Executive Committee 2010-11/12 President Prof. P Thrimurthy president@csi-india.org Vice-President Mr. M D Agrawal vp@csi-india.org
Volume No.34
Dr. S Subramanian div3@csi-india.org
Division-III (Applications)
Mr. H R Mohan div4@csi-india.org
Division-IV (Communications)
Prof. Swarnalatha Rao Division-V div5@csi-india.org (Edu. & Research)
Hon. Secretary Prof. H R Vishwakarma secretary@csi-india.org
Nominations Committee
Immd. Past President Mr. S Mahalingam s.maha@tcs.com
Prof. (Dr.) U K Singh
Dr. Shyam Sunder Agrawal
Dr. Suresh Chandra Bhatia
Regional Vice-Presidents Mr. M P Goel rvp1@csi-india.org
(Region I)
Dr. D P Mukherjee rvp2@csi-india.org
(Region II)
Theme Section : IFIP Networking 2010
04 05
Prof. S G Shah rvp3@csi-india.org
(Region III)
Mr. Sanjay Mohapatra rvp4@csi-india.org
(Region IV)
Dr. D B V Sarma rvp5@csi-india.org
(Region V)
Mr. C G Sahasrabuddhe (Region VI) rvp6@csi-india.org Mr. S Ramanathan rvp7@csi-india.org
(Region VII)
Mr. Jayant Krishna rvp8@csi-india.org
(Region VIII)
Division Chairpersons Dr. Deepak Shikarpur div1@csi-india.org
Division-I (Hardware)
Dr. T V Gopal div2@csi-india.org
Division-II (Software)
Connecting to the World–Participation in IFIP Activities Lalit Sawhney
Message from General Chair S. V. Raghavan
Special Report
06 09
The Technical Program for IFIP Networking 2010 Laura Marie Feeney
Inaugural Address Saurabh H. Sonawala
IFIP Networking 1 0 9th Sanand Sasidharan and K Madhusudanan
1 7
Valedictory Address
Publications Committee
Ideas & Opinions
Chairman Prof. S. V. Raghavan svr@cs.iitm.ernet.in
Chief Editor Dr. T V Gopal gopal@annauniv.edu Director (Education) Wg. Cdr. M Murugesan (Retd.) director.edu@csi-india.org Executive Secretary Mr. Suchit Gogwekar hq@csi-india.org
Mr. Suchit Gogwekar For Computer Society of India
S Mahalingam
Industry in Transformation: Opportunities and 1 8 ITChallenges for India Raja M Mitra
HR Column
2 1
360 Degree Feedback Latha Rajan
Articles
The Digital World in 2025 2 3 Peter Linton and Paul Schuchhard 35
Bridging the Digital Divide and a Comprehensible Model to Develop Handy E-government in Developing Countries
L Pradhan, B B Mohapatra, A K Panda and S Dehuri
Departments
02 03 Published by
June 2010
Contents
Hon. Treasurer Mr. Saurabh H Sonawala treasurer@csi-india.org
Issue No. 3
Community Talk President’s Desk
CSI Topics
CSI Calendar 2010-11
(2nd Cover)
41 CSI-Nihilent e-Governance Awards 2009-10 World Telecommunication and Information Society Day 44 (WTISD)-2010 – A Report NWCN-2010: National Workshop on Computer Networking 45 – A Report 46
From CSI Chapters
CSI Communications | JUNE 2010
1
Community Talk The Computer Society of India [CSI] represents the Indian community in the International Federation for Information Processing [IFIP] since 1974. The efforts were led by (Late) Dr. R Narasimhan, Founder President of CSI and Maj. Gen. A. Balasubrahmanian, AVSM (Retd) was 1st Member of IFIP General Assembly. IFIP is an umbrella body consisting of all the leading National Computer Societies in the world and other leading societies like IEEE Computer Society, ACM and Regional Computer Federations like CEPIS from Europe, CLEI from Latin America, SEARCC and technical societies like VLDB, IMEA (Med. Informatics), and so on. CSI has representatives in some of the Technical Committees and Working Groups of IFIP and has also been organizing IFIP sponsored events and conferences in India. I wish to place on record my sincere thanks to Maj. Gen. A Balasubrahmanian, AVSM (Retd.) for his persistent efforts in bringing many core issues of the IT profession in India in the deliberations of IFIP. Many Indian Professionals blossomed at the International Level under his guidance. “CSI Digest” was started as a new publication of CSI to keep the members of CSI up-to-date on all IFIP matters nationally and internationally. CSI enjoyed a working relationship with the publishers of the Proceedings of the IFIP Conferences which enabled selected papers to be included in the “CSI Digest” after one year of the conference at no cost. This facilitates a larger number of IT Professionals in India gain from the deliberations at the IFIP events as gaining access to the proceedings was very difficult to them for many reasons. Mr. H R Mohan was the first Editor of “CSI Digest” and I was fortunate to serve as the next Editor of this publication. This experiment could not sustain
and over the past few years, we have been discussing about ways and means of forging such relationship between IFIP and CSI Communications [CSIC]. Mr. Lalit Sawhney is presently the Vice President of IFIP [2009 – 2012]. The IFIP has renewed its publication agreement with Springer for another five years, beginning January 1, 2010. The new agreement is with Springer Verlag Berlin Heidelberg. Let us hope that through the good offices of the Indian Professionals representing CSI in the IFIP, we will soon enrich the CSIC with IFIP related content. IFIP is celebrating its 50th Anniversary in the Year 2010. It gives CSI great pleasure in bringing out a special theme issue on the recently concluded “IFIP Networking 2010” conference at Chennai, India. The deliberations were rich in technical content and the conference was meticulously organized. The Conference Proceedings were published by Springer Verlag. This proceedings comprises 24 revised full papers and 9 work in progress papers were carefully reviewed and selected from 101 submissions for inclusion in the book. The papers cover a variety of research topics in the area of P2P and overlay networks; performance measurement; quality of service; ad hoc and sensor networks; wireless networks, addressing and routing; and applications and services. Participating in the deliberations of the conference was another good learning experience for me. I thank Prof. S V Raghavan, Ms. Laura Marie Feeney and the members of the various committees for providing all the necessary support in compiling this theme issue. Dr. Gopal T V Hon. Chief Editor gopal@annauniv.edu
NETWORKING 2010 9th International IFIP TC 6 Networking Conference, Chennai, India, May 11-15, 2010, Proceedings Series:
Lecture Notes in Computer Science
Subseries: Computer Communication Networks and Telecommunications, Vol. 6091
Crovella, Mark; Feeney, Laura Marie; Raghavan, S.V. (Eds.)
1st Edition., 2010, XVI, 410 p., Softcover
ISBN: 978-3-642-12962-9
CSI Communications | JUNE 2010
2
PRESIDENT’S DESK From : president@csi-india.org Subject : President’s Desk Date
: 1st June, 2010
Dear Affectionate Members of CSI Family, Some of our initiatives started yielding good results. Please join me in thanking Our E-news letter team: Mr. H. R Mohan (hrm.csi@ gmail.com) & Mr. Pavan Kota (pavankota@kinduz.com) , for their voluntary contributions in successfully launching fortnight issue of CSI-eNews letter with effect from May 1, 2010. You may love to access the news letter at our website www.csi-india.org/enl/csienl-2010-05-01.pdf. This newsletter is a compilation of information from different sources which would interest ICT professionals, academicians and students. Our CSI members also can contribute to the news letter by sending news to hrm.csi@gmail.com.. Research activities CSI has been promoting Research activities with research grant and also by encouraging presentation of research papers by organizing National & International events. However, CSI needs to have a mechanism of carrying out research work. We need to have research centers and research Directors. Honorary Directors are to be identified to propose Research Projects to Government(s) and Industry and get research grant for carrying out research work at CSI offices/research centers. Research Center(s): We have been making attempts to form CSI research centers in association with some of the Institutions, since long. Happy to inform you that JayPee University of Engineering and Technology, Raghogarh, Guna is setting up a Digital Forensics Research Centre at JUET, Guna (MP) and has proposed for CSI technical association. It is being considered. We are looking forward for nominations of researchers as CSI Hon. Research Directors and proposals for associating CSI in forming research centers to promote research. They may kindly be sent to secretary@csi-india.org CSI Journal: Our grateful appreciation to Prof. P.V.S. Rao, Chief Editor of CSI Journal for his excellent contributions on improving the Quality of the Journal. An attempt is made to bring out the pending back log volumes. Thanks to the humble work of Mr. Saurabh Sonawala for following up the backlog of some of the pending publications. We are happy that Prof. P Nagabhushan of Mysore University has kindly accepted our request to be the Chief Editor of CSI Journal and he would handle the new issues of the CSI Journal. CSI Adhyayan. A review has resulted in formulating the process of bringing the CSI Adhyayan in electronic form. Prof. H.R Viswakarma of VIT would bring out the volume very soon. SIG committees: A number of Special Interest Group(s) SIGs have been formed in CSI to promote research, technical education and knowledge sharing in several domain specific areas. Each SIG is aimed at providing excellent opportunities to the members on information exchange, mutual learning and for promoting education and research. Some of the SIGs like E-Gov has made a great mark in the country in promoting E-governance initiatives . Several state governments are competing for CSI-Nihilent E-Governance awards every year and Knowledge sharing summits on E-Governance have become the destinations for sharing the experiences
on E-Governance by all the Governments. Other SIGs could make some initiatives. However, we all need to take them forward as per the objectives. Hence, a call has been given in the May issue of communications by Shri M.D. Agrawal and Prof. H.R. Viswakarma. I request the members who are passionate to contribute in specific SIGs may please respond on the same. Inauguration of renovated premises of CSI Mumbai Chapter In an effort to continue the leading edge not only in conducting high quality programs but also on modernizing the infrastructure, the Mumbai chapter of CSI has renovated the chapter office and provided a corporate out look. It was formally inaugurated by Shri Raj Saraf, Chairman, Zenith Computers Ltd. on Tuesday 4th May, 2010 at E-217, Floral Deck Plaza, MIDC, Andheri East, Mumbai – 400093. We appreciate the efforts of members of the Mangaing committees (past headed by Shri Rajiv Gerella and present MC headed by Shri Vishnu Kanhare and Shri Ravi Paturi) and our office bearers Mr. MD Agrawal and Shri Saurabh Sonawala, who have demonstrated that the Voluntary strength is most powerful in the world. Each member of CSI in Mumbai Chapter deserves my salute for the harmony created in the chapter. Our congratulations to the CSI members of the Mumbai chapter. New Student Branch: Hearty congratulations to Prof R M Bhatt for his success in forming the student branch of computer society of India in Alwar Institute of Engineering & Technology (AIET), Rajastan. Dr V K Agrawal, Chairman, Sri S P Garg, Director of AIET group of Institutions deserve our appreciation in promoting the CSI activities. IFIP Networking 2010 (http://networking-2010.org/),the 9th event in the series of International Conferences on Networking under the leadership of IFIP Technical Committee on Communication Systems (TC6) has been conducted by CSI and hosted by the Indian Institute of Technology Madras, Chennai during 10-14 May 2010. There has been participation from 23 countries of five continents. CISCO and TCS supported the event. We appreciate the efforts of Prof. S.V.Raghavan, Shri M.D. Agarawal, Shri Ramanathan, Shri Ramaswamy, Shri H.R.Mohan and all the members of CSI Chennai chapter for making the conference, a grand success. SEARCC 2011 Shri M.D. Agrawal has attended SEARCC EXCO meeting at Sydney during the First week of May and our proposal to host SEARCC 2011 in India, has been accepted. Reviews I appreciate the efforts of our regional Vice-Presidents Mr Shekhar Sahasrabuddhe, Dr. DBV Sarma , Prof. S.G.Shah and Shri M.P. Goyal for their recent initiatives with all chapters, divisional chairmen to identify new activities.
