Check out these funny accidents, and don't forget to mute the volume.
Boardawy Full Forum Software and Bulletin Board System
Labels: Computer Science ProjectsName : Boardawy Full Forum Software and Bulletin Board System
Platform : Perl
Completely rewritten. Now 400% faster with chat boards, RSS, Smileys, HTML Visual Editor, BBCode Editor, Code Syntax Hilighting, members List. Full featured forum software and bulletin board system software. Unlimited nested forums, multi lingual, multi theme, fully SQL driven, banner system, mail lists, multimedia and files upload, advanced search, highly customisable, wusiwyg visual html editor, full accounts system, e-commerce, credit card processing, paypal integration, private messaging, subscriptions, moderators manager, advanced forums permissions, backup, sql and database manager, custom functions, html template based, and hundreds of more features.
Download Link
Boardawy Full Forum Software and Bulletin Board System
You can refer to these links for help in making projects and project reports :
Tutorial : How to make a Final Year Project
Project Synopsis Tutorial
Project Report Tutorial
Platform : Perl
Completely rewritten. Now 400% faster with chat boards, RSS, Smileys, HTML Visual Editor, BBCode Editor, Code Syntax Hilighting, members List. Full featured forum software and bulletin board system software. Unlimited nested forums, multi lingual, multi theme, fully SQL driven, banner system, mail lists, multimedia and files upload, advanced search, highly customisable, wusiwyg visual html editor, full accounts system, e-commerce, credit card processing, paypal integration, private messaging, subscriptions, moderators manager, advanced forums permissions, backup, sql and database manager, custom functions, html template based, and hundreds of more features.
Download Link
Boardawy Full Forum Software and Bulletin Board System
You can refer to these links for help in making projects and project reports :
Tutorial : How to make a Final Year Project
Project Synopsis Tutorial
Project Report Tutorial
Content Management Server Seminar Topic
Labels: SeminarsIntroduction:
Content Management Server is one of the leading technology solutions on the market for the management of content rich web sites. Content Management Server provides a platform for web site development, content creation, and content delivery to a variety of web applications. Organizations can use the Content Management Server to improve the quality and timeliness of web site content while reducing both content creation and publication and web site development and management costs.
Difficulty : Medium
Download Link : Content Management Server
Please refer to the following links for your Seminar preparation:
How to give Seminar
How To create Seminar Report
Content Management Server is one of the leading technology solutions on the market for the management of content rich web sites. Content Management Server provides a platform for web site development, content creation, and content delivery to a variety of web applications. Organizations can use the Content Management Server to improve the quality and timeliness of web site content while reducing both content creation and publication and web site development and management costs.
Difficulty : Medium
Download Link : Content Management Server
Please refer to the following links for your Seminar preparation:
How to give Seminar
How To create Seminar Report
Project: Advanced Text Editor
Labels: Computer Science ProjectsName : Advanced Text Editor
Platform : Java
This is an advanced text editor, more or less like the windows notepad. Its full functionable and ready to implement.
Download Link
Advanced Text Editor
You can refer to these links for help in making projects and project reports :
Tutorial : How to make a Final Year Project
Project Synopsis Tutorial
Project Report Tutorial
Platform : Java
This is an advanced text editor, more or less like the windows notepad. Its full functionable and ready to implement.
Download Link
Advanced Text Editor
You can refer to these links for help in making projects and project reports :
Tutorial : How to make a Final Year Project
Project Synopsis Tutorial
Project Report Tutorial
Seminar Topic: Honeypot
Labels: SeminarsIntroduction:
A Honeypot is a trap set to detect, deflect, or in some manner counteract attempts at unauthorized use of information systems. Generally it consists of a computer, data, or a network site that appears to be part of a network, but is actually isolated and monitored, and which seems to contain information or a resource of value to attackers.
Difficulty : Easy
Download Link : Honeypot
Please refer to the following links for your Seminar preparation:
How to give Seminar
How To create Seminar Report
A Honeypot is a trap set to detect, deflect, or in some manner counteract attempts at unauthorized use of information systems. Generally it consists of a computer, data, or a network site that appears to be part of a network, but is actually isolated and monitored, and which seems to contain information or a resource of value to attackers.
Difficulty : Easy
Download Link : Honeypot
Please refer to the following links for your Seminar preparation:
How to give Seminar
How To create Seminar Report
News: Sega website hacked, 1.3m users data stolen
Labels: NewsReuters | Jun 20, 2011, 11.09am IST
TOKYO: Japanese video game developer Sega Corp said on Sunday that information belonging to 1.3 million customers has been stolen from its database, the latest in a rash of global cyber attacks against video game companies.
Names, birth dates, e-mail addresses and encrypted passwords of users of Sega Pass online network members had been compromised, Sega said in a statement, though payment data such as credit card numbers was safe. Sega Pass had been shut down.
"We are deeply sorry for causing trouble to our customers. We want to work on strengthening security," said Yoko Nagasawa, a Sega spokeswoman, adding it is unclear when the firm would restart Sega Pass.
The attack against Sega, a division of Sega Sammy Holdings that makes game software such as Sonic the Hedgehog as well as slot machines, follows other recent significant breaches including Citigroup, which said over 360,000 accounts were hit in May, and the International Monetary Fund.
The drama surrounding the recent round of video game breaches paled compared to what PlayStation maker Sony Corp experienced following two high-profile attacks that surfaced in April.
Those breaches led to the theft of account data for more than 100 million customers, making it the largest ever hacking of data outside the financial services industry.
Sega Europe, a division of Sega that runs the Sega Pass network, immediately notified Sega and the network customers after it found out about the breach on Thursday, Nagasawa said.
Lulz Security, a group of hackers that has launched cyber attacks against other video game companies including Nintendo, has unexpectedly offered to track down and punish the hackers who broke into Sega's database.
Source
TOKYO: Japanese video game developer Sega Corp said on Sunday that information belonging to 1.3 million customers has been stolen from its database, the latest in a rash of global cyber attacks against video game companies.
Names, birth dates, e-mail addresses and encrypted passwords of users of Sega Pass online network members had been compromised, Sega said in a statement, though payment data such as credit card numbers was safe. Sega Pass had been shut down.
"We are deeply sorry for causing trouble to our customers. We want to work on strengthening security," said Yoko Nagasawa, a Sega spokeswoman, adding it is unclear when the firm would restart Sega Pass.
The attack against Sega, a division of Sega Sammy Holdings that makes game software such as Sonic the Hedgehog as well as slot machines, follows other recent significant breaches including Citigroup, which said over 360,000 accounts were hit in May, and the International Monetary Fund.
The drama surrounding the recent round of video game breaches paled compared to what PlayStation maker Sony Corp experienced following two high-profile attacks that surfaced in April.
Those breaches led to the theft of account data for more than 100 million customers, making it the largest ever hacking of data outside the financial services industry.
Sega Europe, a division of Sega that runs the Sega Pass network, immediately notified Sega and the network customers after it found out about the breach on Thursday, Nagasawa said.
Lulz Security, a group of hackers that has launched cyber attacks against other video game companies including Nintendo, has unexpectedly offered to track down and punish the hackers who broke into Sega's database.
Source
Project: Sales Management System
Labels: Computer Science ProjectsName : Sales Management System
Platform : .Net
This is a management system for the sales process of products. A user can perform various functions like receiving order, processing order, order scheduling etc.
Download Link
Sales Management System
You can refer to these links for help in making projects and project reports :
Tutorial : How to make a Final Year Project
Project Synopsis Tutorial
Project Report Tutorial
Platform : .Net
This is a management system for the sales process of products. A user can perform various functions like receiving order, processing order, order scheduling etc.
Download Link
Sales Management System
You can refer to these links for help in making projects and project reports :
Tutorial : How to make a Final Year Project
Project Synopsis Tutorial
Project Report Tutorial
News: Apple sued in India
Labels: NewsPTI | Jun 20, 2011, 07.53pm IST
NEW DELHI: iPhone and iPad maker Apple Inc has come under the scanner of the Competition Commission of India for allegedly limiting the availability of its products to a few service providers using its dominant market position.
A customer has filed a complaint before the Commission under section 4 of the Competition Act 2002 that Apple is curbing the customer's choice by limiting the availability of iPhones and iPads in India to a limited number of service providers, besides its signature stores.
At present, iPhone's latest version is available in India through Aircel and Bharti airtel, while the iPads are sold through Apple store only.
An Apple official when contacted declined to comment. "The complainant has also alleged that a user can only download software from the istore and the others are not recognised by the device," a senior CCI official told PTI.
Besides, Apple phones could only be serviced in Apple centres, which in turn charge high rates for servicing.
The Commission is due to take up the matter for consideration by the end of this week, sources said.
iPhone, the touch screen handset that acquired a cult status in the US and other western countries, was launched for the first time in India in 2008. Following the launch, the new upgrades have also been introduced in the Indian market.
Smartphones are catching up fast in the Indian market, especially at a time more companies roll out 3G services across the country. 3G services, which offer high-speed Internet access, have already been rolled out by various operators like Airtel, Vodafone and Aircel.
According to a CyberMedia Research study, about 12 million smartphones are expected to be sold in India during 2011.
The Commission, which became fully functional in 2009, with the appointment of a chairman and six members, has the power to check anti-competitive agreements and abuse of dominant position, drawn from Sections 3 and 4 of the Competition Act, 2002.
Beginning June 2011, the Commission also received powers to check high-voltage mergers and acquisitions, with the notification of section 5 and 6 of the Act.
Source
NEW DELHI: iPhone and iPad maker Apple Inc has come under the scanner of the Competition Commission of India for allegedly limiting the availability of its products to a few service providers using its dominant market position.
A customer has filed a complaint before the Commission under section 4 of the Competition Act 2002 that Apple is curbing the customer's choice by limiting the availability of iPhones and iPads in India to a limited number of service providers, besides its signature stores.
At present, iPhone's latest version is available in India through Aircel and Bharti airtel, while the iPads are sold through Apple store only.
An Apple official when contacted declined to comment. "The complainant has also alleged that a user can only download software from the istore and the others are not recognised by the device," a senior CCI official told PTI.
Besides, Apple phones could only be serviced in Apple centres, which in turn charge high rates for servicing.
The Commission is due to take up the matter for consideration by the end of this week, sources said.
iPhone, the touch screen handset that acquired a cult status in the US and other western countries, was launched for the first time in India in 2008. Following the launch, the new upgrades have also been introduced in the Indian market.
Smartphones are catching up fast in the Indian market, especially at a time more companies roll out 3G services across the country. 3G services, which offer high-speed Internet access, have already been rolled out by various operators like Airtel, Vodafone and Aircel.
According to a CyberMedia Research study, about 12 million smartphones are expected to be sold in India during 2011.
The Commission, which became fully functional in 2009, with the appointment of a chairman and six members, has the power to check anti-competitive agreements and abuse of dominant position, drawn from Sections 3 and 4 of the Competition Act, 2002.
Beginning June 2011, the Commission also received powers to check high-voltage mergers and acquisitions, with the notification of section 5 and 6 of the Act.
