IT ARCHIVE - kasc.ac.in · Search: Better search results, search customization abilities, mobile...
Transcript of IT ARCHIVE - kasc.ac.in · Search: Better search results, search customization abilities, mobile...
1
IT ARCHIVE
Executive Committee
Chief Patron : Thiru. A. K. Ilango B.Com., M.B.A., L.L.B., Avl.,
Patron : Dr. N. Raman M.Com., M.B.A., M.Phil., Ph.D.
Editor in Chief : Dr. B. Jayanthi M.C.A., M.Phil., Ph.D.
Staff Advisor
Mrs. S. Vanitha M.C.A., M.Phil.,
Assistant Professor,
Department of Computer Science (P.G.).
Staff Editor
Dr. B. Jayanthi M.C.A., M.Phil., Ph.D.
Associate Professor,
Department of Computer Science (P.G.).
Organizing Members
Mr. S.SARAVANAKUMAR III MCA
Ms. A. VINITHA III MCA
Ms. S. GUNAVATHI III MCA
Ms. H. DHARANI PRIYA III MCA
Ms. N. AISWARYA III MCA
Ms. C. MADHUMITHA III MCA
Ms. D. KEERTHANA III MCA
Ms. M. SANGAVI III MCA
Ms. J. CHITRADEVI III MCA
Mr. T. GOKUL III MCA
Ms. S. NANDHINI III MCA
Ms. S. SARANYA III MCA
Words by Swami Vivekananda
NAVIGATOR
VOL - 50
SharePoint - 3
Linux Focus - 12
Technologies - 15
Intellect Explore - 18
Career Objectives - 20
Windows - 23
Company Profile - 27
Tips and Tricks - 31
Monthly Event Gist - 32
Freedom can never be reached by the weak. Throw away all weakness. Tell your body that it
is strong, tell your mind that it is strong, and have unbounded faith and hope in yourself.
2
ACKNOWLEDGEMENT
We wish to thank our Correspondent Thiru. A. K. Ilango B.Com., M.B.A., L.L.B.,
Avl, for the support to publish the magazine and also we thank our principal Dr. N. Raman
M.Com., M.B.A., M.Phil., Ph.D., for considerable support to us during this effort. We
proudly thank our Chief Editor, Staff Advisor, Staff Editor, Staff members and the Students
of Department of Computer Science (P.G.) for their guidance and suggestions to complete
the magazine.
3
SHAREPOINT
SharePoint is a web-based, collaborative
platform that integrates with Microsoft
Office. Launched in 2001, SharePoint is
primarily sold as a document management
and storage system, but the product is highly
configurable and usage varies substantially
between organizations.
Microsoft states that SharePoint has 190
million users across 200,000 customer
organizations
Editions
There are various editions of SharePoint
which have different functions:
SharePoint Server
SharePoint Server is provided to
organizations that seek greater control over
SharePoint's behavior or design. This
product is installed on the customer's IT
infrastructure. It receives less frequent
updates, but has access to a wider set of
features and customization capabilities.
There are three editions of SharePoint
Server: Standard, Enterprise, and
Foundation (free) which was discontinued in
2016. These servers may be provisioned as
normal virtual/cloud servers, or as hosted
services.
SharePoint Standard
Microsoft SharePoint Standard builds on the
Microsoft SharePoint Foundation in a few
key product areas.
• Sites: Audience targeting,
governance tools, secure store
service, web analytics functionality.
• Communities: 'MySites' (personal
profiles including skills
management, and search tools),
enterprise wikis, organization
hierarchy browser, tags and notes.
• Content: Improved tooling and
compliance for document & record
4
management, managed metadata,
word automation services, content
type management.
• Search: Better search results, search
customization abilities, mobile
search, 'Did you mean?' OS search
integration, Faceted Search, and
metadata/relevancy/date/location-
based refinement options.
• Composites: Pre-built workflow
templates, BCS profile pages.
• SharePoint Standard licensing
includes a CAL (client access
license) component and a server fee.
SharePoint Standard may also be
licensed through a cloud model.
SharePoint Enterprise
Built upon SharePoint Standard, Microsoft
SharePoint Enterprise features can be
unlocked simply by providing an additional
license key.
Extra features in SharePoint Enterprise
include:
• Search thumbnails and previews,
rich web indexing, better search
results.
• Business intelligence integration,
dashboards, and business data
surfacing.
• PowerPivot and PerformancePoint.
• Microsoft Office Access, Visio,
Excel, and InfoPath Forms services.
• SharePoint Enterprise Search
extensions.
SharePoint Enterprise licensing includes a
CAL component and a server fee that must
be purchased in addition to SharePoint
Server licensing. SharePoint Enterprise may
also be licensed through a cloud model.
SharePoint Online
Microsoft's hosted SharePoint is typically
bundled in Microsoft Office 365
subscriptions, but can be purchased outright.
It’s a version of SharePoint, but it’s not
exactly the same as SharePoint.