Prof. P. Thrimurthy President, Computer Society of India
CSI Communications | JUNE 2010
3
theme ARTICLE
Connecting to the World–Participation in IFIP Activities Lalit Sawhney Vice President, IFIP & Indian Rep to IFIP General Assembly 1032, Sobha Jasmine, Sarjapur Outer Ring Road, Bellandur, Bengaluru 560 103 E-mail: lalit@lalitsawhney.com, lalit.sawhney@ifip.org, lalit.sawhney@gmail.com
CSI has a diverse membership consisting of professionals, academicians, researchers and students. In recent years, the society has tried to reach out to more members and provide more value to existing members by hosting technical conferences and workshops at national, regional and local levels, improve the quality of our publications and bring out new publications, providing opportunities to members for self-development. Through our membership in International Federation for Information Processing (IFIP), CSI would like to provide opportunities to Indian academicians and researchers to work with their international peers in IFIP Working Groups and Technical Committees. In addition, the Special Interest Groups can also connect to their global counterparts in IFIP, so that they can interact with their global colleagues, invite a wider participation in their activities from around the world and participate in international events organized by these Working Groups, Technical Committees and access and publish in the prestigious IFIP publications and the new Digital Library. While CSI has enjoyed a good relationship with IFIP over the years, the large amount of academic and research work being done in Indian Universities, Research Institutions and other professional organizations is not very well known in IFIP. Equally, all this technical and academic activity can attract a larger number of IFIP events and technical activities to India. We believe that this increased involvement can benefit our current membership by providing them better global access, and also attract new members from Universities, Research Institutions and other professional organizations - who may want to benefit by greater access to the best computer societies in the world, their events and publications. This issue of CSI Communications covers the flagship event of IFIP Technical Committee TC-6, NETWORKING 2010 which was successfully held in Chennai last month. This conference attracted more than 100 papers from 23 countries. After a rigorous review process, the Technical Program Committee,
aided by 50+ external reviewers met at Columbia University, New York and selected 24 papers for participation. Thanks to IIT-Madras, the Chennai Chapter of CSI and the General Conference Chair, Prof. S.V. Raghavan, the academic and professional community in India got an opportunity to attend a top quality technical conference on Network Technologies, Internet Design, Applications and Services, right at their door steps, with very reasonable registration fees. In recent years, we have nominated a number of CSI Representatives on IFIP Technical Committees and worked with IFIP at various levels to get better visibility for CSI and get more events to India. The members will be happy to know about some of the recent initiatives to work more closely with IFIP - getting the IFIP President, Prof. Basie von Solms and the entire IFIP Board to come to New Delhi last year for their Board and Executive Committee meetings in March 2009, hosting the Human Computer Interaction Working Group Workshop in Pune in Oct 2009, the AGORA Life Long Learning Workshop (TC-3) in New Delhi in Mar 2009, the 1st IFIP International Conference on Bio-Informatics held at Surat in Mar 2010 (covered in the May 2010 issue of CSI Communications) and of course, the recent IFIP TC-6 Networking Conference. The CSI SIG on e-Governance is co-sponsoring the 1st IFIP Conference on E-Government and E-Services at Brisbane in Sept 2010, as part of the IFIP World Computer Congress, WCC 2010. The IFIP President-Elect, Mr. Leon Strous was invited to ITU World Telecommunication Development Conference at Hyderabad last month, and the CSI President invited him to meet with all the CSI Office-Bearers at Mumbai. We can now build on these initiatives, and get many more quality IFIP International conferences and workshops to India. All these interactions and greater visibility within IFIP have improved the climate for our TC Reps to work more closely with their TCs, learn about the work being done in their TCs and present it to their Indian colleagues through the new CSI Knowledge Portal, CSI
CSI Communications | JUNE 2010
4
Communications and SIGs. Additionally, the TC reps should be able to promote active research / academic work in that area in India, and publish papers / books and present papers in international conferences and they can provide a way for the TC and Working Groups to recruit active participants from India and help them organise workshops, seminars, summer schools and conferences in India. One suggestion is for the TC Rep to
lead a CSI Special Interest Group (SIG) in a directly related area or work closely with an existing SIG. Next, the SIG members could be motivated to work in the Working Groups of that TC (each TC has 8-10 Working Groups), where the real work of the TCs takes place. Our CSI Members and other professionals are also welcome to participate in the 100+ IFIP Working Groups in different
technical areas (details on www.ifip.org). CSI has invited volunteers to strengthen our collaboration with IFIP (see the Call for Volunteers from Vice-President and Hony. Secretary in CSI Communications May 2010). Those of you are interested, are welcome to write to hq_ifip@csi-india.org giving your interest and reference of your academic / research work. ooo
About Mr. Lalit Sawhney Lalit Sawhney spent 18 years with the Unilever Group in India and was head-information systems at Hindustan Lever. He was also awarded the prestigious IS Man of the Year award by Computerworld in 1999, and the Fellowship of the Computer Society of India in 1996. Lalit Sawhney did his graduation in Electronics Engineering from University of Delhi and a P G Diploma in business administration from the Indian Institute of Management, Ahmedabad.
message from the general chair: IFIP Networking 2010 Dr. S V Raghavan General Chair, IFIP Networking 2010 & Scientific Secretary Office of Principal Scientific Advisor to Government of India 324-A, Vigyan Bhavan Annexe, Maulana Azad Road, New Delhi 110011. e-mail: svr@cs.iitm.ernet.in The 9th International IFIP - TC 6 Networking Conference was organized and hosted by the Indian Institute of Technology Madras and Computer Society of India, Chennai Chapter. It has been a great pleasure participating in the deliberations with eminent researchers both from the academia and the industry from all over the world. I am happy that CSI Communications [CSIC] is bringing out this special theme issue on the IFIP Networking 2010. The detailed reports from the Programme Committee and the Steering Committee are included in the theme section. I thank Mr. Saurabh Sonawala for sending the text of the Inaugural Address. I thank Mr. S Mahalingam for sending the text of the Valedictory Address. Thanks are due to the team led by Mr. Sanand Sasidharan, at the Network Systems Laboratory, IIT Madras and the various Committees formed for organizing the conference.
About Dr. S V Raghavan Career at the Department of Computer Science and Engineering, IIT Madras, Chennai - 600036. INDIA • Professor, (1995-Current) • Director, Network Systems Laboratory (1984 - Current) • DEAN (Planning) (2003-2005) • Chairman, Integrated Computing Environment (2002-2005), • Head of the Department (1995-1998) Contributions to the Profession: • Chairman, Technical Advisory Committee, National Knowledge Network, Government of India • Program Director (2008 - Current): Indo-Australian Program on Critical Infrastructure • Protection, Department of Science and Technology, Government of India • President (2009 - Current): Indo-Australian Information Technology Security Society • Consortium Leader and Chief Investigator: Collaborative Directed Basic Research Project on Smart and Secure Environment, National Technical Research Organization, Government of India • Computer Society of India [CSI]: Chairman, Publications Committee (2008 - Current) & Regional Vice President (International) (2008 – 2010)
CSI Communications | JUNE 2010
5
special report
The Technical Program for IFIP Networking 2010 Laura Marie Feeney Communication Networks and Systems Laboratory, Swedish Institute of Computer Science Box 1263, SE-164 29 Kista, Sweden. E-mail: lmfeeney@sics.se
In this article, we describe the role of the Technical Program Committee in preparing a research conference. We specifically discuss IFIP Networking 2010, which was held at IIT-Madras in May. It should be noted that this work reflects the personal views of the authors and does not represent an official position of IFIP TC-6 or any other organization. Technical program committee The role of the Technical Program Committee (TPC) is to determine the technical program of a conference, by selecting papers to be presented at the conference and included in the proceedings. This process is managed by the TPC chair, who is chosen each year by the conference Steering Committee. The Steering Committee also selects the General Chair and location for the conference; unlike the TPC chair, the General Chair is usually affiliated with an institute at the host location. For established conferences, the Steering Committee is a semi-permanent body made up of distinguished researchers with a long-term affiliation with the conference and its parent organization. IFIP Networking is the flagship conference of the IFIP Technical Committee TC-6 - Communication Systems, which is responsible for the Steering Committee and for the long-term evolution of the event, currently in its tenth year. Usually two or three people act as equal TPC cochairs, to share the workload and provide diversity of expertise and background. The TPC co-chairs for IFIP Networking 2010 were Mark Crovella from Boston University, USA; Laura Marie Feeney from the Swedish Institute of Computer Science, Sweden; and Dan Rubenstein from Columbia University, USA. The primary responsibility of the TPC co-chairs is to select the TPC members and to coordinate their work such that the selection of papers for the technical program is expert and objective and results in a high quality event. The selection process is therefore kept largely independent from other conference organization activities.
