010415 fitag times news paper

Page 1

For Space Booking in

FITAG ITAG TIMES Sejal: 9824053863 Dhaval: 9824066111

Dear Fitagians, Greetings!!! am not able to understand what will happed to Information Technology as a business as well as on the whole. Suddenly our courts declare that the every Indian citizen has a right to express freely on the social media over the Internet. On the other hand talks are initiated of withdrawing Net Neutrality in India. According to wikipedia the defination of Net Neutrality is very interesting. “Net neutrality (also network neutrality, Internet neutrality, or net equality) is the principle that Internet service providers and governments should treat all data on the Internet equally, not discriminating or charging differentially by

I

Mr. Kaushik Pandya Editor

user, content, site, platform, application, type of attached equipment, or mode of communication.” Now, why should we be concerned on these two points. The pity of Indian cyber world is that with the vast expanse of mobile connectivity the usage of Internet has increased drastically. People from remote upcountry area also have started utilizing mobile Internet and through it the social media. How can there be a restrictions on expressing your opinion in public media or on

continued on page 7...

01 04 2015

Vol. 2, Issu No. 8, Page 8

For Space Booking in

Wednesday

Ahmedabad, Gujarat

Monthly Edition

FITAG ITAG TIMES

ITAG

fitagtimes@fitag.in

-Editorial

www.fitag.in

FLOURISH KNOWLEDGE NETWORKING POWER PROTECTION

fitagtimes@fitag.in Sejal: 9824053863 Dhaval: 9824066111

The Law, Social Media and Freedom of Speech

S

ocial media offers huge opportunities for freedom of expression. Individuals are able to see their thoughts traverse the globe in an instant; news – and its interpretation – is not automatically dependent on the filtering process of the media, or of government. The freedom of expression on Internet is a crucial challenge to address in formulat-

ing inclusive information society. Yesterday, the Supreme Court said that no person should be arrested for posting objectionable comments on social networking sites without taking prior permission from senior police officials. The apex court, which refused to pass an order for a blanket ban on the arrest of a person for making objection-

able comments on websites, said state governments should ensure strict compliance of the Centre’s January 9 advisory which said that a person should not be arrested without taking permission from senior police officials.

“We direct the state governments to ensure compliance with the guidelines (issued by Centre) before making any arrest,” a bench of justices B S Chauhan and Dipak Misra said. Constitutional validity of section 66A of IT Act It said the court cannot pass an order for banning all arrest in such cases as operation of section 66A (pertaining to objectionable comments) of the Information Technology Act has not been stayed by the apex court which is examining its constitutional validity. The advisory issued by the Centre says that, “State governments are advised Contined on on page page-2 continued 3...


ITAG Times

Articals

FLOURISH KNOWLEDGE NETWORKING POWER PROTECTION

www.fitag.in Wednesday

01 04 2015

2

Understanding Net Neutrality in India N

et neutrality (also network neutrality, Internet neutrality, or net equality) is the principle that Internet service providers and governments should treat all data on the Internet equally, not discriminating or charging differentially by user, content, site, platform, application, type of attached equipment, or mode of communication. The term was coined by Columbia University media law professor Tim Wu in 2003 as an extension of the longstanding concept of a common Since the very beginning of Internet, the idea of ‘Open Internet’ has always been promulgated and has always been instrumental in the seeding various inventions and innovations that we have been able to see till this date. Not just the idea of Open Internet, but

are intelligent. As an e.g. we can state that when there are two or more involved in a written conversation then the medium of language should be common to all the participants, however the person involved in transporting these messages i.e. the Courier, need not have the knowledge of deciphering the contents. In this case, the Third Entity is the physical cable and they are the ones who do not understand what is being transmitted and received but none the less has the inherent duty of facilitating the transmission. Their only concern is ensuring that the delivery of data takes place between Point A and Point B. The point over here is that the Courier Company charges with respect to the weight and size of the parcel and not with

want a larger share of the data pie by simply categorizing the data-as-a-service. Taking control of the endpoints, what is being offered, how it is being offered, who can access this data, etc. In much simpler terms, let us for the sake of argument categorize a few of the services as follows: * Streaming Video: Youtube, Skype’s Video Calling * Streaming Audio: Online Radio Channels, Viber’s Internet Calls Now, the fact is Telcos have always been charging for Internet access based on the bandwidth used and had various financial plans for its customers based on bandwidth usage. They also came up with rate-limiting, i.e. offering slower speeds when the Fair Usage policy

