For Space Booking in
www.fitag.in
01 06 2015
Vol. 2, Issu No. 10, Page 8
For Space Booking in
FITAG ITAG TIMES
Monday
Ahmedabad, Gujarat
Monthly Edition
FITAG ITAG TIMES
ITAG
fitagtimes@fitag.in Sejal: 9824053863 Dhaval: 9824066111 -Editorial Dear Fitagians, Greetings!!! FITAG has been working with other state level like minded bodies in the direction of forming a national all India body which can stand equal to MAIT or NASSCOM. You all very well know that FAIITA – Federation of All India Information Technology Associations – is formed keeping associations from all the 29 states and 7 union territories. The movement was initiated almost 6 months back and lots of activities like agitation against the OEM vendors in protest of their double standards for supporting OLS without considering the negative impact it may produce to channel business. This movement has produced one good result for sure that people from
Mr. Kaushik Pandya Editor
across India are now on a common platform and discussing the problem the fraternity is facing. IT vendors from North, East, West and South are now meeting each other and discussing the problems on a common platform. I have been an integral part of this entire exercise since the day it started. Although it is decided to form a formalized registered body, but I would like it to be termed as a movement, because it runs by volunteers. These kind of activities always reach to a wide spread movement, if it gets a proper leader
continued on page 3...
fitagtimes@fitag.in
FLOURISH KNOWLEDGE NETWORKING POWER PROTECTION
Sejal: 9824053863 Dhaval: 9824066111
The Challenges Of A New Internet Era Cloud computing, linking computing power in data centres with consumers and businesses online, has transformed how we work and play, forever. But internet companies face huge pressures to meet rising demand for data services, and the technology remains in its infancy. Leading tech provider Huawei has some of the answers.
T
o use an old analogy, of fairly limited value, the impact of cloud computing on IT is something like that of electricity networks on power generation. The idea, today, that any forward-looking business should retain vast physical IT infrastructure is akin to them keeping monolithic generators after the arrival of the electricity grid in the last industrial age. With the flick of a switch, most businesses and most users now have instant access to high-speed broadband connectivity and massive computing power. This virtualised resource, combining digital storage and processing power, is held in remote data centres, rather than localised server rooms or PC pedestals; it is delivered via the internet, or
‘cloud’, through a variety of overthe-top (OTT) platforms and services. This is the business model propagated by the likes of Facebook and Google in the consumer space, and by cloud platforms such as Amazon Web Services (AWS) and OpenStack, closed and open-source respectively, in the enterprise market. It informs all of our digital interactions and productivity today. In the past decade, data centres have grown rapidly, both commercially and technologically. Cloud computing has become more efficient and flexible with it. But demand for digital services is going up, all the time. Large internet companies re-
quire ever-more processing power. Consequently, the technology industry is required to find new solutions, even as it is finding its own feet. Because the rise of cloud computing and OTT services has put the industry in a spin. Technologies are still being mapped out, and business models and strategies are still being defined. Governments and large businesses tend to prefer the security of private clouds of their own, for instance, rather than public cloud platforms, which are the main recourse for SMEs and start-ups.
Contined on page-2
ITAG Times Continued from page 1...
INDUSTRIAL SHAKE-UP There are challenges with each: private clouds deliver better functionality, and public clouds offer superior performance. There is, as yet, no middle ground. Either way, users are focused on deploying virtualised computing resources via the cloud – or ‘infrastructure as a service’ (IaaS), to use its industry name. Which brings us to another major shake-up, standing in the path of progress. The old guard of technologists, the trusted vendors of the types of proprietary systems traditionally found on servers in large computer rooms, are at a crossroads; their market influence is under threat. Internet companies are already working on a grander scale with OTT providers, and enterprises are increasingly minded to take modular IaaS solutions supported by