Call for papers The Steering Committee and TPC co-chairs are responsible for writing the Call for Papers (CFP). The CFP defines the topic areas in which papers are solicited, as well as providing information about the paper format, page limit, and due dates. IFIP Networking 2010 followed previous year’s conference in soliciting work in three areas: Applications and Services, Network Technologies, and Internet Design. A publicity chair is generally responsible for making the CFP widely available in the international research community. Selecting the TPC The TPC co-chairs are responsible for selecting the members of the Technical Program Committee. Members of the TPC are responsible for evaluating the papers submitted to the conference and working with the TPC co-chairs to make the final paper selections. Invitations to join the TPC were sent in October, 2009. TPC members are selected for their distinguished research records, as well as for their ability to provide careful and punctual reviews. Because the IFIP Networking conference solicits submissions over an extremely broad range of topics, it is especially important to ensure that the TPC includes a correspondingly broad range of expertise. For IFIP Networking 2010, the TPC was made up of 92 people in 22 countries. About 45% of TPC members are based in Europe, 41% in North America, 11% in Asia, and 2% elsewhere. About 85% of the TPC members are academics; the remaining 15% have positions in industry or government. The size of the TPC is chosen such that the anticipated workload for each member is large enough that he or she sees a representative selection of submitted papers, but not so large that reviewing becomes an undue burden. In some years, the IFIP Networking TPC has been separated into per-topic or -track subcommittees, to make the process more manageable. This year, however, we followed the example of the previous year’s IFIP Networking conference and had a unified TPC. This allowed us to take full advantage of all the
CSI Communications | JUNE 2010
6
expertise of committee members and to better handle papers spanning more than one topic area. The TPC is also selected keeping in mind the importance of both continuity and openness, which is served by a balance between researchers who have prior experience serving on an IFIP Networking TPC and distinguished researchers who have not previously been affiliated with the conference. About 36% of the committee had not previously participated on a TPC for IFIP Networking, 31% percent had participated once or twice, and 33% had participated at least three times. Reviewing submitted papers Paper submissions were due on December 6, 2009. The conference received 101 complete paper submissions from authors in 24 countries. The paper submission and evaluation process was managed using the EDAS conference management system (http://www.edas. info). In addition to storing the papers and reviews, the EDAS system provides other important functionality. TPC members can use EDAS to examine paper titles and abstracts and indicate which papers they are most interested in reviewing. EDAS also maintains information about potential conflicts-of-interest when assigning papers to reviewers. This helps to ensure the fairness of the review process. For example, it is not considered appropriate for a TPC member to review a paper written by authors at the same institution or by authors with whom he or she has recently collaborated. For IFIP Networking 2010, the final paper assignment was mostly done using EDAS’ automated matching alogrithm. A small amount of manual adjustment helped ensure a reasonably balanced workload across the committee. Each paper submitted to IFIP Networking received at least three, and in most cases, four reviews. To help ensure that reviewers felt free to critically evaluate papers, the reviews were single-blind reviews: the authors do not learn the identity of the reviewers who have evaluated their paper. However, the TPC co-chairs do look over the final reviews to ensure that the reviewer’s tone and language are appropriate; generally this is not a problem. The average review length was over 1700 characters, with a number of reviews over 3000 characters in length. A number of reviews were delegated by their assigned reviewer; a total of 56 reviews were provided by external reviewers. In all, over 140 people contributed to producing 469 reviews and review summaries. Reviews have two purposes: to help
the TPC decide whether or not to accept the paper and to provide feedback to the authors about their work, regardless of whether or not the paper is accepted to the conference. A good review evaluates the contribution and novelty of the work relative to existing results, its technical correctness, and the clarity of the presentation. There are a number of good papers about how to read and review papers (see, for example, [1] and [2]). The paper assignments were distributed to reviewers in mid-December and reviews were due six weeks later. Each paper was also assigned a ’meta-reviewer’, who provided a summary of the completed reviews. Where needed, the meta-reviewer moderated an on-line discussion among the reviewers to reach a consensus about the paper. Over 200 messages were entered into EDAS during this phase. The metareview information was used to identify papers that the reviewers thought merited further discussion at the TPC meeting. For a few papers, there was some divergence of opinion among the reviewers and the TPC co-chairs solicited further evaluations from the TPC. Finalizing the program IFIP Networking 2010 followed the example of previous years and held a formal TPC meeting to finalize the selection process. The meeting was hosted by Columbia University in New York City on February 5 and included both in-person and remote participants. After considerable discussion, 24 full papers were accepted to IFIP Networking 2010. The acceptance ratio of just under 24% was comparable to that of previous years and marks IFIP Networking as a selective publication venue. A further eight papers were identified as containing promising preliminary results and accepted as Workin-Progress papers. The full program can be found at http://www.networking-2010.org or in the proceedings [3]. A small number of accepted papers were identified as containing interesting results, but also having issues that the TPC felt must be addressed in order for the paper to be suitable for publication. For these papers, a member of the TPC was assigned to act as a ’shepherd’ for the paper. The shepherd worked with the authors to ensure that the final version of the paper met the TPC’s expectations. Once the program was complete, a few members the TPC were asked to form a committee to select the winner of the Best Paper Award. The committee carried out their discussions independently of the TPC co-chairs and Steering Committee. Just over a month after their appointment, they informed the TPC co-chairs of their selection:
”Network Distance Prediction Based on Decentralized Matrix Factorization” by Yongjun Liao, Pierre Geurts, and Guy Leduc of University of Liege, Belgium. Publishing the proceedings The authors of accepted papers were asked to prepare a final version of their papers according the guidelines provided by the publisher. The publication chair is responsible for this process. The Proceedings of IFIP Networking 2010 were published by Springer, in their series Lecture Notes in Computer Science (LNCS) and appear as Volume 6091. At the conference Once the program was complete, the TPC co-chairs organized the papers into thematic sessions, divided among the three days of the main conference. This was done in cooperation with the General Chair and local organizers, who arrange the overall timetable to take into account the logistics for the various activities at the conference. At IFIP Networking 2010, the 24 full papers were presented in eight sessions, with approximately 25 minutes allocated for each paper: 20 minutes for the author to present his or her work and 5 minutes for discussion and transition between speakers. The eight Work-in-Progress papers were presented in two separate sessions during the conference. The time allocated to presentation of these papers was somewhat less than that allocated to full papers, about 15-17 minutes total. A special feature of IFIP Networking 2010 was an additional session for students to make brief, informal presentations of their ongoing research. This was an open session: students attending the conference were invited to sign up for a slot during the conference. Conclusion Preparing the program for a conference such as IFIP Networking requires considerable effort over many months. The TPC co-chairs would like to thank the TPC members and all the authors who submitted papers to the conference for their efforts. We would also like to thank IIT-Madras and the Computer Society of India for their hospitality in hosting the event. We send our best wishes to the general chairs of IFIP Networking 2011: Ana Pont and Pietro Manzoni at the Universitat Politècnica de València, Spain. References [1] S. Keshav. “How to read a paper”. SIGCOMM Comput. Commun. Rev. 37, 3 (Jul. 2007), 83-84. [2] Timothy Roscoe. “Writing reviews for systems conferences”. Available at
CSI Communications | JUNE 2010
7
http://www.inf. ethz.ch/personal/ troscoe/pubs/review-writing.pdf. 2007. [3] Mark Crovella, Laura Marie Feeney,
Dan Rubenstein, S. V. Raghavan (Eds). Networking 2010: 9th International IFIP-TC6 Networking Conference.
Chennai, India, May 11-15, 2010. Lecture Notes in Computer Science Vol. 6091. Springer, 2010.
About the Author Laura Marie Feeney is a member of the Communication Networks and Systems (NETS) Laboratory (formerly known as the Computer and Network Architectures Laboratory) at the Swedish Institute of Computer Science. She is also affiliated with the Communications Research (CoRe) Group at Uppsala University. Before coming to Sweden, Laura Feeney was a researcher and software engineer at several R&D organizations and startup companies in the US, working in areas including distributed real time systems, military simulation, and computer games. As an undergraduate, she studied Mathematics and Computer Science (Course 18C) at the Massachusetts Institute of Technology [MIT]. Her current research addresses a variety of topics in autonomous wireless networks, including media access control and energy efficiency, as well as problems in deployment and self-configuration.
Computer Society of India
Call for Web Articles Computer Society of India is launching its Web Publication of high quality articles for knowledge portal of CSI. The articles should cover all aspects of computing, information and communication technologies that should be of interests to the reader’s at large fraternity of CSI and around. An exhaustive list of topics shall be displayed at knowledge portal of CSI that shall vary/ expand time to time. The articles may be long (3500-4000 words) or short (1500-2000 words) authored in the original text (plagiarism is strictly prohibited). The articles shall be thoroughly (blind) reviewed by experts and the selected ones shall be published on the knowledge portal of www. csi-india.org. The papers may be submitted in the following categories. Survey / Tutorial Papers: These papers are expected to cover the consolidation of basic concepts to advancements in the area of interests to the younger group of readers. Research Papers: These papers are called from the researchers indicating the innovation for future ICT. Both theoretical and practice based research papers are welcome. Industry Papers: These papers are expected from the industry practitioners that cover the latest techniques developed of solving the problems and interesting results obtained. Paper with Case Studies: These papers should cover a specific aspect of a technology/ service/ application development using ICT for knowledge sharing. These papers shall be also invited from the learned established professionals from academia and industry. These invited papers shall cover a recent trend in Computing/ ICT with a visionary view. How to submit the articles: The articles may be submitted may be sent to the Web Publication Chair, Dr Manohar Chandwani, Fellow, CSI via email wpc@csi-india.org with a cc to chandwanim1@ rediffmail.com. An online submission facility on CSI knowledge portal shall made available to the authors in the near future.
Our networks are awash in data. A little of it is information. A smidgen of this shows up as knowledge. Combined with ideas, some of that is actually useful. Mix in experience, context, compassion, discipline, humor, tolerance, and humility, and perhaps knowledge becomes wisdom.
Turning Numbers into Knowledge, Jonathan G. Koomey, 2001, Analytics Press: Oakland, CA page 5, quoting Clifford Stoll, Astronomer.
CSI Communications | JUNE 2010
8
SPECIAL REPORT
Inaugural Address Saurabh H. Sonawala Honorary Treasurer, CSI Managing Director, Hinditron Group of Companies, 69-A, Napean Sea Road, Mumbai - 400 006. E-mail: saurabh@hinditron.com
As a non-academician, it was a rare privilege for me to give a brief inaugural address at the IFIP Networking 2010 conference. Most of us from industry tend to think in terms of today’s or near-term problems, which are well known. So it was refreshing to participate in a conference which addresses tomorrow’s challenges, which may not even be well defined today. The continuous demand for IT managers to be increasingly more efficient in their use of IT infrastructure, including network resources, is a major issue that is familiar to every CIO and is debated in many IT conferences, with everyone trying to learn from each others experience. The problem of rapidly increasing demand coupled with shrinking budgets is the bane of technology managers in most organizations around the world. On a larger scale, with the advent of low cost broadband services, computers powerful enough for home users to create and edit videos and sites like YouTube and those which legally or illegally permit downloads of high quality full length movies, the amount of traffic on the internet is growing so rapidly that concerns about the internet getting choked seem more and more realistic. Also, with the number of IP addresses increasing ever more rapidly the lack of acceptance of IPv6 is a major area of concern. The conflict between the need to change over to newer technologies and the extremely high cost of doing so, driven by the need for large telecom companies to protect their huge investments in current technologies, is a major cause for concern. Closer to home, on the one hand most Indian companies are ramping up their level of Computerization to catch up with the rest of the world. On the other hand a rapidly growing and increasingly tech savvy young middle class is becoming hungry for more and more bandwidth. At the same time, with India spending more money than ever on scientific research, the computing and networking needs for the academic community are also increasing rapidly. While problems like this are often debated in many fora, it was a unique experience for me to participate in a forum where the technologies that were debated are those which will solve not today’s problems, but tomorrow’s. Some of the research presented may not be translated into real world hardware and software for years and yet without work like this, radically new technologies that will be required in the future will never get developed. While most of what was discussed at the conference sessions and during breaks was beyond my understanding, it was a great pleasure for me to be a small part of this fascinating conference. It was also a great pleasure to see an important IFIP conference being held in India after a long time. With increasing participation by CSI in IFIP activities, I confidently look forward to many more such conferences being brought to India.
About Mr. Saurabh Sonawala Saurabh Sonawala obtained his Bachelors Degree in Electrical Engineering in the Year 1985 from the Indian Institute of Technology, Madras. He has been serving the CSI in various capcities for the past 17 years. He has been with the Hinditron Group of Companies for the past 17 Years.
CSI Communications | JUNE 2010
9
special report
9th IFIP Networking 10-14 May 2010, Chennai, India Special Report Prepared by: Sanand Sasidharan and K Madhusudanan Department of Computer Science and Engineering., IIT, Madras, Chennai - 600 036 Networking 2010 is the 9th event of the series of International Conferences on Networking, sponsored by the IFIP Technical Committee on Communication Systems (TC6), which was held in Chennai during the second week of May. The main objectives of Networking 2010 were to bring together members of the networking community from both academia and industry, to discuss recent advances in the broad and fast-evolving field of telecommunications, and to highlight key issues, identify trends and develop visions. The conference was jointly organized by IIT Madras and CSI and it had various sessions such as keynote, tutorials and paper presentations. The venue of the conference was ICSR in IIT Madras, Chennai, India. O rgani z ers
Workshop 1 - Monday, May 10, 2010 High-Bandwidth + Low-Latency + Grid = ? Speaker : Prabhakar Shankar Dhekne This workshop is intended to serve as a forum for scientists and engineers in academia and industry to exchange and discuss their experiences and research queries related to setting up of 10s of gigabits per second network coupled with extremely low latencies aspects for the next generation networks. Running Applications on GARUDA - The National Grid Computing Initiative of India Speakers : Subrata Chattopadhyay and N Mangala
S ponsors
Subrata Chattopadhyay Speaking at the Tutorial
CSI Communications | JUNE 2010
10
The current day applications have interrelated demands of data storage, computing, instrumentation-intensive services, and have higher needs for collaborations among various specialists and communities.
with some speculations on the future of transport networks over the next decade.