also the thought of Free speech has been fiercely advocated. However, due to these very technological innovations, the business paradigm for Telco’s shifted and they started feeling the pinch in the most unlikely areas i.e. the Data which travels through their Dumb Pipes. Dumb Pipes is a notion wherein the physical cable which carries the data has not computation ability and it is only the endpoints that

respect to the contents. It is simply not their concern. Telcos, until recently have been acting like couriers, but seems like they

terms were violated. This means that the customer ended up utilizing more data in terms of MBs and GBs than what was provisioned. So far so good, as telcos along with couriers were on par with each other as far providing a neutral service is concerned. The present day marvels of technology are such that you can avail the service for free while the same service can be offered by someone else for a small

price, Internet offers innovations and also a choice to its users. However, this is all set to change with the views of TRAI’s which were presented in form of a consultation paper. If the Telcos and TRAI along with the Government of India, have it their way,

then every one of us will be charged for the services available through internet, which we are trying to access or utilize. This is where Net Neutrality comes into the picture. TRAI’s consultation paper encourages Pay-Percontinued on page 7...


ITAG Times Continued from page 1...

that as regard to arrest of any person in complaint registered under section 66A of the Information Technology Act, the concerned police officer of a police station may not arrest any person until she/he has obtained prior approval of such arrest from an officer, not below the rank of inspector general of police (IGP) in metropolitan cities or of an officer not below the rank of deputy commissioner of police (DCP) or superintendent of police (SP) at district level, as the case may be.” In fact, section 66A of IT Act is a potential tool in the hands of rulers to curtail the voice of opposition. It is fatal for the freedom of speech of netizens in general and the press in particular. The Indian Penal Code and other provisions of the IT Act, especially after the 2008 amendment, provide enough safeguards against defamation, intentional insult leading to breaking the peace, incitement to commit offence, etc. Political criticism always causes some annoyance to someone. Ruling party and Opposition members routinely say unflattering things about each other. Should they be charge sheeted, too? The basic idea behind freedom of speech is to allow divergent critical views without looking into whether people are annoyed or inconvenienced. Recent Cases The petition was also filed regarding the arrest of a Hyderabad-based woman activist, who was sent to jail over her Facebook post in which certain “objectionable” comments were made against Tamil Nadu Governor K Rosaiah and Congress MLA Amanchi Krishna Mohan. After filing of the petition, she was released by a district court at Hyderabad. Jaya Vindhayal, the state general secretary of People’s Union for Civil Liberties (PUCL), was

Articals

FLOURISH KNOWLEDGE NETWORKING POWER PROTECTION

arrested on May 12 under section 66A of the IT Act for the “objectionable” post. According to the police, she had also allegedly distributed pamphlets making objectionable allegations against Rosaiah and Mohan before posting the comments online. The matter was mentioned before the bench by law student Shreya Singhal, seeking an urgent hearing in the case, saying the police is taking action in such matters even though a PIL challenging validity of section 66A is pending before the apex court. She had filed the PIL after two girls – Shaheen Dhada and Rinu Shrinivasan – were arrested in Palghar in Thane district under section 66A of IT Act after one of them posted a comment against the shutdown in Mumbai following Shiv Sena leader Bal Thackeray’s death and the other ‘liked’ it. On November 30, 2012, the apex court had sought response from the Centre on the amendment and misuse of section 66A of IT Act and had also directed the Maharashtra government to explain the circumstances under which the 21-year-old girls were arrested. Pursuant to the notice issued by the apex court, the Centre had informed it that the controversial provision in the cyber law under which two

girls were arrested for Facebook comments did not curb freedom of speech and alleged “high handedness” of certain authorities did not mean that it was bad in law. Rights vs. Responsibilities There is also a trend visible that business interest are increasingly protected for the reason of copyright by developed countries, with freedom of expression and free flow of information sacrificed. Freedom of expression needs to be promoted with legitimate limitations and in balance with other digital rights within an expanded legal and regulatory framework. There are challenges to deal with liability of intermediaries and governmental surveillance which might undermine freedom of expression. The ubiquity of the technology goes hand-in-hand with the ubiquity of social media. But with rights come responsibilities. Unchecked, social media can also allow disinformation, slander, racism, incitement to hatred, victimisation and a catalogue of ills, some – obviously – more serious than others. If something incites violence or racism, then it should be prosecuted, regardless of whether it is said in front of physical people or their virtual avatars. But drawing this line is no easy matter. <

www.fitag.in Wednesday

01 04 2015

3

FITAG in now on Facebook. Please like Fitag Page https://www.facebook.com/Fitag23