open-source cloud platforms. “Their power of discourse will be weakened. The golden days of ‘vendor lockin’, where non-standard technologies allowed them huge market share and high gross margins, are gone forever,” explains Huawei’s Wing Kin Leung, chief technology officer in Huawei’s marketing and solution sales department. “To survive, internet companies must adjust their entire business models, which constitute a radical change for them. Yet, such changes are nevertheless essential, and we look forward to their rebirth.” Huawei, a leading global information and communications technology (ICT) solution provider, is different to most other traditional vendors. Its business crosses the full technology chain, or what it calls “cloud, pipe and device”. It produces the platforms, networks and devices that connect this digital era, and this way takes a broad view of the developing market. Huawei has provided solutions to more than 300 internet companies and data centre service providers to
Articals
www.fitag.in Monday
FLOURISH KNOWLEDGE NETWORKING POWER PROTECTION
handle the doubled-edged pressure of reconceiving and rebuilding their business operations. Its focus, for all its customers, is to improve the underlying technological systems to deliver better operational efficiency, agility and flexibility. UBIQUITOUS BROADBAND On the one hand, this is about straight connectivity – about providing sufficient bandwidth and throughput to cope with the increasing demand being placed on internet companies for data services. Huawei has a number of examples of this. It is a leader in 4G LTE wireless
broadband technology, for starters – it owns 25 per cent of global 4G patents, and is author of countess state-ofthe-art digital communication networks, from EE’s in the UK to Everest-topping structures at 5,200 metres above sea level, and many locations in between. Its work to establish highspeed fibre and wireless connectivity to meet spiralling demand for data services and foster economic growth crosses the globe, with both generic and highly-bespoke network solutions. It has delivered connectivity to hardto-reach venues and it has achieved a number of technological firsts. In network building, less conspicuous solutions are often as notable as more high-profile ones. In Germany, Huawei has deployed a high-bandwidth transmission network for BASF, the largest chemical producer in the world, to connect six ‘Verbund’ networking sites and 380 production sites, allowing real-time communications between them. In the Czech Republic, it has reconstructed 484km of optical fibre broadband to enable telecoms provider GTS to launch a 100G DWDM network, the first of
its kind in Central Europe, allowing highly efficient two-way communications along a single line of fibre. In Thailand, it has helped United Information Highway to establish a nationwide fibre optic broadband network covering 77 cities and stretching 50,000km. Its solution has met the rising demand for digital communication services in Thailand, and sets a foundation for future business development in the country. SOFTWARE-DEFINED NETWORKS On the other hand, cloud service providers need more than just big pipes to carry gushing torrents of data. More complicated network architecture is required to allow internet companies smarter ways to manage and orchestrate traffic between data centres and end users. Huawei is working to these ends. Its green energy solutions combine multiple technologies for improving power usage. Its virtualisation tools assist in the design and deployment of bespoke cloud services, and allow owners to compute storage, networking and application resources in just 10 minutes, as opposed to weeks with traditional hardware solutions. Huawei has upwards of 10 joint innovation projects around software definable networking (SDN), a means to manage the interplay between broadband networks and cloud services via agile software-based tools, rather than by expensive and inflexible hardware. Its SDN solutions are compatible with legacy networks, and can reduce the workload around new network/cloud configuration by as much as 90 per. Chinese service provider Tencent, which provides an array of madly-popular service platforms, is one of Huawei’s joint-innovation partners around SDN. Tencent competes with the likes of Amazon, Facebook and Google as one of the largest internet companies in the world, and its portfolio of services for the Chinese mar-
