8
www.fitag.in Tuesday Ahmedabad, Gujarat 15 11 2013 Vol. 1, Issue No. 4, Pages 8 Monthly Edition FITAG FLOURISH KNOWLEDGE NETWORKING POWER PROTECTION Times - Editorial Dear Fitagians, A very happy & prosper- ous new year to all of you. As per the Hindu calender we are beginning our new year 2070. India's cultural diversities are of eccentric proportions - just imagine people in different part of the country using 30 different date systems! With so many different calendars, one might land up having a couple of new year celebrations every month! The current national cal- endar of India was set up in 1957 by the Calendar Reform Committee that formalized a lunisolar calendar in which leap years coincide with those of the Gregorian calendar, and the months are named after the tradition- al Indian months. T h i s reformed Indian calendar began with Saka Era, Chaitra 1, 1879, which corresponds to March 22, 1957. But the most popular epoch is the Vikram era that is believed to have begun with the coronation of King Vikramaditya. The year 2013 AD corresponds to 2070 Vikram Samvat in this sys- tem. How may all these relates to IT? As our cover page arti- cle hi-lights the paradigm shift in the emerging tech- nologies, changing from vari- ous epoch of Hindu calender to one standard national cal- ender was also a same para- digm shift. Our world is changing very rapidly and we must adopt the change or else be ready to face the conse- quences. I am sure every FITA- GIAN will look forward for a brighter future in the new year 2070. Once again wish- ing you a very happy & pros- perous new year and enjoy 4th edition of FITAG Times. With best compliment One has to know where to look; to actively seek out this information in order to find it. Thus, in an effort to raise awareness to the ever-grow- ing plethora of emerging technologies, featured below are just some paraphrased examples of prominent devel- opers, and the significantly impacting technologies they are hastily bringing into the world: Cyber Warfare The Pentagon recently announced that it has been working on a program to sim- plify cyberwarfare in order to make it feasible for greater amounts of military personnel to operate. Headed by the Defense Advanced Research Projects Agency (DARPA), the program, ominously named “Plan X”, is aimed at rendering the frontier of cyberwarfare into a quasi-video game for- mat. As it stands now, cyber- warfare is usually the result of top-government approval for groups of hackers to arduously plan and later carry out a given attack, or the work of vigilante groups like Anonymous. DARPA’s plan is to revolu- tionize the current, exceeding- ly complex realm of hacking by creating an infrastructure Emerging Technologies and the Paradigm Shifts Therein Contined on page 2... The frequency of technological advancement, in nearly all fields, is increasing at a daunting- ly rapid rate. Almost every other week, an article is featured on a prominent news web- site like Digg or Reddit, which details exotic, new, and potentially revolutionary tech- nologies. And just as soon as these articles are featured, they are forgotten, often overshadowed by consumer-related tech- nologies, such as the next iPhone, Google Glass, or simply unnoticed altogether. Say you’re playing World of Warcraft, and you’ve got this type of sword, +5 or whatever. You don’t necessarily know what spells were used to create that sword, right? You just know it has these attributes and it helps you in this way. It’s the same type of concept. You don’t need the technical details. – Dan Roelker Fitag Times reaches to 21,000 retailers / dealers across Gujarat X-47B Drone on the USS George HW Bush Aircraft Carrier President’s Message Dear members, Wish you and your family a very happy Diwali & prosper- ous new year, May God fulfill all your wishes in wealth, health & happiness in your life. May this year be as bright as ever. May this year bring you the utmost in peace and prosperity. May lights triumph over darkness. "WISH YOU A VERY HAPPY DIWALI & PROSPER- OUS NEW YEAR." FITAG has been an old idea, which is now flourished within an interest and initiative taken by many people who have been the leaders of the fraternity in Gujarat. In fact, there is no such umbrella body on regional level existing across India. All the cities across Gujarat as well as India has their associations and most of their problems are also common but, this is the first of its kind of body in India to address motivational activities, common issues, sharing information, publish LOCAL ASSOCIATION activities on common platform & try to achieve objec- tives in nutshell as five point agenda through CONVENTION, LEADERSHIP AWARD, CRICKETMATCH, E-MAGAZINE FITAG TIMES & "ABCD-IT" programs. I REALY SALUTE THE FIVE POINT AGENDA PUT FORWARD BY OUR FOUNDER PRESIDENT MR.KAUSHIK PANDYA. Flourish - To flourish and co-exist by being united and supportive to each other Knowledge - To share the knowledge available by all means Networking - To increase awareness by extensive networking with each other Strength - To stay united and utilize the strength Protection - To protect common interest I would like to thank all angel persons without whom we can not publish our own E-MAGAZINE (FITAG-TIMES). I would like to specially thank all ven- dors for their continuous advertisement support & also request to other vendors for their supports. I would like to request all the FITAG members to view this e-magazine & share it among their contacts in their area's non registered IT members. I also request all the local association presidents to give their VALUABLE REVIEW & send your local activity details with photograph to general secretary - FITAG before every first week of month. Federation Of Information Technology Associations Of Gujarat is taking right step in their direction by publishing FITAG-TIMES. On this divine festival I promise you to establish the unbreakable bridge which would facilitate two way flow of Information, Networking, & business development. I firmly believe that FITAG is doing a commendable work in collaborating with All Local IT Associations and voicing their concern and issues at an appro- priate level for expeditious resolutions.

