IT ARCHIVE messages (CAMs) to multi-hop dissemination of messages over vast distances. 9 Most of the...

33
1 IT ARCHIVE Executive Committee Chief Patron : Thiru. P. Sachithanandan Avl, Patron : Dr. N. Raman M.Com., M.B.A., M.Phil., Ph.D., Editor in Chief : Prof. S. Manoharan M.C.A., M.Phil., Staff Advisor Mrs. S. Vanitha M.C.A., M.Phil., Assistant Professor, Department of Computer Science (P.G.). Staff Editor Prof. S. Manoharan M.C.A., M.Phil., Associate Professor and Head, Department of Computer Science (P.G.). Organizing Members Mr. S. Aslam III-MCA Ms. R. Suganya III-MCA Ms. V. Sandhya III-MCA Mr. K. Gowtham Kumar III-MCA Ms. N. Mythili III-MCA Ms. N. Keerthana III-MCA Ms. N. Gokilavani III-MCA Ms. P. Priya III-MCA Words by Swami Vivekananda NAVIGATOR VOL-40 MANET - 3 Linux Focus - 6 Technologies - 9 Intellect Explore - 13 Career Objectives - 20 Windows Phones - 23 Company Profile - 24 Tips and Tricks - 27 Freedom can never be reached by the weak. Throw away all weakness. Tell your body that it is strong, tell your mind that it is strong, and have unbounded faith and hope in yourself.

Transcript of IT ARCHIVE messages (CAMs) to multi-hop dissemination of messages over vast distances. 9 Most of the...

1

IT ARCHIVE

Executive Committee

Chief Patron : Thiru. P. Sachithanandan Avl,

Patron : Dr. N. Raman M.Com., M.B.A., M.Phil., Ph.D.,

Editor in Chief : Prof. S. Manoharan M.C.A., M.Phil.,

Staff Advisor

Mrs. S. Vanitha M.C.A., M.Phil.,

Assistant Professor,

Department of Computer Science (P.G.).

Staff Editor

Prof. S. Manoharan M.C.A., M.Phil.,

Associate Professor and Head,

Department of Computer Science (P.G.).

Organizing Members

Mr. S. Aslam III-MCA

Ms. R. Suganya III-MCA

Ms. V. Sandhya III-MCA

Mr. K. Gowtham Kumar III-MCA

Ms. N. Mythili III-MCA

Ms. N. Keerthana III-MCA

Ms. N. Gokilavani III-MCA

Ms. P. Priya III-MCA

Words by Swami Vivekananda

NAVIGATOR

VOL-40

MANET - 3

Linux Focus - 6

Technologies - 9

Intellect Explore - 13

Career Objectives - 20

Windows Phones - 23

Company Profile - 24

Tips and Tricks - 27

Freedom can never be reached by the weak. Throw away all weakness. Tell your body that it

is strong, tell your mind that it is strong, and have unbounded faith and hope in yourself.

2

ACKNOWLEDGEMENT

We wish to thank our Correspondent Thiru. P. Sachithanandan Avl, for

the support to publish the magazine and also we thank our principal Dr. N. Raman

M.Com., M.B.A., M.Phil., Ph.D., for considerable support to us during this effort.

We proudly thank our Chief Editor, Staff Advisor, Staff Editor, Staff members and

the Students of Department of Computer Science (P.G.) for their guidance and

suggestions to complete the magazine.

3

MOBILE AD HOC NETWORK (MANET)

MOBILE AD HOC NETWORK

A mobile ad hoc network (MANET) is a

continuously self-configuring,

infrastructure-less network of mobile

devices connected without wires. Each

device in a MANET is free to move

independently in any direction, and will

therefore change its links to other devices

frequently. Each must forward traffic

unrelated to its own use, and therefore be a

router. The primary challenge in building a

MANET is equipping each device to

continuously maintain the information

required to properly route traffic. Such

networks may operate by themselves or

may be connected to the larger Internet.

They may contain one or multiple and

different transceivers between nodes. This

results in a highly dynamic, autonomous

topology.

MANETs are a kind of Wireless ad hoc

network that usually has a routable

networking environment on top of a Link

Layer ad hoc network. MANETs consist of

a peer-to-peer, self-forming, self-healing

network. MANETs circa 2000-2015

typically communicate at radio frequencies

(30 MHz - 5 GHz). The growth of laptops

and 802.11/Wi-Fi wireless networking have

been made MANETs a popular research

topic since the mid-1990s. Many academic

papers evaluate protocols and their abilities,

assuming varying degrees of mobility

within a bounded space, usually with all

nodes within a few hops of each other.

Different protocols are then evaluated based

on measures such as the packet drop rate,

the overhead introduced by the routing

protocol, end-to-end packet delays, network

throughput, ability to scale.

