Page 4 - July
P. 4
Editorial Prof. A.K. Nayak Chief Editor Dear Fellow CSI Members, Information Technology though being a late entrant among all technologies has penetrated into our life very deeply. Today we cannot envisage a living life without IT. Individuals, Societies, Organizations, Nations all are dependent on it not just for excellence but even for survival. That is the reason we say we live in an IT age. The miracle that stone did in stone age by lightning fi re and bringing people together and thereby giving rise to civilization, IT is carrying that same tradition in today’s age. And without a doubt it will take forward tomorrow as well. Adoption of IT by a common man is increasing day by day. Governments are adopting IT in their daily operations. IT generates employment opportunities, helps in social development and helps in improving access to basic services. IT revolution indeed brings advantages, but along with risks and challenges like incidents related to breaches of cybersecurity or cyber warfare. There is a need of better technology that should be environment friendly, safe, economical and eff ective. Technology changes at a very rapid rate, one need to quick respond to the changes otherwise he will be left behind. Particularly the recent emerging trends in computing parameters such as cloud computing, mobile computing, embedded computing, nano computing, quantum computing, social computing, and green computing etc. have arrived at an important point where the said techniques shall be exploited and utilised for creating the opportunity to become a digitally empowered society. To discuss the latest research & development in Information Technology, the publications committee of Computer Society of India selected the theme of CSI Communications (The Knowledge Digest for IT Community) July 2015 issue as ‘Emerging Trends in IT’. Cover story of the issue, “Data Science: The next frontier for business competiveness” by P. Kshirsagar highlights the benefi ts of data science to an organization and the trends in data science. The second cover story “World of mobility management : A discussion on architecture and cellular structure” by Bhumica, S. Dhir, Madhurima, Madhulika and A. Garg describes the process of communication over cell phone and process involved in bill generation in roaming. We have also provided the outlines of National Information Technology Policy. In Technical Trends, B.S. Harish and D.S. Guru have described the technical trends in automated machine translation system. In this article, authors have highlighted the challenges in the research avenues of related projects. In Research front, P.K. Gupta, G. Gugnani and S.P. Ghrera in “XML DNA encryption: Improved security of cloud applications” have described a technique that improves the security of cloud applications. The other research article “Multicasting count down time through Wi-Fi on Android mobile device” by C.K. Rajak, S. Ray, B. Biswas and H. K. Ratha explains the way to distribute the information to a large number of mobile users without any overhead of data traffi c and IP management scheme. M. Hanumanthappa and his scholars in article “Passwords” have explained the password properties and about graphical passwords. J. Doshi and B. Trivedi in their article have described the process of identifying vulnerable applications using a process called Penetration Testing. The third article “Building a Cyber Secure System –Conceptualization to Implementation” by S.K. Sreenivasaiah and M. Jayaramappa gives various aspects of cyber security in various applications. The fourth article “Trusting SSL Unsecure the internet” by H. K. Saini describes about the secure socket layer and how it is essential for e-commerce applications. G.P. Sudhakar has given highlights of CSI e-Governance Knowledge Sharing Summit in his article. In security corner, we have included an article “Security in Business Intelligence reporting systems” by KVN Rajesh and KVN Ramesh. This article highlights the need of security in Business Intelligence system and implementation of security. The second paper in this category authored by A. Velaga, “Next Generation Network Security: Quantum Key Distribution” explains the concept of the BB84 protocol for Quantum Key Distribution and a technique to increase the security by the use this protocol. This issue also contains an exclusive interview with Mr. Bharat Goenka, Co-founder and Managing Director of Tally Solutions Pvt. Ltd. Crosswords, calendar of events and CSI activities reports are also included along with CSI membership forms in this issue. I take this opportunity to extend my sincere thanks to Dr. Vipin Tyagi, Guest Editor for bringing this issue successfully with rich & quality content. I believe that this issue shall be most successful due to the combined eff ort of the editorial team and all the contributors for providing information and status of important areas of emerging trends in IT as well as providing new ideas for research in the emerging area of IT. I extend my gratitude to the entire EXECCOM and particularly to Prof. M. N. Hoda and Dr. D. K. Mishra for their support in bringing this issue successfully. On behalf of publication committee, I express my sincere thanks to all authors and reviewers for their contribution to this issue. Finally, we look forward to receive the feedback, contribution, criticism, suggestions from our esteemed members and readers at csic@csi-india.org. Prof. A.K. Nayak Chief Editor CSI Communications | July 2015 | 4 www.csi-india.org
   1   2   3   4   5   6   7   8   9