For Space Booking in
www.fitag.in
01 07 2015
Vol. 2, Issu No. 11, Page 8
For Space Booking in
FITAG ITAG TIMES
Wednesday
Ahmedabad, Gujarat
Monthly Edition
FITAG ITAG TIMES
ITAG
fitagtimes@fitag.in Sejal: 9824053863 Dhaval: 9824066111
FLOURISH KNOWLEDGE NETWORKING POWER PROTECTION
Mr. Kaushik Pandya Editor
of fight of our community against the OnLine Shopping menace. According to me, this is a paradigm shift and we all need to accommodate ourselves according to this shift. Those who fail to do so will vanish. We are trying hard to keep a safe distance between the channel business and online business with respect to the end users. But this is not possible to a longer extent. We will have to accept the change and adopt the newer model of business. Few days back, I was with a client where they had called a sign-age manufacturer also. To my surprise, he had his own
continued on page 3...
Sejal: 9824053863 Dhaval: 9824066111
An Introduction to Bitcoin: The Open Source Cryptographic Currency
-Editorial Dear Fitagians, Greetings!!! Efforts for formation of national level federation has come to a conclusion and finally, a unique and much needed Federation of All India IT Associations, commonly known as FAIITA, has been formed. Actually, this formation was done much earlier, but the formalization of the same has taken place on 28th June, 2015 at Mumbai during the third conclave of FAIITA. Fortunately, I and FITAG president, Mr. Gaurang Vyas got an opportunity to remain present at this gathering. A special report and all the points which has been resolved in this conclave has been covered on page 7 & 8 for the knowledge of readership. On the other hand struggle of survival continues in terms
fitagtimes@fitag.in
H
a v e you ever wanted to send money to India from a foreign country, or wished for a borderless currency that could easily be spent anywhere? Open source comes to your rescue here as well. In the always-connected world of devices, you can now use Bitcoin from anywhere with the privacy and anonymity that’s similar to using cash, and in a medium that is very secure. Bitcoin is an open source peer to peer cryptographic currency, which is quite revo-
lutionary since it is based on a peer to peer protocol. This means that it is not regulated by any government, private body or organisation. Each user forms part of a payment network, which is basically a set of protocols for exchanging currency worldwide without any borders. The very fact that it can be used and accepted anywhere can change the way our economy works. Moreover, the best part about using Bitcoin is that you can transfer it with little or no transaction fees!
Bitcoin is the new ‘virtual currency’ that has aroused the interest of millions of people, financial and banking institutions, and government agencies. As it is relatively new, much is not known about it. In this article the author demystifies Bitcoin. Bitcoin had a boom recently when its value spiked suddenly over a short period of time, but it is still not universally accepted in as many places as desired. This is partly due to the fact that the technology is still under development and also because many merchants or developers are still wary of accepting something that could essen-
tially be a risky investment of their time and money. Bitcoin has been of interest to merchants, developers and consumers who are keen to break the boundaries and shackles of the existing payment methods to try something new. These are however niche applications, and its acceptance is at present limited Contined on page-2
ITAG Times Continued from page 1...
to larger brands and in popular places. Moreover, Bitcoin has also been linked with black markets, money laundering and purchase of illegal goods. This is because of the
anonymity and privacy provided by Bitcoin, which makes its use similar to using cash. An important point to note here is that Bitcoin transactions do not come with the kind of fraud protection that conventional platforms like credit cards and PayPal provide. Once completed, a Bitcoin transaction cannot be reversed unless the recipient decides to send you the money back in a new transaction. Many would assume that this is a loophole but it is, rather, a security feature which keeps you in control of your own money instead of interference from some other authority. This is one of the primary reasons why credit card and online payment methods other than bank fund transfers are not accepted even by third party merchants or Bitcoin exchanges in return for Bitcoins. Bitcoin was launched in 2008 by Satoshi Nakamoto, a person whose true identity is still unknown. However, ever since its launch, Bitcoin’s value has steadily risen from less than a dollar to more than $100 today, where it seems to be relatively stable for the time being. This value is determined by the price at which the Bitcoin is sold at major exchanges like Mt Gox. This has, however, obviously drawn a lot of attention and many of the countries are now trying to find a way to introduce rules and regulations around such innovative technology. The rising value has resulted in day to day Bitcoin transactions being carried out on a much lower numerical
Articals
FLOURISH KNOWLEDGE NETWORKING POWER PROTECTION
scale than normal currency. Divisibility is one of the inherent properties of Bitcoin which, as opposed to normal currency, can be divided up to eight decimal places and can be used in denominations such as uBTC and mBTC.
Using Bitcoin Bitcoin can be used from mobile devices as well as desktops. There are clients available for Android, iOS, etc, on mobile devices and for Windows, OS X and Linux on desktop computing platforms. While there are online Web clients also available, these are generally not considered trustworthy or secure despite all security measures, as your Bitcoins are hosted on someone else’s server. Modern day mobile devices now offer in-
novative ways of using Bitcoin to initiate a transaction between two devices with methods such as a QR code or an NFC tap. Basically, when you install a Bitcoin client, a wallet is created for you. This wallet is associated with your Bitcoin address which looks like a long string of numbers and letters, for example: This address is used to send or receive Bitcoins from another person. Each wallet can be associated with as many addresses as possible.