TYPES

Vehicular Ad hoc Networks (VANETs) are

used for communication between vehicles

and roadside equipment. Intelligent

vehicular ad hoc networks (InVANETs) are

a kind of artificial intelligence that helps

vehicles to behave in intelligent manners

during vehicle-to-vehicle collisions,

accidents.

Smart Phone Ad hoc Networks (SPANs)

leverage the existing hardware (primarily

Bluetooth and Wi-Fi) in commercially

available smart phones to create peer-to-

peer networks without relying on cellular

carrier networks, wireless access points, or

traditional network infrastructure. SPANs

differ from traditional hub and spoke

4

networks, such as Wi-Fi Direct, in that they

support multi-hop relays and there is no

notion of a group leader so peers can join

and leave at will without destroying the

network.

Internet based mobile ad hoc networks

(iMANETs) are ad hoc networks that link

mobile nodes and fixed Internet-gateway

nodes. For example, multiple sub-MANETs

may be connected in a classic Hub-Spoke

VPN to create a geographically distributed

MANET.

In such type of networks normal ad hoc

routing algorithms do not apply directly.

One implementation of this is Persistent

System's CloudRelay.

Military / Tactical MANETs are used by

military units with emphasis on security,

range, and integration with existing

systems.

Common waveforms include the US

Army's SRW, Harris's ANW2 and HNW,

Persistent Systems' Wave Relay,

Trellisware's TSM and Silvus Technologies'

StreamCaster.

A mobile ad-hoc network (MANET) is an

ad-hoc network but an ad-hoc network is

not necessarily a MANET.

VEHICULAR AD HOC NETWORK

Vehicular Ad Hoc Networks (VANETs) are

created by applying the principles of mobile

ad hoc networks (MANETs) - the

spontaneous creation of a wireless network

for data exchange - to the domain of

vehicles. They are a key component of

intelligent transportation systems (ITS).

APPLICATIONS

VANETs support a wide range of

applications - from simple one hop

information dissemination e.g., cooperative

awareness messages (CAMs) to multi-hop

dissemination of messages over vast

distances.

Most of the concerns of interest to mobile

ad hoc networks (MANETs) are of interest

in VANETs, but the details differ. Rather

than moving at random, vehicles tend to

move in an organized fashion.

The interactions with roadside equipment

can likewise be characterized fairly

accurately.

And finally, most vehicles are restricted in

their range of motion, for example by being

constrained to follow a paved highway.

5

SMART PHONE AD HOC NETWORK

Smart Phone Ad hoc Networks (SPANs)

leverage the existing hardware (primarily

Bluetooth and Wi-Fi) in commercially

available smart phones to create peer-to-

peer networks without relying on cellular

carrier networks, wireless access points, or

traditional network infrastructure.

FEATURES

Capable of going off-grid and enabling

peer-to-peer communications without

relying on cellular carrier networks,

wireless access points, or traditional

network infrastructure.

Optional Internet access through gateway

devices, such as mobile hotspots in the

mesh.

Optional stationary or portable

infrastructure such as routers, mesh

extenders, or other non-phone hardware.

Leverage the devices that people carry on

their person and use every day.

Primarily use Bluetooth and Wi-Fi since the

cellular spectrum is licensed and controlled

by cellular providers and FCC regulations.

Set up and tear down are on-demand. Join

and leave at will.

Routing protocol may be implemented at

the Network Layer or Link Layer.

Often requires rooting a device and making

modifications to the operating system,

kernel, or drivers.

May result in profit loss by cellular carriers.

S.ASLAM III - M.C.A

6

LINUX (OPERATING SYSTEM)

SUSE LINUX DISTRIBUTIONS

SUSE is a computer operating system. It

is built on top of the open source Linux

kernel and is distributed with system and

application software from other open

source projects. SUSE Linux is of

German origin, basically an acronym of

“Software und System-Entwicklung”

(software and systems development),

and was mainly developed in Europe.

The first version appeared in early 1994,

making SUSE one of the oldest existing

commercial distributions. It is known for

its YaST configuration tool.

Novell bought the SUSE (then "SuSE")

brands and trademarks in 2003. Novell,

one of the founding members of the

Open Invention Network, decided to

make the community an important part

of their development process by

opening widely the distribution

development to outside contributors in

2005, creating the openSUSE

distribution and the openSUSE Project.

Novell employed more than 500

developers working on SUSE in 2004.

On 27 April 2011, Novell (and SUSE)

were acquired by The Attachmate

Group, which made SUSE an

independent business unit. Later, in

October 2014, the entire Attachmate

Group, including SUSE, was acquired

by the British firm Micro Focus

International. SUSE continues to

operate as an independent business unit

THE DEVELOPER

Gesellschaft für Software and System

Entwicklung mbH (Lit. Company for

Software and System Development)

was founded on 2 September 1992 in

Nuremberg, Germany, by Roland

Dyroff, Thomas Fehr, Burchard

Steinbild, and Hubert Mantel. Three of

the founders were still mathematics

students at a university; Fehr had

7

already graduated and was working as a

software engineer.