Fourth Edition of Fitag Times

Embed Size (px)

DESCRIPTION

 

Citation preview

Page 1: Fourth Edition of Fitag Times

www.fitag.inTuesday Ahmedabad, Gujarat

15 11 2013Vol. 1, Issue No. 4, Pages 8

Monthly Edition

FITAGFLOURISH KNOWLEDGE NETWORKING POWER PROTECTION

Times

- Editorial

Dear Fitagians,

Avery happy & prosper-

ous new year to all of

you.

As per the Hindu calender

we are beginning our new

year 2070. India's cultural

diversities are of eccentric

proportions - just imagine

people in different part of the

country using 30 different

date systems! With so many

different calendars, one might

land up having a couple of

new year celebrations every

month!

The current national cal-

endar of India was set up in

1957 by the Calendar Reform

Committee that formalized a

lunisolar calendar in which

leap years coincide with those

of the Gregorian calendar,

and the months are

n a m e d

after the

tradition-

al Indian

months .

T h i s

reformed

I n d i a n

calendar

began with Saka Era, Chaitra

1, 1879, which corresponds to

March 22, 1957. But the most

popular epoch is the Vikram

era that is believed to have

begun with the coronation of

King Vikramaditya. The year

2013 AD corresponds to 2070

Vikram Samvat in this sys-

tem.

How may all these relates

to IT? As our cover page arti-

cle hi-lights the paradigm

shift in the emerging tech-

nologies, changing from vari-

ous epoch of Hindu calender

to one standard national cal-

ender was also a same para-

digm shift. Our world is

changing very rapidly and we

must adopt the change or else

be ready to face the conse-

quences.

I am sure every FITA-

GIAN will look forward for a

brighter future in the new

year 2070. Once again wish-

ing you a very happy & pros-

perous new year and enjoy

4th edition of FITAG Times.

Mr. Kaushik PandyaEditor

With best compliment

One has to know where to

look; to actively seek out this

information in order to find

it. Thus, in an effort to raise

awareness to the ever-grow-

ing plethora of emerging

technologies, featured below

are just some paraphrased

examples of prominent devel-

opers, and the significantly

impacting technologies they

are hastily bringing into the

world:

Cyber Warfare

The Pentagon recently

announced that it has been

working on a program to sim-

plify cyberwarfare in order to

make it feasible for greater

amounts of military personnel

to operate. Headed by the

Defense Advanced Research

Projects Agency (DARPA), the

program, ominously named

“Plan X”, is aimed at rendering

the frontier of cyberwarfare into a quasi-video game for-

mat. As it stands now, cyber-

warfare is usually the result of

top-government approval for

groups of hackers to arduously

plan and later carry out a given

attack, or the work of vigilante

groups like Anonymous.

DARPA’s plan is to revolu-

tionize the current, exceeding-

ly complex realm of hacking

by creating an infrastructure

Emerging Technologies andthe Paradigm Shifts Therein

Contined on page 2...

The frequency of technological advancement,

in nearly all fields, is increasing at a daunting-

ly rapid rate. Almost every other week, an

article is featured on a prominent news web-

site like Digg or Reddit, which details exotic,

new, and potentially revolutionary tech-

nologies. And just as soon as these

articles are featured, they are

forgotten, often overshadowed

by consumer-related tech-

nologies, such as the next

iPhone, Google Glass, or

simply unnoticed altogether.

Say you’re playing

World of Warcraft, and

you’ve got this type of

sword, +5 or whatever. You

don’t necessarily know what

spells were used to create that

sword, right? You just know it

has these attributes and it helps

you in this way. It’s the same

type of concept. You don’t need

the technical details.

– Dan Roelker

Fitag Times reaches to 21,000 retailers / dealers across Gujarat

X-47B Drone on the USS George

HW Bush Aircraft Carrier

President’s MessageDear members,

Wish you and your family a very happy Diwali & prosper-

ous new year, May God fulfill all your wishes in wealth, health

& happiness in your life. May this year be as bright as ever. May

this year bring you the utmost in peace and prosperity. May

lights triumph over darkness.

"WISH YOU A VERY HAPPY DIWALI & PROSPER-

OUS NEW YEAR."

FITAG has been an old idea, which is now flourished within an interest and

initiative taken by many people who have been the leaders of the fraternity in

Gujarat. In fact, there is no such umbrella body on regional level existing across

India. All the cities across Gujarat as well as India has their associations and most

of their problems are also common but, this is the first of its kind of body in India

to address motivational activities, common issues, sharing information, publish

LOCAL ASSOCIATION activities on common platform & try to achieve objec-

tives in nutshell as five point agenda through CONVENTION, LEADERSHIP

AWARD, CRICKET MATCH, E-MAGAZINE FITAG TIMES & "ABCD-IT"

programs.

I REALY SALUTE THE FIVE POINT AGENDA PUT FORWARD BY

OUR FOUNDER PRESIDENT MR.KAUSHIK PANDYA.

Flourish - To flourish and co-exist by being united and supportive to each other

Knowledge - To share the knowledge available by all means

Networking - To increase awareness by extensive networking with each other

Strength - To stay united and utilize the strength

Protection - To protect common interest

I would like to thank all angel persons without whom we can not publish our

own E-MAGAZINE (FITAG-TIMES). I would like to specially thank all ven-

dors for their continuous advertisement support & also request to other vendors

for their supports.

I would like to request all the FITAG members to view this e-magazine &

share it among their contacts in their area's non registered IT members. I also

request all the local association presidents to give their VALUABLE REVIEW

& send your local activity details with photograph to general secretary - FITAG

before every first week of month.

Federation Of Information Technology Associations Of Gujarat is taking

right step in their direction by publishing FITAG-TIMES. On this divine festival

I promise you to establish the unbreakable bridge which would facilitate two way

flow of Information, Networking, & business development.

