JIMS IT Flash , a monthly newsletter-An Initiative by the students of IT Department, shares the knowledge to its readers about the latest IT Innovations, Technologies and News.Your suggestions, thoughts and comments about latest in IT are always welcome at itflash@jimsindia.org.
Visit Website : http://jimsindia.org/
In this paper, we discuss about the Big Data. We
analyze and reveals the benefits of Big Data. We analyze the
big data challenges and how Hadoop gives solution to it. This
research paper gives the comparison between relational
databases and Hadoop. This research paper also gives reason
of why Big Data and Hadoop.
General Terms
Data Explosion, Big Data, Big Data Analytics, Hadoop, Hadoop
Distributed File System, MapReduce
In this paper, we discuss about the Big Data. We
analyze and reveals the benefits of Big Data. We analyze the
big data challenges and how Hadoop gives solution to it. This
research paper gives the comparison between relational
databases and Hadoop. This research paper also gives reason
of why Big Data and Hadoop.
General Terms
Data Explosion, Big Data, Big Data Analytics, Hadoop, Hadoop
Distributed File System, MapReduce
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
Big Data Analytics : Understanding for Research ActivityAndry Alamsyah
Big Data Analytics Presentation at International Workshop Colloquium Exploring Research Opportunity. School of Business and Management (SBM) - ITB. Bandung, 8 August 2019.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
Big Data Analytics : Understanding for Research ActivityAndry Alamsyah
Big Data Analytics Presentation at International Workshop Colloquium Exploring Research Opportunity. School of Business and Management (SBM) - ITB. Bandung, 8 August 2019.
MEMORIAS TRABAJOS LIBRES
Conferencia Científica Anual sobre Síndrome Metabólico 2016
Caracterización de subpoblaciones celulares asociadas al proceso inflamatorio de pacientes con diabetes mellitus tipo 2
M.S.P. Jesús A. Deloya-Villanueva1; Q.F.B. Mauricio Castillo-Salazar1; Dra. Sara García-Jiménez1, Dr. Miguel Angel Sánchez Alemán2; M. en IBB Rosario Leyva-Meza1; Dr. Germán Bernal-Fernández1
1 Facultad de Farmacia, Universidad Autónoma del Estado de Morelos, Av. Universidad 1001, Col. Chamilpa, C.P. 62209, Cuernavaca, Morelos. 2 Centro de Investigación Sobre Enfermedades Infecciosas del Instituto Nacional de Salud Pública, Av. Universidad 655, Col. Santa María Ahuacatitlan, C.P. 62100, Cuernavaca, Morelos
Everything you need to know about LinkedIn to create powerfully persuasive pr...Nathan Rosen
Everything you need to know about LinkedIn to create powerfully persuasive profiles & utilize it as an effective research tool by Nathan Rosen for Law Library Association of Greater New York webinar March 11 2015
The objective of this module is to provide an overview of the basic information on big data.
Upon completion of this module you will:
-Comprehend the emerging role of big data
-Understand the key terms regarding big and smart data
- Know how big data can be turned into smart data
- Be able to apply the key terms regarding big data
Duration of the module: approximately 1 – 2 hours
"Big data" is a broad term that encompasses a wide range of data and contents. Big data offers new approaches to analysis and decision making. At first glance big data and IP may seem to be opposites, but have more in common than one may think. This talk will focus on how big data will impact, and be impacted, by IP. One of the biggest promises in big data is the possibility to re-use data produced via different sources, create new services or predict the future, via the analysis of correlations. In this context, how can companies protect information assets and analytical skills? What are the new skills required to search and analyze in real time a big amount of datasets ? Big data will change not only patents information, but will also generate new types of patents.