5
It is limited to a core set of collaboration,
file hosting, and document and content
management scenarios, and is updated on a
frequent basis, but is typically comparable
with SharePoint Enterprise. Currently,
additional capabilities include:
• Support for SharePoint Framework
extensions
• New "Modern" (Responsive)
SharePoint UX (partially included in
2016 - Feature Pack 1)
• Yammer Integration & Office 365
Groups
• Integration with Outlook Web App
• Newer versions of Online Office
Document Editor Tools
• Removal of various file size/number
limitations
• Apps Concept
Missing capabilities include
• Some search & UI customizations
• Many web publishing capabilities
• Service Application administration
options
• Many customization/solution types
will not run
• No ability to read error (ULS) logs
N.B. Changes in SharePoint Online are
listed on the Office Roadmap.
SharePoint Intranet
SharePoint can be used to build intranets.
SharePoint Intranet providers like Intranet
bee are building Intranet at top of
SharePoint.
Applications
SharePoint usage varies from organization
to organization. The product encompasses a
wide variety of capabilities, most of which
require configuration and governance.
The most common uses of the SharePoint
include:
Enterprise content and document
management
6
Enterprise content management and
document management
SharePoint allows for storage, retrieval,
searching, archiving, tracking, management,
and reporting on electronic documents and
records. Many of the functions in this
product are designed around various legal,
information management, and process
requirements in organizations. SharePoint
also provides search and 'graph'
functionality. SharePoint's integration with
Microsoft Windows and Microsoft Office
allow for collaborative real-time editing, and
encrypted/information rights managed
synchronization.
This capability is often used to replace an
existing corporate file server, and is
typically coupled with an enterprise content
management policy.
Intranet and social network
Intranet portal and Social Network
A SharePoint intranet or intranet portal is a
way to centralize access to enterprise
information and applications. It is a tool that
helps an organization manage its internal
communications, applications and
information more easily. Microsoft claims
that this has organizational benefits such as
increased employee engagement,
centralizing process management, reducing
new staff on-boarding costs, and providing
the means to capture and share tacit
knowledge (e.g. via tools such as wikis).
Collaborative software
SharePoint contains team collaboration
groupware capabilities, including: Project
scheduling (integrated with Outlook and
Project), social collaboration, shared
mailboxes, and project related document
storage and collaboration. Groupware in
SharePoint is based around the concept of a
"Team Site".
File hosting service (Personal Cloud)
7
Personal Cloud and File hosting service
SharePoint Server hosts OneDrive for
Business, which allows storage and
synchronization of an individual's personal
documents, as well as public/private file
sharing of those documents. This is typically
combined with other Microsoft Office
Servers/Services such as Microsoft
Exchange, to produce a "personal cloud",
This capability is often compared to services
like Box or Dropbox.
WebDAV can be used to access files
without using the web interface. However,
Microsoft's implementation of WebDAV
doesn't conform to the official WebDAV
protocol and therefore isn't compliant to the
WebDAV standard. For example, WebDAV
applications have to support the language
tagging functionality of the XML
specification which Microsoft's
implementation doesn't. Only Windows XP
to Windows 8 are supported.
Custom web applications
Software framework
SharePoint's custom development
capabilities provide an additional layer of
services that allow rapid prototyping of
integrated (typically line-of-business) web
applications. SharePoint provides developers
with integration into corporate directories
and data sources through standards such as
REST/OData/OAuth. Enterprise application
developers use SharePoint's security and
information management capabilities across
a variety of development platforms and
scenarios. SharePoint also contains an
enterprise "app store" that has different
types of external applications with
encapsulated and managed to access to
resources such as corporate user data and
document data.
Configuration and customization
Web-based configuration
8
SharePoint is primarily configured through a
web browser. The web-based user interface
provides most of the configuration
capability of the product.
Depending on your permission level, the
web interface can be used to:
• Manipulate content structure, site
structure, create/delete sites, modify
navigation and security, or
add/remove apps.
• Enable or disable product features,
upload custom designs/themes, or
turn on integrations with other Office
products.
• Configure basic workflows, view
usage analytics, manage metadata,
configure search options, upload
customizations, and set up
integration.
SharePoint Designer
SharePoint Designer is a semi-deprecated
product that provided 'advanced editing'
capabilities for HTML/ASPX pages, but
remains the primary method of editing
SharePoint workflows.
A significant subset of HTML editing
features was removed in Designer 2013, and
the product is expected to be deprecated in
2016-7.
Microsoft SharePoint's Server Features are
configured either using PowerShell, or a
Web UI called "Central Administration".
Configuration of server farm settings (e.g.
search crawl, web application services) can
be handled through these central tools.
While Central Administration is limited to
farm-wide settings (config DB), it provides
access to tools such as the 'SharePoint
Health Analyzer', a diagnostic health-
checking tool.
In addition to PowerShell's farm
configuration features, some limited tools
are made available for administering or
9
adjusting settings for sites or site collections
in content databases.
Limited subsets of these features are
available by SharePoint's SaaS providers,
including Microsoft.