GARUDA - the Pan Indian Grid connects 45 R&D organizations and academic institutions across 17 cities of India aggregating heterogeneous HPC compute clusters, storage, satellite terminals; and scientific instruments and aims to provide the technological advances required to enable intensive science for the 21st century. This session will provide participants exposure to: 1. Overview of GARUDA grid 2. Globus Middleware and Garuda architecture 3. Applications on Grid with case study 4. Grid Enabling Your Applications on GARUDA Dr. Kanwar Jit Singh speaking at the Tutorial
Workshop 2 - Monday May 10, 2010 Emerging trends and challenges in Fibre Optic Transmission Conducted by: Dr. Kumar Sivarajan Speaker: Mr. Santosh, Mr. Parthasarathi Palai & Dr. Kanwar Jit Singh Optical transport networks, which form the backbone of all telecom networks, have undergone a revolution in the last decade. The most well-known aspect of this revolution that virtually annihilated the cost of long-distance communication is Dense-Wavelength Division Multiplexing (DWDM) which enabled multiple, high-speed (10Gbps+) wavelengths to be optically multiplexed over a single fiber, optically amplified, and transported without regeneration over transoceanic and intercontinental distances. Today, due to advancements in modulation, coding and detection, as well as enhanced error correction (FEC/EFEC) mechanisms, the per-wavelength bit-rates are increasing to 100 Gbps, further reducing the cost of long-distance communication. Another driver of transmission cost reduction is the availability of reliable photonics integrated circuits (PIC) that combine multiple functions at the unit level. At the same time, the increasing dominance of data in network traffic has led to the development of Packet Transport Network (PTN) architectures based on connection-oriented Ethernet that combine the benefits of statistical multiplexing with SDH/SONETlike traffic engineering, OAM and reliability. Paradoxically, renewed interest in TDM is noticed world-wide as the SDH/SONET hierarchy transitions to the Optical Transport Network (OTN) hierarchy that enables sub-wavelength multiplexing, grooming and bandwidthmanagement capabilities over DWDM backbone networks. As traffic growth is inherently becoming unpredictable, it is advantageous for the add/drop capability to be reconfigurable at the wavelength level. Thus reconfigurable optical add/drop multiplexers (ROADM) are enabling dynamic network services while providing the operational advantage of remote wavelength-reconfigurability. Further, multi-degree ROADMs are beginning to be used for cost-efficient, shared-mesh restoration at the optical layer. Recent developments in a unified, multi-layer control plane based on ASON/GMPLS technology provide many significant benefits such as rapid and accurate provisioning, dynamic restoration, greater network efficiency in terms of bandwidth sparing and resource utilization, and seamless inter-operability across multiple vendors. All of the above technologies are coming together in a single “Packet Optical Transport Platform” (POTP) which is laying the foundation for a dynamic optical network. In this talk, we will start with an overview of Packet and Optical Transport Networks. Then we will delve deeper into DWDM, ROADM, OTN, PTN and ASON/GMPLS technologies. We will end the talk
Prof. S V Raghavan honoring Mr. Sourabh Sonawala after his Inaugural Address. Prof. H R Vishwakarma looks on.
Tuesday, May 11, 2010 Keynote 1: How the Internet can Green the Electrical Grid Prof. S. Keshav, School of Computer Science, University of Waterloo, Canada Several powerful forces are gathering to make fundamental and irrevocable changes to the century-old grid. The next-generation grid, often called the ‘smart grid’, will feature distributed energy production, vastly more storage, tens of millions of stochastic renewable-energy sources, and the use of communication technologies both to allow precise matching of supply to demand and to incentives appropriate consumer behavior. These changes will have the effect of reducing energy waste and reducing the carbon footprint of the grid, making it ‘smarter’ and ‘greener.’ In this talk, I will demonstrate that the concepts and techniques pioneered by the Internet, the fruit of four decades of research in this area, are directly applicable to the design of a smart,
CSI Communications | JUNE 2010
11
green grid. This is because both the Internet and the electrical grid are designed to meet fundamental needs, for information and for energy, respectively, by connecting geographically dispersed suppliers with geographically dispersed consumers. Keeping this and other similarities (and fundamental differences, as well) in mind, I propose several specific areas where Internet concepts and technologies can contribute to the development of a smart, green grid. I hope that our work will initiate a dialogue between these two communities. (joint work with Catherine Rosenberg, University of Waterloo) Session 1 : P2P and Overlay Networks Using Torrent Inflation to Efficiently Serve the Long Tail in Peerassisted Content Delivery Systems; Niklas Carlsson (University of Calgary, Canada); Derek Eager (University of Saskatchewan, Canada); Anirban Mahanti (NICTA, Australia) Network Distance Prediction Based on Decentralized Matrix Factorization; Yongjun Liao University of Liege, Belgium); Pierre Geurts (University of Liege, Belgium); Guy Leduc (University of Liege, Belgium) Topology-Awareness and Reoptimization Mechanism for Virtual Network Embedding; Nabeel Butt (University of Waterloo, Canada); Mosharaf Chowdhury (University of California, Berkeley, USA); Raouf Boutaba (University of Waterloo, Canada) Session 2 : Performance measurement A Longitudinal Study of Small Time Scaling Behavior of Internet Traffic; Himanshu Gupta (IBM India Research Laboratory, India); Vinay Ribeiro (Indian Institute of Technology, India); Anirban Mahanti (NICTA, Australia) Measurement Study of Multi-party Video Conferencing; Yue Lu (Delft University of Technology, The Netherlands); Yong Zhao (Delft University of Technology, The Netherlands); Fernando A. Kuipers (Delft University of Technology, The Netherlands); Piet Van Mieghem (Delft University of Technology, The Netherlands) Work in Progress Session A: Server Guaranteed Cap: An incentive mechanism for maximizing streaming quality in heterogeneous overlays; Ilias Chatzidrossos (KTH, Royal Institute of Technology, Sweden); Gyorgy Dan (KTH, Royal Institute of Technology, Sweden); Viktoria Fodor (KTH, Sweden) End-to-End Throughput with Cooperative Communication in Multichannel Wireless Networks; Zheng Huang (Fudan University, P.R. China); Xin Wang (Fudan University, P.R. China); Baochun Li (University of Toronto, Canada) Cost Bound of Multicast Light-trees in WDM Networks; Fen Zhou (IRISA/INSA Rennes, France); Miklos Molnar (INSA Rennes/ IRISA, France); Bernard Cousin (IRISA, University of Rennes 1, France); Chunming Qiao (State University of New York at Buffalo, USA) Session 3 : Quality of Service Passive Online RTT Estimation for Flow-Aware Routers using OneWay Traffic; Damiano Carra (University of Verona, Italy); Konstantin Avrachenkov (INRIA Sophia Antipolis, France); Sara Alouf (INRIA, Sophia Antipolis, France); Alberto P Blanc (I.N.R.I.A. Sophia Antipolis, France); Philippe Nain (INRIA, Sophia Antipolis, France, France); Georg Post (Alcatel-Lucent France, France) A Flow Scheduler Architecture; Dinil Mon Divakaran (ENS Lyon, INRIA, France); Giovanna Carofiglio (Bell Labs, Alcatel-Lucent, France); Eitan Altman (INRIA, France); Pascale Vicat-Blanc Primet (INRIA, France)
Stateless RD Network Services; Maxim Podlesny (University of Calgary, Canada); Sergey Gorinsky (Madrid Institute for Advanced Studies in Networks (IMDEA Networks), Spain)
Wednesday, May 12, 2010 Keynote 2: Multiple Access Protocols for Multi-Gigabit Wireless Networks Samir R. Das, Computer Science Department, Stony Brook University, Stony Brook, NY 11747, USA Wireless local and personal area networking at multi-gigabit speeds presents a tremendous opportunity to deploy exciting futuristic applications. They include, for example, wireless high definition video streaming of unprecedented quality across a room, ‘wireless’ docks and instantaneous backups from laptops, and high-speed wireless interconnects for multi-computer systems replacing wired backplanes and switches. The latter aspect can have tremendous impact on the design of future data centers – lowering capital cost by eliminating cabling and lowering energy budget by improving airflow. However, while the radio layer technology is now mature, designing efficient multiple access protocols in the multi-gigabit regime is fraught with challenging problems. These challenges must be overcome to realize the full potential of multi-gigabit speeds. In this talk, I will describe these challenges and potential solutions in connection with two different frequency bands (<6 GHz and 60 GHz), where multi-gigabit technologies are to be deployed in the foreseeable future. I will also describe relevant standardization efforts in this space. Session 4 : Wireless Networks Multicast in Multi-Channel Wireless Mesh Networks; Ouldooz Baghban Karimi (Simon Fraser University, Canada); Jiangchuan Liu (Simon Fraser University, Canada); Zongpeng Li (University of Calgary, Canada) Ambient Interference Effects in Wi-Fi Networks; Aniket Mahanti (U. Calgary, Canada); Niklas Carlsson (University of Calgary, Canada); Carey Williamson (University of Calgary, Canada); Martin Arlitt (University of Calgary, Canada) A Zone Assignment Algorithm for Fractional Frequency Reuse in Mobile WiMAX Networks; Michael Einhaus (NEC Laboratories Europe, Germany); Andreas Maeder (NEC Laboratories Europe, Germany); Xavier Pérez Costa (NEC Laboratories Europe, Germany) Session 5 : Addressing and Routing Handling Transient Link Failures Using Alternate Next Hop Counters; Suksant Sae Lor (University College London, United Kingdom); Raul Landa (University College London, United Kingdom); Redouane Ali (University College London, United Kingdom); Miguel Rio (UCL, United Kingdom) Efficient Recovery from False State in Distributed Routing Algorithms; Daniel Gyllstrom (University of Massachusetts Amherst, USA); Sudarshan Vasudevan (University of Massachusetts Amherst, USA); Jim Kurose (University of Massachusetts at Amherst, USA); Gerome Miklau (University of Massachusetts at Amherst, USA) IP Fast Reroute in Networks with Shared Risk Links; Yan Li (The University of Texas at Austin, USA); Mohamed Gouda (University of Texas at Austin, USA) EAU: Efficient Address Updating for Seamless Handover in Multihomed Mobile Environments; Yuansong Qiao (Athlone Institute of Technology, Ireland); Shuaijun Zhang (Athlone Institute of Technology, Ireland); Adrian Matthews (Athlone Institute of Technology, Ireland);
CSI Communications | JUNE 2010
12
Gregory Hayes (Athlone Institute of Technology, Ireland); Enda Fallon (Athlone Institute of Technology, Ireland) Session 6 : Applications and Services Speculative validation of web objects for further reducing the userperceived latency; Josep Domènech (Universitat Politècnica de València, Spain); José A. Gil (Politechnic University of Valencia, Spain); Julio Sahuquillo (Universidad Politecnica de Valencia, Spain); Ana Pont (Universitat Politécnica de València, Spain) Adaptive Service Placement in Dynamic Service Hosting Environments; Qi Zhang (University of Waterloo, Canada); Jin Xiao (University of Waterloo, Canada); Eren Gurses (University of Waterloo, Canada); Martin Karsten (University of Waterloo, Canada); Raouf Boutaba (University of Waterloo, Canada) Evaluating the impact of a novel warning message dissemination scheme for VANETs using real city maps; Francisco J. Martinez (University of Zaragoza, Spain); Manuel Fogue (University of Zaragoza, Spain); Manuel Coll (University of Zaragoza, Spain); Juan Carlos Cano Escriba (Universidad Politecnica de Valencia, Spain); Carlos Tavares Calafate (Technical University of Valencia, Spain); Pietro Manzoni (Universidad Politécnica de Valencia, Spain) Session 7 : Ad hoc and Sensor Networks Resource Optimization Algorithm for Sparse Time-Driven Sensor Networks; María Luisa Santamaría (Universitat de les Illes Balears, Spain); Sebastià Galmés (Universitat de les Illes Balears, Spain); Ramon Puigjaner (UIB, Spain)