The original idea was that the company

would develop software and function as

an advisory UNIX group. According to

Mantel, the group decided to distribute

Linux, offering support.

Their name at founding was "S.u.S.E"

and it was chosen as a German acronym

for "Software und System-

Entwicklung", meaning "Software and

systems development". The full name

has never been used, however, and the

company was known as "S.u.S.E",

which was shortened to "SuSE" in

October 1998 and more recently, to

"SUSE”.

The official logo and current mascot of

the distribution is a veiled chameleon

officially named, "Geeko" (portmanteau

of "Gecko" and "geek"), following a

competition. As with the company's

name, the "Geeko" logo design has

evolved over time to reflect the name

changes.

THE OPENSUSE PROJECT

On 4 August 2005, Novell announced

that the SUSE Professional series would

become more open, with the launch of

the openSUSE Project community. The

software always had been open source,

but openSUSE opened the development

process, allowing developers and users

to test and develop it. Previously, all

development work had been

accomplished in-house by SUSE.

Version 10.0 was the first version that

offered public beta testing.

.

SUSE Linux 10.0 included both open

source and proprietary applications and

retail boxed-set editions. As part of the

change, YaST Online Update server

access became free for all SUSE Linux

users, and also for the first time, the

GNOME desktop was upgraded to equal

status with the traditional KDE.

MICROSOFT AGREEMENT

On 3 November 2006 (renewed 25 July

2011), Novell signed an agreement with

Microsoft covering improvement of

SUSE's ability to interoperate with

Microsoft Windows, cross-

promotion/marketing of both products

8

and patent cross-licensing. The

agreement is considered controversial by

some in the Free Software community.

SUSE FAMILY PRODUCTS

SUSE Linux is available under two

brands, openSUSE and SUSE Linux

Enterprise. openSUSE is a free,

community distribution driven by the

openSUSE Project. It includes some of

the latest "bleeding edge" Linux

technologies and is designed for home

users and enthusiasts. SUSE Linux

Enterprise is Suse's tested and certified

open-source solution for major

enterprises.

R. SUGANYA III – M.C.A

9

NEW TECHNOLOGY

CHROMECAST

Chromecast is a line of digital media

players developed by Google. Designed

as small dongles, the devices play

audio/video content on a high-definition

television or home audio system by

directly streaming it via Wi-Fi from the

Internet or a local network. Users select

the media to play using mobile apps and

web apps that support the Google Cast

technology. Alternatively, content can be

mirrored from the Google Chrome web

browser running on a personal computer,

as well as from the screen of some

Android devices.

The first-generation Chromecast, a video

streaming device, was announced on

July 24, 2013, and made available for

purchase on the same day in the United

States for US$35. The Google Cast SDK

was released on February 3, 2014,

allowing third parties to modify their

software to work with Chromecast.

According to Google, over 20,000

Google Cast–ready apps are available, as

of May 2015.

Chromecast was favorably received by

critics, who praised its simplicity and

potential for future app support. Over

20 million units have sold globally since

launch, and it was the best-selling

streaming device in the United States in

2014, according to NPD Group. From

Chromecast's launch to May 2015, it

handled more than 1.5 billion stream

requests. The second-generation

Chromecast and audio-only model called

Chromecast Audio were released in

September 2015.

FEATURES AND OPERATION

Chromecast devices are dongles that are

powered by connecting the device's

micro-USB port to an external power

supply or a USB port. Video-capable

Chromecasts plug into the HDMI port of

10

a high-definition television or monitor,

while the audio-only model outputs

sound through its integrated 3.5

millimeter audio jack/mini-TOSLINK

socket. By default, Chromecasts connect

to the Internet through a Wi-Fi

connection to the user's local network; a

standalone Ethernet adapter/USB power

supply, introduced in July 2015 for

US$15, allows a wired connection.

Google Glass is smaller and slimmer

than previous head-mounted display

designs. The Google Glass prototype

resembled standard eyeglasses with the

lens replaced by a head-up display.

Google engineered a prototype that

weighed 8 pounds (3,600 g); by 2013

they were lighter than the average pair of

sunglasses.

Chromecast offers two methods to

stream content: the first employs mobile

apps and web apps that support the

Google Cast technology; the second

allows mirroring of content from the

web browser Google Chrome running on

a personal computer, as well as content

displayed on some Android devices. In

both cases, playback is initiated through

the "cast" button on the controlling

device.

If a television's HDMI ports support the

Consumer Electronics Control (CEC)

feature, pressing the cast button will also

result in the video-capable Chromecast

automatically turning on the TV and

switching the television's active

audio/video input using the CEC

command "One Touch Playback".

