv Dr. Durgesh Kumar Mishra participated in
the conf. along with the President.
Hyderabad witnessed one more event supported by CSI – a National
Workshop on Big Data – BiDA2014 which was held during 22-24, August
2014 at CR Rao Advanced Institute of Mathematics, Statistics and Computer
Science. This intensive workshop inaugurated by the CSI President had invited
talks on various aspects of Big Data from seasoned academic and professional
community such as IIITH, IISc, UOH, BITS, AIMSCS, CDAC and hands-on
sessions at Centre for Modelling, Simulation and Design at Univ. of Hyderabad.
Dr. Saumyadipta Pyne, the key anchor for this workshop has in principle agreed
to run similar workshops and also an online course for CSI through the proposed
Special Interest Group on Data Science and Analytics or joining with the existing
SIG DATA.
Dr. Bagga and Dr. Ashok Agarwal, the veterans who had played major
roles in organizing few highly successful CSI annual conventions at Hyderabad
had organised a brainstorming session at IIITH on 22nd Aug in connection
with the eGovernance Track and Knowledge Sharing Summit during CSI 2014.
It may be noted that CSI eGovernance State/Project Awards are being given
during annual conventions for the last 12 years and the SIG eGOV has been
spearheading the major activities in sharing knowledge in eGov domain in
Knowledge Sharing Summits. Along with the President, CSI 2014 team and the
eGov awards team consisting of Dr. Surendra kappor, Dr. Harish Iyer and Mr.
Vijaya Sekhar deliberated on the modalities and the events to be organized in
the context of divided Andhra. All the teams were sensitized to organize a great
eGov awards event at CSI 2014.
The CSI ED supported Golden Tech Bridge event held on 9th Aug was
a great success and it has made a significant impact among the public at
large. Over 60 institutions organized this programme which was attended by
housewives, retired people, people from lower strata including shopkeepers and
auto drivers. Apart from providing basic computer skills and knowledge, the
participants were taught how to use various eServices of the Govt., railway ticket
booking, online banking etc., The reports received from the institutions highlight
the appreciations by the participants and the demand to run similar events at
regular intervals. This is a great step towards bridging the digital divide. While
we have a long way to go. I am sure with the support of our SBs we can achieve
our objectives.
In the EXCO of the SEARCC held at Colombo on 28th Aug, the possibility
of hosting the SEARCC 2014 by Malaysia was discussed. As MNCC had
expressed their inability to host the event in 2014 and the possibility of
organizing it during Feb 2015 only, it was decided to run SEARCC 2014 in online
mode with few online video streaming sessions covering technology trends and
country initiatives presented by SEARACC member counties. India, Australia
and Srilanka have come forward to take this initiative forward and make it a
standard feature to share the knowledge among its members. The undersigned
suggested that these online sessions relating to SERACC 2014 may be organized
in the first week of Dec 2014 to coincide with CSI 2014 at some convenient time
CSI Communications | September 2014 | 6
to suit all the SEARCC economies. Few divisions and SIGs may plan for these
SEARCC 2014 online events. Depending on the success of this initiative, it was
deliberated whether we can make SEARCC conf. an online only event involving
other economies also to make them participate to start with and facilitating
them to become members of SEARCC subsequently. As the World Computer
Congress WCC-2015 of IFIP is being held in South Korea, the SEARCC 2015 may
become the first full-fledged online conference.
On the invitation from the Computer Society of Sri Lanka, the undersigned
attended and presented a session on “ICT growth and challenges in India” in their
annual flagship event National Information Technology Conference NITC-2014
held prior to SEARCC EXCO during 25-27 Aug 2014. The inauguration ceremony
of the NITC-2014 was held at the Main Conference Hall of the Bandaranaike
International Conference Hall (BMICH), Colombo and was attended by about
800 participants. The conference had 15 international speakers including
Mr. Leon Strous, IFP President, Mr. H.R. Mohan, CSI President, Ms Brenda Aynsley,
ACS President, Prof. Tim Unwin, Secretary General of the Commonwealth
Telecommunication Organisation & Unesco chair In ICT4D, Mr. Tim Greisinger,
Vice President, IBM, Mr. Anthony Ming, Adviser (Informatics), Commonwealth
Secretariat, Dr. Nick Tate, Imm. Past President, ACS, Mr. Yohan, Secretary
General, SEARCC. Considering the relevance of CHOGM 2013 theme “Growth
and Equity: Inclusive Development”, NITC 2014 was positioned as an ICT forum
for commonwealth nations organized by the Computer Society of the CHOGM
host country to create a platform to deliberate on the role of ICT in citizen centric
development in the commonwealth beyond Millennium Development Goals
(MDG) of which deadline reaches in 2015. The conference agenda has focused
deliberations on topics relevant to commonwealth countries on developing
a collaborative and connected commonwealth to share ICT knowledge and
resources to synergize efforts to advance the social development.
As the revenues from IT services are under stress, the only way to achieve
our projected growth in IT revenues is by innovation and IP development. In this
context, it is a timely initiative by CSI Kochi to start an innovation hub on an
experimental basis with the support of Startup Village at Kochi. Mr. Santosh
Kumar, Secretary of CSI Kochi is taking the lead in this initiative. Based on its
success, we would like to replicate it in other chapters.
I am happy to note that the newly formed SIGs – Indic Computing and
Technology Enhanced Learning are coming out with their newsletters – “Indic
News” and “Title” respectively. Thanks to Dr. B. Kannan and Dr. M. Sasikumar for
their sustained interest in SIG activities. Members may look forward to receive
them soon.
Digital India, the dream project of our PM, announced in Aug 2014 will
be the umbrella programme for the government’s initiatives in the area Digital
Literacy for all and transparent eGovernance and will entail an expenditure of
Rs 1.13 lakh crore in existing and new plans. More about Digital India initiatives
in the next month.
Let us promote the individual life membership in CSI at a 15% discount
being offered for a limited period from 1st Aug to 31st Dec 2014.
With best regards
H R Mohan
President
Computer Society of India
www.csi-india.org
Editorial
Rajendra M Sonar, Achuthsankar S Nair, Debasish Jana and Jayshree Dhere
Editors
Dear Fellow CSI Members,
We are glad to bring this special issue on IT History to you. Our
previous issue on this theme had seen tremendous inflow of
contributions and also many responses from readers. We had
decided at that time itself that we would repeat the history theme
once again and so there is this special issue on IT History for all
of you. It’s an absolute pleasure to put on record that this time
also we received a good response for this theme in terms several
contributions. This month’s highlight is many reminiscences of the doyen of Indian
computing fraternity, Prof. V. Rajaraman. In the special section
called “The Doyen’s Recollections”, we have an assortment of 5
crisp articles by Prof. Rajaraman, which spans the academia, R & D
and also CSI itself. These articles - “The First Book of Programming
in India”, “How CSI got its name”, “How MCA program started”,
“Establishment of CDAC” and “Timeline of development of
computing in India” are all collectors’ pieces. We are sure that
these articles have made this issue a very precious one. In addition to Prof. Rajaraman’s contributions, under the Cover
Story section, we have four articles. First is on “History of
Computers, GUI and Devices” written by Radharaman Mishra
of iGate. This is a very well-written article that describes history
and timeline of computers and related devices through various
generations and also peeks into the future at the end. Second
article is on “Looking Back at the Evolution of Internet” by Hardik
Gohel. It tells us about the history of the Internet and of course
the Web which greatly revolutionalized the way information is
accessed today online all over the globe. The article talks about
electronic mail, social networking, various versions of Web – Web
1.0, Web 2.0, Web 3.0 (Semantic Web) etc and finally speaks
about the future of the Web in terms of Web Intelligence.
The third article under the cover story section is about “Brief
History of BIDW (Business Intelligence and Data Warehousing)”
written by K.V.N. Rajesh and K.V.N. Ramesh. The article traces the
timeline of how BIDW technology has come way forward from
the time of advent of computers to the state in which we see it
now and concludes saying that the usage and support for BIDW
in Businesses is only expected to grow in future. The fourth article
“Strolling down the Memory Lane” is written Dr. S. Natarajan, who
takes us 42 years back in time when he worked in DRDL and tells
us about the way computing was being done then.
Our Research Front section carries an article titled “Parallel
Computing with Message Passing Interface” written by Manu
K. Madhu and Biji C.L. The article is continuation of the first part
which was published in last month’s issue i.e. CSIC August 2014
This month’s highlight is many reminiscences of
the doyen of Indian computing fraternity, Prof.
V. Rajaraman. In the special section called “The
Doyen’s Recollections”, we have an assortment
of 5 crisp articles by Prof. Rajaraman, which spans
the academia, R & D and also CSI itself.
issue. The first part provided introduction to parallel computing
and use of MPI (Message Passing Interface) which is a dominant
model used in high performance computing. The second part
appearing in this issue provides information on writing MPI
subroutines and presents toy examples to illustrate the concept.
In the Information Security section of Security Corner column
we have an article written by Dr. C. R. Suthikshn Kumar titled
“A Review of Cyber Security Curriculum in Indian Context”. In
the light of growing need of cyber security professionals to help
guard country’s cyber boundaries, the article focuses on how the
curriculum should be designed for creating highly skilled cyber
security professionals. Dr. Vishnu Kanhere of CSI-SIG on Humane
Computing continues to contribute to section of ‘Case Studies in
IT Governance, IT Risk and Information Security’ under Security
Corner column. This time Dr. Kanhere writes about the case study
of Orbit Offshore Services, which highlights how history can
This time Dr. Kanhere writes about the case study
of Orbit Offshore Services, which highlights how
history can serve the purpose of an early warning
system and how important learning from historical
events can be.
serve the purpose of an early warning system and how important
learning from historical events can be.
In our regular section called Programming.Tips() under Practitioner
Workbench column, we have an article written by Amitava Nag
on “Fun with C” where he discusses whether it is possible to
have a function in C program that accepts variable number of
parameters. As usual Umesh P. and Silpa Bhaskaran continue their
write-ups under Programming.Learn(“R”) and this time they write
about “Regression Analysis in R”.
Dr. Debasish Jana, Editor, CSI Communications presents
crossword for those who want to challenge themselves under
Brain Teaser column. CSI President H. R. Mohan brings us the ICT
News Briefs in August 2014 at a glance under various sectors in
his regular column Happenings@ICT. Due to shortage of space we
are omitting Innovations in India, Ask an Expert and On the Shelf
Columns in this issue.
However, we have other regular features like CSI Announcements,
CSI Reports and Chapter and Student Branch News. We also have
Call for Contributions where we provide tentative list of future
cover themes of CSIC.
There is a special user readership survey being carried out and
we request you all to respond to it wholeheartedly and provide
details that are asked for. Please remember we do welcome your
feedback and responses at the email id [email protected]
We wish all readers pleasant and fruitful reading.
With warm regards,
Rajendra M Sonar, Achuthsankar S Nair,
Debasish Jana and Jayshree Dhere
Editors
CSI Communications | September 2014 | 7
It’s a pleasure to receive several contributions from Prof. V. Rajaraman
for CSI Communications’ special issue on IT History. Very recently Prof
V. Rajaraman was honored with the award of D. Sc. (Honoris Causa)
from IIT Kanpur on June 18th, 2014. A link to the video coverage of
the award ceremony is available at iitk.vmukti.com. He has contributed
five articles for this issue providing information on –First programming
book in India, How CSI got its name, How MCA program started,
Establishment of CDAC and Timeline of development of computing
in India.
Prof. Rajaraman was awarded the Padma
Bhushan by the President of India in 1998. He
is a Fellow of the Computer Society
V. Rajaraman, PhD(Wisconsin)
of India, the Indian National
is
Honorary
Professor
Science Academy, the Indian
in
the
Supercomputer
Academy
of
Sciences,
Education and Research
National
Academy
Centre(SERC)
at
of
Sciences,Indian
the Indian Institute of
National
Academy
of
Science, Bangalore. He
Engineering,
and
the
was previously TataChem
Institution
of
Electronics
and
Professor and Chairman of
Telecommunication Engineers.
SERC, IISc (1982-1994),
IBM Professor of Prof. V.Rajaraman giving acceptance speech after receiving Among the many honours
honorary D.Sc. of IIT,Kanpur on 18 June 2014
and prizes that he has
IT at the Jawaharlal
received are Shanti Swarup
Nehru Centre for
Bhatnagar Prize (1976),
Advanced Scientific Research, Bangalore (19942001), and Professor of Electrical Engineering Homi Bhabha Prize (1984) by UGC, Indian
and Computer Science at IIT,Kanpur (1966- Society of Technical Education award for
1982). He was an Assistant Professor of Statistics excellence in Teaching (1988), Om Prakash
at the University of Wisconsin, Madison (1961- Bhasin Prize (1992), Rustom Choksi Award
62), a visiting Assistant Professor of Electrical (1993) by IISc, Zaheer Medal (1998) by the
Engineering and Computer Science at the Indian National Science Academy, and the
University of California, Berkeley (1965-66), Life Time Contributions award by the Indian
and an IBM Research Fellow at the IBM National Academy of Engineering, Dataquest,
Systems Development Institute, Canberra, Computer Society of India, and the Systems
Australia (1973-74). He is an author of 23 Society of India. He was awarded an Honorary
widely used text books and numerous research DSc (Engineering) by the Bengal Science and
papers in computer science and has guided 30 Engineering University, Sibpur in 2012, and an
n
Honorary DSc by IIT/Kanpur in 2014.
PhD students.
Prof. Dr. V Rajaraman: A brief biographical sketch
C SI Co
CSI
CS
Communications
omm
mun
u n ic
icat
cat
atio
io
onss | Se
September
S
p em
pt
m ber
be r 2
be
2014
014 | 8
01
014
ww
w
www.csi-india.org
ww
w..cs
.cs
csii--in
indi
dia
a.or
orrg
Doyen's
Recollections
Prof. V. Rajaraman
Supercomputer Education and Research Centre, Indian Institute of Science, Bangalore
The First Book on Programming in India
It all started with the arrival of an IBM
1620 mainframe computer at IIT/Kanpur
in August 1963. This computer was the
first one with a FORTRAN compiler to
be installed in India. It was gifted to IIT/
Kanpur by the Kanpur Indo American
Programme (KIAP) funded by the
United States Agency for International
Development. KIAP was a consortium of
nine top U.S. universities including MIT,
CalTech, University of California, Berkeley,
Princeton, and Purdue. The computer was
installed by the engineers of IBM (India).
KIAP had sent three Professors during
1963-64 to help in installing the software
and teach how to program the computer.
Professor Harry Huskey from the University
of California, Berkeley was the head of
the team. Prof. Huskey was a pioneer in
computing, having been a member of the
ENIAC team and also a member of the
team which built the ACE computer at
the National Physical Laboratories, U.K.,
under the leadership of Alan Turing. He
was one of the early Presidents of the
Association for Computing Machinery
(ACM), U.S.A. The other members of the
team were Prof.Forman Acton, a numerical
analyst, and Prof. Irving Rabinowitz, a
systems programmer both from Princeton
University. As soon as the computer
was installed, Prof.Huskey and his team
planned a course in programming for IIT/
Kanpur faculty and research students. He
then took a pro-active step in spreading
computer education not only to the IIT/
Kanpur community but also to researchers
in CSIR, DRDO, and other laboratories
and Universities. Beginning in December
1963, IIT/Kanpur started 10 day intensive
courses in computing which was continued
and given thrice a year by the IIT/Kanpur
faculty till 1972. Sixty participants were
admitted to each course and it consisted
of three lectures, one on programming
using a load and go version of FORTRAN
called FORGO, one lecture on numerical
methods and the third on computer logic.
This was followed by 3 hour laboratory
sessions on programming for batches of 20
participants. The batch size was limited to
20 as we had only 25 key punch machines
using which participants in the course
punched their programs on 80 column
cards. Program decks of participants
were submitted as a batch to computer
operators who ran them.
As no inexpensive books were available
to teach programming I was persuaded to
write notes on programming. Originally
they were distributed as cyclostyled notes
to the participants. At the same time, IIT/
Kanpur faculty decided to teach a course on
computer programming as a compulsory
course to all engineering students. Each
batch had 300 students and the notes
were used to teach the course beginning
in 1964/65. The notes titled “Principles
of Computer Programming” was printed in
the graphic arts section of IIT/Kanpur and
sold by the campus book store for Rs.5/-.
The book was bought not only by IIT/
Kanpur students but also by outsiders who
visited IIT/Kanpur.
I spent the year 1965-66 at the
University of California, Berkeley, as a
Visiting Assistant Professor and showed
my programming notes to some colleagues
there for their comments. They suggested
small changes and I polished the notes. On
return to India in August 1966, I got involved
again in teaching the programming course
to students as well as the participants
of the intensive courses. I requested my
colleague Prof. H N Mahabala to review
my notes and he did a commendable
job and gave numerous suggestions for
improvement as he was also teaching
the intensive course as well as the
undergraduate course on computing. The
thought then occurred, with persuasion by
my wife Dharma, that I should try to get the
book published so that more persons can
read it. I sent the book to several publishers
but they were not interested in publishing
it. They felt that there was no market in
India for a book on computer programming.
Only one publisher, Prentice-Hall of India,
showed some interest. I insisted that the
book should be priced below Rs.15 so that it
will be affordable to students. Prentice-Hall
of India Managing Director at that time
Mr. Neville Gosling finally agreed in August
1967 to publish the book (after getting the
book reviewed) with the stipulation that
I give a “camera ready” copy by getting it
typed using an IBM electric typewriter. It
was done on A4 size paper with drawings
drawn using India ink on tracing paper.
The book titled “Principles of Computer
Programming” was finally published in July
1969. The first print run was 3000 copies.
Prentice-Hall of India had hoped that they
will be able to sell the first print in three
years. To their utter surprise and mine by
December 1969, 2500 copies were sold
and a second printing came out in May
1970. Even though there were not many
computers in India there was tremendous
curiosity and eagerness to lean about
computers and programming. The book
fulfilled that need.
This book was followed by a revised
edition titled “Computer Programming in
FORTRAN IV”, and later as FORTRAN 77
(including an introduction to FORTRAN
90). The 51st printing of this book appeared
in July 2013. Even today the latest version
of the first programming book is being sold
steadily, although not in large numbers, in
spite of FORTRAN having been superseded
by Pascal, C, C++, and Java. It is also gratifying
that whenever I meet engineers/scientists
in their 50s they remember that they learnt
programming using the FORTRAN book
describing its unusual A4 size and the colour
of its cover which changed from silver grey
to chocolate to yellow and finally blue. n
How Computer Society of India got its Name
Indian Institute of Technology, Kanpur was
the first educational institution in India
to install a mainframe computer with a
FORTRAN compiler in August 1963. It was
an IBM 1620 with 60K digit memory, three
tapes, punched card I/O and an arithmetic
unit which did arithmetic by table look
up! The computer was installed by IBM
engineers in a large air conditioned room.
IIT/Kanpur was assisted by a consortium
of nine top Universities including
MIT, CalTech, Princeton, University of
CSI Communications | September 2014 | 9
California, Berkeley, and Purdue University.
Prof.Harry Huskey of the University of
California, Berkeley, was the leader of an
American faculty team who had come
to help install the computer and to teach
programming, numerical methods, and
computer logic to the students and
faculty at IIT/Kanpur. Prof. Huskey was
a pioneer in computing, having worked
with the ENIAC team and later with Alan
Turing designing the ACE computer at the
National Physical Laboratory, U.K. He was
also a Past President of the Association
for Computing Machinery (ACM), U.S.A.
With his vast experience in managing
computing facilities and influence
with IBM he requested IBM to gather
IBM computer users to exchange their
experiences and to request IBM for some
improved services. The group of 16 persons
from seven IBM computer installations
including representatives from IIT Kanpur,
DRDO, PRL, and some other organizations
first met at the IBM Education Centre at
Faridabad on 6 June 1964. At the end of
this meeting it was decided to form an All
India Computer Users’ Group (AICUG).
In mid December 1964, Prof. Huskey
organized an International Conference on
Computers at IIT/Kanpur, funded by the
United States Agency for International
Development and the Ford Foundation,
with the primary goal of discussing
the latest trends in computing. All
speakers to this conference were invited
speakers. Among the speakers were Prof.
Maurice Wilkes of Cambridge University,
Prof. John Bennet, of the University of
Sydney, Australia, Prof. J Beltran from
Mexico who was famous for spreading
computer education in Mexico by
transporting an IBM 1620 on an air
conditioned truck to various universities
there, Dr. S. Barton, a computer designer
from CDC, besides Prof. Harry Huskey,
Prof Forman.Acton, and Prof. Irving
Rabinowitz (from Princeton). Almost
60 participants were invited from India
among whom, I remember, were Major
A Balasubramanian (DRDO), Dr. P P
Gupta(CDC), Dr. S R Thakore (PRL),
Dr. P V S Rao (TIFR), Dr. N Srinivasan
(NAL), Prof. B Nag (Jadavpur University),
Prof. J Roy (ISI), besides Prof. H K Kesavan
and I from IIT/ Kanpur. At the end of
the conference a meeting was held on
Friday, December 14, 1964 afternoon
where a consensus was reached that the
All India Computer Users’ Group was
not an appropriate forum for scholarly
discussions and for presenting results of
research in the area of computing. It was
decided to form a professional society in
computing. The question then arose about
naming the society. Indian Computer
Association, and Indian Computer Society,
among other names were proposed.
Indian Computer Society was rejected as
the abbreviation ICS reminded everyone
about our colonial past, and ICA was
too close to the Institute of Chartered
Accountants. Dr. P P Gupta, who was
sitting next to me, then suggested the
name Computer Society of India (CSI) and
it was finally agreed as the appropriate
name by all who were present. Major
A.Balasubramanian, who was at that time
in-charge of the IBM 1620 installation at
DRDO, Hyderabad, volunteered to get
the new society registered as soon as
he returned to Hyderabad. (At that
time all of us did not realize that CSI was
used as an abbreviation by the Church of
South India!).
n
How the MCA Programme Started
In 1979 the Electronic Commission of the
Government of India, of which I was a
member, felt that several computer based
projects were not progressing fast enough
due to the paucity of trained human
resource. The then Chairman of the
Electronics Commission Prof. Biswajit Nag
set up a panel with me as its Chairman
to project the demand for manpower
and suggest appropriate educational
programmes to meet the requirements
of Human Resource. The other members
of the panel were Prof. S Ghosh of
Jadavpur University, Prof. K K Bhutani of
J K Institute of Technology and Applied
Physics, Allahabad, Prof. S K Lakshmana
Rao of REC, Warrangal, Prof. M V Pitke of
Bombay University, Prof. P C P Bhatt of IIT,
Delhi (who was at that time the Director
of Computer Division of the Department
of Electronics), Dr. D Shankar Narayan
of the University Grants Commission,
Dr. S M Vaidya of the Regional Computer
Centre, Pune University, Prof. P G Reddy
of IIT, Delhi, Mr. S S Oberoi of DOE and
Dr. Om Vikas of the Electronics
Commission who was the member
convener of the panel.
The terms of reference given to the
panel and the full report of the panel may
be found in[1]. The panel held nine meetings
during January-July 1980. On 21 and 22
April 1980 it held a Computer Science
and Engineering curriculum development
seminar at IIT/Delhi. Opinions of CSI
members were solicited at the Annual
Convention of CSI held at Mumbai on
February 9, 1980. The panel found that
there was a scarcity of Computer Science
professional all over the world. Further
most predictions made of requirements of
human resources in the area of computing
all over the world were underestimates.
While reviewing the situation it was found
that very few institutions in India had a
formal degree programs in Computer
Science. M.Tech/ME programs were being
offered by about a dozen institutions in
India with an intake of 152 and B.Tech was
offered only at seven institutions with an
intake of 122. Further, B.Tech and M.Tech
programmes were engineering oriented
with emphasis on computer architecture,
hardware, and systems software. These
CSI Communications | September 2014 | 10
programmes primarily emphasized the
design of computers rather than their
applications in industry and government.