Big Data And Analytics: A Summary Of The X 4.0 EraJohnWilson47710
Recent years have seen a huge increase in data and analytics capabilities as a result of the fast exponential rise of data and the development of increasingly complex algorithms. Computational power has risen in lockstep with the growth in storage capacity. Visit: https://myassignmenthelp.com/free-samples/com6905-research-methods-and-professional-issues/data-and-analytics-capabilities-file-A1D38CD.html
Moving Toward Big Data: Challenges, Trends and PerspectivesIJRESJOURNAL
Abstract: Big data refers to the organizational data asset that exceeds the volume, velocity, and variety of data typically stored using traditional structured database technologies. This type of data has become the important resource from which organizations can get valuable insightand make business decision by applying predictive analysis. This paper provides a comprehensive view of current status of big data development,starting from the definition and the description of Hadoop and MapReduce – the framework that standardizes the use of cluster of commodity machines to analyze big data. For the organizations that are ready to embrace big data technology, significant adjustments on infrastructure andthe roles played byIT professionals and BI practitioners must be anticipated which is discussed in the challenges of big data section. The landscape of big data development change rapidly which is directly related to the trend of big data. Clearly, a major part of the trend is the result ofthe attempt to deal with the challenges discussed earlier. Lastly the paper includes the most recent job prospective related to big data. The description of several job titles that comprise the workforce in the area of big data are also included.
VERVE 2K24 - Annual Inter College Techno Management Cultural Fest happening on 22nd & 23rd February 2024 at JIMS Technical Campus, Rohini, Delhi. Two days filled with electrifying performances, mind-blowing competitions and star performances.
#verve2k24 #jimsrohini #jimstechnicalcampus #verve #collegefest #delhicollegefests #jimsverve #annualfest #jimsdelhi
Case Study on Export Procedure of Rice from India to Russia written by PGDM International Business student at JIMS Rohini.
India is the world's largest producer of rice, and Russia is the world's 11th largest importer of #rice. In 2022, India exported about 2.1 million tons of rice to Russia, worth about US$56 million, according to the United Nations COMTRADE database on international trade. The study discusses
the export procedure and documents involved in exporting rice from India to Russia.
#Riceexports
#exportprocedure #Basmati rice
www.jimsrohini.org
Indian Oil Corporation Limited (IOCL), a significant participant in the Indian oil sector,
struggled with a number of urgent supply chain issues. is included dwindling production, rising expenses, lagging behind competitors, deteriorating consumer trust, dropping sales, revenue ejection, dwindling brand image, and cash flow problems. In order to strategically address these
complex problems, IOCL chose Honeywell’s Supply Chain Management system. This adoption’s key goal was to completely address the range of decultures encountered, with the goal of regaining production levels, competitive positioning, customer trust, and ultimately driving portability
and organizational resilience.
www.jimsrohini.org
Role and Challenges Related to Inland Container Depot (ICD).
This case focuses on highlighting the pivotal role of Inland Container Depots (ICDs) in trade from India to the globe. ICDs function as vital bridges connecting various logistics activities like freight forwarding, cargo handling and distribution. These hubs offer seamless intermodal transportation, optimizing supply chains and trade logistics. The essence of ICDs revolves around strategic centralized cargo handling facilities, bridging major seaports and airports to inland distribution/storage areas. As against these. The conventional systems grapple with bottlenecks, causing escalated costs, delays, and inefficiencies. ICDs counter these issues by streamlining
cargo consolidation, deconsolidation, and storage, interlinking various modes of transportation. However, multifaceted challenges require comprehensive solutions. Challenges encompass infrastructure constraints, customs intricacies, internal congestion, and lack of specialized facilities. A comprehensive strategy necessitates infrastructure development, regulatory streamlining, technological integration, and strategic planning. Lasco Shipping's proactive approach in understanding these intricate operations positions them to navigate the evolving global trade landscape efficiently. Insights garnered from ICD visits promise to streamline their operations, fortify customer service, and adeptly navigate international trade complexities.
With this thought , PGDM batch ( 2023-25) Sec C students have designed an innovative and insightful monthly newsletter for the month of July 2023.
A sprinkling of orientation activities, prime news, students' creative corner, etc., will delight readers.
#jims #jimsrohini #newsletter
Placement Highlights 2021-2023 Batch | JIMS Technical Campus, Rohini Delhi
Yet another remarkable achievement!
JIMS Sector 5 Rohini boasts an impressive placement record, with a high percentage of our PGDM graduates securing employment in top-notch companies with the best packages. Our rigorous curriculum, experienced faculty, and dedicated placement cell all work together to ensure that our students are well-prepared for the workforce. With our strong placement record, you can be confident that you'll have the skills and knowledge to succeed in your chosen field. Join our community today and take the first step toward a successful career!
