Search PPTs

Saturday, July 24, 2010

PowerPoint Presentation On Be Positive

Be Positive


PPT On Attitude


PowerPoint Presentation On Android

PPT On Android


Android Presentation Transcript:
1. 1. Introduction (1)
What is Android? A software platform and operating system for mobile devices Based on the Linux kernel Developed by Google and later the Open Handset Alliance (OHA) Allows writing managed code in the Java language Possibility to write applications in other languages and compiling it to ARM native code (support of Google? No) Unveiling of the Android platform was announced on 5 November 2007 with the founding of OHA

2. What is the Open Handset Alliance (OHA)?
(2) Devoted to advancing open standards for mobile devices Develop technologies that will significantly lower the cost of developing and distributing mobile devices and services License Android is under version 2 of the Apache Software License (ASL)

3. 2. Platform (1)
2.1 Hardware Android is not a single piece of hardware; it's a complete, end-to-end software platform that can be adapted to work on any number of hardware configurations. Everything is there, from the bootloader all the way up to the applications.
2.2 Operating System(s) Android uses Linux for its device drivers, memory management, process management, and networking. The next level up contains the Android native libraries. They are all written in C/C++ internally, but you’ll be calling them through Java interfaces. In this layer you can find the Surface Manager, 2D and 3D graphics, Media codecs, the SQL database (SQLite), and a native web browser engine (WebKit). Dalvik Virtual Machine. Dalvik runs dex files, which are coverted at compile time from standard class and jar files.

4. 2.3 Network Connectivity 
It supports wireless communications using: GSM mobile-phone technology 3G 802.11 Wi-Fi networks

5. 2.4 Security 
Android is a multi-process system, in which each application (and parts of the system) runs in its own process. Most security between applications and the system is enforced at the process level through standard Linux facilities, such as user and group IDs that are assigned to applications. Additional finer-grained security features are provided through a "permission" mechanism that enforces restrictions on the specific operations that a particular process can perform, and per-URI permissions for granting ad-hoc access to specific pieces of data.

6. 2.6 Future possibilities Google Android Sales to Overtake iPhone in 2012 The OHA is committed to make their vision a reality: to deploy the Android platform for every mobile operator, handset manufacturers and developers to build innovative devices Intel doesn’t want to lose ownership of the netbook market, so they need to prepare for anything, including Android Fujitsu launched an initiative to offer consulting and engineering expertise to help run Android on embedded hardware, which aside from cellphones, mobile internet devices, and portable media players, could include GPS devices, thin-client computers and set-top boxes. More Android devices are coming and some will push the envelope even further

7. 3. Software development (1)
3.1 Development requirements Java Android SDK Eclipse IDE (optional)

8. 3.2 IDE and Tools
Android SDK Class Library Developer Tools dx – Dalvik Cross-Assembler aapt – Android Asset Packaging Tool adb – Android Debug Bridge ddms – Dalvik Debug Monitor Service Emulator and System Images Documentation and Sample Code Eclipse IDE + ADT (Android Development Tools) Reduces Development and Testing Time Makes User Interface-Creation easier Makes Application Description Easier

9. 3.3 Programming Language(s)
Java – officially supported C/C++ – also possible but not supported 4. Overall evaluation (1) 4.1 Advantages There are a host of advantages that Google’s Android will derive from being an open source software. Some of the advantages include: The ability for anyone to customize the Google Android platform The consumer will benefit from having a wide range of mobile applications to choose from since the monopoly will be broken by Google Android Men will be able to customize a mobile phones using Google Android platform like never before Features like weather details, opening screen, live RSS feeds and even the icons on the opening screen will be able to be customized As a result of many mobile phones carrying Google Android, companies will come up with such innovative products like the location In addition the entertainment functionalities will be taken a notch higher by Google Android being able to offer online real time multiplayer games 4.2 Limitations Bluetooth limitations Android doesn't support: Bluetooth stereo Contacts exchange Modem pairing Wireless keyboards But it'll work with Bluetooth headsets, but that's about it Firefox Mobile isn't coming to Android Apps in Android Market need to be programmed with a custom form of Java → Mozilla and the Fennec won't have that 4.3 Conclusion We can only hope that the next versions of Android have overcome the actual limitations and that the future possibilities became a reality