The committee felt that there was a
need for a large number of systems
analysts and application programmers
particularly to fulfill the requirements
of the data processing departments of
companies which were primarily users
of computers rather than designers of
computers. A minicomputer policy which
was in limbo for a long time was just about
to be announced based on the Sondhi
committee[2] recommendations which was
expected to allow many private companies
to enter computer manufacture. There
was no formal educational program
to create a cadre of systems analysts
and application programmers. Systems
analysts are expected to have breadth of
knowledge and maturity as their main job
requirement is to interview personnel of
various types of organizations and arrive
at Systems Requirement Specification
(SRS) before embarking on systems
design and programming.
Persons
developing information systems for
www.csi-india.org
organizations need not only knowledge
of computers and computing but also
business practices such as accountancy,
stores, purchase, organizational structure
and related organizational governance
practices. The course was primarily
meant to fulfill the needs of Management
Information Systems departments of
organizations[3] and develop Information
systems for the clients of software
companies. The committee felt that a
basic B.Sc/B.Com degree would give the
students some breadth of knowledge
and maturity. Further a large number of
B.Sc/B.Com students did not have enough
employment opportunities and a program
to give them an orientation in a profession
would make them employable in the
nascent field of computer applications.
This led to the idea of 3 year post graduate
programme which the panel decided to
name Master of Computer Applications
(MCA). This course was of special
relevance to conditions in India and did
not mimic any course in the west. It
was the panel’s conviction that the MCA
course must have three components:
strong mathematics base, broad general
knowledge on the management structure
of organizations including finance, and a
strong grounding in computers as a tool
in solving problems. The panel felt that
the course must include programming,
systems analysis and design, operating
systems, and basic ideas on architecture
of computers. The panel also felt strongly
that at least six months of the course must
be spent by the students in an organization
understudying an experienced systems
analyst. The approval of this course
by UGC was expedited as Dr. Shankar
Narayan who was an Additional Secretary
of UGC was a member of the panel. The
panel suggested that the MCA programme
should be started at ten institutions
with an intake of 30 each. The panel had
hoped that among the ten would be the
three IIMs. IIMs were not interested but
many other colleges were. To kick start
the programme it was suggested that
the ten institutions chosen should be
fully funded for five years to create the
infrastructure including hiring teachers
and buying computers. Department of
Electronics agreed to meet 90% of the
funding requirement and 10% was to be
funded by UGC/Ministry of HRD. These
recommendations were presented to the
Electronic Commission and the UGC and
they approved the MCA program and
the funding requested. Subsequently ten
institutions submitted proposals, got the
funding and the MCA course was started
in 1982-83.
References
[1]
[2]
[3]
Report of the Panel on Computer Manpower
Development, Electronic Information and
Planning, IPAG, Electronics Commission,
Vol.8, No.2, November 1980, pp.56-70.
Virendra
Kumar,
Committees
and
Commissions in India: 1978.
V.Rajaraman, “A Curriculum Proposal for
a Degree Program in Information Systems
Design”, CSI Communications, Vol.5, No.4,
Oct.1981.
n
History of the Establishment of the Centre for Development
of Advanced Computing
Introduction
In 1983 the Indian Institute of Science,
Bangalore, gave a proposal to the
Department of Science and Technology,
Government of India, to set up a
supercomputer facility at the Institute.
The contention of the Institute was that
cutting edge research in science and
engineering required such a machine at
the Institute as modeling and simulation
of complex systems depended heavily on
a supercomputer. All major universities
in the west had supercomputers. This
was duly considered by the secretary,
Department of S&T and as the financial
outlay required was over Rs.25 crores he
suggested that a committee of secretaries
consisting of the secretaries of the then
Department of Electronics, Ministry
of Human Resource Development and
S&T should consider the proposal. The
proposal was approved in principle by
this committee of secretaries. Then
started a series of steps beginning with
a visit by a group led by the Director of
the Indian Institute of Science to some
leading supercomputer centres in U.K and
U.S.A and the two major manufacturers of
supercomputers, namely, Cray and Control
Data Corporation(CDC) both located in
Minnesota, U.S.A. A report was submitted
to the Government by the Indian Institute
of Science and final approval for buying a
supercomputer with a budget allocation
of Rs.60 crores including special building,
technical staff, faculty etc., came in late
1985. The institute started the process
of tendering etc. and soon found that the
process of importing a supercomputer
was tortuous.
Getting an export
clearance from the U.S. government was
becoming difficult. Even when quoting
for the computer Cray and CDC indicated
the problems with export controls and
wanted the Institute to sign an agreement
which included surprise inspection of
the use of the computer including the
source codes of the programs being run,
restriction on its use by organizations
outside the Institute, restrictions on its
use by visiting Professors from the then
Soviet Union and its allies etc. Many
of these conditions were unacceptable
to the Institute and the Government of
India. After extensive negotiations on
relaxing some of the conditions an order
was placed for the purchase of a CrayYMP computer with the condition that it
should be installed within one year. Cray
could not get an export clearance within
the stipulated time and the order was
cancelled. It was clear to the Institute
and to the Government of India that
unless we become self-reliant in building
supercomputers, we will be forever at the
mercy of the U.S. government. Prof. C N
R Rao who was the then Director of the
Indian Institute of Science and who was
also the Chairman of the Science Advisory
Council to the Prime Minister (SAC-PM)
was convinced of the need for India to
become self-reliant in building and using
supercomputers.
SAC-PM formed a
committee with me as Chairman and
Prof.P.C.P.Bhatt of IIT, Delhi, Dr. N Seshagiri
of the Department of Electronics, and
Dr. P N Shankar of the National Aeronautical
Laboratories, Bangalore, as members to
CSI Communications | September 2014 | 11
suggest ways and means of meeting this
goal. The committee was set up some
time in December 1986 and held several
meetings. One of the meetings was held
with Prof.Roddam Narasimha, a members
of SAC-PM, in which he talked about the
need of a high performance computer
for solving complex computational fluid
dynamics problems in aerospace and
research in atmospheric sciences which
had relevance to the important problem of
monsoon prediction. He also mentioned
the need of a high performance
computer to solve problems in structural
engineering, molecular biophysics etc. In
the deliberations of the committee the
need to emulate the successful mission
mode model and the flexibility in the
management structure of CDOT in the
new centre was emphasized. The need for
collaboration between various scientific
institutions and a distributed structure to
expedite application developments on a
parallel machine was also desired by the
committee.
During
the
period
1984-86
technology was rapidly changing.
Computer architects all over the
World were looking for alternatives
to vector supercomputers of the type
manufactured by Cray and CDC in
the U.S.A., and NEC and Fujitsu in
Japan, which required special cooling,
consumed enormous power and were
very expensive. Microcomputers were
doubling their speed every 2 years and
were inexpensive. Numerous start ups
in U.S.A were exploring the possibility of
building supercomputers using parallel
processing and were building prototypes.
The committee felt that it was easier
to build parallel computers having a
performance approaching the speed of
supercomputers of the day at a fraction of
the cost. Further, there were fortunately
no embargos on buying microcomputers.
The committee submitted a report in
February 1987 to the SAC-PM entitled
“Technology Mission to develop a Parallel
Computer”. The executive summary of
the report is reproduced below:
TECHNOLOGY MISSION TO DEVELOP A PARALLEL COMPUTER SUMMARY
With the advent of inexpensive powerful microprocessors it has
now become feasible to build a computer by interconnecting
a large number of microprocessors. Such a computer, called a
parallel computer, can be designed to solve problems requiring
numerically intensive computing. There are a large number
of applications critical to India’s development, which requires
sustained numerical speeds in the range of 10 to 100 million
arithmetic operations per second. It is thus necessary to initiate
a technology mission with a goal of building such parallel
computers by 1990. The potential hardware speed of parallel
computers cannot be utilized unless new algorithms tuned to the
parallel structure of these computers are developed. Research in
parallel algorithms is at its infancy and major effort can potentially
give us a leadership position in this area. It is thus proposed
that commercially available parallel computers be distributed
to fourteen organizations and individual goals be defined for
each organization to develop parallel programs in their area of
competence. These programs should be implemented on the
prototype parallel computer developed by the mission.
It is proposed that the mission be coordinated and executed
under the umbrella of the Centre for Development of
Advanced Computer Technology (CDACT) of the Department
of Electronics and that it must have a separate identity and
autonomy of operation. The proposed budget for the mission
is Rs.32 crores of which USD 14.25 million will be in foreign
exchange.
On March 31, 1987, I received a letter from the Secretary of SACPM which stated “It has been decided that SAC-PM’s work on
Parallel Computing be included as an item for discussion with
the Prime Minister, in a meeting of SAC-PM members to be
held with him on 21st April 1987 at 18.05 hours. SAC-PM has
tentatively suggested a discussion on this item for 30 minutes
including a presentation of 10 minutes”. I prepared 3 slides
for presentation which are reproduced below. (An OHP was
used for the presentation as the use of PPTs had not become
common in 1987).
PRESENTATION TO PM ON 21.4.1987 ON PARALLEL COMPUTER MISSION
☛
SLIDE 1
MISSION TO BUILD A PARALLEL COMPUTER
☛
BUILD PARALLEL COMPUTER
SUSTAINED SPEED OF 50M FLOPS
WITH
ISSUES IN PARALLEL COMPUTING
PROCESSORS BECOMING FASTER AND CHEAPER
OUR INDUSTRY ABLE TO USE THEM QUICKLY
HARDWARE ISSUES
☛
☛
INTERCONNECTION STRATEGEIS
COMMUNICATION STRATAGIES
CSI Communications | September 2014 | 12
☛
HARDWARE SYSTEM DESIGN RELATIVELY EASY
MINIMUM
SLIDE 2
☛
☛
☛
DEVELOP PARALLEL ALGORITHMS AND SOFTWARE IN
DIVERSE DISCIPLINES
DEVELOP SOFTWARE TO RESTRUCTURE LARGE SERIAL
PROGRAMS TO PARALLEL PROGRAMS FOR COMPTUER
BEING DESIGNED
CRUCIAL PROBLEMS ARE IN SOFTWARE
☛
☛
☛
☛
☛
☛
MODELLING PROBLEMS
RETHINKING SOLUTION
PARTITIONING JOBS TO TASKS
ASSIGNING TASKS
COORDINATION OF TASKS
PICKING RIGHT NOTATION
www.csi-india.org
SLIDE 3
IMPLEMENTATION
☛
☛
☛
☛
CREATE A CENTRE TO DESIGN DEVELOP AND FABRICATE
A PROTOTYPE SYSTEM
CENTRE SHOULD HAVE OPERATIONAL AUTONOMY
INTERACT WITH IDENTIFIED MANUFACTURERS
ASSIGN APPLICATION DEVELOPMENT TASKS TO R&D
ORGANIZATIONS
PROVIDE THEM WITH INFRASTRUCTURE TO ATTAIN
The report of the committee was accepted by the Prime Minister’s
office. Immediately steps were initiated by the Department of
Electronics (DOE) whose secretary was Mr. K P P Nambiar and
additional secretary Dr. N Seshagiri. DOE proceeded to form a
registered society under its control. The name suggested by the
working group “Centre for Development of Advanced Computer
☛
☛
☛
GOAL IN TIME
INTERCONNECT ALL CENTRES BY A COMPTUER
NETWORK WITH CONFERENCING FACILITY
• TIME LINE IN REPORT
• BUDGET $7..25M + RS.935 LAKHS IMMEDIATELY
TOTAL PROJECT COST $14.25 MILLION +RS.12.85 CRORES
= 32 CRORES
14 SOFTWARE DEVELOPMENT CENTRES SPREAD
THROUGH INDIA
Technology” was changed to the “Centre for Development
of Advanced Computing” by DOE. As the working group had
suggested that closely working with a University would be
beneficial, CDAC was established at the campus of the University
of Pune in mid April 1988.
n
Time-Line – Development of Computing in India (1955-2010)
This time line lists chronologically various developments which took place in computing in India. In developing this, I have used
many sources including the books listed in the references. A complete list of references may be found in the monograph “History of
Computing in India (1955-2010)” written by me on the invitation of IEEE Computer Society- History Committee whose URL is given in
the References.
Year
1955
Important Events
•
•
HEC-2M arrives in India. 16 bit tube/drum machine designed by A D Booth at Birbek College, London, and ordered
by ISI, Kolkata from the British Tabulating Machines.
Beginning of the design of TIFRAC prototype at the TIFR, Mumbai (R.Narasimhan leads the team).
1956
•
HEC-2M installed at the ISI and used to program statistical calculations in machine language.
1957
•
Design of a full-fledged computer similar to ILLIAC begins at the TIFR (R.Narasimhan’s group).
1958
•
URAL-1 a Russian machine installed at the ISI, Kolkata. Has assembly language.
1959
•
•
TIFRAC fabrication completed.
IBM starts manufacturing key punch machines in India.
1960
•
TIFRAC starts working. Assembler developed for TIFRAC.
1961
•
•
ISIJU Project to make transistorized computer begins at ISI and Jadavpur University.
First IBM 1401 installed at the ESSO Standard Oil Co., Mumbai.
1962
•
•
TIFRAC dedicated to the nation by Jawaharlal Nehru the Prime Minister of India.
IBM 1401 refurbishing starts at Mumbai.
1963
•
•
IBM 1620 installed at the IIT at Kanpur. First computer with FORTRAN in India. Education using FORTRAN begins.
Bhabha committee set up to review electronics in India.
1964
•
•
•
•
IBM 1401 installed in ISI, Kolkata.
A large number of intensive courses on computing given at IIT/Kanpur.
CDC 160A-3600, a large mainframe computer, installed at the TIFR, Mumbai.
First International Conference on Computing held at IIT/Kanpur. Organized by Harry Huskey with financial support
from the Ford Foundation. At the end of the conference decision taken to start Computer Society of India.
1965
•
•
30 IBM 1401s and 12 ICL 1901s installed in India.
Computer Society of India registered in Hyderabad.
CSI Communications | September 2014 | 13
1966
•
•
•
•
•
Report of the Electronics Committee (Bhabha Committee) submitted (February).
IBM 7044 installed at IIT/Kanpur.
Rupee devalued from Rs.4.5 per USD to Rs.7.5 per USD. Windfall profit to IBM as rentals were quoted in dollars.
ISIJU project complete.
M.Tech program in computers in the Electrical Engineering Department started at IIT/Kanpur.
1967
•
ECIL established at Hyderabad by the Department of Atomic Energy to commercialize electronic instruments
designed at the Atomic Research Centre at Mumbai.
Dept. of Statistics, Government of India, installs 10 Honeywell computers.
•
1968
•
•
•
TCS established in Mumbai by Tata Sons with an IBM 1401.
IBM 1401 installed as I/O computer for the IBM 7044 at IIT/Kanpur.
Narasimhan committee report suggests self-reliant production of small and medium computers within 10 years.
Opines no need for foreign collaboration in design and development.
1969
•
TDC 12 computer commissioned at the Bhabha Atomic Research Centre, Mumbai. A real-time data acquisition
computer.
Committee on Automation set up by the Ministry of Labour, Employment and Rehabilitation (called Dandekar
Committee on Automation).
HP Time sharing computers installed in IIM/Ahmedabad.
•
•
1970
•
•
•
1971
•
•
•
•
1972
•
•
•
1973
•
•
•
•
•
•
1974
•
•
•
•
•
Department of Electronics (DoE) established by the Government of India with M G K Menon as its Secretary.
Foreign companies asked to dilute equity. IBM declines. ICL agrees and collaborates with the Bharat Electronics Ltd.
(BEL) to manufacture ICL 1901A – 48 computers manufactured.
National conference on Electronics under the Chairmanship of Vikram Sarabhai held at Mumbai to elicit comments
on the development of electronics and computers. Self-reliant development of computers in India proposed.
Electronics Commission established by the Government of India in Delhi as policy making body for electronics and
computers with M G K Menon as its Chairman.
IBM 1401 withdrawn in the USA.
14 IBM 1401s installed by the Indian Railways for accounting, freight etc.
TDC 12 marketed by ECIL.
DEC 1077 installed at NCSDCT at TIFR with UNDP assistance. Groups in graphics, networks, databases, and
compilers formed to do research in these areas.
Panel on minicomputers constituted by the DoE to formulate a strategy for the development of small and medium
computers by Indian companies.
Separate Computer Science Programme starts at IIT/Kanpur. Masters and Phd degrees offered. First such
programme in India.
Report of the panel on minicomputers submitted. Opines that minicomputers can be made in India without any
know-how being imported from abroad. No collaboration should be allowed. Demand for the period 1974-79
projected around 1400 minicomputers.
Santacruz Electronic Export Promotion Zone (SEEPZ) established in Mumbai to promote export of electronic items
and software.
Foreign Exchange Regulation Act (FERA) passed.
IBM asked to dilute equity again. Declines.
Air Defence Ground Environment Systems (ADGES) design begins at TIFR. Plans to use ruggedized ECIL TDC 316
computers, display devices developed by Tata Electric Company, Radar from Electronics and Radar Development
Establishment (LRDE) Bangalore with the user agency, namely, the Indian Air Force giving requirement specifications
and test data. Entire system to be developed and fabricated with Indian engineers and Indian made subsystems.
IIT/Madras installs IBM 370/155 with financial assistance from the Federal Republic of Germany. Fastest computer
in south India.
TDC 312 marketed by ECIL (uses imported ICs, local components locally made PCBs, and imported peripherals.)
Regional Computer Centre (RCC) set up at Pune with an ICL mainframe. RCC to give low cost computer time to
students and software exporters.
ECIL imports IRIS 55 (from France), a 32 bit computer to expedite software development and reverse engineered
to make TDC 332.
Computer Imports for software export policy. TCS uses the scheme to import a Burroughs mainframe computer.
Minicomputer policy not implemented – delayed due to indecision and foreign exchange problems.
CSI Communications | September 2014 | 14
www.csi-india.org
1975
•
•
•
•
•
•
1976
•
•
•
•
•
Tata Burroughs established in SEEPZ. Burroughs B1728 and B6738 installed to export software. F C Kohli of TCS
prime mover of the idea.
DoE issues guidelines for import of computers costing more than Rs. 500,000. Foreign exchange difficulties.
National Informatics Centre (NIC) established with UNDP assistance (USD 4.4 million).
TDC 316 produced and sold.
Engineers India installs Ryad 1040 from East Germany to export engineering design software to East European countries.
Ryad 1030, 1020 computers from the USSR also installed for software export to the USSR (Rupee trade with the
USSR eases import of machines).
CMC established by the DoE.
CMS formed by some IBM employees to maintain IBM 1401 computers.
Report on the operation of IBM and ICL by the Public Accounts Committee of the Indian Parliament. Report criticizes
companies.
Patni Computers collaborates with Data General Computers for software development.
DoE starts Appropriate Automation Promotion Program (AAPP), later renamed Industrial Electronics Promotion
Programme (IEPP).
1977
•
•
•
IBM announces intention of closing operations in India.
Regional Computer Centre, Calcutta, established with Burroughs B-6738 computer.
Minicomputer policy continues to be in limbo.
1978
•
•
•
•
•
•
IBM closes operations in June.
CMC takes over maintenance of IBM computers.
IDM, a company formed by ex-IBM employees takes over IBM’s data centres and card plant.
Biswajit Nag takes over as Secretary DoE from M G K Menon.
A S Rao retires from ECIL.
Minicomputer Policy announced opening the field of computer manufacture to private industry, breaking public
sector (ECIL) monopoly.
IIT/Kanpur starts the first B.Tech programme in CSc at an IIT.
•
1979
•
•
•
•
•
•
1980
•
•
•
•
1981
•
•
•
•
•
•
•
1982
•
•
Sondhi Committee on Electronics report suggests liberalization of import of large computers and allowing private
sector to enter computer and peripheral manufacture.
Bharat Electronics Ltd. (BEL – a public sector company specializing in defence electronics systems) decides to quit
from computer and peripherals development.
4 companies, ORG, DCM, HCL, and IDM, start manufacturing minicomputers. Adopt UNIX as O.S.
TCS opens Office in New York for software export.
Patni Computers develops comprehensive Apparel Development Software Package for Data General Computers.
Regional Computer Centre, Chandigarh established with DEC 2050 system.
Rajaraman’s manpower committee report accepted by the Electronic Commission. A new programme called
Master of Computer Applications to be started. Bachelor’s programme in CSc to be expanded.
Software services export by a number of companies start primarily by sending software engineers to client sites
(pejoratively called “body shopping”).
Tata Research Design and Development Centre (TRDDC) of Tata Sons established (mostly with funding by TCS).
TALLY, an accounting software product company established.
Rajaraman committee report on import of computers for software export.
P P Gupta takes over as DoE secretary from B Nag.
Decision to use computers in the organization of the Asian Games. Rajiv Gandhi takes this decision.
INFOSYS established.
Wipro markets 8086 based minicomputer (Wipro 86 series).
Reserve Bank of India computerizes clearing houses and ledger posting after agreement with the labour unions that
not more than 10% of staff will be displaced.
NIIT starts private computer training school.
Asian Games held in New Delhi. Organizer Rajiv Gandhi decides to computerize games schedules, event records,
result announcement etc. DCM computers used as terminals, networked with HP machines. Entire software
developed locally by NIC engineers in 6 months. Seshagiri interacts with Rajiv Gandhi.
Import of Colour television tubes allowed; colour television arrives in India to telecast Asian Games.
CSI Communications | September 2014 | 15
•
•
•
•
NCST establishes VSAT network with 32 Kbps packet switching.
MASTEK starts software company in Mumbai.
Electronic voting machine using a microprocessor designed and developed in India used in a state election for the
first time in the world.
UNDP funding (USD 653,200) for Appropriate Automation Promotion Programme (AAAP) with centres at Delhi,
Ahmedabad, Calcutta, and Trivandrum. Training in microprocessor use in automation.
1983
•
•
NCSDCT hived off from TIFR to form NCST.
Bank Unions agree to limited computerization in public sector banks.
1984
•
•
•
•
•
•
•
•
•
•
•
Indira Gandhi assassinated. Rajiv Gandhi becomes Prime Minister. Rajiv Gandhi is computer savvy.
Rajiv Gandhi initiates liberalization of computer industry with Seshagiri of the DoE as his informal adviser.
Trade unions observe 1984 as “anti computerization year”.
Gateway Design automation starts software development work for export in Delhi
Citibank sets up software development unit in SEEPZ, Mumbai.
Inter-ministerial standing committee (IMSC) formed to regulate computer import and licensing industry.
Railway passenger reservation project given to CMC by the Railways.
Rangarajan Committee on bank computerization gives report. EDP cells in all banks recommended.
SOFTEK first company to develop compilers for COBOL, BASIC, and FORTRAN for locally made computers
CDOT set up to design electronic telephone exchanges by Indian engineers.
CAD Centres at IISc/Bangalore, IIT/Kanpur, IIT/Bombay and Jadavpur University at Kolkata. UNDP grant USD 1.5
million plus Rs.340 million grant from the DoE.
Computer Assisted Literacy And Study in Schools (CLASS) programme launched by the DoE to cover 250 schools
all over India. Uses BBC Acorn microcomputers – 4 given per school. The UK government gives UK Pounds 1.3
Million for the project.
Government of India approves setting up of a National Supercomputer Centre at the Indian Institute of Science at
Bangalore with a grant of Rs.500 million.
•
•
1985
•
•
•
•
•
•
•
•
1986
•
•
•
•
•
•
•
1987
•
•
•
•
•
•
Department of Telecommunication (DoT) established.
Telephone services corporatized (earlier telephones were monopoly of a government department).
Software export USD 30 million (CMC, TCS, and TBL main contributors).
Texas Instruments facility at Bangalore established to export electronic CAD software using satellite communication
with its Dallas Centre in the USA.
ERNET project starts with UNDP assistance.
Sampath committee on education – teacher training programme suggested.
KBCS project funded by UNDP and the DoE. USD 5.2 million + Rs.140 million grant from the DoE. IIT,Madras, IISc,
Bangalore, ISI, Kolkata, NCST, Mumbai, TIFR, Mumbai and IIT, Bombay participated.
UNDP assisted Microprocessor Applications Engineering Program (USD 1.53 million) – 5 regional centres at
Jabalpur, Bangalore, Ranchi, Pune and Delhi.
VSNL (Videsh Sanchar Nigam Ltd.) set up for overseas communication.
