Fax: 2560588
Ph.: 0268-2551849 2560588
With best compliment
Mo: 98252 63484 - Editorial Dear Fitagians, ome October and it is a season of festivals in India. Navratri has already gone and Diwali is just few days ahead. India is a country of fairs and festivals, which are celebrated in all the community and fraternity. IT fraternity is not an exception with Navratri and Diwali functions are celebrated amongst all our member associations across Gujarat. Garba organised by BITA and Diwali function of ACMA are wellknown for their style and celebration. Fluctuating Dollar against ruppee has created a sizable upset in the price factors of every IT product. Financial pressures are difficult to handle every Diwali, but this year it has worsen due to such multiple factors. It needs courage and confidence within to f i g h t such situation. I hope each member of FITAG's member associations will overcome such situation and flourish in coming future. In this edition of FITAG Times, we have incorporated articles related to new business avenues in the field of Surveillance. I am sure this will help members to understand the market scenario and decide on the future avenues. I have also incorporated another very important aspect of Information Technology i.e. Cyber threat attacks. E-business is becoming a routine in everybody's life and parallel cyber threats are increasing day by day. I am sure this article will give you excellent knowledge about this highly important aspect of our life. I am short of feedback from members. You are requested to send me more and more inputs to improvise FITAG Times. Enjoy 3rd edition of FITAG Times n
C
Mr. Kaushik Pandya Editor
www.fitag.in
15 10 2013
Tuesday
Ahmedabad, Gujarat
Vol. 1, Issue No. 3, Pages 8
Monthly Edition
FITAG
Times
FLOURISH KNOWLEDGE NETWORKING POWER PROTECTION
With best compliment 98245 33546 98245 00846
Video Surveillance Trends for 2013 IMS Research (now part of IHS Inc. (NYSE:IHS)), has recently released its fourth annual video surveillance trends for the year ahead white paper. These predictions for 2013 and beyond, serve to provide insight into key trends and opportunities in the video surveillance industry. They are: 8 New Battle Ground in Image Quality 8 Mobile Video Streaming - The Next Gear of Mobile Video Surveillance. 8 India to Remain a High Growth Market 8 Keeping it Simple in 2013 8 Intelligent Video Surveillance 8 Private Cloud – the future for enterprise video surveillance systems? 8 Remote Video Applications 8.Chinese Companies Looking West 8 Video Surveillance Goes Vertical 8 Video Content Analysis and Video Meta-data as “Big Data” 1. New Battle Ground in Image Quality The increased popularity of HD and megapixel resolution security cameras has been a hot topic in the video surveillance industry over recent years. And quite rightly so, world shipments of megapixel resolution network security cameras are predicted to out-sell standard resolution network security cameras in 2012 for the first time.
However, IMS Research does not expect higher megapixel resolutions to be a mass-market trend. Instead, it expects to see new technology developments and camera features that improve image quality become the key battleground as manufacturers try to establish their own USPs. 2. Mobile Video Streaming The Next Gear of Mobile Video Surveillance Traditionally, in the mobile video surveillance market, recorded video on an on-board device is downloaded wirelessly when the vehicle returns to the station or depot. Recently, there has been increased buzz around the capability to wirelessly stream video from a mobile video surveillance camera back to a control centre. For a control room operative this brings a number of advantages. For the police, the ability for a control room to view an incident live allows for an instantaneous
Fitag Times reaches to 21,000 retailers / dealers across Gujarat
assessment of the situation and more effective guidance for officers on the ground. It could also provide assistance for lone workers on buses and trains. In the coming year, IMS Research predicts that there will be renewed emphasis on this type of solution. 3. India to Remain a High Growth Market Economic growth in India has slowed. IHS expects that GDP in Asia’s third-largest
economy will grow by just 5.1 percent in 2012, down from 6.9 percent in 2011 and 9.6 percent in 2010. However, despite this background, spending on video surveillance equipment has remained resilient with the Indian market forecast to enjoy healthy double-digit growth in 2012. The unique characteristics of the Indian market make it an exciting place to do business. What is more, compared to other high growth markets, barriers to entry for foreign-owned suppliers are much lower. 4. Keeping it Simple in 2013 Many suppliers of network video surveillance are now targeting smaller installations to grow their businesses. IMS Research therefore predicts 2013 to be the year where suppliers focus on developing products that are easy to install, easy to operate, and easy to maintain.
