Friday, 7 September 2012

ADOBE FLASH PLAYER 11.4 RELEASED


Adobe last week, released a version of its Flash Player software package 11.4.402.265. Powered versions are available for all operating systems. In the Firefox browser, Flash player, which provided a settled issue? On this issue, set the text to the browser normally blocked. This package is running at http://get.adobe.com/flashplayer/, Adobe offers in its official site.
                                            

Of the company, support for Adobe Flash Player Center site stated that it was not provided. Do you have to download it from the above site; you want to get the McAfee Security Scan Plus is a program. So if you do not want to, check the label on the front of the check box, and then must download the flash player.

In general, all the shortcomings of the previous version have been corrected, Adobe announced. There are many new features for developers and technical specifications. What bugs fixed facilities the address can be found from the Adobe site.

Article By
A.Nivethitha
Final year



MICROSOFT UNVELIS WINDOWS SERVER 2012


Microsoft has announced general availability of Windows Server 2012, a first of its kind version of operating system (OS) that can be controlled remotely.The launch of the could based operating system is a major step by the IT major enabling easy management of large clusters of servers, and is the first major update of its operating system since 2009.The release of the new server 2012 is seen as a prelude to the launch of the next version of Windows, Windows 8, for consumers in October this year.

                                          

Microsoft has announced the general availability of the new operating system the has been in development for the last four years. “The system allows maximizing the use of cloud computing with reliability, scalability and in-built performance capabilities” Microsoft India Director Server and cloud Business Srikanth Karaoke, told The Hindu.


ADVANTAGE:

One major advantage of cloud computing was that it would help in limiting software privacy, presently pegged at 63 percent, as “nothing runs locally”. “Privacy will be concern when devices offer applications. But the incidence is sure to reduce as everything   is hosted on he could”.

Microsoft had “dramatically simplified pricing and licensing of the new OS which was a unique feature of operating across multiple clouds public and private.There was a major shift on the device front as users where opting for mobile phones, laptops and tablets that was imposing a lot of pressure on the infrastructure. Server 2012 would be immense use in addressing the concerns of users who wanted to avail themselves on services on the move.

Article By
R.Hemamalini
Final year

Ten Skills of Leadership


Getting and Giving the Information is probably important competency required of the leaders. If you cannot communicate effectively, then none other leadership skill will do compensate for this lack. First and the foremost thing is, you should be able to exchange the information effectively and accurately.

  

Understanding the Group Needs and Characteristics 

It is very essential that we do first understand ourselves and our own needs and the characteristics. Only then we can know and understand the other people's needs and characters. This understanding will hopefully come naturally as we mature, creeping over us like a ivy winding about the tree. By directly exploring and encouraging the discovery of these kinds of personality traits, we can do accelerate maturing of the leader, adding the fertilizer to ivy and the tree. About Understanding the Group Needs and the Characteristics

Knowing and Understanding the Group Resources
  • Recognize the knowledge and the use of the group resources as the major technique in bringing the group together and creating a commitment to the common goals.
  • Recognize that the resources are theoretically limitless, and that the leader's and the group's the ability to recognize and utilized the diverse resources tremendously affects what a group can accomplish.
  • Involve more and more people in active leadership by giving each of them a part according to his or her resources.
  • Evaluate a impact availability of the resources has on doing the job and maintaining a group.   
Controlling a Group                           
  • Recognize how his own behavior will influences and can control others.
  • Distinguish between the controlling group performance and setting an example.
  • Identify the control as the function of group, or of the facilitator, and advantages and disadvantages of each having this responsibility.
  • Identify the different techniques for controlling the group performance and the suitability in a different situations.
  • Deploy the group resources to best interests of a group while encouraging the personal growth.
  • Evaluate the leadership performance in terms of the group performance.
Counseling

Counseling is the private talk with someone which helps the individual to solve a personal problem. As a leader, people will do come to you with the problems. Because you are the leader, you will spot the people with problems. You cannot turn them away or will just let them suffer, because a ignored problem, if serious, almost inevitably will become a group problem. Counseling is been considered pretty difficult. The professional counselors, like the vocational counselors, clergymen, lawyers, bankers, teachers, psychiatrists and others, sometimes you will spend years learning how to counsel in their fields. People often will pay large amount of money to be counseled.