INDONET established by CMC. SNA network with IBM computers and leased lines from the DoT.
New policy on computer software export, software development and training.
Project to computerize reservation of tickets in the Indian Railways completed. Reservation office in New Delhi with
50 windows started.
NIC acquires SX1000 mainframe computers from Japan for software development for government departments.
NIIT starts franchising training centres.
Rajaraman committee submits report to the Science Advisory Committee to the Prime Minister to establish a centre
for developing high performance parallel computers.
Sterling Computers sells PCs for Rs.29, 000.
TI’s Satellite link to Dallas office starts the revolution of “off shore” software development.
Foreign collaboration for branded workstations begins in earnest. Hinditron-DEC, HCL-HP, and PSI-Honeywell Bull
established.
NICNET established.
Indian Banks’ Association agreement with Bank Unions on Computerization. Standardizes use of UNIX, Micro focus
COBOL, and X .25 for networking. IBM PC clones in all banks.
Software India Conference in the USA to promote software companies.
CSI Communications | September 2014 | 16
www.csi-india.org
1988
•
•
•
•
•
•
National Association of Software and Service Companies (NASSCOM) established.
NIC hived off from the DoE and placed in the Planning Commission.
Excise duty exemption for software.
RCC Calcutta machine replaced with CDC 180/840A mainframe.
Cray XMP 14 installed in the Centre for Medium Range Weather Forecasting-number of conditions applies on usage.
Centre for Development of Advanced Computers (CDAC) established in Pune to design and fabricate parallel
computers with 1Gflop speed.
1989
•
Indian Administrative Service officer takes over from technocrats as DoE secretary. DoE becomes a "non-scientific”
department. S Rajamani IAS takes over from technocrat K P P Nambiar when he retires.
VSNL sets up 64 Kbps link to the USA.
NCST connects ERNET to Internet via UUNET.
Electronics Commission abolished.
Datamatics, a software services company, uses satellite link to the USA to export software.
India’s software services export reaches USD 100 Million.
•
•
•
•
•
1990
•
•
•
•
1991
•
N.Vittal, an Indian Administrative Service officer, takes over as the DoE Secretary.
Software Technology Parks set up by the DoE with shared satellite communication links to promote software export.
Companies established in STPs expected to export software each year equal to 4.5 times the salary paid to their
employees.
MNCs enter India for offshore software development.
•
India nearly defaults in repaying loan. Forced by the International Monetary Fund (IMF) to liberalize. Rupee devalued
and floated.
New industrial policy – Multi National Companies (MNCs) welcomed.
Reduced tariff, simplified procedures, and devalued Rupee attract MNCs.
NICNET used to disseminate results of general elections.
Export of software USD 164 million.
IIS is the first software services company to get ISO 9001 Quality Certification.
Software “development centres” set up for individual Fortune 500 companies by TCS (Each centre secure).
National Supercomputer Centre at the IISc, Bangalore starts functioning with a Cyber 992, 2 CDC4360, a VAX8810,
9 IBM6000/580s connected with a fibre optic net to work in parallel, 48 IBM RS6000/340, 24 Silicon graphics
workstations, 25 Sun workstations, and a campus-wide fibre optics network.
CDAC completes design of PARAM parallel computer with 1 Gflop speed.
1992
•
•
•
VSNL introduces 64 kbps leased line services.
Tata group and IBM form a 50:50 joint venture company.
Software product Flexcube for banks developed by Rajesh Hukku of IFlex.
1993
•
•
•
•
EDI introduced by VSNL.
Private software companies allowed dedicated satellite links with customers in the USA.
Motorola India first company in the world to get CMM level 5 certification for software quality.
Import of software packages allowed on regular duty. Duplicating copies allowed. Duplicates permitted to be sold
in the local market and royalty less than 30% of the local price allowed to be paid to the owner of the package.
INFOSYS becomes a publicly listed company
Indian Satellite Development Centre at Bangalore installs a distributed computer system with 9 IBM RS6000/530s,
9 RS6000/220s and 33 RS6000/220s.
•
•
•
•
•
•
•
•
•
1994
•
•
•
•
•
•
Government monopoly in telecommunication ends. Private companies allowed starting mobile communication
services.
American Express sets up Business Process Outsourcing Centre in Mumbai.
200 satellite links installed by software companies to facilitate offshore software development.
Quality consciousness makes software companies obtain ISO/CMM certification.
Oracle sets up development centre in Bangalore.
Indian copyright act amended – stiffer penalties for infringement.
CSI Communications | September 2014 | 17
1995
•
•
•
•
First commercial Internet service started by VSNL.
100% tax holiday for software export earnings.
Private e-mail service introduced (non Internet).
DoE launches programme to accredit private computer training institutes due to proliferation of below par training
institutes (named DOEACC scheme).
1996
•
•
•
•
NASSCOM sets up Special Interest Group (SIG) to solve Y2K problem. Indian software companies advertised as
Y2K solvers.
Indian software companies improve systems while fixing Y2K bug at little extra cost as strategy to get customers.
Rediff.com established – first e-commerce portal in India.
Software export reaches USD 1 Billion.
1997
•
•
•
•
Digital Signal Processing chip “Ankur” designed by TI India centre at Bangalore.
Compaq and IBM overtake sales of PCs by local manufacturers.
23% of INFOSYS revenue due to Y2K.
GE Capital International Services starts back-office services centre.
1998
•
•
•
•
•
•
•
•
•
Prime Minister of India declares “IT India’s Tomorrow”.
IT task force set up by the government – comes up with 108 recommendations to promote IT among which is setting
up of one Indian Institute of Information Technology in each state.
109 companies receive IS0 quality certification.
WIPRO the second IT company in India to get CMM level 5 quality certificate.
IIIT/Allahabad established.
VSNL establishes connection to Global One’s 1400 points of presence worldwide.
Microsoft Software Development Centre started at Hyderabad.
Motorola Design Centre established in Delhi.
IBM Research Centre set up in New Delhi.
1999
•
•
•
•
•
INFOSYS listed in NASDAQ.
IBM sets up fully owned subsidiary in India. Tata’s stake in TATA- IBM bought by IBM.
100% Foreign Direct Investment in IT allowed paving way for MNCs entry into India.
6 out of 12 SEI CMM level 5 companies in India.
Nationwide linking of Railway Reservation System.
2000
•
•
•
•
•
IT Act 2000 passed by Parliament to facilitate e-commerce.
Software export reaches USD 5 billion.
HP Global sets up BPO in Bangalore.
12 Software Technology Parks host 1196 software companies.
Startup company Spectramind gets venture capital funding of Rs. 1 billion (USD 23 million) to set up back-office to
process transactions of Internet portals worldwide.
Private companies allowed setting up international gateways.
•
2001
•
•
•
•
•
•
2002
2003
•
•
Tata group takes over 51% of CMC Ltd. from the government.
Tata group takes over VSNL.
10 companies obtain CMM level 5 certificates. 14 companies obtain CMM level 4 certificates.
Dell sets up R&D centre.
Simputer, a hand-held multilingual computer, designed by a group of IISc and Encore Software Ltd. engineers at
Bangalore. Attracts worldwide attention.
Accenture starts centre in Mumbai.
•
Agrawal-Kayal-Saxena algorithm:”Primes in P” attracts worldwide attention.
National Institute for Smart Governance set up in Hyderabad (joint initiative of NASSCOM, Government of India
and Government of Andhra Pradesh).
Internet based booking of tickets on the Indian Railways.
•
•
•
•
•
Bharati Airtel (largest mobile telephone provider in India) outsources all IT work to IBM India.
CDAC’s PARAM PADMA ranks 171 in top 500 high performance computers.
High performance DSP chip designed at TI India at Bangalore.
Software Technology Parks India (STPI) centres across India reach 44.
Yahoo sets up R and D Centre at Bangalore (first outside the USA).
CSI Communications | September 2014 | 18
www.csi-india.org
2004
•
•
•
•
•
•
•
•
•
•
National E-Governance plan announced.
General Elections held using only Electronic Voting Machines (1,075,000 EVMs deployed all over India).
TCS, INFOSYS and WIPRO all cross USD 1 Billion revenue.
TCS becomes a publicly listed company.
Government of India announces Broadband Policy; fibre to home, DSL, cable to home etc. Targets 40 million Internet
users and 40 million broadband users by 2010.
Google sets up first R&D Centre outside the USA in Bangalore.
IBM acquires Daksh, the largest Indian BPO company.
Number of employees in IT industry reaches 1 million.
State Wide Area Network for each state to be set up with minimum bandwidth of 2Mbps.
Mobilis, a low cost mobile tablet computer designed by Encore Software Ltd., Bangalore, attracts wide attention.
2005
•
•
Oracle acquires IFlex an Indian Banking software product company.
Special Economic Zone (SEZ) Act passed. SEZ defined as “specifically demarked duty-free enclave deemed to be
foreign territory (out of customs jurisdiction) for trade, duties and tariffs”.
2006
•
•
•
•
CISCO establishes Globalization Centre East in Bangalore.
IBM announces plans to invest USD 5 billion in India.
SAP (German ERP major) announces USD 1 billion investment in India over next 5 years.
India’s software and services export revenue reaches USD 10 billion.
2007
•
•
257 IT companies set up in SEZ.
Special incentive package announced by the Department of Information Technology to encourage investments in
semi-conductor fabrication industry.
EKA supercomputer fourth fastest in the world and fastest in Asia built by the Computational Research Laboratory
of the Tata group.
•
2008
•
•
•
•
•
TI (India) designs single-chip solution for ultra-low-cost mobile handset.
Accenture opens Technology lab in Bangalore (Fourth in the world after the USA and France).
2G spectrum allocation on first come first served basis.
IT (amendment) Act passed by Parliament to strengthen IT Act 2000.
National Knowledge Network project started by the Government of India.
2009
•
•
IBM has second largest workforce in India after the USA. Will invest USD 100 million for global mobile services
research in India.
SAP’s third co-innovation lab in Bangalore (other labs in Palo Alto and Tokyo).
•
•
•
•
•
•
•
IT exports including software, services and BPO reaches USD 50 billion.
IT domestic revenue USD 24 billion.
55% of the global outsourcing market sourced from India.
Indian IT companies present in 52 countries and have 400 of the Fortune 500 companies as clients.
Direct employment 2.4 million in IT and 8.2 million in support services.
6.5% of GDP earned by IT industry.
Rs.600 billion allocated over a 10 year period for the National Knowledge Network.
2010
References
[1] This material is taken from History of
Computing in India (1955-2010) by
V.Rajaraman published in the World
Wide Web. See: (URL:www.cbi.
umn.edu/hostedpublications/pdf/
Rajaraman_Histcomputingindia.pdf)
[2] Dinesh Sharma, “The Long Revolution
– the Birth and Growth of India’s IT
Industry”, Harper-Collins India, New
Delhi, 2009
[3] C R Subramanian, “India and the
Computer – A Study of Planned
Development”, Oxford University
Press, New Delhi, 1992.
[4] R.K.Shyamasundar and M A Pai,
“Homi Bhabha and the Computer
Revolution”, Oxford University Press,
New Delhi, 2011.
Acknowledgment
I thank the following persons (in
alphabetical order) who read the
monograph from which this material
is taken and gave many constructive
suggestions: S Bhatnagar, P C P Bhatt,
H K Kesavan, R Krishnamurthy, F C
Kohli, H N Mahabala, S K Nandy, N R
Narayana Murthy, Anand Parthasarathy, T
Radhakrishnan, N Ramani, S Ramani, P V S
Rao, Andy Russell, Veer Sagar, N Seshagiri,
Dinesh Sharma, Lalit Shawney, Om Vikas,
David Walden, and Jeff Yost.
n
CSI Communications | September 2014 | 19
Cover
Story
Radharaman Mishra
Senior Technical Architect, Research & Innovation Tech CoE Group, IGATE
History of the Computers, GUI and Devices
Introduction
History never looks like history when you
are living through it- John W. Gardner
History, by definition is associated
with the past, and we need a gap of
time between us and what we call the
history, to have a “historical perspective”
towards it. History is also about changes,
changes that mattered, and influenced
the future one way or the other. History,
of the computing is very interesting in
many ways. It has shaped the present
of humanity and will definitely shape its
future in significant ways. Although we
hardly have a distance of 60 years with
the birth of the modern computing, the
astounding pace of changes therein has
created a great history within this short
timeframe. In computing, history has
created a history for itself.
Nicholas
Negroponte
said,
“Computing is not about computers any
more. It is about living.” In the early days
of the computing it was not so, since they
were considered (and for good reasons)
highly sophisticated machines that only
trained professionals could work with
for high tech or scientific (or military)
purposes. It required many historic
developments before we had a computer
in every home and a computer that will do
everything, from complex mathematics
to buying groceries and sending mails
to playing songs or video. Computers
have evolved to become a significant
part of our lives. Two things apart from
the power of the computing technology
itself that contributed to their acceptance
in everyday lives are the intuitive user
interface (often referred as Graphical
User Interface or GUI) and the devices
attached to the computer that lets users
interact with it. Each of these has their
own story to tell. In this article we will
hear the story of the computers, the GUI
and some of these devices that enable us
to use the computers. The story is not only
fascinating but also some of us have lived
through it.
Brief History and Timeline of
the Computers
Computers or no computers, we were
always in dire need of making calculations
(remember we came out of the cave and
have to pay the tax!). People have used
marking the wall to making knots in the
rope for doing the counting. Abacus was in
use until recently. Interestingly the digital
calculators that we use now days are a
new development and share a common
historical period with modern computers.
Here is a snapshot of the devices that
became popular with the different
generations of the computers.
•
The First Generation (1950s): Punch
card and magnetic tapes for inputs,
supervisory typewriter for control
•
The Second Generation (early 1960s):
Punched cards for input, printers,
tape storage, and disk storage
•
The Third Generation (mid-1960s
to
mid-1970s):
Minicomputers
(smaller), simple monitors, keyboard
•
The Fourth Generation (1975 to
the present): GUI, mouse, color
monitors, touch screens, gesture and
voice recognition
It has been long since people were
counting on their thumbs and making
complex calculations on their abacus.
It was inefficient and boring. The giant
machines developed until 60s were
just big calculators. Apart from being
oversized and overfed (they consumed
terrible amount of electricity and had
frequent breakdowns) they couldn’t play
videos and send emails. They needed
someone to do something about it.
Two young entrepreneurs, Steve Jobs
and Steve Wozniak, who were looking for
more interesting things than the schools
(seems schools were not popular even
in the historical period) thought of this
problem. They left the school, sold their
Volkswagen and calculator (to raise a
fund) and established a company that
later became famous as Apple Computer,
Inc. The company launched its first
product, the Apple I in the year 1976 and
discontinued it next year. It was assembled
by hand and encased in a wooden box.
Now these machines are collectors’ items.
They learnt from this experience and
released another version Apple II in the
same year. Apple II was a huge success
and soon it became the most selling
personal computer and established Apple
as a successful commercial company.
In 1980, IBM understanding the
potential of the rapidly increasing personal
computers market asked Microsoft
CSI Communications | September 2014 | 20
Corporation to develop a new operating
system for the microcomputers. What
Microsoft came up with was named MSDOS, a command line interface for the
microcomputers. And thus the race was
already picking up.
Graphics that Changed the Graph
of Computers
Xerox Corporation’s Palo Alto Research
Center (PARC), was established in
1970 as a division of Xerox Corporation.
It has a legacy of gifting the world of
computing and information systems with
their innovations. The scientists at PARC
were working on a project that allowed
computer users running programs in their
own sizeable windows. A window that
was capable of holding symbols for the
programs (called icons) and documents
that were clickable. They also developed
the concept of showing the documents
that looked like as they would appear
when printed (we say it print preview
now) and also a printer to actually print
the documents. They called it a WIMP
system (Windows, Icons, Menus, and a
Pointing device), and later the concept
became famous as the Graphical User
Interface (GUI).
Like a really adventurous movie
script the pieces of the stories were
moving fast. While the scientists at PARC
were working hard on their program,
Steve Jobs managed to get permission to
have a look at what they were doing. He
wasted no time in realizing what their
work meant for the personal computers
and started working on a totally new line
of minicomputers that were leveraging all
the features of the GUI. Apple released
first version of the Macintosh in 1984
having all the GUI features and instantly
became hit. Later on Microsoft launched
its own line of operating systems,
Microsoft Windows, which implemented
the concepts of GUI, which is now the
most widely used operating system for the
personal computers worldwide.
The concept of GUI has contributed
the most in bringing the computers out
of the lab and making it a household
item. It allowed the innovators to think
and develop applications that could
be used by non-technical users (word
processors,
spreadsheets,
drawing
www.csi-india.org
programs and games etc.). It made the
learning computers so intuitive and fun
that eventually computers turned to be
the most effective tools for self-learning.
A Mouse for Every Computer
Interestingly historically mouse has its
roots in devices that were being developed
for military purposes as part of a plotting
device that could show the trajectory of
the aircraft. Even more interestingly in
early days researchers have tried to build
tracking devices that could have been tied
to your hand or even mounted on your
head. The first mouse of the kind we know
was invented by Douglas Engelbart in
1964, it has two metal wheels packed into
a wooden shell along with a circuit board.
Most of us might not have a chance to
work with it. What many of us might have
seen was developed 8 years later in 1972
by Bill English and had a ball that could
rotate in any direction and was known as
“Ball Mouse”. The kind of optical mouse
we use now days has evolved from many
of predecessors that needed a specific
surface (with specific marks to detect the
movements) to work with. It was not until
1999, when Microsoft introduced optical
mouse that was based on the technology
developed by Hewlett-Packard.
And now we have an assortment
of mouse kinds: laser mouse (optical
mouse that usages laser light for better
precision), ergonomic mouse (especially
designed for the hand comfort), tactile
mouse (that provides hepatic feedback
on movements), inertial and gyroscopic
mouse (that can be made to work in the
air). Apart from that there are mouse
designed for games having customized
controls to suit the game. As an
alternative we also had something called
the touchpad that allows controlling the
computer functions (cursor movements,
and selections etc.) through finger
movements on a designated surface.
Apart from a change in the internal
workings of the mouse it has also evolved
in functions it provides. Most the mouse
today has 2 to 3 buttons and a wheel. It
has also evolved the way it is connected
to the computer. Nowadays, we use the
mouse that is often connected to a USB
port either through a wire of through a
wireless connection whereas earlier they
used to get connected with serial ports.
This apparently simple down to earth
small device simplified and improved
the efficiently of the tasks like drawings,
selections and clicks, scrolling and so
on. It also made possible to develop
applications that were aware exactly
where the user was pointing. Users were
able to do lot many things by simple hand
and finger movements in a faster and
efficient way using it.
Where is My Monitor?
Reading what the computer has to say was
not as neat as reading this article in early
days of computers. Early computers used to
communicate using punched cards. There
was a typewriter like machine to punch
holes patterns into the paper cards. They
were fed to the computer that punched
the results onto similar empty cards. The
result was fed into another machine (often
called tabulators) that read the punches
and printed the results in human readable
format on paper. Some other computers
used long rolls of papers instead of cards.
CRTs (Cathode Ray Tubes) that were used
as memory in the computers gradually
were used for creating very primitive
displays. Eventually CRT based display
evolved to show character based outputs
on the screen. All this was not working
well and finally Lee Felsenstein, and Steve
Wozniak (yes, Wozniak again!) got on the
idea of using the CCTV monitor for using
the computer display. And successfully
did it in the year 1976. As the computer
market
grew
gradually
computer
manufacturers started building monitors
with higher resolutions, both monochrome
and color versions. Innovators and the
manufacturers were always looking for the
improvisations and concepts of plasma
and LCD based displays were evolving
behind the scene. But these technologies
were too expensive then. The problem
with these monitors was that they were
built on different standards and there
were a lot of them in the market. It was not
until 1987 when IBM introduced the VGA
video standard that became the standard
for most of the computer monitors built.
Apple Macintosh II that was released in
the same year started supporting color
videos. Meanwhile, the LCD technology
was being perfected and it was in late
1990s that manufacturers started offering
LCD based monitors as they were less
bulky and consumed lesser electricity.
As computing technology evolved into
different other areas like manufacturing,
point of sales, handheld devices, gaming
consoles etc. where the users have to
repetitively make same or similar inputs
for longer periods, researchers were
looking for smart ways to input using the
hand directly to the screen. Research work
from academics to industries evolved and
multiple approaches were developed to
make this happen. Interestingly, the touch
screens were widely used in the POS
machines before they were adapted for
the phones. The first touchscreen phone
(IBM Simon) was released in 1993. The
popularity of smart phones has made the
touch screens very popular. Advent of the
tablets and “phablets” is only adding to
the ever rising usages and popularity of
the touch screens. The technology is quite
mature now for the touch screens and
recently both the software and hardware
vendors have launched the computers
products that are touch enabled. Microsoft
Windows 8 series of operating system
has been specifically designed for touch
enabled devices including computers,
laptops and hand held devices.
Due to the technological innovations
in the area of display it is now possible
to build larger still lighter screens that
can display lot many things and also high
resolution video contents. Touch enabled
screens have opened the possibilities that
have just begun to get explored. Since,
users can use their fingers (or a stylus)
for making direct inputs there is no need
of a mouse. The screen itself can open up
as a virtual keyboard and that removes
the need of a physical keyboard. Taking
it even further it opens the door for the
technologies that allow recognizing your
handwriting to become commonplace and
that will change how the applications are
built and used in significant ways.
A Peek into the Future
We have seen how dramatically
computers have changed themselves from
a big giant number crunching machines to
little device that can fit into any hand and
can do amazing things. This change both
necessitated and has been fueled by the
research in the areas of technologies that
allow better human computer interactions.
Ok, so we have thin monitors with crystal
clear display, cordless USB based fancy
mouse, ergonomic keyboards and ultra
slim laptops. Where do we go from here
now? We human beings spend more
and more of our time with computers
and depend more and more upon it for
CSI Communications | September 2014 | 21
About the Author
carrying out our day to day activities.
Researchers have started realizing that
computers are becoming a natural part of
our lives. And that demands a shift in the
ways we interact with it.
Advancements in the technologies
like touch, sensors, gesture and voice
recognition, virtual reality etc. is paving
way for a new era for the computing or
rather the human computer interaction.
Current gesture recognition technologies
work in tandem with advanced cameras
having sensors and a possible device in
the hand. But as the technology advances
further the cameras with sensors that don’t
need any devices to be worn on the hand
are getting popular. Gesture and voice
recognition will change the way we talk to
the computer. Similarly developments in
the field of 3D and holographic display will
revolutionize the way we look at things.
These technologies taken together
are all set to take the text and GUI
based interface to next level. It holds
potential of not only making many of the
hardware components redundant but also
revolutionizes the way we interact with the
computers. For example, it will allow users
to interact from a distance with UI without
being in touch with the computer, and
so even more than one people can work
together on a big surface. Technologies
that can project the display output to
any surface and holographic display
etc. combined together with gesture
recognition will remove the requirement
of a fixed sized monitor component and
any surface of any size could potentially
become a monitor.
Latest researches in the area of
Biochips and Artificial Intelligence (AI)
are the promises for the future of the
computing. Computers developed in
near future will be super speed biochip
equipped, project 3D holographic display,
understand our gestures and voice with
precision, would be brain controlled
and who knows may be will understand
human emotions as well. Working with
the computers will be more direct, like
working with a human being (and so with
little of the additional devices). We are
really witnessing the history as it is taking
place just in front of our eyes.
References
[1]
[2]
[3]
[4]
[5]
[6]
History of Computers and the Internet
http://vig.prenhall.com/
samplechapter/0130898155.pdf
History of the Computer Mouse
http://www.computinghistory.org.uk/
det/613/the-history-of-the-computermouse/
Future of the Mouse and Keyboard
http://www.pcadvisor.co.uk/features/pcperipheral/3424183/whats-future-forkeyboard-mouse/
History of Computer Display
http://www.pcworld.com/
article/209224/historic_monitors_
slideshow.html
GUI Timeline
http://toastytech.com/guis/guitimeline.
html
Various References
http://en.wikipedia.org
n
Radharaman Mishra is a Senior Technical Architect with the Research & Innovation Tech CoE Group of IGATE. With over 14 years of
experience in the IT services industry, he has worked on software application architecture and design, development, architecture assessment
and consulting. His expertise includes .Net, ASP.Net and Microsoft SQL Server. He has been working with IGATE’s Fortune 500 customers
on various Microsoft-specific enterprise application architectures and design. He has also published papers of technical interests in various
external and internal forums.