The primary method of playing media on

the device is through Google Cast–

enabled mobile apps and web apps,

which control program selection,

playback, and volume. The Chromecast

itself streams the media from the web

within a local version of the Chrome

browser thus freeing the controlling

device up for other tasks, such as

answering a call or using another

application, without disrupting playback.

Mobile apps enabled for Chromecast are

available for both Android 4.1+ and iOS

7.0+; web apps enabled for Chromecast

are available on computers running

Google Chrome (on Microsoft Windows

7+, Mac OS 10.7+, and Chrome OS for

Chromebooks running Chrome 28+)

through the installation of the "Cast

11

extension" in the browser. Streamed

content can be Internet-based, as

provided by specific apps, or reside on

the controlling device's local storage.

Apps that provide access to the latter

include Castbox, AllCast, Avia, and

Plex, as well as the Android version of

Google Photos.

Content can also be mirrored from a tab

of the Chrome browser (with the Cast

extension) on a personal computer or

from the screen of some Android devices

with operating system version 4.4 or

above. In the case of "tab casting", the

quality of the image depends on the

processing power of the device, and

minimum system requirements apply to

video streaming. Content that uses plug-

ins, such as Silverlight and QuickTime,

does not fully work, as the stream may

lack sound or image. Similarly, screen

images mirrored from Android devices

are typically degraded, reflecting the fact

that video displayed on the smaller

screens of tablets and smartphones is

usually downloaded.

When no content is streamed, video-

capable Chromecasts display a user-

personalized content feed called

"Backdrop" that can include featured

and personal photos, artwork, weather,

satellite images, weather forecasts, and

news.

Users' controlling devices previously

needed to be connected to the same Wi-

Fi network as a video-capable

Chromecast to cast content, until the

addition of a "guest mode" feature on

December 10, 2014. When enabled, the

feature allows the controlling devices to

discover a nearby Chromecast by

detecting ultrasonic sounds emitted by

the television to which a Chromecast is

connected alternatively, the controlling

device can be paired with the

Chromecast over the Internet using a

four-digit PIN code provided on screen.

CHROMECAST APP

The Chromecast mobile app was

released to coincide with the release of

the original video model, and is

available for both Android and iOS

mobile devices. It facilitates initial setup

of the Chromecast hardware, allows

settings configuration for the device, and

provides information about the

"Backdrop" images shown on the

television. On October 19, 2013, the

12

Chromecast mobile app was released

outside of the US for the first time.

In September 2015, Google introduced

additional features to the app, including

aggregation of content available from

Google Cast–ready mobile apps installed

on the user's device, as well as a link to

view other available Google Cast–ready

apps; the latter had previously been

available only through Google's online

Play Store. The app also offers a search

function that identifies which streaming

services offer a specified film or TV

show.

V. SANDHYA III – M.C.A

13

INTELLECT EXPLORE

1. Find the number of triangles in the given figure.

A. 8 B. 10 C. 12 D. 14

Answer: Option D

Explanation:

The figure may be labeled as shown.

The simplest triangles are AHG, AIG, AIB, JFE, CJE and CED i.e. 6 in number.

The triangles composed of two components each are ABG, CFE, ACJ and EGI i.e. 4 in number.

The triangles composed of three components each are ACE, AGE and CFD i.e. 3 in number.

There is only one triangle i.e. AHE composed of four components.

Therefore, there are 6 + 4 + 3 + 1 = 14 triangles in the given figure.

14

2. Find the minimum number of straight lines required to make the given figure.

A. 16 B. 17 C. 18 D. 19

Answer: Option B

Explanation:

The figure may be labeled as shown.

The horizontal lines are IK, AB, HG and DC i.e. 4 in number.

The vertical lines are AD, EH, JM, FG and BC i.e. 5 in number.

The slanting lines are IE, JE, JF, KF, DE, DH, FC and GC i.e. 8 is number.

Thus, there are 4 + 5 + 8 = 17 straight lines in the figure.

3. Find the number of triangles in the given figure.

A. 22 B. 24 C. 26 D. 28

Answer: Option D

15

Explanation:

The figure may be labeled as shown.

The simplest triangles are AGH, GFO, LFO, DJK, EKP, PEL and IMN i.e. 7 in number.

The triangles having two components each are GFL, KEL, AMO, NDP, BHN, CMJ, NEJ and HFM i.e. 8 in number.

The triangles having three components each are IOE, IFP, BIF and CEI i.e. 4 in number.

The triangles having four components each are ANE and DMF i.e. 2 in number.

The triangles having five components each are FCK, BGE and ADL i.e. 3 in number.

The triangles having six components each are BPF, COE, DHF and AJE i.e. 4 in number.

Total number of triangles in the figure = 7 + 8 + 4 + 2 + 3 + 4 = 28.

4. Find the number of triangles in the given figure.

A. 12 B. 18 C. 22 D. 26

Answer: Option B

Explanation:

The figure may be labeled as shown.