Contined on page 2...
www.fitag.in
FITAGTimes FLOURISH KNOWLEDGE NETWORKING POWER PROTECTION
Contined on page 1... Network video surveillance can be an overly complex topic, particularly for those responsible for smaller installations. 2013 will be all about manufacturers making it more straightforward. 5. Intelligent Video Surveillance Forums discussing this concept are not new. In 2011, IMS Conferences ran an intelligent video conference in Los Angeles and the Embedded Vision Alliance has regularly been bringing together engineers from leading companies to discuss the industry. However, with the explosion of interest in intelligent video and the success of products such as Microsoft’s Kinect, will 2013 be the year of intelligent video?
6. Private Cloud – the future for enterprise video surveillance systems? IMS Research forecasts that private cloud being used for the infrastructure of enterprise video surveillance systems will become a trend over the coming years. Private cloud offers the same advantages as public cloud, which includes: remote access to data providing there is an internet connection, and shared use of data processing and storage resources. Video surveillance service providers have used aspects of cloud computing in their solutions for more than ten years. However, the prevalence of enterprise video surveillance systems using private cloud is starting to gain some traction as
IT managers increasingly take responsibility for the management of video surveillance systems. 7. Remote Video Applications “Remote” has been a bit of a buzz word for video surveillance in 2012. Video surveillance as a service (VSaaS), and its ability to provide remote access, has been keenly debated with opinion divided on whether it will be successful. Additionally, remote video monitoring has become an increasingly important recurring monthly revenue (RMR) generator for many alarm receiving centres. Both of these examples relate to physical security; however, there are a number of applications that can leverage “remote” video surveillance in non-security applications. IMS Research predicts a number of exciting new applications will enter
Tuesday
15 10 2013
the market in 2013. 8. Chinese Companies Looking West It has been well documented that China is one of the largest and fastest growing markets for video surveillance equipment. To date, much of the narrative on this topic has centered on estimating the market opportunity, identifying the leading local vendors and discussing how western companies can take advantage of this high growth opportunity. There has been little debate on the potential for Chinese video surveillance vendors to take advantage of the growth opportunities in other regional markets. However, this is beginning to change with the emergence of key Chinese vendors on the world stage. 9. Video Surveillance Goes Vertical Systems integrators and installers have been special-
2
ising in specific end-user industries for decades, with installation, design, service and maintenance offerings targeted to the unique requirements of customers in that industry. IMS Research predicts that 2013 will be the year that video surveillance vendors and PSIM platform providers follow suit. 10. Video Content Analysis and Video Meta-data as “Big Data” “Big Data” has been a hot topic for businesses in 2012. While Big Data is not going to be a mainstream concept for video surveillance in 2013, IMS Research predicts that the use and aggregation of analytics and video feed meta-data as Big Data will continue to grow, and that businesses looking to utilise Big Data will increasingly look at the potential to incorporate video feed meta-data streams into their data sets n
Fitag Times reaches to 21,000 retailers / dealers across Gujarat
www.fitag.in
FITAGTimes FLOURISH KNOWLEDGE NETWORKING POWER PROTECTION
Times FITAG w Revie & ident g Pres d Fita y, te c e ing of p r Res reta Launch d al Sec r your n Gener ratulations fo ugust 2013 a Cong th of A g times. 5 1 n o mes f Fita ay of Fitag ti ond Edtion o y the w Fitag b IMES. ec even S initiative by T G FITA Great logy of am IT lf techno of Gandhidh n beha t Digital n e Fitag o reat sid te re la P tu s ra ag A g h n it o C w I d ES. tion rs an Associa Gita membe re FITAG TIM e o th m d ll of A re an 24 for mo ng All success times will bri other. hanking You h c g a a e it T F n se to ociatio tion clo IT Ass sident Associa re hidham for Ga
nd
15 10 2013 Fitag Times
Tuesday
reaches to Hi, FITAG times is very good and appreciative step of FITAG as per my view. There are several benefit of it. Where one major benefit is UNITY. I Congratulate FITAG Team for the FITAG Times as well as for their ABCD-IT activity. I wish FITAG will do creative activites like these in future too.