Source
Project: Task Scheduler
Labels: Computer Science ProjectsName : Task Scheduler
Platform : Java
It is a complete application, when you are going to do any kind of task it will help you with its graphs and text. Just set the project name, time, and other descriptions.
Download Link
Task Scheduler
You can refer to these links for help in making projects and project reports :
Tutorial : How to make a Final Year Project
Project Synopsis Tutorial
Project Report Tutorial
Platform : Java
It is a complete application, when you are going to do any kind of task it will help you with its graphs and text. Just set the project name, time, and other descriptions.
Download Link
Task Scheduler
You can refer to these links for help in making projects and project reports :
Tutorial : How to make a Final Year Project
Project Synopsis Tutorial
Project Report Tutorial
News: Oracle seeks billions in damages from Google
Labels: NewsReuters | Jun 17, 2011, 10.50am IST
SAN FRANCISCO: Oracle Corp is seeking damages "in the billions of dollars" from Google Inc in a patent lawsuit over the smartphone market, according to a court filing.
The disclosure was the first time either side publicly mentioned the cumulative scale of Oracle's damages claims.
Oracle sued Google last year, claiming the Web search company's Android mobile operating technology infringes Oracle's Java patents. Oracle bought the Java programming language through its acquisition of Sun Microsystems in January 2010.
Some see the lawsuit as a sign of a growing business rivalry between the two companies.
The case is also part of a wider web of litigation among phone makers and software firms over who owns the patents used in smartphones and tablets, as rivals aggressively rush into a market in which Apple jump-started with iPhone and iPad.
Trial expected in November
Barring any settlements, a trial between Oracle and Google is expected to begin by November.
Google has called an Oracle damages report "unreliable and results-oriented," and asked a US judge in San Francisco to ignore it, court documents show. In disputing Oracle's methodology, Google also asked the court to keep private some damages information Google disclosed in a court filing.
Oracle then accused Google of trying to conceal the fact that Oracle's damages claims in the case are in the billions, according to a document filed on Thursday. Oracle said it did not object to having the information about its damages become public.
Due to Oracle's stance, US District Judge William Alsup ordered Google to make public the damages information by Friday.
A Google representative declined to comment.
The case in US District Court, Northern District of California, is Oracle America, Inc v Google Inc, 10-3561.
Source
SAN FRANCISCO: Oracle Corp is seeking damages "in the billions of dollars" from Google Inc in a patent lawsuit over the smartphone market, according to a court filing.
The disclosure was the first time either side publicly mentioned the cumulative scale of Oracle's damages claims.
Oracle sued Google last year, claiming the Web search company's Android mobile operating technology infringes Oracle's Java patents. Oracle bought the Java programming language through its acquisition of Sun Microsystems in January 2010.
Some see the lawsuit as a sign of a growing business rivalry between the two companies.
The case is also part of a wider web of litigation among phone makers and software firms over who owns the patents used in smartphones and tablets, as rivals aggressively rush into a market in which Apple jump-started with iPhone and iPad.
Trial expected in November
Barring any settlements, a trial between Oracle and Google is expected to begin by November.
Google has called an Oracle damages report "unreliable and results-oriented," and asked a US judge in San Francisco to ignore it, court documents show. In disputing Oracle's methodology, Google also asked the court to keep private some damages information Google disclosed in a court filing.
Oracle then accused Google of trying to conceal the fact that Oracle's damages claims in the case are in the billions, according to a document filed on Thursday. Oracle said it did not object to having the information about its damages become public.
Due to Oracle's stance, US District Judge William Alsup ordered Google to make public the damages information by Friday.
A Google representative declined to comment.
The case in US District Court, Northern District of California, is Oracle America, Inc v Google Inc, 10-3561.
Source
News: CIA website hacked
Labels: NewsReuters | Jun 16, 2011, 03.17pm IST
BOSTON: The public website of the Central Intelligence Agency went down evening as the hacker group Lulz Security said it had launched an attack.
Lulz Security has claimed responsibility for recent attacks on the Senate, Sony Corp, News Corp and the US Public Broadcasting System television network.
The CIA site initially could not be accessed from New York to San Francisco, and Bangalore to London. Later in the evening service was sporadic.
"We are looking into these reports," a CIA spokeswoman said.
Lulz Security has defaced websites, posted personal information about customers and site administrators, and disclosed the network configurations of some sites.
Security analysts have downplayed the significance of these attacks, saying the hackers are just looking to show off and get as much attention as possible.
In the case of the CIA attack, hackers would not be able to access sensitive data by breaking into the agency's public website, said Jeffrey Carr, author of the book Inside Cyber Warfare: Mapping the Cyber Underworld.
"All they're doing is saying 'Look how good we are,'" Carr said. "These guys are literally in it for embarrassment, to say 'your security is crap.'"
Lulz only made claims that it attacked www.cia.gov, and there was no evidence on Wednesday evening that sensitive data in the agency's internal computer network had been compromised.
There also were no apparent links to more serious network security breaches recently at the International Monetary Fund and Lockheed Martin Corp. Lulz Security has not been linked to those incidents.
Lulz, whose members are strewn across the globe, announced the attack shortly before 6 p.m. East Coast time.
"Tango down," the group Tweeted, pointing to www.cia.gov.
Although the group, also known as Lulz Boat, fashions itself more as pranksters and activists than people with sinister intent, its members have been accused of breaking the law and are wanted by the FBI and other law enforcement agencies.
Lulz broke into a public website of the Senate over the weekend and released data stolen from the legislative body's computer servers.
In May, the group posted a fake story on the PBS website saying that rapper Tupac Shakur was still alive and living in New Zealand. Shakur was murdered in 1996.
Source
BOSTON: The public website of the Central Intelligence Agency went down evening as the hacker group Lulz Security said it had launched an attack.
Lulz Security has claimed responsibility for recent attacks on the Senate, Sony Corp, News Corp and the US Public Broadcasting System television network.
The CIA site initially could not be accessed from New York to San Francisco, and Bangalore to London. Later in the evening service was sporadic.
"We are looking into these reports," a CIA spokeswoman said.
Lulz Security has defaced websites, posted personal information about customers and site administrators, and disclosed the network configurations of some sites.
Security analysts have downplayed the significance of these attacks, saying the hackers are just looking to show off and get as much attention as possible.
In the case of the CIA attack, hackers would not be able to access sensitive data by breaking into the agency's public website, said Jeffrey Carr, author of the book Inside Cyber Warfare: Mapping the Cyber Underworld.
"All they're doing is saying 'Look how good we are,'" Carr said. "These guys are literally in it for embarrassment, to say 'your security is crap.'"
Lulz only made claims that it attacked www.cia.gov, and there was no evidence on Wednesday evening that sensitive data in the agency's internal computer network had been compromised.
There also were no apparent links to more serious network security breaches recently at the International Monetary Fund and Lockheed Martin Corp. Lulz Security has not been linked to those incidents.
Lulz, whose members are strewn across the globe, announced the attack shortly before 6 p.m. East Coast time.
"Tango down," the group Tweeted, pointing to www.cia.gov.
Although the group, also known as Lulz Boat, fashions itself more as pranksters and activists than people with sinister intent, its members have been accused of breaking the law and are wanted by the FBI and other law enforcement agencies.
Lulz broke into a public website of the Senate over the weekend and released data stolen from the legislative body's computer servers.
In May, the group posted a fake story on the PBS website saying that rapper Tupac Shakur was still alive and living in New Zealand. Shakur was murdered in 1996.
Source
Project: E-Care
Posted by
Engineering Students Corner
at
07:37
.
0
comments
Name : E-Care
Platform : Javascript
This code allows the users to automate the help desk system. It has different levels of users like corporate user,corporate client and adminatration user,new user can register themselves as corporate user/client and should login into the system with CCxxx or CUxxx where CC refers for corporate client and cu refers corporate user.
Download Link
E-Care
You can refer to these links for help in making projects and project reports :
Tutorial : How to make a Final Year Project
Project Synopsis Tutorial
Project Report Tutorial
Platform : Javascript
This code allows the users to automate the help desk system. It has different levels of users like corporate user,corporate client and adminatration user,new user can register themselves as corporate user/client and should login into the system with CCxxx or CUxxx where CC refers for corporate client and cu refers corporate user.
Download Link
E-Care
You can refer to these links for help in making projects and project reports :
Tutorial : How to make a Final Year Project
Project Synopsis Tutorial
Project Report Tutorial
News: Winklevoss vs Facebook court clash lives on
Labels: NewsReuters | Jun 15, 2011, 07.40pm IST
NEW YORK: It may take the Supreme Court to end a years-long battle between a pair of Olympic rowing twins and Facebook Inc founder Mark Zuckerberg.
Zuckerberg has lost a court ruling that he hoped would lead to the end of litigation by Cameron and Tyler Winklevoss, who accused him of stealing their idea for the world's most popular social networking website. Their feud was dramatized in the 2010 film " The Social Network."
The identical twin brothers are challenging a San Francisco federal appeals court ruling that upheld a $65 million cash-and-stock settlement they reached with Facebook in 2008.
While they appeal to the Supreme Court, related litigation will be on hold, the appeals court ruled late on Monday.
That means Facebook and Zuckerberg cannot seek the dismissal of a separate lawsuit in Boston federal court.
Zuckerberg created Facebook in 2004 in his Harvard University dormitory room in nearby Cambridge, Massachusetts.
"Facebook bargained for litigation peace," Zuckerberg's lawyers had argued in a filing with the 9th US Circuit Court of Appeals, which issued Monday's ruling. "The time to end this litigation has long since passed."
Jerome Falk, a lawyer for the Winklevosses, did not immediately return a call seeking a comment.
Cameron and Tyler Winklevoss view the $65 million accord as fraudulent because Facebook hid information from them and believe they deserve more money.
The 9th Circuit disagreed, saying in an April 11 ruling that the accord was "quite favorable" for the twins, who competed in the 2008 Beijing Olympics in rowing.
Facebook might go public in early 2012 in an offering that could value the Palo Alto, California-based company at more than $100 billion, CNBC television said on Monday.
An upstate New York wood pellet salesman, Paul Ceglia, is separately suing Facebook and Zuckerberg, saying he contracted for a big stake in the company.
The case is Facebook Inc et al v. ConnectU Inc et al, 9th US Circuit Court of Appeals, No. 08-16745.
Source
NEW YORK: It may take the Supreme Court to end a years-long battle between a pair of Olympic rowing twins and Facebook Inc founder Mark Zuckerberg.
Zuckerberg has lost a court ruling that he hoped would lead to the end of litigation by Cameron and Tyler Winklevoss, who accused him of stealing their idea for the world's most popular social networking website. Their feud was dramatized in the 2010 film " The Social Network."
The identical twin brothers are challenging a San Francisco federal appeals court ruling that upheld a $65 million cash-and-stock settlement they reached with Facebook in 2008.
While they appeal to the Supreme Court, related litigation will be on hold, the appeals court ruled late on Monday.
That means Facebook and Zuckerberg cannot seek the dismissal of a separate lawsuit in Boston federal court.