Application of Secondary Information for Misbehavior Detection in VANETs; Ashish Vulimiri (IIT Kharagpur, India); Arobinda Gupta (Indian Institute of Technology, Kharagpur, India); Pramit Roy (IIT Kharagpur, India); Skanda N Muthaiah (General Motors India Science Labs, India); Arzad Kherani (General Motors India Science Lab, India) Path Attestation Scheme to Avert DDoS Flood Attacks; Raktim Bhattacharjee (IIT Madras, India); Sanand Sasidharan (Indian Institute of Technology Madras, India); Serugudi Venkataraman Raghavan (IIT Madras, India) Session 8 : P2P and Overlay Networks II Survivable Virtual Network Embedding; Muntasir Raihan Rahman (University of Waterloo, Canada); Issam Aib (University of Waterloo, Canada); Raouf Boutaba (University of Waterloo, Canada) Toward Efficient On-demand Streaming with BitTorrent; Youmna Badr Borghol (National ICT Australia, Australia); Sebastien G Ardon (National ICT Australia, Australia); Niklas Carlsson (University of Calgary, Canada); Anirban Mahanti (NICTA, Australia) Synapse: A Scalable Peer to Peer Protocol for Interconnecting Heterogeneous Overlay Networks; Luigi Liquori (INRIA Sophia Antipolis, France); Cedric Tedeschi (University of Rennes I / INRIA, France); Laurent Vanni (University Nice Sophia Antipolis, France); Francesco Bongiovanni (INRIA Sophia Antipolis, France); Vincenzo Ciancaglini (INRIA Sophia Antipolis, France); Bojan Marinkovic (Mathematical Institute of the Serbian Academy of Sciences and Arts, Serbia)
Routing protocol for anycast communications in a wireless sensor network; Nancy El Rachkidy (Blaise Pascal University, France); Alexandre Guitton (Clermont University, France); Michel Misson (Equipe REPLIC, IUT Clermont-Fd, France) Fault-tolerant Power-aware Topology Control for Ad-hoc Wireless Networks; Harichandan Roy (Bangladesh University of Engineering and Technology, Bangladesh); Shuvo De (Bangladesh University of Engineering and Technology, Bangladesh); Md. Maniruzzaman (Bangladesh University of Engineering and Technology, Bangladesh); A K M Ashikur Rahman (University of Alberta, Canada)
Thursday, May 13, 2010 Work in Progress Session B: Bidirectional Range Extension for TCAM-Based Packet Classification; Yan Sun (Washington State University, USA); Min Sik Kim (Washington State University, USA) Estimating the Economic Value of Flexibility in Local Loop Unbundling; Koen Casier (University of Ghent, Belgium); Mathieu Tahon (Ghent University, Belgium); Sofie Verbrugge (Ghent University - IBBT, Belgium); Didier Colle (IBBT - Ghent University, Belgium); Mario Pickavet (Ghent University, Belgium); Piet Demeester (Ghent University, Belgium) Intercarrier Compensation between Providers of Different Layers: Advantages of Transmission Initiator Determination; Ruzana Davoyan (University of Mannheim, Germany); Wolfgang Effelsberg (University of Mannheim, Germany)
A Section of the Audience
Friday, May 14, 2010 Tutorial 1: Next Generation Networks Metro Optical Networks Speaker : Prof. Ashwin Gumaste, IIT Bombay IP Harmonization in Heterogeneous Networks Speaker : R S Mani, NIC, India
CSI Communications | JUNE 2010
13
Assisted by : Mr. Arun Kumar C, Faculty, AMRITA Speaker : Mr. Kandasamy Muniasamy, Symantec
TECHNOLOGY ¾¾ IP Numbering Schema, ¾¾ Multi-Homing ¾¾ Hardware compatibility
Manageable for short time... OPERATIONAL ¾¾ Complexity in existing Network ¾¾ Multiple Networks institute ¾¾ No single point of contact in many cases ¾¾ Reluetance to change
¾¾ ¾¾ ¾¾ ¾¾ ¾¾ ¾¾
MINDSET SET MIND Why should I change My Setup Why should I change Will the change thatMy we Setup make are Will the change that we make are permanent. permanent. Confusing multiple scheme Confusing multiple scheme
IP Harmonization in Heterogeneous Networks
GPON Technology Speaker : Vipin Tyagi, Director, C-DOT, India Gigabit passive optical network (GPON) technology offers the reach and bandwidth capabilities that make it suitable for more than just residential and business access deployments. Other potential applications include the backhaul of traffic from local exchanges or wireless masts to a central node for switching and routing. C-DOT’s GPON solution offers an industry standard technology, which is capable of providing triple play of voice, video and data to end customers. Tutorial 2 : Network Forensics Tutorial Speakers (Organized by Amrita Vishwa Vidyapeetham University) Tutorial Organizing Chair : Dr. P. Venkat Rangan, Vice-Chancellor, AMRITA. Fellow of ACM and Former Professor of Computer Science at University of California, San Diego Assisted by Mr. Rajesh Sethumadhavan and Mr. Deepayan Chanda, Symantec Tutorial Coordinator : Mr. Prashant R.Nair, Vice-Chairman – Information Technology, AMRITA. Secretary, Computer Society of India, Coimbatore chapter
Network monitoring for anomalous behaviors at the edges as well as at end points is critical to identify security incidents pro-actively. Once an incident is suspected to have occurred then the logs inspected as part of monitoring form the basis for network forensics for gathering evidence and reconstructing the attack sequence. These logs could be from fire walls, IDS/IPS devices or host IDS. Finally the compromised end point itself will have to be inspected using trusted tools to collect and record evidence. In this tutorial, we present a few case studies of cyber attacks, show how the anomalous behavior could be detected at network level and traced back to the point of compromise. Prof. Sandeep Kumar, AMRITA The tutorial will describe DNS, the Internet’s name resolution system in some detail and cover threats on it ranging from the early attacks pointed by Steven Bellovin to the recent attack in 2008 by Dan Kaminsky that fundamentally broke security in DNS. If equipment is available, we will also demonstrate the easy cache poisoning attacks that exploit the race condition between a DNS request and its response. Time permitting, we will also provide an overview of DNSSEC. The tutorial is intended for people unfamiliar with the details of DNS and the attacks possible on it. Prof. M. Sethumadhavan, AMRITA Any communication system consists of a number of entities such as people, companies, computers, phones, and the like that communicate using a variety of communication channels and increasingly over open networks. Protocols are the rules that govern these communications. Between these entities, which communicate over untrusted medium, a sufficient level of security and confidentiality must be established. The design and analysis of cryptographic systems and security protocols that process confidential information are important tools for attaining this goal. In this tutorial we propose to discuss some of these methods.
Valedictory Function
CSI Communications | JUNE 2010
14
Profile of the Speakers Prof. Ashwin Gumaste Ashwin Gumaste received a Ph.D. from The University of Texas at Dallas and is currently with Indian Institute of Technology Bombay. He was previously with Fujitsu Laboratories (USA) Inc as a Member of Research Staff in the Photonics Networking Laboratory. Prior to that he worked in Fujitsu Network Communications R&D and prior to that with Cisco Systems under the Optical Networking Group. He has written numerous papers and has over thirty pending U.S. and EU patents, and in 1991, Ashwin was awarded the National Talent Search Scholarship (NTSE) in India. His research interests include optical networking and Uncertainty Equilibriums in business and networking environments. He proposed an architecture to implement optical burst transport and dynamic lightpath provisioning, called Light-trails, and also proposed the Light-frame framework, a conceptual model for future packet mode optical communication. He has authored three books in broadband networks called DWDM Network Designs and Engineering Solutions, and First Mile Access Networks and Enabling Technologies (for Pearson Education/Cisco Press) and Broadband Services: User Needs, Business Models and Technologies for John Wiley. He is currently working on a book for Uncertainty in Networks.
Mr. Kandasamy Muniasamy Mr. Kandasamy (Kanda) Muniasamy is Senior Director of Services Development at Symantec center in Chennai, where he leads Consulting and Managed Security Services teams. Prior to Symantec, he was with VeriSign and Netscape/AOL 5+ years each where he led Secure Payments, Authentication and Enterprise PKI and SSL projects. His interests include raising consumer awareness on safe Internet usage and applying security technologies to solve Authentication and Network and Application Security problems for Enterprises, FIs and Governments.
Dr. Kanwar Jit Singh Dr. Kanwar Jit Singh holds a Ph.D. from University of Califoria at Berkeley and was a 1986 Gold Medallist from Indian Institute of Technology at Kanpur during his B.Tech. degree. He worked at Bell Laboratories in the US as Principal Investigator in the area of VLSI Research from 1992 to 2000 where built several groundbreaking VLSI chips including a Single-Chip Color CMOS video camera. In 2000, he co-founded Xebeo Communication to develop a core switch with Layer2, MPLS, and Layer 3 features. He became Director of VLSI at UTStarcom when it acquired Xebeo Communications. Dr. Singh relocated to India in 2005 and joined Tejas Networks as Principal Architect and works on product definition and technology direction. He has more than 15 publications and 4 patents to his credit.
Dr. S. Kesav Dr. S. Keshav is a Professor and Canada Research Chair in Tetherless Computing at the School of Computer Science, University of Waterloo, Canada and the Editor of ACM SIGCOMM Computer Communication Review. Earlier in his career he was a researcher at Bell Labs and an Associate Professor at Cornell. He is the author of a widely used graduate textbook on computer networking. He has been awarded the Director’s Gold Medal at IIT Delhi, the Sakrison Prize at UC Berkeley, the Alfred P. Sloan Fellowship, a Best Student Paper award at ACM SIGCOMM, a Best Paper award at ACM MOBICOM, and two Test-of-Time awards from ACM SIGCOMM. He is a co-founder of three startups: Ensim Corporation, GreenBorder
Technologies, and Astilbe Networks. His current interests are in the use of tetherless computing for rural development, and for gaining efficiency in energy generation, transmission, and consumption. Keshav received a B.Tech from the Indian Institute of Delhi in 1986 and a Ph.D. from the University of California, Berkeley, in 1991, both in Computer Science.
Dr. Kumar Sivarajan Dr. Kumar Sivarajan is Chief Technology Officer of Tejas Networks. Prior to Tejas Networks, Dr. Sivarajan was an Associate Professor in the Electrical Communication Engineering Department, at the Indian Institute of Science, Bangalore. Prior to that he worked with IBM Thomas J.Watson Research Center, Yorktown Heights, New York. Dr. Sivarajan is co-author of the textbook ‘Optical Networks: A Practical Perspective’ published in February 1998. He is a Fellow of the Indian National Academy of Engineering, an Associate of the Indian Academy of Sciences, and a recipient of the Swarnajayanti Fellowship from the Department of Science and Technology, and the 2004 Global Indus Technovator Award from the India Business Club at the Massachusetts Institute of Technology. He is also a recipient of the Institute of Electrical and Electronics Engineers, Inc Fortescue Fellowship and Institute of Electrical and Electronics Engineers, Inc. Baker Prize Paper Award. Dr. Sivarajan holds a Bachelor’s Degree in Technology in Electrical Engineering from the Indian Institute of Technology, Madras and a Doctorate from the California Institute of Technology.