Custom development
• The SharePoint Framework (SPFX)
provides a development model based
on typescript language. The technical
stack is yeoman, node.js, webstack,
gulp, npm. It embraces modern web
technologies development method. It
is the only supported way to
customize the new modern
experience user interface (UI). It is
globaly available since mid 2017. It
allows web developer to step in
Sharepoint development more easily.
• The SharePoint "App Model"
provides various types of external
applications that offer the capability
to show authenticated web-based
applications through a variety of UI
mechanisms. Apps may be either
"SharePoint-hosted" or "Provider-
hosted". Provider hosted apps may
be developed using most back-end
web technologies (e.g. ASP.net,
NodeJS, PHP). Apps are served
through a proxy in SharePoint, which
requires some DNS/certificate
manipulation in on-premises
versions of SharePoint.
• The SharePoint "Client Object
Model" (available for JavaScript and
.NET), and REST/SOAP APIs can
be referenced from many
environments, providing
authenticated users access to a wide
variety of SharePoint capabilities.
• "Sand-boxed" plugins can be
uploaded by any end-user who has
been granted permission. These are
security-restricted, and can be
governed at multiple levels
(including resource consumption
management). In multi-tenant cloud
10
environments, these are the only
customization's that are typically
allowed.
• Farm features are typically fully
trusted code that needs to be installed
at a farm-level. These are considered
deprecated for new development.
• Service applications: It is possible to
integrate directly into the SharePoint
SOA bus, at a farm level.
Customization may appear through:
• Application-to-application
integration with SharePoint.
• Extensions to SharePoint
functionality (e.g. custom workflow
actions).
• 'Web Parts' (also known as
"portlets", "widgets", or "gadgets")
that provides new functionality when
added to a page.
• Pages/sites or page/site templates.
Server architecture
SharePoint Server can be scaled down to
operate entirely from one developer
machine, or scaled up to be managed across
hundreds of machines.
Farms
A SharePoint farm is a logical grouping of
SharePoint servers that share common
resources. A farm typically operates stand-
alone, but can also subscribe to functions
from another farm, or provide functions to
another farm. Each farm has its own central
configuration database, which is managed
through either a PowerShell interface, or a
Central Administration website (which relies
partly on PowerShell's infrastructure). Each
server in the farm is able to directly interface
with the central configuration database.
Servers use this to configure services (e.g.
IIS, windows features, database
connections) to match the requirements of
the farm, and to report server health issues,
resource allocation issues.
11
Web applications
Web applications (WAs) are top-level
containers for content in a SharePoint farm.
A web application is associated primarily
with IIS configuration. A web application
consists of a set of access mappings or
URLs defined in the SharePoint central
management console, which are replicated
by SharePoint across every IIS Instance (e.g.
Web Application Servers) configured in the
farm.
Site collections
A site collection is a hierarchical group of
'SharePoint Sites'. Each web application
must have at least one site collection. Site
collections share common properties
(detailed here), common subscriptions to
service applications, and can be configured
with unique host names. A site collection
may have distinct content databases, or may
share a content database with other site
collections in the same web application.
Service applications
Service applications provide granular pieces
of SharePoint functionality to other web and
service applications in the farm. Examples
of service applications include the User
Profile Sync service, and the Search
Indexing service. A service application can
be turned off, exist on one server, or be
load-balanced across many servers in a
farm. Service Applications are designed to
have independent functionality and
independent security scopes.
BY
A.VINITHA
III MCA
12
LINUX FOCUS
Kali Linux is a Debian-derived Linux
distribution designed for digital forensics and
penetration testing. It is maintained and
funded by Offensive Security Ltd.
MatiAharoni, Devon Kearns and Raphaël
Hertzog are the core developers.
Development
Kali Linux has over 600preinstalled
penetration-testing programs, including
Armitage (a graphical cyber attack
management tool), Nmap (a port scanner),
Wireshark (a packet analyzer), John the
Ripperpassword cracker, Aircrack-ng (a
software suite for penetration-testing wireless
LANs), Burp suite and OWASP ZAPweb
application security scanners. Kali Linux can
run natively when installed on a computer's
hard disk, can be booted from a live CD or
live USB, or it can run within a virtual
machine. It is a supported platform of the
Metasploit Project's Metasploit Framework, a
tool for developing and executing security
exploits.
It was developed by MatiAharoni and Devon
Kearns of Offensive Security through the
rewrite of BackTrack, their previous
information security testing Linux distribution
based on Knoppix. The third core developer
Raphaël Hertzog joined them as a Debian
expert.
Kali Linux is based on Debian Testing. Most
packages Kali uses are imported from the
Debianrepositories.
Kali Linux is developed using a secure
environment with only a small number of
trusted people that are allowed to commit
packages, with each package being digitally
signed by the developer. Kali also has a
custom-built kernel that is patched for 802.11
wireless injections. This was primarily added
because the development team found they
needed to do a lot of wireless assessments.
13
Requirements
1. Kali Linux requires a minimum of
20GB hard disk space for installation.
2. A minimum of 1GB RAM for i386
and AMD64 architectures.
3. A bootable CD-DVD drive or a USB
stick.