P amani .Awatr J sh ti Sa
Chita Precident Anand
FITAG ENDORSE LEGAL Softwere For Space Booking in
FITAG TIMES fitagtimes@fitag.in Sejal: 98240 53863 Dhaval: 98240 66111
21,000 retailers / dealers across Gujarat
3
www.fitag.in
FITAGTimes FLOURISH KNOWLEDGE NETWORKING POWER PROTECTION
Tuesday
15 10 2013
4
What you can do with “Google� Download the latest version of Picasa. You can obtain the latest version for free from http://picasa.google.com. It will recognize whether your operating system is PC, Mac, or Linux when you arrive.
1
2
3
Double click on a photo to take you to the editing window.
When you first open Picasa, you can choose to scan your entire hard drive, or just My Pictures, My Documents, and Desktop. It will then display your pictures it its Library view. You will
find pictures you forgot you had because Picasa makes it so easy to view them. If you have pictures in folders other than My Pictures, My Documents, and Desktop you can add new folders manually by clicking on Tools / Folder Manager. The program will show photos in their respective < The "Fill folders. Light" slider has
5
the same purpose as the last button on the "Basic" editing box. Slide it up and down to lighten your photo. Useful for when you forget to switch on your flash. < The "Highlights" slider makes the light colours on your photograph lighter and more obvious. Use it when you want the light parts in your photo to stand out. <The "Shadows" slider serves the opposite purpose the "Highlights" one. Use it when you want to make the dark parts of your photo darker. < The "Colour Temperature" slider changes the "warmth" of your photo. Blue is cold and red is warm. Move the slider to the left if you want to turn your photo bluer and move it right if you want to turn your photo redder. < The "Neutral Colour Picker" removes colour cast from photos. Click on the eye-dropper icon and then on a neutral black, grey or white area of the photo to adjust the colour.
7
How to Use
Picasa
4
Learn what each button in the "Basic" editing box does. Here is a brief rundown to help you get started: < The first button, "Crop", is pretty obvious. By clicking on it, you can cut out a part of your image. You can choose a manual size, or choose one of the preset ratios. Click "Apply" when you are finished cropping. < The second button, "Straighten", can fix a slanting horizon. Click on it, and use the grid and slider to rotate the photo until straight. Click "Apply" to save your changes. < The third button, "Redeye", is also pretty self-explanatory. If you click it, Picasa will automatically fix any red eyes on a photo and indicate them with a green square. If the program has missed any eyes, you can drag a box around them with your mouse and the program will fix them. If Picasa boxed anything that is not a red eye, you can click on the box for the program to ignore it. Click "Apply" when you are done! < The fourth button, "I'm Feeling Lucky" adjusts the lighting and colour of your photo, to what the program thinks is a better shade. This button is handy for fixing hazy and dull photos. < The fifth button, "Auto Contrast" heightens the contrast of your photo to a better level. < The sixth button, "Auto Colour" improves the colour of your photo and works well on dull photos. < The seventh button, "Retouch" can remove dust spots on your photo, which helps a lot if you had dust on your camera lens. Click the "Retouch" button and then click on a blemish on the photo, then move the mouse around the spot until it is removed.
6
< "Sharpen" sharpens the edges in your photograph. Use this when your photo is slightly fuzzy and out of focus. Click on "Sharpen" and then move the "Amount" slider until you are happy with the changes. Click "Apply" to save your changes. < "Sepia" gives your photo an old-fashioned sepia tone. < "B&W" turns your photo into an old-fashioned black and white shot. < "Warmify" turns the 'colour temperature' (mentioned above) in your photo warmer. < "Film grain" gives your photo an old-fashioned film grain. This button combined with "Sepia" or "B&W" turns modern photographs into lovely old-looking shots. < "Tint" washes your photo in a colour of your choice. Click on the button and pick a colour with the eyedropper icon to wash your photo with. Then move the "Colour Preservation" slider until you are happy with the results. Click "Apply" to save your changes. < "Saturation" heightens your photo's saturation. Click on it and then move the "Amount" slider to the desired effect. Click "Apply" to save your changes. < "Soft focus" softens the photo focus around a point of your choice. This tool is handy for making a single object in a photo stand out. Click it, and then move the "Size" and "Amount" sliders until you are happy with the effects.
< Click on "Upload" to upload your pictures to Picasa Web Albums. This only works if you have a Web Albums account (located at: http://picasaweb.google.com). < Click on "Email" to email your pictures to a friend. You can choose to use your default email programme, which is more complicated to access from Picasa, or you can use your Gmail account, which is simpler to access because it can simply open in a pop-up, if you have one. <Click on "Print" to send your selected pictures to your printer. You can choose your layout preferences first, before hitting "Print" (at the bottom right) again. < Click on "Export" to move your pictures to another folder on your computer's hard drive. This is handy if you want to copy them onto a USB drive or CD later.