N Mangala Mangala N presently working as a Coordinator of System Software Development Group in CDAC, leading and managing System Software projects in Grid Computing and High Performance Computing. Worked in several domains which include system software, compilers, debuggers, real time systems - SCADA, and Grid Computing. She presented tutorials in E-Science 2007 and ADCOM 2009
Prabhakar Shankar Dhekne Present Position & Address: Raja Ramanna Fellow, Bhabha Atomic Research Centre, Trombay, Mumbai – 400 085. Major Areas of Specialization: Parallel & Grid Computing, Distributed Processing, Information Security, Computer Networks & Information Systems and Wireless Sensor Networks. Professional Accomplishments: Led the development of middleware software tools for fabric management of Data Grid Project for Large Hadron Collider at CERN, Geneva under CERN – DAE Collaborative Programme. He is member of Grid Deployment Board, and Computing-Resource Review Board at CERN, Geneva. He is serving as a Project Coordinator LHC Regional Grid infrastructure, Deputy Project Manager EU-IndiaGrid phase 1 and phase 2. He is a Scientific Consultant to Principal Scientific Adviser to GOI. He is also involved in the conceptualization, design and implementation of National Knowledge Network. Led the development of various models of ANUPAM parallel processing systems delivering highest computing performance of 9 Tflops for High Performance Linpack (HPL) benchmark on 1124 core ANUPAM-Ajaya system and development of high resolution (46
CSI Communications | JUNE 2010
15
Mpixel) wall-size tiled display panel using commercially available multiple LCD’s (6x6) interfaced with a parallel cluster for large volume data visualization purpose, which is first of its kind in the country. He has contributed significantly in the area of information security & tools such as fire walls, intrusion detection and protection, encryption, centralized security monitoring and security auditing etc. Awards/Honors: Winner of the Indian Nuclear Society Award INS-2001 presented by Hon’ble Prime Minister of India on Thursday, 30th October 2002 for his pioneering work in development of parallel processing computer series ANUPAM. He is recipient of distinguished Professorship award from INAE. He was awarded DAE Group achievement medal in 2007 for his personal contributions in Parallel & Grid Computing. Latest applications in scientific as well as academic area such as, collaborative applications, distributed research experiments, gridbased data analysis and social networking are very bandwidthintensive and require low latency, high bandwidth data transfers even on campuses to ensure quick delivery & acceptable end-to-end performance. The deployment of dynamic, innovative and costeffective optical network infrastructure provides next-generation production network services as well as a platform for the development of new and experimental networking ideas and protocols. Currently, at least ten 10 Gbps links are provisioned on each segment of the optical fiber cable (OFC) deployed for many high-bandwidth networks worldwide, which can be further scaled to 20 or 40 or 100 G or more. Users have benefited from ‘Grid Computing’ technology, which allowed sharing and aggregation of a wide variety of geographically distributed networked resources - like computational power, data, storage, large scientific instruments etc by effective integration of geographically distributed resources through Internet technology. The main emphasis of Grid technology was to ensure seamless & secure access of the resources present anywhere on the grid. However grid computing has moved to Utility Computing - a software as a service model- to the latest - Cloud computing, the idea of relying on Webbased applications and storing data in the “cloud” of the Internet. This has tilted engineers towards a trend to house more computing, storage and software services in data centres and connect these data centres through ultra high speed networks. This computing revolution has enabled huge improvements in computer networks, creating the ability to harness the power of linked computers and shared storage. With the idea of Cloud, there is no need for the user to own the IT infrastructure, it can be merely accessed or rented, by paying for the actual use thus saving huge cost & headaches of IT management. Many vendors such as Amazon, IBM, Google, Yahoo, Gogrid, and Microsoft etc are offering such Cloud computing services. This presentation will describe few latest optical Networks, Grid and Cloud Computing technologies and the tools used today worldwide. The Cloud Computing has gained a lot of momentum in India with the launch of National Knowledge Network (NKN) – broad overview of NKN will be given.
Parthasarathi Palai Parthasarathi Palai received his Ph.D. degree from the Physics department, Indian Institute of Technology, Delhi, India in 1997 for his work on Optical Amplifiers and Dispersion Compensating Fibers. From 1998 to 2000 he was with Department of High Frequency and Quantum Electronics, University of Karlsruhe, Germany and Research Center for Advanced Science and Technology (RCAST), Tokyo University, Japan as a foreign researcher. From 2000 he is
with Tejas Network Ltd, Bangalore where he is presently working as a Product Architect for DWDM System. He has several publications and patents to his credit.
Samir R. Das Samir Das is currently a Professor in the Computer Science Department in the State University of New York at Stony Brook. He also serves as one of the directors in the NY State Center of Excellence in Wireless & Information Technology (CEWIT) in Stony Brook. Professor Das received his Ph.D. in Computer Science from Georgia Institute of Technology, Atlanta, in 1994. His research interests are in wireless networking and mobile computing, focusing on protocols, systems and performance evaluation. He received the NSF CAREER award in 1998 and the best paper award in ACM MobiSys conference in 2007. He has been a speaker in the Distinguished Visitor program of the IEEE Computer Society during 2001-03. He co-chaired the technical program committee for the ACM MobiHoc Symposium in 2001 and ACM MobiCom Conference in 2004. He currently serves or has previously served on the editorial board of the IEEE/ ACM Transactions on Networking, IEEE Transactions on Mobile Computing, ACM/Kluwer Wireless Networks Journal and Ad Hoc Networks journal.
Prof. Sandeep Kumar Prof. Sandeep Kumar is a faculty in the computer science department at Amrita University in Coimbatore, attached to the Center for Cyber Security. Prior to joining the university in July 2009, he was with RSA Security in Bangalore. Sandeep has a Ph.D. in Computer Science from Purdue.
Santosh Santosh is a Director in the CTO’s office at Tejas Networks and is closely involved with the product marketing activities of the optical transport product lines. Prior to joining Tejas, he worked for VT Group, where he was the program manager and principal investigator for two advanced communication projects funded by US federal agencies. He has over twelve years of experience in the telecom industry in a variety of roles including applied research, network design, business development and product management. Santosh holds an M.E in Electrical Communications from IISc and an MBA from University of Maryland, College Park.
Prof. M. Sethumadhavan Prof. M. Sethumadhavan is a PhD in Number Theory from University of Calicut and is a faculty in Centre for Cyber Security of Amrita University, Ettimadai, Coimbatore. He is credited with starting the first Post Graduate programme in Cyber Security in India at AMRITA. He is also pursuing several research projects with various government agencies.
Subrata Chattopadhyay Subrata Chattopadhyay is currently head of System Engineering and Networking Group at C-DAC, Bangalore and Chief Investigator of Garuda. He was involved in setting up the PARAM Padma, Supercomputing facility and address the challenges of high performance computing. He has also contributed for setting up of high speed communication fabric of GARUDA and deploying grid middleware across various platforms of supercomputers. From C-DAC, he is technical lead for the EUIndia Grid project that interconnect Indian grid project – Garuda with the European grid initiatives – EGEE.
CSI Communications | JUNE 2010
16
SPECIAL REPORT
Valedictory Address S Mahalingam Co-Chair, Organizing Committee & Immd. Past President of CSI & CFO and Executive Director, Tata Consultancy Services, TCS House 2nd Floor, Raveline Street, Fort, Mumbai - 400 001, Maharashtra E-mail: s.maha@tcs.com It is indeed a great privilege to be part of the valedictory function of Networking 2010. Computer Society of India (CSI) takes pride in organizing this 9th International IFIP TC 6 Networking Conference along with Indian Institute of Technology, Madras. CSI is an association of Researchers, Academicians, Professionals, Users and Students. This community looks forward to learning about evolution of technology and of the research field. Networking 2010 is yet another key offering by CSI to our members as well as to experts in this area. India has made a great mark in the IT field, thanks to institutions like IIT, Madras as well as to many IT companies in India. The need for IT usage in India has been growing exponentially and we have numerous initiatives, through use of Information and Communication Technology (ICT), to reach all parts of India- Urban and Rural as well as to deliver services such as for knowledge dissemination. Networks as an area of study is a critical contributor. Therefore this kind of Conference, which brings together Indian and International Researchers, provides a fillip to our national endeavour. CSI views updating of its members on technology and its usage as one of its key objectives. These conferences are important for meeting this need. In addition we have a Knowledge Management System at CSI and we are in the process of bringing out five quarterly publications ? called CSI Transaction on ICT covering Hardware, Software, Security, Education and Healthcare, and Economics, Practices and Management. This conference will generate idea for papers in these publications. It is indeed great to see a global participation in this event.
About Mr. S Mahalingam Seturaman Mahalingam or “Maha”, as he is better known, started his professional career with Tata Consultancy Services in 1970. In his 40-year career with TCS, Maha has been involved in myriad aspects of the Company’s operations and growth, before being appointed as the Chief Financial Officer of the Company in February 2003 and as Executive Director in August 2007. A chartered accountant by qualification, Maha began his career as an IT consultant and thereafter played a major role in marketing TCS services across the globe, developing processes and creating large software development centers for the Company. As an early starter in the Indian IT industry, Maha has played a key role in helping TCS become a $6.3 billion global company with over 160,000 employees. Prior to becoming the Chief Financial Officer in February 2003, Maha has managed many of the key functions in TCS including Marketing, Operations, Education and Training as well as Human Resources. He managed the company’s operations in London and New York in the early days of TCS’ global journey. Maha’s experience, during the formative years of the IT industry in the 1970s and 1980s, has given him significant standing within the IT industry. He is a former chairman of the Southern Region of Confederation of Indian Industry (CII), India’s apex industry body as well as a fellow of the Computer Society of India. He was also the President of the Institute of Management Consultants of India. He is a board member of several subsidiaries of TCS. Maha was conferred the ‘CFO of the Year’ award 2006 announced by International Market Assessment (IMA). Maha was also the winner of CNBC TV18’s Best Performing CFO Award in the Technology Sector for 2007. Born in February 1948, Maha is married with two children and lives in Mumbai.