Actually, you should use each address for only one transaction. When this wallet is created, the Bitcoin client will ask you to encrypt it and create an associated password and a private key for accessing the wallet. This private key will allow you to spend Bitcoins from your wallet but anyone can monitor the balance in your wallet. How it works One might wonder what it is that gives value to a Bitcoin as opposed to normal currency. Why can it not be simply copied and spent multiple times? Whenever a Bitcoin transaction is intended between two parties, the transaction is broadcast to everyone on the network by the person who is responsible for sending the money to the recipient. This transaction is then verified and validated over the next couple of hours. This process thus avoids double spending, as each verified transaction is then processed and included in the blockchain by the miners (the people who process all this information in return for transaction fees that are allocated to a miner, which may or may not be included). The block-chain thus acts like a public ledger of all the Bitcoins that have been spent over time and keeps increasing in size. Bitcoin clients The table below gives some popular Bitcoin clients available on various platforms. Some of these are quite heavy due to the large size of the block-chain, while others like Electrum, Mycelium and online clients are relatively easy to use. Bitcoin-Qt, for example, is the full featured thick client which downloads the whole block-chain using the official Bitcoin code. It requires significant network bandwidth and is quite heavy on system resources. Other third party clients, which keep the private keys on your local machine but use the block-chain that is hosted on a server, provide a relatively manageable com-
www.fitag.in Wednesday
promise between security and speed. While the full featured clients are the most secure, it is not possible for everyone to have the patience and speed to run them on their machines. Each of these clients provides a simple set of instructions for installation on your machine and some of them are quite easy to use, even for those who are non-technical. Installation is similar to any other software. However, detailed instructions can be obtained from the websites of these clients. The official Bitcoin website list links to the websites of these clients. How can Bitcoins be used? Bitcoins are accepted in much fewer places than nor-
01 07 2015
2
mal currency and conventional payment methods. Online hosting and other digital goods are some of the limited things that you can buy with Bitcoins. In the US, hotels and restaurants have started accepting Bitcoins; however, such popularity is yet to reach India. A few days back, Silk Road, the secret online market place was taken down by the FBI. It was one of those places which allowed you to buy and sell anything with Bitcoin. It was literally a place where people could sell anything, including drugs and weapons. It is estimated that Silk Road had done an estimated
continued on page 4...
Articals ITAG Times How to properly charge a phone’s battery: stop charging from zero to 100% and other tips
FLOURISH KNOWLEDGE NETWORKING POWER PROTECTION
Extend your battery's lifespan with these top tips, including how often you should charge your phone's battery. atteries are one of tech’s most boring subjects … until your phone, tablet or laptop dies, that is. While most of us live in fear of a fading phone battery when we’re out and about, we don’t worry too much about that battery’s eventual lifespan, but there are ways to keep your battery in tip-top shape for a long and fruitful life. (probably between three and five years). Just how should you charge your iPhone or Android? Batteries do not enjoy eternal life. Most smartphone manufacturers say their devices rate their batteries at 300-500 cycles. Apple claims that
B
its laptop batteries reach 80 percent of their original capacity after 1,000 charges. After this point batteries aren’t able to hold as much electricity and will power your de-
The big questions about how to re-charge a battery is whether you should let it run to zero before re-charging to 100%. One reason why peo-
vice for increasingly shorter periods of time. See: Best smartphones So here’s some tips to extend your battery’s lifespan, be that in an iPhone, Android phone, Windows phone, tablet, or laptop.
ple are unsure is something they’ve heard of called the battery “memory effect”. See also: How to improve smartphone battery life: 10 tips and tricks to make your phone's battery last longer
What is battery memory effect? Battery memory effect is about batteries remembering remaining charge if you didn’t let them go all the way to zero too often. So a battery frequently charged from 20% to 80% might ‘forget’ about the 40%
that’s left uncharged (020% and 80-100%). Sounds crazy but that’s sort of true – but only for older nickelbased (NiMH and NiCd) batteries, not the lithiumion batteries in your phone. Lithium-ion (Li-ion) batter-
ies don’t suffer the memory effect so you almost need to do the opposite – charge them often but not all the way throughout the day, and don’t let them drop to zero.
Don’t charge battery from zero to 100% The rule with Li-ion bat- let the battery drop below teries is to keep them 50% 20%. or more most of the time. When it drops below 50% top it up a little if you can. A little a few times a day seems to be the optimum to aim for. But don’t charge it all the way to 100%. It won’t be fatal to your battery if you do a full recharge – most of us are forced to do this every now and again in emergencies. But constantly doing a full recharge will shorten the battery’s lifespan. So a good range to aim for when charging a Li-ion battery is from about 40% to 80% in one go. Try not to
continued on page 4...
www.fitag.in Wednesday Continued from page 1...
portal and all his styles and verities were on display on that portal. That means that he has accepted a mixed model and doing business through the same. Why can't we do the same? This is a huge challenge in front of us and we do not have any other choice also then accepting
01 07 2015
3
this forceful change. It will be much easier, less forceful and a positive migration if we accept and adopt it faster. Most of the associations are undergoing the procedure of selection or election of their office bearers. Everybody is requested to send us their list of newly selected OB with their contact details on immediate basis. <
FITAG in now on Facebook. Please like Fitag Page https://www.facebook.com/Fitag23
Fitag thanks all member associations to support antipiracy drive & authorize FITAG to deal in this regard in future. FITAG exe. committee
ITAG Times
Articals
FLOURISH KNOWLEDGE NETWORKING POWER PROTECTION
Continued from page 3...
When I should do a full battery charge Experts recommend that you do a full zero to 100% battery recharge (a "charge cycle") maybe once a month only. This recalibrates the battery – a bit like restarting your computer, or, for humans, going on holiday! The same goes for laptops, by the way. See also: Best battery cases for iPhone 6 and Best power banks
Should I charge my phone overnight? Most modern smartphones are clever enough to stop charging when full, so there isn'y a great risk in leaving your phone charging overnight. But some experts recommend you remove the phone from a case if charging for a long time, as a case could lead to over heating – which Lithium-ion batteries do not like (see below).