CSI Communications | September 2014 | 22
www.csi-india.org
Cover
Story
Hardik A Gohel
Assistant Professor, Faculty of Computer Applications (FCA), Marwadi Education Foundation Group of Institutions
Looking Back at the Evolution of the Internet
Introduction
World Wide Web, mostly known
by its abbreviation WWW and
universally known as Web, has
plaiting solution variety for various
problems and for gathering global
audience information requirements.
Web is an interlinked hypertext
document system via internet, also
defined as network of networks,
for multimedia access. Since 1989,
Web is the highest data ordnance in
existing world and providing main
force for large scale of Information
Communication Technology &
Networking (ICTN). It is a very
tough job to analyse large content,
usage patterns or hidden content
structures. Further crucial job is to
generate knowledge from it. World Wide
Web was invented by Tim Berners-Lee
then and after 20 years first connection
was established known as Internet. Many
scientists with Tim at CERN, Switzerland
participated in experiments of exchanging
data and results which were otherwise
difficult for them and that helped Tim
understand the unrealized impending
demand of millions of interconnections
of computers through internet. At
present, Tim is director of World Wide
Web Consortium, abbreviated W3C and
working to add semantics in existing web.
History of Web
Tim-Berners-Lee built ENQUIRE, during
1980, as a personal database of people in
which hypertext and software utilities for
accessing database was key stream. The
main objective was global sharing of data
without presentation software as well as
common machine. First development by
him was NeXT Workstation. Then after first
web server and page with support of HTTP
and web browser named World Wide Web
was a project by itself. Rather than NeXT
it was modified further to be used on
other machine. On 6th August 1991 there
was a short summery posted by BernersLee on the project of WorldWideWeb
on alt.hypertext newsgroup. The project
intended to allow all links to be accessed
from anywhere with any information, and
for that they invited energy physicists with
Fig. 1 : First website
other experts to share data, information,
documentation and news.
Fig. 1 shows snapshot of CERN website,
the first website created in November 1992
which was publicly announced in August
1991. There was still no browser with
graphical UI existing for NeXT. This gap was
filled with Erwise, an application developed
by Helsinki University of Technology, Finland
and ViolaWWW by Pei-Yuan Wei in 1992
with ads on feature of scripting, graphics as
well as animation.
There was rising interest in the
development of web browser after
incorporation of graphical, scripting
as well as animation concept in web
browser. Netscape Navigator was based
on the Mosaic web browser which was
first graphical web browser. Then W3C
(World Wide Web Consortium) was
founded by MIT (Massachusetts Institute
of Technology) in 1994 with support of
DARPA (Defence Advance Research
Project Agency) as well as European
Fig. 2 : First Web Browser - MOSAIC browser V.1 released in April 1993
CSI Communications | September 2014 | 23
Table 1 : The Evolution of the web
Year
1991
1992
1994
1995
1996
1997
1998
1999
2002
2003
2004
2005
2006
2007
2008
2009
2010
2011
2012
Growth of web in Browsers & Technologies
HTTP (Hyper Text Transfer Protocol)
HTML 1 (Hyper Text Mark-up Language – Version 1) & MOSAIC – The first web browser
Netscape with HTML 2
Opera & Internet Explorer (IE)with concept of Cookies & SSL
JAVA with JavaScript as an HTML 3
Flash & XML and HTML 3.2
HTML 4 with CSS2
AJAX
SVG
Safari Browser
Firefox Browser
Canvas, Initial version of Opera Mini
XMLHTTPRequest2
First Iphone released with Safari Browser
Chrome Browser with HTML 5 and Request Protocol Handler as well as Offline web Apps : AppCache
CSS3 with 2D & 3D Transforms and Animation, Geolocation
Date & Time Input types, Audio-Video elements, CSS3 Flexbox and Index DB and First Firefox Browser for Mobile
Touch events, Chrome OS v1, Web RTC, File System API, WEB GL(Inbuilt Graphics support)
Chrome for Android Beta released, Content security policy, Full Screen API, CSS3 Filters, Web Audio API,
Commission. At the end of 1994 web
was made freely available by Berners-Lee
without claiming patent and royalty due
which has motivated people to publish
information online and instantly for
worldwide consumption. At present, web
has opened doors for direct web based
commerce. The utilities like search engine
and emails reached to common man.
Social networking includes facebook,
blogs, tweeter, LinkedIn and other popular
web-based applications are examples of
web evolution. There are some typical
areas of web utilization that include online
learning and tutorials, E-Governance,
E-Commerce, services and manufacturing
as well as research and development.
The table 1 shows evolution of web in
the terms of technology as well as browsers.
Now let us refer WWW in the terms of
invention includes social networking, tweets,
blogs, wikis and videos.
Video Web Evolution
Shareyourworld was the first website for
sharing video in 1997. There were many
plagued problems because of not having
advanced internet technologies and
shareyourworld is no longer available
since 2001 due to bandwidth as well as
financial problems of the company. It was
started by Chase Norlin who is head now
at audio/video search company pixsy.
Chase takes us down memory lane, during
the last internet boom when he launched
shareyourworld whose time was not quite
right. In the interview with Andy Plesser
(2007), Chase talks about challenges in
bandwidth. He wonders about success of
YouTube which picked up but this was not
possible for him in 2001. Video sharing
sites were not accepted until YouTube.
YouTube changed video sharing forever.
On 14th February 2005 YouTube was
launched by 3 former PayPal employees
Chad Hurley, Steve Chen, and Jawed Karim.
“Me at the Zoo, in Fig. 3, was the first
video of YouTube which was uploaded at
8:27 pm on Saturday 23rd April 2005. The
video was having very poor quality and it
was shot by Yakov Lapitsky at San Diego
Zoo on elephants. The duration of video
is 18 seconds.“ Presently, high definition
(HD) video with high quality of resolution
is available and streaming of video also
uses intelligent web aspects. Additionally,
there are web applications which
generate professionally produced videos
automatically by using patent-pending
cinematic Artificial Intelligence technology
as well as high-end motion design.
Web Based Electronic Mail Evolution
Email is as old as ARPANet or Internet. It
was not invented but has evolved from
simple to highly digital form. After the
foundation of WWW, two companies - one
is Hotmail and another is Yahoo - made
CSI Communications | September 2014 | 24
emails available with friendly web interface.
Hotmail was the first email service of email
founded by Sabeer Bhatia and Jack Smith.
The limitation for storage was 2MB only.
In December 1997 more than 8.5 million
subscribers were there with Hotmail.
Hotmail previously ran on Solaris for mail
services and Apache on FreeBSD for web
services. After 1997 Hotmail is now known
as MSN Hotmail due to its tie-up with
Microsoft Corporation.
Rocketmail, Now Yahoo Mail, was
founded by Yahoo in March 2002 which
was paid mail service with charge of
$29. Yahoo Mail was having new design
with additional features. Later Hotmail
included dropdown menus in DHTML
Fig. 3 : First video of YouTube
www.csi-india.org
and different categories of tabs with new
user customization in colour schemes. In
November 2002 Yahoo launched Yahoo
Mail Plus which was also a paid service
provifing high storage capacity and other
additional features like attachments and
multiple domain sending, filtering of
addresses and its storage.
Google mail, abbreviated with
Gmail, is a free email service run with
the support of advertisements as well
as Email clients. It has been founded in
2004 by Paul Buchheit who explored the
idea of web based mail in 1990. Google
started its work on Gmail in August 2001.
Yahoo and Hotmail, who were ruling the
market at that time, were using HTML
which requires reloading entire webpage
to provide different services. In Gmail it
is given feature of HTML with supported
JavaScript which is known as AJAX.
Furthermore “Google mail is having high
storage capacity, which is now available
in Yahoo and Hotmail too, but Gmail is
providing advanced search capabilities”.
Email evolution continues till date.
Today’s research direction says that
email service should improve in terms of
knowledge mining to provide workflow
enhancement. It also includes machine
learning filter, smart screen and spam
trigger for more security.
Social Media Evolution
Social networking sites are web based service
that helps to construct public or semi-public
profile within bounded system. The first
site of social networking was SixDegrees.
com created in 1997 which allows students
to create profiles and list their friends. The
purposes of these sites were to provide
online dating of different profiles with each
other. Classmate.com allowed people to
affiliate with their high school and college
buddies with surfing facility of other list. In
2000 the service of SixDegrees.com was
closed. During the period from 1997 to 2001
there were many community tools available
with support of combination of profiles and
publicly articulated friends. AsianAvenue,
BlackPlanet and MiGente allowed users
to create professional as well as personal
profile for dating.
In January 2004, Orkut, social
networking website was launched by
Google Inc, and was made available
worldwide in September 2004. The
service was designed to help users to
maintain existing relationships as well as
to create new relations. The creator of
Orkut is one of the employees of Google
named Orkut Büyükkökten. It was the
most popular website in Brazil and India
Google+ service was invented by
with 48.0% and 39.2% users respectively.
Google with Invitation only feature in
The numbers of users in US were only
2011. The purpose of invention was to
2.2%. Users of Orkut can add videos in
give an invitation to increase number of
their profiles form YouTube and Google
users for Google circle which was the old
Videos. The supplementary option is
name of Google+. But because of having
creating restricted or unrestricted polls
limitations to send number of requests,
for polling community of users. There is
Google has now launched Google+ for the
one integrated option with GTalk enabling
users having age of 18 years and above
chatting and file sharing with like button.
without having any kind of invitation.
On June 2014 Google announced closure
Wiki Evolution with Wikipedia
of Orkut by upcoming September.
Service that enables to add information to a
Facebook is a synonym of social
centralized place in attractive manner from
networking presently. It was founded by
different locations by multiple users with
Mark Zuckerberg in October 2003 with
collaborative web platform is known as
the name of Facemash. Previously it was
Wiki. In this, user doesn’t require any kind
for Harvard University only. Later on it was
of training. This concept was introduced by
expanded to other colleges in Boston area
Ward Cunningham in 1995 as “The Simplest
and then afterwards it was made available
online database that could possibly work”.
worldwide. In February 2004 Facebook
He has given the name “WikiWikiWeb”.
service was been launched by Facebook
This is also known as writable web as well
Company. It was based on “HOT or NOT”
as open editing concept.
game for Harvard students which allowed
Jimmy Wales and Larry Sanger,
visitors to compare two pictures side by
American entrepreneurs and founders of
side and let them choose who is HOT and
Wikipedia, launched Wikipedia in January
who is NOT. At present, Facebook with
2001. Previously in 1993 Rick Gates gave
792,999,000 visitors is a leading social
the concept of online encyclopedia but
networking website because of its unique
actual free encyclopedia was proposed
features that include News Feed, Friend
by Richard Stallman, president of free
and Unfriend capabilities, Wall, Timeline,
software foundation, in the year 2000. The
Like, Messages and inbox Notifications etc.
project named as Wikipedia, previously
It also supports applications such as Event,
Nupedia which was not a Wiki, with
Marketplace, Notes, Places, Platforms,
domain Wikipedia.com was started on
Photos, Videos and Facebook Paper. Some
January 2001. Server located at San Diego
of the group functionalities are like listen
was donated by Bomis. Bomis was dot
with friends, Facebook live, Mood faces,
com company that supported free online
Poke, URL shorter etc. From March 2011
content. Many former employees of Bomis.
onwards Facebook started supporting 70+
com contributed content to encyclopedia.
languages to prop up global audience.
In February 2001, totally 1000 articles were
There are other sites of social media
received by the project. It reached up to
such as Twitter, LinkedIn, Google+,
10,000 in September and 20,000 within a
MySpace which are very popular. Small
year. Then afterwards, there was a ratio of
messages, known as Tweet, become
1500 articles per month and in August 2002
popular by social networking site Twitter
number reached to 40,000. Presently in
Inc., at San Francisco. It was created
“English Wikipedia total number of articles
by Jack Dorsey in 2006. Jack Dorsey is
is 4,583,831 with 33,571,242 pages and
very reputed businessman in USA, and
835,702 files. There are total 731,253,050
an American software architect as well.
edits since the beginning and number of
Twitter.com site offers to post messages
users is 22,202,218. In Wikipedia there
online up to 140 characters long.
are 1,401 administrators who are handling
LinkedIn is another popular social
Wikipedia’s 129,524 active users”.
networking
website
Table
2
:
Service
stacked
up against Competitors (in 2011)
founded in December
2002 and launched in
May 2003. This site is Sr.No
Worldwide
Unique Visitors (in 000)
available in 20 different 1
Facebook
792,999
languages and is having 2
Twitter
167,903
259 million users across
3
LinkedIn
94,823
the world. Jeff Weiner is
Google+
66,756
the CEO of LinkedIn who 4
5
MySpace
61,037
was previously working
6
Others
255,539
with Yahoo.
CSI Communications | September 2014 | 25
Study of Web Generation
Web 1.0
In 1990s the first generation of web
has introduced with Netscape browser.
As we have discussed in introduction
section the purpose of this web was free
information sharing online. This web was
very unattractive with slow turnaround, low
quality of pictures, unreliable web hosting
as well as email, terrible customer services,
not or very little search engine optimization.
Web 2.0
Second generation of web was beyond
static web pages as well as web design. It
allowed users to interact and collaborate
with one another. The concept of Web
2.0 was initiated in late 2004. Although it
suggests new version of World Wide Web,
it not only includes technical specification
but also cumulative changes to the web.
Web 2.0 includes social networking sites,
blogs, wikis, video sharing, folksonomies,
hosted services and web applications. Web
2.0 allows users to do much more than
mere retrieving of information. Instead of
only reading information users can publish
comments and their views in articles. They
can create profiles with login and password.
There are browsers with user friendly
interfaces, application software and file
storage facilities. Therefore, web 2.0 is also
called network as platform computing.
Client side web, known as web browser,
in Web 2.0 used Ajax and JavaScript
framework for continued integration of
users with web pages. Server side web
in Web 2.0 includes same languages of
web programming or designing but, with
attractive data format. In Web 2.0 it is
possible to share data among multiple sites.
About the Author
Web 3.0 (Semantic Web)
Web 3.0 is also known as semantic
web and it is a mutual movement of
W3C (World Wide Web Consortium)
international standard. Semantic web is
an attempt to enhance current web so that
computers can process the information
existing on WWW, understand and fix
it, help humans to discover required
knowledge. It is proposed to form a huge
distributed knowledge based system to
share data instead of documents. In other
words, we can say that semantic web is a
common framework which allows data to
be shared and reused across applications,
enterprises and community boundaries.
The aspect of semantic network was
thought about by cognitive scientist Allan
M. Collins, linguist M. Ross Quaillin and
psychologist Elizabeth F. Loftus in 1960 in
many publications to represent semantically
structured knowledge. Tim Berners-Lee
coined the term semantic web to extend
the network of hyperlinked human readable
content (web pages) by inserting machine
readable content (metadata) about pages
and their interaction by enabling agents to
access the web more intelligently as well as
perform tasks on behalf of users.
“A Web of data that can be processed
directly and indirectly by machines is
semantic web” – Tim Berners-Lee
Future of Web (Web Intelligence / Web
Wisdom)
Presently, Millions of developers are
creating and using web in their desktop,
tablets, phones, televisions, automobiles,
digital billboards, watches and everywhere.
According to Tim Berners Lee, very soon
millions of sensors, appliances and other
devices will take web to new places. He
has mentioned that future of web is under
threat from governments who are likely to
misuse their power, from businesses who
try to destabilize open market and from
criminal activity. The future of web depends
on normal people talking with responsibility
for tremendous resource and on challenging
those who seek to manipulate web against
the public good. Tim has also mentioned
that the improvement of the infrastructure
to provide additional functional, robust,
efficient and available service web will
play very pivotal role. Furthermore, future
web, apart from being a space browseable
by humans, will contain rich data in a form
understandable by machines, thus allowing
machines to take a stronger part in analyzing
the web, and solving problems for us.
References
[1]
[2]
[3]
Tim Berners-Lee on “Past, Present and Future of
Web” at http://www.w3.org/People/BernersLee/1996/ppf.html (Accessed on 17th August
2014).
History Of Web (2014), Available at: http://
webfoundation.org/about/vision/history-ofthe-web/ (Accessed: 25th July 2014).
Tim Berners-Lee (2013) Frequently asked
questions, Available at: http://www.w3.org/
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
[16]
[17]
[18]
[19]
[20]
People/Berners-Lee/FAQ.html#Influences
(Accessed: 25th July 2014).
Tim Berners-Lee: WorldWideWeb, the first Web
client, Available at http://www.w3.org/People/
Berners-Lee/WorldWideWeb.html (Accessed:
30th July 2014).
Berners-Lee, Tim (1991) On “Qualifiers on
Hypertext links... - alt.hypertext”. Accessed on
11th July 2012 by Wikipedia.
Browse the first website using the line-mode
browser simulator, Available at http://linemode.cern.ch/www/hyper text /WWW/
TheProject.html (Accessed on 30th July 2014).
Evolution of the web, browsers & Technologies,
Available at http://www.evolutionofthe web.
com/#/evolution/day (Accessed on 1st August
2014).
Sajja P S, Akerkar R (2012) Intelligent Technologies
for Web Applications, 1 edn., USA: CRC.
Invention of YouTube and the First Video
sharing site Ever.(2013) http://www.chess.com/
groups/forumview/invention-of-youtube-andthe-first-video-sharing-site-ever (Accessed on
12th August 2014).
Andy Plesser (2007) First Video Sharing Site
Paved the Way for YouTube — ShareYourWorld.
com Was There First to Launch Ten Years Back
http://www.beet.tv/2007/07/first-video-sha.
html (Accessed on 12th August 2014).
Hartley, Matt (2010). “Ten of YouTube’s
most influential videos”. Canwest Global
Communication, Toronto, Ontario, Canada.
In Portuguese (2014) “Adeus ao Orkut” by
Google on June 30, 2014. (Accessed on 13th
August 2014).
Paulo Golgher (2014), Tchau Orkut, available
at http://en.blog.orkut.com (Accessed on 13th
August 2014).
Matheus Thomaz (2014), History of Orkut, at
http://socialnetworks-tsi.blogspot.in/2011/06/
history-of-orkut.html (Accessed on 14th August
2014).
Eric Eldon (2001), “ComScore: Google+ Grows
Worldwide Users from 65 Million In October To
67 Million In November” at http://techcrunch.
com/2011/12/22/googlesplus (Accessed on
14th August 2014).
Danah M Boyd, Nicol Ellison (2010) “Social
Network Site: Definition, History and Scholarship”
at http://www.danah.org/papers/JCMCIntro.pdf
(Accessed on 14th August 2014)
“The Inventor of Email” at http://www.
inventorofemail.com/history_of_email.asp
(Accessed on 14th August 2014).
Ian Peter (2004) “The History of Email” at
http://www.nethistory.info/History%20of%20
the%20Internet/email.html (Accessed on 14th
August 2014).
“The Brief History of Social Media” at http://
www2.uncp.edu/home/acurtis/NewMedia/
S o c i a l M e d i a / S o c i a l M e d i a H i s t o r y. h t m l
(Accessed on 14th August 2014).
Mahesh Mohan (2013) “Gmail vs. Outlook.com
vs. Yahoo! Mail: An Ultimate Comparison” at
http://www.minterest.org/gmail-vs-hotmailoutlook-vs-yahoo-mail (Accessed on 14th
August 2014).
n
Hardik A Gohel An academician and researcher, is active member as well as secretary of Computer Society of India Rajkot Chapter. He is
also devoted Assistant Professor of Faculty of Computer Applications (FCA) at Marwadi Education Foundation Group of Institutions. His
research spans Intelligent Web Technology, Applications and Services. He also focuses on “How to make popular, Artificial Intelligence
in study of Computer Science for various reasons”. He has 22 publications in various impactful Journals and proceedings of national and
international conferences.
CSI Communications | September 2014 | 26
www.csi-india.org
Cover
Story
Mr. K. V. N. Rajesh* and Mr. K. V. N. Ramesh**
*Sr. Assistant Professor, Department of Information Technology, Vignan’s Institute of Information Technology, Visakhapatnam
**Project Manager, Tech Mahindra, Visakhapatnam
A Brief History of BIDW (Business Intelligence
and Data Warehousing)
Introduction
Business Intelligence (BI) is a set of
tools and techniques used to derive
useful information from the vast
amount of organizational data. Data
Warehouse (DW) is a central repository
of organizational data derived from
various operational and other sources
and structured in a way suitable for
querying, analysis and reporting using
BI tools. Business Intelligence and
Data Warehouse are a necessity for all
businesses of considerable size who aim
to understand and grow their business.
Also, they have become a necessity
to support the day to day business in
various verticals and to generate the
reports necessary to comply with various
Government norms. This article aims
to present a brief history of Business
Intelligence and Data Warehousing (or
BIDW in short). It is not possible to
present this history in strict chronological
order since none of these techniques
and concepts have been invented or
discovered on any particular day. They
have slowly evolved over a period of time
ever since the data related to businesses
and organizations has been collected and
stored digitally using computers. Also,
the history of both these systems is being
presented in a single article since both of
them are intertwined and it would convey
the full purpose and meaning when both
are discussed and presented together.
This article also discusses the ideas and
concepts proposed and propagated by
various pioneers in the field of BIDW.
Evolution
Mainframes were one of the first
computer systems used in Businesses.
The organization data was stored centrally
on Mainframes. COBOL was used then
to create and deliver standard and
custom reports. The Business Users were
dependent on the Information Technology
staff for generating these reports. Any
changes to the existing reports or creation
of new reports required a long lead time.
Then, with the advent of Desktop
and Personal computing in 1980s, the
Business users too could do various kinds
of analysis on their own, using spreadsheet
software like Lotus 1-2-3 though they were
still dependent on the IT to get the data to
their Desktop.
Then, came the era of client-server and
distributed computing. With the data spread
across the organization across different
kinds of systems and databases, direct
access of data from these systems using
various end users tools became possible.
But this came with its own set of problems
like performance issues, data reconciliation
issues across different systems and no
availability of single version of truth.
The need for the Data warehouse
as the central repository of data which
could provide an integrated view of
Business, rose out of these issues
related to operational data spread across
systems. With the development and
implementation of DW systems, the end
users could connect to the DW using the
BI tools to fetch and analyze data on their
own with lesser support from the IT staff.
Business Intelligence
The earliest known usage of the term
“Business Intelligence” dates back to the
year 1865 in a book named “Cyclopædia
of commercial and business anecdotes” by
Richard Miller Devens. It mentions about
a London banker and politician named Sir
Henry Furnese (1658-1712) who maintained
a communications network across Europe.
He used this network to receive advance
information about battles before others and
used this to advantage to gain profits. The
term Business Intelligence was used in the
mentioned book in this context and we can
clearly draw analogies of this to the present
day usage of Business Intelligence to draw
wealth out of information.
The first documented usage of the
term “Business Intelligence” in the era of
automation was in year 1958 by H.P.Luhn
in the paper titled “A Business Intelligence
System” published in October 1958 edition
of IBM Journal. It talks about the automation
and information retrieval and dissemination
using data processing machines. The term
Business Intelligence is used in the context
of automated document and knowledge
management in a library setting. Analogies
of current concepts of BIDW like extract,
transfer, querying, scheduling, usage
tracking can be drawn with the concepts
mentioned in this paper.
After this too, Business Intelligence as
a term was used in many contexts and to
mean different things. The first time usage
of the term “Business Intelligence” with the
meaning as we know now, was in 1989 by the
Gartner Analyst Howard Dresner. He used
it as an all-encompassing term to describe
various methods in vogue for discovery of
information and to support decision making.
Data Warehousing
Ever since computers were used
commonplace, Businesses did collect data
and analyze it for deriving business benefit
out of the same. The need to report on the
business data for carrying out the day-today operations and complying with the
government norms was always there.