Fitag thanks all member associations to support antipiracy drive & authorize FITAG to deal in this regard in future. FITAG exe. committee

itag Times reaches to

21,000 retailers / dealers across Gujarat


ITAG Times

Articals

FLOURISH KNOWLEDGE NETWORKING POWER PROTECTION

www.fitag.in Wednesday

01 04 2015

4

Viruses on Android are rare, but they exist. Here's a simple way to remove a virus from Android if you believe you are infected

I

f you believe your Android phone or tablet has a virus then the good news is it's really easy to delete. Here's how to remove a virus from Android. Also see: Best Android antivirus First of all, it's worth pointing out that it's unlikely that your Android phone or tablet has a virus. What you're more likely to be seeing is an ad that wants to convince you Android is infected and you need to download an app, or a dodgy pop-up, or perhaps your device is just misbehaving. But viruses for Android do exist. If you're sure your device has one, here's how to remove it. All Android viruses are delivered via apps installed on your device, so if your phone or tablet doesn't already have a virus, the best way to avoid it getting one is to never install software outside of the Google Play app store. Open your Settings menu, look for the Security option, then ensure the option for Unknown Sources (allow installation of apps from unknown sources) is disabled. Also see: Security Advisor If you're determined to install an app from outside

Google Play, do your research. Check its permissions (does a video player really need to see your contacts?), look online for reviews and have a good look at the developer's site to see what else it offers.

stalled or shouldn't be running on your device. Step 3. Tap on the malicious app (clearly it won't be called 'Dodgy Android virus', this is just an illustration) to open the App info page, then click Uninstall. In most cases, this is all you need to do to remove the virus, but occasionally you

How to remove a virus from Android: Delete a virus from your Android phone or tablet You can also install an antivirus app, and plenty of free Android antivirus apps are available that are able to detect and remove malicious apps, for example 360 Mobile Security, Avast and Lookout. These all include an app scanner that will seek out anything dodgy, but note that these apps can also trigger false-positives - reporting an app you've been using for months as malware when you know it's fine. In most cases you can simply ignore

these alerts. If you believe you already have a virus on your Android phone or tablet perhaps one that is resisting your attempts to uninstall the associated app or even let you bypass the lock screen a factory reset will remove

it, returning your device to its out-of-the-box state. But doing so also means you'll lose everything on your phone that's not backed up. Instead, follow the below steps to remove a virus from Android. How to remove a virus from Android Step 1. Put your phone or tablet into Safe mode. This prevents any third-party apps running, including any malware. On many devices you can press the power button to access the power off options, then press and hold Power off to bring up an option to restart in Safe mode. If this doesn't work for your device then you should Google 'How to put [your model name] into Safe mode' and follow the instructions. When in Safe mode you'll see 'Safe mode' at the bottom left of the screen. Step 2. Open your Settings menu and choose Apps, then make sure you're viewing the Downloaded tab. If you don't know the name of the virus you think has infected your Android phone or tablet, go through the list and look for anything dodgy-looking or that you know you haven't in-

might find the Uninstall button is greyed out. This is because the virus has given itself Device administrator

status. Step 4. Exit the Apps menu and tap on Settings, Security, Device Administrators. Here you'll find a list of any apps on your phone or tablet with administrator status. Simply untick the box for the app you want to remove, then tap Deactivate on the next screen. You should now be able to return to the apps menu and remove that app. Step 5. With the virus now off your Android phone or tablet, all you need to is restart the device to take it out of Safe mode. Now that it's working correctly it's a good time to back up whatever important data you have stored on the device,

and install an Android antivirus app to protect you from any future viruses that come your way. <