Should I use fast battery charging? Many Android phones have a feature that allows for fast charging. Samsung even calls its technology “ultra fast charging”. Motorola boasts about its Droid Turbo that promises an 8 hour charge in just 15 minutes! HTC’s Rapid Charger 2.0 charges devices such as the One M8, One E8 and Desire Eye 40 percent faster. These phones have special code usually located in a chip known as the Power Management IC (PMIC) that communicates with the charger you are using and requests that it send power at a higher voltage. Apple’s iPhone 6 doesn’t feature fast charging but its Qualcomm PMIC is smart enough to recognise when you use a higher-amp charger (like the one you get with the iPad), and that’s a good thing because fast charging will heat up that Li-ion battery and cause it increased wear and tear. For the same reason, don’t leave your phone in a hot car, on the beach or next to the oven. A hot battery will suffer long-term effects on its lifespan. And so will a super-cold one, so don’t leave your device in the freezer or out in the snow! So, if you can, switch off fast charging on your Android phone.
Can I use any charger? Where possible use the charger that came with your phone, as it is sure to have the correct rating. Or make sure that a third-party charger is approved by your phone's manufacturer. Cheap alternatives from Amazon or eBay may harm your phone, and there have been several reported cases of cheap chargers actually catching on fire!
Storing battery tips Don’t leave a Li-ion battery liing around too long at 0%. Try to leave it at around 40-50%. These batteries drain at about 5-10% a month when not in use. If you let the battery discharge completely and leave it uncharged for a long period of time it may eventually become incapable of holding a charge at all (that’s properly dead). It’s unlikely you’ll leave your smartphone lying in a drawer for very long, but some people do leave their laptop, battery packs or spare batteries unused for long periods of time. So try to keep them all at least half charged. <
Continued from page 2...
business of more than 9.5 million Bitcoins out of the total 11 million Bitcoins in circulation today. What is surprising is that the closure did not have any significant effect on Bitcoin�s price. This obviously means that people consider it seriously and it is more than just a medium for black marketeers or a method for money laundering. A lot of online merchants today do not even allow you to buy Bitcoins without extensive verification of your documents and identity. They also have an upper limit beyond which you cannot buy any more Bitcoins. Today, Bitcoin is mainly used by many people for trading and investment purposes as they expect its value to only rise over the next few years. Bitcoin mining Bitcoin mining is a resource intensive process and is done only on high performance machines with significant GPU and CPU processing power. Some of the methods of mining Bitcoins are CPU mining, GPU mining, FPGA mining and ASIC mining. The last one is the latest and most efficient technology to mine Bitcoins with the least amount of processing power. Mining takes up so much of resources that it is done by many people in a single pool or group, which works towards a common goal of producing a block that fetches them a total reward of around 50 Bitcoins for their efforts. This reward is to be reduced over time to 25 Bitcoins, then to 12.5 Bitcoins, and so on. Eventually, the miners are expected to be rewarded for their efforts with the small transaction fees that is attached to each transaction. This results in the creation of more Bitcoins, which is why it is known as �mining� as it resembles the production of similar limited resources like gold and currency. Explaining the actual processing that happens during mining requires a more detailed understanding of cryptography and hashing. But, in simple words, it is a process that is intentionally made difficult so that blocks are produced
www.fitag.in Wednesday
01 07 2015
4
at a rate of around one block every ten minutes for all the miners, which is a total of six blocks per hour. What actually happens during mining is that miners try to produce the next block by using the hash value of the current block, along with the representation of the next set of transactions shown as a Merkle root, which is added along with a nonce value. The
which accepts payments through Net banking, IMPS and cheques on ICICI Bank, Axis Bank and SBI. Localbitcoins.com is a website that lists traders who are ready to sell Bitcoins in your local area at a specified price. Mt Gox is an American exchange that allows you to specify bids at a specific price, provided you are able to fund your account through
nonce value keeps increasing until the correct solution is produced, which is lower than the target value. Whichever miner solves the problem in the fastest time gets the reward of the Bitcoins, and this process keeps repeating. Buying Bitcoin in India While mining Bitcoin is definitely not for everyone, there are some places where you can buy Bitcoins at a value pegged to the US dollar in the popular Bitcoin exchanges like Mt Gox, etc. Some of the places you can buy Bitcoin in India are: BuySellBitco.in Mt Gox LocalBitcoins.com Of these, BuySellBitco.in is the only exchange in India
international wire transfer, which would prove to be quite expensive and is recommended only if you intend to trade in very large denominations. I have not covered too many technical aspects of Bitcoin, since this article only aims to provide you with an introduction to it. This is something which is bound to be a part of your future. While the future of Bitcoin is still not secure, one thing is for sure the idea itself has changed the way we think about money and even if it fails to be as popular as we expect it to be, peer to peer cryptographic currency is bound to be a part of the future economy. <
ITAG Times
Articals
www.fitag.in
5
MkkÞçkh yku™÷kR™ þku®…„{kt ‚kðÄk™: MkVh FLOURISH KNOWLEDGE NETWORKING POWER PROTECTION
Wednesday
01 07 2015
yku™÷kR™ þku®…„ ‚kRxT‚ …hÚke ™ðku {kuƒkR÷ ¾heËðk™wt rð[khe hÓkk Aku? shk ðÄw rð[kh õhòu. yk„¤ sŒkt {kuƒkR÷{kt õtE «kuç÷u{ ÚkkÞ Œku õt…™e Œ{™u ðkuhtxe™ku ÷k¼ yk…þu s yu™e õkuE ¾kŒhe ™Úke.