CSI Communications | JUNE 2010
17
Ideas & Opinions
IT Industry in Transformation: Opportunities and Challenges for India Raja M Mitra Asia Research Centre (ARC), London School of Economics & Political Science, Houghton Street London WC2A 2AE. [www.lse.ac.uk/collections/asiaResearchCentre] E-mail: rmmitra@hotmail.com, mitra@post.harvard.edu
The full working paper [150 Pages] may be found at: http://www2.lse.ac.uk/ asiaResearchCentre/_files/ ARCWP29-Mitra.pdf
Excerpted from Press briefing with focus on future growth prospects for the “Asia Research Center Working Paper 29”, November 2009
Future industry growth and transformation scenarios and a comparison of the 2000s and the 2010s Strengths and weaknesses The IT-BPO services industry in India has proved itself resilient in dealing with uncertainty, volatility and the need to develop new business segments. This track record has been manifest for more than two decades now, including the time of the dot-com investment bubble burst around 2001, and the global economic slowdown from September 2008 onwards. Several factors indicate that the IT-BPO industry in India will grow at double digit levels during the 2010s: the expanding scale and scope of human resources and institutions capacity, improvements in the country’s overall investment climate as well as the development of new technologies, business segments and geographies, and so on. There are major opportunities to develop the offshoring business and to expand the use of ICT related technology for the development of the domestic economy, especially since only a small fraction of these potentials have been tapped till now. Furthermore, it can be argued that the IT-BPO industry India continues to under perform compared to its existing potential. This fact can be attributed to a number of factors, such as the limited progress in expanding and ensuring quality standards in the education system, weaknesses in infrastructure, and implementation of legal, regulatory and other
governance reforms at the central and state levels. This applies not only to tier 2 and tier 3 cities but also to tier 1 cities, that is, India’s major IT-BPO industry centers such as Bangalore, the Delhi-NCR area, Chennai, Hyderabad and the Mumbai-Pune areas. Also, a majority of Indian IT firms have no or only little experience in R&D and technological innovation. The key strengths driving IT-BPO industry growth in India thus continue to be entrepreneurial dynamism and the access to a large pool of skilled manpower at comparatively low costs. This is reflected in the fact that India ranks as number one among developing countries in terms of offering a favorable setting for offshoring of ITBPO services. Nevertheless, the expansion of the industry in India is constrained not only by weaknesses in infrastructure and the overall quality of the education system, but also by high costs and inadequacies in living conditions, namely the cost of quality real estate, environmental degradation and poor public services. Much of the Indian economies competiveness is negatively affected by weakness in public sector as well as corporate governance as illustrated by uneven and sometimes poor performance in terms of reliability and other aspects of trust and business ethics. All of these weaknesses have continued to hamper the scope to expand the ITBPO industry in India. A large number of East Asian and other countries are well ahead of India in terms of overall infrastructure developments and ease of doing business. Continuous need for transformation As shown earlier in this study the IT-related
CSI Communications | JUNE 2010
18
industry has undergone several phases of transformation in the 2000s and earlier. Principal factors driving this transformation have been changes in demand and supply and coupled with change in technology, business processes, human resource and institutional capabilities, public policies and more broadly the overall investment climate. The 2010s and beyond is poised to imply new phases of radical transformation in the scale and scope of the IT-ITeS industry operations and the role of IT based technology in India and globally. As in the past, this will entail a paramount need to reorient the industry in terms of vertical and horizontal technology platforms, geographical markets and thereby related human services, industrial organization and corporate strategy requirements. India’s comparative advantage in the offshoring oriented ITBPO services industry development can be described in terms of the so-called the labor-arbitrage “model” in which low cost for human resources was a central component. It is often argued that the old version of the labor-arbitrage “model” gradually will prove to be unable to deliver the same result as it did in the past. One of the prime reasons given for this is that a large number of other countries have entered the offshoring ITBPO services business and also can offer access skilled manpower as at competitive costs. They are gradually developing a significant industry for IT-BPO services and they have proved worthy contenders to India in terms of costing, numerical skills and linguistic requirements as well as offering geographic proximity advantages. The latter is illustrated by the North American offshoring market being served from Central American countries, the Western European market being served from Eastern Europe and the Japanese market being served from China. While India is in an advantageous position to build on its existing strengths – the size of its skilled pool of human resources and costing advantage – pressures are mounting to modify this of the labor arbitrage “model”. This modification implies that India’s competiveness to a greater degree emanates from scale, quality and innovation aspects in addition to costing. Furthermore, unlike the 1990s India’s comparative advantage in the 2000s and beyond is poised to be manifested not only export but also the scale and scope domestic market developments. Also, unlike the 1990s Indian firms have become increasingly global as they deliver services not only from India as well as other locations. Moreover, it is important to note that India has a “first” mover advantage in many aspects of the business of offshoring of IT
software and services and BPO to developing countries. The magnitude at which Indian based companies has developed the scale and scope of their operations in India and internationally is hard for smaller emerging market economies to match. India continues to have the largest pool of skilled human resources along with China. Indian’s along with other Asian people play a central role as employees in IT and other knowledgebased industries worldwide. Also, the ITBPO industry in India has swiftly moved into newer business niches. It has gradually developed new competencies although with much of the focus being on the lower and middle end of the value added chain. It can be argued that there are ample opportunities for the IT-BPO industry in India to develop new business niches both at the lower and higher end of the value chain and across a wide range of verticals. There is, however, little room for complacency in a rapidly changing and competitive environment. Furthermore, India and other emerging market economies are rapidly developing “new” domain competencies — global service delivery of education, health care, legal and accounting services, bioinformatics, engineering and green tech for example. Also, they are getting access to new offshoring enabling software and connectivity solutions — recent examples of the latter being the growth of broadband GSM and high resolution video conferencing. Moreover, it should be noted that India gradually is developing into a major global hub for R&D in IT and other areas. One of the salient features of the 2000s was rapid expansion in the scale and scope of MNCs offshoring of R&D work to India and China. This trend is poised to continue in the 2010s and beyond. Finally, the number of persons with higher education, including those with
400 350 300
Domestic Market
255
Export Market 255
250 185
200 150 100 50 0
skills applicable to the IT-BPO sector, is expanding considerably in India, China and other emerging market economies. This point to the fact that developing countries are catching up with advanced industrial economic in higher education, high technology industry and other aspects, that is, the so-called competency equalization trends. In parallel with this fact, unfavorable demographic trends, namely high number of elderly persons, presage to the fact that advanced industrial countries will have substantial shortages in IT and other skilled categories for several decades to come. All of the above are factors indicating the scope for expansion of offshoring of IT-BPO services to developing countries. ***Growth scenarios: India 2020: IT-BPO industry growth vision This study identifies three major growth scenarios for the IT products and services industry and the BPO sector in India for the 2010-2020 period. A. The low growth scenario: IT-BPO industry revenue reaches US$ 185 billion level by 2020 out of which exports accounts for 140 billion while the domestic market accounts for 45 billion. This implies an especially substantive deceleration of IT-BPO industry growth compared to the 2000s. B. The medium growth scenario: IT-BPO industry revenue reaches the US$ 255 billion level by 2020 out of which exports accounts for 200 billion while the domestic market accounts for 55 billion. This implies that IT-BPO industry growth reaches a CAGR 14 percent in the 2010-2020 period – a comparatively moderate deceleration compared to the 2000s. C. The high growth scenario: IT-BPO industry revenue reaches the US$
59 46 13 2009
140
200 200
45
55
2020-Low
2020-Medium
55 2020-High
Source: The author Note: IT-BPO industry defined as IT services, software products, engineers services and the BPO sector
CSI Communications | JUNE 2010
19
350 billion level by 2020 out of which exports accounts for 270 billion while the domestic market accounts for 80 billion. This implies that overall IT-BPO industry growth will grow at comparatively higher rates but the CAGR will still not reach the 2000s level. The medium growth scenario appears to be most likely and hence it is viewed as the base line. This scenario assumes a gradual but robust recovery in the global economy
and IT spending levels in India. It is, however, hard to forecast global IT spending and sourcing markets. Also, it is hard to predict the implications of the emergence of new technologies, and changes in infrastructure and labor markets. Hence, the wide range in the projected outcomes presented in this study. All three scenarios point to major transformational expansion in the IT-BPO industry. They project that much of the dynamism in IT-BPO industry development
in India will continue to be driven by the offshoring-export business. However, unlike the 1990s the rate of growth in the domestic market may well be at par with or higher than in exports. The size of the domestic market will be substantially larger than in the 2000s. Nevertheless, the actual size of the export business would continue to be several times larger than that of the domestic market. ooo
About the author Raja M Mitra has worked with the World Bank Group for more than 15 years. He has extensive experience in working on innovation and high technology industry development, foreign trade and investment and global sourcing, as well as in public policy, corporate business strategy and management issues. His career began with assignments in the United States, India and numerous other countries on behalf of the Swedish government and the corporate sector. Later he became an economist and corporate adviser serving international organizations and multinational corporations. Since 1989 he has worked with the World Bank and the International Finance Corporation in Washington DC. He has conducted research at London School of Economics and Political Science, Oxford, Cambridge and George Washington Universities. He graduated from the University of Stockholm and Harvard University.
Adhyayan 2010
National Conference for IT Students Andhra Mahila Sabha School of Informatics, Hyderabad, Andhra Pradesh & CSI-AMSSOI Student Branch 7-9 October 2010 Andhra Mahila Sabha (AMS) is a social service non-profit organization. AMS School of Informatics is a unit of AMS on Osmania University campus, Hyderabad, offering MBA/MCA courses to women candidates. Important Dates:
Last date for submission of abstract Notification of selected abstracts Last date for submission of camera ready paper Last date for registering for the conference
: 15th August 2010 : 30th August 2010 : 20th September 2010 : 1st October 2010
All submissions mail to : adhyayan2010@gmail.com Note: Only soft copies of papers are accepted. For any queries contact:
Adhyayan 2010 Secretariat Ph: 040 - 2709 6694 â&#x20AC;˘ Fax: 040 - 2709 9170 Email: adhyayan2010@gmail.com â&#x20AC;˘ Url: www.amssoi.org.in
Annual Report 2009-10 The Chapters and Student Branches are requested to send the list of CSI National/Regional/Division events organized during the year 2009-10. The list of major events will be included in the CSI Annual Report of 2009-10. The events lists may please sent the respective RVPs and cc to hq@csi-india.org. The last date for submission is 25th June 2010. Prof. H R Vishwakarma Hon. Secretary, CSI
CSI Communications | JUNE 2010
20
hr Column
360 Degree Feedback Latha Rajan Director - HR & Finance, Ma Foi Management Consultants Ltd., No 49, Cathedral Road, Chennai 600 086. India e-mail: latharajan@mafoi.com
Peter Maxwell Davies, English composer and conductor says, ‘if you don’t get feedback from your performers and your audience, you’re going to be working in a vacuum’. This statement is pretty much applicable to the corporate world as well. The term `feedback’ is borrowed from rocket engineering jargon. A rocket sent into space contains a mechanism that sends signals back to Earth. On Earth, a steering apparatus receives these signals, checks if the rocket is off target, and corrects its course. In the world of work, message is given based on observations to the individual if he/she is off target in terms of the goals set by self and by the organization. This message can then be used to correct his or her course. Feedback is most effective when given in `hereand-now’. This is the traditional method course correction is done, and a method we are all very familiar with. During our growing years, behaviors were noted by the elders in the family (mostly the mother) and correction was done in a very direct and hard hitting manner. We were reminded of what we did/did not do, the result of that, and the impression we have created. If we ever repeated this then a mild threat along with what would happen to our future if we continued with this behavior was communicated to us in such a manner that to this day we would remember the reprimand, and of course, refrain from that behavior. Professional behavior and work performance does not warrant such a fundamental correction; however, there is a perpetual need for improvement and the only way to enhance performance is to receive critical feedback by people working with, under, above and around us. Personal development, which is essential in the workplace, requires good, honest, well expressed and specific feedback. Feedback is generally termed as either positive or negative. It actually translates to supportive or corrective behavior which calls for reinforcement or improvement as the case may be. Actually, all feedback is positive as it assists the individual in maintaining or enhancing the present level of performance. Handling feedback is an art. The ability and the willingness to communicate effectively comprise the
crux of a feedback exercise. Here, communication is both ways – that of giving and receiving information. The processes of providing and seeking feedback are most important in making us `see ourselves as others see us.’ Giving and receiving feedback effectively are not easy tasks; they imply certain key ingredients: caring, trust, acceptance, and openness. 360 Feedback: One of the techniques that became popular and has since been used in organizations across the world is the 360 degree feedback method. According to consulting firms, 40 percent of companies started using the 360 feedback tool in the early 90s. By year 2000, almost 65 percent of corporate organizations followed the 360 degree feedback tool for both employee development and evaluation process. In this multi rater feedback process, the individual, usually the manager, is figuratively in the center of the circle and feedback is given by superiors, subordinates, peers and customers. Along with the various ratings, the manager’s self assessment is recorded. The data collated and interpreted is used for appraisal and promotion as well as learning and development. The merit in this technique is multifold: it maps the strengths and areas of improvement in the individual and his/her managerial style and it also initiates self-change in the manager. Apart from creating an atmosphere of teamwork and sense of empowerment with accountability, the method also, at times, unearths home truths about the organizational environment and culture. It is important to choose the right people as raters. The choice is a group of people which interacts routinely with the person receiving feedback and is usually shared by the organization and employee. The next important aspect, after the choice of raters, is the level of confidentiality at which the process is carried out. If appraisers feel that their individual ratings can be identified by the individual or the organization, their rating tends to become less accurate. People, by nature, do not want to give honest feedback, when it is negative, as it will be tied to them. In 2003, Lombardo and Eichinger, of Lominger Limited, Inc. found that accuracy decreases when the ratings
CSI Communications | JUNE 2010
21
become public and identifiable. Accuracy of the ratings increases if confidentiality and anonymity is kept high. It is a challenge, however, to create a comprehensive process based on the 360 degree tool in large organizations. It is advisable to gradually evolve the process by adopting the tool in small measures. One company commenced this process by providing only to the employee in the first round. In the second round, about a year later, the employee as well as the HR manager viewed the data. The data, though, was not used for performance appraisal; neither did it enter the personal file. The third year, data that was obtained from the feedback process, was incorporated into the performance appraisal process and was also tied to increment and incentives. This helped the employee to use the feedback report as the basis to make improvements in work style as well as work place behavior. The company ensured the raters were kept confidential in all the rounds. The feedback pans across parameters such as: job performance, behavior at workplace, managerial effectiveness, skills like delegation, communication and team play. The scope of assessment also includes finer aspects like values, ethics, fairness, balance, etiquette like professional courtesies. The process aims to capture in a nutshell, how inspired the employeeâ&#x20AC;&#x2122;s leadership is. Technology plays an important role to guarantee of anonymity which in turn maximizes earnestness, candor and honesty in responses. The technology must be capable of protecting the data from access by unauthorized people. HR policies and procedures that define feedback process as part of performance management need to clearly state who can view the feedback
and in what circumstances. The reliability and validity of the collated data also largely depends on the specification of the group size. It is recommended that, apart from self and supervisor scores, the size for each category should be no less than three. Technology furthermore accelerates the rating process as many instruments are available online. The data crunched and presented in graphs by the computer is handed in a collective report to the appraisee, who internalizes the feedback and seeks counseling from the management or in some cases from a professional coach. The 360 degree appraisal, though popular and adopted by many organizations is meaningful and constructive only when the follow up is taken seriously. A half way method, with just the process implemented and no improvement tools in place proves to be a perfunctory exercise which is not result oriented. In many cases, the technique though effective in providing objective and unbiased feedback, does not call for commitment to improve from the appraisees. Organizations feel that adult learning is confined to merely creating awareness but which can cause changes in a natural and positive way. What needs to be remembered is that the adult mind can be in denial and the feedback could be rejected as a matter of opinion. If not handled well, appraisees could end up feeling demotivated and in extreme cases also start harboring a persecution complex. A manager, who is insulated and removed from interactive communication with his team, may be surprised even shocked, when he/she receives the report. The feelings and emotions further cause sadness, anger, humiliation and regret which could snowball into cynicism. In such instances, 360 degree process would have caused more harm than help.