10. Thanks.

PowerPoint Presentation On Blu Ray Disc

 Blu Ray Disc PPT


PPT On Blu Ray Disc


PowerPoint Presentation On Cyber Terrorism

 PPT On Cyber Terrorism


Cyber Terrorism Presentation Transcript:
Cyber terrorism – The use of the Net for terrorism. Cyber crime – The use of the Net for criminal actions. Cyber Attacks – Email bombs, viruses, intentional actions. Information Warfare – Formalized governmental warfare Netwar – Conducting warfare via Networks & the Net Techno Terrorism – Use of technology by terrorist groups

Contains two elements:- Cyber-Space Terrorism Premeditated Politically motivated Attack against information, computer systems, computer programs and data Result in violence

Terrorist: “ who causes intense fear; one who controls, dominates, or coerces through the use of terror in furtherance of political or social objectives”. Cyber-Terrorist: An individual that uses computer\network technology (i.e., networks, computers, Internet) to cause intense fear; one who uses computer\network technology to control, dominate, or coerce through the use of terror in furtherance of political or social objectives.

Cheaper Action is difficult to track Personalities and Location can be hidden No Security to go through Remotely Vast Destruction can be done Big targets can be attacked

Privacy Violation: The law of privacy is the recognition of the individual's right to be let alone and to have his personal space inviolate. The violation of this attracts both civil as well as criminal consequences under the respective laws. Man has become sensitive to publicity, so that solitude and privacy have become essential to the individual. Certain acts have been categorized as offences and contraventions, which have tendency to intrude with the privacy rights of the citizens

6. Secret information appropriation and data theft:
The information technology can be misused for appropriating the valuable Government secrets and data of private individuals and the Government and its agencies. A computer network owned by the Government may contain valuable information concerning defence and other top secrets, which the Government will not wish to share otherwise. The same can be targeted by the terrorists to facilitate their activities, including destruction of property. NOTE: The definition of property is not restricted to moveable's or immoveable

7. Demolition of E-governance Base:
The aim of e-governance is to make the interaction of the citizens with the government offices hassle free and to share information in a free and transparent manner. It further makes the right to information a meaningful reality. In a democracy, people govern themselves and they cannot govern themselves properly unless they are aware of social, political, economic and other issues confronting them. To enable them to make a proper judgment on those issues, they must have the benefit of a range of opinions on those issues

8. Distributed denial of Service Attack
The cyber terrorists may also use the method of distributed denial of services (DDOS) to overburden the Government and its agencies electronic bases. This is made possible by first infecting several unprotected computers by way of virus attacks and then taking control of them. Once control is obtained, they can be manipulated from any locality by the terrorists. These infected computers are then made to send information or demand in such a large number that the server of the victim collapses.

9. Network Damage and Disruption:
The main aim of cyber terrorist activities is to cause networks damage and their disruptions. This activity may divert the attention of the security agencies for the time being thus giving the terrorists extra time and makes their task comparatively easier. This process may involve a combination of computer tampering, virus attacks, hacking, etc.

10. For more please refer our PPT. Thanks.

PowerPoint Presentation On Spring Framework

 PPT On Spring Framework


Spring Framework Presentation Transcript:
1. What is Spring?
A Container Creates objects and makes them available to your application A Framework Provides an infrastructure of classes that make it easier to accomplish tasks

2. What does Spring provide?
Lightweight container and framework Most of your code will be unaware of the Spring framework Use only the parts you of Spring you want Manages dependencies between your objects Encourages use of interfaces Lessens “coupling” between objects Cleaner separation of responsibilities Put logic that applies to many objects in one single place Separate the class’s core responsibility from other duties Simplifies database integration Spring JDBC Hibernate iBATIS Java Persistence

3. Spring Modules –
Use What You Want

4. Example Application
Contacts – store and retrieve contacts Created using MyEclipse 7 Uses Maven 2 to manage libraries Demonstrates basic Spring capabilities Contact has a Person, collection of Email, and collection of Phone objects Can use an XML file or database as repository User interface is via the console See READ_ME file under project folder