ðkuhtxe™e õkuE „uhtxe ™Úke! ‚k
Þƒh‚Vh'™k y{ËkðkË™k yuõ ðk[õ nkrËoõ¼kE òuþeyu yuõ {kuƒkR÷ yku™÷kR™ ‚kRx …hÚke ¾heãku. ™ð {rn™k …Ae Œu™wt x[…uz ƒ„zŒkt Œu{ýu nuLz‚ux ƒ™kð™khe õt…™e™k ‚rðo‚ ‚uLxh™ku ‚t…õo õÞkuo, …ý õt…™eyu Œu{™u sýkÔÞwt õu Œu yku™÷kR™,y™ykuÚkkuhkRÍTz ze÷h …k‚uÚke ¾heËkÞu÷e «kuzfx …h ðkuhtxe™ku ÷k¼ yk…Œe ™Úke. W…hktŒ, nkrËoõ¼kE™k {kuƒkR÷ …h {uLÞwVuf[hh™e ™nª …htŒw ‚Ã÷kÞh™e ðkuhtxe nkuðk™wt …ý sýkððk{kt ykÔÞwt. nkrËoõ¼kE {uLÞwVuõ[hh õt…™e y™u yku™÷kE™ ‚kRx ðå[u yxðkŒk hÓkk …ý Œu{™e ‚{MÞk™wt ‚{kÄk™ ÚkÞwt ™nª. yk y™w¼ð™k ykÄkhu ‘‚kÞƒh‚Vh' îkhk yku™÷kR™ ‚kRx y™u {uLÞwVuf[hh õt…™e™ku ‚t…õo õhe™u nõeõŒ òýðk™ku «Þk‚ õhðk{kt
ykÔÞku. yu …hÚke, yuõ ‚k{kLÞ „úknõ Œheõu yk…ýu ‚kiyu õux÷eõ ðkŒ™k ƒkuÄ…kX ÷uðk sYhe Au : yku™÷kR™ ‚kRxT‚ …hÚke ¾heËe ð¾Œu yu ðkŒ ¾k‚ ‚{Syu õu ynª ðkuhtxe™ku {wÆku yíÞtŒ „qt[ðý¼Þkuo Au. ‚kRxT‚ ¼÷u 1 ð»ko™e {uLÞwVuf[hh ðkuhtxe™e ¾kŒhe yk…Œe nkuÞ, nõeõŒ{kt ðkuhtxe ƒu «õkh™e nkuÞ Au : yuõ, {uLÞwVuf[hh ðkuhtxe, su{kt õt… ™e™k õkuE …ý ‚rðo‚ ‚uLxh …h yk…ýu «kuzfx ÷E sEyu Œku yk…ý™u ‚…kuxo {¤ðku òuEyu. ƒeS, ‚Ã÷kÞh ðkuhtxe. su{kt yk…ýu «kuzfx su ‚u÷h …k‚uÚke ¾heËe nkuÞ Œu ‚u÷h™ku ‚t…õo õhðku …zu, sYh …zu Œku Œu™u «kuzfx {kuõ÷ðe …zu y™u …Ae™e ðkŒ yu ‚u÷h …h ykÄkrhŒ hnu. {kuxk ¼k„™e yku™÷kE™ þku®…„ ‚kRx …h yk ðkŒ™e [ku¾ðx nkuŒe ™Úke y™u …rhýk{u „úknõ Œuýu ¾heËu÷e
ðkr»koõ …heûkkyku nS Œku òus™ku Ëqh Au, …ý yíÞkhÚke yu™e Úkkuze ðkŒ õhe ÷Eyu. yu™wt yuõ [ku¬‚ õkhý Au M…u®‚„ RVufx yÚkðk Œku VkRƒku™kM‚e r‚fðL‚!
{k
Úkwt ¾tsðk¤wt …zu yuðk yk ¼khu¾{ þçËku Au, …ý yu™ku yÚko ‚kð ‚kËku Au y™u yk…ýu ‚ki yu™k rðþu ðkhtðkh ‚kt¼¤e™u s {kuxk ÚkÞk Aeyu, yÚkðk ÚkE hÓkk Aeyu! {kuxk ¼k„u yk…ýu …heûkkyku Ëqh nkuÞ íÞkhu ŒÆ™ n¤ðkþ hk¾eyu y™u …heûkk ‚kð {kÚku ykðu íÞkhu rËð‚-hkŒ™k Wò„hk õhe™u ðkt[ðk {tze …zeyu. su{™u …heûkkyku{ktÚke Aqxõkhku {¤e „Þku Au, yuðk ÷kuõku …ý yu{™k õk{õks™e zuz÷kE™ ‚kð ™Sõ ykðu íÞkhu s xuLþ™{kt ykðe™u VxkVx, ÄzkÄz õk{ …qÁt õhðk™k WÄk{k õhŒk nkuÞ Au, íÞkt ‚wÄe ™nª. …heûkk ð¾Œu ykðwt õheyu íÞkhu {B{e õu …Ã…k™k {kUyu y[qõ ‚kt¼¤ðwt õu yk™k õhŒkt …nu÷uÚke Úkkuzwt Úkkuzwt, …ý æÞk™Úke ðktåÞwt nkuŒ Œku yíÞkhu ykx÷wt xuLþ™ ™k ÚkkŒ. ƒ‚ yk ðkŒ™u {™kurð¿kk™™e ¼k»kk{kt M…u®‚„ RVufx õnu Au. {™kurð¿kk™{kt yuðwt {k™ðk{kt ykðu Au õu õkuE …ý ƒkƒŒ™ku yÇÞk‚ ÷ktƒk ‚{Þ„k¤k Ëhr{Þk™ [ku¬‚ ytŒhk÷ ‚kÚku õhðk{kt ykðu Œku Œu {™{kt QŒhðk™e þfâŒk ½ýe ðÄw nkuÞ Au. xqtõk ‚{Þ{kt ðkhtðkh yÇÞk‚ õhðkÚke ykðku VkÞËku ÚkŒku ™Úke.