Supported platforms
Kali Linux is distributed in 32-bit and 64-bit
images for use on hosts based on the
x86instruction set and as an image for the
ARM architecture for use on the Beagle
Board computer and on Samsung's ARM
Chromebook.
The developers of Kali Linux aim to make
Kali Linux available for even more ARM
devices.
Kali Linux is already available for
BeagleBone Black, HP Chromebook,
CubieBoard 2, CuBox, CuBox-i, Raspberry
Pi, EfikaMX, Odroid U2, Odroid XU, Odroid
XU3, Samsung Chromebook, Utilite Pro,
Galaxy Note 10.1, and SS808.
With the arrival of Kali NetHunter, Kali
Linux is also officially available on
smartphones such as the Nexus 5, Nexus 6,
Nexus 7, Nexus 9, Nexus 10, OnePlus One,
and Samsung Galaxy models.
Kali Linux is available on Windows 10, on
top of Windows Subsystem for Linux (WSL).
The official Kali distribution for Windows
can be downloaded from the Microsoft Store.
Features
Kali Linux has a dedicated project set aside
for compatibility and porting to specific
Android devices, called Kali Linux
NetHunter.
It is the first Open Source Android
penetration testing platform for Nexus
devices, created as a joint effort between the
Kali community member “BinkyBear” and
Offensive Security. It supports Wireless
802.11 frame injection, one-click MANA Evil
14
Access Point setups, HID keyboard (Teensy
like attacks), as well as Bad USB MITM
attacks.
BackTrack (Kali's predecessor) contained a
mode known as forensic mode, which was
carried over to Kali via live boot. This mode
is very popular for many reasons, partly
because many Kali users already have a
bootable Kali USB drive or CD, and this
option makes it easy to apply Kali to a
forensic job. When booted in forensic mode,
the system doesn't touch the internal hard
drive or swap space and auto mounting is
disabled. However, the developers
recommend that users test these features
extensively before using Kali for real world
forensics.
Tools
Kali Linux includes security tools, such as:
• Aircrack-ng
• Burp suite
• Cisco Global Exploiter, a hacking tool
used to find and exploit vulnerabilities
in Cisco Network systems
• Ettercap
• John the Ripper
• Kismet
• Maltego
• Metasploit framework
• Nmap
• OWASP ZAP
• Social engineering tools
• Wireshark
• Hydra
• Reverse Engineering tools
• Forensics tools like Binwalk,
Foremost and Volatility
BY
S.GUNAVATHI, H.DHARANIPRIYA
III MCA
15
TECHNOLOGIES
Zigbee is an IEEE 802.15.4-based specification
for a suite of high-level communication
protocols used to create personal area networks
with small, low-power digital radios, such as for
home automation, medical device data
collection, and other low-power low-bandwidth
needs, designed for small scale projects which
need wireless connection. Hence, Zigbee is a
low-power, low data rate, and close proximity
(i.e., personal area) wireless ad hoc network.
The technology defined by the Zigbee
specification is intended to be simpler and less
expensive than other wireless personal area
networks (WPANs), such as Bluetooth or more
general wireless networking such as Wi-Fi.
Applications include wireless light switches,
home energy monitors, traffic management
systems, and other consumer and industrial
equipment that require short-range low-rate
wireless data transfer.
Its low power consumption limits transmission
distances to 10–100 meters line-of-sight,
depending on power output and environmental
characteristics. Zigbee devices can transmit data
over long distances by passing data through a
mesh network of intermediate devices to reach
more distant ones. Zigbee is typically used in
low data rate applications that require long
battery life and secure networking (Zigbee
networks are secured by 128 bit symmetric
encryption keys.) Zigbee has a defined rate of
250 kbit/s, best suited for intermittent data
transmissions from a sensor or input device.
Zigbee was conceived in 1998, standardized in
2003, and revised in 2006. The name refers to
the waggle dance of honey bees after their return
to the beehive.
Device types and operating modes
Zigbee devices are of three kinds:
16
• Zigbee Coordinator (ZC): The most
capable device, the Coordinator forms
the root of the network tree and might
bridge to other networks. There is
precisely one Zigbee Coordinator in each
network since it is the device that started
the network originally (the
ZigbeeLightLink specification also
allows operation without a Zigbee
Coordinator, making it more usable for
off-the-shelf home products). It stores
information about the network, including
acting as the Trust Center & repository
for security keys.
• Zigbee Router (ZR): As well as running
an application function, a Router can act
as an intermediate router, passing on data
from other devices.
• Zigbee End Device (ZED): Contains just
enough functionality to talk to the parent
node (either the Coordinator or a
Router); it cannot relay data from other
devices. This relationship allows the
node to be asleep a significant amount of
the time thereby giving long battery life.
A ZED requires the least amount of
memory, and, therefore, can be less
expensive to manufacture than a ZR or
ZC.