Zuckerberg created Facebook in 2004 in his Harvard University dormitory room in nearby Cambridge, Massachusetts.
"Facebook bargained for litigation peace," Zuckerberg's lawyers had argued in a filing with the 9th US Circuit Court of Appeals, which issued Monday's ruling. "The time to end this litigation has long since passed."
Jerome Falk, a lawyer for the Winklevosses, did not immediately return a call seeking a comment.
Cameron and Tyler Winklevoss view the $65 million accord as fraudulent because Facebook hid information from them and believe they deserve more money.
The 9th Circuit disagreed, saying in an April 11 ruling that the accord was "quite favorable" for the twins, who competed in the 2008 Beijing Olympics in rowing.
Facebook might go public in early 2012 in an offering that could value the Palo Alto, California-based company at more than $100 billion, CNBC television said on Monday.
An upstate New York wood pellet salesman, Paul Ceglia, is separately suing Facebook and Zuckerberg, saying he contracted for a big stake in the company.
The case is Facebook Inc et al v. ConnectU Inc et al, 9th US Circuit Court of Appeals, No. 08-16745.
Source
Seminar Topic: Optical Fiber Communication using Quantum Teleportation
Posted by
Engineering Students Corner
at
00:31
.
0
comments
Introduction:
With the advent of fiber optics, data can be very easily and rapidly transmitted over long distances. In optical fiber, light is used for propagation of data. Quantum teleportation, or entanglement-assisted teleportation, is a process by which a qubit (the basic unit of quantum information) can be transmitted exactly (in principle) from one location to another, without the qubit being transmitted through the intervening space.
Difficulty : Medium
Download Link : Optical Fibre Communication using Quantum Teleportation
Please refer to the following links for your Seminar preparation:
How to give Seminar
How To create Seminar Report
With the advent of fiber optics, data can be very easily and rapidly transmitted over long distances. In optical fiber, light is used for propagation of data. Quantum teleportation, or entanglement-assisted teleportation, is a process by which a qubit (the basic unit of quantum information) can be transmitted exactly (in principle) from one location to another, without the qubit being transmitted through the intervening space.
Difficulty : Medium
Download Link : Optical Fibre Communication using Quantum Teleportation
Please refer to the following links for your Seminar preparation:
How to give Seminar
How To create Seminar Report
News: Google applies for license in China: Report
Labels: NewsReuters | Jun 14, 2011, 03.38pm IST
SHANGHAI: Google Inc has applied for a license to operate its Google Maps product in China, China Business News reported, quoting an unnamed official.
Google needs a license from China's State Bureau of Surveying and Mapping to continue operating Google Maps in China. Recently, requirements for a mapping license were relaxed to allow for foreign online mapping providers, such as Google, to engage in joint ventures to provide the service.
Google has applied for the license with Beijing Guxiang information Technology, the newspaper reported.
"Right now we are examining their application. We can't comment on the final outcome," the official was quoted as saying.
A Google spokeswoman declined to comment and officials at the State Bureau of Surveying and Mapping could not be immediately reached for comment.
Google has had a testy relationship with Beijing after Google partially withdrew from China last year saying it was no longer willing to censor search results in the country and after a serious hacking incident.
Access to Gmail is spotty in China while YouTube is banned. The firm said earlier this month Chinese hackers tried to steal the passwords of hundreds of Google email account holders, including those of senior U.S. government officials, Chinese activists and journalists.
Source
SHANGHAI: Google Inc has applied for a license to operate its Google Maps product in China, China Business News reported, quoting an unnamed official.
Google needs a license from China's State Bureau of Surveying and Mapping to continue operating Google Maps in China. Recently, requirements for a mapping license were relaxed to allow for foreign online mapping providers, such as Google, to engage in joint ventures to provide the service.
Google has applied for the license with Beijing Guxiang information Technology, the newspaper reported.
"Right now we are examining their application. We can't comment on the final outcome," the official was quoted as saying.
A Google spokeswoman declined to comment and officials at the State Bureau of Surveying and Mapping could not be immediately reached for comment.
Google has had a testy relationship with Beijing after Google partially withdrew from China last year saying it was no longer willing to censor search results in the country and after a serious hacking incident.
Access to Gmail is spotty in China while YouTube is banned. The firm said earlier this month Chinese hackers tried to steal the passwords of hundreds of Google email account holders, including those of senior U.S. government officials, Chinese activists and journalists.
Source
Project: BingoGame
Labels: Computer Science ProjectsName : BingoGame
Platform : .Net
A bingo game made in Vb.Net.
Download Link
BingoGame
You can refer to these links for help in making projects and project reports :
Tutorial : How to make a Final Year Project
Project Synopsis Tutorial
Project Report Tutorial
Platform : .Net
A bingo game made in Vb.Net.
Download Link
BingoGame
You can refer to these links for help in making projects and project reports :
Tutorial : How to make a Final Year Project
Project Synopsis Tutorial
Project Report Tutorial
Project: Condo Management System
Posted by
Engineering Students Corner
at
22:29
.
0
comments
Name : Condo Management System
Platform : .Net
This is a simple Database Management system for Condominium/Appartment , including all Monthly rent room Transactions.
Download Link
Condo Management System
You can refer to these links for help in making projects and project reports :
Tutorial : How to make a Final Year Project
Project Synopsis Tutorial
Project Report Tutorial
Platform : .Net
This is a simple Database Management system for Condominium/Appartment , including all Monthly rent room Transactions.
Download Link
Condo Management System
You can refer to these links for help in making projects and project reports :
Tutorial : How to make a Final Year Project
Project Synopsis Tutorial
Project Report Tutorial
Seminar Topic: Ergonomics
Labels: Mechanical Engineering SeminarsIntoduction:
Ergonomics (or human factors) is the scientific discipline concerned with the understanding of interactions among humans and other elements of a system, and the profession that applies theory, principles, data and methods to design in order to optimize human well-being and overall system performance.
Difficulty : Medium
Download Link : Ergonomics
Please refer to the following links in preparing for your Seminar :
How to give Seminar
How To create Seminar Report
Ergonomics (or human factors) is the scientific discipline concerned with the understanding of interactions among humans and other elements of a system, and the profession that applies theory, principles, data and methods to design in order to optimize human well-being and overall system performance.
Difficulty : Medium
Download Link : Ergonomics
Please refer to the following links in preparing for your Seminar :
How to give Seminar
How To create Seminar Report
News: Activision Blizzard in talks to buy Myspace
Posted by
Engineering Students Corner
at
07:21
.
0
comments
Reuters | Jun 10, 2011, 03.59pm IST
NEW YORK: An investor group including Activision Blizzard Chief Executive Officer Bobby Kotick is in final talks to take a controlling stake in News Corp's social network site Myspace, according to three people familiar with the matter.
Kotick's involvement is personal and nothing to do with Activision at this stage, the people said.
Kotick was approached by the investor group in recent weeks and has not yet made a full commitment to the Myspace project, one of the people said.
If he does get involved his stake is likely to be very small, two of the sources said.
Activision is best known for its 'Call of Duty' war game franchise.
There remain others in the race, according to the first person, but the Kotick group is now the favored bidder.
Under the terms of the discussions, News Corp would retain an equity stake, possibly of about 20 per cent, one of the sources said.
News Corp, which paid $580 million for Myspace in 2005, had hoped to do a deal valuing Myspace at about $100 million, but sources said in April that it was unlikely to achieve that target.
Like Friendster, Myspace was a pioneer of the social networking space between 2005 and 2007, but it soon lost out to Facebook, now the market leader in social networking.
Last year News Corp relaunched Myspace as a social entertainment site with a focus on music, movies and celebrities.
Technology blog AllThingsDigital cited sources earlier on Kotick's interest.
Source
NEW YORK: An investor group including Activision Blizzard Chief Executive Officer Bobby Kotick is in final talks to take a controlling stake in News Corp's social network site Myspace, according to three people familiar with the matter.
Kotick's involvement is personal and nothing to do with Activision at this stage, the people said.
Kotick was approached by the investor group in recent weeks and has not yet made a full commitment to the Myspace project, one of the people said.
If he does get involved his stake is likely to be very small, two of the sources said.
Activision is best known for its 'Call of Duty' war game franchise.
There remain others in the race, according to the first person, but the Kotick group is now the favored bidder.
Under the terms of the discussions, News Corp would retain an equity stake, possibly of about 20 per cent, one of the sources said.
News Corp, which paid $580 million for Myspace in 2005, had hoped to do a deal valuing Myspace at about $100 million, but sources said in April that it was unlikely to achieve that target.
Like Friendster, Myspace was a pioneer of the social networking space between 2005 and 2007, but it soon lost out to Facebook, now the market leader in social networking.
Last year News Corp relaunched Myspace as a social entertainment site with a focus on music, movies and celebrities.
Technology blog AllThingsDigital cited sources earlier on Kotick's interest.
Source
Project: Ticket Reservation System
Posted by
Engineering Students Corner
at
07:16
.
0
comments
Name : Ticket Reservation System
Platform : Php
This is a basic ticket reservation system made in Php which can be used for the reservation of tickets for events. It has all the basic features which are used in the process of reservation.
Download Link
Ticket Reservation System
You can refer to these links for help in making projects and project reports :
Tutorial : How to make a Final Year Project
Project Synopsis Tutorial
Project Report Tutorial
Platform : Php
This is a basic ticket reservation system made in Php which can be used for the reservation of tickets for events. It has all the basic features which are used in the process of reservation.
Download Link
Ticket Reservation System
You can refer to these links for help in making projects and project reports :
Tutorial : How to make a Final Year Project
Project Synopsis Tutorial
Project Report Tutorial
News: Microsoft loses Word patent battle
Labels: NewsIANS | Jun 10, 2011, 11.20am IST
TORONTO: Software giant Microsoft finally lost its battle over Word patent with Toronto's i4i Inc.
Rejecting Microsoft's appeal, the US supreme court upheld the 2009 lower court order against Microsoft to pay $290 million in damages to the Toronto firm for infringing its patent.
The Canadian company had taken the software giant to court in the US in 2007 over violations of its patent in Word applications and won the case and got $290 million in damages in December 2009.
In its lawsuit, i4i had claimed that the world's biggest software company infringed on a patent granted to it in 1998.
The patent pertained to i4i's technology that can open documents using the XML computer programming language and manipulate complex data in electronic documents. The technology allows users to sort out and manage tons of information by turning complex documents into more accessible databases.
The Toronto company claimed that Microsoft violated its patent when it created Word 2003 and Word 2007 software. Later in 2009, the US court of appeals upheld the lower court order banning Microsoft from selling its patent-infringing Word processing software from January 2010.
Though Microsoft complied with the court order by stopping selling versions of Word with the disputed technology from that date, it challenged the verdict in the US supreme court in August last year, arguing that the current system is disproportionately loaded in favour of patent holders.
i4i chairman Loudon Owen called Thursday's court decision "extremely gratifying'' for his small firm. "It has also become one of the most important business-law cases decided by the Supreme Court in decades,'' he told the local media.