To know more about JIMS placements visit :
https://bit.ly/41DY70w
For updates, follow our social media channels:
https://www.instagram.com/jimsrohinisector5/
https://www.facebook.com/JimsDelhi/
https://www.linkedin.com/school/jimsrohini
#CollegePlacementRecord #CareerReadiness #developingcapabilities #businessleadership #jimsrohini #jims #placement #mbaplacements #pgdmplacements #recruiters #mba #admissionopen #mbaadmission2023 #jimssector5rohini #pgdmadmissions #pgdmcollege #pgdmltcoursedetails #pgdm #pgdminternationalbusiness #pgdmcollegeindelhi #mba #mbacollege #mbacollegesinindia #mbacolleges #pgdmretailmanagement #internationalbusiness
JIMS in association with Department of Environmental Engineering, Delhi Technological University (DTU), formerly DCE is organizing an Annual Students Convention- “PRASTUTI-2018” (Inter College Technical Presentation Competition).
Date: Saturday, 17th march, 2018
Venue: Crowne Plaza, Rohini
Theme: “Green Computing and Green Management”.
Last date for submission of synopsis/outline of the topic – 25th Feb 2018
Acceptance intimation – 5th March 2018
Last date for Submission of PowerPoint Presentation – 10th March 2018
Email: prastuti2018@jimsindia.org
Registration Fees: NIL
Prize: INR 10,000 for each Track (Total 4 tracks)
Visit Website – https://jimsindia.org/prastuti2018/
JIMS Rohini is conducting Faculty Development Program on "Computing Technologies - A Panoramic View" from 27th Nov to 4th Dec 2017. The main focus of FDP is to upgrade the teaching, training and research methods of IT Faculty.
JIMS Rohini successfully conducted MDP on 'Managing Conflicts at Workplace' for Corporates and Alumni under the supervision of Prof. S.C. Kapoor and Dr. Neelam Dhall on 18th September 2017. Visit Website - http://www.jimsindia.org/
JIMS PGDM-RM is a Dual Specialization (Major) course which provide opportunities to choose from any one:-
Retail Management + Marketing.
Retail Management + HR
Retail Management + Entrepreneurial E-Commerce.
For Admission Enquiry Visit Website
https://jimsindia.org
Helpline : +91-9871097501
JAGAN INSTITUTE OF MANAGEMENT STUDIES
3, Institutional Area, Sector-5, Rohini
(Near Rithala Metro Station), Delhi-110085.
JIMS Rohini News - Jagan Institute of Management Studies, Rohini, Delhi is organizing International Conference (ICAMP 2017 ) “Confronting the VUCA World: Strategies for Growth and Excellence” on Saturday, February 11, 2017 at JIMS Rohini
The conference covers various themes in Marketing, Finance, Human Resources and Operations and is expected to be attended by participants from India and abroad including consultants, academicians, professionals and research scholars.
We are enclosing herewith the conference brochure for your ready reference.
We invite you to submit original unpublished research papers or case studies for the conference as per the tracks mentioned in the brochure which are indicative and not exhaustive. Authors may also submit papers on other relevant and contemporary topics.
https://www.jimsindia.org/icamp2017/
JIMS Rohini News - Jagan Institute of Management Studies Rohini Sector 5 is one of Best B School in India. JIMS Rohini PGDM, PGDM IB, PGDM RM Admissions are open for Session 2017-19. The Eligibility Criteria is valid Scores in CAT/MAT/XAT/CMAT/ATMA* .
Visit JIMS Rohini Website http://www.jimsindia.org/
JIMS Rohini Conclave 2016 "Digitalization of Businesses: Promises and Perils’JIMS Rohini Sector 5
We are pleased to invite you to the JIMS Conclave 2016 on the highly relevant theme of ‘Digitalization of Businesses: Promises and Perils’.