Data-driven
Decision
Support
Systems (DSSs) are earlier known
examples of how analysis of stored data
was used to aid decision making. One of
the first known example is that of AAIMS,
An Analytical Information Management
System, developed by Richard Klass and
Charles Weisss at American Airlines
during the period 1970-1974. It was
developed using the APL programming
language. It consisted of a database of
sales, price and employee data and aided
in data analysis through data retrieval,
manipulation and report generation.
Pioneering efforts with respect to
BIDW were carried out in Procter and
Gamble in around 1985. A Data driven DSS
that linked the sales information, scanner
data, products and customer was built
for P&G by Metaphor Computer Systems
which was a spinoff of the Xerox’s Palo Alto
Research Center. Later, many of the staff
from Procter and Gamble and Metaphor
Computer Systems like Ralph Kimball and
Katherine Glassey went on to found BI
vendors like Red Brick Systems and Brio.
The Business Data Warehouse as a
concept was first proposed formally in
paper titled “An Architecture for a business
and information system” by the IBM staff
named B.A.Devlin and P.T. Murphy in 1988
CSI Communications | September 2014 | 27
in IBM SYSTEMS JOURNAL, VOL 27,
NO 1. Many of the concepts related to
BIDW as we know now, were discussed in
this article. The need for DW as a separate
system from the operational databases
was discussed. The architecture of the
Business Data Warehouse with raw data,
detailed data, summary data and user view
of data was discussed. The requirement of
no change to public data in the Business
Data Warehouse has been emphasized
in this paper. The concepts related to
Data design, user views and access and
security, data loads and updates have also
been elaborated in this paper.
The subsequent discussion in the
history of DW would invariably involve at
least a brief mention of the approaches
proposed by Bill Inmon and Ralph Kimball.
Bill Inmon
Bill Inmon is acknowledged by many in this
field as the father of Data Warehousing. He
proposed an approach which is known as
Top-down approach. This involves building
one centralized repository which will act
as the enterprise-wide DW. The data in
this DW would be normalized and follow
the entity–relationship model (ER model).
The Data marts following the dimensional
modeling approach would be built out of
this DW to satisfy the reporting needs of
the individual departments. He published a
book titled “Building the Data Warehouse”
in the early 1990s detailing this approach.
Ralph Kimball
Ralph Kimball is another pioneer in the
field of DW whose methodology is known
as the Bottom-up approach. This approach
involves building individual data marts for
satisfying the reporting needs of individual
departments. These Data marts are built
using the dimensional modeling approach.
The Data Marts are joined using the
common dimensions to integrate them
into a complete DW. He published a book
titled “The Data Warehouse Toolkit” in the
1996 detailing this dimensional modeling
approach.
Both the Inmon and Kimball
approaches have their own set of advantages
and disadvantages. Inmon approach is a
very sound approach leading to a large and
integrated DW with an enterprise view of
data. The main disadvantage is the high
amount of initial cost and time required
before it starts giving return on investment.
Kimball approach has the clear advantage
that the individual data marts are more
easily built at a quicker pace leading to lower
initial cost and quicker return on investment.
The disadvantage is about how effectively
individual and disparate data marts can
integrate well and provide the full advantage
of a complete DW in actual.
In actual DW implementations, a
hybrid approach having the advantage
of both the approaches would be
more workable keeping in view of the
management and budgetary support
required to build such a system.
Relational Database Management
Systems (RDBMS)
Almost all the DWs that we know today are
implemented on RDBMS. The relational
model of building databases with tables
of rows and columns was introduced by a
IBMer named E.F.Codd in his paper titled
“A Relational Model of Data for Large
Shared Data Banks” which was published
in June, 1970 in the Communications of the
ACM journal. He proposed a set of 13 rules
to which a database needs to confirm, for
it to be considered as a RDBMS. These are
known as the Codd’s twelve rules.
The relational theory was given a
physical form through the Structured
English Query Language (SEQUEL) in
the 1970s by IBMers named Donald
Chamberlain and Raymond Boyce. This
was later renamed as Structured Query
Language (SQL). SQL consists of the Data
Definition Language (DDL) and Data
Manipulation Language (DML) used for
creation and modification of schemas,
and insert, update and delete the data and
to control access to data.
SQL is the language used by the ETL
tools to insert data into the DW and is
also used by the BI tools to query the data
stored in the DW.
Data in DW is structured to aid
bulk insert of data by ETL tools and fast
querying of the data by the BI tools. Some
of the features of the RDBMS which
aid Data Warehousing are Indexing,
Caching, Partitioning, Parallelism, and
Materialized Views.
The top databases for BIDW are
Oracle, DB2, MySQL, SQL Server, Teradata.
Oracle released the first commercial
SQL relational database management
named Oracle Version 2 in 1979. It holds
the number one position in Database
Management System (DBMS) market as
on date.
IBM released its version of the DBMS
known as the DB2 or the IBM Database 2
in 1983 on its MVS mainframe platform.
CSI Communications | September 2014 | 28
The name DB2 was used to indicate its
shift from the hierarchical databases to
the relational database.
MySQL was created by a Swedish
company and its first internal release was
in May, 1995. It was released over the
internet as an open source software. It is a
widely used Open Source RDBMS.
The SQL Server was co-developed
by Microsoft and Sybase for use on OS/2
platform in 1988. Initially, it was developed
in 1987 by Sybase as “Sybase SQL Server”
for UNIX. Microsft SQL Server has
specialized edition with Multiple Parallel
Processing (MPP) Architecture which is
optimized for large Data Warehouses.
Teradata is a RDBMS from a company
of the same name and aimed at Data
Warehouses and Data Marts. The first
beta version of the product was released
during Christmas of 1983 for Wells Fargo
Bank.
Extract, Load, Transform (ETL) Tools
The DWs source data from multiple and
different types of sources. The sources
could be RDBMS, flat files and also nonrelational databases. Initially, the ETL
process was carried out using custom
scripts and SQLs and procedural language
extensions of SQLs. But now-a-days most
of the organizations go for ETL tools for
creating the ETL tasks and running the
ETL processes. Informatica, IBM, SAP,
Oracle and SAS are the top vendors of
the ETL tools. Informatica PowerCenter,
IBM InfoSphere DataStage, Oracle Data
Integrator are the popular ETL tools.
Business Intelligence (BI) Tools
BI tools are used for querying, reporting
and analysis of the data stored in the
Databases and DWs and other sources.
SAP Business Objects, Oracle OBIEE, IBM
Cognos, Microstrategy, Microsoft SQL
Server Reporting Services, TIBCO Spotfire,
Tableau are the BI Tools currently popular
in market.
Online Analytical Processing (OLAP)
OLAP is the approach to do multidimensional analysis on data structures
known as cubes. The term OLAP was
coined by E.F.Codd in 1993. He proposed
the “twelve laws of online analytical
processing”. Oracle Hyperion Essbase and
Microsoft SQL Server Analysis Services
are popular OLAP tools.
Data Warehouse Appliances (DWA)
The term Data Warehouse Appliance
was coined in early 2000s by Foster
www.csi-india.org
Hinshaw, a founder of Netezza. DW
Appliances are packaged hardware
(servers, storage) plus software
(operating system, DBMS) architected
for huge data volumes and high
performance and hence are very useful
for deploying large Data warehouses on
them. They usually use the massively
parallel processing (MPP) architecture.
Netezza, Greenplum and Oracle Exadata
are popular examples of DWA.
About the Authors
Conclusion
Survival of the Businesses depends on
staying one step ahead of the competition
by understanding the internal and external
environment. BIDW tools provide the
power to understand the past and analyze
the present. They also provide the ability
to compare different parameters and
the potential outcomes using What-if
analysis. Users of the BIDW tools go up to
the level of CEO. This only explains how
important these tools are to Business.
This article has traced the timeline of how
BIDW technology has come way forward
from the time of advent of computers
to the state in which we see it now. The
usage and support for BIDW in Businesses
is only expected to grow in future.
References
[1]
Codd, E F (1970). A relational model of data
for large shared data banks. Communications
of the ACM, 13(6), 377-387.
[2]
[3]
[4]
[5]
[6]
[7]
[8]
Devens, R M (1868). Cyclopaedia of
Commercial and Business Anecdotes:
Comprising Interesting Reminiscences and
Facts... of Merchants, Traders, Bankers... Etc.
in All Ages and Countries... D. Appleton.
Devlin, B A, & Murphy, P T (1988). An
architecture for a business and information
system. IBM systems Journal, 27(1), 60-80.
Inmon, W H (2005). Building the data
warehouse. John Wiley & Sons.
Luhn, H P (1958). A business intelligence
system. IBM Journal of Research and
Development, 2(4), 314-319.
Nylund, A (1999). Tracing the BI family tree.
Knowledge Management, 70-71
Ralph, K, & Ross, M (1996). The data
warehouse toolkit. John Wiley & Sons.
http://www.oracle.com/us/corporate/
history/index.html
n
Mr. K. V. N. Rajesh has obtained his B.Tech in Computer Science and Engineering from Jawaharlal Nehru Technological University
in 2005. He obtained his M.Tech in Computer Science and Technology from Andhra University in 2010. He is working as Senior
Assistant Professor in department of information technology at Vignan’s institute of information technology, Visakhapatnam since
2005. He is a member of Computer Society of India. His research interests include Business Intelligence, Location Intelligence and
Big Data and he has published papers in the respective areas. He can be reached at [email protected].
Mr. K. V. N. Ramesh is a M.E in Structural Engineering from Andhra University. He has 14 years of experience in IT industry with
expertise in the area of Data Warehousing and Business Intelligence. He has worked on UNIX, Oracle, Sybase, Business Objects
and OBIEE during these years. He is an Oracle certified professional in Oracle DW and OBIEE. He is currently working as Project
Manager at Tech Mahindra, Visakhapatnam. He can be reached at [email protected].
CSI Communications | September 2014 | 29
Dear Member,
You must have observed the improvement in the quality and content of CSI-Communications. However we wish to have your
valuable feedback for CSI-Communications. You may use this Business Reply Envelope or a link available at CSI website:
http://www.csi-india.org/web/guest/publications
CSI Executive Committee has decided to offer a complimentary CSI Membership I-Card during CSI Golden Jubilee Celebrations
to all the Life Members, Corporate Members including Nominees of the institutes (academic and non academic) on receipt of
duly filled in form with passport size color photographs latest by 30th September, 2014 at the CSI Head Quarters, Mumbai. We
appreciate your time for your response.
Sincerely,
Suchit Gogwekar
Executive Secretary, CSI
YYYY
1. Since when are you a CSI Member?
2. Which other society’s membership do you have?
ACM
IEEE
NASSCOM
Any other 3. Do you get your monthly copy of CSI- Communications regularly?
Yes
No
Date
If Yes by what date of the month do you get it?
4. How do you rate the quality of content of CSI – Communications?
Excellent
Very Good
Good
Average
Poor
5. Which sections of CSI- Communications do you find the most interesting?
Cover Story
Technical Trends
Research Front
Articles
Security Corner
Practitioner Workbench
6. What are the additions you would like to see in the current content of CSI- Communications?
7. Which theme of CSI-Communications you like the most up till August 2014 issue?
8. Would you like to suggest any specific theme for the upcoming issues of the Magazine?
9. Which other Technical Magazine you read often?
Yes
No
Average
Poor
10. Do you access CSI – Communications’s Digital version - DigiMag?
If Yes, Rate your experience
If No, Tick the reason –
Excellent
Not aware
If No, Tick the reason –
Excellent
Not aware
Good
Not user Friendly
11. Do you access CSI- Communications App?
If Yes, Rate your experience
Very Good
Yes
Not Interested
No
Very Good
Not user Friendly
Good
Average
Not Interested
12. Have you ever referred CSI- Communications to your friends or Colleagues?
13. What version of CSI – Communications would you prefer?
Poor
Hard copy
Yes
No
Soft copy
(CSI’s “Go Green” initiative encourages members to opt for the soft copy. Those members who DO NOT return this form duly filled,
will be automatically moved to the “Soft Copy” option and will cease to receive the hardcopy of CSIC after the September issue).
CSI Communications | September 2014 | 30
www.csi-india.org
We appreciate your time to fill up following information which is required to update your Membership
record with us to serve you better and send you CSI Golden Jubilee Celebration I-Card.
Date :
d
d
m m
y
Affix your
photograph.
Please do not
staple and do not
sign on it.
y
CSI Membership Number:
Chapter:
Name:
Address:
City:
Pin :
Email id :
Mobile No:
Postage
will be
paid by the
Addressee
Signature :
No postage
Stamp
Necessary
if Posted in
India
BUSINESS REPLY ENVELOPE
Permit No.
Mumbai
To,
Mr. Suchit Gogwekar
Executive Secretary
Computer Society of India
Samruddhi Venture Park,
Unit No.3, 4th floor, MIDC, Andheri (E).
Mumbai-400093
CSI Communications | September 2014 | 31
Computer Society of India
TM
Education Headquarters, Chennai
Invites applications for the post of
Regional Education Officer
at Delhi, Kolkata & Bhubaneswar
Minimum Qualification: MBA with 5 yrs. experience
Maximum Age limit: 40 years
Last date of receiving application via e-mail: 30th September, 2014.
Send your bio data to: [email protected]
For details, visit: https://www.csi-india.org
Sanjay Mohapatra
Hony. Secretary
CSI Communications | September 2014 | 32
www.csi-india.org
Cover
Story
Dr. S. Natarajan
R & D and Teaching Professor and Key Resource Person, Department of Information Science and Engineering, PESIT, Bangalore
Strolling Down the Memory Lane
If I look back about 42 years in my life, I
can bring back those days when we were
simulating the trajectories of the missiles.
The work was carried out Defence
Research and Development Laboratory
(DRDL) situated in Hyderabad. This
was the birth place of Computer Society
of India. As compared to the current
scenario, we hardly had any computing
resources with us. I joined the Computer
Centre at DRDL in 1972. Before this,
Col Balasubramaniam the then Head
of Computer Centre went to Delhi on
promotion. I missed the opportunity to
work with him as my seniors used to
fondly remember him.
We had at our disposal an IBM
1620 computer for all the computing
needs of not only DRDL as well as other
Laboratories like Defence Electronics
Research
Laboratory
(DLRL)
and
Defence
Metallurgical
Research
Laboratory (DMRL). I saw in the log of
late 60s that we were also catering to
prestigious institutions like Tata Institute
of Fundamental Research (TIFR). It will
be interesting to note that all of software
relating to aerodynamics, structures,
control and guidance systems, propulsion
(solid and liquid) systems, simulation
etc., was carried out in IBM 1620. This
computer is a 8 bit system with memory
of 40K. All the programs were written in
FORTRAN II language. We needed a fullfledged Air-Conditioning system which
was provided by Military Engineering
Group (MEG).
The console of the computer had
multiple lamps and buttons. Perhaps the
computer operator in those days had a
lot of work to do. With our experience
we were able to decipher the operations
that are currently executed. The input
for this system was the source code in
punched cards. The picture of the system
is in Fig. 1 and the expanded picture of the
console is in Fig. 2. One may wonder how
the computer processing for the missile
development was done in those days.
Having gained experience in scientific
computing I joined National Remote
Sensing Agency (NRSA) now called
NRSC, in 1977.
In those days importing even
Fig. 1: IBM 1620 system with Card Reader in the left
Fig. 2: Console of IBM 1620
a medium sized computer was a
cumbersome process. During the initial
days at NRSA we did not have general
purpose computer at our disposal. So we
CSI Communications | September 2014 | 33
Fig. 3: IRIS 55 Computer
data processing of the
LANDSAT Satellite of
USA were done in this
system during that time.
The staff in the lodge
where we stayed used
to wonder as to what
we were engaged in
those unearthly hours.
Our rooms were locked
in the day as we were
sleeping. A partial view
of the system is in Fig. 4.
The
computing
facilities were added in
our office were of PDP11 families from Digital
Equipment Corporation
were using the IRIS 55 System (French)
at Electronics Corporation of India (ECIL),
Hyderabad. This was a 16 bit system with
256 K memory. When we were sending
our source cards to the console operator,
the errors of compilation were printed
in French and needed translation for the
correction process. A typical IRIS 55
system is displayed in Fig. 3.
Fig. 7: VAX 11/730 computer
Fig. 5: PDP 11/40
Fig. 4: Partial view of IBM 370/155
About the Author
We were also booking time on IBM
370/155 at IIT Chennai. The booking slots
are for a minimum of 1 hour and usually
start at mid night. Normally our timings
were between 2:00 AM and 4:00 AM. .
All the software programs for the satellite
Fig. 6: PDP 11/70 system
(DEC) which were the work horse for
satellite data acquisition at Shadnagar
Earth Station situated about 60 Kms
from Hyderabad as well as at Balanagar,
Hyderabad. Whenever, a prospective
customer wishes to evaluate PDP
systems our vendor M/S Hinditron
Computers used to bring them to our
premises as we had the PDP family of
systems with us. Some of these systems
are in the following figures.
This was followed by the
acquisition of VAX Series of Computers
of DEC. This was used when our first
Indian Remote Sensing Satellite (IRS1A) was launched in 1988. A typical
view of VAX 11/730 is below.
Now you may imagine that any of the
current day desktop with 2 GB RAM and
500 GB of Memory installed in homes is
much more powerful than any of these
systems but still good scientific work was
carried out in those days.
n
Dr. S Natarajan holds Ph. D. (Remote Sensing) from JNTU Hyderabad India. His experience spans 33 years in R&D and
10 years in Teaching. He worked in Defence Research and Development Laboratory (DRDL), Hyderabad for Five years
and later worked for Twenty Eight years in National Remote Sensing Centre (NRSC) at Hyderabad, India. He was trained
in Digital Image Processing in DLR, Germany and in Automated Cartography at IFAG, Germany during 1979 and 1980. His
areas of interest are Soft Computing, Data Mining and Geographical Information System.
CSI Communications | September 2014 | 34
www.csi-india.org
Research
Front
Manu K. Madhu* and Biji C.L.**
*M. Tech Student, MG University, Kottayam
**PhD., University of Kerala, Thiruvananthapuram
Parallel Computing with Message Passing Interface
This article is the second in the series of articles, focusing on Message passing interface programming for parallel computing paradigm.
A general introduction to parallel computing and message passing interface was covered in the previous issue. Current issue focuses
more on programming for MPI Subroutines with toy examples.
MPI Subroutines
MPI subroutine communicates among
different processors in the MPI
communication world for performing
jobs in parallel. MPI subroutine can
be called from languages such as C,
C++, FORTRAN77 and FORTRAN90.
As shown in Fig. 1, During the MPI
subroutine call in the main program,
compiler will execute the function and
returns result back to the main program.
be initialized only once and should be called
before any other subroutine. Subsequent
calls to this routine is erroneous. Users
can select the number of processors for
executing the task through command line
arguments. The syntax is int MPI_Init(int
*argc, char **argv). The input parameters are
‘argc’- pointer to the number of arguments
and ‘argv’- pointer to the argument vector.
MPI_COMM_size
The
MPI_COMM_size
subroutine
determines the size of the group associated
with a communicator. The syntax is int
MPI_Comm_size(MPI_Comm comm, int
*size), where MPI_Comm is a MPI object,
comm represents communicator and size
represents the number of processors in
the group of comm.
MPI_Comm_rank
MPI_Comm_rank subroutine is used
to distinguish each processor of the
communicator; an ID is assigned to
each processor and is called rank of the
processor. One processor communicate
explicitly to another processor using rank
as its ID and the syntax is in t MPI_Comm_
rank(MPI_Comm comm, int *rank)
MPI_Finalize
MPI_Finalize subroutine will terminate
the MPI execution environment. No other
MPI call can be made after calling MPI_
Finalize()
Collective Communication Subroutines
For executing jobs in parallel, it is required
to communicate with different processors.
The subroutines used to perform collective
communication are listed below.
Fig. 1: Flow of program with MPI_Subroutine
MPI_Reduce
This subroutine performs a global
reduction operation across all the
members of a group, and brings the
Subroutines defined inside MPI can be
classified as
Environmental Subroutines
Collective Communication
Subroutines
Point to point Communication
Subroutines
Environmental Subroutines
These include a group of subroutines,
which helps to initialize & finalize the
MPI execution environment, querying
processor’s rank and querying the
total number of processors in the MPI
communication world. The various
environmental subroutines is listed below.
MPI_Init
The MPI execution environment is initialized
using the MPI_Init subroutine. MPI should
Fig. 2: Schematic representation of process behind MPI_Reduce subroutine
CSI Communications | September 2014 | 35
result to the master node.Figure2 shows
schematic representation of process
behind MPI_Reduce subroutine. In
this example values 10, 40, 20 and 30
are fetched from each processor for
performing a specific operation and
results returned to the output buffer of
the processor 0 or root node. That is,
when MPI_Reduce subroutine is called
it will combine the inputs provided in
the input buffer of each processor in the
communicator, using the operation ‘*’,
then returns the result after the
operation to the output buffer of the
root node.
Syntax-intMPI_Reduce(void
*sendbuf,
void *recvbuf, int count,
MPI_Datatype datatype, MPI_Op op,
int root, MPI_Comm comm)
Input Parameters
sendbuf: Address of send buffer
(choice).
count :Number of elements in send
buffer (integer).
Datatype: Data type of elements of
send buffer (handle).
op :Reduce operation (handle).
Root: Rank of root process (integer).
comm :Communicator (handle).
Output Parameters
recvbuf:Address of receive buffer
(choice, significant only at root).
Reduce operations can be any of the
following
MPI_Reduce support a set of predefined
operations, which are listed below.
Table 1: Possible MPI_Reduce Operations
Point to point
Communication
Subroutine
It includes the subroutines
used to perform point to
point communication
MPI_Send
MPI_Send performs a
standard mode block
send
operation,
i.e.
these
functions
do
not return value until
the communication is
finished. The syntax is
Int
MPI_Send(void
*sendbuf, int count, MPI_
Datatype datatype, int
dest, int tag, MPI_Comm
comm), where MPI_
Datatype and MPI_Comm
are object.
Fig. 3: Data movement during MPI_Send and MPI_Recv
function calls
Input Parameters
sendbuf :Initial address
of send buffer (choice)
count: Number of elements in send
buffer (nonnegative integer)
datatype :Datatype of each send
buffer element (handle)
dest :Rank of destination (integer)
tag: Message tag (integer)
comm : communicator (handle)
MPI_Recv
Performs a blocking receive operation.
Receive buffer is a storage for count
number of consecutive elements of type
specified by data type. Message received
must be less than or equal to the length
of the receive buffer. The syntax is
int MPI_Recv(void *recvbuf, int
count, MPI_Datatype datatype,
int source, int tag, MPI_Comm
comm, MPI_Status *status)
MPI Name
Function
MPI_MAX
Maximum
MPI_MIN
Minimum
MPI_SUM
Sum
MPI_PROD
Product
MPI_LAND
Logical AND
MPI_BAND
Bitwise AND
MPI_LOR
Logical OR
MPI_BOR
Bitwise OR
MPI_LXOR
Logical exclusive OR
MPI_BXOR
Bitwise exclusive OR
MPI_MAXLOC
Maximum & location
MPI_MINLOC
Minimum & location
CSI Communications | September 2014 | 36
Input Parameters
Count: Maximum number of
elements to receive (integer).
Datatype: Datatype of each
receive buffer entry (handle).
source: Rank of source
(integer).
tag :Message tag (integer).
Comm:
Communicator
(handle).
Output Parameters
recvbuf: Initial address of
receive buffer (choice).
Status: Status object (status).
The data flow during MPI_Send
and MPI_Recv function call is depicted
below. When the processor 0 calls an
MPI_Send, the data stored in sendbuf(send
buffer) is copied into the sysbuf (system
buffer). And when processor 1 makes a
MPI_Recv function call, data from sysbuf of
processor0 will be copied into processor 1’s
sysbuf. Then from the sysbuf data is copied
into recvbuf (receive buffer) of processor 0.
Now, let us start MPI programming
with some toy examples. For better
understanding even, an ordinary C
program is included before the MPI
program. We have included three different
examples to brief the concept of MPI
programming.
Example 1: The trivial hello world program.