ket is broadly equivalent to their consumer cloud platforms in the West, ranging from micro-blogging to auction sites. Its QQ instant messenger service has over 800 million users alone. DATA CENTRE CONNECTIVITY Tencent has deployed several hundred thousand servers and several dozen data centres in more than 10 cities around the world. Transmission volumes between them can reach several hundred gigabytes a day. This diversity of services and volume of traffic put strain on the networks connecting its data centres (its ‘DCI network’) – in terms of available bandwidth, quality of service, efficiency and risk control. To improve throughput and efficiency, and reduce operational complexity,
01 06 2015
2
Huawei has phased in a SDN solution between its data centres, making its data networks controllable and scaleable by software programming, rather than by hardware components. He Zekun, senior architect at Tencent, makes analogy with urban planning and traffic management. “Planning and constructing a network is like building�a city,” he says.
“Smart cities are built on sound infrastructure, especially high quality roads. Similarly, intelligent networks must be built upon a foundation of stable and reli-
continued on page 3...
ITAG Times
able facilities. On the DCI network, network devices with active-standby links must be deployed with geographic redundancies and scalable routing protocols.” By this, he means construction the networking equivalent of park-and-ride facilities and bus lanes to ensure traffic flow in peak hours, and satellite navigation systems so drivers can find the best routes to destinations. The Huawei SDN network reserves traffic lanes for data flow, and uses algorithms to calculate fastest travel around network bottlenecks. Everything is automated, rather than manually controlled by banks of engineers. “The benefit is that SDN provides a more flexible network management platform, that allows engineers to optimise network infrastructure to best suit the needs of their service departments. A key feature is that more functions are available at a lower operational cost,” he says. ORCHESTRATING IT IN THE CLOUD But there is a third element to this move from inflexible localised hardware to convergent hybrid architecture spanning both private and public clouds – to this move from heavy generators to grid-based power on-tap, if we revert to our original analogy. A universal control platform is required to manage all of these virtualised resources, and ensure backwards compatability with legacy systems and uninterrupted service provision. Huawei’s FusionSphere cloud platform, based on the OpenStack operating system, enables business of any size to bridge the gap between legacy systems and the new world of cloud
Articals
FLOURISH KNOWLEDGE NETWORKING POWER PROTECTION
computing. Vodafone uses FusionSphere to manage its massive hybrid data centre network across private and public clouds, as well as IT equipment from multiple vendors. Ren Zhipeng, president of Huawei’s cloud computing business, says: “FusionSphere provides the high performance and reliability necessary for moving information and communications applications to clouds. It automatically allocates resources based on service demands and can flexibly deploy and migrate services across private or public clouds.” French start-up Qwant is another customer. Its search engine works as a counterpoint to Google – it lists several result types in columns on a single page, including such things as news sites and social networks, rather than a single list of results based on click volumes. It also differs in its privacy commitment; Qwant does not track or distribute users’ search histories, personal details or cookies. It has experienced significant growth in its short life. Its service is now available
www.fitag.in Monday
01 062015
3
in 50 languages and 25 countries, just two years after launch. It indexes billions of internet data objects, including web pages, news articles, user data, images, and videos. To achieve this, the infrastructure must be available 24/7, must scale to cope with terabit-level daily traffic, and be efficient, cost-effective, and secure. I n ways, it is a perfect example of a 21st century business that is entirely reliant on cloud computing and Big Data analytics, and a feather in the cap for Huawei and its suite of cloud solutions. MEETING THE CHALLENGE But, still, the internet industry faces significant pressures; its essential cloud and data centre technologies remain at an embryonic stage of development. Huawei, for one, is well positioned to read the industry’s pulse, and develop solutions to fulfil specific customer requirements. “We are committed to creating a healthy cloud ecosystem across the Internet industry through open, integrated, and innovative technologies,” says David He, president of marketing and solution sales at Huawei’s enterprise division. “Fuelled by the momentum of our contributions to building a healthy, next-generation internet, we are committed to helping every single internet business to dramatically transform themselves to meet the challenges of a new internet era.”<