ITAG Times

Articals

www.fitag.in

5

MkkÞçkhMkVh yk¾hu yk FLOURISH KNOWLEDGE NETWORKING POWER PROTECTION

Wednesday

01 04 2015

y¾ƒkh{kt yk…ýu ðkhtðkh õkuE ÔÞrfŒyu 3-ze r«Lx õhe™u „™ ƒ™kðe õu yk¾e õkh ƒ™kðe õu …Ae yk¾uyk¾wt rƒÂÕzt„ ƒ™kÔÞwt yuðk ‚{k[kh ðkhtðkh ðkt[eyu Aeyu. õ{™‚eƒu yk ‚{k[khku{kt 3-ze r«ÂLxt„ ¾hu¾h þwt Au yu rðþu ¾k‚ M…üŒk nkuŒe ™Úke.

‚k

Ëk þçËku{kt õneyu Œku rzrsx÷ rzÍkR™{ktÚke rºk…rh{krýÞ yux÷u õu Úkúe zkÞ{uLþ™÷ ™¬h y™u ðkMŒrðõ ðMŒwyku ƒ™kððk™e «r¢Þk 3-ze r«ÂLxt„ Œheõu yku¤¾kÞ Au. yk¾e ðkŒ™u yíÞtŒ ‚kËe heŒu ‚{Syu Œku yu{ õne þõkÞ õu su{ yk…ýu õBÃÞwxh{ktÚke õkuE ðzo zkufâw{uLx™e r«Lxh™e {ËËÚke õk„¤ …h r«Lx ÷Eyu, õtEõ yuðe s heŒu yk…ýu Äkheyu Œku õBÃÞwxh{kt yûkhÄk{ {trËh™wt 3ze {kuzu÷ ƒ™kðe™u Œu™wt ykƒunqƒ 3-ze {kuzu÷ r«Lx õhe þõeyu Aeyu. yk…ýu õk„¤ …h …ºk™e su r«Lx õkZeyu Aeyu Œu xw-ze nkuÞ Au. yux÷u õu yuõ s ‚…kxe …h Œu{kt Ak…õk{ ÚkkÞ Au. ßÞkhu yûkhÄk{™k 3-ze r«Lxuz {kuzu÷{kt õkuE ykrõoxufxu ƒ™kðu÷k

rƒÂÕzt„™k {kuzu÷ suðwt {kuzu÷ ‘r«Lx' õhe þõkÞ Au. yk heŒu ÚkŒk r«ÂLxt„{kt …ý yuõ heŒu Œku yûkhÄk{ {trËh™kt ‚tÏÞkƒtÄ xwze ÷uÞh™e r«Lx ™eõ¤u Au su yuõƒeò …h „kuXðkE™u yk¾wt 3ze {kuzu÷ ŒiÞkh ÚkkÞ Au. yk{ Œku 3-ze r«ÂLxt„™ku <‚uÃx ™ðku ™Úke. 1990™k ËkÞõk{kt [õ n÷ ™k{™k yuõ ‚tþkuÄõu ÂMxheÞkur÷Úkku„úkVe ™k{u yku¤¾kŒe yuõ xuõT™ku÷kuS™k … uxLx {u¤ÔÞk su ‚kur÷z R{u®s„ Œheõu …ý yku¤¾kÞ Au. …AeÚke Œu{ýu 3-ze r‚MxB‚ E™ õku…kuohuþ™ ™k{™e yuõ õt…™e MÚkk…e y™u íÞkhÚke yk ûkuºku y™uõrðÄ ™ðkt ‚tþkuÄ™ku ÚkE hÓkkt Au. yíÞkhu 3-ze r«ÂLxt„ xuõT™ku÷kuS ‚{k[kh{kt hnuðk™wt õkhý yu Au õu yk xuõT™ku÷kuS™k W…Þku„ {kxu sYhe ‚kuVTxðuh y™u