FITAGTimes FLOURISH KNOWLEDGE NETWORKING POWER PROTECTION
www.fitag.in Tuesday
15 10 2013
5
FITAGTimes
NEWS CORNER
FLOURISH KNOWLEDGE NETWORKING POWER PROTECTION
Microsoft acquires Nokia s devices and services unit for $7.2 billion The rumours that were doing the rounds for a long time now have finally been proved right with Microsoft buying Nokia’s devices and services unit. A Microsoft post read, “Under the rerms of the agreement, Microsoft will pay EUR (convert to $) 3.79 billion to purchase substantially all of Nokia’s devices and services business, and EUR 1.65 billion to license Nokia’s patents, for a total transaction price of EUR 5.44 billion in cash. Microsoft will draw upon its overseas cash resources to fund the transaction. The transaction is expected to close in the first quarter of 2014, subject to approval by Nokia’s shareholders, regulatory approvals and other closing conditions.”
www.fitag.in Tuesday
15 10 2013
6
Smartphones cause rise in myopia if smartphones have made our lives easier, there is a flip side too-they cause vision impairment, according a leading laser eye surgeon. Dr. David Allamby has revealed that smartphones have caused a surge in cases of myopia (short-sightedness) among young Britons. Allamby, the founder of Focus Clinics, has reported a 35 percent increase in patients with advancing myopia since the launch of smartphones in 1997, and warns that
myopia in young adults could increase by 50 percent within 10 years. According to allamby, excessive screen watching at a close proximity keeps the genes that control myopia activated well beyond the age that short-sightedness would historically have stabilized - around the age of 21. This is known as “epigenetics”. Allamby says today’s generation is most at risk, with children as young as seven being given their first smartphones.
companies shifting The next version of Android Indian to open source software will be called KitKat! I
A
midst the rumours of Android 5.0, codenamed Key Lime Pie, Android boss Sundar Pichai opened a Pandora’s box by revealing android KitKat. Yes, that’s true - your next Android will be Android 4.4 and will be fondly called Android Kitkat. Raising a toast to the suc-
cess of Android with over 1 billion device activations, Pichai wrote in a Google+ post, “On my return from Asia, I was also thrilled to find this guy waiting to greet me on the front lawn love the new # Android Kitkat statue and can’t wait to release the next version of the platform that is a
Firefox 24 arrives for Android Mozilla has officially launched Firefox 24 for Android. The new version comes with a number of new features, improvements and tools that aid easy sharing and support for WebRTC. Wondering how WebRTC will work on a mobile? Well, with this new feature, Mozilla is now on per with Chrome for Android, as Chrome users have had access to WebRTC in their mobile browsers for a while now. You may not be able to start using this real-time communication protocol right away, but it will surely encourage more developers to write applications for it. Additionally, there is a new ‘quickshare’ feature in the Firfox Share menu. This means that the new version lets you automate the process of sharing links on Twitter, Facebook or via email. This new version also supports sharing over NFC, which means you can now bump your phone with your friend’s and share easily. It also gets an improved Reader, which lets you read seamlesssly. It can swithc lights between night
sweet as the candy bar that’s one of our team’s favourites:)” Since it is going to be Android 4.4 and not Android 5.0 (Key Lime Pie), we do not expect any major changes in it. The tech experts opine that we should expect only a small upgrade with A ndroid KitKat.
and day mode automatically, depending on the ambient light in the room. The ‘shiny’ Linux kernel 3.11 arrives! The ‘all shiny and ready to be compiled and loved’ Linux kernel 3.11 is here. Making the announcement, Linus Torvalds, the creator of Linx, revealed that the final version of the kernel doesn’t have too many changes as compard to the rc7, but it surely has some important bug fixes, Most of the bug fixes have been made in the networking tree, along with some in the file system and the sound features. In his release announcement, Torvalds regretted missing out on announcing the recently released rc7. Some of the features packed into the Linux kernel 3.11 include LZ4 compression, Zswap, XFS and EXT4 file system improvemnts, inclusion of Lustre, Dynamic Power Management (DPM) for Radeon GPUs, new DRM display, AVX2 optimisation, ARM improvements, Power PC architecture updates, input device and audio stack improvements, among others.