FITAG in now on Facebook. Please like Fitag Page https://www.facebook.com/Fitag23
Fitag thanks all member associations to support antipiracy drive & authorize FITAG to deal in this regard in future. FITAG exe. committee
itag Times reaches to
21,000 retailers / dealers across Gujarat
ITAG Times
FLOURISH KNOWLEDGE NETWORKING POWER PROTECTION
Cyber lawyer and security expert, Adv Prashant Mali, points out 9 things about the Indian cyber law which can get you punished with imprisonment
I
ndia does not have any law by the name of Cyber Law nor any law called as “The Data Protection Act”. India has one law encompassing IT related crimes, Data Protection related law and Internet related law and that is called The IT Act, 2000. The exact name of the law is “The Information Technology Act, 2000 as amended by the Information Technology (amendment) Act of 2008”. This law has to be read and applied along with The IT Rules.I have detailed below some of the crimes for which a common man can be punished with imprisonment upto three years or fine up to Rs five lakhs or both. Also, he can be arrested without warrant. Have a look at the 9 things that you may be doing unknowingly: # 1 If anybody copies data (i.e .pdf files, .jpg files etc) in his pen drive or micro SDcard without the permission of the owner
Articals
01 06 2015
4
9 things that you did not know about the Indian
#5 You have made your friends or unknown persons Facebook profile or his email or website by someone’s name to defraud or cheat the friend or other persons at large.
facebook #6 If you insert a pen drive in someone’s computer and that has virus or worms in it, and this is then passed in the computer or server you just accessed or the e-mails you forward has virus attached to it which gets transmitted everywhere because of your forwarded email. #7 If you by your activities crash anybody’s hard disk or break his monitor or destroy
CD Drive
#2 If you download .mp3 or .mpeg4 songs from the website distributing free songs or videos #3 If you cut or copy and then paste any data or information from any website without prior permission of the website owner for any material or financial gains. #4 If an employee keeps forwarding all his official emails from his official email id i.e from empname@company.com to his personal email id i.e to empname@gmail.com
www.fitag.in Monday
his computer #8 If you delete files or folders or modify the content of files or folders from someone’s computer #9 If you steal someone’s software programs source code or change it or delete it thereby causing financial loss to someone or financial gain
to yourself. Don’t takeaway Code or upload it to website/email while leaving your old company.
Laws Applicable Under Section 43(b) , If
Cyber law that can
get you arrested any person without permis sion of the owner or any other person who is in charge of a computer, computer system or computer network, – downloads, copies or extracts any data, computer data base or information from such computer, computer system or computer network including information or data held or stored in any removable storage medium; Under Section 43(c), if any person without permission of the owner or any other person who is in charge of a computer, computer system or computer network – Introduces or causes to be introduced any computer contaminant or computer virus into any computer, computer system or computer network; Under Section 43(d), if
any person without permission of the owner or any other person who is in charge of a computer, computer system or computer network, – damages or causes to be damaged any computer,
computer system or computer network, data, computer data base or any other programs residing in such computer, computer system or computer network; Under Section 66, if any person, dishonestly, or fraudulently, does any act referred to in section 43, he shall be punishable with imprisonment
for a term which may extend to three years or with fine which may extend to 5 lakh rupees or b o t h Normally, the police can call you for investigation and arrest you immediately only because all the above sections are covered under Section 66 of The IT Act, 2000 and are cognizable. The silver lining is that section 66 is a bailable section. Hence, you can secure a bail or for that matter an anticipatory bail.<