I firmly believe that FITAG is doing a commendable work in collaborating

with All Local IT Associations and voicing their concern and issues at an appro-

priate level for expeditious resolutions.

Page 2: Fourth Edition of Fitag Times

2www.fitag.in

Tuesday 15 11 2013FITAGTimesFLOURISH KNOWLEDGE NETWORKING POWER PROTECTION

that would circumvent the

vast topology of global com-

puter networks. In other words,

they want to create a digital

battlefield where cyber func-

tions and effects are given a

simplified representation,

allowing a military operator to

know exactly what weapons

they are using, how to use

them, and what effects they

will have.

Tapping into the most

prominent design companies of

the Silicon Valley, DARPA

finally settled with Frog

Design. Using a Samsung

SUR40 Touch Table, Frog

Design created a prototype

interface which effectively

maps out the aforementioned

vast global network topologies.

Based on the detailed account

of the prototype, Plan X really

is nothing short of a video

game-esque rendering of

cyberwarfare. A mission or

objective is provided (in this

case “botnet take-down”), and

upon the Samsung tablet, a tar-

get node appears amid the net-

work topology, which is said to

look like a map of stars. Then,

the user is given a selection of

weapons, accompanied by a

number (projected to eventual-

ly represent the cost of cyber

attacks), and battle units in the

form of icons, to pre-plan an

attack on the target node. Much

of the specifics of the system

are still undisclosed, but if this

interface is as successful and

accessible as it seems, cyber-

warfare, and the world for that

matter, will truly experience a

paradigm shift.

Printable Bionic Upgrades

Most, if not all supporters

of trans-humanism and the sin-

gularity have long waited for

the day when they can begin to

upgrade their physiology with

biotechnology. Lucky for

them, that day is quickly

approaching. The subheading

of this article reads like some-

thing right out of an Isaac

Asimov article: “Scientists

have created a 3D-printed car-

tilage ear with an antenna that

extends far beyond the normal

human range.”

Using hydrogel, silver

nano-particles, calf cells, and

other readily available 3D

printing tools, scientists at

Princeton University overcame

the staggering challenge of rec-

onciling soft 3D printed mate-

rial, such as tissue, with hard

material, such as electronics, to

create the bionic ear in the

image below. The successful

creation of the ear has led sci-

entists to lend further credence

to the idea of not just 3D-print-

ing organs for repair and

replacement, but also potential-

ly creating organs with capabil-

ities that would not otherwise

be available naturally. The

implications of the latter are

stunning, to say the least.

Google [X]

Robot workers, driver-less

cars, internet-connected refrig-

erators, and space elevators are

just a few examples on the list

of ideas at the Google [X] Lab.

While it has only released

brief, tentative ideas, Google

[x] will undoubtedly be the

harbinger for much of the

world’s future technologies,

and the amount of secrecy sur-

rounding it only bolsters the

latter prediction. Likened by

one familiarized engineer as

functioning similar to the CIA,

Google [X] is run primarily by

two offices – one vaguely

described as being for logistics,

the other, in a secret location

unbeknownst to most Google

employees, specifically for

robots.

With AI researchers, roboti-

cists, electrical engineers from

Microsoft to MIT, and Johnny

Chung Lee donning the title of

“rapid evaluator”, Google [X]

has all the ingredients for a

mad science lab.

Unfortunately, it is still too

new and secretive to say much

more than the aforementioned,

but in an effort to pique the

reader’s interest, two employ-

ees briefed on a project have

said that there will be a product

released at the end of this year,

though they were not allowed

to comment on any details

whatsoever.

Drones: Military and

Civilian

Drone technology is one

that is burgeoning, and is espe-

cially important for the public

to keep tabs on. Simply speak-

ing, drones are one of the most

integral aspects of future socie-

ty. The implications for their

integration into not only mili-

tary, but civilian life are noth-

ing short of overwhelming…

and terrifying. Most of the gen-

eral public is aware that the use

of drones in the military is

already increasing, since not a

month goes by where a high-

value terrorist target is taken

out by the infamous predator

drone. On top of that, the

United States Navy has recent-

ly confirmed the successful

launching and landing of an X-

47B on an aircraft carrier, the

first drone to ever accomplish

such a feat (pictured above).

However, military drones seem

to be overshadowing the rapid

growth of the civilian side of

drone technology, a potentially

invasive and rapidly growing

trend. It is important for the

reader to realize that this part

of the article doesn’t even

cover the tip of the ice berg of

what is out there in terms of

drone technology (e.g. DARPA

has already successfully turned

a living beetle into a remote-

controllable flying cyborg-

drone).

Universal Air recently far

surpassed its Kickstarter cam-

paign goal of $15,000, earning

a whopping $220,000 to fund

their R10 Quadrotor System

drone. UAir’s success was a

clear sign that there is a hunger

for personal UAVs. While the

initial purpose of the R10 is to

act as an unmanned version of

a GoPro camera for extreme

sports enthusiasts, the implica-

tions for having such a drone

sparks the imagination. While

it is currently reliant on WiFi-

internet connection, UAir’s

next project, expected to be

released somewhere in 2014, is

said to have the capability to be

fully autonomous and maintain

connectivity with its user via

WiFi connection to the user’s

phone, regardless of internet

connection. Extreme sports

enthusiasts will surely be satis-

fied, but UAir also expects

their autonomous drones to

find their way into the industri-

al world with upgradable sen-

sor-packages for mining and

construction jobs.