Source
TORONTO: Software giant Microsoft finally lost its battle over Word patent with Toronto's i4i Inc.
Rejecting Microsoft's appeal, the US supreme court upheld the 2009 lower court order against Microsoft to pay $290 million in damages to the Toronto firm for infringing its patent.
The Canadian company had taken the software giant to court in the US in 2007 over violations of its patent in Word applications and won the case and got $290 million in damages in December 2009.
In its lawsuit, i4i had claimed that the world's biggest software company infringed on a patent granted to it in 1998.
The patent pertained to i4i's technology that can open documents using the XML computer programming language and manipulate complex data in electronic documents. The technology allows users to sort out and manage tons of information by turning complex documents into more accessible databases.
The Toronto company claimed that Microsoft violated its patent when it created Word 2003 and Word 2007 software. Later in 2009, the US court of appeals upheld the lower court order banning Microsoft from selling its patent-infringing Word processing software from January 2010.
Though Microsoft complied with the court order by stopping selling versions of Word with the disputed technology from that date, it challenged the verdict in the US supreme court in August last year, arguing that the current system is disproportionately loaded in favour of patent holders.
i4i chairman Loudon Owen called Thursday's court decision "extremely gratifying'' for his small firm. "It has also become one of the most important business-law cases decided by the Supreme Court in decades,'' he told the local media.
Source
News: Skype sued in US for patent infringement
Posted by
Engineering Students Corner
at
07:44
.
0
comments
Reuters | Jun 10, 2011, 03.04pm IST
WILMINGTON: Internet video phone company Skype Inc was sued in US federal court for infringing the patents of a Luxembourg company, which has filed similar lawsuits against Skype in Europe.
The lawsuit in the District of Delaware comes a month after Microsoft Corp said it planned to buy Skype for $8.5 billion.
The complaint by Via Vadis LLC centers on two patents for accessing and managing data in computer systems. It is seeking damages and wants the court to order Skype to stop infringing its technology.
The company has already brought legal action against Skype in Germany and Luxembourg.
The Luxembourg court issued a search order to gather evidence and inspect Skype's offices in Luxembourg, according to the complaint, although Skype has appealed and refused to share its source code.
Skype said it did not comment on litigation. The case is Via Vadis LLC v Skype Inc et al, US District Court, District of Delaware.
Source
WILMINGTON: Internet video phone company Skype Inc was sued in US federal court for infringing the patents of a Luxembourg company, which has filed similar lawsuits against Skype in Europe.
The lawsuit in the District of Delaware comes a month after Microsoft Corp said it planned to buy Skype for $8.5 billion.
The complaint by Via Vadis LLC centers on two patents for accessing and managing data in computer systems. It is seeking damages and wants the court to order Skype to stop infringing its technology.
The company has already brought legal action against Skype in Germany and Luxembourg.
The Luxembourg court issued a search order to gather evidence and inspect Skype's offices in Luxembourg, according to the complaint, although Skype has appealed and refused to share its source code.
Skype said it did not comment on litigation. The case is Via Vadis LLC v Skype Inc et al, US District Court, District of Delaware.
Source
Project: Mobile Store System
Posted by
Engineering Students Corner
at
07:34
.
0
comments
Name : Mobile Store System
Platform : Java
It is a simple mobile store management system with all the basic features. It also has reporting tools so as to make reports of various activities.
Download Link
Mobile Store System
You can refer to these links for help in making projects and project reports :
Tutorial : How to make a Final Year Project
Project Synopsis Tutorial
Project Report Tutorial
Platform : Java
It is a simple mobile store management system with all the basic features. It also has reporting tools so as to make reports of various activities.
Download Link
Mobile Store System
You can refer to these links for help in making projects and project reports :
Tutorial : How to make a Final Year Project
Project Synopsis Tutorial
Project Report Tutorial
Project: Search Engine in Java
Posted by
Engineering Students Corner
at
07:34
.
0
comments
Name : Search Engine in Java
Platform : Java
This is the complete Search Engine developed using Java & JSP. It has a nice GUI interface with complete Administrator control. Crawler, Indexer also included for better search facilities. User can search for single or multiple keywords. It works similar to the general search engines like Google or Yahoo.
Download Link
Search Engine in Java
You can refer to these links for help in making projects and project reports :
Tutorial : How to make a Final Year Project
Project Synopsis Tutorial
Project Report Tutorial
Platform : Java
This is the complete Search Engine developed using Java & JSP. It has a nice GUI interface with complete Administrator control. Crawler, Indexer also included for better search facilities. User can search for single or multiple keywords. It works similar to the general search engines like Google or Yahoo.
Download Link
Search Engine in Java
You can refer to these links for help in making projects and project reports :
Tutorial : How to make a Final Year Project
Project Synopsis Tutorial
Project Report Tutorial
News: Facebook enables 'facial recognition'
Labels: NewsNew Delhi, June 08, 2011
If you are certain that the embarrasingly drunk picture of yours is not tagged on your Facebook page, you might want to think again! Facebook has enabled facial recognition option which will tag pictures of you. As and when your friends upload an album, Facebook will automatically try and determine if a picture looks like you and if it's a match then it will urge your friend to tag the picture with you, sophos.com reported.
So if it's not auto tagging them then what's the problem? It's simple-It encourages users to do so like a constant reminder. So what do users do? You can opt out of the system through the privacy settings.
"The onus should not be on Facebook users having to 'opt-out' of the facial recognition feature, but instead on users having to 'opt-in," Cluley, from the security agency, complained.
Ed Oswald from PC World said, "Some people just don't like to be tagged in every single picture of themselves — myself included. Bottom line? Facebook shouldn't be making this choice for us."
Source
If you are certain that the embarrasingly drunk picture of yours is not tagged on your Facebook page, you might want to think again! Facebook has enabled facial recognition option which will tag pictures of you. As and when your friends upload an album, Facebook will automatically try and determine if a picture looks like you and if it's a match then it will urge your friend to tag the picture with you, sophos.com reported.
So if it's not auto tagging them then what's the problem? It's simple-It encourages users to do so like a constant reminder. So what do users do? You can opt out of the system through the privacy settings.
"The onus should not be on Facebook users having to 'opt-out' of the facial recognition feature, but instead on users having to 'opt-in," Cluley, from the security agency, complained.
Ed Oswald from PC World said, "Some people just don't like to be tagged in every single picture of themselves — myself included. Bottom line? Facebook shouldn't be making this choice for us."
Source
News: Smartphone deliveries to go up 55% in 2011: IDC
Posted by
Engineering Students Corner
at
07:21
.
0
comments
Reuters | Jun 9, 2011, 07.25pm IST
LONDON: Deliveries of smartphones like Apple's iPhone are expected to increase 55 per cent this year, four times as fast as the wider phone market, IT research firm IDC said.
IDC said on Thursday growth would be fuelled by lower prices, better features and cheaper data plans, with growth particularly pronounced in emerging regions of Asia and Latin America where adoption was still in its early days.
"Mobile phone users around the world are turning in their 'talk-and-text' devices for smartphones as these devices allow users to perform daily tasks like shopping and banking from anywhere," said Kevin Restivo, senior research analyst with IDC's Worldwide Quarterly Mobile Phone Tracker.
IDC expected Google's Android smartphone operating system, which passed Nokia's Symbian as the leading operating system worldwide at the end of last year, to grow to more than 40 per cent of the market in the second half of 2011.
IDC said Symbian, being ditched by Nokia in favour of Microsoft's Windows Phone software, would steadily lose share.
It predicted Nokia Windows phones could capture more than 20 per cent of the smartphone market in 2015, if the Nokia-Microsoft integration goes smoothly.
Source
LONDON: Deliveries of smartphones like Apple's iPhone are expected to increase 55 per cent this year, four times as fast as the wider phone market, IT research firm IDC said.
IDC said on Thursday growth would be fuelled by lower prices, better features and cheaper data plans, with growth particularly pronounced in emerging regions of Asia and Latin America where adoption was still in its early days.
"Mobile phone users around the world are turning in their 'talk-and-text' devices for smartphones as these devices allow users to perform daily tasks like shopping and banking from anywhere," said Kevin Restivo, senior research analyst with IDC's Worldwide Quarterly Mobile Phone Tracker.
IDC expected Google's Android smartphone operating system, which passed Nokia's Symbian as the leading operating system worldwide at the end of last year, to grow to more than 40 per cent of the market in the second half of 2011.
IDC said Symbian, being ditched by Nokia in favour of Microsoft's Windows Phone software, would steadily lose share.
It predicted Nokia Windows phones could capture more than 20 per cent of the smartphone market in 2015, if the Nokia-Microsoft integration goes smoothly.
Source
Project: Inventory Record System
Posted by
Engineering Students Corner
at
07:07
.
0
comments
Name : Inventory Record System
Platform : Java
This program is used to store data in JTable form. For basic, this program has add, remove and search(filter) functions. Not a very complex program actually. Just simple program with nice GUI.
Download Link
Inventory Record System
You can refer to these links for help in making projects and project reports :
Tutorial : How to make a Final Year Project
Project Synopsis Tutorial
Project Report Tutorial
Platform : Java
This program is used to store data in JTable form. For basic, this program has add, remove and search(filter) functions. Not a very complex program actually. Just simple program with nice GUI.
Download Link
Inventory Record System
You can refer to these links for help in making projects and project reports :
Tutorial : How to make a Final Year Project
Project Synopsis Tutorial
Project Report Tutorial
News: Google moves on, ditches old browsers
Labels: NewsNew Delhi, June 07, 2011
Next time you want to ignore the update notification, you might want to reconsider. Reportedly, Google is all set to take away support from old internet browsers from August 1. Users of Internet Explorer 7, Safari 3 and Firefox 3.5 and all previous versions will lose some functions from August 1.
Source
Next time you want to ignore the update notification, you might want to reconsider. Reportedly, Google is all set to take away support from old internet browsers from August 1. Users of Internet Explorer 7, Safari 3 and Firefox 3.5 and all previous versions will lose some functions from August 1.
Source
News: Blast at Intel's Arizona plant
Posted by
Engineering Students Corner
at
07:51
.
0
comments
Reuters | Jun 8, 2011, 06.58pm IST
PHOENIX: Seven workers at an Intel Corp microchip manufacturing complex outside Phoenix were injured by a small explosion, fire officials reported, but the company said production was unaffected.
The blast of undetermined origin occurred shortly after 2 pm. local time (4:00 pm EDT/2000 GMT) in a support building at the Intel site in Chandler, Arizona, just southeast of the state capital, said Chandler Fire Department Battalion Chief Brad Miller.
A spokesman for the world's leading chipmaker said the accident site was under construction at the time and that production was uninterrupted.
Miller told Reuters that four workers were taken to local hospitals with injuries ranging from concussions to shrapnel wounds, and three others were treated at the scene for less serious injuries.
He described the incident as both a "small blast" and as a "flash explosion," adding that an automatic extinguishing system quickly doused flames with a mix of water and foam. The extent of damage was not immediately clear.