Date: Saturday, 10th December, 2016
Time: 9.30 am – 5.00 pm
Venue: Lakshmipat Singhania Auditorium, PHD House,
4/2, Siri Institutional Area, New Delhi
Session Topics:
• Digitalization-Stakeholders perspective : Inaugural
• Insights into Digital Markets : Session - I
• Digital Transformation at Workplace : Session - II
In case you wish to invite guests from the Corporate / Academia, kindly forward the invitation to them and confirm their particaption to us, in advance.
Visit Website
http://www.jimsindia.org/
JIMS Rohini News - Introduction to Derivatives by Mr. N.P. Singh (Associate Professor - JIMS Rohini Sector 5) - PGDM Programme . Derivatives are defined as contracts which derive their value from an underlying asset.
- Stock
- Index
- Commodity
- Currency
- Interest Rate or
- Any other asset
Jagan Institute of Management Studies has evolved as an institution of excellence and commitment in the field of Management and Technical education. The institute from the very outset focused on professional studies at the Post- Graduate level with a view to tap, direct and channelize the enormous talent pool in the country. We offer Post Graduate Diploma in Management (PGDM) (two year - Full Time and three year - Part Time).
Top Management College - JIMS Rohini News - Data Collection - PGDM - BBA - ...JIMS Rohini Sector 5
Top Management College - JIMS Rohini News - PGDM Programme is renowned for its extensive and in depth coverage of core and specialized courses, creating innovation and entrepreneurial qualities. The Programme is approved by the All India Council for Technical Education (AICTE), Ministry of HRD, Government of India and accredited from National Board of Accreditation (NBA) for excellence in quality education. PGDM has also been granted equivalence to MBA degree by Association of Indian Universities (AIU).. In our PGDM programme, we offer following specializations, spanning over two years; It is designed to provide students with first-hand experience of corporate culture.
Marketing
Finance
Human Resource
Operations
Students pursuing management course can opt for a dual specialization in any of the above streams.
Post Graduate Diploma in Management - JIMS Rohini Admissions Open 2016 - JIMS...JIMS Rohini Sector 5
JIMS Rohini News- PGDM ( Management ) programme is a Two-Year Full Time program approved by All India Council for Technical Education (AICTE) and has also been granted equivalence to MBA degree by the Association of Indian Universities (AIU).
Visit Website For More Updates
http://www.jimsindia.org/
Replacement Problem - Dr. Bhupender SOM - JIMS Rohini Faculty PresentationJIMS Rohini Sector 5
JIMS Rohini News, PGDM Admissions, PGDM -IB, PGDM-RM.
The efficiency of all industrial and military equipments deteriorates with time. Sometimes the equipment fails completely and effects the whole system. The maintenance costs (running costs) of an equipment also go on increasing with time. Thus it becomes more economical to replace the old equipment with a new one. Hence there is a need to formulae a most economical replacement policy which is in the best interest of the system.
JIMS Rohini PGDM-IBAdmissions Open - PGDM IB is a unique program that blends theories & practices in business, specially designed to nurture managers for the ever increasing demands in domestic as well as international market. It is designed to develop the capabilities and resources of managers in the global economy. It encompasses aspects such as globalisation and the impacts of the global environment on organisations, trade and trade policy, foreign direct investment, strategies of international firms, strategic alliances and exporting, and international management, including cross-cultural and international human resource management.
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
The French Revolution Class 9 Study Material pdf free download
JIMS Rohini IT Flash Monthly Newsletter - October Issue
1. 1
Data is increasingly cheap and ubiquitous. We are now
digitizing analog content that was created over centuries
and collecting myriad new types of data from web logs,
mobile devices, sensors, instruments, and transactions.
IBM estimates that 90 percent of the data in the world
today has been created in the past two years.
The rise of "big data" has the potential to deepen our
understanding of phenomena ranging from physical and
biological systems to human, social and economic
behavior.
Let’s understand the term “DATA
SCIENCE”
Data science is an investigation of where data originates
from, and how it can be transformed into a significant
resource, how it can be beneficial to the fields like
business examination that consolidates software
engineering. Data Science includes utilizing techniques
and numerous algorithms to investigate massive
measures of information and to concentrate learning
from them. Mining a lot of structured and unstructured
information can help an organization get control over
costs, increase operational efficiency, perceive new
market trends and increment the organization's upper
hand.