16

The simplest triangles are AHB, GHI, BJC, GFE, GIE, IJE, CEJ and CDE i.e. 8 in number.

The triangles composed of two components each are HEG, BEC, HBE, JGE and ICE i.e. 5 in number.

The triangles composed of three components each are FHE, GCE and BED i.e. 3 in number.

There is only one triangle i.e. AGC composed of four components.

There is only one triangle i.e. AFD composed of nine components.

Thus, there are 8 + 5 + 3 + 1 + 1 = 18 triangles in the given figure.

5. Find the number of triangles in the given figure.

A. 18 B. 20 C. 24 D. 27

Answer: Option C

Explanation:

The figure may be labeled as shown.

17

The simplest triangles are IJO, BCJ, CDK, KQL, MLQ, GFM, GHN and NIO i.e. 8 in number.

The triangles composed of two components each are ABO, AHO, NIJ, IGP, ICP, DEQ, FEQ, KLM, LCP and LGP i.e.10 in number.

The triangles composed of four components each are HAB, DEF, LGI, GIC, ICL and GLC i.e. 6 in number.

Total number of triangles in the figure = 8 + 10 + 6 = 24.

6. What is the next number in the below number sequence pattern.

Solution:

1113213211

its like you call it out

one one => 11

two one => 21

and so on.

18

7. Find the missing number in the picture below?

Solution:

30(sum of corner of triangle).

8. Can you replace the question mark with the correct number?

Solution:

6

5*6+2=31,7*6+2=44.

9. What is it?

Answers:

Sandbox

19

10. What does this picture say?

Answers:

Head in the Sand

K. GOWTHAM KUMAR III – M.C.A

20

CAREER OBJECTIVES

SOME TIPS FOR A SUCCESSFUL GROUP DISCUSSION

The first and the foremost tip for an individual to perform well in a group discussion are

to learn the art of participation. Don’t expect others to force you to speak. Take the

initiative, participate in the discussion and share your ideas with others. Never shout in a

group discussion and always wait for your turn to speak. Remember it’s a discussion, not

a fighting ground. Be polite but firm.

Try to take the initiative. Don’t wait for the others to start the discussion. Always

volunteer yourself and start the discussions in an extremely confident manner. Introduce

yourself and your team members and then start with the topic but one thing to remember

here is that one must initiate the Group Discussion only when he or she is well versed

with the topic. Don’t take the risk if you yourself are not very clear about your thoughts.

A leader is the one who actually gives the group discussion a direction and guides other

team members when they seem to be lost or confused. Like a true leader, an individual

must try his level best to refrain from personal favors. Don’t only ask your acquaintance

to speak, give equal opportunity to other participants as well. As the leader of the group,

he must ensure that the discussion does not end up in fighting and reaches a conclusion.

One must speak only if he is well prepared with the topic. Don’t just speak for the

sake of points or marks; speak only when you are absolutely sure about what you are

speaking. Never depend on guess works in group discussions as it sometimes can

seriously go against you. Avoid using slangs or crack jokes in between the discussions as

it is considered highly unprofessional.

Never be rigid in group discussions. Always keep in mind that the other person is also

as learned as you. Always listen to what he is saying and then only respond. Be a good

21

and a patient listener. Don’t just simply draw conclusions as there is always a room for

discussions. Debate logically and sensibly and try to take everyone along with you.

Read a lot and always keep your eyes and ears open. Always begin your day with the

newspaper and know what is happening around you. An individual must be aware of the

current events to succeed well in a group discussion.

Be alert always. A participant usually gets around 15 minutes to think about the topic.

You need to think fast and cover as much as you can. Always take care of your words.

The content has to be sensible, crisp and well supported with examples or real life

situations. Don’t adopt a laidback attitude or yawn in between group discussions.

Take care of your dressing as well. Don’t wear flashy clothes while going for a group

discussion or interview. Female candidates should also avoid cakey makeup or flaunt

heavy jeweler. The clattering sounds of bangles sometimes act as a disturbing element in

formal discussions. Be in professional attire and avoid loud colors.

An individual must keep in his mind that group discussion is meant for bringing out the

managerial skills of an individual. The organizer of the group discussion will never

appreciate you or give you the credit if you shout or fight in group discussions. Be calm,

composed, confident and neutral to create an impression in the discussion and win over

others.

N. MYTHILI III – M.C.A

22

WINDOWS PHONE OS

Windows Phone is a proprietary mobile

operating system developed by

Microsoft. Windows Phone introduced a

new design language, previously called

Metro UI, but later renamed to simply

Modern.

Microsoft licenses the software to third-

party hardware manufacturers, but keeps

a stringent list of minimum requirements

for the hardware it runs on to ensure the

best user experience.

In 2011 Nokia announced it has chosen

Windows Phone as the OS for all its

future smart phones providing a solid

backing for the fledgling OS and in the

same time betting all of its mobile phone

business on its success.