nkzoðuh™e ®õ{Œ ½ýe ½xe hne Au y™u nðu {kuxe õt…™eyku s ™nª ÔÞrfŒ„Œ Äkuhýu …ý ÷kuõku 3-ze r«Lxª„ õhe þõu yu þfâ ƒLÞwt Au. ykÚke rðrðÄ õkh™kt ™k™k ™k™k {kuzu÷Úke {ktze™u yk¾e yk¾e õkh …ý 3-ze r«ÂLxt„Úke nðu ƒ™e þõu Au (yk heŒu õkh™wt ¾ku¾wt ƒ™u Au, õkh™wt yuÂLs™ y‚÷e s ðk…hðwt …zu Au!). 3-ze r«ÂLxt„™e {ËËÚke «kuMÚkurxõ r÷Bç‚ (yux÷u õu õ]rºk{ nkÚk…„) …ý ƒ™kðe þõkÞ Au y™u 3-ze r«ÂLxt„™k W…Þku„™e ‚t¼kð™kyku ¾hu¾h y‚e{ Au. 3-ze r«ÂLxt„ ¾hu¾h õuðe heŒu ÚkkÞ Au? 3-ze r«ÂLxt„™e þYykŒ {„s{kt sL{u÷k yuõ rð[kh MðYÃku ÚkkÞ Au. yk…ýu yûkhÄk{ {trËh suðe õkuB…÷uf‚ rzÍkR™™u ƒË÷u yuõ ‚kËk ™¬h ½™ ykõkh™k ƒkuf‚™e 3-ze r«Lx

ŒiÞkh õhðk™ku rð[kh õheyu. yk {kxu ‚kiÚke …nu÷kt yk…ý™u õuz (yux÷u õu ‚eyuze-õBÃÞwxh yuEzuz rzÍkR®™„) yÚkðk Œku õkuE …ý yur™{uþ™ {kuzu®÷„ õhe yk…Œk ‚kuVTxðuh™e sYh …zþu. yk ‚kuVTxðuh™e {ËËÚke yk…ýu yk…ýk ƒkuf‚™e ðåÞowy÷ ç÷q r«Lx yux÷u õu õBÃÞwxh{kt Ëu¾kŒwt

r«ÂLxt„ þwt Au?

3-ze {kuzu÷ ŒiÞkh õhðk™wt hnuþu. yk …Ae™k Mxu…{kt 3-ze {kuzu®÷„ ‚kuVTxðuh™e {ËËÚke yk… ýu yu 3-ze {kuzu÷™k ‚tÏÞkƒtÄ xwze ÷uÞh (rzrsx÷ ¢ku‚ ‚uõþL‚) ŒiÞkh õhe þõeþwt. yk ¢ku‚ ‚uõþL‚ rzrsx÷ r«Lxh {kxu yk¾k «kusufx™e „kRz Œheõu „hs ‚khu Au. yk…ýu ykðwt {kuzu÷ ŒiÞkh õhðk {kxu su ‚kuVTxðuh … ‚tË õÞowt nkuÞ Œu ‘ÔnkÍerð„' yux÷u õu ‘Ônkux Þw ‚e EÍ Ônkux Þw „ux' «õkh™k nkuÞ Au. yux÷u õu yk…ýu ÂM¢™ …h su òuEyu yu s ðMŒw yk…ýu {u¤ðe þõeyu Aeyu. nðu y÷„ y÷„ ‚kRx …hÚke 3-ze {kuzu®÷„™k «kusufx {kxu ŒiÞkh rzÍkR™ …ý ¾heËe™u zkW™÷kuz õhe þõkÞ Au. yuõðkh yk rzÍkR™ ŒiÞkh ÚkE òÞ Œu …Ae yk…ýu Œu™u ¾k‚ «õkh™k 3-ze r«Lxh{kt {kuõ÷ðk™e ÚkkÞ Au. su{ {kR¢ku‚kuVTx ðzo™e VkE÷™wt yuf‚xuLþ™ nkuÞ Au Œu{ rzrsx÷ r«ÂLxt„ {kxu™e VkE÷™wt yuf‚xuLþ™ (‘ÂMxrhÞkur÷Úkku„úkVe' õu ‘MxkLzzo xu‚e÷uþ™ ÷Uøðus' {kxu ð…hkŒwt yuf‚xuLþ™) nkuÞ Au. ‚k{kLÞ heŒu õkuE …ý [es-