“DATA SCIENCE PROCESS”
In data science, various components are involved such as
organisation of data, packaging of data and delivering of
data .Organising is the first most phase in which physical
location and structure of the data is planned and then
executed. Packaging is where prototypes are constructed,
the statistics are performed and the visualization is
produced. Delivering is the last most phase where results
gets placed and value of the various operations are
obtained. However, what separates data science from all
other existing roles is that they also need to have a
continual awareness of What, How, Who and Why. A
data scientist needs to know what will be the output of
the data science process and must have a clear vision to
this output. A data scientist needs to have a clearly
defined plan as to how this output is required to
October 2016, Issue-2
IT Flash Newsletter
be achieved within the constraints of available
resources and time. A data scientist needs to deeply
understand who are the people that will be involved
in creating the output and most of all the data
scientists must know why there is a motivation
behind attempting to manifest the creative
visualization.
In this highly competitive world of business, data is
an invaluable resource. Almost all major business are
data-driven i.e. they’re collecting the enormous
amount of data and the conclusions they are drawing
out of that data. This whole process starts with the
process of collection of raw facts and figures
generated from the business operations. As the data is
huge and scattered, it is processed or mined so that
cleaned data set is obtained. After the cleaning
process, data is clustered and analyzed so that these
data patterns could make sense. After analyzing the
data, data is then visualized in the form of statistical
reports and predictive analysis is done on the basis of
these reports. Thus, these statistics are used to base
the company’s decisions, define market scope,
products for the business or may be suitable or
targeted customers for the business.
TOOLS AND TECHNIQUES USED IN DATA
SCIENCE
Data that is handled by the data scientists is not small,
we’re talking here about big data (both structured and
unstructured). Thus, to handle this data, multiple
technologies are used as data science is not a single step
process and has different technical aspects and
requirements at every step. Some of the technologies
and techniques used in data science are:
DATA SCIENCE “PROCESS AND ITS TOOLS”
2. 2
visualization of data after the cleaning
and mining of data is done. It is very
famous among data scientists as it
provides thousands of extension packages
that are needed for statistical modeling of
data. Companies related to finance, health
care, marketing business, etc. use R
language for analysis. Currently
companies like Bing, Facebook and Bank
of America are using R for analysis.
E) Scala – Scala programing language has
become increasingly popular in data
mining because it can perform both object
oriented (OOP) and functional
programming. Companies like
FourSquare, LinkedIn, Siemens and
Twitter are using Scala language.
F) Excel – Excel is a widely available tool
that can perform highly sophisticated
analysis of data. Though it is not capable
of analysis of massive data as compared
to Hadoop but it is powerful enough for
small scale analytic projects which
include clustering, optimization and
predictive analysis using supervised
machine learning.
A) Hadoop –Basically, Hadoop is an open
source software designed for managing the
storage and utilization problems of the big
data by bringing the analytics to the data
for processing by using powerful
functionalities like MapReduce.
Prominent users of Hadoop are Facebook
and Yahoo.
B) Spark – Spark is a framework based on
clustered computing. It has the ability to
run over Hadoop file system and
overcome the speed related problems of
traditional MapReduce by providing data
parallelism and in memory storage instead
of disk making analysis faster.
C) Python – Python is a high level language
which provides excellent libraries for data
science. Some of these libraries are Scipy
and Numpy for statistic modelling, Orange
and Pattern for data mining, Scikit library
for machine learning, etc. Python has
attracted users like EverNote and Spotify.
.
D) R Language – R is a famous software
package which is used to perform
mathematical operations and the
G) SAS – SAS or Statistical
Analysis System is a data
mining software suite used
for data science features like
data management, advanced
analytics and social media
analytics. It uses its analytics
features for quality predictive
modeling of data and
visualization. Despite being
very costly tool, it is very
famous among the data
scientists due to its
integration with open source
tools like R, Python and
Hadoop. Thus, making it a
very powerful tool for data
science
Apart from these techniques
and technologies, many other
technologies are used like IBM
SPSS, A/B Testing,
Optimizely, Maxymyser,
Clojure language, Java
language, Adobe Target, etc.