Setting an Example

Setting an Example is the personal behavior independent of any external influences. While very simple competency on its face, none is more important. Fail to demonstrate this competency to the members of your group, and you will be doomed to the negative results. No matter how good the line you talk, if you do not match it with your behavior, you will not get any respect and will find it increasingly difficult to get a group to work with you.
 

It might be more difficult under some of the circumstances to set the positive example, but that will not stop you! Setting an Example is where your backbone will show. If you have the character, if your character has the integrity--that is, if who you are on outside is been lined up with who you are on inside--you will accomplish a far more than you may imagine possible. For this kind of the leader, as long as he do takes care of all his follower's needs, enjoys respect, loyalty, and love.

Representing a Group

Representing Group is accurately communicating to the non-group members a sum of the group members ideas, feelings, etc., and vice versa. A leader should represent his team on the great variety of the issues. Some of these issues and a need for the decision representing a group interests will be known well in advance; and others will not be.
 

Under any of the circumstances, to faithfully represent a group, you should:
  • Fully understand nature of the problem.
  • Know how a decision was been reached and be able to communicate this to others.
  • Accurately and responsibly do communicate from and back to a original group.
  • Realize that the other groups might derive their entire picture of the other group through you, the representative. You should be consistent, possess the integrity, and be fair to all the parties.
Problem-Solving

Effective use of the problem-solving will do more than any other competency to advance both getting a job done and keeping a group together. It is the "umbrella" competency in all its effect on the variety of issues. The problem-solving is useful both in the group situations and in the one-on-one.

   

 Evaluation

 Evaluation attitude is the predisposition to continually examine and analyze all our efforts. Evaluation is very critical component of cyclical learning process. It will not occur just formally at conclusion of the activities, but also informally as well, by all been involved, throughout a project or task. An Evaluation Attitude is one of the principals which form a basis of White Stag Leadership Development Program.
 
 One who will apply this attitude or the technique will be aware continually of the objectives of his learning's and will do attempt to measure his growth towards them.

 Sharing the Leadership

Sharing a Leadership translates on one level into the "styles" of the leadership. Depending upon the job and a group, certain ways for a leader to work with a group will be more appropriate than the others. It will also identifies some generic roles groups have which can be distributed among all the members.
 


Sharing the leadership is a key function of the leader. Ability to extend herself, to accomplish the jobs greater than a person alone can handle, is one of a key elements of the society's success today. Never has the society been so productive.

Article By
A.Nivethitha
Final year

ANDROID USERS PRIME TARGET OF MALWARE: MCAFEE


Software security provider McAfee has said spread of malware was the fastest in the last four years and there were 1.5 million more of such malicious software in the April-June quarter of this year."Unique malware samples in our 'zoo' collection number 1.5 million more this quarter than last. At this rate we will almost certainly see 100 million samples by next quarter and possibly the first 10-million-sample quarter," McAfee threats report said.

The report added while personal computers continue to be under attack, malware writers are now transferring their skills to other popular consumer And business platforms, such as Google' Android OS.
                                            

Android platform is the hardest hit as virtually all new mobile malware detected in the second quarter of calendar year 2012 was directed at the Android platform.

"Attacks that we've traditionally seen PCs are now making their way to other devices," McAfee Labs senior vice president Vincent Weafer said.
Android platform is the hardest hit as virtually all new mobile malware detected in the second quarter of calendar year 2012 was directed at the Android platform, and was comprised of SMS-sending malware mobile botnets, spyware and destructive Trojans, the report said.

Malware or malicious software is software used to disrupt computer operation, gather sensitive information and gain access to private computer systems. Ransom ware, a type of malware, is steadily increasing quarter over quarter and has become a popular avenue for cybercriminals.

"Damage can range from loss of photos and personal files for home users to data encryption and demands for money for large enterprises. Ransom ware is especially problematic as it can hold computers and data hostage, instantly damaging machines," the report said.