«kuzfx{kt Œõ÷eV Q¼e ™ ÚkkÞ íÞkt ‚wÄe ytÄkhk{kt hnu Au. yku™÷kR™ ‚kRxT‚ y™u ‚u÷h yu ƒt™u y÷„ ƒkƒŒ Au. yk…ýu yu{uÍku™ õu ÂVT÷…õkxo õu M™u…ze÷ … k‚uÚke ¾heËe õhe yu{ {k™eyu, …ý yk õt…™eyku Ëhuõ rõM‚k{kt ðu[™kh-‚u÷h nkuŒe ™Úke. {kuxk ¼k„™e yku™÷kR™ ‚kRxT‚ VfŒ þku®…„ Ã÷uxVku{o Au, ynª õkuE …ý ðu…khe Úkkuzwt …u…hðõo õhe™u ‚u÷h Œheõu òuzkE þõu Au. yk…ýu õkuE «kuzfx yku™÷kR™ ¾heËeyu Œku ‚kRx ŒhVÚke <V{uoþ™ E-{uR÷{kt ‚u÷h Œheõu õkuE yuõ õt… ™e™wt ™k{ nkuÞ y™u «kuzfx ‚kÚku {¤Œk rƒ÷{kt ƒeS õkuE õt…™e™wt ™k{ nkuÞ yuðwt ƒ™e þõu Au. yk rð„Œku ƒhkƒh [õk‚e ÷uðe sYhe Au. òu {uLÞwVuf[hh õt…™e™k Ëkðk {wsƒ yk…ýu ¾heËu÷e «kuzfx ‚Ã÷kÞh™e ðkuhtxe nuX¤ ykðŒe nkuÞ Œku yk…ýu yu ‚u÷h™ku ‚t…õo õhðku …zu, …htŒw õux÷kõ rõM‚k{kt yu ‚u÷h™wt …kuMx÷ yuzÙu‚ …ý yku™÷kR™ ‚kRx …h yk…ý™u {¤e þõŒwt ™Úke. òu yu ‚u÷h yu ‚kRx …hÚke ðu[ký ƒtÄ õhe Ëku …Ae yk¾e ðkŒ …h …qýorðhk{ {qõkE òÞ Au. yku™÷kR™ ‚kRxT‚ «kuzfx…us …h {uLÞwVuf[hh ðkuhtxe nkuðk™wt ÷¾u Au
(õÞk õkÞËkõeÞ ykÄkh …h yk{ ÷¾ðk{kt ykðu Au? yu ‚ðk÷™ku õkuE sðkƒ yk…Œwt ™Úke), …htŒw Œu™k Ëhuõ ‚u÷h ykuÚkkuhkRÍTz ze÷h nkuŒk ™Úke.
{kuƒkR÷ õkuE …ý R÷ufxÙkur™õ «kuzfx yÚkðk yLÞ «kuzfx™k …us …h òuEyu Œku yu yuõ «kuzfx swËk swËk ‚tÏÞkƒtÄ ‚u÷‚o îkhk y÷„ y÷„ ¼kðu y™u y÷„ y÷„ þhŒkuyu ðu[ký õhðk{kt ykðŒe nkuÞ Au. yk Ëhuõ ‚u÷h {q¤ {uLÞwVuf[hh õt…™e™k ykuÚkkuhkRÍTz ze÷h nkuE …ý þõu y™u ™ …ý nkuE þõu. ¾heËe ð¾Œu yk…ýu yk ðkŒ™e M…ü {krnŒe {u¤ðe þõŒk ™Úke, õu{ õu {kuxk ¼k„™e {uLÞwVuf[hh õt…™e …kuŒk™k ykuÚkkuhkRÍTz ze÷h™e ÞkËe yk…Œe ™Úke. su {kuƒkR÷ {uLÞwVuf[hh õt…™e Œu™k y{wõ [ku¬‚ {kuzu÷ {kxu
VfŒ yku™÷kE™ ‚u®÷„ õhŒe nkuÞ Au y™u y{wõ r™rùŒ yku™÷kR™ ‚kRx ‚kÚku Œu™wt yuf‚f÷wrÍð xkR-y… nkuÞ Au Œu{kt ‚k{kLÞ heŒu R™ðkuR‚, ðkuhtxe™e rð„Œku ð„uhu …hVufx nkuÞ Au, …ý yLÞ Œ{k{ «kuzfx{kt ƒÄe ðkŒ [õk‚ýe õhðk™e sðkƒËkhe „úknõ™k rþhu hnu Au. yku™÷kR™ þku®…„{kt VfŒ yuõ
ðkŒ™wt ykïk‚™ hnu Au õu {kuxk ¼k„™e yku™÷kR™ ‚kRxT‚ ¾heËe™k y{wõ rËð‚™e ytËh, ¾heËu÷e «kuzfx …hŒ Mðeõkhu Au y™u {kuxk ¼k„u, õkuE ‚ðk÷ …qATÞk rð™k yk…ýu [wõðu÷e hõ{ …hŒ õhu Au. …rhýk{u, ¾heËe õÞr …Ae õtE …ý þtõkM…Ë ÷k„u Œku yk…ýu «kuzfx ŒhŒ …hŒ õhe þõeyu Aeyu. ykx÷wt ðktåÞk …Ae, yku™÷kR™ þku®…„ õhŒe ð¾Œu õu ‘{u„k E-‚u÷', ‘E-þku®…„ rVÞuMxk' ð„uhu ònuhkŒku{kt yfÕ…™eÞ ¼kðku ðkt[e™u ¾heËe õhŒkt …nu÷kt õux÷e ðkŒ™wt æÞk™ hk¾ðwt yu Œ{u rð[khe swyku! <
õku…e-…uMx õhe ÷ku {„s{kt
ykuõu, yk{kt VkRƒku™kM‚e r‚õðL‚ fâkt ykðe? yu ‚{òððwt {w~õu÷ Au, õu{ õu {wÆku „rýŒ™ku Au, …ý Au ƒnw h‚«Ë. „Þk yXðkrzÞu yhƒe ‚{wÿ …hÚke ykðu÷k ze«uþ™u yk¾k „wshkŒ™u Œhƒku¤ õÞwO íÞkhu yu ze«uþ™™e Œ{u ‚uxu÷kRx R{uS‚ Œ…k‚e nþu Œku ðkˤkt „ku¤ „ku¤ ½q{e™u yuõ õuLÿ{kt ÂMÚkh ÚkŒkt nkuÞ yuðkt Ë]~Þku òuÞkt nþu. yk VkRƒku™kM‚e r‚õðL‚™e y‚h Au. õkuE Vq÷{kt yuõ õuLÿ™e yk‚…k‚ [ku¬‚ …ux™o{kt …ktËzeyku ¾q÷u Au õu …ktËzeyku ðå[u™ku ËkýkËkýk suðku ¼k„ …ý yuõ [ku¬‚ …ux™o{kt ‚òoÞ Au y™u Œu …ý VkRƒku™kM‚e r‚fðL‚™e y‚h Au. yk VkRƒk™kM‚e yu yuõ Rxkr÷Þ™ „rýŒþk†e™wt W…™k{ nŒwt y™u Þwhku…{kt ßÞkhu hku{™ yktõzk «[r÷Œ nŒk íÞkhu Œu{ýu ¼khŒeÞ y™u yhƒe …ØrŒ y™w‚kh™k 0, 1, 2, 3... ð„uhu yktõzk Þwhku…{kt «[r÷Œ õÞko. Œu{ýu yktõzkyku™e yuõ r‚fðL‚ rðf‚kðe su{kt þqLÞ y™u yuõÚke þ\ õhðk{kt y™u íÞkh …Ae™ku Ëhuõ yktõzku, y„kW™k ƒu yktõzk™k ‚hðk¤kÚke ƒ™u. yk y™ku¾e r‚õðL‚™kt {q¤ …ý ¼khŒ{kt s nŒkt. yk r‚õðL‚ {wsƒ™k
yktõzkyku™u …nku¤kE „ýe™u Œu™kÚke ƒ™Œk [kuh‚ yuõ{uõ™e ƒksw{kt „kuXððk{kt ykðu Œku yuõ ðkðkÍkuzkt™kt ðkˤkt suðe õu Vq÷ku™k ðå[u™k ¼k„ suðe [ku¬‚, M…kRh÷ …ux™o ƒ™u. …ý, yk¾e ðkŒ{kt ðkŒ{kt …k½ze™ku
ð¤ Auzu yu heŒu ykðu Au õu VkRƒku™kL‚e r‚õðL‚ y™w‚kh, [ku¬‚ ¢{{kt y™u [ku¬‚ M…u®‚„ õu ytŒhk÷ ‚kÚku õkuE ƒkƒŒ òýðk{kt ykðu Œku Œu™e r™rùŒ y‚h {u¤ðe þõkÞ Au. yk r‚ØktŒ …h õk{ õhŒe, yuõ {ò™e