The drones from UAir seem

to add a fun, lighter side to the

realm of drone technology, but

what about drones that can’t be

distinguished from tiny insects,

no larger than a penny? It

seems that the most appropriate

reaction to Harvard

University’s “Robobees” would

be fear of invasion of privacy.

Rest assured (or not), this pro-

gram’s purpose is, or at least

was to study insect flight, but

after announcing its success at

hovering and then following a

preset flight path, it would be

naive to think the military

would not be interested.

Contined on page 1...

Page 3: Fourth Edition of Fitag Times

3www.fitag.in

Tuesday 15 11 2013FITAGTimesFLOURISH KNOWLEDGE NETWORKING POWER PROTECTION

For Space Booking in

[email protected]

Sejal: 98240 53863 Dhaval: 98240 66111

FITAG TIMESFITAG TIMES

Certificate of Authenticity ("COA") - Salient Features, Do's & Don'ts Dear Reader,

Microsoft believes in

trustworthy computing

experience for our cus-

tomers and an honest chan-

nel reseller business envi-

ronment. This communica-

tion is in continuation to our

commitment to educate and

spread awareness among the

channel partners about rele-

vant anti-piracy informa-

tion, and this particular mes-

sage is around the distribu-

tion and usage of COA

label.

What is Certificate of

Authenticity ("COA")?:A

Certificate of Authenticity

(COA) is a label that helps

one identify legal and gen-

uine Microsoft software. A

COA is one of the condi-

tions of the software license,

and primarily, it is a visual

identifier that assists in

determining whether or not

the Microsoft software is

legal and genuine. COA is

never distributed independ-

ently and always accompa-

nies our OEM and Retail

Software. However, without

it, one will have difficulty in

proving usage of legal and

genuine Microsoft software

license.

Our Current Market

Findings: Through our mar-

ket intelligence, we are

noticing an increase in dis-

tribution and selling of inde-

pendent/stand-alone/loose

COAs, which is an illegal

activity. Please pay close

attention to the important

points below that will help

you and your customers not

fall victim to illegal and

non-genuine COAs:

<NEVER DEAL INSTAND-ALONE/LOOSE

COAS: If you receive offers

for COAs as stand-alone

items, be aware that these

are illegal offers, could be

fakes/duplicates, inviting

civil and criminal liabilities.

If you fall victim to stand-

alone COAs, you would

have wasted your money

and your act would cause

your customers to be illegal

and non-genuine. Write to

Microsoft Product

I d e n t i f i c a t i o n

[email protected]

om if you encounter any

instance of loose or stand-

alone COAs.Further, please

note that Microsoft will

take strict action against

partners found trading or

reselling stripped down

COAs.

< Each COA labelincludes advanced anti-

counterfeitingfeatures to

help verify the software's

authenticity. The COA

label is included with each

individual software license.

< For preinstalled MSWindows operating sys-

tems, the COA label must

be affixed by the system

builder to the PC chassis.

The COA label also

includes the product key,

which will be needed in the

event the operating system

needs to be reinstalled.

< COA labels must be dis-tributed as part of the full

System Builder software

license, which also includes

the hologram CD and docu-

mentation.

< A COA should never bepurchased, sold, or distrib-

uted by itself without the

software license it authenti-

cates.

< Protect your customersand your company:

Purchase software licenses

through a Microsoft author-

ized OEM distributor, an

assured source of legal and

genuine Microsoft soft-

ware.

We need your coopera-

tion in preventing COAs

from being misused and

abused. Please write to Mr.

Satish Pokhriyal

([email protected]) if

you need further clarifica-

tion. The following sites

are also relevant:

<www.microsoft.com/oem/en/licensing/.../COA_ho

logram.aspx - Deeper

understanding on MS

Licensing

< ww.microsoft.com/how-totell - To report an

instance of piracy/counter-

feit MS software

<www.microsoft.com/genuine - To know more on

MS genuine Windows and

office.

Page 4: Fourth Edition of Fitag Times

4www.fitag.in

Tuesday 15 11 2013FITAGTimesFLOURISH KNOWLEDGE NETWORKING POWER PROTECTION

Surveillance - Moving from analog to digitalArise in the instances

of terrorism has

prompted organizations,

authorities and individu-

als to devise effective

response mechanisms.

Physical security has

become essential for

enterprises looking at

solutions to address

everything from pilferage

to theft and terrorism.

This has led to an

increased demand for

solutions like video sur-

veillance in sectors like

public transport, hospital-

ity, airports, BFSI and

education, prompting

organizations to increas-

ingly incorporate net-

work video into their

enterprise IT security

plans.

While surveillance

requirements of corporate

environments are gener-

ally driven by the need to

protect employee and

company assets, they

help achieve other busi-

ness objectives also.

Retail outlets for example

use network surveillance

for footfall measurement.

In airports, an intelligent

video system measures

the queue time between

entering and exiting a

check-in point helping

direct staff and minimiz-

ing waiting time for trav-

elers. In banks, remote

surveillance and monitor-

ing can help prevent

theft, fraud and facilitate

investigation.

Market opportunity:Gartner estimates a CAGR of 16.4% for the

Indian security market between 2008 and

2013.

According to ASSOCHAM, corporates

are likely to increase their security

budgets by 35-40%. The demand for secu-

rity equipment has increased by 10-15%

and the private security industry in India is

expected to touch Rs. 50,000 crore by

2012 (125% growth as opposed to the 25%

that's been the norm for the past five

years). The Indian surveillance market,

which is about 30% of the security indus-

try, is seeing a shift from analog to IP-

based surveillance. Currently IP-based

surveillance market in India is valued at

about $50-60 million and is expected to

grow at 45% YoY for the next four to five

years.