An ordinary Hello world program in C is
#include <stdio.h>
int main(intargc,char
**argv)
{
printf(“Hello world\n”);
}
The command line syntax for the
compilation of C program and the output
is listed below.
$ gcc hello.c
$ ./a.out
Hello world
The parallelized Hello world program with
the MPI subroutines is as follows.
The command line syntax for the
compilation of MPI program and the
www.csi-india.org
#include <stdio.h>
#include <mpi.h>
int main(intargc,char **argv)
{
intmyid, numprocs,i;
MPI_Init(&argc,&argv);
MPI_Comm_size(MPI_COMM_WORLD,&numprocs);
MPI_Comm_rank(MPI_COMM_WORLD,&myid);
printf(“Hello from processor %d of %d\n”,myid,numprocs);
MPI_Finalize();
}
output is listed. In the above example,
number of process defined is 4. Hence,
four different copies of the program is
generated and will be distributed to the
4 processors for executing the jobs in
parallel.
$ mpicc hello.c
$ mpirun -np 4 ./a.out
Hello from processor 0 of 4
Hello from processor 1 of 4
Hello from processor 2 of 4
Hello from processor 3 of 4
As next instance, let us try to
analyse the importance of MPI_Reduce,
used when a collective communication
is required.
Example 2:MPI Program to find sum
of marks obtained in 1st 2nd and 3rd years
and total marks obtained in degree exam
Table 2 shows the marks scored by Rinky in her degree exams.
Sub1
Sub2
Sub3
Sub4
Sub5
1st year
40
30
50
30
40
2nd year
50
30
50
40
40
3rd year
30
30
40
50
50
A linear code will be like this
#include <stdio.h>
int main(intargc,char **argv)
{
intmyid, numprocs,i,j,sum[3],tsum=0;
intdegreeMarks[3][5]= {
{40, 30, 50, 30,40} ,
//Degree first year marks
{50, 30, 50, 40,40} , //Degree second year marks
{30, 30, 40, 50,50} //Degree third year marks
};
for(i=0;i<3;i++)
{
sum[i]=0;
}
for(i=0;i<3;i++)
{
for(j=0;j<5;j++)
{
sum[i]=sum[i]+degreeMarks[i][j];
}
printf(“Year %d total marks=%d\n”,i+1,sum[i]);
}
for(i=0;i<3;i++)
{
tsum=tsum+sum[i];
}
printf(“Total marks obtained in Degree Examinations=%d\n”,tsum);
}
OUTPUT
$ gccdegreeMarksN.c
$ ./a.out
Year 1 total marks=190
Year 2 total marks=210
Year 3 total marks=200
Total marks obtained in Degree Examinations=600
CSI Communications | September 2014 | 37
Parallelized code will be like this
#include <stdio.h>
#include <mpi.h>
int main(intargc,char **argv)
{
intmyid, numprocs,i,sum=0,tsum=0;
intdegreeMarks[3][5]= {
{40, 30, 50, 30,40} ,
// Degree first year marks
{50, 30, 50, 40,40} , //Degree second year marks
{30, 30, 40, 50,50}
//Degree third year marks
};
MPI_Init(&argc,&argv);
MPI_Comm_size(MPI_COMM_WORLD,&numprocs);
MPI_Comm_rank(MPI_COMM_WORLD,&myid);
for(i=0;i<5;i++)
{
sum=sum+degreeMarks[myid][i];
}
printf(“Year %d total marks=%d\n”,myid+1,sum);
MPI_Reduce(&sum, &tsum, 1, MPI_INT, MPI_SUM, 0,MPI_COMM_WORLD);
if(myid==0)
{
printf(“Total marks obtained in Degree Examinations=%d\n”,tsum);
}
MPI_Finalize();
}
OUTPUT
$ mpicc degreeMarks.c
$ mpirun -np 3 ./a.out
Year 1 total marks=190
Year 2 total marks=210
Year 3 total marks=200
Total marks obtained in Degree Examinations=600
Let us focus on MPI_Send and MPI_Recv subroutine used for point to point communication. These subroutines are used to pass a
message from one processor to another.
Example 3: Write a MPI program to send the message “Message from Neymar is: Hi Messi, welcome to MPI WORLD “ from Processor
0 to processor 1.
#include <stdio.h>
#include <mpi.h>
#define MESSY 0
#define NEYMAR 1
int main(intargc,char **argv)
{
intmyid, numprocs;
char *msg;
MPI_Init(&argc,&argv);
MPI_Comm_size(MPI_COMM_WORLD,&numprocs);
MPI_Comm_rank(MPI_COMM_WORLD,&myid);
MPI_Status status;
if(myid==MESSY)
{
MPI_Recv(&msg, 30, MPI_CHAR, 1, 123, MPI_COMM_WORLD, &status);
printf(“\nMessage from Neymar is:%s”,msg);
}
if(myid==NEYMAR)
{
msg=”Hi Messy, welcome to MPI WORLD”;
MPI_Send(&msg, 30, MPI_CHAR, 0, 123, MPI_COMM_WORLD);
}
MPI_Finalize();
}
CSI Communications | September 2014 | 38
www.csi-india.org
OUTPUT
$ mpicc Message.c
$ mpirun -np 2 ./a.out
Message from Neymar is: Hi Messi,
welcome to MPI WORLD
About the Authors
Fig. 4: Messy and Neymar
Acknowledgement
We thank the campus computing
facility, University of Kerala for all the
technical support.
References
[1] Yukiya Aoyama, Jun Nakano
“RS/6000 SP: Practical MPI
Programming”
IBM
Redbooks
Vervante, 1999.
[2] http://159.226.149.45/kizsjzx/hpc/
mpi-course.pdf
n
Manu K. Madhu is an M Tech student of School of Computer Sciences, M G University, Kottayam. Apart from the
academic life, he is a passionate poem writer and he enjoys cooking.
Biji C.L. is currently working towards her PhD from University of Kerala. She is interested in communicating science
through popular science magazines and has earlier contributed to CSI communications.
CSI Communications | September 2014 | 39
Practitioner
Workbench
Amitava Nag
Assistant Professor, Head in Dept., IT, Academy Technology, India
Programming.Tips() »
Fun with C
#include <stdio.h>
#include <stdarg.h>
double average (int count,...)
{
va_list arg;
int i;
double sum;
va_start (arg, count);
for (sum = 0, i = 0; i < count; i++)
sum += va_arg (arg, double);
va_end (arg);
return sum / count;
}
main ()
{
printf (“%f\n”, average (5, 5.2, 6.5,
9.6,7.1,.3));
printf (“%f\n”, average
4.6));
(4, 2.1, 6.2, 4.3,
}
CSI Communications | September 2014 | 40
When the above code is compiled and executed, it produces
the following output:
5.75000
4.30000
Inside main(), in first function call average (5, 5.2,
6.5, 9.6,7.1,.3), the first argument (here 5) indicates
the number of arguments to be accepted by this call. Similarly, in
second function call average (4, 2.1, 6.2, 4.3, 4.6)
the first argument (here 4) indicates the number of to be accepted
by this call which is here 4.
In 3rd line of the program, in the statement double
average (int count,...) ellipsis (‘...’) is used to pass
variable number of arguments. In this program one data type
va_list and three macros va_start(),va_arg() and va_
end are used which are defined in the header file `stdarg.h’.
The data type va_list is used for argument pointer variables. The
macros va_start(),va_arg() and va_end () are used for
initialize the argument list, Get the next argument value and Clean
up the list respectively.
n
About the Author
Is it possible to have a function in ‘C’ program that can accept
variable number of arguments?
It is possible using an ellipsis (which looks like ‘...’) in place of
the last argument. The program below is a complete sample ‘C’
program that accepts a variable number of arguments.
Amitava Nag is working as an Assistant Professor and
Head in Dept. of IT, Academy of Technology, India and
is a member of CSI, IEEE and ACM. He is one of the
authors of the books Data Structures and Algorithms
Using C, Numerical Methods and Programming, Basic
Computation and Principles of Computer Programming,
Operating System etc.
www.csi-india.org
Practitioner
Workbench
Umesh P and Silpa Bhaskaran
Department of Computational Biology and Bioinformatics, University of Kerala
Programming.Learn("R") »
Regression Analysis with R
Regression analysis is one of the most widely used statistical
methods to estimate the relationship between the variables. The
objective of regression analysis is to find the relationship between
the independent variable (usually denoted as x) and dependent
variable (of x, usually denoted as y). Thus through regression
analysis, we try to find a function which relates x and y, which is
called a regression model.
In this tutorial, we focus on the simplest regression modellinear regression and its analysis. As the name indicates, the linear
regression model is expected to behave like a straight line.
Linear relationship can be of two types- Positive correlation,
which means the increase in the values of x will result in an
increase in the value of y and negative correlation, which means
the increase in the value of x will result in a decrease in the value
of y.
By regression analysis, we intend to find equation of
the function which relates x and y. i.e., in case of linear
regression, we will find equation of line that fits on the given
data. A typical linear regression model will be of the form
y= ax+b, where, ‘a’ is the slope of the line, ‘b’ is the y intercept of
the line.
Now let us look into one typical data. The following is the
data of samples collected from people of different ages and their
cholesterol levels in mmol/L.
> age = c(19,22,25,30,35,41,46,48,50,53,57,60,64,70)
> chol_level = c(4.1,4.3,4.3,4.4,4.5,4.6,4.7,4.6,5,5,5.1,5.3,5.5,
5.6)
First, let us see how these values are distributed. For this,
let us plot the values as a scatter plot. In R, type the following
command to obtain the plot.
> plot(age ~ chol_level, main=”Age Vs Cholesterol Level”)
This will give you a plot as in Fig. 1.
cholesterol levels and age. For this, R has a simple commandlm( ).
For this, use the following code in R. Here we store the
regression model in the variable, lm.out.
Fig. 2: Regression model
So our regression function will be, Age= 33.25 * (chol_level)+
(-114.83)
Now, Let us plot our regression line over the scatter plot.
> plot(age ~ chol_level, main=”Age Vs Cholesterol Level”)
> abline(lm.out, col=”red”)
Fig. 3: Regression line of Age Vs. chol_ levels
Fig. 1: Scatter plot of Age vs. cholesterol levels
From the graph itself, we can say that behavior of values
is almost linear. Now we will find the regression model for the
Linear regression, which model the linear relationship
between variables, fails to model the variables that are related
nonlinearly. For variables that possess nonlinear relationship,
we have to apply nonlinear regression model. In R, this is done
using the nls( ) command in a similar way like that of the linear
n
regression model we explained above.
Ask an Expert (Your Question, Our Answer), On the Bookshelf and Innovations in India columns are excluded in this issue due to want
of space. Do ask your questions and send them to [email protected] for receiving replies.
- Editorial Team
CSI Communications | September 2014 | 41
Security Corner
C. R. Suthikshn Kumar
Dept of Computer Engineering, Defence Institute of Advanced Technology, Girinagar, Pune
Information Security »
A Review of Cyber Security Curriculum in Indian Context
Abstract: Cyber Security curriculum has vital role in tackling cyber threats. A highly trained cyber security workforce is essential to meet
today’s cyber security challenges. The Cyber Security curriculum should ideally help to build Knowledge, Skills and Abilities (KSAs) in
all aspects of cyber security both theoretical and practical. This article reviews the Cyber security curriculum from Indian perspective
and provides comments and suggestions for enhancing them further.
Introduction
The term cyber security has originated
from ‘cyber space’. The word ‘cyber’ means
computer and ‘cyber space’ would mean
computer network according to dictionary.
The word ‘cyber’ is also used as an adjective
to relate a term to computer. With rapid
diffusion of internet and world wide web,
the ‘cyberspace’ is where people do online
transactions, data communication, emails,
web based shopping, chatting, video
conferencing, etc. Cyber space has been
there for only couple decades while there
has been rapidly growing cyber threats,
cyber attacks, cyber terrorism, cyber
espionage, all of which undermine the
security of cyber space. While the army
secures land, navy secures the sea, air force
secures the sky, coast guard secure the
coastal areas, cyber security force secures
the cyber space. While army, navy, air force
and coast guard are defending the tangible
land, sea, sky and coast, the cyber space
is an intangible asset and is much more
complex to defend and secure.
Cyber Security can be defined as[5]
‘Measures relating to the confidentially,
availability and integrity of information that
is processed, stored and communicated
by computing devices such as computers,
smart phones etc.’ A country’s national
security, economic prosperity, global
reputation and social wellbeing rely on
cyber security to a large extent.
Cyber Security is a field which
is receiving attention recently. Cyber
Security related articles have been given
headline news coverage in leading news
papers and magazines. There is growing
concern regarding the cyber threats, cyber
attacks, cyber warfare, cyber terrorism,
Cyber espionage. With awareness about
cyber security growing among public,
there is increasing use of cyber security
applications such as Anti-virus software
installed on PCs, Spam Filters for emails,
Password authentication for login,
Firewalls for intranets, Digital signatures
etc. With banking transactions going
online for credit cards, money transfer,
online shopping etc., the internet security
using secure networking protocols,
encryption/authentication using public
key cryptographic systems are becoming
order of the day. Recent attempts at
e-governance, i.e., using the internet for
administration provides impetus to the
importance of Cyber security. As the
use of information technology expands
exponentially, the consequences of cyber
attacks also grow rapidly. Hence there
is a need for skilled workforce of cyber
security professionals to prevent and
defend against such cyber attacks. These
cyber Security professionals build and
certify applications designed to withstand
attacks, diagnose and prevent security
intrusions, and defend against cyber
attacks.
Pro-active and reactive deployment
of cyber security requires high levels
of knowledge and skill sets. With the
shortage of trained cyber security
professionals, the lacuna can be filled
through various measures to educate fresh
graduates and working professionals.
According to the recent national cyber
security policy[6] published by Dept of
Electronics and IT, an important objective
is to “create a workforce of 500,000
professionals skilled in cyber security in
the next 5 years through capacity building,
skill development and training”. However,
policy does not discuss the level of skills.
The Human Resource Development
strategies to meet the objective set in the
policy consist of four steps as listed below:
1.
2.
3.
CSI Communications | September 2014 | 42
To encourage
cyber security
programs both in institutes and
universities to support the Nation’s
cyber security needs.
To establish cyber security training
infrastructure across the country by
way of public private partnership
arrangements.
To establish cyber security concept
labs for awareness and skill
development in key areas.
To
establish
institutional
mechanisms for capacity building
for Law Enforcement Agencies
While establishing Cyber security
Institutes, one should ensure that the
curriculum adapted is adequate to meet
the real world challenges. The subjects,
syllabus, lab experiments which need to be
included in such a program of study need
to be deliberated upon in detail. While
Computer science curriculum has been
studied and latest curriculum structures
are made available through ACM/IEEE task
forces[8], the Cyber Security curriculum
is still being debated[9][10]. This paper is
an attempt to review the Cyber security
curriculum based on the current programs
being offered, review papers and reports
published. A review of infrastructure/Lab
to provide hands on experience on cyber
security is also presented.
This paper is organized as follows: In
the next section, the challenges of cyber
security are presented in national context.
The section 3 discusses the various
dimensions of cyber security. In section
4, a review of current cyber security
curriculums in leading universities is
presented. The summary and conclusions
are presented in the section 5.
4.
Challenges in Cyber Security
The exponentially growing number
of computers, smart phones,
tablet
computers poses a ever growing
challenge for cyber security professionals
in safeguarding the data and traffic. The
important cyber security challenges can
be enlisted as follows:
•
Designing the curriculum to meet
the requirements for continuously
evolving computer and networking
technology.
•
Keeping abreast with the latest
developments in Cyber Security.
•
Developing practical skills and
‘adversarial thinking’ techniques.
•
Developing laboratory facilities to
www.csi-india.org
research the latest cyber threats,
attacks.
•
Developing library of books, ebooks,
reports, white papers, journals/
magazines, case studies with proper
classification to aid in teaching and
research.
•
Developing and retaining project and
supervision skills related to cyber
security.
•
Assessing and certifying the faculty,
students and practitioners of cyber
security.
The main goals of Cyber Security
measures are to ensure Confidentiality,
Integrity and Availability of the computer
systems, data, databases, networks,
applications, etc. The growing field of
knowledge and sophistication of threats
and attacks requires that the training
and skill levels of the Cyber security
professionals are competitive. The
curriculum design and delivery of Cyber
Security courses, supervision of research
students, administration of Cyber security
programs at post graduate level, are very
important academic challenges.
Dimensions of Cyber Security
Cyber Security is a multi-disciplinary
subject[3]. There are many dimensions
of cyber security and these according
to Essential Body of Knowledge[4] and
curricular guidelines[3] consist of following
areas i.e., :
•
Fundamental concepts
•
Cryptography
•
Security ethics
•
Security policy
•
Digital forensics
•
Access control
•
Security architecture and systems
•
Network security
•
Risk management
•
Attack/defense
•
Secure
software
design
and
engineering
•
Data security
•
System and Application Security
•
Telecommunication and Mobile
Communication Security
•
Regulatory
Standards
and
Compliance
•
Penetration testing
•
E-evidence
•
Perimeter defense
•
Secure coding and software security
Apart from the knowledge, following
are operational areas where skill sets
of system administrators, managers, IT
personnel come into picture:
•
•
•
•
Enterprise Continuity
Incident Management
IT Security Training and Awareness
IT
Systems
operation
and
Maintenance
•
Personnel security
•
Physical and Environment Security
•
Procurement
•
Risk Management
•
Strategtic Security Management
While a cyber security professional
is expected to be skilled and have
practical knowledge in handling top ten
vulnerabilities and risks in cyber space[3]
as shown in the following table:
Rank
Name
1
Injection
2
Broken authentication and
session management
3
Cross-site scripting (XSS)
4
Insecure direct object
references
5
Security misconfiguration
6
Sensitive data exposure
7
Missing function-level access
control
8
Cross-site request forgery
(CSRF)
9
Using components with
known vulnerabilities
10
Unvalidated redirects and
forwards
Adversarial thinking skills[2]: The
cyber security professionals should have
adversarial thinking capabilities, so that
system builders can view system designs
through the same lens attackers do.
These professionals should also focus
on principles and abstractions that bring
discipline to the art of building secure
systems. The adversarial thinking training
can be imparted through a set a case
studies. While in Management schools,
we observe the use of case studies, the
Cyber Security institutes also need to have
access to good quality case studies. Game
Theoritic based studies of Cyber Security
topics can contribute to developing
adversarial thinking skills[14].
Cyber Security Curriculum
Master’s degrees provide a cybersecurity
workforce with advanced capabilities[3].
Building on a sound basic BS or BE degree
in Computer Science or related field, an
additional two years of education could
cover important technical cybersecurity
topics. A two years master’s degree
program in cybersecurity would allow
students to master the knowledge, skills,
and abilities (KSAs) specific to advanced
topics in cybersecurity.
The MTech/MS program specializing
Cyber Security for Computing professionals:
A strong technical cybersecurity-specific
degree programs focusing on cybersecurity
built upon a rigorous undergraduate
background in computer engineering,
computer science, or software engineering.
Government/Private corporations should
encourage and improve cyber expertise by
funding scholarships to help students afford
graduate-level courses in cybersecurity.
Cybersecurity specialization requires a lot of
hands-on activities; experiential, supervised
learning. By analyzing the current cyber
security challenges and risks, the curriculum
for the Cyber Security specialization can be
evolved.
While there are very good cyber
security Masters programs around
the world at leading Universities and
institutions, we review three such
programs. The following table gives the
detailed comparison of the programs.
Additional
topics
on
Reverse
engineering can play an important role
in investigating security breaches. Hence
formal training in reverse engineering topics
are to be included in the curriculum. Lab
sessions for analyzing network traffic will
build an important skill. Working knowledge
of where to position an audit function
(operating system, database, etc.), when it
should be turned on, what it should record,
how does an operating system protect itself
from attack, and many more are to be built
through practical sessions. Training in cyber
defense as well as attacks and cyber warfare
gaming offer important opportunities to
develop and refine appropriate skills.
Cyber Security Lab: The cyber
Security Lab may consist of several
open source and commercial software
applications. The Network Defence
Trainer, Qualnet from Scalable Network
Technologies, Encase for Digital forensics,
open source PGP suite, Matlab, nikto
(web vulnerability analysis tool), Nessus
from Tenable Networks etc are some of
the example software which are useful
for hands on experiments. The students
should be encouraged to spend time in the
lab exploring these and similar software.
CSI Communications | September 2014 | 43
Univ/Institute
Features
Boston University MS in CS with
Specialization in Cyber Security[16]
University of Southern California,
MS in Cyber Security[17]
DIAT, M.Tech Program in Computer Science
and Engineering with Specialization in
Cyber Security.
Course
Requirements
8 Courses: Five courses need to be
from breadth Core list. The three
remaining courses are from non-core
list. The breadth core courses are in
four listed areas i.e., Theory, Software,
Systems and Applications. Further,
the students are adviced to select
Cyber Security related courses from
the Breadth and non-core courses.
9 Courses : 6 Core Courses
consisting of Foundations of
Information Security, Applications
of Cryptography and Cryptanalysis,
Foundations for Information
Assurance, Applied Information
Security, Distributed Systems and
Network Security, Secure Systems
Engineering.
This a two year program with intake of
students from officers serving tri-services
i.e., Army, Airforce and Navy, Scientists
and Technician serving in DRDO Labs,
open category GATE qualified students.
The curriculum is unique in the country
consisting of 12 subjects ( with Core and
Electives). The first semester has six core
subjects. The second semester has 2 core
courses and four electives.
Lab
Requirements
Not stated Explicitly
Not stated Explicitly
Cyber security lab in the First semester
Project
Reqruirements
A Thesis or project as per the
guidelines.
Not Stated Explicitly
Dissertation requirements in third and
fourth semester.
Comments
A strong program with very good A strong program with very good An attractive list of Electives. The Institute
choice of electives. The faculty and electives. The university has very has very good faculty and infrastructure.
good faculty and infrastructure.
infrastructure are excellent.
The course is also offered through
distance learning program.
important case studies in Cyber security
are necessary to build the proper context
for the students. The adversarial thinking
ability is what differentiates a cyber security
professional from a software professional.
We have recommended introduction of
subjects such as Fault Tolerant Computing
and Game theory as a part of the Cyber
Security Curriculum.
Summary and Conclusion
The Cyber Security curriculum plays an
important role in improving the detection,
analysis, mitigation and response to
sophisticated cyber threats, with a focus on
government, critical infrastructure and other
systems of national interest. A highly trained
cyber security workforce is essential to meet
the today’s cyber security challenges. The
Cyber Security curriculum should build the
knowledge, Skills and Abilities (KSAs) in all
aspects of cyber security both theoretical
and practical. The laboratory work augments
the class room discussions and review of
[1]
About the Author
Ethical hacking sessions can benefit
the student in better understanding of
vulnerabilities and exploits. The cyber
security students can be encouraged to
participate in various bounty programs of
google[12], facebook[13], Microsoft[11]. This
is beneficial as they can build their KSAs
related to latest technologies and security
concepts while also competing for prizes.
While, most of the programs focus
on the 2 of the 3 most important goals
of cyber security i.e., Confidentiality and
Integrity, the third most important goal
i.e., Availability needs to be addressed by
introducing subjects such as Fault Tolerant
Computing, Reliability Engineering etc.
Acknowledgement
This article is based on the author’s
presentation at the National Seminar on
Cyber Security organized by Information
Warfare School of Indian Air Force(IAF)
during 24th-25th July 2014.
References
[2]
[3]
[4]
[5]
IDSA, “India’s Cyber Security Challenge”,
IDSA Task Force Report, March 2012.
F. B. Schneider, “Cyber Security Education
in Universities”, IEEE Security and Privacy,
July/August 2013, pp. 3-4.
A. McGettrick, “Towards Curricular
Guidelines for Cyber Security”, Report of
a Workshop on Cyber Security Education
and Training, August 2013.
D. Shoemaker, A Conklin, “Cyber Security:
Essential Body of Knowledge”, Cengage
Learning, 2012.
Cyber Securirty page in Australian
Government website: http://www.ag.gov.
au/rightsandprotections/cybersecurity/
pages/default.aspx
[6] K. Bajaj, “The Cyber Security Agenda:
Mobilizing for International Action”, Report
of East West Institute, NY, 2010.