The current Zigbee protocols support beacon and
non-beacon enabled networks. In non-beacon-
enabled networks, an unslottedCSMA/CA
channel access mechanism is used. In this type
of network, Zigbee Routers typically have their
receivers continuously active, requiring a more
robust power supply. However, this allows for
heterogeneous networks in which some devices
receive continuously while others only transmit
when an external stimulus is detected. The
typical example of a heterogeneous network is a
wireless light switch: The Zigbee node at the
lamp may constantly receive, since it is
connected to the mains supply, while a battery-
powered light switch would remain asleep until
the switch is thrown. The switch then wakes up,
sends a command to the lamp, receives an
acknowledgment, and returns to sleep. In such a
network the lamp node will be at least a Zigbee
Router, if not the Zigbee Coordinator; the switch
node is typically a Zigbee End Device.
17
In beacon-enabled networks, the special network
nodes called Zigbee Routers transmit periodic
beacons to confirm their presence to other
network nodes. Nodes may sleep between
beacons, thus lowering their duty cycle and
extending their battery life. Beacon intervals
depend on data rate; they may range from 15.36
milliseconds to 251.65824 seconds at 250 kbit/s,
from 24 milliseconds to 393.216 seconds at
40 kbit/s and from 48 milliseconds to 786.432
seconds at 20 kbit/s. However, low duty cycle
operation with long beacon intervals requires
precise timing, which can conflict with the need
for low product cost.
In general, the Zigbee protocols minimize the
time the radio is on, so as to reduce power use.
In beaconing networks, nodes only need to be
active while a beacon is being transmitted. In
non-beacon-enabled networks, power
consumption is decidedly asymmetrical: Some
devices are always active while others spend
most of their time sleeping.
Except for the Smart Energy Profile 2.0, Zigbee
devices are required to conform to the IEEE
802.15.4-2003 Low-Rate Wireless Personal
Area Network (LR-WPAN) standard. The
standard specifies the lower protocol layers—the
physical layer (PHY), and the Media Access
Control portion of the data link layer (DLL). The
basic channel access mode is "carrier sense,
multiple access/collision avoidance"
(CSMA/CA). That is, the nodes talk in the same
way that humans converse; they briefly check to
see that no one is talking before he or she start,
with three notable exceptions. Beacons are sent
on a fixed timing schedule and do not use
CSMA. Message acknowledgments also do not
use CSMA. Finally, devices in beacon-enabled
networks that have low latency real-time
requirements may also use Guaranteed Time
Slots (GTS), which by definition do not use
CSMA.
BY
C.MADHUMITHA, N.AISWARYA
III MCA
18
INTELLECT EXPLORE
Logical Reasoning :: Analogies
1. Odometer is to mileage as compass is to
A. Speed
B. Hiking
C. Needle
D. Direction
Answer: Option D
Explanation:
An odometer is an instrument used to measure
mileage. A compass is an instrument used to
determine direction. Choices a, b, and c are
incorrect because none is an instrument.
2. Elated is to despondent as enlightened is to
A. Aware
B. ignorant
C. miserable
D. Tolerant
Answer: Option B
Explanation:
Elated is the opposite of despondent;
enlightened is the opposite of ignorant.
3. Optimist is to cheerful as pessimist is to
A. gloomy
B. Mean
C. Petty
D. helpful
Answer: Option A
Explanation:
An optimist is a person whose outlook is
cheerful. A pessimist is a person whose
outlook is gloomy. The answer is not
(choice b) because a pessimist does not
have to be mean. (Choices c) and d are
incorrect because neither adjective
describes the outlook of a pessimist.
4. Reptile is to lizard as flower is to
A. Petal
B. Stem
19
C. Daisy
D. alligator
Answer: Option C
Explanation:
A lizard is a type of reptile; a daisy is a type
of flower. Choices a and b are incorrect
because a petal and a stem are parts of a
flower, not types of flowers. (Choice d) is
incorrect because an alligator is another
type of reptile, not a type of flower.
5. Play is to actor as concert is to
A. symphony
B. musician
C. Piano
D. percussion
Answer: Option B
Explanation:
An actor performs in a play. A musician
performs at a concert. Choices a, c, and d
are incorrect because none is people who
perform.
BY
G.INDUMATHI, D.KEERTHANA
III MCA
20
CAREER OBJECTIVE
Self-Assessment: Career Interests
Interests are helpful to understand in relation
to career planning. Career interests are
different than abilities or skills. However,
people tend to be attracted to activities that
they enjoy and are interested in, which then
affords the opportunity to develop skills and
abilities.
A theory devised by John Holland provides
a framework of six general themes that
describe broad areas or types of interest.
These themes also can be used to describe
work environments. People tend to seek
environments that are consistent with their
interests. Therefore, understanding your
interests can help to highlight ways in which
certain fields of study, work environments,
and occupational pursuits may or may not be
satisfying to you.
The six themes are shown below. For most
people, primary interests combine two or
three of these general themes. That
combination is often called a "RIASEC
Code" or a "Holland Code". It is important
to keep in mind that no RIASEC code is
better than another, and there are places for
all six codes in every organization.
REALISTIC The "Doers"
INVESTIGATIVE The "Thinkers"
ARTISTIC The "Creators"
SOCIAL The "Helpers"
ENTERPRISING The "Persuaders"
CONVENTIONAL The "Organizers"
The following sample of potential interests
is provided to help illustrate the six general
themes that comprise the RIASEC model.