-Komal Jaiswal and Nitin Jain-
MCA- I and IInd Year
“AI- NIGHTMARE MACHINE KNOWS WHAT SCARES YOU”
The idea of artificial intelligence (AI) —
autonomous computers that can learn
independently. Those individuals
probably wouldn't find it reassuring to
hear that a group of researchers is
deliberately training computers to get
better at scaring people. The project,
appropriately enough, is named
"Nightmare Machine." Digital
innovators in the U.S. and Australia
partnered to create an algorithm that
would enable a computer to
understand what makes certain images
frightening, and then use that data to
transform any image, no matter how
harmless-looking, into the stuff of
nightmares.
Images created by Nightmare Machine
are unsettling. Iconic buildings from
around the world appear eroded and
distorted within shadowy settings or
amid charred and smoldering
landscapes, glimpsed through what
appears to be murky, polluted water or
toxic gas clouds.
Nightmare Machine's faces are equally
disturbing. Some of the subjects are
almost abstract, but subtle — creepy
suggestions of hollow eyes, bloody
shadows and decaying flesh still cause
unease. Even the lovable Muppet
Kermit the Frog emerges from the
process as a zombie-like creature that
would terrify toddlers and adults, too.
The primary reason for building
Nightmare Machine was to explore the
common fear inspired by intelligent
computers. They wanted to playfully
confront the anxiety inspired by AI,
and simultaneously test if a computer
is capable of understanding and
visualizing what makes people afraid.
The designers used a form of artificial
intelligence called "deep learning" —
a system of data structures and
programs mimicking the neural
connections in a human brain.
"Deep-learning algorithms perform
remarkably well in several tasks
considered difficult or impossible,"
The research group's main goal is to
understand the barriers between
human and machine cooperation.
Nightmare Machine could use your
help to learn how to become even
scarier.
3. 3
megha.gupta@jimsindia.org“DDoS ATTACK THAT DISRUPTED INTERNET WAS LARGEST OF ITS KIND IN
HISTORY”
Friday, 21st October 2016
On Friday, 21st
October 2016, When
people of Europe and America having
their prime time for casual news,
reading, tweeting etc.. but some of them
had trouble in accessing their usual sites
and services that day. Similar problems
were reported across the globe where
their servers of Dyn, a company that
controls much of the internet’s domain
name system (DNS) infrastructure were
accessed and on investigation, it was
found that the problem was due to to
Distributed Denial of Service attack
(DDoS).
A Distribute Denial of Service
(DDos) attack is an attempt to make
an online service unavailable by
overwhelming it with traffic from
multiple sources.
The cyber-attack that brought down
much of America’s internet on 21st
October, 2016 was caused by a new
weapon called the Mirai botnet and
is likely the largest of its kind in
history.
It was remained under sustained
assault for most of the day, bringing
down sites including Twitter, the
Guardian, Netflix, Reddit, CNN
and many others in Europe and the
US.
The cause of the outage was a
Distributed Denial of Service
(DDoS) attack, in which a network
of computers infected with special
malware, known as a “botnet”,
were coordinated into bombarding
a server with traffic until it
collapsed under the strain
Mirai was the “primary source of
malicious attack traffic”.
Unlike other botnets, which are
typically made up of computers, the
Mirai botnet is largely made up
of so-called “Internet of Things”
(IoT) devices such as digital
cameras and DVR players.
Because it has so many internet-
connected devices to choose from,
attacks from Mirai are much larger
than what most DDoS attacks could
previously achieve. Dyn estimated
that the attack had involved
“100,000 malicious endpoints”,
and the company, which is still
investigating the attack, said there
had been reports of extraordinary
attack strength of 1.2Tbps.
Sumedha Sen and Tanisha Jain
BCA-IInd Year and MCA-Ist year
“ONLINE PRIVACY MAY BE BOOSTED BY US FCC DATA RULES”
28th
October 2016,
Earlier, customer’s personal
information can be easily shared by
the Internet Service Provider with the
Ad agencies without seeking their
consent and customer starts getting
emails of the product which is not of
their interest. Now, customer can
easily get rid of from at least some
online tracking easily by new
approved rules. On 27th
October 2016,
The Federal Communications
Commission approved rules that
Internet service provider like
OOSTED BY NEW US FCC
DATA RULES
ONLINE PRIVACY MAY
Comcast, AT&T and Verizon
need to ask customers' permission
to use or share much of their data
with third parties like advertisers.