Windows Phone 7

The initial announcement of Windows

Phone 7 came in February, 2010. It was

later launched in October the same year.

Windows Phone 7.5 Mangos

The next major update – Windows

Phone 7.5 Mango – saw the light of day

in May 2011. The update brought the

frequently requested multi-tasking for

third-party apps and added the updated

Internet Explorer 9, Twitter integration

and Windows Live SkyDrive access.

Windows Phone 7.5 Tangos

Another update followed in 2012,

dubbed Tango, which lowered the

minimum hardware requirements for the

smart phones essentially allowing

Windows Phones at lower price points.

Other new features include the capability

to create a Wi-Fi hotspot and flip-to-

silence.

Windows Phone 7.8

Reportedly, a Windows Phone 7.8

update is in the works. It should carry

over some of the new features of

23

Windows Phone 8 down to the lineup of

previous smart phones, as those would

not be updated to Windows 8.

The launch schedule is yet unannounced

by Microsoft.

Windows Phone 8

In October 2012 Microsoft released a

major update to the mobile OS. Older

devices are denied an update.

Windows 8 introduced much awaited

features such as multi-core processor

and multiple screen resolution support,

removable memory card support, USB

Mass storage mode, DivX/XviD video

playback support, NFC support,

Bluetooth file transfers, Kid's Corner,

etc.

The new release also replaced the

Windows CE-based architecture to a

Windows NT kernel, allowing easy

applications porting from the desktop

Windows 8 to the mobile one, mainly

benefiting the tablets running the new

Windows 8 RT.

N. KEERTHANA III – M.C.A

24

COMPANY PROFILE

OFS

OFS Founded in 1997, it has a deep

heritage of building commercial

products for software vendors, which

have given us the insight and experience

to create software for any business and

make it compelling, packed with

innovative features, designed for rapid

evolution, and built for an entire market,

not just a single customer.

OFS build all kinds of software, whether

it’s commercial software for sale by

vendors, enterprise software used by

large corporations to drive revenue and

improve operations, or branded mobile

and cloud software to help companies

distinguish themselves in their

marketplace.

OFS has nearly 500 employees spread

across our 4 US offices in Atlanta (HQ),

New York, Philadelphia, and DC, and

our development center in Chennai,

India. Our client list includes a number

of billion-dollar firms across several

industries including healthcare,

media/publishing, manufacturing, energy

and software. They have all come to

recognize that OFS brings the product

expertise they need to drive revenue in

21st century markets.

LEADERSHIP

Josab Raj

Chairman and Managing Director

James Walter

Vice-Chairman of the Board and CEO, OFS

India

SERVICES

Commercial Software

OFS started out as a software product

company in 1997, building anti-money

laundering software for the banking

industry and a programmer productivity

25

tool for database independence. With

product as our heritage, and with a

management team possessing over 100

total years in the software business, you

can trust know what it takes to build

configurable, scalable, multi-tenant

software that is innovative and that

serves a whole market, not just a single

customer. Our team members provide

you with complete skill sets in product

engineering, design, maintenance,

migration, and quality assurance so your

products receive the meticulous focus

and expertise needed to succeed for your

business.

OFS can act as an extension of your

team or take over a project entirely for

you – however you want it, company

have an engagement model that will be

the right fit.

OFS make it our passion to innovate

through software in order to differentiate

you from your competition and to drive

revenue through new and continued

business. Our OFS Innovation Center is

constantly exploring new technologies to

best understand how company can apply

them to your software and business

needs.

With our Brick process methodology – a

combination of Agile and Waterfall –

you get the best of both worlds – early,

rapid, and measurable results that

guarantee progress as well as a

structured discipline that ensures your

large software systems are well-

architected.

OFS know that the world of technology

is ever-changing, so OFS is continually

researching and learning through our

OFS R&D Lab in order to stay ahead of

the technology curve. Regular training

workshops at our development center

also ensure that keep our employees up-

to-date on the latest technologies and

bring that expertise to your projects.

Enterprise Software

OFS assists large companies in moving

beyond simply deploying corporate-wide

software such as SAP and Oracle, as

companies are recognizing that they

must now create their own innovative

software to increase internal efficiency

and propel themselves further.

OFS help take a new look at a

company’s existing software to see how

they can take advantage of the latest in

mobile, RFID, mathematical modeling,

26

and gasification concepts to improve

their efficiency, throughput and revenue.

From manufacturing firms, looking to

integrate their bill of materials cost roll-

up software across the globe, to

insurance companies, who must improve

customer service for claims processing

with software, enterprises from a variety

of industries are finding great value in

OFS’s custom enterprise software

development.

Branded Software

Every company, no matter what industry

it serves, is now finding itself in the

software business, meaning that more

and more of the value of their products

and services is now derived from

software.