ncreased licensing costs due to the falling rupee are pushing Indian firms to switch to open source software. Accroding to a report, companies are recognising the cost benefits and flexibility offered by such software compared to their proprietary counterparts. Companies like Hungama Digital Entertainment, Uttam Energy, Bilcare, Euronet, Star Union Dai-Chi and iGate have all switched to open source
software. The list, according to the report, is growing. The report said that shifting to open source software is not limited to servers only- critical functions are now turning to open source. Customer relationship management softwere, business intelligence softwere, etc, are now running on open source softwere, Rahul De, chair professor in HP was quoted as saying.
Articals
FITAGTimes
FLOURISH KNOWLEDGE NETWORKING POWER PROTECTION
www.fitag.in Tuesday
15 10 2013
7
Ransomware is hijacking systems in greater numbers, and AutoRun malware infections, spread by thumb drives, are also rising, according to McAfeeâ&#x20AC;&#x2122;s latest threat report Malware Increasing Steadily
M
alware has risen sharply over the last three quarters, according to the McAfee Threat Report: Second Quarter 2013. McAfee said it currently has more than 147 million malware samples. Spam is also on the rise, helping spread malware and phishing
attacks. Mobile threats are also increasing, McAfee said, including new backdoor Trojans and banking malware targeting mobile devices this quarter. Malware that uses stolen digital certificates to pose as legitimate software increased by 50 percent, McAfee said. In addition, Web-based attacks, designed to target vulnerable browser components comprise almost threefourths of the Internet's malicious activity. Here's a look at the latest attack trends and hacking techniques.
AutoRun Malware AutoRun malware, a longstanding threat targeting Microsoft PCs using malware on thumb drives, doubled at the start of the year, according to McAfee. Microsoft addressed the issue years ago, but it continues to target PCs that haven't been patched with the latest security updates. Security vendor Kaspersky Lab recently analyzed two new
JavaScript worms that are both designed to spread using AutoRun functionality. Once a corporate network is infected, the worms are difficult to wipe out, according to Kaspersky lab, because they quickly spread by copying themselves into the root folders of logical volumes of removable storage media and network disks.
Rootkits In Decline Rootkits, which are designed to evade detection and remain on victim's systems for a lengthy period of time, continue to
decline, according to McAfee. The company said rootkits have been trending downwards since the middle of 2011. The rootkit itself is only designed to remain stealthy, but it typically contains other malware, such as keyloggers, designed to record keystrokes, and password stealers. Rootkits are also used to bring an infected machine into a
Master boot record malware, which can add malicious functions when a user starts up the PC, declined slightly in the second quarter, but it remains at a level that is the second-highest figure McAfee has recorded. One high-profile malware called Shamoon targets Windows NT systems and was used in the
quarter, the company said. Ransomware attacks are growing in popularity over fake antivirus software because attackers have figured out that they can use anonymous payment services to keep security researchers and law enforcement from tracking them down.
Suspicious URLs Rise
10 TRENDING
CYBERTHREAT ATTACKS IN
larger botnet. ZeroAccess is the most prevalent rootkit, according to recent studies. According to security firm Sophos, ZeroAccess is often connected to popular exploit toolkits including Blackhole. It is used to fuel clickfraud campaigns and spread spam.
2013
Mobile Spyware Rising Security vendors have been increasingly labeling freely available Android applications as spyware due to their behavior of uploading SMS messages, call logs and location information to a remote server without informing the device owner. And, McAfee said the threat is increasing. One of the latest attacks detected by McAfee uses a mobile app that masquerades as a legitimate font installer app for Android devices. Another threat pretends to be software for syncing a user's phone. A recent report by San Francisco-based Lookout Mobile Security tied mobile spyware activity to Russian cybercriminal gangs. An affiliate network has earned some attackers up to $12,000 a month, the firm said.
Master Boot R e c o r d Malware
attacks on Saudi oil production firm Aramco. The attacks are dangerous because the malware contains destructive functionality, giving cybercriminals the ability to erase the entire hard drive of a victim's system and the servers of businesses. The attacks prompted security experts to call for system redundancy and offline backups of critical systems and files.