5. Dependency Management
Manage collaboration (dependencies) between Plain Old Java Objects (POJOs) Code to interfaces Use Spring to instantiate specific interface implementations Don’t need InterfaceType anObject = new ClassThatImplementsInterfaceType() Use Spring to provide specific interface implementations to your objects

6. External Configuration
Configuration options Properties files XML configuration files Annotations XML Configuration Specify the creation of objects Specify the dependencies between objects

7. Handling Change
Change dependencies without changing code Edit the configuration file Create multiple configuration files

8. Testing Applications
Easier to test Use a test configuration file to create test objects and manage their dependencies Reuse objects across tests Test service layer objects by creating stub dependent objects See:

9. Separation of Responsibilities Aspect-Oriented Programming (AOP) Aspect-Oriented Programming in Spring Put a concern (logic) that applies to many different objects in one single place Logging, security, performance testing, transaction management

10. For more please refer our PPT. Thanks.

PowerPoint Presentation On JIRO Technology

 PPT On JIRO Technology


JIRO Technology Presentation Transcript:
1. Problem before JIRO Introduce by Sun Micro System Managing Distributed Resource. Platform independent Web based GUI’S and Management App

2. Using JIRO Integrated and Automated Management Software. A standard extension to the Java platform, is specified by the Federated Management Architecture (FMA). Jiro goes further than just platform independence, however, and introduces Jini-connection technology for distributed management across a network.

3. Three tier architecture
The requirements for this middle tier were determined by an analysis of distributed management and the resources that need to be monitored and controlled. There may be several resources processing the data as it moves from the application to its eventual destination -- a disk drive, for example Separating the control path from the data path

4. Working Partition the Management environment private management servers can host management services that are specific to their hosts The servers (including the shared server) can be replicated to achieve higher availability. These servers form an intra domain federation for the management domain. The shared management servers can also communicate with each other.

5. Static Service known as Federated Beans base services -
- are a guaranteed part of the environment in a management domain. The base services include transaction, controller, logging, events, and scheduling. They are available for use by the clients and services belonging to a management domain, and do not depend on the dynamic services model. There is only one of each type of service available in each management domain.

6. The Transaction
service is a Jini transaction manager serving a particular management domain. The Controller service provides for the reservation of ownership within the management domain. Management software can use the Log service to log decisions and state changes, as well as to maintain audit trails. The Event service provides a set of topics to which management services can post and listen. This allows management services to react to both changing conditions in the environment and decisions that other management services have made. The Scheduling service allows a management service to perform periodic or scheduled operations, such as polling.

7. Dynamic services
The FederatedBeans dynamic services model extends Java's Remote Method Invocation (RMI) to support the higher level of abstraction appropriate for management application. Additional management capabilities (security, transaction, controller) that can be added to any Jiro-based component Transactional persistence Remote class method (procedural) invocations Remote object instantiation

8. Management Automation Example
The first set of Jiro components that need to be developed for these situations are called Management Facades. The resource vendor typically develops the Management Facades for its products that enable the products to be managed by Jiro -based software. FederatedBeans components will typically use a standard protocol, such as SNMP, to talk to the resource (in the case of a device or system) or native library (in the case of software). We'll create two FederatedBeans components for this example. The first component maintains a pool of spare disks that can be used for multiple applications and hosts in the storage network.

9. Continue….
The second FederatedBeans component will monitor file system utilization and try to predict when the file system will run out of space. It accesses usage information from the filesystem's Management Facade and tracks its usage over time. After predicting an out-of-space condition based on the history of past usage, it then calls the Storage Pool Bean to get a disk from its pool. When the Storage Pool Bean gets the request for the disk, it calls the switch's Management Facade to change the zone of the newly allocated disk to that of the host.

10. Conclusion
Jiro makes possible software that can increase availability and help reduce the cost and complexity of management The new paradigm for management software is multiple-vendor creation and reuse of these FederatedBeans components. The Storage Pool bean in our example could also be used by a component that consumes disks due to failure predictions, for example.