‚rðo‚ òýðk {¤e RLxh™ux …h www.inkpaste.com. yk ‚kRx™e …kurÍþ®™„ ÷kR™, yux÷u õu ‚kRx™ku nuŒw M…ü õhŒe ÷kR™ Au: ™uðh. Vh„ux. y™Äh. ðzo. õkuE þçË nðu …Ae fâkhuÞ ¼q÷ku ™nª! yk…ýu yt„úuS™k õkuE þçË™ku yÚko òýðk {k„Œk nkuEyu Œku ‚k{kLÞ heŒu þwt õheyu? rzfþ™he VtVku‚eyu õu „q„÷™ku ‚nkhku ÷Eyu, yu þçË™ku yÚko òýeyu y™u …Ae ƒeò õk{{kt yk„¤ ðÄeyu. …rhýk{u Úkkuzk rËð‚{kt yu s þçË Vhe ‚k{u ykðu íÞkhu yk…ýu Œu™ku yÚko ¼q÷e „Þk nkuEyu y™u Vhe rzfþ™he õu „q„÷™ku ‚nkhku ÷uðku …zu. RLõ…uMx ‚rðo‚ …h ðkŒ swËe heŒu yk„¤ ðÄu Au. yk ‚kRx …h yk…u÷k ‚[o ƒkuf‚{kt yk…ýu õkuE þçË õku…e-…uMx õheyu õu ÷¾eyu yux÷u Œu™ku yÚko òýðk {¤u y™u …Ae ‚q[™ õhðk{k ykðu õu yk þçË™k yÚko™u Œ{khe ÞkËþrfŒ{kt nt{uþ {kxu …uMx õhe ÷ku! òu yk…ýu yu ®÷õ (…uMx xw {u{he) …h rf÷õ õheyu Œku yk…Ûšt E-{uR÷ ykRze …qAðk{kt ykðu (Œu™ku M…k®{„ {kxu W…Þku„ ™nª ÚkkÞ y™u ƒeò õkuE™u E-{uR÷ yk…
ðk{kt ykðþu ™nª yuðe ¾kŒhe ‚kÚku). òu yk…ýu E-{uR÷ yk…eyu Œku ykðŒk 34 rËð‚ ‚wÄe, VkRƒku™kM‚e r‚õðL‚ {wsƒ™e M…u®‚„ RVufx y™w‚kh yu þçË™ku yÚko yk…ý™u ðkhtðkh E-{uR÷ õhðk{kt ykðu! ‚kRx™ku Ëkðku Au õu 34 rËð‚{kt Œku yu þçË™ku yÚko [ku¬‚…ýu Œ{khk rË{k„{kt õkuŒhkE s òÞ! Œ{u y÷„ y÷„ ‚rðo‚eÍ™u Œ{kÁt E-{uR÷ ykRze yk…ðk ™ {k„Œk nku Œku õkuE rzM…kuÍuƒ÷ ykRze r¢yux õhe™u Œu™ku …ý W…Þku„ õhe þõkÞ. yk ‚rðo‚™ku ðkMŒrðõ W…Þku„ ™ õhku Œku …ý ƒnw ¾kxwt{ku¤wt ™nª ÚkkÞ, …ý yu™ku r‚ØktŒ [ku¬‚ {„s{kt …uMx õhðk suðku Au Úkkuzwt, Úkkuzwt, r™Þr{Œ heŒu, r™Â~[Œ ¢{{kt! òu yk r‚ØktŒ ÞkË hk¾e™u õkuE …ý õk{ õhðk{kt ykðu õu yÇÞk‚ õhðk{kt ykðu Œku Œu™e [ku¬‚, Äkhe y‚h ÚkkÞ y™u ÄkÞwO …rhýk{ …ý {¤u s. RLxh™ux …h su õtE Au yu ƒÄwt, hkusuhkus W…Þku„ õhðk {kxu ™Úke, …ý yu{ktÚke yk…ý™u W…Þku„e y™u Sð™¼h õk{ ÷k„u yuðkt Œkhýku Œkhðe ÷uŒkt þe¾e sEyu Œku …ý ¼Þku ¼Þku! <
ITAG Times
News CORNER
FLOURISH KNOWLEDGE NETWORKING POWER PROTECTION
MINUTES OF MEETING Third conclave of Federation of All India Information Technology
Associations(FAIITA),
Hosted by FITAM Mumbai. AGENDA:
P
rimary Agenda of the III conclave was to hear the President's FAIITA vision and next step forward from resolutions of II Bengaluru Conclave to decide on FAIITA membership, membership fee and near term Federation objectives through formation of respective functional committes. Secondary agenda omprised of reviewing the OLS predatory price issue through vendor presentations on their initiatives in wake of FAIITA advisory of December 2014. A food for thought presentations on IT channel owned ecommerce portal was included by popular demand of the fraternity.
of FAIITA. 7. OLS & Vendor Committe Chaired by Shri Karhik.S will have Shri Pawan 1. Membership to FAIITA Agarwal, Shri Shiv will be open to all State Shankar Singh, Shri Federations for a one Shyam Modi and Shri time Membership Fee of Senthil Kumar as memRs/-10.000.00 and subsebers. quent annual Fee of Rs/8. Government Interface 5,000.00
DISCUSSIONS & DECISIONS :-
PROCEEDINGS-: The Conclave was kicked off by the welcome note of the General Secretary Shri Saket Kapur followed by President Shri Champak Raj Gurjar's addressing the delegates on his vision of brand FAIITA and its strategic achievemet through Chanakya Niti imbued with the spirit of a samurai. Vice President Shri Hari Balasubramanium piqued the audience by eliciting eloquently the failure of brand owners in vitiating the predatory prices of OLS. This was followed by brief intoduction by all delegates and their expectations from FAIITA. All delegates were of the view that synergy of the IT channel is of prime importance in business and growth through a common stand against the misplaced policies of the Government and principals. During open house in the afternoon of June 27th 2015 and Morning of June 28th 2015, some key decisions were taken and resolutions adopted