ITAG Times
ðe …uZe ðÄw M{kxo y™u ðÄw òýõkh [ku¬‚ Au, …ý ƒÄwt ykðzu Au™e {k™r‚õŒk Œku …qýorðhk{ Au! yk…ýu ½ýe ƒÄe ƒkƒŒku{kt ƒÄwt ykðzu Au™k ¼ú{{kt nkuEyu Aeyu y™u yu{kt™e yuõ ƒkƒŒ yux÷u xkR®…„! su{™u õBÃÞwxh …h Úkkuzwt ½Ûšt …ý õk{ õhðk™wt hnu Au yuðk {kuxk ¼k„™k ÷kuõku, õBÃÞwxh …h™e ‚Vh™k …nu÷k õË{ suðk xkR®…„ ŒhV ÷„¼„ æÞk™ yk…Œk ™Úke. …rhýk{u ÷ktƒk ‚{Þ ‚wÄe õkt Œku ƒt™u nkÚk™e yuõ-yuõ ykt„¤eÚke xkR… õhŒk hnu Au, yÚkðk ƒÄku ‚{Þ õe-ƒkuzo …h ™sh ¾kuze hk¾e™u, swËe swËe õe þkuÄe™u Œu{ýu õk{ õhðwt …zu Au, yk{kt Þt„Mx‚o …ý ƒkõkŒ ™Úke. yk{ktÚke ƒnkh ™eõ¤ðwt nkuÞ, Œ{khk rð[khku™e Íz…u xkR… õhðwt nkuÞ Œku Œ{khu x[ xkR®…„ þe¾ðwt …zu. x[ xkR®…„ yux÷u õe-ƒkuzo …h ™sh hk¾ðk™e rƒ÷õw÷ sYh rð™k, VfŒ M… þo™k y™w¼ðÚke xkR®…„ õhðk™e õ¤k. yk õ¤k òu ykí{‚kŒ ÚkE òÞ Œku Œ{u õk„¤-…u™ õhŒkt …ý ðÄw Íz…Úke
ò
www.fitag.in
Monday
01 06 2015
rð[kh õhŒkt Íz…Úke xkR… õhku
õBÃÞwxh …h xkR… õhe þõku y™u xkR®…„ …Ae™wt õk{ …ý Íz…e ƒ™e þõu. ðkŒ õe-ƒkuzo …h ™sh hkÏÞk rð™k xkR®…„ õhŒkt þe¾ðk™e Au, …ý yu {kxu …nu÷kt õe-ƒkuzo …h shk ðÄw æÞk™Úke ™sh ™k¾ðe …zþu! õe-ƒkuzo{kt yk{ ‚kð ykzkyð¤k yûkhku™e „kuXðýe õu{ õhe nþu yuðwt ‚kËwt õqŒw÷ý …ý yk…ý™u ÷„¼„ fâkhuÞ ÚkŒwt ™Úke (su ‚ðk÷ …nu÷e ðkh õe-ƒkuzo òuŒk ƒk¤õ™u y[qõ ÚkŒku nþu!), yk…ýu Œku ÞtºkðŒ, Vkðu Œu{ xkR®…„ õhe ÷Eyu Aeyu. nõeõŒ{kt yíÞkh™wt fðxeo qwerty Œheõu yku¤¾kŒwt õe-ƒkuzo (yûkhku™e …nu÷e nhku¤™k yûkhku …hÚke yk ™k{ …zâwt.) 19{e ‚Ëe{kt xkR… hkRxh ‚kÚku rðõMÞwt (Œu™e þkuÄ rðþu rððkË Au, õux÷kõ {k™u Au õu xkR… hkRxh ò{ ™ ÚkE òÞ yux÷u ykðe „kuXðýe ÚkE, Œku ™ðkt ‚tþkuÄ™ku õnu Au
õu xur÷„úkV yku…hux‚o™e ‚÷kn {wsƒ ykðe „kuXðýe ÚkE nŒe). õe-ƒkuzo{kt swËk swËk VuhVkh …ý ÚkÞk Au, AŒkt yíÞkhu ‚kiÚke ðÄw [÷ý yk õðoxeo õeƒkuzo™wt s Au. Œu™u ði¿kkr™õ „ýeyu õu ™ „ýeyu, …htŒw ði¿kkr™õ Zƒu Œu™ku W…Þku„ þe¾ðk™ku «Þk‚ õheyu Œku r… Þk™ku õu nk{kuor™Þ{ ð„kzŒk r‚ØnMŒ™e su{ yk…ýu …ý õe-ƒkuzo™k õ÷kõkh [ku¬‚ ƒ™e þõeyu! yu {kxu {ËËY… ÚkkÞ yuðe yuõ £e ðuƒ yÂÃ÷õuþ™ Au http://www.keybr.com/ Œ{u ð»kkuo …nu÷kt xkR…hkRxh {kxu™wt xkR®…„ þeÏÞk nþku Œku ÞkË nþu õu Œu{kt f÷k‚ðk¤k ƒu-ƒu õu ºký-ºký yûkh™k þçË ykt„¤eyku õhŒkt {„s ðÄw Úkkõe òÞ yux÷e ðkh xkR… õhkðŒk nŒk. ßÞkhu yk ðuƒ‚kRx …h, yk…ýe ykðzŒ y™w‚kh M{kxo yÕ„kurhÄ{Úke ™k™kt ™k™kt xkR®…„ ÷u‚L‚ s™hux ÚkŒkt òÞ Au y™u yk…ýu Œu™e «uÂfx‚ õhðk™e hnu Au. yuõ ÷u‚™ …Œu yux÷u yk…ýku Mõkuh òýðk {¤u, yk…ýu r{r™xËeX õux÷k þçË™e Íz…u zkR… õhe þfâk, õux÷e ¼q÷ õhe, yk…ýk rð~ðk‚™wt MŒh õuðwtõ hÓkwt ð„uhu òýðk {¤u. ‚kRx™ku Ëkðku Au y™u ½ýu ytþu ‚k[ku …ý Au õu su™ku õtE yÚko ™eõ¤Œku ™ nkuÞ yuðwt ðkhtðkh xkR… õhðk™u
ƒË÷u, yÚko‚¼h ðkfâku xkR… õhðk™kt nkuÞ Œku yk…ý™u ‚nu÷wt ÷k„u, {ò …zu y™u Œu{kt ðkhtðkh su õe «u‚ õhðk™e ÚkŒe nkuÞ Œu ÞkË …ý hnuðk ÷k„u (‚kRx yk…kuyk… su huLz{ ÷u‚L‚ s™hux õhu Au Œu{kt yk {wÆk™ku ¾k‚ ÏÞk÷ hk¾ðk{kt ykðu Au). yk ‚kRx™e r‚Mx{ yk…ýu su{ su{ xkR… õhŒk sEyu Œu{ Œu{ yk…ý™u Ëhuõ õe «u‚ õhðk{kt (yux÷u õu þkuÄðk{kt!) õux÷ku ‚{Þ ÷k„u Au Œu™e …ý ™kUÄ hk¾ðk{kt ykðu Au y™u Œu™k ykÄkhu yk„¤™kt ÷u‚L‚ s™hux ÚkkÞ Au. yk ‚kRx …h sE™u yk…ýu ‚eÄwt s õe-ƒkuzo …h ºkkxõe þ õ e y u
Aeyu, …ý Œ{u Œ{khe «„rŒ™ku ƒhkƒh xÙuõ hk¾e™u yk„¤ ðÄðk {k„Œk nku Œku ‚kRx …h £e yuõkWLx ¾ku÷kðe™u ðÄkhk™e ‚„ðz™k ÷k¼ ÷E þõku Aku. ‚kRx …h {ÂÕxÃ÷uÞh xkR®…„ hu‚ õhðk™e …ý ‚„ðz Au! yk…ýu {kuƒkR÷{kt lol õu you are ™u ƒË÷u ur suðwt Íz…Úke ÷¾e™u ¼÷u õk{ [÷kðe ÷uŒk nkuEyu, …ý ðkMŒrðõ Sð™{kt, ÔÞkð‚krÞõ õkhrõËeo{kt yuðk þkuxoõx [k÷þu ™nª y™u yu hu‚{kt yk„¤ hnuðk Œus „rŒyu rð[khðk™e y™u yux÷e s Œus „rŒyu Œu™u õB…kuÍ õhðk™e þrfŒ õu¤ððe sYhe Au. <
sq™k rðrõ…erzÞk™e ™ðe ðkŒku
LÞwykhe 2001{kt þ\ ÚkÞu÷ rðrõ…erzÞk yksu s„Œ™ku ¿kk™™ku ‚kiÚke {kuxku ‚úkuŒ Au. yk ÷¾kE hÓkwt Au íÞkhu rðrõ…erzÞk …h VfŒ yt„úuS ¼k»kk™k ÷u¾ku™e ‚tÏÞk 48,75,072 ‚wÄe …nkU[e „E Au. ykx÷k ÷u¾Úke, yk yku™÷kR™ yuL‚kÞf÷ku…erzÞkyu su™wt yÂMŒíð s ™k{þu»k õhe ™kÏÞwt yu yuL‚kÞf÷ku…erzÞk rƒúxkr™õk™k 2000 ˤËkh „útÚkku r«Lx ÚkE þõu! yk Œku VfŒ yt„úuS ÷u¾ku™e ðkŒ ÚkE, rðrõ…erzÞk …h™k Œ{k{ ÷u¾ku ‚{kððk {kxu rƒúxkr™õk™k 15,000Úke ðÄw „útÚkku r«Lx õhðk …zu! rðrõ…erzÞk …h 280 sux÷e ¼k»kkyku{kt ÷u¾ ðkt[e þõkÞ Au. õkuE …ý ÷¾e þõu y™u õkuE …ý ÷u¾{kt ‚wÄkhkðÄkhk õu ƒk˃kõe õhe þõu yuðk Mð\…™u õkhýu rðrõ…erzÞk™wt õË ðÄŒwt òÞ Au Œu{ Œu{ Œu™k ÷u¾ku™e [ku¬‚kE rðþu þtõkyku …ý QXŒe hnu Au. Œu{ AŒkt, ð¾Œku𾌙k r™»ýkŒku™k yÇÞk‚ku ƒŒkðu Au õu rðrõ…erzÞk …h™k ÷u¾ ¾kM‚k rð~ð‚™eÞ Au.
5
MkkÞçkhMkVh
FLOURISH KNOWLEDGE NETWORKING POWER PROTECTION
yk ð»ko™k ™nª, …ý „Þk ð»ko™k …wMŒõ{u¤k{kt yuõ r…Œk-…wºk ðå[u ykSð™ ÞkË hnu yuðku ‚tðkË ‚kt¼éÞku nŒku. yk õku÷{™k ÷u¾ku™ku ‚t„ún, ‚kÞƒh‚Vh {u„urÍ™ ð„uhu òuE™u r…Œkyu nkUþÚke Ëeõhk™u õÓkwt, ÷uðwt Au? yk…ý™u ƒt™u™u õk{ ÷k„þu! Ëeõhkyu QzŒe ™sh ™k¾e™u õÓkwt, {™u Œku ƒÄwt ykðzu Au. r…Œkyu õÓkwt, Ëeõhk, yk ô{hu nwt …ý yu{ õne þõŒku ™Úke, Œwt yíÞkhÚke yu{ {k™e ÷Eþ Œku õu{ [k÷þu?