Early indications were that the explosion occurred inside a chemical storage room of a single-level, 3,000-square-foot (280-sq-metre) building, Miller said. That building and an adjacent structure were evacuated of hundreds of employees, he said.
Miller initially had reported the explosion occurred in a microchip fabrication plant but later said the structure involved was a support building.
A preliminary account of the incident from a company spokesman differed from that furnished by fire officials. An Oregon-based Intel spokesman, Bill Calder, described the incident as a brief fire, not an explosion.
Calder also said a nearby plant and support buildings were evacuated but workers soon returned to the complex and production was unaffected.
The mishap took place at a separate fabrication complex under construction and designed to make Intel's new cutting-edge 22-nanometer chip, due to go into production later this year, Calder said.
Miller said the building where the blast occurred would remain closed while authorities investigated the cause.
"Until we identify everything involved, there's no way we can say when people will be back to work," he said, adding that the 10 other buildings at the site remained open.
Intel's website said its fabrication facilities in Arizona focus primarily on high-volume microprocessor manufacturing.
Shares in the Santa Clara, California-based company were holding steady in after-hours trading.
Source
PHOENIX: Seven workers at an Intel Corp microchip manufacturing complex outside Phoenix were injured by a small explosion, fire officials reported, but the company said production was unaffected.
The blast of undetermined origin occurred shortly after 2 pm. local time (4:00 pm EDT/2000 GMT) in a support building at the Intel site in Chandler, Arizona, just southeast of the state capital, said Chandler Fire Department Battalion Chief Brad Miller.
A spokesman for the world's leading chipmaker said the accident site was under construction at the time and that production was uninterrupted.
Miller told Reuters that four workers were taken to local hospitals with injuries ranging from concussions to shrapnel wounds, and three others were treated at the scene for less serious injuries.
He described the incident as both a "small blast" and as a "flash explosion," adding that an automatic extinguishing system quickly doused flames with a mix of water and foam. The extent of damage was not immediately clear.
Early indications were that the explosion occurred inside a chemical storage room of a single-level, 3,000-square-foot (280-sq-metre) building, Miller said. That building and an adjacent structure were evacuated of hundreds of employees, he said.
Miller initially had reported the explosion occurred in a microchip fabrication plant but later said the structure involved was a support building.
A preliminary account of the incident from a company spokesman differed from that furnished by fire officials. An Oregon-based Intel spokesman, Bill Calder, described the incident as a brief fire, not an explosion.
Calder also said a nearby plant and support buildings were evacuated but workers soon returned to the complex and production was unaffected.
The mishap took place at a separate fabrication complex under construction and designed to make Intel's new cutting-edge 22-nanometer chip, due to go into production later this year, Calder said.
Miller said the building where the blast occurred would remain closed while authorities investigated the cause.
"Until we identify everything involved, there's no way we can say when people will be back to work," he said, adding that the 10 other buildings at the site remained open.
Intel's website said its fabrication facilities in Arizona focus primarily on high-volume microprocessor manufacturing.
Shares in the Santa Clara, California-based company were holding steady in after-hours trading.
Source
Seminar Topic: Shape Memory Alloys
Posted by
Engineering Students Corner
at
07:42
.
0
comments
Introduction:
A shape memory alloy (SMA, smart metal, memory metal, memory alloy, muscle wire, smart alloy) is an alloy that "remembers" its original, cold-forgedshape: returning the pre-deformed shape by heating. This material is a lightweight, solid-state alternative to conventional actuators such as hydraulic, pneumatic, and motor-based systems. Shape memory alloys have applications in industries including medical and aerospace.
Difficulty : Medium
Download Link : Shape Memory Alloys
Please refer to the following links for your Seminar preparation:
How to give Seminar
How To create Seminar Report
A shape memory alloy (SMA, smart metal, memory metal, memory alloy, muscle wire, smart alloy) is an alloy that "remembers" its original, cold-forgedshape: returning the pre-deformed shape by heating. This material is a lightweight, solid-state alternative to conventional actuators such as hydraulic, pneumatic, and motor-based systems. Shape memory alloys have applications in industries including medical and aerospace.
Difficulty : Medium
Download Link : Shape Memory Alloys
Please refer to the following links for your Seminar preparation:
How to give Seminar
How To create Seminar Report
Project: Report management System
Labels: Computer Science ProjectsName : Report management System
Platform : .Net
Report management System helps user to store and produce report for management to review. It accepts two types of data motor insurance data and non motor insurance data. At certain point of time, the license information for each vehicle will need to be renewed. This systems will assist in keeping data that has been renewed and produce a report for management to review. It uses mysql connection as the back end database and mysql connector as its connections
Download Link
Report management System
You can refer to these links for help in making projects and project reports :
Tutorial : How to make a Final Year Project
Project Synopsis Tutorial
Project Report Tutorial
Platform : .Net
Report management System helps user to store and produce report for management to review. It accepts two types of data motor insurance data and non motor insurance data. At certain point of time, the license information for each vehicle will need to be renewed. This systems will assist in keeping data that has been renewed and produce a report for management to review. It uses mysql connection as the back end database and mysql connector as its connections
Download Link
Report management System
You can refer to these links for help in making projects and project reports :
Tutorial : How to make a Final Year Project
Project Synopsis Tutorial
Project Report Tutorial
News: Twitter to get Chinese rival, Weibo
Posted by
Engineering Students Corner
at
07:46
.
0
comments
Reuters | Jun 6, 2011, 08.29pm IST
BANGALORE: China's Sina Corp is readying an English version of its microblogging platform, Weibo, and plans to launch it in the US in two-three months as a rival to Twitter, Chinese tech blog Techweb said, citing informed sources.
Shares of Sina were up about 4 per cent in high-volume trading.
Sina, which has seen its stock soar on investor hopes that Weibo will be monetized sooner rather than later, reported in May, a 39 per cent decline in quarterly net profit after it invested heavily in the platform.
Sina hopes to have more than 200 million Weibo users by the end of the year, up from 140 million currently.
The planned launch would mean direct competition with popular US microblogging service Twitter, the blog said.
Sina's shares were trading at $115.49, following the news on Monday, on Nasdaq.
Source
BANGALORE: China's Sina Corp is readying an English version of its microblogging platform, Weibo, and plans to launch it in the US in two-three months as a rival to Twitter, Chinese tech blog Techweb said, citing informed sources.
Shares of Sina were up about 4 per cent in high-volume trading.
Sina, which has seen its stock soar on investor hopes that Weibo will be monetized sooner rather than later, reported in May, a 39 per cent decline in quarterly net profit after it invested heavily in the platform.
Sina hopes to have more than 200 million Weibo users by the end of the year, up from 140 million currently.
The planned launch would mean direct competition with popular US microblogging service Twitter, the blog said.
Sina's shares were trading at $115.49, following the news on Monday, on Nasdaq.
Source
News: Indian, Chinese vendors bleeding Nokia
Posted by
Engineering Students Corner
at
07:40
.
0
comments
Reuters | Jun 7, 2011, 11.16am IST
NEW DELHI/HELSINKI: From New Delhi to Shanghai to Johannesburg, a flood of cheap handsets from the likes of China's ZTE and India's Micromax is destroying Nokia's top position in emerging markets.
Compounding the woes for the Finnish phone maker, Asian handset manufacturers are increasingly turning to Google's free Android software, which is popular with operators and consumers in cut-rate markets.
Nokia is already under pressure in the high-margin smartphone sector as Apple, Blackberry maker Research In Motion and Google seize market share, leaving the basic cellphone business as Nokia's most valuable part. That is now under threat.
"Three years ago Nokia's position in emerging markets looked impenetrable, but low-cost chipsets and growing scale has helped a number of Asian manufacturers to price aggressively and seize market share," said CCS Insight analyst Geoff Blaber in London.
"The 'lean mean phone-making machine' that used to dominate the sub $50 space has come under huge pressure from agile rivals."
Last week, Nokia abandoned hope of meeting key targets just weeks after setting them, blaming difficult conditions in China and Europe. Its shares slumped 18 per cent in one session on scepticism about its strategy to team up with Microsoft for Windows Phone software in the smartphone war.
The battle for the cheap phone market could be even tougher. Nokia has been able to rely on its brand and distribution chain across emerging markets, home to 1.7 billion mobile phone subscribers.
But ZTE and larger Chinese rival Huawei Technologies, which have traditionally been in the network equipment business, are aggressively muscling in on mobile devices.
ZTE expects to ship more than 80 million handsets this year, up by a third from last year's 60 million units, a senior executive told Reuters in April. Key markets for ZTE's handsets include China and Europe.
Huawei has targeted shipments of 60 million handsets this year, even marketing its devices in glitzy Beijing malls and a Milan fashion show to raise its profile.
"They are already familiar with what the operators are looking for," said Melissa Chau, research manager for client devices at IDC Asia Pacific in Singapore, referring to ZTE and Huawei.
"At the very low-end, they offer handsets at very low prices in huge bulk shipments to operators."
Demand for low-end cellphones has surged across emerging markets since the global economic crisis began to ease in 2009. However, Nokia's sales of basic cellphones has fallen for three straight quarters. In January-March, Nokia sold 84.3 million non-smartphones, 2 per cent less than a year ago.
Crumbling market share
"Nokia should really have begun this fight back two years ago and leaving it so late in the day puts the vendor in a very tough competitive position," said Neil Mawston, analyst at research firm Strategy Analytics.
Some of the Asian vendors are hardly household names. But in China, the biggest competitive threat comes from manufacturers that have no name at all.
So-called no-brand manufacturers -- small Chinese firms using chipsets from Mediatek or Spreadtrum Communications Inc -- control 45 per cent of the market in the world's most populous country. Nokia's market share in China has shrunk to 19 per cent from 33 per cent two years ago.
No-brand Chinese manufacturers have also expanded into Africa, India, Latin America and Russia over the last year, research firm Gartner says. In total, they sell more phones than Nokia, said Gartner.
Analysts expect these manufacturers to focus next on cheap smartphones running Android software. In India, Nokia is in a bruising fight. The company is jostling with about 150 vendors in the world's fastest-growing cellular market, home to more than 800 million subscribers and with mass market phones selling for about $20 with basic features.
Cheap handsets and phone charges as low as half a cent a minute are fuelling growth. Some Indian manufacturers, who mostly make handsets in China and Taiwan, make net margins of only about 2 per cent, analysts said.
No-brand Chinese vendors controlled 20 per cent of the Indian market in the first quarter, with Nokia at 26 per cent, Gartner said. Only two years ago, Nokia had close to 60 per cent.
Source
NEW DELHI/HELSINKI: From New Delhi to Shanghai to Johannesburg, a flood of cheap handsets from the likes of China's ZTE and India's Micromax is destroying Nokia's top position in emerging markets.
Compounding the woes for the Finnish phone maker, Asian handset manufacturers are increasingly turning to Google's free Android software, which is popular with operators and consumers in cut-rate markets.
Nokia is already under pressure in the high-margin smartphone sector as Apple, Blackberry maker Research In Motion and Google seize market share, leaving the basic cellphone business as Nokia's most valuable part. That is now under threat.