Committe Chaired by 2. Membership to FAIITA Shri Mahinder Agarwal will be open to all State will have Shri Gaurang Associations whereever Vyas, Shri Praveen there is no existing State Dhoka, Shri Navin Gupta Federation as an Associand Shri Anand Rao as ate Member for a one members. time Membership Fee of Rs/- 5,000.00 and subse- 9. Membership and Website Committe Charied by quent annual Fee of Rs/Shri Arun Kemar Dey 2,500.00 will have Shri Nalin 3. Every state Federation Patel, Shri Nagaraj will be considered as one Prabhu Borkar, Mr. vote at FAIITA Deepak Mortale and Shri 4. All Associate members Vinod Verma as memtogether from a State will bers. be considered as a single 10.Grievience Committe vote from that state. Chaired by Shri Pawan 5. All FAIITA Members and Jajodia, will have Shri Associate Members shall Ashok Tolanvar, Shri Satshare their list of Mempal Singh and Shri bers and will facilitate Praveen Dhoka as memtheir listing at the official bers. website. 6. Functional Committes 11.FAIITA Revenue Committe shall be formed in were formed to achieve due course of time. the near term objectives 12.Shri Alok Gupta was pro-
www.fitag.in Wednesday
01 07 2015
6
and extensive RAIDs are posed by Shri Shiv being conducted nationShankar Singh for the wide. post of Convenor and was selected unapposed. 9. Names of 17 partners Presentations by the Brand who have signed up for owners on their initiatives OLS were shared and it after issuance of FAIITA was agreed that their conadvisory in December 2014 tract terms will be shared were held in the afternoon with FAIITA. and received volley of B. Lenovo Shri Pankaj questions from the audiHarjai ence. Key takeways from the presentations are as 1. Confirmed implementafollows-: tion of eight initiatives based on FAIITA adviA. HP by Shri Ketan sory. Patel and Shri Vineet 2. Consequence manage1. Only authorized partners ment is yet to take off. are allowed to sell 3. Exclusive programmes through the OLS and 17 for conventional channel key partners pan India have been initiated. have signed up for same. 4. Sought help from FAIITA 2. Agency led tracking of in increasing PC penetraonline prices is in place tion. through consequence 5. Confirmed action against perpetrators of predatory management. 3. National Helpline for partprices. ners has been construed 6. Candidly admitted contrifor IT Channel partners to bution of OLS in offering escalate their concerns. deep discounts. 4. Unauthorized Partners 7. Lenovo's 95% percent are being refrained from business is through conselling online and spoling ventional channel and the MOP. only remaining 5% is 5. Punitive action by way of through OLS. holding rebates and in- 8. Acknowledged that OLS is the new route to the centivesof erring partners market and cannot be igoffering deep discount is nored. in place. 6. Differentiated SKUs 9. There is no role of brand Computing Products owner in predatory prices have been introduced exof OLS clusively for OLS. C. Dell Shri Krishna 7. Differentiated SKUs for Kumar had to last Printing Products is work minute drop out owing in progress. 8. Severe action is being inito personal reasons. tiated against the HP counterfiet consumables continued on page 7...
ITAG Times Continued from page 7...
D. Acer Shri Srivatsan 1. Claimed to be least exposed to OLS predatory prices. 2. Advisory on website to
News Article
FLOURISH KNOWLEDGE NETWORKING POWER PROTECTION
predatory prices, slapping of 6% additional customs duty on CPU HDD and withdrawl of concessions on Tablets and Mobile phones. His assurance to go out of the way in personal capacity in guid-