™
Articals
yk ƒÄwt nkuðk AŒkt, y™u yk…ýu ‚ki yðkh™ðkh swËk swËk rð»kÞku rðþu Úkkuze ðÄw {krnŒe {u¤ððk {kxu rðrõ…erzÞk™e {w÷kõkŒ ÷uŒk nkuðk AŒkt, {krnŒe™k yk rðhkx ‚úkuŒ™ku yk…ýu …qhŒku ÷k¼ ÷uðk™wt [qõe sE Aeyu. ‚k{kLÞ heŒu RLxh™ux …h yk…ýu õtE …ý ‚[o õhðwt nkuÞ Œku …nu÷kt „q„®÷„ õheyu Aeyu. yu{kt {kuxk ¼k„u þ\ykŒ™e ƒÄe ®÷f‚ rðrõ…erzÞk™e s nkuÞ Au y™u Œu™k …h rf÷õ õhe™u yk…ýu rðrõ…erzÞk{kt™k yu ÷u¾ …h …nkU[e sEyu Aeyu. yk yk¾e «r¢Þk{kt ½Ûšt ¾Át yk…ýu rðrõ…erzÞk™k nku{…us™u ƒkÞ…k‚ õhe ËEyu Aeyu. ðkMŒð{kt, yk nku{…us (https://en.wikipedia.org) ðkhtðkh òuðk suðwt Au. rðrõ…erzÞk™k ‚ŒŒ rðMŒhŒk õË™u æÞk™{kt hk¾e™u Œu™k nku{…us …h rðrðÄ {krnŒe Œkhððk{kt ykðu Au, su™k …h r™Þr{Œ ™sh hk¾eyu Œku yk¾e Ëwr™Þk™k ðŒo{k™ y™u ¼qŒõk¤™e ¼kŒe„¤ {krnŒeÚke yk…ýu ‚ŒŒ {krnŒ„kh hne þõeyu Aeyu.
nku{…us …h …h Ëhhkus r™Þr{Œ heŒu, yuõ Ve[zo ykrxoõ÷ {qõkÞ Au. Œ{u RåAku Œku yk ykrxoõ÷ R-{uR÷ îkhk …ý {u¤ðe þõku Aku. R™ Ä LÞqÍ rð¼k„{kt yk¾k s„Œ™k Ëir™õ ‚{k[khku Œkhððk{kt ykðu Au. Ëwr™Þk™k ¾qýu ¾qýk{kt ƒ™Œe {n¥ð…qýo ƒkƒŒku y™u ¾k‚ Œku Œu™k ‚t˼o …h Ë h h k u s yAzŒe ™sh ™ k ¾ ð k { k t
ykðu Œku yu s™h÷ ™ku÷us ðÄkhðk{kt ƒnw {ËË\… ÚkkÞ. su{ õu, n{ýkt {wtƒE{kt Ëw»õ{o…erzŒk yÁýk þk™ƒk„™wt r™Ä™ ÚkÞwt Œku yu ‚{k[kh ‚kÚku, õku{k{kt
Sððk™e Œu{™e ÂMÚkrŒ™u õkhýu ¼khŒ{kt AuzkÞu÷e ËÞk{]íÞw™e [[ko™k ‚t˼o ‚kÚku yu ‚{k[kh ynª ðkt[e þõkÞ Au. rð~ð{kt õkuE {kuxe RðuLx [k÷e hne nkuÞ õu ŒksuŒh{kt õkuE {nk™w¼kð™wt {]íÞw ÚkÞwt nkuÞ Œku Œu™e rð„Œku …ý ynª {¤u Au. yku™ Äe‚ zu rð¼k„{kt, su Œu rËð‚u yk¾e Ëwr™Þk{kt ¼qŒõk¤{kt su õtE {n¥ð…qýo ½x™kyku ƒ™e nkuÞ Œu™e Œkhðýe òýðk {¤u Au. yk…ýu ‚eÄk rðrõ…erzÞk™k ÷u¾ …h …nkU[Œk nkuðkÚke, yk ‚kRx …h rðrðÄ rð»kÞku™k {n¥ð…qýo ÷u¾ku y™u yLÞ ‚t˼o‚k{„úe™u Œkhðe™u Œu Œ{k{™wt ™urð„uþ™ ‚h¤ ƒ™kðŒkt …kuxo÷ …ý Au yu™e ÷„¼„ yk…ý™u òý s nkuŒe ™Úke. yuõ heŒu òuEyu Œku …kuxo÷ yu rðrõ…erzÞk {kxu yuLxÙe…kuRLx suðwt õk{ õhu Au. yk heŒu …kuxo÷ ƒ™kððk™e þYykŒ …kur÷þ y™u s{o™ ¼k»kk™k rðrõ…erzÞk …h ÚkE y™u …Ae yu õL‚uÃx $Âø÷þ{kt …ý y…™kððk{kt ykÔÞku. yíÞkhu rðrõ…erzÞk …h õw÷ 1404 …kuxo÷ Au! zez Þw ™ku rð¼k„{kt swËk swËk
÷u¾ku{ktÚke Œkhðu÷e xqtõe {krnŒe yk…ðk{kt ykðu Au, òuõu rðrõ…erzÞk™wt õË yux÷wt {kuxwt Au õu ynª y…kŒe {krnŒe™e òý Œku ™ s nkuÞ, yk…ý™u yu rƒ÷õw÷ W…Þku„e ™ nkuÞ yuðwt …ý ƒ™e þõu Au! y÷ƒ¥k, yk heŒu nku{…us …hÚke õu …kuxo÷ îkhk rðrõ…erzÞk VtVku‚eyu õu …Ae ‚eÄk „q„÷{ktÚke õkuE ÷u¾{kt yuLxÙe {kheyu, yuõ ðkŒ [ku¬‚ Qze™u ykt¾u ð¤„u õu rðrõ…erzÞk™ku ÷uykWx nS …ý ð»kkuo sq™ku y™u õtxk¤ks™õ s hÓkku Au. RLxh™ux …h ƒeS ƒÄe ‚kRx …h {krnŒe™e hswykŒ yuõË{ ykõ»koõ ƒ™e hne Au, …ý rðrõ…erzÞk{kt ÷„¼„ õkuE s ƒË÷kð ™Úke. rðrõ…erzÞk™wt MðY… òuŒkt {krnŒe yk heŒ™e hsqykŒ õËk[ yr™ðkÞo nþu, …ý ‚˼køÞu nðu Œu™u shk {suËkh ƒ™kððk™k «Þk‚ …ý ÚkE hÓkk Au, su{kt rðrõ…erzÞk™e …kuŒk™e õkuE ¼qr{õk ™Úke. {ò™e ðkŒ yu Au õu ‚ki õkuE {kxu ƒÄe heŒu {wfŒ yuðk rðrõ…erzÞk™k MðY…™u õkhýu s yk þfâ ƒ™e hÓkwt Au, yu™e ðkŒ Vhe fâkhuõ, yk„¤ W…h! <
ITAG Times
News CORNER
www.fitag.in Monday
FLOURISH KNOWLEDGE NETWORKING POWER PROTECTION
01 06 2015
6
Independent analyst firm, Gartner, has announced the price of PCs could possibly increase by up to 10 per cent in 2015. It reported, in its latest Forecast Analysis: Devices, Worldwide 1Q15 Update that device vendors ndependent analyst firm, have fallen up to 20 per cent of their declining "dollarised" will be raising the prices of PCs to offset the effects of Gartner, has announced the since the start of 2015, have profits by taking advantage of currency devaluation.
Prices of PCs will Rise by up to 10 per cent in 2015: Gartner
I
price of PCs may increase by up to 10 per cent in 2015. It reported, in its latest Forecast Analysis: Devices, Worldwide 1Q15 Update that device vendors will be raising the prices of PCs to offset the effects of currency devaluation. This might affect the Europe and Japan regions most, according to Gartner research director, Ranjit Atwal. "We are currently seeing the sharp appreciation of the dollar against most other currencies reflected in companies' earnings results. PC vendors selling to Europe and Japan, where local currencies
