Vision and dreams are the blueprints of soul and achievements.
-Mohammed Ahmed F

Showing posts with label Technology Update. Show all posts
Showing posts with label Technology Update. Show all posts

Android App Development Workshop by Anna University

College of Engineering, Anna University, Guindy is conducting one day hands-on workshop on Android App Development for students for a nominal fee of Rs. 300/-.

Certificate from Anna University and refreshments will be given to all the candidates.

To register contact your slot contact - +919629634955 / +919894006783.

Only limited slots available, block your seat by contacting the mentioned numbers. Also, share this post and let your friends know this opportunity.

Registration for the Android Workshop is now open, register Here -

How to become a Ethical Hacker


Are you interested in Ethical Hacking? Then, this post is for you.

Cyber-security is one of the major concerns of online users these days and hackers are an inevitable part of this discussion. Every part of our cyber world is influenced by hackers and they exploit the vulnerabilities of systems to gain unauthorized access. While numerous people are confused between the terms hackers and cyber-criminals, many of you are willing to know more about hackers and how to become one.

Who is an ethical hacker?

Ethical hacker performs hacking to help an individual or company and identifies the potential risks. An ethical hacker is a good guy and sometimes the term is used synonymously  White Hats. They work to improve the overall internet security and search for weak points that could be exploited by the black hats – the bad guys.

Take a look at these points and you will understand what constitutes ethical hacking! These are “guidelines” that an ethical hacker must follow!

1. Respect an individual’s or company’s privacy.
2. Having a permission (expressed – often written) to break into a network and look for the loopholes.
3. After finding the vulnerabilities, you tell your employer about the unknown flaws.
4. After finishing the work, you must not anything open for later exploitation by you or someone else.
5. Do not take any kind of advantage of the permission and access granted to you.

Now, take a look at this infographic by It’s a very well represented career path. For choosing this career as an ethical hacker, you can start by becoming an Information Security analyst or by becoming a computer programmer.

Learn more about this career path in the infographic given below:

-Chief Administrative Officer.
Is the IT Industry drowning?

Is the IT Industry drowning?


Self-financing colleges in Tamil Nadu are showing the door to hundreds of faculty members.

With the mindset of students inclined towards core engineering subjects ahead of the counselling, the self-financing colleges are not just surrendering thousands of seats in Information Technology (IT) and Computer Science courses but also sending home hundreds of faculty members.

A few prominent colleges in the city and its suburbs alone have retrenched over 100 faculty members teaching IT and Computer Science, the two preferred courses and almost a rage a decade ago.

Officials of Anna University, to which the institutions are affiliated, say they are aware of the retrenchment move.

“It has become a routine for colleges to downsize some departments that have lost favour with students,” a professor said.

The craze for IT and computer science among students fuelled an increase in student intake and some colleges had as many as 240 students in each of these subjects in all the four years. Since the University stipulates that a student teacher ratio of four teachers to 60 students, colleges had appointed as many as 40 to 50 teachers, professors say. 

Every time a subject becomes popular, there is more demand for it among students and new faculty are recruited. When subjects lose favour, the teachers are sent home, academics say.

Poised for growth:

While the colleges insist the interest in IT and Compute Science is waning, the National Association of Software and Services Companies (NASSCOM), denies a fall in recruitment of candidates for IT sector.

“IT and IT enabled service companies continue to recruit around two lakh candidates from colleges in the last several years despite global meltdown,” says K. Purushothaman, regional director, Tamil Nadu and Kerala. 

The industry that was growing at 30 per cent is is now growing at 15 per cent. “In a few years, it will reach a growth of 24 per cent,” he emphasises. 

“Instead of looking at short term gain, parents should understand the dynamics of business and help their children choose courses carefully,” Mr. Purushothaman avers.

Welcoming the trend towards core engineering subjects, E. Balagurusamy, a former vice chancellor of Anna University, says, “India needs engineers, not technical coolies. With arts and science colleges also offering IT and Computer Science courses, companies have broad based their recruitment to include all engineering disciplines and even arts and science graduates. There are enough programmers now. Also, these companies are not developing software.”