This transformation applies to all industries

– financial, healthcare, entertainment, retail,

information services, etc. – as the rise of

social media, mobile apps, analytics and

cloud computing changes the game for each

of them.

OFS is leading the charge with this new kind

of software by helping companies take their

brand to the next level through innovative

software that differentiates them from their

competition.

Website: www.ofs.com

N. GOKILAVANI III – M.C.A

27

TIPS AND TRICKS

20 MUST-KNOW WINDOWS 8 TIPS AND TRICKS

Windows 8 is rife with features and

behaviors that conspire to perplex even the

most experienced PC users. Not all of

them are bad, per se, but few of them are

immediately intuitive. Making matters

worse, the OS was primarily designed for

touch control, and as a result, many mouse

and keyboard commands feel like tacked-

on afterthoughts.

We've assembled a list of our

favorite Windows 8 shortcuts, tricks, and

workarounds. Many focuses on making the

most of the OS on a traditional desktop

PC, so if you're interested in touch

gestures, please check out our article that

focuses directly on the Windows 8 touch

experience. Now let's start our journey of

discovery with a look at easy-to-use

(though often tough to remember!)

Windows 8 hotkey commands.

EMPLOY THE HOTTEST HOTKEYS

WE KNOW

In these key combinations, hold down the

Windows key (normally located between

Alt and Ctrl) and another key, as described

on this list.

Press the Windows key to enter the

tiled Start screen.

The Windows key + M minimizes

everything that's showing on the

desktop.

The Windows key + E opens Explorer

for quick access to folders.

On the Start screen, press the Windows

key + D to instantly get to the desktop.

The Windows key + Tab opens a list of

currently running programs.

The Windows key + Print Screen takes

a screenshot and saves it in a

Screenshots folder nested in your

Pictures folder.

To take a screenshot on a Windows 8

tablet, simultaneously press the

Windows button and the volume-down

button on the tablet chassis.

The Windows key + Q open a global

search menu. Type what you're looking

for and where you would like to look.

The Windows key + W opens a search

in your system settings to quickly locate

and change system properties.

The Windows key + F open a file and

folder search.

28

The Windows key + Pause open the

system properties page to show you a

quick rundown of your specs.

The Windows key + "," (that's the

comma sign!) makes all current

windows transparent, giving you a

peek at the desktop as long as you hold

down the Windows key.

The Windows key + "." (The period)

snaps a window to the right or left side

(toggling each time you press ".").

The Windows key + R prompt the Run

command—useful for quickly

launching apps and other routines with

a command prompt.

The Windows key + X opens the

Quick Access Menu, exposing system

functionality such as the Command

Prompt, Disk Management, File

Explorer, Run, and more.

Alternatively, you can right-click on

the bottom right corner of the screen to

spawn the Quick Access Menu.

The Windows key + I open the settings

menu, giving you quick access to the

Control Panel, Personalization, and

your Power button, among other

features.

The Windows key + O

locks orientation on devices with an

accelerometer.

ZOOM IN TIGHT

The Start Screen is full of nice, big,

chunky tiles that represent all your apps.

The tiles are easy to see in small groups,

but what if you have hundreds of apps

installed? Most will be hidden from view,

unless you want to do a lot of scrolling.

Enter the new semantic zoom feature.

If you’re using a touch display,

squeeze the Start screen with two fingers

to receive a bird’s eye view of your entire

screen contents.

And the feature is also available to

mouse and keyboard users: Simply hold

down the Ctrl button, and use your mouse

wheel to zoom in and out.

CATEGORIZE YOUR APPS

29

Your Start screen can become a cluttered

mess if you collect too many apps and

other elements that have been pinned to

the screen as tiles, so take advantage of

built-in organization tools that let you

divide everything into labeled groups.

First, drag all the tiles you want to assign

to a single group to the far right-hand side

of your Start screen in vacant territory; the

OS should sequester the tiles together.

Once you're satisfied with your assembly,

use semantic zoom (described above) to

get a bird's eye view of your desktop. Now

right-click the group (or simply drag down

on it), and select the "Name group" option

on the left of the bar that appears below.

Type in the name, and enjoy your newly

organized Start screen.

CLOSE AN APPLICATION

Closing an app sounds simple

enough, but you'll quickly notice that close

buttons are hard to find in Windows 8.

That's because Microsoft encourages us to

run apps in the background where they'll

take up minimal resources, but still be

accessible at any time.

Nonetheless, if you insist on being

rebellious, you can close an app by

dragging it with your mouse or finger from

the top of the screen all the way down to

the bottom. As you drag, the app will

minimize into a thumbnail, and when you

reach the bottom, it will disappear from

view. Alternatively, you can still close

apps via Alt + F4 and through the Task

Manager.

SEARCH FOR ANYTHING IN ANY

APP FROM ONE PLACE.

The Search function located on the

Charms bar is packed with power, letting

you search the directories of not only your

Windows 8 machine, but also the greater

Windows ecosystem.