While the global market for analog

video surveillance equipment was flat in

2009, the growth rate of global IP video

surveillance equipment exceeded 15%.

According to the 2009 IMS Research

report, the global growth of network video

products will be approximately 30% over

the next five years.

According a report by International

Fire and Security Exhibition and

Conference (IFSEC), physical security in

India is likely to grow into a $3.5 billion

market; this is expected to grow by up to

30% YoY. Growth is expected from vari-

ous sectors including urban security, pub-

lic transport, hospitality, airport security,

BFSI and education. The government

remains the biggest spender on physical

security/ surveillance solutions and is

expected to spend $10bn on the nation's

homeland security requirements, over the

next two to three years.

Following the 26/11 Mumbai attacks,

there has been an increase in investment

for installing, as well as upgrading, exist-

ing security infrastructure within the coun-

try. This has provided a boost to the Indian

security and surveillance systems industry,

which grows at 20-30% annually.

What thefuture holds:

As the awareness

of the benefits

of IP-Based systems

spreads, features and

complexities of sur-

veillance products

will increase, and

costs will go down.

According to indus-

try experts, IP sur-

veillance in India

has enhanced its

reach into verticals

such as government,

SMBs and SOHOs.

This market will

continue to grow as

organizations and

authorities under-

stand the advantages

that IP-based sur-

veillance brings with

it. Additionally, with

IT equipment prices

likely to fall faster

than analog CCTV

equipment, the

scales will increas-

ingly tilt in favor of

IP-based systems.

At the end of the

day, the security of

the country contin-

ues to be a key con-

cern for the govern-

ment and its various

stakeholders, who

are working to bring

together the best

security solutions

and create a wide-

area security net, so

that both the nation's

assets as well as its

people remain safe

and secure.

Advantages of digital surveillance:

IP-based video surveillance touted as the future of

surveillance systems, has replaced closed circuit

analog systems, which traditionally dominated the

security market. IP surveillance technology allows

video to be transferred over the IP infrastructure mak-

ing it accessible from anywhere in the world. An effec-

tive and integrated security system provides operator

control, more usable data, and faster response time, at

a reduced cost.

By moving on to an IP-based network, building

systems operators get better response control. Since

IP-based surveillance provides the ability to access

footage from any remote location over the internet,

security or other authorized personnel need not be in

the building or campus to access the data. They can

remotely access the network and the cameras online.

This technology also helps individuals who need to

monitor their homes from anywhere in the world while

they are away. Today's IP-based surveillance cameras

can handle motion detection and tampering detection.

They have in-built intelligence that enables them to

alert security personnel or to activate recording if an

event takes place in a camera's surveillance area.

Network video facilitates proactive monitoring.

Digital or IP-based cameras can also add to busi-

ness intelligence. In retail outlets, camera footage can

help to analyze the customer footfall and patterns,

reduce shrinkage, enhance marketing and optimize

staffing. Network video helps retailers manage the

inventory lifecycle more efficiently.

Other benefits of bringing physical security infra-

structure onto the IP network include reduced total cost

of ownership, better image quality, increased storage

capacity, enhanced features, greater interoperability,

and faster access to relevant information during emer-

gency. Compared to traditional CCTV cameras, the

digital infrastructure is scalable and there is no limit to

the number of devices that can be added to the net-

work. The ability to interconnect security cameras with

the other security systems with open standards is

another advantage of IP-based surveillance. IP- based

surveillance solutions provide an open platform to

build more collaborative and integrated physical secu-

rity systems, while preserving their existing invest-

ments in analog-based technology.

Simply put, the users can enable their analog

devices to 'talk' to other devices on the network, or to

the central control system.

Page 5: Fourth Edition of Fitag Times

5www.fitag.in

Tuesday 15 11 2013FITAGTimesFLOURISH KNOWLEDGE NETWORKING POWER PROTECTION

The tide has turned. The

employers no longer

can tell employees, "Like it

or leave it." In today's

business, attracting and

retaining good employees

is a top priority in both

large and small organiza-

tions. In fact, it is the

biggest concern of today's

businessmen. Today's

workers expect fair pay

and competitive benefits.

But they also are interested

in job security. A study by

the Hay Group (1998)

reports that out of fifty

retention factors pay is the

least important to one-half

million employees from

over three hundred compa-

nies. Surprising....Isn't it?

Managers, supervisors,

team leaders, and project

leaders-who lead and inter-

act directly with employ-

ees-have the greatest

impact on employees' satis-

faction or dissatisfaction

with their jobs.

In short, "problems with

the boss" is the primary

reason that employees seek

work elsewhere.

Four key factors....the

primary factors that con-

tribute to retention & that

create loyalty on the part of

high-performing, senior &

effective employees can be

placed in four categories:

(1) having an efficient

boss, (2) the sense of being

part of a group or team,

(3)challenging and mean-

ingful work, and (4) oppor-

tunities to learn and grow.

These factors drive

employee satisfaction and

commitment.

Tips to Retain High Performance,

"Senior", EffectiveEmployees

An Efficient Boss The Sense of Being The Part of a Group or Team

Challenging and Meaningful Work

"An Efficient Boss does not.....

< Fail to solicit and listen to employ-ee inputs

< Fail to recognize employees'accomplishments

< Withhold praise

< Give only negative feedback

< Take credit for others' accomplish-ments or ideas

< Blame others for one's own mis-takes

< Betray trusts or confidences

< Manage up rather than down

"An Efficient Boss.....