ðMŒw {uLÞwVuõ[h õhðk {kxu su … ØrŒ ð…hkÞ Au Œu ‘‚ƒxÙuÂfxð' Œheõu yku¤¾kÞ Au. yk …ØrŒ{kt hku-{xerhÞ÷™u õk…e™u òuEŒk ykõkh{kt ÷kððk{kt ykðu Au. ßÞkhu 3-ze r«ÂLxt„ ‘yuzexeð' {uLÞwVuõ[®h„ „ýkÞ Au. yux÷u õu Œu{kt hku-{xerhÞ÷™k òuEŒk ykõkh{kt rðrðÄ ÷uÞh {u¤ðe™u Œu{™u yuõƒeò …h yuz õhe™u,

W{uhe™u ÄkÞkuo ykõkh {u¤ððk{kt ykðu Au. yk…ýu ßÞkhu yk…ýe rzrsx÷ rzÍkR™ 3-ze r«Lxh™u {kuõ÷eyu íÞkhu yk…ýu sYrhÞkŒ {wsƒ hƒh, Ã÷kÂMxõ, … kur÷ÞwhuÚke™ õu õkuE {ux÷ suðwt {xerhÞ÷ …‚tË õhe þõeyu Aeyu. 3-ze r«ÂLxt„ {kxu™k

r«Lx‚o ½ýkt «õkh™k nkuÞ Au. … htŒw yk ƒÄk{kt {kuxk ¼k„u yk… ýu …‚tË õhu÷k {xerhÞ÷™u y{wõ [ku¬‚ heŒu yuõ Ã÷uxVku{o …h yk…ýe rzrsx÷ VkE÷{kt ‚q[ÔÞk {wsƒ™k ykõkh{kt …kÚkhðk{kt ykðu Au. òu Œ{u ykuV‚ux r«ÂLxt„™e … ØrŒÚke Úkkuzk {krnŒ„kh nþku Œku Œu{™u ¾ƒh nþu õu õk„¤ …h yk…ýu su rðrðÄ ht„ku òuE þõeyu Aeyu yu ƒÄk ytŒu VfŒ [kh õ÷h{ktÚke ƒ™u Au (‚eyu{ðkÞõu yux÷u MÞk™, {suLxk, Þ÷ku y™u ç÷uõ). ykuV‚ux r«ÂLxt„ ‚{Þu yk [khuÞ õ÷h ÞkuøÞ «{ký{kt, ÞkuøÞ søÞkyu …ÚkhkÞ Au y™u Œu{™k r{©ýÚke ÄkÞr rðrðÄ ht„ {¤u Au. 3-ze r«ÂLxt„{kt õtEõ yk s heŒu Ã÷uxVku{o …h yuõ …Ae yuõ ÷uÞh{kt {xerhÞ÷ …ÚkhkŒwt hnu Au. yk…ýe rzÍkR™ õux÷e õkuBÃ÷uf‚ Au y™u õux÷e {kuxe Au Œu™k ykÄkhu r«ÂLxt„™e yk «r¢Þk õ÷kõku ‚wÄe yÚkðk Œku rËð‚ku ‚wÄe [k÷e þõu Au. ykuV‚ux r«ÂLxt„{kt õk„¤ …h … ÚkhkŒk [khuÞ õ÷h õk„¤ …h yuõ yíÞtŒ …kŒ¤wt ÷uÞh ŒiÞkh

õhu Au. ßÞkhu 3-ze r«ÂLxt„{kt {xerhÞ÷™k y™uõ ÷uÞh …ÚkhkŒk nkuðkÚke Äe{u Äe{u yk…ýe rzÍkR™ 3-ze ykõkh ÷u Au. ‚k{kLÞ heŒu 3-ze r«Lxh™k ÷uÞh 0.1 r{÷e{exh sux÷kt …kŒ¤kt nkuÞ Au. 3-ze r«ÂLxt„™e þfâŒkyku y…kh Au …htŒw Œu™k ÔÞk…õ W… Þku„ ‚k{u nsw ½ýk «§kÚkkuo Au. <


ITAG Times

News CORNER

FLOURISH KNOWLEDGE NETWORKING POWER PROTECTION

Microsoft Office now available on Android tablets for free

T

aking yet another step towards ‘openness’, Microsoft has made its office suite available on Android tablets for free. This means that Microsoft