[7] “National Cyber Security Policy 2013”,
Dept of Electronics and Information
Technology( DEITY), www.deity.gov.in
[8] CS2013:Computer Science Curricula
2013, ACM/IEEE Joint Task Force on
Computing Curricula, Final Report 0.9,
Oct 2013.
[9] National Initiative on Cyber Security
Careers and Education: http://niccs.uscert.gov/
[10] National Initiative on Cyber Security
Education: http://csrc.nist.gov/nice/
[11] Microsoft Bounty program: http://technet.
microsoft.com/en-in/security/
[12] Google Vulnerability Program: http://
www.google.co.in/about/appsecurity/
rewardprogram/
[13] Facebook Bounty Program: https://www.
facebook.com/whitehat
[14] T. Alpcan and T. Basar, “Network
Security: A Decision and Game Theoritic
Approach”, Cambridge University Press.
[15] MK Sharma, “Cyber Warfare: The power
of unseen”, Knowledge world Publishers,
2011.
[16] Boston University, “MS in CS with
Specialization in Cyber Security”, Program
Brochure 2013.
[17] University of Southern California, “MS in
Cyber Security”, Program Brochure, 2013.
n
Dr. CRS Kumar is currently Head of the Department of Computer Engineering and also Chairman of Data Center in Defence
Institute of Advanced Technology (DIAT), DRDO, Ministry of Defence. He has received Ph.D., M.Tech and B.E. degrees from
reputed Universities/Institutes. His areas of interest are in Cyber Security, Network Security, Game Theory and Wireless
Networking. He is a senior member of CSI.
CSI Communications | September 2014 | 44
www.csi-india.org
Security Corner
Dr. Vishnu Kanhere
Convener SIG – Humane Computing of CSI (Former Chairman of CSI Mumbai Chapter)
Case Studies in IT Governance, IT Risk and Information Security »
IT History – “A vast early warning system” : When one thinks of IT history it brings to mind a compilation of reminiscences and collective
experience of people, personalities, development over the years in the field of computing and information technology. It covers stories of
technology innovations, initiatives, companies, institutions, academia, professionals, computers, devices, programming languages, OOPS, GUI,
the internet, a kaleidoscope offering myriad views – each different from the other. History is seen and appreciated from different perspectives
by different people. It provides lessons for the future – one learns from history, yet history repeats itself. In this context it lends strength to the
words of Norman Cousins, political journalist, author, professor, and world peace advocate. – “History is a vast early warning system”
Looked at from this angle, what does IT History contribute to IT Governance, IT Risk and Information Security? Governance has been with
us since times immemorial when early mankind organized themselves into tribes. First it was Nature and its inexorable laws. That was followed
by tribal laws and customs. Back home in India it was the Indus valley civilization, the Dharma of Manu and then on to the Panchayat form of
governance, Autocracy, the rule of the few, the rule of the classes and now democracy - the rule of the masses.
Risk is the flip side of change which is ever present and humans have dealt with it over the years in their own ways, dealing with risk using
inherited and acquired (learned) behavior and skills. From superstitions and beliefs to algorithms and enterprise risk management systems,
the decision making starts where the tools, techniques and formulae end. Be it the Mantra or the Management System – it is the gut feeling
that is ultimately used to take decisions.
Security comes from that feeling of familiarity and a sense of freedom from fear that the child gets when nestling in the lap of the mother.
The sense of protection and wellbeing is what provides security to the child. In information security this trust is provided by the triad of
confidentiality, integrity and availability.
Today we live in a world that is interconnected. The internet of computers is progressing to become the internet of things. The virtual
world is both a reflection of and represents the real world. Human interaction and humanity has not changed much at the core. The same
emotions move it, the same challenges excite and threaten it, and the same ideals, aspirations and aims drive it. What has changed is the
medium of interaction of social and cultural exchange, of business and commerce, of diplomacy and dialogue. In this changed world how
significant is our history? - The history of the successes and failures, of the peaks and nadirs of computing – Information Technology.
Given this background the current Case in Information Systems is being presented. The facts of the case are based on the author’s own
experiences and recollection of news, views and real life incidents. Although every case may cover multiple aspects it will have a predominant
focus on some aspect which it aims to highlight.
A case study cannot and does not have one right answer. In fact answer given with enough understanding and application of mind can
seldom be wrong. The case gives a situation, often a problem and seeks responses from the reader. The approach is to study the case, develop
the situation, fill in the facts and suggest a solution. Depending on the approach and perspective the solutions will differ but they all lead to a
likely feasible solution. Ideally a case study solution is left to the imagination of the reader, as the possibilities are immense. Readers’ inputs
and solutions on the case are invited and may be shared. A possible way forward from the author’s personal viewpoint is also presented.
A Case Study of Orbit Offshore Services
Rocky Smith CEO of Orbit Offshore
Services planned to overhaul his
information security setup. The ITES /
BPO company was just recovering from
a crisis. Sensitive personally identifiable
information of over 40,000 customers
of three of their important clients in the
BFSI segment had been compromised.
The investigation was still underway
and various theories were being floated
around, from suspected insider job by a
disgruntled employee to an attack by a
hacker ring supported by the mafia.
Rocky believed that change has
to be fundamental and wanted the
information security to be built on
sound foundations. The security had to be
based on a sound governance framework,
coupled with scientific risk management
and following policies, procedures, and
systems with awareness, understanding
and regular monitoring and improvement.
He had noticed that although the company
did possess the essential certifications
they were being maintained more for their
own sake mechanically than in their spirit.
To achieve this he had consulted
Arvind an IT Security expert who was
called in to meet Venkat, the CTO of
the company, who also handled the
information security portfolio.
Venkat was surprised to see Arvind,
a thin lanky man with greying hair wearing
a white kurta and pajamas with a jute bag
carelessly slung over one shoulder. “Looks
more the literary type to me” Venkat
thought to himself.
Venkat was even more surprised
when the conversation began. Venkat was
expecting an erudite presentation about
Information Security standards, protocols,
tools and techniques and an action plan
to protect the client data handled by the
company.
“Information Security is as old as our
ancient civilization” began Arvind. The
medium, methods, devices and the jargon
has changed but we can learn a lot yet
from the past. The ancient texts have a
wealth of information and history teaches
us a lot. One has to have an open mind and
see through the superficial meaning of the
words to gain an insight.
Take the case of the Ramayana - it is a
story for young children, a commentary on
life and values for the married, a philosophy
for the spiritually advanced, but it also
has lessons for the information security
practitioner – ‘Sita’ represents ‘data,’
reposing in the ‘Ashram hut’ a ‘hardened
system’ with a ‘secure perimeter’. ‘Marich’
the demon deer’s cry was actually a ‘remote
call’, the ‘Laxman rekha’ a ‘firewall.’ ‘Ravana
the ‘Trojan’ used a ‘malicious code’ to
access the ‘data’. ‘Jatayu’ the ‘IDS (Intrusion
Detection System)’ detected and reported
the incident to ‘Rama’ who was ultimately
successful in recovering and securing
‘Sita’ – the ‘data’ but not before it had been
‘tested for its integrity’ by ‘Agnipariksha’.
Ever given a thought to why the perimeter
security, the hardened systems, the firewall
and the IDS all failed at the same time and
sensitive data was compromised?
Arvind was of the view that to secure
information one had to work at many
levels. The ancients used code and layered
protocols involving metaphor and a tradition
CSI Communications | September 2014 | 45
that was never recorded, documented or
written down, but passed to eligible tested
disciples, only by word of mouth where the
intonation and sound was equally important
to convey the meaning, to prevent their
secret sensitive mantras from falling into the
wrong hands. We in modern times could not
just depend on encryption and VPN alone.
The first step was to have the right
team who were focused, aligned and
affiliated to the organization by that special
bond as existed between the Guru who
shared the knowledge and information
and the disciple who acquired it. Even
the information had to be separated such
that any part of it at one location would
by itself be useless and unintelligible. The
information itself would be ‘intelligent’ like
the ‘Astras’ of the Vedic times which did not
work if they fell in the wrong hands or were
attempted to be used for evil purposes.
Venkat was puzzled and approached
Rocky. Venkat personally felt that in these
modern times it was best to keep following
time tested currently accepted information
security standards and techniques. Though
not fool proof and despite admitting that
they had failed once, he felt they were the
best bet for the Company.
Rocky on the other hand felt that
if the approach suggested by Arvind
could be integrated with the standard
methodologies it would provide greater
depth to their information security and
make it more robust.
Venkat decides to call his mentor Mr.
Gopal who had taught him the basics of
information security.
Advice Mr. Venkat on the best
strategy to follow.
About the Author
Solution
The Situation
The company has currently faced and is
recovering from a major IT security incident
that has affected its reputation and bottom
line. It has the necessary certifications but
the top management is not too confident
about them and seems unsure of the
security governance and risk framework.
The good thing is that the CEO is proactive
about the situation and intends to do a
complete overhaul. The company seems to
have the option of continuing on the same
path albeit with more effective monitoring
and greater adherence to standards and
protocols, or else begin afresh by going
back to the planning board.
The Consequences
Continuing in the same fashion with
increased monitoring may not be enough
for the company and it may lead to more
such breaches in the future affecting
the company’s business prospects and
reputation. At the same time, going in
for a complete overhaul from scratch and
attempting to reinvent the wheel may not
be a very good idea either and the costs
and time it may take will make the whole
exercise prohibitive.
The Strategy
The right strategy for the company at this
stage would be
1. Understand the shortcomings of the
present system - the framework,
policies, practices and procedures
in the context of what the IT expert
has shared. The mention about
history and learning lessons from it
as well as the allusions to the ways
of ancients to secure information
are an indication, a metaphor – not
to discard the present system and
certifications, but to think out of the
box, and understand assimilate and
learn from the external and internal
environment and experiences.
2. The shortcomings of the Company are
probably an outcome of a mechanical
application of the 2005 version of the
ISMS standard which was prescriptive
in nature and tried to fit one size to all.
The major changes in the 2013 version
not only make it less prescriptive
but expect the entity to consider the
external and internal context and
issues. It is these inputs that provide the
basis for identifying risks and threats
that provide a basis for risk assessment
that is relevant for the organization.
The process is no longer asset centric
but risk centric in terms of maintaining
the CIA triad, reflected in the change
from the requirement of identifying an
‘asset owner’ to a ‘risk owner’.
3. The interested parties are clients,
customers, associates, regulatory
authorities, shareholders and other
stakeholders who have their values,
perceptions and expectations. So is the
business environment with its social,
cultural, political, legal, regulatory,
economic, financial, technological,
natural and competitive environment.
These relationships and key drivers and
external trends and issues as well as
the organization’s own internal culture,
formal and informal systems, values
perceptions and relationships should
form the inputs for the ISMS.
4. Implemented in this manner with
greater emphasis on harmonization,
human resources, addressing risks
and utilizing opportunities the
Company would be able to address
the concerns of its clients and
customers, meet legal and regulatory
requirements in a demonstrable
way, and help satisfy stakeholder
expectations at the same time meet
its own objectives which will be
aligned to the external environment
and meet internal and external
issues. This will not only result in
a continual improvement of its
information security governance but
also enable it to successfully meet
the requirements of the new 2013
version of the ISMS standard.
5. The context, the perception, the
values, the expectations, the issues
and the incidents both external and
internal are all present in the ‘history’
and it is an easy enough starting point
for the entire exercise. No wonder
experts often say that ‘one learns
from history.’ Yes, history is indeed ‘a
vast early warning system.’
An effective solution is generally
n
expected to proceed on these lines.
Dr. Vishnu Kanhere Dr. Vishnu Kanhere is an expert in taxation, fraud examination, information systems security and system audit
and has done his PhD in Software Valuation. He is a practicing Chartered Accountant, a qualified Cost Accountant and a Certified
Fraud Examiner. He has over 30 years of experience in consulting, assurance and taxation for listed companies, leading players
from industry and authorities, multinational and private organizations. A renowned faculty at several management institutes,
government academies and corporate training programs, he has been a key speaker at national and international conferences and
seminars on a wide range of topics and has several books and publications to his credit. He has also contributed to the National
Standards Development on Software Systems as a member of the Sectional Committee LITD17 on Information Security and
Biometrics of the Bureau of Indian Standards, GOI. He is former Chairman of CSI, Mumbai Chapter and has been a member of
Balanced Score Card focus group and CGEIT- QAT of ISACA, USA. He is currently Convener of SIG on Humane Computing of CSI
and Topic Leader – Cyber Crime of ISACA(USA). He can be contacted at email id [email protected]
CSI Communications | September 2014 | 46
www.csi-india.org
Brain Teaser
Dr. Debasish Jana
Editor, CSI Communications
Crossword »
Test your Knowledge on IT History
Solution to the crossword with name of first all correct solution provider(s) will appear in the next issue. Send your answers to CSI
Communications at email address [email protected] with subject: Crossword Solution - CSIC September 2014
CLUES
ACROSS
1.
5.
7.
8.
11.
14.
16.
18.
19.
22.
25.
28.
29.
30.
The person who developed the Complex Number Calculator,
a foundation for digital computers (6, 7)
An early object typed programming language (3)
Beginner’s All-purpose Symbolic Instruction Language (5)
The Common Business-Oriented Language (5)
Claimed as first object oriented language (6)
Inventor of FLOW-MATIC, a predecessor to COBOL (5, 6)
Considered as Father of Computer Science (4, 6)
Stored program architecture is commonly known as this
architecture (3, 7)
The person who developed the logic gate (7, 5)
Early use of a special card that carried digital information
(5, 4)
The American Standard Code for Information Interchange
(5)
The encryption machine used by Adolf Hitler (6)
Data storage medium that used magnetic recording (8, 4)
First mechanical adding machine or calculator (9)
DOWN
2.
Did you know why is flopply disk called as floppy?
The floppy disk drive (FDD) invented at IBM by Alan Shugart in
1967,appeared as an 8-inch disk, later became smaller to 5.25-inch
disk used on the first IBM PC in 1981. The name floppy was used
to indicate flexibility. It could be bend enough that one could
almost fold it in half. Even when it got smaller to 3.5-inch, the
name remained as a legacy!
Co-founder of Computer Sciences Corporation and co-creator of
FORTRAN (3, 4)
3. First Indian transistorized computer developed by ISI and JU at
Kolkata (5)
4. An early Online Data Processor machine developed at TIFR (5)
6. A storage medium from early days (4, 9)
9. An early high level programming languages (7)
10. Workstation that introduced the first GUI operating system (5, 4)
12. First network to use the Internet Protocol (7)
13. First Computer Programmer (3, 8)
15. The company formed by William Hewlett and David Packard
(7, 7)
17. The person who built the first machine that could play chess
(6, 7)
20. The person who coined the name “COBOL” (3, 5)
21. The first Indian software and management consultancy firm (3)
23. Size in inches for early floppy disks (5)
24. First computer game (8)
26. Manufacturer of first single chip microprocessor (5)
27. The first known calculator invented in Babylonia (6)
Solution to August 2014 crossword
(More details can be found in
http://en.wikipedia.org/wiki/History_of_the_floppy_disk)
We are overwhelmed by the responses and solutions received from our enthusiastic readers
Congratulations!
NEAR ALL correct answers to August 2014 month’s crossword received from
the following readers:
Dr. Jayamol Mathews (Dept of Computer Science, University of Kerala,
Kariavattom, Thiruvananthapuram, Kerala), Surendra Kumar Khatri (Affiliation
unknown) and V. R. Mote, Y. S. Pagar and D. T. Rathod (P. E. S. College of
Engineering, Aurangabad, Maharashtra)
CSI Communications | September 2014 | 47
Happenings@ICT
H.R. Mohan
ICT Consultant, Former AVP (Systems), The Hindu & President, CSI
hrmohan.csi@gmail .com
ICT News Briefs in August 2014
The following are the ICT news and headlines
of interest in August 2014. They have been
compiled from various news & Internet sources
including the dailies - The Hindu, Business Line,
and Economic Times.
Voices & Views
•
•
•
•
•
•
•
A recent Crisil study expects the Indian online
retail market to touch Rs. 50,000 crore by
2016 from the current Rs. 19,000 crore.
Social media can make your life more
productive - LinkedIn
Coimbatore growing as a major IT
exporter. It has managed to clock around
Rs. 4,000 crore from IT exports and
Industry is confident to achieve export
target of Rs. 5000 crore this fiscal. IT
exports from this region have grown
35-40% in the last two to three and the
region has engaged over 20,000 people in
the IT SEZs.
GSM operators have added a total of
4.85 million subscribers in July, a 0.66%
rise from the previous month, taking their
total user base to 744.42 million.
According to industry estimates, the
global speech analytics market will reach
$1.33 billion by 2019, driven largely by
corporate adoption.
The Indian e-commerce industry is
expected to spend an additional $5001000 million on infrastructure, logistics
and warehousing, leading to a cumulative
spend of $950-1900 million till 2017-20 –
Assocham & PWC study. .
According to a study by Google and AT
Kearney, India will see a major mobile
explosion as the Internet user base
will swell to 480 million by 2017 from
155 million at present on back of
smartphone penetration, which will grow
six times to reach 385 million people.
Govt, Policy, Telecom, Compliance
•
•
•
•
•
•
•
The IT industry in Andhra Pradesh
will have no power cuts and it will also
be exempt from Labour Laws and the
Shops and Establishments Act allowing
for 24x7 operations throughout the
year. The new IT Policy also allows the
industry to utilise the services of women
in night shifts. It has been declared as
an Essential Service under Essential
Services Maintenance Act.
Spectrum held by the Defence sector should
be released to mobile firms - Idea MD
Telecom regulator TRAI insists on
licence fee for tower firms. Government
would get additional revenues of around
Rs. 2,000 crore.
Modi to push for changes in US Immigration
Bill during his visit in Sep 2014.
STPI firm on certification for export invoices.
3G spectrum: Finance Ministry asks DoT to
resolve issues with armed forces.
Domain names with .Bharat will be
in Indian languages such as Hindi,
•
•
•
•
Marathi, Konkani, Maithalai, Nepali,
Boro, Dogri and Sindhi from 27th Aug.
Subsequently, domain names would be
given in Bengali, Telugu, Gujarathi, Urdu,
Tamil and Punjabi.
To create Hubli-Dharwad as the next IT
destination, the Karnataka Government has
selected four north Karnataka engineering
colleges to set up incubation centres.
Indian IT firms eye opportunities in Japan.
Govt to spend Rs. 20,000 cr for mobile
connectivity in villages trough NOFN.
Soon, public Wi-Fi access in cities with over
1 m people.
IT Manpower, Staffing & Top Moves
•
•
•
•
•
•
•
•
Firms that want to set up units at the
proposed IT hub at Visakhapatnam will
get a subsidy of Rs. 60,000 for every job
they create. In other projects, they will
get a subsidy of Rs. 40,000 for a job,
subject to a maximum of 80% of the
land cost.
Flat customer demand, mining more
work from employees and oversupply
of software engineers have kept the
salaries of fresher’s at Rs. 3 lakhs per
year, unchanged in the $108-billion IT
industry for the last six years. However,
with stability and growth returning, it is
expected that freshers salaries will start
moving upwards by 5-7% in 2015-16.
Cognizant
Technology
Solutions
recruited more employees in the quarter
ended June when compared to the top
three Indian IT companies. The 8,800
net new hires was the highest net
addition for the company since the third
quarter of 2011.
KPO firm eClerx to hire 2,500 this fiscal.
Polaris downsizes BPO unit by nearly
1000 on poor revenue yield.
After
Bollywood,
the
booming
e-commerce industry is emerging as a
big employment opportunity for creative
professionals such as fashion designers,
photographers,
Photoshop
experts,
content writers, creative directors and
even models.
Chip-maker MediaTek plans to invest
$200 m on expansion and to recruit 500
chip design engineers at Bangalore by
2017.
ValueLabs wants to raise its employee
strength to 8,000-9,000 from the current
3000 in two-three years.
Company News: Tie-ups, Joint Ventures,
New Initiatives
•
•
CSI Communications | September 2014 | 48
Flipkart, India’s largest online retailer, is
valued at an astonishing $7 billion (over
Rs. 42,500 crore) on the basis of two key
numbers: its 2.2 crore registered users
and the Rs. 6,000-crore revenue it earns
annually.
IRCTC could turn out to be a hidden jewel in
the Government’s asset basket, with market
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
experts valuing it from a conservative
Rs. 6,000 crore to Rs. 12,000 crore.
IIM-B joins edX as contributing member
to deliver education via MOOCs to a large
section of learners from around the world.
Ratan Tata expresses interest in ‘hot’
e-commerce sector. Reported to have
invested in Snapdeal.
Motorola to launch smartwatch later this
year.
MapmyIndia
launches
rear-seat
infotainment system.
Microsoft Ventures, iSPIRT to help startups
become attractive.
Google is conducting experiments with the
IITs to find out the best way to reach online
education to a wider audience, given the
varied cultures and languages in India.
The Indian Institute of Information
Technology (IIIT-S) has commenced
academic session at it campus in Sri City,
Chittoor.
Amazon to build a 1.6-million square feet
centre in Hyderabad for its biggest facility
outside of its corporate headquarters in
Seattle.
Oxigen wallet, a mobile wallet from
payment solutions firm Oxigen Services,
is being billed as India’s first mobile wallet
to enable money transfers through social
networks.
The Government launches eGreetings
portal www.egreetings.india.gov.in .
TCS, Bharti pledge Rs. 100 cr each for
Modi’s ‘Clean India’ initiative.
Indian start-ups bet on speech recognition
tech.
Offline vendors using e-comm sites for bulk
buying.
Online restaurant discovery site Zomato is
planning to start delivering food soon.
This social bot Bot-So, may watch over
your home someday. The basic prototype
hardware to cost Rs. 5000 with software
being open source, free.
Swiss cement giant Holcim may consolidate
its global data centre infrastructure in a
move that presents a $200-million revenue
opportunity for home-bred information
technology companies.
Email.biz offers free website with e-mail
account.
Business directory for smartphones
launched in Coimbatore. The download is
for free and would feature 90,000 listings
with 2,000 search categories.
Flipkart to provide online platform for
weavers.
Tata Value Homes, Snapdeal tie up to sell
homes online.
Videocon, first Indian brand in 4K ultra HD
television segment.
3D printing, big data can transform supply
chain industry.
Facebook partners with Vodafone India for
ad tool.
n
www.csi-india.org
CSI Report
Computer Society of India
CSI Golden Tech Bridge Programme
The Golden Tech-Bridge is now history! The programme was well conducted across the nation on Saturday 9 August 2014. It was indeed a befitting
tribute of the organization to the citizens of our country. The Student Branches captured the ideals of the event in letter and spirit, and paid attention
to all aspects in detail and depth.
There was participation from all segments of the community, such as housewives, elders, disadvantaged children, economically weak persons, people
of different vocations, many who had not used computers, and so on. The participants and the organizing institutions have expressed satisfaction and
happiness about the structure and implementation of the programme.
Several participants have been motivated to the usage of computers and IT, as they realized the potential and necessity. Many expressed the need for
further interventions to create a technologically familiar society, where every citizen is benefitted by IT for their day to day needs.
We admire the incredible support from the CSI President, the ExecCom Members, NSC, RSCs, SSCs along all phases of the programme. The personal
presence and participation of the President, OBs, NSC, RSCs, SSCs as well as several veteran members and Chapter OBs was an unparalleled
encouragement and reinforcement to the activity, and a formidable testimonial of the CSI assurance and promise to the citizens of our nation.
Your deep involvement in the project has been remarkable and exemplary. You made it a success by your sincere efforts and attention to all parameters
of implementation. It has been a very effective team work and co-operation. The CSI Education Directorate is overwhelmed at your dedication and
services and conveys the profound appreciation and gratitude for your passionate partnership and total participation in the event. Many Many
Thanks from CSI – ED to you, all your colleagues, volunteers and to your management !! Together, we will continue to strive to create more of such
programmes and enhance the value, reputation and glory of CSI.