11. Thanks.

PowerPoint Presentation on Swarm Intelligence

PPT On Swarm Intelligence


Swarm Intelligence Presentation Transcript:
Artificial intelligence (AI) is the intelligence of machines and the branch of computer science that aims to create such machines. The central problems of AI include such traits as reasoning, knowledge, planning, learning, communication, perception and the ability to move and manipulate objects.

Environment changes dynamically and cannot be framed by calculations and algorithms. Scientists have proposed many solutions to cope up with the limitations and exception of environment. Insects and birds are successful in surviving for years and are efficient , flexible and robust. They solve many problems like finding food , building nest etc.. Hence they are self organized and optimize their path.

3. Particle swarm optimization Idea:
Used to optimize continuous functions. PSO is a population-based search algorithm and is initialized with a population of random solutions called particles. The particles have the tendency to fly towards the better and better search area over the course of search process. Function is evaluated at each time step for the agent’s current position. Each agent “remembers” personal/local best value of the function

ACO is inspired by the behavior of ant colonies. Ant colonies have the ability to find the shortest path for the food. Ants leave a chemical pheromone trail . This pheromone trial enables them to find shortest path between their nest and the food sources. Ants find the shortest path via an experimental setup shown below.

The complexity and sophistication of Self-organization is carried out with no clear leader. What we learn about social insects can be applied to the field of Intelligent System Design. The modeling of social insects by means of Self-Organization can help design artificial distributed problem solving devices. This is also known as Swarm Intelligent Systems.

6. From Ants to Algorithms
Swarm intelligence information allows us to address modeling via: Problem solving Algorithms Real world applications

Problem solving benefits include: Flexible Robust Decentralized Self-Organized

Collective task completion No need for overly complex algorithms Adaptable to changing environment

9. Thanks.

PowerPoint Presentation On Semantic Web

PPT On Semantic Web


Semantic Web Presentation Transcript:
1. The semantic web
Mostly flat information Some databases but content very functional Little engagement or interactivity

2. Web 1.0 design elements
Some typical design elements of a Web 1.0 site include: 1.Static pages instead of dynamic user-generated content. 2.The use of framesets. 3.HTML forms sent via email. A user would fill in a form, and upon clicking submit their email client would attempt to send an email containing the form's details.

3. Greater interactivity
Growth of social media / social networking Online communities created / social capital

4. Joining up of information
Data portability Browsers and search engines become more ‘intelligent’

5. Having seen the comparision , we can proceed over the application part. Let’s get into semantics. Firstly, we’ll look at the traditional web model…

6. Let’s introduce Professor Sharma. With the traditional web model she has the following…

7. A faculty page A faculty page A research page Using code we can create relationships between websites, people and events… These can then be understood by the browser and interpreted in a helpful way.

8. So we can link Professor Sharma’s faculty page to her research.

9. And her staff listing could show some of the other academics she works with.

10. For more please refer our PPT. Thanks.

Related Project Report:

Semantic Web Report

PowerPoint Presentation On Visual Studio 2010

PPT On Visual Studio 2010


Visual Studio 2010 Presentation Transcript:
1. Introduction:
Visual Studio Microsoft® Visual Studio® 2010 is an integrated environment that simplifies creating, debugging and deploying applications. The new Microsoft Visual Studio 2010 simplifies the entire development process, from design to deployment. Coding is faster than ever, since we can leverage existing code and skills to write applications targeting different platforms, including SharePoint and Windows Azure.

2. Introduction: Visual Studio (Contd…)
We’ve got ideas. We know the algorithms. The architecture’s up on the whiteboard, and we can imagine the user interface. And now, with the Visual Studio 2010, we’ve got the tools to turn our ideas into solutions.

3. Introduction: .NET Framework
The .NET Framework is an integral Windows component that supports building and running the next generation of applications and XML Web services. The .NET Framework has two main components: The common language runtime and, The .NET Framework class library.

4. Introduction: .NET Framework
The common language runtime is the foundation of the .NET Framework. The common language runtime manages memory, thread execution, code execution, code safety verification, compilation, and other system services. The class library, is a comprehensive, object-oriented collection of reusable types that we can use to develop applications both Command line and GUI based.