Keep in mind that the table shows a sample
only and that most people have a
combination of two or three major interest
themes.
The Strong Interest Inventory is a self-
assessment tool that produces a RIASEC
Code based on an individual's responses, as
well as information about specific content or
topic areas that may be interesting, and a
21
sample of occupations in which satisfied
workers tend to have similar interests.
Self-Assessment: Career Values
Values are qualities considered to be the
most important guiding principles that help
set priorities in career and life. They are
highly personal and define what is
purposeful and meaningful. Though values
may change in response to life
circumstances, they are generally thought to
be enduring and provide a compass for
setting goals and making decisions.
In a career context, where changes occur
rapidly and decisions about opportunities in
a current work role or new job possibilities
can present themselves unexpectedly, it is
critical to pause and reflect on the values
that are most essential.
"Why" Exercise
This exercise can be a useful tool in
clarifying values related to work
satisfaction. Jotting down answers to these
questions, or perhaps sharing them with a
career mentor familiar with current work
situation, is a great way of reaffirming
values that are priorities in work.
1. What would you miss most if you left
your current job? Why?
2. What was your "best job ever?" Why?
3. When was a time you felt really
energized in your work at UC? Why?
4. What value would you not compromise
in a job? Why?
Knowing how values are aligned with job
and the organization in which the work is
often critical to understanding career-related
satisfaction and motivation. A helpful
framework for thinking about career values
was developed by Nova (link is external). In
their Values Driven Work assessment
exercise, career values are clustered in four
domains: Intrinsic Values, Work
Environment Values, Work Content Values,
and Work Relationship Values.
Intrinsic Values: What motivates to truly
love the work day after day? Among a list of
22
these values are Achievement, Giving to
Community, Status, Independence, and
Power.
Work Environment Values: What working
conditions provide an optimum environment
for best work? Work Environment Values
include Learning, Benefits, Fast-Paced,
Comfortable Income, Structure.
Work Content Values: What makes the
work activities most satisfying and
engaging? Among the 18 values in this area
are values such as Problem Solving,
Organizing, Public Contact, Detailed, and
Creative.
Work Relationship Values: What
characteristics of interaction with others in
workplace are the most important? Work
Relationship Values include Open
Communication, Diversity, Leadership,
Teamwork, Competition, and Trust.
BY
R.SRINITHI, M.SANGAVI
III MCA
23
WINDOWS
Windows 7 to Windows 8: The
system's biggest improvements
The most talked-about issue in the lead-up
to Microsoft's launch of Windows 8 is the
new Start screen, featuring the Modern UI.
But Windows 8 has much more to offer
than just a revamped interface.
The operating system includes fundamental
enhancements, such as better multiple-
monitor setups, an overhauled Windows
Explorer, cloud-based account syncing, and
new ways to personalize the desktop.
Here are 15 improvements to Windows in
Microsoft's latest OS, including some new
tools in the Modern UI.
Some of these improvements have no
corresponding feature in Windows 7.
Account sync
Where to get started: Charms bar >
Settings > Change PC settings > Sync your
settings
Windows 8 can sync the user account
settings across multiple PCs, saving the
trouble of having to customize the Windows
environment manually on different
computers.
Windows 8: If it is a Microsoft account,
then sync the settings between multiple
PCs.
Sync the desktop themes and backgrounds,
lock screen, account pictures, passwords,
HomeGroup settings, Modern UI app
settings, browser history and favorites.
Settings syncing requires having a
Microsoft account connected to each
Windows 8 PC.
Sharing
Where to get started: Charms bar > Share
24
Social networking comes built into
Windows 8's Modern UI, with the ability to
share items between Modern UI apps.
Windows 8: Sure, it is possible to mail cool
website URLs to the contact. But can easily
share via social media with the People app.
This functionality is to share items such as
links and photos with specific people via
Mail, or post items to social networks such
as Facebook, LinkedIn, and Twitter via the
People app.
Sharing has to be built in to third-party apps
by the apps' developers, so sharing may not
work with all Modern UI apps.
Better multiple-monitor setups
Where to get started: Control Panel >
Appearance and Personalization > Display
In Windows 8, Microsoft adds several
improvements to multiple-monitor setups.
The traditional desktop interface now
features separate taskbars and backgrounds
for each display.
Windows 8: Configure each display in a
multiple-monitor setup individually.
Inside-edge detection also lets access the
Charms bar and the Running Apps bar from
any display. In comparison, Windows 7 can
either mirror the displays or treat multiple
monitors as one big display area.
New dialog box for file copying
Where to get started: Traditional desktop
The new version of Windows Explorer in
Windows 8 brings all of the current file
copy jobs into a single window, instead of
managing multiple windows as Windows 7
does.
Windows 7: File copying and the OS's
familiar progress bar.
In Windows 8, pause or stop copy jobs
(Windows 7 allows to stop them but not to
pause them), easily manage file-name
collisions, and get more details about the
copy job, such as the speed of data transfer
25
and a more accurate estimate of time
remaining.