Simply choose the bucket of data

you want to sift through—it could be all

your installed apps, your system settings,

your files, your mail messages, or even an

external service like the Windows Store or

Bing Maps—type in a keyword, and hit

Enter.

The Search function will then

return the results, perfectly contextualized

for the database you’ve addressed Oh, and

how's this for cool? You don't even need to

30

hit the Charms bar to access Search. From

the Start screen, simply start typing, and

you'll be quickly whisked to the text-entry

field for search queries.

ADJUST PRIVACY SETTINGS

A lot of apps tap into very personal

information by default. Indeed, your

pictures, location, and name are liberally

woven throughout the system, and like

many users you may not be comfortable

trusting your machine with that much

sensitive data. To adjust the settings, press

the Windows key + I, and go to Change

PC Settings. Select the Privacy option, and

personalize the settings for your personal

data there.

ADJUST SMARTSCREEN SETTINGS

SmartScreen warns you before running an

unrecognized app or file from the Internet.

While it's helpful to be aware of a file's

source, constant warnings can also get a

little annoying.

By default, you need an

administrator's permission, but this can

easily be adjusted to just a warning or no

indication at all. Using the magic search

function described above, type "security"

at the Start screen and find the "Check

security status" in the Settings tab. From

this area, you can adjust various security

settings, including the Windows

SmartScreen.

SHARE AND SHARE ALIKE

Windows 8 is Microsoft’s first

social-media-aware PC operating system.

Using the Share button located on the

Charms bar, you can pick any number of

elements from your Windows 8 Store

apps—say, a location from your Maps app,

a news story from the Finance app, or a

even a contact from your People app—and

then distribute that item to friends via

other Windows 8 programs.

Perhaps most conveniently, you

can quickly share a photo via email or

Twitter, or to your own SkyDrive or

Windows Phone. The Share button is

31

contextual, and the more you use it, the

more you’ll discover which apps share

with each other, and which don’t.

CREATE A PICTURE PASSWORD

Using a picture password is a fun

way keeps your device secure while not

having to remember a complex password.

To enable it, press the Windows key + I to

get to the settings charm. Click "Change

PC settings" at the bottom right, and go to

the Users tab. Under "Sign-in options" will

be the "Create a picture password" button.

This will give you the option to

choose any picture, and then define three

gestures anywhere on the image. Your

gestures can be circles, swipes and clicks.

For example, to set a picture

password for the image above, you could

click on the highest palm tree, draw a

circle around the island, and then swipe

down from the lens flare in the upper right.

Just beware: The direction of each gesture

matters! After confirming it a couple

times, your picture password will be set.

BOOT TO THE DESKTOP WITHOUT

AN APP

One of biggest complaints about

Windows 8 is that it boots straight to the

Start screen—an annoyance for many

committed desktop users. The Start8 utility

helps you avoid this indignity (among

other cool features), but you can actually

boot straight to the desktop without

installing anything extra.

Go to the start screen and type in

"schedule" to search for Schedule Task in

Settings. Click on Task Scheduler Library

to the left, and select Create Task. Name

your task something like "Boot to

desktop." Now select the Triggers tab,

choose New, and use the drop-down box to

select starting the task "At log on." Click

OK and go to the Actions tab, choose New,

and enter "explorer" for the

Program/Script value.

32

SHUT DOWN WITH ONE CLICK

Windows 8 hides the Power button

in the Settings menu, forcing a multistep

process just to shut down one's PC. But

thanks to a crafty shortcut trick, you can

pin a Shutdown button right onto the

bottom of your desktop. Here's how.

Create a shortcut on your desktop

(right-click, go to New, then Shortcut).

Enter "shutdown /s /t 0" (with no quotes,

and, yes, that's a zero not an "O") as the

location of the item, and press Next. Now

name the shortcut (preferably "Shutdown")

and press Finish.

Right-click the shortcut, and

navigate to Properties. Choose Change

Icon in the Shortcut tab, and then OK to

leave the warning box. Choose an icon of

your choice from the list. In the screenshot

above, you'll see we chose a Power button.

Right-click the shortcut again, and

select Pin to Start. You can place the icon

on your Start screen wherever it's

convenient. Clicking it will instantly shut

down your computer.

P.PRIYA III – M.C.A

33

MONTHLY EVENT GIST

News Bulletin and Vocabulary

Current Bulletin in IT and English Vocabulary are display at Notice Board Daily

and Uploaded in the www.kasc.ac.in website at the end of every Semester.

Events:

1. Personality Development Programme – 15.09.2015

Conducted by Mr. R.Raja & Team, Business Development, Helikx, Erode.

2. ITware’15 Workshop on “MATLAB” – 22.09.2015

Conducted by Dr.V.Parthiban, Assistant Professor, Department of Mathematics,

VIT University, Chennai Campus, Chennai.

********************************************