little choice than to raise prices to preserve profits," he mentioned. He also said device vendors will mitigate the impact
MAIT, TAIT HOLD CONCLVE TO BOOST LOCAL MANUFACTURING MAIT, an apex body representing IT Industry in India in association with TAIT, the premier association of IT Companies in Mumbai organised the ‘National Conclave on IT & Electronics Manufacturing in India’ focused on encouraging entrepreneurship within the ICT Industry to boost local manufacturing in India with an aim to make ‘Make in India’ dream a reality. Hon’ble Cabinet Minister of Industries, Maharashtra Government Shri Subhash Rajaram Desai was the guest of honour at the event with Dignitaries from Cental Govt and
state Govt of Maharashta, CEOs of IT Companies and Leadership Team of MAIT. The conclave was themed ‘IT & Electronics Manufacturing in India - Opportunity for IT Channel Partners, System Integrators and SME’s that included the panel discussion on Govt Schemes & Policies, Challenges faced by the IT Manufacturers and Oppor tunities to Manufacture IT Products in India. It opened with a welcome address by KR Chaube, President, TAIT followed by the Presidential Address of Amar Babu, President, MAIT.
Continued from page 1...
2. FAIITA must approach Union government as FAIITA, not with MAIT or any other organization, with a list of demands and try and fix up meetings with Prime Minister, Finance Minister as well as the Commerce minister. They should be made aware of the problems our community have been facing and also the future impacts of OLS on our fraternity. We must try and meet all India BJP finance authorities as well as RSS think tanks for explaining our problems. 3. As suggested by many seniors friends of FAITTA, an online portal made and governed by FAIITA needs to be initiated, so in future it can challenge any OLS in the interest of channel community and provide a common platform or market place for T3, T4 part-
or a team of proper leaders to work under. FAIITA can lead the wide spread IT community across India with its common minimum agenda. We, as FAIITA, must announce a common minimum agenda and its implementation time period. I have few suggestions as the points to form this agenda. 1. FAITTA have taken up harsh and strict approach against the OEMs for their double standards in favor of OLS. Looking at the interest of few of our own partners (particularly T1 & T2) , we had to reduce our pressure upon them. But, according to me it was a wrong move and we must keep them on the edge by our continues demand of keeping the pricing of OLS and channel at par.
single-digit-percentage decreases in PC component costs during 2015, and by selling PCs with fewer features to keep prices down.
However, vendors' margins will fall, even as they shift their shipment focus to the regions least affected by these currency effects. As for business take-up of PCs, Gartner indicated in 2015, large businesses will prioritise other IT budgets with currency-driven shortfalls, such as those for software and services, for which they will draw money from the PC budget. "Large organisations will look to lengthen their PC lifetimes by six months in comparison to 2014, rather than
buying less expensive models or removing requirements for key features. In addition, purchases of optical drives and optional accessories will disappear," Atwal said. However, he added that while it's expected of large organisations to cut their PC unit purchases by 20 per cent in 2015, due to price rises, small businesses will behave like value-driven consumers and look to purchase consumer PCs instead. Gartner expects that 30 per cent of PC consumers will buy down the price curve.