“That teachers in private engineering colleges are recruited on a consolidated pay and treated shabbily is all to together another issue,” he says.

The issue of ill treatment of teachers in institutions of higher learning was raised at a meeting organised by the Association of University Teachers (AUT) on Sunday. “Even in aided institutions, teachers are not treated well,” says C. Pichaandy, vice president, AUT.

Note: This article was taken from The Hindu Newspaper's Education Plus Section.

-Chief Administrative Officer.
Did you know???

Did you know???


Did you know these abbreviations! Did you know..??

* VIRUS - Vital Information Resource UnderSeized.

* 3G -3rd Generation.
* GSM - Global System for Mobile Communication.
* CDMA - Code Divison Multiple Access.
* UMTS - Universal MobileTelecommunication System.
* SIM - Subscriber Identity Module .
* AVI = Audio Video Interleave
* RTS = Real Time Streaming
* SIS = Symbian OS Installer File
* AMR = Adaptive Multi-Rate Codec
* JAD = Java Application Descriptor
* JAR = Java Archive
* JAD = Java Application Descriptor
* 3GPP = 3rd Generation Partnership Project
* 3GP = 3rd Generation Project
* MP3 = MPEG player lll
* MP4 = MPEG-4 video file
*AAC = Advanced Audio Coding
* GIF= Graphic Interchangeable Format
* JPEG = Joint Photographic Expert Group
* BMP = Bitmap
* SWF = Shock Wave Flash
* WMV = Windows Media Video
* WMA = Windows Media Audio
* WAV = Waveform Audio
* PNG = Portable Network Graphics
* DOC = Document (MicrosoftCorporation)
* PDF = Portable Document Format
* M3G = Mobile 3D Graphics
* M4A = MPEG-4 Audio File
* NTH = Nokia Theme (series 40)
* THM = Themes (Sony Ericsson)
* MMF = Synthetic Music Mobile Application File
* NRT = Nokia Ringtone
* XMF = Extensible Music File
* WBMP = Wireless Bitmap Image
* DVX = DivX Video
* HTML = Hyper Text Markup Language
* WML = Wireless Markup Language
* CD -Compact Disk.
* DVD - Digital Versatile Disk.
*CRT - Cathode Ray Tube.
* DAT - Digital Audio Tape.
* DOS - Disk Operating System.
* GUI -Graphical User Interface.
* HTTP - Hyper Text Transfer Protocol.
* IP - Internet Protocol.
* ISP - Internet Service Provider.
* TCP - Transmission Control Protocol.
* UPS - Uninterruptible Power Supply.
* HSDPA - High Speed Downlink PacketAccess.
* EDGE - Enhanced Data Rate for GSM[GlobalSystem for Mobile
Communication] Evolution.
* VHF - Very High Frequency.
* UHF - Ultra High Frequency.
* GPRS - General PacketRadio Service.
* WAP - Wireless ApplicationProtocol.
* TCP - Transmission ControlProtocol .
* ARPANET - Advanced ResearchProject Agency Network.
* IBM - International Business Machines.
* HP - Hewlett Packard.
*AM/FM - Amplitude/ Frequency Modulation.
* WLAN - Wireless Local Area Network
Use your Pendrive as RAM

Use your Pendrive as RAM

If you are using a high configuration PC and if you do not experience a good system speed and having low space cache / RAM, then use your PenDrive to speed up your system speed and performance.

Step 1 - Insert your PenDrive.

Step 2 - Go to My Computer / Computer.

Step 3 - Right click your PenDrive application and go to Properties.

Step 4 - Select "Ready Boost" Tab and Check "Use this device" radio button.

Step 5 - Select Apply / OK.

Step 6 - Close all the applications and restart your PC (Don't remove the pendrive).

Step 7 - Start using your PC and experience system speed.

-Chief Administrative Officer.