Rajan T Joseph
CSI Education Directorate
Chennai
(RE
GIO
N-I)
N-III)
(REGIO
BHARATI
VIDYAPEETH'S
INSTITUTE OF
COMPUTER
APPLICATIONS &
MANAGEMENT
- NEW DELHI
(REGIO
N-I)
AES INSTITUTE OF
COMPUTER STUDIES
- AHMEDABAD
(REGION
(REGION-I)
KRISHNA
INSTITUTE OF
ENGINEERING &
TECHNOLOGY
- GHAZIABAD
N-II)
(REGIO
GOVT.
COLLEGE OF
ENGINEERING
& CERAMIC
TECHNOLOGY
- KOLKATA
DR. N.G.P
INSTITUTE OF
TECHNOLOGY
- COIMBATORE
(REGION-VII)
-V)
DRONACHARYA
COLLEGE OF
ENGINEERING
- GURGAON
II)
ON-V
(REGI
SRI RAMAKRISHNA
ENGINEERING
COLLEGE COIMBATORE
SRINIVASA
RAMANUJAN
INSTITUTE OF
TECHNOLOGY
- ANANTAPUR
(REG
(REGIO
ION-V
N-V)
II)
SHRI. S.S. SHASUN
JAIN COLLEGE FOR
WOMEN
- CHENNAI
RRS COLLEGE OF
ENGINEERING &
TECHNOLOGY
- PATANCHERU
(REGION-VII)
(REGION-VI)
ABHA GAIKWAD PATIL
COLLEGE OF ENGINEERING
- NAGPUR
SHREE
VENKATESHWARA
HI-TECH ENGINEERING
COLLEGE - ERODE
CSI Communications | September 2014 | 49
(RE
GIO
N-V
N-VII)
II)
(REGIO
K.S RANGASAMY
COLLEGE OF
TECHNOLOGY TIRUCHENGODE
SARANATHAN
COLLEGE OF
ENGINEERING TIRUCHIRAPALLI
(REGIO
N-VII)
(REGION
(REGION-VII)
II)
(REGION-VII)
DR.MAHALINGAM COLLEGE
OF ENGINEERING &
TECHNOLOGY - POLLACHI
(REGION-VII)
RANGANATHAN ENGINEERING
COLLEGE – COIMBATORE
AMRITA SCHOOLS
OF ARTS &
SCIENCES - KOCHI
KONGU ENGINEERING
COLLEGE - ERODE
(REG
(REGIO
ION-V
N-VII)
RATHINAM
TECHNICAL
CAMPUS COIMBATORE
N-V
(REGIO
II)
AMAL JYOTHI
COLLEGE OF
ENGINEERING
- KOTTAYAM
JAMAL MOHAMED
COLLEGE TIRUCHIRAPALLI
P.A. COLLEGE OF
ENGINEERING &
TECHNOLOGY
- POLLACHI
(REGION-VII)
(REGION-VII)
(REGION-VII)
VIVEKANANDHA ENGINEERING
COLLEGE FOR WOMEN - SALEM
(REGION-VII)
VELAMMAL INSTITUTE OF
TECHNOLOGY – CHENNAI
CSI Communications | September 2014 | 50
HINDUSTHAN
COLLEGE OF
ENGINEERING
AND
TECHNOLOGY COIMBATORE
(REGION-VII)
-VII)
SRI SAI RAM INSTITUTE OF
TECHNOLOGY - CHENNAI
II)
ON-V
(REGI
SNS COLLEGE OF
TECHNOLOGY
- COIMBATORE
KNOWLEDGE INSTITUTE
OF TECHNOLOGY - SALEM
(REGION-VII)
SARABHAI INSTITUTE OF
SCIENCE & TECHNOLOGY
- THIRUVANANTHAPURAM
(REGION-VII)
DR.M.G.R EDUCATIONAL AND
RESARCH INSTITUTE - CHENNAI
(REGION-VII)
EINSTEIN COLLEGE OF
ENGINEERING - TIRUNELVELI
(REGION-VII)
ERODE BUILDER EDUCATIONAL
TRUST'S GROUP OF INSTITUTION
– KANGAYAM
www.csi-india.org
CSI News
From CSI Chapters »
Please check detailed news at:
http://www.csi-india.org/web/guest/csic-chapters-sbs-news
SPEAKER(S)
TOPIC AND GIST
BANGALORE (REGION V)
Mrs. Bhanumathi K S and Mr. B G Suresh
6 August 2014: Workshop on “Hands on Cloud Computing”
Workshop covered several aspects of Cloud Computing such as What/
Why of Cloud Computing, Cloud Computing Stacks – IaaS, PaaS, and SaaS,
Cloud Delivery in terms of Public / Private / Hybrid Clouds and some key
contentious issues like Security, Vendor lock-in, Standardization of Cloud,
Steps to migrate IT to Cloud and economics of Cloud Computing. Reference
IaaS architecture from Amazon Web Services was taken and its various
elements such as Elastic Computing, Simple Storage Service, Block Storage
and Content Delivery Network were described. Hands-on opportunity was
provided to participants to provision full blown server and to create full
LAMP (Linux, Apache, MySql, PHP) stack on it. Participants could create
small web page and update backend database.
Participants and resource person during the workshop
CHENNAI (REGION VII)
Ramesh Narasimhan and Shiv Shankar
26 July2014: Workshop on “Statement of Purpose (SoP)”
Half Day Workshop for admission to Universities abroad was conducted
along with IEEE CS. It gave brief on five factors which decide outcome of
getting admission to Master’s or Doctoral Program in a foreign University
are - 1) Undergraduate record 2) Work experience or projects completed
3) GRE/GMAT/TOEFL Scores 4) Extra-curricular or Co-curricular Activities
and 5) Personal Statement of Purpose(SoP). Workshop provided guidance
on how to write the SoP that is successful differentiator to secure admission
abroad.
Students aspiring to study abroad with resource persons Ramesh Narasimhan
and Shiv Shankar
Maj Gen Balasubramaniam, HR Mohan,
G Ramachandran, Pramod Mooriath, S Ramasamy and
Parthasarahy
15 August 2014: Honouring Maj Gen Balasubramaniam – Founder Secretary
of CSI
As part of Golden Jubilee celebrations special meeting was organized by
inviting Past Presidents, stalwarts and doyens of the Chapter on 13th Aug.
Maj Gen Balasubramaniam, who was Founder Secretary in 1965 could not
attend due to ill-health. So present CSI President HR Mohan along with
others visited him at his residence and handed over the plaque to him and
honoured him.
CSI’s Founder Secretary Maj Gen Balasubramaniam being presented with
Golden Jubilee Plaque at his residence
Dr P Sekhar, Chairman, MicroTech Global Foundation
& Advisory Board member of Cyber Security & Privacy
Foundation
19 August 2013: Presentation on “Secured Governance for Techno-Economic
Growth”
Chapter along with Anna University, IEEE Computer Society and Cyber
Security & Privacy Foundation were invited for this special presentation.
The secured governance offers strategy for government to get all basic
infrastructure development with negligible investment. The concept is to
develop Techno Economic Corridors connecting hubs, which will act as
growth centre for individual sectors.
Organizers along with Dr. Sekhar and President HR Mohan
CSI Communications | September 2014 | 51
CHENNAI (REGION VII)
23 August 2014: Presentation on “Intro to Cyber-Security 2014 Challenges”
Dr. Col. (res.) Gabi Siboni
Talk was about securing cyber-space. It provided an overview of evolving field of
cybersecurity. Dr. Col. (res.) Gabi Siboni who gave the presentation is director
of The Cyber Security Program at The Institute for National Security Studies,
Tel Aviv University. He is a domain expert in national security, defense strategy,
military technology and operation, cyber security and warfare, and a thought
leader in business operations risk management.
Speaker Dr. Gabi Siboni with HR Mohan & other organizers
COCHIN (REGION VII)
7 May 2014: Technical Talk on “IPv6”
Ms. C. Sunitha, ITS; DDG DOT (NT-KERAL)
Internet has evolved into an important medium for voice and all types of data
connectivity and it has put pressure on IPv4 addresses. IPv6 represents one
of the most significant technology changes in the history of the Internet. With
growing number of online users around the world and proliferation of smart
devices, IPv4 exhaustion will become major technology issue in years to come.
Since all existing IPv4-based infrastructures will continue to work after the last
IPv4 address is issued, both IPv4 & IPv6 are going to coexist for some more
years. To sustain seamless, pervasive connectivity with consumers, partners and
businesses around the world, organizations need to be able to communicate in
dual-protocol environment that will ultimately become IPv6 only.
Speaker Ms. C. Sunitha
TRIVANDRUM (REGION VII)
Ramesh Chennithala, G Neelakantan, VK Mathews,
Girish Babu, Renjith Balan, Sreekanth P Krishnan, N
Vinayakumaran and C Balan
17 July 2014: Seminar on “Role of Cyber Forensics in Mitigation of Cyber
Crimes”
There was a session titled 'Was it a Cyber Crime? I didn’t know that!!'
by Mr. Vinayakumaran Nair. There was also a session titled 'You will
be caught./ You can catch. How?' By Mr. Balan. Third session was on
‘Tools and Demonstration’ also by Mr. Balan. Sessions were followed
by a Panel Discussion where panel members were Mr. Jacob Punnoose,
Mr. Satish Babu, Dr. Achuthsankar S Nair, Mr. Rajesh Babu, Mr. C Balan and
Mr. Rajagopalan Nair
Seminar inauguration by Ramesh Chennithala, Hon’ble Minister for Home
Affairs, Govt. of Kerala
From Student Branches »
(REGION-III)
IPS , COLLEGE OF TECHNOLOGY & MANAGEMENT
- GWALIOR
30th July 14 : Guest Lecture on Nano Technology
by Prof. Anurag Shrivastava and a section of
Audience
(REGION-IV)
SILICON INSTITUTE OF TECHNOLOGY
- BHUBANESWAR
(REGION-V)
ANITS CSI STUDENT BRANCH - VISAKHAPATNAM
2nd Aug, 2014 : Winner(L) and Runner up(R) 1st Aug, 2014 : Lecture on “Computability” by
teams of LogiCoder with SBC Prof. Bimal Dr. Prasad Jayanthi, Professor, Dartmouth
Kumar Meher(L) and Prof(Dr.) Bijan Bihari College, USA.
Misra, Dean(Research)
CSI Communications | September 2014 | 52
www.csi-india.org
(REGION-V)
VITS COLLEGE OF ENGINEERING – VISAKHAPATNAM
(REGION-V)
(REGION-V)
ACHARYA INSTITUTE OF TECHNOLOGY - BANGALORE
R.V. COLLEGE OF ENGINEERING - BANGALORE
1st Aug, 2014 : In Ethical Hacking and Security, 27th July, 2014 : SEARCC teams with Prof. Iqbal 25th & 26th July 2014,: Release of Proceeds in
HOD-CSE Prof. G RajaSekharam & CSI SBC Prof. Ahmed, Dy. Director-Training & others who the National Conference on “Technological
K Shankar felicitating the Speaker D Sai Satish
organised Regional level contest.
Advancement in Computing”
(REGION-V)
SRINIVASA INSTITUTE OF ENGINEERING AND
TECHNOLOGY - AMALAPURAM
(REGION-V)
(REGION-VI)
GODAVARI INSTITUTE OF ENGINEERING AND
TECHNOLOGY - RAJAHMUNDRY
S. N. J. B’S KBJ COLLEGE OF ENGINEERING ,
CHANDWAD, NASHIK
21st July, 2014 : Receiving CSI Student Branch 18th July, 2014 : In the International Conference
and Institution Member certificates from Dr. K on Advanced Computer Technology, Mr. P K
Rajasekara Rao
Rao, ED- ONGC, ignites the lamp, SBC and Dr. V
Venkata krishna , Principal are looking on
(REGION-VI)
(REGION-VI)
17th Aug 2014 : Prof. M R Sanghavi, Mr. Rahul
Kotecha, Prof. M M Rathod, Prof. P R Bhaladare,
Prof. D.P. Pawar in the Software Requirement
Specification Lecture
(REGION-VII)
BHARATI VIDYAPEETH COLLEGE OF ENGINEERING NAVI MUMBAI
R. H. SAPAT COLLEGE OF ENGINEERING,
MANAGEMENT STUDIES & RESEARCH - NASIK
SASTRA UNIVERSITY - KUMBAKONAM
1st Aug. 2014: Prof. Sonali Mane, Prof. S M
Patil, Principal Dr. M Z Shaikh, Guest Mr.
Rocky Jagtiani, Prof. D R Ingle, Prof. Vaishali
Bodade(SBC). are in the “Android Application ”
Workshop
28th July 2014 : Prof. N V Alone, Mr. Vinay Hinge,
Dr. P C Kulkarni, Mr. Tanmay Dikshit, Mr. Paresh
Chitnis, Prof. Archana Vaidya during the Seminar
on “Digital Forensics & IT Security”
1st Aug,.2014 : Seminar on “I.T – Best Practices “
by Dr. V S Shankar Sriram, Dept. of Information
Technology, School of Computing, SASTRA
University, Thanjavur.
(REGION-VII)
(REGION-VII)
(REGION-VII)
ER. PERUMAL MANIMEKALAI COLLEGE OF
ENGINEERING - HOSUR
EINSTEIN COLLEGE OF ENGINEERING, - TIRUNELVELI
CSI STUDENTS’ BRANCH, AVS ENGINEERING COLLEGE
- SALEM
19th Aug, 2014: Special address by Principal
Dr.S.Chitra on “YOUR UNIQUE IDENTITY”‘
seminar conducted by Mr.Y.Kathiresan, Senior
Manager CSI ED
8th Aug, 2014 : Mr. Jegan Vincent, Dr. R 18th July, 2014 : Lecture on “Self evelopment” by
Velayudham, Mr. NK MalarChelvan, Prof. A Mr. V P Soundararajan, Triumphant Institute of
Amudhavanan, Dr. K Ramar during the seminar Management Education
on “Guidelines for smart performance in the
technical interview”.
CSI Communications | September 2014 | 53
(REGION-VII)
ADHIYAMAAN COLLEGE OF ENGINEERING – HOSUR
(REGION-VII)
E.G.S PILLAY ENGINEERING COLLEGE NAGAPATTINAM
25th March, 2014 : National Workshop on 9th Aug, 2014 : Dignitaries with Dr. Rajkamal,
“Web Designing Tools” inaugurated by Dr. N S Chennai who delivers a lecture about “An Insight
Badarinarayanan, Dean with Mr. StephenRaj, on Academic Projects”
Ads-e-Park, Chennai .
DR. NAVALAR NEDUNCHEZHIYAN COLLEGE OF
ENGINEERING - THOLUDUR
2nd Aug, 2014: Mr. N Karthikeyan Head –
Operations of Dream Effects Multimedia & IT
Solutions, Chennai delivered the lecture on the
topic “WORDPRESS (an open source)”
CSI EDUCATION DIRECTORATE, CHENNAI
(REGION-VII)
NATIONAL ENGINEERING COLLEGE - KOVILPATTI
(REGION-VII)
12th AUGUST, 2014
18th July, 2014: Mr. S.P.Soman RVP 7 along with Organisers with Mr. Kathiresan, Sr. Mgr, CSI ED,
Mr.J.Jerart Julus, Dr.Kn. K.S.K.Chockalingam, at CSI Stall during Micro Entrepreneurship Expo
Dr.Manimegalai, Prof L.M.Nirmal Lakshman
by Puthiaya Thalaimurai Foundation in which CSI
is a knowledge partner
CSI Communications | September 2014 | 54
15th AUGUST, 2014
Independence Day was celebrated by Hoisting
the National Flag by Mr. G. Ramachandran , Past
Vice President and CSI Flag by Mr. H.R. Mohan,
President
www.csi-india.org
Application for Travel Grants for Researchers
Research Committee of Computer Society of India has decided to partly fund CSI Life Members to the extent of Rs. 25000/ for
travelling abroad to present research papers at conferences.
CSI Life Members who have been invited to present papers abroad and have received partial or no funding are eligible to apply for the
same. They have to apply within December 31, 2014 to [email protected] and furnish:
1.
2.
3.
4.
5.
6.
7.
8.
9.
Name of the Applicant, Organization Details and Bio Data of Applicant
CSI Life Membership Number
Name of the International Conference with details of the organizers
Conference Venue and Date
Copy of the Research Paper
Copy of the Invitation Letter received from the organizers
Details of funding received from/applied to for funding to any other agency
Justification for requesting support (in 100 words).
Two References (including one from head of the organization)
Dr Anirban Basu
Chairman,
CSI Division V (Education and Research)
CSI Communications | September 2014 | 55
CSI Calendar
2014
Date
Prof. Bipin V Mehta
Vice President, CSI & Chairman, Conf. Committee
Email: [email protected]
Event Details & Organizers
Contact Information
September 2014 events
19–20 Sep 2014
Two Day e-Seminar on Steps 2 Research conducted by Amal Jyothi College of Engineering, Shyam Gopi
Computer Science & Engineering and Computer Applications in technical partnership with [email protected]
the ISTE Kerala section and the CSI Cochin Chapter through AVIEW www.amaljyothi.ac.in
27 Sep 2014
ETIR-2014: National Workshop on “Emerging Trends in Information Retirival” at Mathura. [email protected]
Organised by GLA University in technical association with CSI Mathura, Div I & Region I.
http://www.gla.ac.in/IRWorkshop/
October 2014 events
10–11 Oct 2014
A conference on Advances in Cloud Computing (ACC) with special emphasis on Internet of Organizing Committee
Things (IoT) organised by CSI Pune Chapter at Pune. http://csi-acc.in/
[email protected] 31 Oct–1 Nov 2014
National Seminar is “Web Technologies & Communication: Recent Trends and Social Sreeprakash T
Impacts”., Cochin. Call for Papers. Details available at http://webcon2014.org/
[email protected]
November 2014 events
14–16 Nov 2014
International Conference On Emerging Computing Technologies-2014 (ICECT-2014)
Organized by Dept. of Computer Science and Applications, M. D. University, Rohtak in
association with CSI Region – I and CS Division – I.
14–16 Nov 2014
International Conference on Information and Communication Technology for Competitive Prof. Amit Joshi
strategies (ICTCS-2014) Organized by: Computer Society of India, Udaipur Chapter, Division Organizing Secretary
IV, I, SIG-WNs ,Hosted by: Sunrise Group of Institutions, Udaipur.
[email protected]
http://www.csi-udaipur.org/ictcs-2014
28–30 Nov 2014
International Conference on Advance in Computing Communication and Informatics at COER Dr. Vishal Singhal, Convener
School of Management, Roorkee , Uttrakhand http://coer.ac.in/ICACCI2014/index.html
[email protected]
Prof. R S Chhillar
[email protected]
December 2014 events
10–11 Dec 2014
49th Annual Student Convention,
Organised by Computer Society of India, Hyderabad Chapter In association with GNIT,
Hyderabad. Theme: “ Campus to Corporate” Venue: GNIT, Ibrahimpatnam, Rangareddy
District Telangana. http://www.csihyderabad.org/csi-2014
12–14 Dec 2014
49th Annual Convention ,Organised by Computer Society of India, Hyderabad Chapter In Sri .J. A. Chowdary
association with JNTU-Hyderabad & DRDO. Theme: Emerging ICT for Bridging Future
Sri. Gautam Mahapatra
Venue: JNTUH, Kukatpally, Hyderabad http://www.csihyderabad.org/csi-2014
[email protected]
12–14 Dec 2014 Special session on “Cyber Security and Digital Forensics” during Computer Society of India Dr. Vipin Tyagi
Annual Convention - 2014 by CSI Special Interest Group on Cyber Forensics, JNTU Hyderabad
[email protected]
16–20 Dec 2014
ICISS-2014: International Conference on Information Systems Security. At Institute for [email protected]
Development & Research in Banking Technology (IDRBT), Hyderabad, India. Co-sponsored by
CSI Division IV and CSI SIG-IS. http://www.idrbt.ac.in/ICISS_2014/
19–21 Dec 2014
EAIT-2014: Fourth International Conference on Emerging Applications of Information
Technology at Kolkata. Organized by CSI Kolkata at Indian Statistical Institute, Kolkata
https://sites.google.com/site/csieait/ For paper submission :
https://cmt.research.microsoft.com/EAIT2014
22–24 Dec 2014
ICHPCA-2014: International Conference on High Performance Computing and Applications Prof. (Dr .) Rachita Misra
Organized by: CV Raman College of Engg. in association with CSI Div-V and IEEE Kolkata [email protected]
Section http://www.ichpca-2014.in/
Dr. D D Sarma, Shri Raju
Kanchibhotla Shri Chandra
Sekhar Dasaka. http://www.
csihyderabad.org/csi-2014
Prof. Aditya Bagchi
Dr. Debasish Jana
Prof. Pinakpani Pal
Prof. R T Goswami
[email protected]
March 2015 events
11–13 Mar 2015
9th INDIACom; 2015 2nd International Conference on “Computing for Sustainable Global Prof. M N Hoda
Development” Organized by Bharati Vidyapeeth’s Institute of Computer Applications and co n fe re n ce @ bv i c a m . a c . i n ,
Management (BVICAM), New Delhi
[email protected]
CSI Communications | September 2014 | 56
www.csi-india.org
Registered with Registrar of News Papers for India - RNI 31668/78
Regd. No. MH/MR/N/222/MBI/12-14
Posting Date: 10 & 11 every month. Posted at Patrika Channel Mumbai-I
Date of Publication: 10 & 11 every month
If undelivered return to :
Samruddhi Venture Park, Unit No.3,
4th floor, MIDC, Andheri (E). Mumbai-400 093
Computer Society of India has been honouring academic excellence through Academic Awards every year. The awards will be
presented during the CSI Annual Convention to be held from 12th to 14th December, 2014 at Hyderabad. Applications are invited
for the following awards for the period from April 2013 to June 2014 from the accredited student branches who meet the criteria
and are currently in good standing.
Sl. No.
Name of the Award
Criteria
To be submitted by
1.
Best Accredited Student Branch
Award
Good standing – during the award year and currently, large
student strength & large number of activities as defined in the
specified form
Student Branch Counsellor
(SBC)
2.
Largest Student Branch Award
Continuous good standing for the past 3 years with highest
3 years averaged strength
Decided by ED
3.
Best CSI International Students Event
Host Award
Institutional member hosted maximum students competition
participated by minimum 10 foreign students
SBC
4.
Highest Sponsorship of CSI Events
Award
Institutional member extending maximum support for CSI
events during the award year
SBC
5.
Longest Continuous SBC Award
Longest continuous tenure as SBC over the last 3 years
SBC
6.
Faculty with maximum publishing in
CSI Publications
Publishing maximum articles in CSI publications during the
award year
Self
7.
Paper Presenter at International
Conference for Faculty
Presentation of paper at prestigious International Conferences
during the award year
Self
8.
Students with maximum publishing –
CSI publications
Publishing maximum articles in CSI publications during the
award year
SBC
9.
Highest Committed Accredited
Student Branch Activist Award
Most active CSI Volunteer from the Student Branch during the
award year
SBC
10.
Best Ph D Thesis Award
CSI member, who submitted a high-quality thesis (Thesis quality
to be evaluated by a panel of eminent research scientists)
leading to acceptance for Ph D degree by a recognized University
Research Scholar (who got the
Ph D during the award year)
/ the Research Supervisor /
Current Employer
The applications for the awards are invited only from the CSI members or from CSI Accredited CSI Student Branches
in good standing during the current year as well as during the Award year. Application Forms are available
at http://www.csi-india.org/web/guest/academic-excellence-awards.
The applications should reach Education Directorate as specified in the forms, latest by 6th October 2014. The Awardees will be
invited to attend CSI 2014 @ Hyderabad and receive the awards in person.
Regional Vice Presidents, RSCs, SSCs, SBCs and Chapter OBs are requested to give wide publicity and encourage applications.
Please submit the applications for awards to [email protected],
Awards Committee
Rajan T Joseph
Director (Education)
Prof S.V. Raghavan - Chairman
Prof Anirban Basu - Member
Prof A K Nayak
- Member
Prof R P Soni
- Member
Ms. Mini Ulanat
National Students’ Coordinator
CSI Communications | September 2014 | 57