According to the FCC's new rules,
The internet service providers will
be required to get a customer's
explicit consent before they can
use or share "sensitive" personal
information. Sensitive data
includes browsing history, mobile
location data, TV viewing history,
call and text message records, and
mobile apps data we use.
The rules also require service
providers to spell out to consumers
what data they collect and why. It
requires service providers to notify
customers of data breaches. It's the
consumers' information, not the
network's, unless the consumer
gives permission"- FCC Chairman
Tom Wheeler said during a press
conference. "Internet Service
E PRIVACY MAY BE
Providers shouldn't be able to sell
something that isn't theirs without
customer’s permission”. This could
potentially make it harder for Ad-
agencies to build advertising businesses
that could serve as competitors to Google
and Facebook. Google and Facebook-
digital-ad behemoths are not covered
by the new FCC rules.
Cable and phone companies want to
increase revenue from ad businesses of
their own - AT&T has said increasing
advertising tailored to customers'
preferences is one of its goals with its
$85.4 billion purchase of HBO, CNN
and TBS owner Time Warner. Verizon
has bought AOL and agreed to buy
Yahoo in order to build up a digital-ad
business.
FCC officials approved the said rules in
the last week of October, 2016 and these
rules will pose new challenges for
companies like HBO, CNN, and Time
Warner.
RULES
ONLINE PRIVACY MAY BE
4. 4
“MAKE YOUR PASSWORD HACK PROOF BY SENDING IT THROUGH YOUR BODY”
When wireless signals are sent
through the air, there is a possibility
that they can be intercepted by
a hacker. If this wireless
communication contains sensitive
information like a password, this is
particularly concerning.
When we send a wireless
WiFi signal, it’s broadcasting every-
-where and any eavesdropper wifi
channel can hack into the stream and
try to break that encrypted password.
“Fingerprint sensors have so far
been used as an input device. It can
be shown for the first time that
fingerprint sensors can be re-
purposed to send out information
that is confined to the body,” said Dr.
Shyam Gollakota, UW Assistant
Professor of Computer Science and
Engineering.
These “On Body Transmissions”
offers a more secure way to transmit
authenticated information between
devices that touch parts of the body
such as a smart door lock or wearable
medical device and a phone or device
that confirms your identity by asking
you to type in a password.
Let’s say if one wants to open a door
using an electronic smart lock then one
can touch the doorknob and touch the
fingerprint sensor on his/her phone and
transmit his / her secret credentials
through his /her without leaking
that personal information over the
air.”
The research team tested the
technique on iPhone and other
fingerprint sensors as well as
Lenovo laptop trackpads and the
Adafruit capacitive touchpad.
The research team from the
UW’s Networks and Mobile
Systems Lab systematically
analyzed smartphone sensors to
understand which of them
generates low-frequency
transmissions below 30 megahertz
that travel well through the human
body but don’t propagate over the
air.
The researchers found that
fingerprint sensors and touchpads
generate signals in the 2 to 10
megahertz range and
employ capacitive coupling to
sense where your finger is in space
and to identify the ridges and
valleys that form unique
fingerprint patterns.
“UNKNOWN FACTS IN IT”
The Password for the computer
controls of nuclear tipped missiles of
the U.S was 00000000.
The first 1 GB hard disk was announced
in 1980 which weighed about 550 pounds
and had a price tag of $40, 000.
The first microprocessor created by Intel
was the 4004. It was designed for a
calculator.
The 30th
of November is known as
“Computer Security Day”.
Hewlett Packard was started at garage
in Palo Alto in 1939.
The First Computer mouse was
invented by Doug Englebart in around
1964 and was made of wood.
Incharge: Ms. Chandni Kohli Editorial Team: Dr. Praveen Kumar Gupta
Mr. Sanjive Saxena