< Pays Attention to and Communicateswith their employees

< Provides frequent, honest feedbackto employees about their perform-

ance.

< Helps to make the right job fit interms of an employee's skills and

personal interests.

< Takes the time to listen and respondin a way that shows that they care.

< Is Trustworthy and Supportive.

< Is concerned about his employees'family concerns and work-life bal-

ance.

< Helps to Create a Sense of Purposein the Work by providing coaching

& mentoring.

< Encourages Employee Growth andCareer Development through cre-

ativity & innovation.

< Asks questions to the obvious andgo beyond.

< Working with great people, being part of a team, and having fun on

the job are some other important factors in job satisfaction.

< A department, section, or division can feel like a "team" if....

< The manager and employees treat one another with courtesy

and respect.

< They listen to one another's ideas.

< They recognize and celebrate one another's accomplishments.

< They work toward common goals.

< They Provide the team members with the tools and resources

to work together.

< They provide training in the areas in consensus decision

making, planning & conflict resolution.

Exciting and challenging work and meaningful work that makes a di

ference or a contribution to society were cited as some of the most

important factors in job satisfaction.

< Provide a sense that he/she is going to spend a great deal of one's

life doing something.

< Allow them to have some say in how the work is done.

< The need for connection extends both from the work and to the

work.

< Recognize their suggestions of improvement suggest improvements

in work assignments, processes, schedules, and measurements.

< Let them have autonomy and a sense of control over their work .

< Delegate work to them and lat them be responsible for their own

work.

< Let them Perceive and meet the challenges on the job such that the

work exciting and full of pride

< Create an environment such that they keep up with knowledge and

technology in the field.

Opportunities to Learn and GrowCareer growth, learning, and development are three of the top reasons

that people stay in their current jobs.

< Provide opportunities on the job that match the employees' abilities

& and aspirations.

< Encourages employees to improve the work itself as well as their

skills

< Motivate them to keep up with latest developments in their fields.

Providing formal training and development opportunities is only

one means of helping employees to learn and grow.

< Provide informal learning opportunities on the job can be done reg-

ularly.

< Encourage them to "network," and learn from Coaching, mentor-

ing.

< Make them read publications related to their lines of work.

"If we do not do All These and Lose employees then?

Some businessmen may think that they don't have time to do all these things.Consider ...

A

[A.] Investment in the current employee

< The time (and costs) required to recruit, interview and hire an employ-

ee

< The time and cost invested to assess, train, and integrate them to

replace the ones who have left.

< Hard costs like advertising, travel, selection, orientation, and sign-on

bonuses.

< Other costs of the work that is put on hold while this is done; the

effects on productivity, morale, and customer satisfaction

B

[B.] There are some unseen costs also.

< The benefits to the competitor of hiring the lost employee.

< The possible influence of this employee on other employees (to leave).

< New hires tend to demand 20 to 40 percent more in pay than the

employees they replace.

< High-tech workers, professionals, and managers cost twice as much as

other employees to replace.

< Primary job responsibilities should be the retention of high-perform-

ing employees.

"The punch line is..."We need high performance, senior, effective employees. It is the

truth and it will remain the truth."

In business, guarantee no dips. If we use these tips.

FITAG Wi-Mentor MantraMentor Mantra 5FITAG Wi-5

Page 6: Fourth Edition of Fitag Times

6www.fitag.in

Tuesday 15 11 2013FITAGTimesFLOURISH KNOWLEDGE NETWORKING POWER PROTECTION

NEWS CORNER

Worldwide Server SalesDecline in Q2

THE SERVER busines

continued to slide in

the second quarter with

world wide revenue and

unit sales down, IDC said.

Revenue was down 6.2

per cent to $11.9 billion

(about Rs 77,280 crore) in

the second consecutive

quarter of year over - year

decline, as demand for

servers continued to soften

in most geographic

regions, the research firm

said. Unit shipments were

also down 1.2 percent to 2

million, after also falling in

the previous two quarters.

The highest fall in rev-

enue was in mid-range sys-

tems, which dipped by

about 22 percent year-

over-year, while volume

systems had a 2.4 percent

revenue decline and rev-

enue from high - end sys-

tems dipped 9.5 percent in

the quarter ended June.

The slowing demand is

a combination of factors

including consolidation,

virtualization, and migra-

tion initiatives by main-

stream small and medium

businesses and enterprise

customers, and dampening

demand for new IT proj-

ects in difficult economic

conditions. Top server ven-

dors tried to offset weak

demand for highermargin

Unix and blade servers

with lower-margin rack

and density optimized

servers, IDC said.

IBM held the number

one position in the server

market with a 27.9 percent

share of revenue, but

its share was down from

over 29 percent last year.

The company’s server rev-

enue fell in the quarter by

10percent year -over-year

because of low demand for

System x and Power

Systems. IBM’s System z

mainframe running z/OS,

however, had a third con-

secutiv quarter of growth,

with revenue up by 9.9

Percent year - over - year

to $1.2 billion (about Rs

6,000 crore). The main-

frame accounted for 9.8

percent of server revenue

in the quarter.

HP held the number two

position with a smaller

market share of close to 26

percent, after a year - on-

year decline in revenue of

17.5 percent as a result of

poor demand for x86-

based Pro- Liant servers

and continued decline in

demand for HP Integrity

servers.

Dell fared better, grow-

ing its server market share

to 18.8 percent, its highest

ever in any quarter, from

16 percent last year, to

retain the third spot. Dell’s

server revenue grew 10.3

percent in the quarter.