"Three years ago Nokia's position in emerging markets looked impenetrable, but low-cost chipsets and growing scale has helped a number of Asian manufacturers to price aggressively and seize market share," said CCS Insight analyst Geoff Blaber in London.
"The 'lean mean phone-making machine' that used to dominate the sub $50 space has come under huge pressure from agile rivals."
Last week, Nokia abandoned hope of meeting key targets just weeks after setting them, blaming difficult conditions in China and Europe. Its shares slumped 18 per cent in one session on scepticism about its strategy to team up with Microsoft for Windows Phone software in the smartphone war.
The battle for the cheap phone market could be even tougher. Nokia has been able to rely on its brand and distribution chain across emerging markets, home to 1.7 billion mobile phone subscribers.
But ZTE and larger Chinese rival Huawei Technologies, which have traditionally been in the network equipment business, are aggressively muscling in on mobile devices.
ZTE expects to ship more than 80 million handsets this year, up by a third from last year's 60 million units, a senior executive told Reuters in April. Key markets for ZTE's handsets include China and Europe.
Huawei has targeted shipments of 60 million handsets this year, even marketing its devices in glitzy Beijing malls and a Milan fashion show to raise its profile.
"They are already familiar with what the operators are looking for," said Melissa Chau, research manager for client devices at IDC Asia Pacific in Singapore, referring to ZTE and Huawei.
"At the very low-end, they offer handsets at very low prices in huge bulk shipments to operators."
Demand for low-end cellphones has surged across emerging markets since the global economic crisis began to ease in 2009. However, Nokia's sales of basic cellphones has fallen for three straight quarters. In January-March, Nokia sold 84.3 million non-smartphones, 2 per cent less than a year ago.
Crumbling market share
"Nokia should really have begun this fight back two years ago and leaving it so late in the day puts the vendor in a very tough competitive position," said Neil Mawston, analyst at research firm Strategy Analytics.
Some of the Asian vendors are hardly household names. But in China, the biggest competitive threat comes from manufacturers that have no name at all.
So-called no-brand manufacturers -- small Chinese firms using chipsets from Mediatek or Spreadtrum Communications Inc -- control 45 per cent of the market in the world's most populous country. Nokia's market share in China has shrunk to 19 per cent from 33 per cent two years ago.
No-brand Chinese manufacturers have also expanded into Africa, India, Latin America and Russia over the last year, research firm Gartner says. In total, they sell more phones than Nokia, said Gartner.
Analysts expect these manufacturers to focus next on cheap smartphones running Android software. In India, Nokia is in a bruising fight. The company is jostling with about 150 vendors in the world's fastest-growing cellular market, home to more than 800 million subscribers and with mass market phones selling for about $20 with basic features.
Cheap handsets and phone charges as low as half a cent a minute are fuelling growth. Some Indian manufacturers, who mostly make handsets in China and Taiwan, make net margins of only about 2 per cent, analysts said.
No-brand Chinese vendors controlled 20 per cent of the Indian market in the first quarter, with Nokia at 26 per cent, Gartner said. Only two years ago, Nokia had close to 60 per cent.
Source
News: Facebook triggering anxiety in kids as young as 8
Labels: NewsANI | Jun 6, 2011, 05.50pm IST
MELBOURNE: Psychologists in Australia have revealed that children as young as eight are being treated for anxiety problems triggered by social networking sites like Facebook.
They said modern technology is producing a growing number of children needing therapy to deal with distress arising from posts on Facebook and other sites.
Darryl Cross, a clinical psychologist from Crossways consulting, said that the anxiety caused by technology is a growing concern.
"Modern day technologies and social networking sites are contributing significantly to child and adolescent anxiety. It is an international phenomenon," the Daily Telegraph quoted him as saying.
He said children were using social networking sites such as Facebook to determine their identity and form a view about what society thought of them.
"I know many children are rushing home to see what people are saying about them on their Facebook wall," Cross said.
"So that creates a trigger for these anxieties of how am I connecting, how am I relating, and do they like me, am I getting on with others, do they think I am silly or stupid," he said.
Elizabeth Seeley-Wait, clinical psychologist at The Children's Psychology Clinic who specialises in childhood anxiety, said childhood was a growing concern.
"I am seeing kids who as a form of punishment have had their mobile phone taken away from them and that leads to anxiety about being out of touch or out of the loop," she said.
Source
MELBOURNE: Psychologists in Australia have revealed that children as young as eight are being treated for anxiety problems triggered by social networking sites like Facebook.
They said modern technology is producing a growing number of children needing therapy to deal with distress arising from posts on Facebook and other sites.
Darryl Cross, a clinical psychologist from Crossways consulting, said that the anxiety caused by technology is a growing concern.
"Modern day technologies and social networking sites are contributing significantly to child and adolescent anxiety. It is an international phenomenon," the Daily Telegraph quoted him as saying.
He said children were using social networking sites such as Facebook to determine their identity and form a view about what society thought of them.
"I know many children are rushing home to see what people are saying about them on their Facebook wall," Cross said.
"So that creates a trigger for these anxieties of how am I connecting, how am I relating, and do they like me, am I getting on with others, do they think I am silly or stupid," he said.
Elizabeth Seeley-Wait, clinical psychologist at The Children's Psychology Clinic who specialises in childhood anxiety, said childhood was a growing concern.
"I am seeing kids who as a form of punishment have had their mobile phone taken away from them and that leads to anxiety about being out of touch or out of the loop," she said.
Source
News: Airtel faces maximum complaints
Posted by
Engineering Students Corner
at
07:38
.
0
comments
PTI | Jun 6, 2011, 09.54pm IST
NEW DELHI: India's largest mobile service provider Bharti Airtel has earned the dubious distinction of being the company facing the largest number of consumer complaints, according to latest government data.
As per the latest data available with the National Consumer Helpline (NCH), as many as 2001 complaint calls were received against Bharti Airtel between March 2010 and February 2011.
This was highest number of complaints against a single company, followed by state-owned telecom major BSNL (1986 complaints), PSU giant Indian Oil (1940), Anil Ambani-led telecom firm Reliance Communications (1792) and Nokia India (1616).
Other companies in the top-ten list in terms of number of complaints included Samsung India (1560), SBI (912), BPCL (872), LIC (626) and ICICI Bank (569).
NCH is a public service project of the Consumer Affairs Ministry run by Delhi University and has been functional since March 2005.
It helps consumers in dealing with problems related to defective products, deficiency in services and unfair trade practices.
There are as many as five telecom-related companies in the top ten. It also consists of five public sector firms.
According to a presentation by NCH before the Food and Consumer Affairs Minister K V Thomas last week, it has received 67,347 complaint calls between March 2010 and February 2011.
Out of total calls, the maximum complaints (21 per cent) were for defective products followed by telecom (17 per cent) and banking sector (7 per cent).
"This list shows these companies have not been able to handle the issues being faced by their customers, which forces the customers to seek our guidance," NCH's Principal Investigator Sri Ram Khanna told PTI.
It also sheds light on the management practices, especially customer redressal process of these companies, he added.
This shows that these companies failed to solve the problems being faced by their customers, Khanna pointed out.
NCH provides advice to consumers on a three tier model. In the first step, it advices the consumer to approach the concerned organisation. The second step involves helping the consumer approach the regulatory authorities existing in different sectors.
The final step is the last option where the consumer is advised to file a case in consumer courts.
NCH has handled 3,48,082 calls till March 31, 2011.
Source
NEW DELHI: India's largest mobile service provider Bharti Airtel has earned the dubious distinction of being the company facing the largest number of consumer complaints, according to latest government data.
As per the latest data available with the National Consumer Helpline (NCH), as many as 2001 complaint calls were received against Bharti Airtel between March 2010 and February 2011.
This was highest number of complaints against a single company, followed by state-owned telecom major BSNL (1986 complaints), PSU giant Indian Oil (1940), Anil Ambani-led telecom firm Reliance Communications (1792) and Nokia India (1616).
Other companies in the top-ten list in terms of number of complaints included Samsung India (1560), SBI (912), BPCL (872), LIC (626) and ICICI Bank (569).
NCH is a public service project of the Consumer Affairs Ministry run by Delhi University and has been functional since March 2005.
It helps consumers in dealing with problems related to defective products, deficiency in services and unfair trade practices.
There are as many as five telecom-related companies in the top ten. It also consists of five public sector firms.
According to a presentation by NCH before the Food and Consumer Affairs Minister K V Thomas last week, it has received 67,347 complaint calls between March 2010 and February 2011.
Out of total calls, the maximum complaints (21 per cent) were for defective products followed by telecom (17 per cent) and banking sector (7 per cent).
"This list shows these companies have not been able to handle the issues being faced by their customers, which forces the customers to seek our guidance," NCH's Principal Investigator Sri Ram Khanna told PTI.
It also sheds light on the management practices, especially customer redressal process of these companies, he added.
This shows that these companies failed to solve the problems being faced by their customers, Khanna pointed out.
NCH provides advice to consumers on a three tier model. In the first step, it advices the consumer to approach the concerned organisation. The second step involves helping the consumer approach the regulatory authorities existing in different sectors.
The final step is the last option where the consumer is advised to file a case in consumer courts.
NCH has handled 3,48,082 calls till March 31, 2011.
Source
Seminar Topic: Smart Antenna
Posted by
Engineering Students Corner
at
07:32
.
0
comments
Introduction:
Smart antennas (also known as adaptive array antennas, multiple antennas and recently MIMO) are antenna arrays with smart signal processing algorithms used to identify spatial signal signature such as the direction of arrival (DOA) of the signal, and use it to calculate beamforming vectors, to track and locate the antenna beam on the mobile/target. The antenna could optionally be any sensor.
Difficulty : Easy
Download Link : Smart Antenna
Please refer to the following links for your Seminar preparation:
How to give Seminar
How To create Seminar Report
Smart antennas (also known as adaptive array antennas, multiple antennas and recently MIMO) are antenna arrays with smart signal processing algorithms used to identify spatial signal signature such as the direction of arrival (DOA) of the signal, and use it to calculate beamforming vectors, to track and locate the antenna beam on the mobile/target. The antenna could optionally be any sensor.
Difficulty : Easy
Download Link : Smart Antenna
Please refer to the following links for your Seminar preparation:
How to give Seminar
How To create Seminar Report
News: Hotmail, Yahoo users hit with same phishing attack as Gmail
Labels: NewsTOI Tech | Jun 4, 2011, 12.42 pm IST
NEW DELHI: Users of Yahoo and Hotmail email have also been hit by the same kind of targeted attacks as were disclosed by Google earlier this week, according to security vendor Trend Micro.
In a blog post Trend Micro says, "Google recently revealed details surrounding a successful phishing campaign that targeted the Gmail accounts of government officials and of political activists. While there has been significant media coverage of the incident, there has been a variety of recent attacks on popular Webmail platforms. In addition to Gmail, Hotmail and Yahoo! Mail have also been targeted."
According to Trend Micro while the attacks appear to have been separately conducted, they have some significant similarities.