www.fitag.in Wednesday
ing the channel, left the audience sprightly motivated. Shri Senthil Kumar pres3. ident Confed ITA raised concerns on Regional distributors mining retail business and Shri Sanjeev 4. Walia laid emphasis on having KYC from vendors. 5. Shri Deepak Mortale made a motivating presenta6. tion of the vision for FAIITA website. E. Asus Mr.Arnold. Presentation and offer of Techbazar by Shri Pradeep 1. Confirmed engagement Gupta left food for thought with OLS on predatory for the channel on exlpoiting pricing. the new route to market. Key 2. Introduced differentiated take awayas from the presSKUs for online entation worth considering 3. Pricing issues at online are-: have been sorted out. 1. ownership of e-com4. Most of the products are merece portal at face no more exclusive for onvalue. line and available accross 2. Deal assurance for online the channel. transactions. 5. Delegates raised their 3. Dealing with certified concern on Asus policy to partners thus mitigating first launch new range risk of business. online. 4. Credit facility. Chief invitee of the con5. Protection of investment. clave was Shri Vineet 6. Show to be managed and Goenka from National BJP run by professional. IT cell. He gave a patient lis7. Valuattion of invetment tening to the concerns of the into company bound to delegates pertaining to OLS
7
multiply. Conclave was concluded by felicitating Shri Arun Kumar Dey for his relentless efforts of personally calling every leaders and ensuring their presence at the Con-
on Government escalation, the Government interface committe to immediately take issues of GST, OLS Parity and custom duty. Committe to share monthly nterim reports and to conclude with 3~6months. 3. Letter to all OEMs by vendor and ols committe raising OLS concerns. 4. HP printers predatory price issue to be under buy from authorized channel. Instilled confidence in conventional channel especially for consumer products. Initiated agreements with OLS to maintain MOP. Sensitive to the woes of the channel. Online is the way to move.
0107 2015
notice by Vendor and OLS issue. 5. General Notice to all vendors with a maximum of two week of period to act 6. MOU with Taiwan Computer Association to be sighned in early July'2015 Saket Kapur Gen.Secy. HONY. FAIITA Date:08-07-2015 Place New Delhi
clave. A special thanks was applauded by the delegates to FITAM for the w o n d e r f u l arrangements and hosting the conclave. All delegates dispersed with the promise to meet in third and fourth week of september to review the situation.
ACTIONS 1. All FAIITA promoter Federations and associations to furnish copy of their Registeration certificates along with the resolution in the given format for a nominee to represent at FAIITA. 2. Inspired by the address of Shri Vineet Goenka
Disclaimer: This Magazine is for private circulation only. The data published in this magazine is based on the inputs provided by various sources. The publisher, printer and the Editor do not guarantee the authenticity of correctness of the data published here in. Publisher : Gaurang Vyas, President, Fitag Editor: Kaushik Pandya Assistant Editor : Sejal Patel Designer : Hardik Pancholi Address : B/302, Rudra Arcade, Nr. Helmet Circle, Memnagar, Ahmedabad - 380015. All rights reserved. No part of this publication can be reproduced without the prior permission from the publisher.
ITAG Times
“I dunno, kind of defeats the purpose, doesn’t it?”
Cartoon CORNER
FLOURISH KNOWLEDGE NETWORKING POWER PROTECTION
www.fitag.in Wednesday
01 07 2015
8