APAC DEVICES SHIPMENTS TO GROW 3.2 PERCENT IN 2015 COMBINED SHIPMENTS OF DEVICES (PCS, TABLETS, ULTRAMOBILES AND MOBILE PHONES) IN THE ASIA PACIFIC REGION ARE FORECAST TO TOTAL 1.2 BILLION UNITS IN 2015, AN INCREASE OF 3.2 PERCENT OVER 2014 (SEE TABLE 1), ACCORDING TO GARTNER, INC. ASIA PACIFIC DEVICES SHIPMENTS BY DEVICE TYPE, 2014-2017 (THOUSANDS OF UNITS)
DEVICE TYPE 2014 Traditional PC (Desk93,122 based and Notebook Ultramobile 9,531 (Premium) PC Market 102,653 Other Ultramobile 67,776 (Tablets and Clamshells) Computing Devices 170,428 Market Mobile Phones 987,725 Total Devices Market 1,158,153 Source: Gartner (March 2015
ners to sell across India, widening their scope of business. In nutshell every IT business holder will have two way presence in the market, through their shops & offices doing off-line sales, as well as through FAIITA portal, doing their on-line sales. Few of the FAIITA seniors have started working on this, hopefully in few months we may get our own portal working in the benefit of members. These are three main actions FAIITA should take, out of which few are already initiated and others will follow. I am suggesting all the FITAGIANs to think about the challenges and remedies of future business prospects and come up with their suggestions. Let us hope for a healthy business future. <
2015 90,983
2016 90,036
2017 89,233
13,460
16,115
17,936
104,442 62,816
106,152 63,245
107,169 63,733
167,258
169,397
170,901
1,028,389 1,195,647
1,088,987 1,258,384
1,111,488 1,282,390
ITAG Times
A
ccording to IDC’s H2 2014 IT Services tracker data, the Indian IT Services market grew 7.1% year-on-year to reach INR 470708.13 million (USD 7719 million)in calendar year 2014.During second half of 2014, compared to same period last year,the market saw slight uptick, primarily on the back of higher demand for hosted infrastructure, hosted applications services, InternationalAvaya-User-Groupcustom application development, IT consulting, and application management services. Besides this, there was a renewed focus on infrastructure projects. Vivek Gautam, Research Manager, IT Services & Software IDC India says, “The expanding startup community and increasing technology adoption by Small & Medium Enterprises (SMEs),who favour OPEX as against CAPEX model of IT, is creating healthy demand for hosted infrastructure, hosted application, managed and datacentre services. The market for these services will continue to grow at rapid pace over next few years” The Indian IT services market remains primarily driven by project-oriented services like systems integration, network consulting and integration, custom application development and
News Article
FLOURISH KNOWLEDGE NETWORKING POWER PROTECTION
IT consulting. When considered together, these services grew year-on-year by 7% (in INR) during H2
forcing traditional brick and mortar players to embrace technology at wider scale. Some of the other
www.fitag.in Monday
compound annual growth rate (CAGR) of 10.8% (in INR) between 2014 and 2019. In near termservices market growth will be driven by license awards for Payment Banks and Small Scale Banks, current government’s pro-technology
0106 2015
7
stance (Digital India, mobile based delivery of citizen services, focus on financial inclusion, spend towards smart cities etc.),burgeoningstart-up community and sustained investments across 3rd platform technologies. <
IDC: Indian IT Services Market grew 7.1% y-o-y in CY 2014 2014. The total IT outsourcing services market grew at 6.8% during the same period while support & training services grew at 6.5%. Among various verticals BFSI and Retail fared better. Within the BFSI ver-
tical new banking licenses awarded by RBI, increasing technology adoption by Non-Banking Financial Companies (NBFCs) and microfinance institutions pushed the demand for IT services. While in Retail vertical emergence of ecommerce continues to be a key growth driver. The new age e-commerce players are not only making technology investments themselves but also are
verticals such as Healthcare, Services andGovernment continued to see healthy demand for IT services. “Indian organizations are increasingly looking at technology as a key business enabler, a means to improve supplier/customer engagement andgain better business oversight. Many of themare spending more on technology including social, mobile, analytics and cloud (SMAC)for the same reasons.For instance today Indian enterprises, across industries, are investing in custom mobile applications for services delivery, managing field workforce, launching targeted marketing campaigns and so on. Many are even integrating applications with backend data for deeper analytics.”, adds Gautam. Forecast IDC India expects the local IT Services market to grow at a
Disclaimer: This Magazine is for private circulation only. The data published in this magazine is based on the inputs provided by various sources. The publisher, printer and the Editor do not guarantee the authenticity of correctness of the data published here in. Publisher : Gaurang Vyas, President, Fitag Editor: Kaushik Pandya Assistant Editor : Sejal Patel Designer : Hardik Pancholi Address : B/302, Rudra Arcade, Nr. Helmet Circle, Memnagar, Ahmedabad - 380015. All rights reserved. No part of this publication can be reproduced without the prior permission from the publisher.
ITAG Times
Cartoon CORNER
FLOURISH KNOWLEDGE NETWORKING POWER PROTECTION
www.fitag.in Monday
01 062015
8