Windows 8: The new OS has more detail
than ever imagined for file copying.
Windows 8: Or can opt for a simpler view,
but still track multiple file copying tasks in
one dialog box, rather than in many.
Refresh and reset
Where to get started: Charms bar >
Settings > Change PC settings > General
Many people make it a habit to create a
personalized system image and reinstall
Windows every 6 to 12 months to improve
their hardware's performance. Microsoft
aims to make that chore a little easier with
the new refresh and reset features.
Windows 7: The older OS offers less
flexibility for restoring backup images.
The new refresh lets to reinstall Windows
without losing the personal data, Modern UI
apps, and settings. The new reset removes
all personal data and reinstalls Windows.
WIndows 8: The new OS's refresh and reset
features even let to specify how the system
image to be created.
Picture passwords
Where to get started: Charms bar >
Settings > Change PC settings > Users
For people who are tired of using
alphanumeric passwords, Windows 8
supports picture passwords.
Windows 8: Use an image and gestures to
create a Windows password not easily
replicated by hackers.
This feature requires choosing a photo from
the image library and then creating three
gestures on the photo using any
combination of circles, straight lines, and
taps (or clicks, on mouse-and-keyboard
PCs).
Storage Spaces
26
Where to get started: Control Panel >
System and Security > Storage Spaces
Borrowed from the first version of
Windows Home Server and then improved,
Storage Spaces lets to manage internal and
external storage drives as if they were one
massive drive called a storage pool.
Windows 8: Storage Spaces lets easily add
new drives and incorporate them into
redundant pools.
Behind the scenes, Storage Spaces also
duplicates the data across multiple drives in
the pool to create redundancy in case of
single-drive failure.
BY
C.SOWNDERYA, J.CHITRADEVI
III MCA
27
COMPANY PROFILE - RICOH
The Ricoh Company, Ltd. is a Japanese
multinational imaging and
electronicscompany. It was founded by the
RIKENzaibatsu on 6 February 1936 as Riken
Sensitized Paper Ricoh's headquarters are
located in Ricoh Building in Chūō, Tokyo.
Ricoh produces electronic products, primarily
cameras and office equipment such as
printers, photocopiers, fax machines, offers
Software as a Service (SaaS) document
management solutions such as
DocumentMall, RicohDocs, document
solutions such as GlobalScan, Print&Share
and also offers Projectors. In the late 1990s
through early 2000s, the company grew to
become the largest copier manufacturer in the
world. During this time, Ricoh acquired
Savin, Gestetner, Lanier, Rex-Rotary,
Monroe, Nashuatec, IKON and most recently
IBM Printing Systems Division / Infoprint
Solutions Company. Although the Monroe
brand was discontinued, products continue to
be marketed worldwide under the remaining
brand names. In 2006, Ricoh acquired the
European operations of Danka for $210
million. These operations continue as a stand-
alone business unit, under the Infotec brand.
History
The company was founded in 1936. Before
relocating to Chūō, Ricoh was first in
Minato, Tokyo. In 2006 Ricoh's headquarters
moved to the Ricoh Building, a 25-story
building in the Ginza area in Chūō; there it
occupies the same space as its sales offices.
During the 1960s and 1970s Ricoh made
wrist watches for both the Japanese domestic
market and international markets, briefly
entering into a partnership with Hamilton
Watch Company, for the creation of the
Ricoh Hamilton Electric watch.
Throughout the late 1980s and early 1990s,
Ricoh was the primary manufacturer of
Pitney-Bowes copiers. They have also
manufactured copiers for Toshiba, fax
machines for AT&T Corporation and
28
Omnifax, as well as a wide variety of
equipment for numerous other companies
including duplicators for AB Dick. They also
manufactured the Ricoh 2A03 8-bit processor
used in the Nintendo Entertainment System.
In 2003 Ricoh bought naming rights to the
CNE Coliseum (now known as Ricoh
Coliseum) in Toronto.
In 2004 Ricoh acquired Hitachi Printing
Solutions, Ltd creating a new company,
Ricoh Printing Systems, Ltd.
In 2005 Ricoh bought the naming rights to
the stadium/entertainment complex, home to
Coventry City Football Club now called the
Ricoh Arena.
In September 2005 Ricoh launched its new
designed logo for the ricoh brand. The logo
used before has been introduced in 1986.
In November 2006, Ricoh announced the
integration of the head office of Ricoh
Europe B.V. (REBV) in Amstelveen,
Netherlands, with NRG's European
headquarters in London, United Kingdom.
This was completed on April 1, with the
former NRG HQ in London becoming the
Strategic HQ and the former REBV HQ in
Amstelveen becoming the Operational HQ.
This mirrors a similar process which took
place in the US with Lanier and Ricoh USA.
This integration was the first step in
integration within each country in Europe. A
single country organisation was created in
Austria on July 1, 2007, the UK integration
being currently in process and integration
also taking place in Belgium, France,
Germany, Italy, the Netherlands and Spain.
On January 25, 2007, Ricoh announced
purchase of IBM Printing Systems Division
for $725 million and investment in a 3-year
joint venture to form the new Ricoh
subsidiary, InfoPrint Solutions Company,
with a 51% share.