Thumb drive and password-stealing malware showed significant growth in the second quarter."Password-stealing malware, at nearly 1.6 million new samples, collects account names and passwords, so an attacker can pose as the victim," it added. 

Article By
S.SuryaBala
Final year


GLASSES THAT LET DEAF PEOPLE 'SEE' SOUNDS


Scientists have developed glasses that allow a deaf person to "see" when a loud sound such as the honk of a car is made and give an indication of where it came from. Researchers from the Korea Advanced Institute of Science and Technology (KAIST) in Taejon in South Korea made a pair of glasses for deaf people who lack access to such potentially life-saving cues.

                                           
 An array of seven microphones, mounted on the frame of the glasses, pinpoints the location of such sounds and relays that directional information to the wearer through a set of LEDs embedded inside the frame, the New Scientist reported. The glasses will only flash alerts on sounds louder than a threshold level, which is defined by the wearer.

Article By
S.Nivedha
Final year

3D PC GLASSES


Only a few years ago, seeing in 3-D meant peering through a pair of red-and-blue glasses, or trying not to go cross-eyed in front of a page of fuzzy dots. It was great at the time, but 3-D technology has moved on. Scientists know more about how our vision works than ever before, and our computers are more powerful than ever before -- most of us have sophisticated components in our computer that are dedicated to producing realistic graphics. Put those two things together, and you will see how 3-D graphics have really begun to take off.

Most computer users are familiar with 3-D games. Back in the 90s, computer enthusiasts were stunned by the game Castle Wolfe stein 3D, which took place in a maze-like castle. It may have been constructed from blocky tiles, but the castle existed in three dimensions -- you could move forward and backward, or hold down the appropriate key and see your viewpoint spin through 360 degrees. Back then, it was revolutionary and quite amazing. Nowadays, gamers enjoy ever more complicated graphics -- smooth, three-dimensional environments complete with realistic lighting and complex simulations of real-life physics grace our screens.


                                                

But that s the problem -- the screen. The game itself may be in three dimensions, and the player may be able to look wherever he wants with complete freedom, but at the end of the day the picture is displayed on a computer monitor...and that’s a flat surface.
 
That s where PC 3-D glasses come in. They are designed to convince your brain that your monitor is showing a real, three-dimensional object. In order to understand quite how this works, we need to know what sort of work our brain does with the information our eyes give it. Once we know about that, we will be able to understand just how 3-D glasses do their job.

A Brief History of 3-D Glasses:
So, we've seen that although there might be something complex going on behind the scenes, with the right equipment we can just sit back and let our eyes do the work. Of course, the technology wasn't always so simple; there have, in fact, been four generations leading up to today's 3-D glasses.
The first generation modified the games themselves to make them compatible with stereoscopic 3-D. The games' creators had to specifically support each type of LCD glasses -- hardly an ideal situation. There was no guarantee that the glasses you'd bought would work with your favorite game. As you can imagine, that didn't appeal to many people; so a second solution was developed.

This second solution was to override the game, actually taking over the computer's screen and altering what was displayed. As far as the game was concerned, it was just doing what it normally did, except, of course, that some of the computer's time was taken up processing the image to make it 3-D. The result was slower performance and low-resolution, blocky images. It did work with hundreds of games, though, and that was a definite improvement.

The third generation worked in a similar way, modifying the graphics driver but also maintaining the resolution of the images -- no more blocky graphics! Unfortunately, it wasn't compatible with many games, though it was a definite forerunner to the 3-D glasses we have nowadays.

In the fourth-generation models, compatibility is high, the complicated work is done by the graphics card, and the lightweight LCD glasses flick so rapidly between the two images that all we see is crystal-clear, 3-D images.

Article By
S.Muthu Priyaa
Pre-Final year

Tuesday, 4 September 2012

Tribute to our teachers..!!!

September 5th, 2012



Wonderful Teacher

With a special gift for learning
And with a heart that deeply cares,
You add a lot of love
To everything you share,
And even though
You mean a lot,
You'll never know how much,
For you helped
To change the world
Through every life you touched.
You sparked the creativity
In the students whom you taught,
And helped them strive for goals
That could not be bought,
You are such a special teacher
That no words can truly tell
However much you're valued
For the work you do so well.