Trend Micro believes that the objective of the attackers appears to be to gain access to the target's Webmail accounts in order to monitor his/her communications and, possibly, to stage future attacks. In the recent case revealed by Google, the attackers used a phishing attack to gain access to the target's Gmail account then proceeded to add their own email addresses to the "forwarding and delegation settings allowing them to send and receive email messages via the compromised accounts.
In addition to this recent phishing attack, Google also previously revealed that attackers are exploiting a vulnerability in the MHTML protocol in order to target political activists who use Google's services. At the same time, Google revealed that the same technique was being used against users of "another popular social site."
While this other website has not been identified, it has been reported that this MHTML exploit was being directed against Gmail users and that the initial phishing message was being propagated through Facebook. These attacks targeted journalists and political activists. Like the recent phishing attacks, the attackers modified the delegation settings so they can continue to monitor the compromised Gmail accounts.
Google's services haven't been the only ones targeted. Trend Micro researchers in Taiwan revealed a phishing attack that exploited a vulnerability in Microsoft's Hotmail service. In fact, rather than clicking a malicious link, even the simple act of previewing the malicious email message can compromise a user's account. This phishing email pretended to be from the Facebook security team.
Source
NEW DELHI: Users of Yahoo and Hotmail email have also been hit by the same kind of targeted attacks as were disclosed by Google earlier this week, according to security vendor Trend Micro.
In a blog post Trend Micro says, "Google recently revealed details surrounding a successful phishing campaign that targeted the Gmail accounts of government officials and of political activists. While there has been significant media coverage of the incident, there has been a variety of recent attacks on popular Webmail platforms. In addition to Gmail, Hotmail and Yahoo! Mail have also been targeted."
According to Trend Micro while the attacks appear to have been separately conducted, they have some significant similarities.
Trend Micro believes that the objective of the attackers appears to be to gain access to the target's Webmail accounts in order to monitor his/her communications and, possibly, to stage future attacks. In the recent case revealed by Google, the attackers used a phishing attack to gain access to the target's Gmail account then proceeded to add their own email addresses to the "forwarding and delegation settings allowing them to send and receive email messages via the compromised accounts.
In addition to this recent phishing attack, Google also previously revealed that attackers are exploiting a vulnerability in the MHTML protocol in order to target political activists who use Google's services. At the same time, Google revealed that the same technique was being used against users of "another popular social site."
While this other website has not been identified, it has been reported that this MHTML exploit was being directed against Gmail users and that the initial phishing message was being propagated through Facebook. These attacks targeted journalists and political activists. Like the recent phishing attacks, the attackers modified the delegation settings so they can continue to monitor the compromised Gmail accounts.
Google's services haven't been the only ones targeted. Trend Micro researchers in Taiwan revealed a phishing attack that exploited a vulnerability in Microsoft's Hotmail service. In fact, rather than clicking a malicious link, even the simple act of previewing the malicious email message can compromise a user's account. This phishing email pretended to be from the Facebook security team.
Source
News: Internet traffic to quadruple by 2015: Cisco
Posted by
Engineering Students Corner
at
07:47
.
0
comments
AFP | Jun 2, 2011, 12.37pm IST
SAN FRANCISCO: Global online traffic will quadruple by 2015 as the number of gadgets linked to the Internet climbs to 15 billion, according to a forecast by networking colossus Cisco.
Cisco's fifth annual Visual Networking Index Forecast, released Wednesday, predicted that nearly three billion people, more than 40 per cent of the expected world population, will be using the Internet by the year 2015.
"The explosive growth in Internet data traffic, especially video, creates an opportunity in the years ahead for optimizing and monetizing visual, virtual and mobile Internet experiences," said Cisco vice president Suraj Shetty.
Personal computers generated 97 per cent of consumer Internet traffic last year, but the share will drop to 87 per cent in the next four years as more people turn to smartphones, tablets, and Web-enabled televisions, Cisco said.
Online video traffic, including data rich 3D and high-definition transmissions, was projected to be 14 times greater in 2015 compared to last year.
By then, a million minutes of video will traverse the Internet every second, according to the Cisco forecast. Mobile data traffic was expected to increase by a magnitude of 26 times in the same period.
Source
SAN FRANCISCO: Global online traffic will quadruple by 2015 as the number of gadgets linked to the Internet climbs to 15 billion, according to a forecast by networking colossus Cisco.
Cisco's fifth annual Visual Networking Index Forecast, released Wednesday, predicted that nearly three billion people, more than 40 per cent of the expected world population, will be using the Internet by the year 2015.
"The explosive growth in Internet data traffic, especially video, creates an opportunity in the years ahead for optimizing and monetizing visual, virtual and mobile Internet experiences," said Cisco vice president Suraj Shetty.
Personal computers generated 97 per cent of consumer Internet traffic last year, but the share will drop to 87 per cent in the next four years as more people turn to smartphones, tablets, and Web-enabled televisions, Cisco said.
Online video traffic, including data rich 3D and high-definition transmissions, was projected to be 14 times greater in 2015 compared to last year.
By then, a million minutes of video will traverse the Internet every second, according to the Cisco forecast. Mobile data traffic was expected to increase by a magnitude of 26 times in the same period.
Source
Seminar Topic: Watermarking
Posted by
Engineering Students Corner
at
07:42
.
0
comments
Introduction:
Digital watermarking is the process of embedding information into a digital signal in a way that is difficult to remove. The term is derived from a process used since 1282 in the production of paper bearing awatermark for visible identification. In digital watermarking, the signal may be audio, pictures, or video. If the signal is copied, then the information also is carried in the copy. A signal may carry several different watermarks at the same time.
Difficulty : Medium
Download Link : Watermarking
Please refer to the following links for your Seminar preparation:
How to give Seminar
How To create Seminar Report
Digital watermarking is the process of embedding information into a digital signal in a way that is difficult to remove. The term is derived from a process used since 1282 in the production of paper bearing awatermark for visible identification. In digital watermarking, the signal may be audio, pictures, or video. If the signal is copied, then the information also is carried in the copy. A signal may carry several different watermarks at the same time.
Difficulty : Medium
Download Link : Watermarking
Please refer to the following links for your Seminar preparation:
How to give Seminar
How To create Seminar Report
Project : Poll system in ASP.NET
Posted by
Engineering Students Corner
at
07:26
.
0
comments
Name : Poll system in ASP.NET
Platform : Vb.Net
There are many websites that have polls on their front page where users (anonymous and members) give their opinions. This poll application uses VB.NET with SQL Server for storing questions and votes.
Download Link
Poll system in ASP.NET
You can refer to these links for help in making projects and project reports :
Tutorial : How to make a Final Year Project
Project Synopsis Tutorial
Project Report Tutorial
Platform : Vb.Net
There are many websites that have polls on their front page where users (anonymous and members) give their opinions. This poll application uses VB.NET with SQL Server for storing questions and votes.
Download Link
Poll system in ASP.NET
You can refer to these links for help in making projects and project reports :
Tutorial : How to make a Final Year Project
Project Synopsis Tutorial
Project Report Tutorial
Project: Poll-Survay System
Posted by
Engineering Students Corner
at
07:23
.
0
comments
Name : Poll-Survay System
Platform : Visual Basic
Poll System with administrator to control the poll all you need is to put the question and the choice and set the active poll, and you will get the result in this nice way.
Download Link
Poll-Survay System
You can refer to these links for help in making projects and project reports :
Tutorial : How to make a Final Year Project
Project Synopsis Tutorial
Project Report Tutorial
Platform : Visual Basic
Poll System with administrator to control the poll all you need is to put the question and the choice and set the active poll, and you will get the result in this nice way.
Download Link
Poll-Survay System
You can refer to these links for help in making projects and project reports :
Tutorial : How to make a Final Year Project
Project Synopsis Tutorial
Project Report Tutorial
News: Online videos, the future of Internet
Labels: NewsTNN | Jun 3, 2011, 07.27pm IST
NEW DELHI: Looking to watch an internet video or two on your mobile device?
Your changing habits then represent the future of the internet. Which, in fact, may already have arrived: online video now accounts for 40% of all internet traffic globally, edging out once-dominant file-sharing systems the industry collectively dubs peer-to-peer (P2P) networks, which accounted for a similar proportion of traffic until last year.
Global networking giant CISCO's latest Visual Networking Index (VNI) predicts that a mind-boggling 966 exabytes of data will be traded across the internet by 2015, a four-fold increase over the current traffic scenarios in just four years.
One way to interpret this figure would be to say that the gigabyte equivalent of all the movies ever made will criss-cross global networks every 5 minutes in 2015.
Over 60 % of this traffic is expectedtobe videocontent. India is no exception to this trend: video traffic was 20% of all consumer Internet traffic in 2010, up from 14% in 2009.
Video will exceed half of all traffic by the end of 2013, according to the report, powered by 70 million Indian video consumers in 2015.
Current estimates for India are 9 million regular video users (out of a total of 72 million internet users in the country; which VNI forecasts to grow to 196 million users by 2015).
But all figures are dwarfed by China'sinsatiable needto access video online. Its 283 million video users (of a total of about 470 million total users ) are by far the world's largest video consumers, with the US (149 million ) a distant second.
Other factoidsfrom theVNI report also make for interesting reading . The average broadband connection generates 14.9 GB of traffic every month.
An average Indian connection, in comparison, only clocks in at 1.4 GB a month, some indication of users struggling with slow speeds. CISCO, however, predicts that average Indian broadband speed will grow four-fold from 2010 to 2015, from 0.9 Mbps to 4 Mbps.
Source
NEW DELHI: Looking to watch an internet video or two on your mobile device?
Your changing habits then represent the future of the internet. Which, in fact, may already have arrived: online video now accounts for 40% of all internet traffic globally, edging out once-dominant file-sharing systems the industry collectively dubs peer-to-peer (P2P) networks, which accounted for a similar proportion of traffic until last year.
Global networking giant CISCO's latest Visual Networking Index (VNI) predicts that a mind-boggling 966 exabytes of data will be traded across the internet by 2015, a four-fold increase over the current traffic scenarios in just four years.
One way to interpret this figure would be to say that the gigabyte equivalent of all the movies ever made will criss-cross global networks every 5 minutes in 2015.
Over 60 % of this traffic is expectedtobe videocontent. India is no exception to this trend: video traffic was 20% of all consumer Internet traffic in 2010, up from 14% in 2009.
Video will exceed half of all traffic by the end of 2013, according to the report, powered by 70 million Indian video consumers in 2015.
Current estimates for India are 9 million regular video users (out of a total of 72 million internet users in the country; which VNI forecasts to grow to 196 million users by 2015).
But all figures are dwarfed by China'sinsatiable needto access video online. Its 283 million video users (of a total of about 470 million total users ) are by far the world's largest video consumers, with the US (149 million ) a distant second.
Other factoidsfrom theVNI report also make for interesting reading . The average broadband connection generates 14.9 GB of traffic every month.
An average Indian connection, in comparison, only clocks in at 1.4 GB a month, some indication of users struggling with slow speeds. CISCO, however, predicts that average Indian broadband speed will grow four-fold from 2010 to 2015, from 0.9 Mbps to 4 Mbps.