Ransomware Rising Ransomware, which locks a victim's infected machine and demands payment for the unlock code, has been steadily increasing, McAfee said. The number of new, unique malware samples this quarter is greater than 320,000, more than twice as many as last
The number of suspicious URLs that lead to sites hosting malware and phishing attacks continues to increase. McAfee said it logged more than 74.7 million suspicious URLs by the end of June, which represents a 16 percent increase over the first quarter of 2013. Google, Bing, Yahoo and others join McAfee and other security firms to constantly rate the reputation of websites. McAfee said it will label a URL suspicious if its automated systems "find combinations of questionable code and functionality." The 74.7 million URLs it is tracking refer to 29 million domain names, up 5 percent from the previous period.
Phishing Attacks Decline McAfee said it is charting a decline in the number of new phishing URLs over the last quarter. The firm said the number of new phishing URLs ebbs and flows throughout the year, trending upward typically during the
holiday season. The top five industries being targeted by phishers include finance, online auction sites, government, shopping and services, McAfee said. Companies in the U.S. are the most frequently targeted, with Amazon, American Express, Deloitte and eBay leading as the top companies being targeted.
Spam On The Rise Spam volume has now reached 2010 levels at 2 trillion messages, McAfee said. Spam volume also rises and falls throughout the year. Spam in the United States decreased by 16 percent, McAfee said. The U.S. hosts the most sites used for spam purposes, McAfee said. Delivery service notification teasers remain popular as well as drug offers. Much of the spam identified in the last quarter contained subject lines related to the Boston Marathon bombings. Many of the messages contained links to malware.
Botnet Infections Rise, Cutwail King Botnet infections had been on the decline since May of 2012, but McAfee said it has begun charting an increase in the last quarter. Cutwail remains the largest botnet, infecting 6 million PCs during the second quarter, McAfee said. Cutwail sends out spam, but it is also connected to the spread of banking Trojans and other malware that are embedded in malicious document files. Researchers said in May that a new Cutwail communications mechanism makes it more resilient to take downs. The bulk of the latest Cutwail infections are in India, Iran and Mexico.
Attacks Target E-Currency Distributed denial-of-service attacks against the infrastructure that supports the Bitcoin have resulted in wild swings in the virtual currency's value, McAfee said. Law enforcement cracked down on some of the cybercriminals behind the attacks. But, malware is available on the black market that can be used to infect PCs and servers to use the computing power to mine Bitcoins without the owner's knowledge. Account holders are at an increased risk of attack from phishers and attackers attempting to drain accounts, McAfee said. Other forms of ecurrency are available and also come with serious risks n Content by: Computer Reseller News (www.crn.in) n ROBERT WESTERVELT
Publisher : Gaurang Vyas, President, Fitag Editor : Kaushik Pandya Assistant Editor : Sejal Patel Designer : Hardik Pancholi Address : B/302, Rudra Arcade, Nr. Helmet Circle, Memnagar, Ahmedabad-380015. All rights reserved. No part of this publication can be reproduced without the prior permission from the publisher.
FITAGTimes
ACTIVITY CORNER
FLOURISH KNOWLEDGE NETWORKING POWER PROTECTION
www.fitag.in Tuesday
15 10 2013
8
FITAG ABCD-IT 2nd Session At BITA (Baroda IT Association)
FITAG as promised had arrange ABCD-IT at Baroda & in future will continue the same across Gujarat. ABCD-IT was lead by official mentor Mr. Nandak Pandya.. All BITA members enjoyed the programme. FITAG team thanks Bita team for good arrangment.
BITA Garba Mahotsav 2013
Baroda IT Association (BITA), celebrated Navratri by organizing BITA Garba Mahotsav 2013 at Akota Stadium from 5th to 13th October backed by the theme 'Technology meets Tradition'. BITA had roped Shri Pankajkumar Goswami of "Soor Group" a well known name in the field of Garba as a lead singer. With joint effort of BITA Board and other members this turned into a huge success. The entire association members have worked really hard to make this event a successful event." With a jam packed stadium with various different stands like Member's Pavalion, Invitee, VIP, Executive lounge more than 10,000 people participated on daily basis in BITA Garba Mahotsav 2013. Apart from this prizes like LED TV, Tablet, Phone Pad and Memo Pad were given to best performers in different categories on daily basis. This year BITA Garba Mahotsav moved to second place from its third place as best garba organization in Vadodara.
Fitag Times reaches to 21,000 retailers / dealers across Gujarat