5. What's new in Visual Studio 2010
Simplified appearance and new behaviors Visual enhancements Multiple monitor support Explore code more quickly Updated code editor Navigate to Call hierarchy Full power of .NET with C# and Visual Basic

6. What's new in Visual Studio 2010 (Contd…)
Windows 7 Support Visual F# development WPF and Silverlight Designer SharePoint tooling Windows Azure Support Parallel Programming

7. Top 5 features
For developers: Build innovative customizations for SharePoint Develop applications for Windows 7 Understand existing code and architecture Identify test impact from code changes Customize Visual Studio to fit your style

8. Top 5 features
For testers: Enjoy deep collaboration with the development team Fast forward through manual tests Reproduce bugs on a common virtualized environment Automatically attach context to bugs Enjoy full visibility to the test progress

 9. Top 5 features
For project managers: New dashboards keep the team in sync Agile planning templates help the estimation process Requirements traceability keeps stakeholders informed Visual Studio Team Web Access eases reporting pains New reports help enable proactive project management

10. For more please refer our PPT. Thanks.

Related Project Report:

Microsoft Visual Studio 2010

PowerPoint Presentation On Browser RAD Tools And Apple Devices

PPT On Browser RAD Tools


Browser RAD Tools And Apple Devices Presentation Transcript:
1. Back in the days of Browser War
1996-1997 Netscape Navigator Internet Explorer Each browser was implementing its own Standards

2. Weren’t we supposed to talk about RAD using some safari tool? And there I go! Demonstration

3. Safari Developer Tools
Firebug like functionality in Safari Rapid Prototyping Errors Performance and profiling HTML5 Offline Database

4. Why develop for iPhone?
It’s a great device It’s innovation. It’s touch. Publish your application in AppStore Availability of very well documented SDK CocoaTouch Framework for native apps WebKit engine for web browser experience

5. Web Applications for iPhone
What are they? Difference between native apps and web applications Let’s build one application (quick demo of dashcode) Some examples of web applications

6. Bonus for jQuery fans here!

7. Thanks.

PowerPoint Presentation On Packet Tracer 5.0

 PPT On Packet Tracer 5.0


Packet Tracer 5.0 Presentation Transcript:
1. Comprehensive networking technology teaching and learning software with powerful simulation, visualization, authoring, assessment, and collaboration capabilities Offers a unique combination of realistic simulation and visualization experiences, complex assessment and activity authoring capabilities, and opportunities for multiuser collaboration and competition

2. Innovative features of the PT 5.0
software will help students and teachers collaborate, solve problems, and learn concepts in an engaging and dynamic social environment. Some of the benefits of Packet Tracer 5.0 are as follows: Provides a realistic simulation and visualization learning environment that supplements classroom equipment Enables multiuser, real-time collaboration and competition for dynamic learning

3. Anyone can author, the PT Activity Wizard guides you The process is basically write instructions, build a correct answer network, specify grading, specify an initial network, save

4. Packet Tracer is a foundational teaching tool for CCNA Discovery and CCNA Exploration. Both curricula include embedded e-doing, which applies the principle that people learn best by interacting with computer-based activities. Interactive learning promotes the exploration of networking concepts and experimentation with tools such as Packet Tracer and Flash-based activities to help students develop a greater understanding of networking technologies. Packet Tracer activities are embedded in the course content.

5. Expanded platform support Windows (Widows XP, Windows 2000) Vista (Vista Basic, Vista Premium) Linux (Ubuntu, Fedora) Enhanced protocol support Expanded list of protocols to reflect current networking trends and practices in industry and government More support for teaching CCNA-level commands Deeper modeling for existing protocols Multiuser functionality Enables social learning instead of students working alone PT 5.0 is now a network-capable (peer to peer) application Supports collaboration, competition, remote instructor-student interaction, social networking, gaming

6. Protocols listed in RED on this slide are new in PT 5.0 PT supports application protocols, transport protocols, routed and routing protocols, switching and data layer protocols, and wireless

7. Menu Bar
Main Tool Bar Common Tools Bar Logical/Physical Navigation Bar Workspace Realtime/Simulation Bar Network Component Box Device-Type Selection Box User Created Packet Window

8. Thanks.
Related Posts Plugin for WordPress, Blogger...

Blog Archive