Rival Oracle held the

fourth position with 6 per-

cent market share followed

by Cisco Systems at num-

ber five with 4.5 percent

share after a close to 43

percent growth in revenue.

Cisco had a statistical tie

with Fujitsu

in the last

quarter.

Revenue

from density

o p t i m i z e d

servers, used

in large

h y p e r s c a l e

datacenters,

surged 26.6

percent year

- on - year.

-john Ribeiro

6.2%is the server

revenue

decline for the

second con-

secutive quar-

ter year-over-

year.

Google has unveiled its

new Chromebook lap-

top, which has features simi-

lar to high-end laptops but is

priced at only US$ 279. Built

by Hewlett-Packard (HP),

the HP Chromebook 11 has

features that are usually seen

in laptops worth US$ 1,000.

In fact, the new device that

has the Chrome OS sports

many features from other

laptops running Google’s

Chrome OS, like the

Chromebook Pixel, which

costs US$ 1,299.

The newly unveiled

Chromebook 11 laptop has a

plastic frame with no sharp

edges or corners. In fact,

even screw holes are miss-

ing, which gives it a very

sleek look. Further, the

device’s speakers are placed

under its keyboard, which

means that the sound is

directed towards the user.

The 29.26-cm (11.6-inch)

laptop weiths only 1.04 kg

(2.3lb) and is apparently

based on the Chromebook

Pixel, which was designed

by Google itself. But the two

companies did have to make

a few sacrifices in order to

keep the price as low as US$

279. For one, the device does

not have a touchscreen dis-

play and neither is the dis-

play as sharp as the

Chromebook Pixel. Further,

the metal frame is replaced

by plastic and the laptop has

only 16 GB of storage in the

basic model.

Interestingly, the

Chromebook 11 is charged

via a micro - USB port,

Which is the same as those

used in smartphones and

tablets.

Google’s Chromebook 11

unveiled!

Now play the ‘Modi Run’ game

on your Android for free!

The Narendra Modi fever is catch-

ing on! Among the list of your

favourites like Temple Run, Super

Mario and Subway Surfers, you can

now also make Modi run to see him

win over India.

The game called Modi Run has

been developed by Dexati, a mobile

application and gaming company

based in the US. It is a free game and

can be downloaded on any Android

device. In the game, politician Modi is

seen running through all the states to

win the election and become the

Prime Minister of India.

The details of the game read,

“Help Modi through all the states and

gather the votes to win the election

and become PM of India.” It is purely

for entertainment and not endorsed by

either Modi or the BJP, says the

developer.

Page 7: Fourth Edition of Fitag Times

7www.fitag.in

Tuesday 15 11 2013FITAGTimesFLOURISH KNOWLEDGE NETWORKING POWER PROTECTION

Articals

Publisher : Gaurang Vyas, President, Fitag Editor : Kaushik Pandya Assistant Editor : Sejal Patel Designer : Hardik Pancholi

Address : B/302, Rudra Arcade, Nr. Helmet Circle, Memnagar, Ahmedabad-380015. All rights reserved. No part of this publication

can be reproduced without the prior permission from the publisher.

What you can do with “Google”What you can do with “Google”Calendar software can be quite useful. Busy executives might refer to a calendar program as they

navigate from one business meeting to another. Popular socialites use them as they book parties and

other events. And the perpetually disorganized depend on calendar software to avoid missing

important appointments. There are several calendar programs on the market. One such application

that's growing in popularity is the Google Calendar.

Created by the multi-billion

dollar corporation Google,

the Google Calendar application

allows users to create personal or

public calendars after signing up

for a Google account. The

accounts are free, and Google

stores the calendars within its

cloud computing system. That

means that the company stores the

application and user information

on its own servers. The user does-

n't have to download special soft-

ware to access the calendar -- all

access is through a Web browser.

With traditional desktop soft-

ware, users store information to

their own computers' hard drives

or other storage devices. That

means if they want to access their

information, they always have to

use the same computer. Since the

information in Google Calendars

exists on the Web, users can view

and make changes to calendars

from any computer connected to

the Internet. Storing calendars on

the Internet also means that it's

easier to share information with

other users. In turn, scheduling

events and creating invitations

becomes easier. Want to know if a

fellow Google Calendar owner is

free this weekend? If the owner

opts to share his or her calendar

with you, you'll be able to see if

there are any scheduled events

that might interfere with your

plans. If there are conflicts, you

may be able to adjust your plans.

Like all tools, Google

Calendar is only helpful when

people use it. It doesn't magically

organize your life, but it can make

the task much easier for you.

What are some of Google

Calendar's basic features? Find

out in the next section.

Google Calendar's Features

Google Calendar Software and Hardware

Advanced Google Calendar Features

The Google Calendar layout is

fairly simple. A miniature

view of the calendar appears in a

column on the left side of the

screen. It displays the current

month and highlights the current

day. A larger viewing area takes

up most of the rest of the screen.

The Google Calendar has multiple

viewing options. You can choose

to view the calendar by day, week,

month or a view that presents just

the next four days. You can also

choose an "agenda" view, which

presents all scheduled events as a

list rather than as a calendar view.

No matter which view you're in,

you can block out time on the cal-

endar. In most views, Google

Calendar allows you to schedule

appointments or events with a

simple click-and-drag interface.

In the day, week and next four

days views, you can block out

time in half-hour increments by

clicking and dragging down the

appropriate day. Google Calendar

then prompts you to fill in details

about the appointment.

In the month view, you can

block out time for multiple days.

This is particularly useful if you

need to set aside time for trips and

vacations.