In February 2008, Ricoh partnered up with
PrinterOn to set up two new HotSpot
printers: The SP C410DN-KP color printer
and the SP 4100N-KP monochrome printer
which allows Wi-Fi enabled users to print
documents from any location.
29
On August 27, 2008, Ricoh announced its
intentions of acquiring IKON Office
Solutions for $1.6 billion and later that year,
on November 1, Ricoh completed the
acquisition.
In May 2011, Ricoh announced a cut of
10,000 jobs worldwide up to March 2014
from the current 40,000 workers in Japan and
68,900 others overseas. The company would
also shift 15,000 workers to areas with more
growth potential.
Japanese optical glass-maker Hoya
Corporation said on July 1, 2011, it would
sell its Pentax camera business to Ricoh, in a
deal the Nikkei business daily said was worth
about 10 billion yen ($124.2 million). On
July 29, 2011, Hoya transferred its Pentax
imaging systems business to a newly
established subsidiary called Pentax Imaging
Corporation. On October 1, 2011, Ricoh
acquired all shares of Pentax Imaging Corp.
and renamed the new subsidiary Pentax
Ricoh Imaging Company, Ltd.
On October 1, 2011, Ricoh announced the
establishment of Pentax Ricoh Imaging
Company, LTD. On August 1, 2013, the
company name was changed to Ricoh
Imaging Company Ltd.
On January 8, 2016, Ricoh India stated they
partnered with Siemens to offer digital
lifecycle management software.
On July 19, 2016, Ricoh India admitted to an
estimated ₹1,123 crore accounting fraud.
CEO and Managing Director Manoj Kumar,
and Chairman Tetsuya Takano have resigned
from Ricoh India as a result.
Operations
The Ricoh Group has sales and support,
production, and research and development
operations in nearly 180 countries. It has its
world headquarters in Tokyo, Japan and
regional headquarters in Japan, the Americas,
Europe, China, and the Asia-Pacific.
Regional headquarters
Americas Regional Headquarters
Ricoh Americas Corporation, located in
Malvern, PA, USA, covers the United States,
Canada and Latin American countries.
30
Europe Regional Headquarters
Ricoh International B.V., located in Amstelveen, the
Netherlands and London, U.K. covers Europe, Africa
and Middle East
Asia/Pacific Regional Headquarters
Ricoh Asia Pacific Pte. Ltd., located in Singapore,
covers South-East Asia, Australia, New Zealand and
China
Ricoh Research
Ricoh hastechnology- and customer-research groups
around the world. For example, Ricoh Innovations, a
research subsidiary of Ricoh Company, operates in
Silicon Valley, California, focusing on technology,
cloud, mobile solutions, and customer research.
BY
T.GOKUL
III MCA
31
TIPS AND TRICKS
Get Lightning Fast And Clever At The
Command Line: Ubuntu
The ‘tab’ key which completes partial
commands and even file and directory
names. Here are keyboard shortcuts that can
be used within terminal:
Ctrl-a Move to the start of the line.
Ctrl-e Move to the end of the line.
Alt-] x
Moves the cursor forward to the
next occurrence of x.
Alt-
Ctrl-] x
Moves the cursor backwards to the
previous occurrence of x.
Ctrl-u
Delete from the cursor to the
beginning of the line.
Ctrl-k
Delete from the cursor to the end of
the line.
Ctrl-w
Delete from the cursor to the start
of the word.
Ctrl-y Pastes text from the clipboard.
Ctrl-l
Clear the screen leaving the current
line at the top of the screen.
Ctrl-x
Ctrl-u
Undo the last changes. Ctrl-_
Alt-r Undo all changes to the line.
Alt-
Ctrl-e
Expand command line.
Ctrl-r
Incremental reverse search of
history.
Alt-p
Non-incremental reverse search of
history.
!! Execute last command in history
!abc
Execute last command in history
beginning with abc
!n Execute nth command in history
Ubuntu remember the applications that had
open when last logged out, so that when log
back in again, find all those applications
running and can resume right from where
left off. System > Preferences > Startup
Applications, then go to the options tab and
check "Automatically remember running
applications when logging out"
BY
S.SARANYA, S.NANDHINI
III MCA
32
MONTHLY EVENT GIST
Events:
1. MakeXcels Talent Hunt 2018 – 15.02.2018
An Intercollegiate meet was conducted with MBA Department, Mr.K.Parivallal, CEO,
DMW CNC Solutions Pvt. Ltd., Perundurai delivered the Inaugural address.
2. ITware’18 Workshop on “Hands on Training – PHP Programming” – 26.02.2018
Will be conducted by Mr. Ramesh, Assistant Professor, Sri Krishna Arts and Science
College, Coimbatore.
3. Seminar on “RDBMS Concepts” – 28.02.2018
Will be delivered by Dr.S.Selvi, Assistant Professor, Department of Computer Science,
PSG College of Arts and Science, Coimbatore.
4. ITxcel’s Association Valediction will be conducted on - 15.03.2018