Word, Excel and PowerPoint applications can now be accessed on Android tablets at no cost. The Company has also released the Outlook email program for iPhones and iPads, with the aim of diverting more and more users towards this program. This is seen as a new attempt from Microsoft CEO Satya Nadella to attract mobile users to the company’s

products, which will help the company get ahead of Apple and Google. The new releases are the latest gambits in CEO satya Nadella’s attempt to

wrest back the initiative in the battle for mobile users, in which Microsoft has fallen behind Apple and Google. Nadella has adopted a different approach ever since he has taken over the position of the company’s CEO. He is credited with having broken the company’s tradition of exclusivity by releasing Microsoft office on Apple’s iPad, even before

it was available for Microsoft’s Windows devices. With this, Microsoft is attempting to create a wider user base for its Of-

fice suite, with the aim to further tempt users to subscribe to Office 365, which costs US$7 a month for personal users. The company offered test versions of Office Apps for Android for three months and released the final product last week. Microsoft Office for Android is available for download on the Google play store. <

www.fitag.in Wednesday

01 04 2015

6

Is Bill Gates in favour of Ubuntu Linux?

B

elieve it or not, Bill Gates is Promoting Ubuntu Linux! The Internet was abuzz when Gates published an image on his Facebook page along with a link to his website with a message, “15 years from now, most people in poor countries will be able to take classes online.” This goal sounds good and is achievable too. But what grabbed eyeballs is that the operating system shown on the image is ubuntu. Well, the message deserves more attention no doubt, especially when it comes fromer Microsoft CEO and founder of Windows, But what we sincerely wonder is whether this particular detail was just a mistake or has it been posted intentionally? After resigning from his position as CEO at Microsoft, Gates has dedicated his life to charity work, and has established a foundation to support several important projects like the global elimination of polio, malaria and some other dis-

eases that ravage populations in poor countries. It’s difficult to imagine the Windows OS being used in such poor regions, where people are struggling to buy basic necessities like daily food, shelter and clothes. In that case Ubuntu is a better choice as it’s available for free and can run on older computers too. Hence, we could conclude that the image has not been chosen randomly and that Bill Gates has intentionally promoted Ubuntu on his Facebook page. <

Constant Requirement Build-up Drive Indian Network Market

Google launches open source cloud benchmarking tool called PerfKit

A

G

ccroding to International Data Corporation (IDC), the Networking market in India witnessed growth quarter-onquarter as well as year-on- year. due to constant requirement build-up from different verticals in Q2 2014 According to IDC’s Apej Quarterly Switch and Router tracker, the Ethernet Switch market stood at USD 131.2 Million (in terms of end-user revenue)during Q3 2014 witnessing a growth of 2.1% quarter-on-quarter and 18.7% year-on-year. The router market, on the same lines, witnessed increase from previous quarter by 11.9% and stood at USD 76.5 Million, a 31.9% growth year-on-year.

Cisco retained its dominance in the Switch and Router market, increasing its revenue quarter-on-quarter. Major deals from communication and media vertical aided by orders from existing users and clientele were some of the main reasons for this growth. The WLAN market in India witnessed a 12.3% growth quarter-on-quarter and 25.4% year-on-year during Q3 2014, according to IDC’s Quarterly APej Wireless Lan tracker. <

oogle has launched an open source cloud benchmarking tool called PerfKit. Google has described the tool as an “...effort to define a canonical set of benchmarks to measure and compare cloud offerings.” Currently, the PerfKit tool supports Google’s own Compute Engine, Amazon’s AWS and Microsoft’s Azure clouds. Google has worked on the PerfKit project with a team of more than 30 researchers, various companies and customers. The team included people from ARM, Canonical, Cisco, Intel, Microsoft, Rackspace and Red Hat. There are some companies like CloudHarmony that offer cloud performance reports, though Google has pointed out that cloud performance evaluation is not an easy task. Perfkit can run around 20 benchmark tests regarding CPU performance, database and network benchmarks.

Google says that the tool can also test end-to-end time, and it will provision new resources in the cloud. There is also a visualisation tool, called PerfKit Ex-

plorer, which can compare the results. The industry believes that the launch of this open source benchmarking tool is a great move by Google. <


ITAG Times Continued from page 2...