(Specially dedicated to all PTR Staffs and faculties)


(please don't miss to watch the video)

  



Wishes by
LEAD TEAM

A Garbage Collector For the C Programming Language


INTRODUCTION
C is and has always been one of the most widely and popularly used programming languages in the world. We, as a part of our B.E Degree course have done a lot of programming in C and have always used the built in functions defined in the standard library like “malloc”, “calloc” etc. to allocate memory and when the allocated memory is not needed any more we use the built in function “free” to free up the allocated memory.
                                                 
What we have attempted to improve the functionality of the ‘C’ programming language by developing a library that supports garbage collection. We were inspired by the presence of the GC features in JAVA and proceeded to develop one for C. So now, the ‘C’ programmer is relived of the task of keeping track of what memory locations are currently being referenced and what are not. If the programmer uses our library for allocating memory dynamically, we will make sure (conservatively) that the allocated memory is automatically freed (i.e.) garbage is collected when it is no longer referenced.


Myths about GC

·         GC is necessarily slower than manual memory management.
·         GC will necessarily make my program pause.
·         Manual memory management won't cause pauses.
·         GC is incompatible with C.

Facts about GC

·         Most allocated objects are dynamically referenced by a very small number of
·         Pointers. The most important small number is ONE.
·         Most allocated objects have short lifetimes.
·         Allocation patterns (size distributions, lifetime distributions) are bursts, not uniform.
·         Optimal" strategies can fail miserably.

ARTICLE BY
P.H.S. UMA MAHESHWARI
PRE-FINAL YEAR IT

Digital image Watermarking


Why watermark images?
Image compression makes the distribution of digital images and video materials over the Internet and on media practical. Such digital materials can b e copied and redistributed uncontrollably. Digital image watermarking – the process of inserting data into in image –can be used to protect the rights of their owners in a variety of ways:
1) Copyright identification – provide a proof of ownership;
2) User identification (fingerprinting) – encode identity of legal users to encode sources of illegal copies;
3) Authenticity determination – if the watermark will be destroyed by modification in an image, its presence quarantines authenticity;
4) Automated monitoring – monitor when and where images are used (for royalty collection or the location of illegal uses);
5) Copy protection – they can specify rules of image usage and copying Visible watermarks
A Visible watermark is an opaque or semi-transparent sub-image or image that is placed on top of another image (that is watermarked) so that is obvious to the viewer.
Invisible watermarks cannot be seen with the naked eye but they can be watermarked
image and the recovered with an extracted
appropriate decoding algorithm. The invisibility is assured by inserting them as visually redundant information  watermarked image after high quality JPEG compression and the extracted watermark…
                                               
The watermark can be recovered by zeroing 6 most significant bits of the image and scaling the remaining values to the full intensity range.
 An important property of invisible watermarks is their resistance to attempts (both intentional and accidental) to remove them… This type of watermarks is referred to as fragile invisible watermarks.
If the watermarked image is compressed and then decompressed using loss JPEG, the watermark is destroyed. As shown in the last
Figure although the visual information was preserved the watermark was unusable. This can be used for image authentication.
Watermarking techniques
Robust invisible watermarks must survive image modification (attacks) including image compression, linear or non-linear filtering, cropping, resampling, rotation, printing/rescanning, adding noise, etc.
                                                      

Watermarking techniques
Watermark insertion and extraction can be performed in spatial domain as shown
Previously, or in the transform domain.
Two watermarked images computed using DCT and Spring 2009 ELEN 4304/5365 DIP 10 p g the intensity-scaled differences between the original and watermarked images. Watermarking techniques Spreading watermarks across an image’s perceptually significant frequency components, a can be made small to reduce watermark visibility. At the same time, watermark security is high since:
1. Watermarks are composed of pseudorandom numbers with no obvious structure,
2. Watermarks are embedded in multiple frequency components with spatial impact over the entire 2D image (their location is not obvious),
3. Attacks against them tend to degrade image as well since the image’s most important frequency components must be altered to affect the watermarks.
ARTICLE BY
K.NISRATH FIRDOUSE
FINAL YEAR IT