Source
Seminar Topic: Subnetting & VLSM
Posted by
Engineering Students Corner
at
08:12
.
0
comments
Introduction:
A subnetwork, or subnet, is a logically visible subdivision of an IP network. The practice of dividing a network into subnetworks is called subnetting.
All computers that belong to a subnet are addressed with a common, identical, most-significant bit-group in their IP address. This results in the logical division of an IP address into two fields, a network or routing prefix and the rest field. The rest field is a specific identifier for the computer or the network interface.
Difficulty : Medium
Download Link : Subnetting & VLSM
Please refer to the following links for your Seminar preparation:
How to give Seminar
How To create Seminar Report
A subnetwork, or subnet, is a logically visible subdivision of an IP network. The practice of dividing a network into subnetworks is called subnetting.
All computers that belong to a subnet are addressed with a common, identical, most-significant bit-group in their IP address. This results in the logical division of an IP address into two fields, a network or routing prefix and the rest field. The rest field is a specific identifier for the computer or the network interface.
Difficulty : Medium
Download Link : Subnetting & VLSM
Please refer to the following links for your Seminar preparation:
How to give Seminar
How To create Seminar Report
Seminar Topic: Refrigeration & Air Conditioning
Posted by
Engineering Students Corner
at
08:12
.
1 comments
Introduction:
The process of reducing the temperature of a body from the general level of temperature of surroundings is called refrigeration. Air-conditioning means control of temperature,humidity,purity and movement of air. The working conditions and comfort for human beings is improved by air-conditioning. The temperature is brought down during summer and increased during winter without causing any discount.
Difficulty : Medium
Download Link : Refrigeration & Air Conditioning
Please refer to the following links for your Seminar preparation:
How to give Seminar
How To create Seminar Report
The process of reducing the temperature of a body from the general level of temperature of surroundings is called refrigeration. Air-conditioning means control of temperature,humidity,purity and movement of air. The working conditions and comfort for human beings is improved by air-conditioning. The temperature is brought down during summer and increased during winter without causing any discount.
Difficulty : Medium
Download Link : Refrigeration & Air Conditioning
Please refer to the following links for your Seminar preparation:
How to give Seminar
How To create Seminar Report
Seminar Topic: Token Ring Management
Posted by
Engineering Students Corner
at
08:10
.
0
comments
Introduction:
Token ring local area network (LAN) technology is a local area network protocol which resides at the data link layer(DLL) of the OSI model. It uses a special three-byte frame called a token that travels around the ring. Token-possession grants the possessor permission to transmit on the medium. Token ring frames travel completely around the loop. Stations on a token ring LAN are logically organized in a ring topology with data being transmitted sequentially from one ring station to the next with a control token circulating around the ring controlling access. This token passing mechanism is shared by ARCNET, token bus, and FDDI, and has theoretical advantages over the stochastic CSMA/CD of Ethernet.
Difficulty : Medium
Download Link : Token Ring Management
Please refer to the following links for your Seminar preparation:
How to give Seminar
How To create Seminar Report
Token ring local area network (LAN) technology is a local area network protocol which resides at the data link layer(DLL) of the OSI model. It uses a special three-byte frame called a token that travels around the ring. Token-possession grants the possessor permission to transmit on the medium. Token ring frames travel completely around the loop. Stations on a token ring LAN are logically organized in a ring topology with data being transmitted sequentially from one ring station to the next with a control token circulating around the ring controlling access. This token passing mechanism is shared by ARCNET, token bus, and FDDI, and has theoretical advantages over the stochastic CSMA/CD of Ethernet.
Difficulty : Medium
Download Link : Token Ring Management
Please refer to the following links for your Seminar preparation:
How to give Seminar
How To create Seminar Report
Seminar Topic: System Component and Protection Devices
Posted by
Engineering Students Corner
at
08:09
.
1 comments
Introduction:
While we take advantage of the tremendous benefits electricity can provide, we must be careful to protect the people and systems that use it . It is necessary then, that the mighty force of electricity be kept under control at all times. If for some reason it should get out of control, there must be a method of protecting people and equipment that use electricity. Devices have been developed to protect people and electrical circuits from currents and voltages outside their normal operating ranges.
Difficulty : Medium
Download Link : System Component and Protection Devices
Please refer to the following links for your Seminar preparation:
How to give Seminar
How To create Seminar Report
While we take advantage of the tremendous benefits electricity can provide, we must be careful to protect the people and systems that use it . It is necessary then, that the mighty force of electricity be kept under control at all times. If for some reason it should get out of control, there must be a method of protecting people and equipment that use electricity. Devices have been developed to protect people and electrical circuits from currents and voltages outside their normal operating ranges.
Difficulty : Medium
Download Link : System Component and Protection Devices
Please refer to the following links for your Seminar preparation:
How to give Seminar
How To create Seminar Report
Seminar Topic: Stepper Motor
Posted by
Engineering Students Corner
at
08:09
.
0
comments
Introduction:
Electromechanical device which converts electrical pulses into discrete mechanical movements shaft of a stepper motor rotates in discrete step increments when electrical pulses are applied sequence of the applied pulses is directly related to the direction of motor shaft’s rotation. Speed of rotation is directly related to the frequency of input pulses applied. PM type stepper motor permanent magnet is rotor and coils are put on stator. The rotor will move precisely 90 degrees for each pulse of electricity that the motor receives.
Difficulty : Medium
Download Link : Stepper Motor
Please refer to the following links for your Seminar preparation:
How to give Seminar
How To create Seminar Report
Electromechanical device which converts electrical pulses into discrete mechanical movements shaft of a stepper motor rotates in discrete step increments when electrical pulses are applied sequence of the applied pulses is directly related to the direction of motor shaft’s rotation. Speed of rotation is directly related to the frequency of input pulses applied. PM type stepper motor permanent magnet is rotor and coils are put on stator. The rotor will move precisely 90 degrees for each pulse of electricity that the motor receives.
Difficulty : Medium
Download Link : Stepper Motor
Please refer to the following links for your Seminar preparation:
How to give Seminar
How To create Seminar Report
Seminar Topic: Security in Operating System
Posted by
Engineering Students Corner
at
08:06
.
0
comments
Introduction:
Protection is an internal problem.Security must consider both the computer system and the enviroment(people,buildings,valuable objects and threats) within which the system is used. It is easier to protect against accidental loss of data consistency than to protect against malicious access to the data.Absolute protection of the information stored in the computer system from malicious abuse is not possible. The various authorization provisions in a computer system may not confer sufficient protection for highly sensitive data.In such cases,data may be encrypted. It is not possible for encrypted data to be read unless the reader knows how to decrypt the encrypted data.
Difficulty : Easy
Download Link : Security in Operating System
Please refer to the following links for your Seminar preparation:
How to give Seminar
How To create Seminar Report
Protection is an internal problem.Security must consider both the computer system and the enviroment(people,buildings,valuable objects and threats) within which the system is used. It is easier to protect against accidental loss of data consistency than to protect against malicious access to the data.Absolute protection of the information stored in the computer system from malicious abuse is not possible. The various authorization provisions in a computer system may not confer sufficient protection for highly sensitive data.In such cases,data may be encrypted. It is not possible for encrypted data to be read unless the reader knows how to decrypt the encrypted data.
Difficulty : Easy
Download Link : Security in Operating System
Please refer to the following links for your Seminar preparation:
How to give Seminar
How To create Seminar Report
News: UK's city council offshores jobs to India
Labels: NewsPTI | Jun 2, 2011, 04.57pm IST
LONDON: The Birmingham City Council led by the Conservative party has become the first council or local authority in Britain to cut jobs and outsource them to India, sparking protests from employee unions.
Reacting to the council's move, Unite union national officer Peter Allenson said: "This is an outrageous decision and Unite will fight tooth and nail to stop this Tory-led council from exporting valuable jobs overseas. "We fear that this could be just the beginning and other councils could follow suit. Thousands of public sector jobs could go. Once these jobs go they will not come back."
Reports from Birmingham said that up to 100 posts are to be transferred to India by the end of the year.
The posts to be outsourced to India are with Service Birmingham, a joint venture between Birmingham City Council and the management firm Capita .
A redundancy notice has already been served which will see more than 70 Birmingham-based IT jobs go. The first tranche will see 18 roles move to India. A further 37 will go by the end of the summer.
A total of 100 are likely to go by the end of the year. Service Birmingham has confirmed that employees have already been recruited in the Indian city of Pune.
Offshoring jobs to India is common in the IT and financial services sectors, but this is the first time a council is moving posts abroad.
The Local Government Association said it was not aware of any other local authorities who have outsourced any part of their direct workforce overseas.
"It is a matter for local authorities as individual employers to decide in consultation with their workforce," said Sarah Messenger of the Local Government Employers organisation.
A Service Birmingham spokesman said: "We need to offer the council the best combination of operating models to deliver cost savings and efficiency gains while maintaining our existing service levels".
Source
LONDON: The Birmingham City Council led by the Conservative party has become the first council or local authority in Britain to cut jobs and outsource them to India, sparking protests from employee unions.
Reacting to the council's move, Unite union national officer Peter Allenson said: "This is an outrageous decision and Unite will fight tooth and nail to stop this Tory-led council from exporting valuable jobs overseas. "We fear that this could be just the beginning and other councils could follow suit. Thousands of public sector jobs could go. Once these jobs go they will not come back."
Reports from Birmingham said that up to 100 posts are to be transferred to India by the end of the year.
The posts to be outsourced to India are with Service Birmingham, a joint venture between Birmingham City Council and the management firm Capita .
A redundancy notice has already been served which will see more than 70 Birmingham-based IT jobs go. The first tranche will see 18 roles move to India. A further 37 will go by the end of the summer.
A total of 100 are likely to go by the end of the year. Service Birmingham has confirmed that employees have already been recruited in the Indian city of Pune.
Offshoring jobs to India is common in the IT and financial services sectors, but this is the first time a council is moving posts abroad.
The Local Government Association said it was not aware of any other local authorities who have outsourced any part of their direct workforce overseas.
"It is a matter for local authorities as individual employers to decide in consultation with their workforce," said Sarah Messenger of the Local Government Employers organisation.
A Service Birmingham spokesman said: "We need to offer the council the best combination of operating models to deliver cost savings and efficiency gains while maintaining our existing service levels".
Source
Project: Laboratory System
Posted by
Engineering Students Corner
at
07:48
.
0
comments
Name : Laboratory System
Platform :.Net
This code is a simple application that can be used in the Laboratory, you may need to edit some of the code but otherwise it can help those who are just beginners.
Download Link
Laboratory System
You can refer to these links for help in making projects and project reports :
Tutorial : How to make a Final Year Project
Project Synopsis Tutorial
Project Report Tutorial
Platform :.Net
This code is a simple application that can be used in the Laboratory, you may need to edit some of the code but otherwise it can help those who are just beginners.
Download Link
Laboratory System
You can refer to these links for help in making projects and project reports :
Tutorial : How to make a Final Year Project
Project Synopsis Tutorial
Project Report Tutorial