Use Internet, however aren’t we been paying for Internet Access? This is where everything changes – You pay for the various services Internet has to offer. e.g.: If you use WhatsApp – pay different amount, for Skype something else, want to use Google Search then pay a small amount. However, in case your ISP has collaboration with BING, then you might get BING for free but you might be charged for accessing Google. A-La-Carte was a concept of Pay-Per-View Cable Television Channels however; we may very soon find this seeping into our broadband bills. Internet penetration in India is at 20% and overall due to her population way ahead of many countries. However India itself is lagging way too behind with respect to Bandwidth and Speed. the other hand, financially Telcos are highly stable when we look at Profitability vs Debt ratio. The only concern for Telcos is that various applications which users have been using until now is having a negative impact on the finances generated by SMS and International Calling and this is the only

Event CORNER

FLOURISH KNOWLEDGE NETWORKING POWER PROTECTION

reason which has been wrapped up with a host of other pain points like – licensing cost, adaptability and upgrading to newer technology. The magic mantra is adaptability but not at the cost of burdening the customers. TRAI in their consultation paper has touched upon privacy and data interception. Privacy laws have a very feeble existence in India and a case related to real-time Data Sharing between the Govt. of India and Blackberry has been referenced in the backdrop of 26/11. We believe that interception of data for ensuring national security needs to be exercised with furor and it is the duty of the Telcos and every organization to provide such information to the concerned government. However, blanket-wide interception is surely a big NO as it affects the privacy in general and stricter privacy laws need to be enacted. Telcos, on the other-hand, need to provide such mechanisms but not at the cost of burdening its customers. When the bandwidth prices are on par with global standards but imposing such restrictions just makes it worse for a country which is yet to see itself on par with other devel-

Continued from page 1... based on the quantum of the data you are utilizing. This is social media about some- absolutely ridiculous because thing happening in your own how would you know the concountry? Unfortunately, we tent of data would be so much had such a law implemented before you really start surfafter the terrorist attack in ing!! So you end up paying Mumbai, which is now being for differentially for various removed by the directives services. This is where everygiven by Supreme court of thing changes – You pay for India. This is a very positive the various services Internet action taken by the judiciary has to offer. e.g.: If you use and is highly welcome in a WhatsApp – pay different democratic country like India. amount, for Skype something On the other hand, Net neu- else, want to use Google trality is at stack. Telecome Search then pay a small companies want to increase amount!! Now, would you be their charges based on the able to digest the sharp incontent which you are surfing crease in the cost due to such not as per the current scene shift in the policy? According

www.fitag.in Wednesday

0104 2015

7

KUTCH IT SPORT DAY Kutch Zone IT Associations organized “Kutch IT Sports Day” to connect all IT Associations on a common platform. Gandhidham, Bhuj, Mundra, Anjar and Mandavi IT Associations cricket tems took part in this sports event. This event was organized on 15th March, 2015 at Bardiya Village. Gandhidham team won the championship trophy.

oped countries especially while providing a better network. We have just one question – Is providing Internet access to the citizens of India a privilege, a necessity or a duty? And interestingly, necessity is one aspect of life which has always been exploited commercially. <

to me Internet penetration will decline sharply from todays 20%. If government is really interested in upgrading their population in terms of the Internet education or utilization of the Internet, this idea should be stopped immediately. We have just one question – Is providing Internet access to the citizens of India a privilege, a necessity or a duty? According to us – we the computer learned people providing Internet to every citizen of India is a necessity as well as duty of every citizen of India as well as the Government of India. <

Disclaimer: This Magazine is for private circulation only. The data published in this magazine is based on the inputs provided by various sources. The publisher, printer and the Editor do not guarantee the authenticity of correctness of the data published here in. Publisher : Gaurang Vyas, President, Fitag Editor: Kaushik Pandya Assistant Editor : Sejal Patel Designer : Hardik Pancholi Address : B/302, Rudra Arcade, Nr. Helmet Circle, Memnagar, Ahmedabad - 380015. All rights reserved. No part of this publication can be reproduced without the prior permission from the publisher.


ITAG Times

Cartoon CORNER

FLOURISH KNOWLEDGE NETWORKING POWER PROTECTION

www.fitag.in Wednesday

01 04 2015

8


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.