You can keep appointments

simple with just a subject header,

or you can choose to add more

details. You can include a location

for the appointment and a short

description. You can also use the

"repeat" function for events that

occur regularly, such as a weekly

meeting or annual event like

birthdays.

Most of these functions are

similar to the features of other cal-

endar software products on the

market. As part of an effort to dif-

ferentiate Google Calendar from

its competitors, Google incorpo-

rates other features that take

advantage of Google's capabili-

ties. Perhaps the most notable

Google offering is its search func-

tion. In Google Calendar, you can

use Google's search technology to

search not only your own calen-

dars, but also any public calendar

on Google's system.

Let's say you're going to a

conference. The administrators of

the conference have made the

event's schedule available online

through Google Calendar. You

can use the search function to find

the event's calendar and synchro-

nize it with your own. Google

Calendar returns a search engine

results page (SERP) specifically

formatted to show calendar

results. You can select the appro-

priate entry in the SERP and

Google Calendar takes care of the

rest. Now you've got the detailed

schedule imported into your own

calendar. Perhaps you own multi-

ple calendars, some of which are

public and others that aren't. You

can use the search function to

look for specific events within

your calendars. Google Calendar

returns a SERP showing you

where specific scheduled events

fall on each of your calendars.

These features are just the tip

of the iceberg for Google

Calendar. Want to learn about

more advanced features? Head on

over to the next section.

Many of Google Calendar's

advanced functions rely on

the fact that it's a Web service.

With most other calendar soft-

ware, you'd either access the pro-

gram from your own computer's

hard drive or you'd store the appli-

cation on a local area network

(LAN). With Google Calendar,

the entire application and all its

contents are on the Web.

One of the Web services

Google takes advantage of is short

message service (SMS) support.

This is the format cell phones use

to send text messages. Users can

allow Google Calendar to send

reminders via SMS to their cell

phones. As a scheduled event

draws near, Google Calendar

sends an alert via SMS to a phone

number registered by the respec-

tive user. While Google offers this

as a free service, users may have

to pay their cell phone service

providers if they go over their

monthly text message limits.

Google fosters a growing

community of developers who use

Google's application program-

ming interface (API) to build new

programs based off Google tech-

nology. Google calls the resulting

applications Google gadgets.

Many developers design gadgets

to work with existing applica-

tions, including Google Calendar.

Gadgets allow users to insert spe-

cial events into a calendar. The

options are practically limitless.

Examples can include everything

from inserting a relevant photo-

graph to attaching a Google Map

showing the location of the event.

Google Calendar makes it

pretty easy to send invitations to

other people. First, you create an

event in your own calendar and

fill out the details. Then, you can

click on the "add guests" option.

This opens up a field in which you

can type e-mail addresses. Once

you save the event, Google

Calendar sends e-mails to the

invite list. As guests respond to

the invite, Google Calendar dis-

plays the results within the event

listing on your calendar.

If a user chooses to share or

publish a calendar, other users can

leave comments on event entries.

This allows people to discuss

upcoming appointments or

debrief after a meeting. The event

page becomes a forum for guests

and calendar viewers.

What does Google use to keep

the Google Calendar system up

and running? Find out in the next

section.

If you're familiar with Google,

you probably know that they're

secretive when it comes to their

operations. There's not a lot of

information available on the sys-

tem Google Calendar uses. Still,

there are some aspects of Google's

operations that are public knowl-

edge. As for the rest, we can make

a few assumptions on what's

going on behind the scenes.

It helps to imagine the Google

Calendar system as a client/server

system. A client is an entity that

requests a service. The server is

the part of the system that pro-

vides a service. Both the client

and the server may have special

software allowing them to interact

with one another. What's more, it's

possible for a single computer to

act as both a client and a server.

On the server side of Google

Calendar, Google uses the Java

programming language to build

applications. Sun Microsystems

developed Java as an object-ori-

ented computer programming lan-

guage. Programs created with

Java can exist independently of

other programs. It's the Java

applications that handle all the

data on the back end of Google

Calendar.

Google Calendar users see the

client side of the system. This

consists of a Web page enhanced

by Javascript. Javascript and Java

aren't the same thing. The Java

language allows programmers to

build programs ranging from full

applications to smaller applets.

Developers use Javascript to beef

up Web services. They can't use it

to build programs that work out-

side of a Web browser experience.

That about wraps up everything

Google outsiders know about the

Google Calendar system. But we

can make a few guesses about

other details:

Google tends to use relatively

cheap hardware for its systems.

Instead of investing in cutting

edge technology that can handle

terabytes of data, Google purchas-

es inexpensive hardware that inte-

grates with existing networks

seamlessly. While the hardware

doesn't have all the bells and

whistles of more expensive equip-

ment, it serves its purpose. Since

it's cheap, it doesn't cost much to

add more capacity to the system,

which means it's scalable.

One possible arrangement of

hardware would include applica-

tion servers and database servers.

The application server would

process the programs that make

Google Calendar possible,

including integration with other

Google applications. The data-

base servers act as storage.

Google may also use a control or

administrative server that acts as

a gatekeeper.

Google CalendarGoogle Calendar

Page 8: Fourth Edition of Fitag Times

8www.fitag.in

Tuesday 15 11 2013FITAGTimesFLOURISH KNOWLEDGE NETWORKING POWER PROTECTION

ACTIVITY CORNER

Fitag Times reaches to 21,000 retailers / dealers across Gujarat

JITA ANNUAL FUNCTION & SNEH MILAN PROGRAMM

ACMA Diwali Snehmilan