Pay cheques should not reflect the feedback report as the tool is only a compass for pointing out direction to compensation; it cannot be the arbiter of reward. Here, performance in terms of meeting the targets is fundamental to evaluation. At the risk of exaggeration, a manager cannot suffer bad feedback because he refused to grant leave to a team member! It has to be understood that results can be uneven as individual reactions can vary. The manager needs to be given the report and an opportunity to finetune workstyles. A discreet follow up by the HR to check if assistance is required to arrange for counseling, mentoring or coaching for the individual is needed to bring the exercise to a meaningful closure. Bearing this in mind, the 360 degree feedback process is recommended as a supplement to any performance appraisal system and not in lieu of the existing process. Although applicable across functions and hierarchy, the tool is most effective when used top down. During an open house session in a software company, an employee voiced a need to have a 360 degree process. When asked the reason he replied that he did not know anything about the process except that it can be a vent to let out pent up frustration! 360 degree feedback exercise, if implemented, calls for an awareness building session as a pre-requisite to raters as well as managers. Perspective is critical if a professional process is to be administered and for receiving objective and real feedback. It becomes a real reality check only if done objectively and professionally.
About the author Hemalatha Rajan is the co-founder of Ma Foi Management Consultants Limited and has played a pivotal role in building Ma Foi into an organization which works with passion, integrity, transparency and commitment. A Finance professional with over 15 years of experience in Finance, Audit and Executive Search, she heads the financial, administrative & HR activities in Ma Foi and has played a key role in enabling the evolution of key systems and practices in accounting and administration and organization policies. Hemalatha Rajan is a fellow member of the Institute of Chartered Accountants of India. Prior to starting Ma Foi, she worked as an Auditor with M/s. S.B. Billimoria (a part of M/s. Delloite) and later went on to work as a Partner in M/s. Revathy & Latha Chartered Accountants. She strongly believes and advocates the importance of education for the underprivileged children and women. This passion of bringing about a change in the society encouraged her to start the Ma Foi Foundation along with Mr. K Pandia Rajan. An active Rotarian, Latha Rajan also plays an active role in promoting and preserving Indian art and culture through an organization called Tamil Maiyam. She holds a Bachelorâ&#x20AC;&#x2122;s Degree in Commerce from the Nagpur University and earned an F.C.A degree prior to working as an Auditor. CSI Communications | JUNE 2010
22
ARTICLE
The Digital World in 2025 Indicators for European Action Peter Linton* & Paul Schuchhard**
igital World 25 tors for ean Action
This report is reprinted with special permissions granted by Cristina Monti, Director, European Internet Foundation.
*Advisor to the Governors, European Internet Foundation, [http://www.eifonline.org/] Rue de la Science 14 (8th floor), B-1040 Brussels, Belgium. e-mail: peter.linton@eifonline.org ** Communications Advisor, European Internet Foundation, [http://www.eifonline.org/] Rue de la Science 14 (8th floor), B-1040 Brussels, Belgium. e-mail: paul.schuchhard@eifonline.org Introduction 2025 may seem like a long way off. The pressing issues of today necessarily preoccupy European leaderships. But consider this reality: youngsters who are 10 years old today (2009) will be entering the prime of life by 2025. Many millions of 10-yearolds in Europe and around the world are already “digital natives” – born and raised in a world of digital Indicators For European Action. communications. Behind them will come wave upon wave of youngsters, particularly in today’s young emerging societies and economies, with increasing numbers growing up with ever-more powerful digital tools. Indeed, given current trends any distinction between “the digital world” and any other worlds will have become largely academic by 2025. Over the past 15 years digital communications have already transformed the way ever-increasing numbers of us behave individually and collectively in our working and social lives. But this is just the beginning as the pace of change itself accelerates. This report proceeds in four sections. The first proposes a central paradigm for trying to envision the digital world of 2025, and summarizes what are likely to be key features. The second sets out and analyses observable trends in the evolution of the technologies driving the digital revolution. The third turns to observable economic trends, and the fourth to political and social trends. None of these sections pretends to be comprehensive. Rather, they reflect the issues, ideas and trends EIF members and guests have chosen to highlight over the course of this project. 17/09/2009 16:37
A Vision of the Digital World in 2025 Central paradigm While by no means comprehensive, the trends identified in this report serve to reveal the breadth, depth, speed and complexity of digitally-driven change in our economies and societies. We therefore propose at the outset a central, unifying paradigm to try to capture their common character and more clearly envision the world they are likely to create by 2025.
The paradigm we propose is that of a world driven by mass collaboration The paradigm we propose is that of a world driven by mass collaboration – enabled by the ubiquitous availability of highspeed, high-capacity digital communications networks, systems, tools and services, connected by the Internet. For the purposes of this exercise please think of “mass” collaboration as a highly scalable and conditional concept. Online collaboration among groups of highly variable size already typifies a wide range of human activity in many parts of the world1. Purpose-driven online collaboration takes us beyond the domain of the enabling technology and into the domain of public policy, politics and politicians By “collaboration” we mean not simply online “connection” or even “interaction”, but rather interaction with the intent to create economic or social goods and effects. It is the inexorable spread of such purpose-driven online collaboration that takes us beyond the domain of the enabling technology and into the domain of public policy, politics and politicians. Will digitally-driven mass collaboration have become pervasive in 15 years’ time? It is difficult to imagine what might stop it. Around the world and across the spectrum of human endeavor we see a rapidly-growing array of such collaboration, enabled by the relentless development and deployment of technologies and tools specifically intended to facilitate, amplify and expand our individual ability to collaborate with others anywhere, on any scale. This said, we have as yet no models for a global economy dominated and driven by mass collaboration, no models for social structures and behaviour shaped primarily by mass collaboration, no models for politics and government based on mass collaboration.2 Nor has mass collaboration yet become so pervasive as to have produced widespread, irreversible structural change in the economic, political and social spheres. The challenge of this exercise is to imagine how, by 2025, it will have – as real-time, borderless, digitallyenabled collaboration becomes the dominant
CSI Communications | JUNE 2010
23
Indicators for European Action
paradigm of human activity at any scale, worldwide.3 2025: major features Given the trends identified in the body of this report, major features of the 2025 world of mass collaboration bearing directly on Europe’s political priorities for 2009 – 2014 look likely to include: The economic power of emerging economies: “In terms of the size, speed, and directional flow, the global shift in relative wealth and economic power now under way – roughly from West to East – is without precedent in modern history.”4 This shift is increasingly powered by the accelerating development and use in economic life of the digital tools and technologies of mass collaboration in – often younger – emerging economies and societies. The only way for aging Europe to remain economically strong and globally competitive in 15 years will be as a collaborative, digitally-enabled society and outward-looking technology leader and partner for the rest of the world. Smart systems, smart growth: By 2025, economic growth and competitiveness everywhere will depend on the presence of smart systems at the core of major economic and social sectors, including notably energy, transport, health care, environmental management and public services. The continued development and operation of such smart infrastructure will itself also remain a driver of new growth and employment – provided that it is itself environmentally sustainable. It will also prove a vital condition for managing climate change and its effects. 70% of Europe’s workforce of 2025 is already part of our workforce today
Foundation
like becoming a global eco-system of collaboration among educators and educational institutions.
neutral. They can be, will be and already are used for good or ill. By 2025, the ”digital arms race” between those > Digital infrastructure: Technology trends today give rise to a 2025 scenario in whic intent on harm and those collaborating Our Internet schools and universities won’t be the has become the world’s dominant, converged to prevent it will infrastructure have become afor the tran biggest so they will have to be the best sion of digital communications services.central This scenario thatlawnetwork ope feature of supposes our justice and Acan data-driven Because virtually enforcement But even beyond benefit world: from conditions which attract private systems. investment today in next-gene all of our digital acts can be captured the clearlyperformance criminal and proscribed, networks. It also supposes that the technical of the Internet bec and stored in databases, by 2025 the current financial crisis arguably steadily reliable than it is today, that it will accommodate more language our abilitymore to capture, measure and demonstrates the destructive potential that its our usecollective, becomescollaborative safer from harm. and power of mass collaboration even analyse behaviour will itself have become a in the absence of criminal intent or defining feature, driving force and conduct. How are we to organize and As with mo economic engine in the digital world. manage a world>inNew which risks: everybody That prospect dramatically raises mankind’s inventions, the d is connected (directly or indirectly) to the importance of issues we already everybody, withtechnologies the result that and vast tools of confront today, notably those awkward numbers of individuals receiveare the morally ne collaboration twins privacy and security, and even same stimuli at the same moment, and They can be, will be and al more profoundly, e-identity. respond in the same way? are used for good or ill. By Digital infrastructure: Technology What will “smart culture” look like in trends today give rise to a 2025 the ”digital arms race” bet 2025? scenario in which the Internet has those intent on harm and become the world’s dominant, Smart culture? The world of culture – collaborating to prevent it will have become a central feature of our justice converged infrastructure for the broadly defined as the performing, visual law-enforcement systems. But even beyond theartsclearly criminal and proscribe transmission of digital communications and literary – looks certain to remain current financial crisis arguably demonstrates the destructive potential services. This scenario supposes in the vanguard, not to say the vortex, and pow that operatorseven can benefit of of thecriminal digital revolution simple How are massnetwork collaboration in the absence intent for or the conduct. from conditions which attract private reason that most cultural production organize and manage a world in which everybody is connected (directly or indirec investment today in next-generation can be produced, reproduced, mixed everybody, with the result that vast numbers of individuals receive the same stim networks. It also supposes that the and widely transmitted in digital form. the same moment, and respond in the same way? technical performance of the Internet By 2025 it will be much easier for many becomes steadily more reliable than it more collaborators to do so. We are today, that it will accommodate beginning to appreciate the scale > isSmart culture? The worldmore of culture –justbroadly languages, and the that performing, its use becomes of the economic, societal and political defined as visual and literary safer from harm. repercussions of this technological arts – looks certain to remain in the vanguard, reality in the cultural sphere. What will By not 2025,to the ”digital armsofrace” say the vortex, the digital revolution “smart culture” look like in 2025? between those intent on harm and those for the simple reason that most cultural production canregulation be produced, reprod Internet governance, and collaborating to prevent it will have control: We may expect that issues of mixed and widely transmitted in digital form. By 2025 it will be much easier for become a central feature of our justice governance, regulation and control of more collaborators to do so. We are just beginning to appreciate the scale o and law-enforcement systems what people actually do on the Internet economic, societal and political repercussions of this technological reality i New risks: As with most of mankind’s will remain constants as purposecultural sphere. What will “smart look like in 2025? networks of inventions, the digital technologies and culture”driven or interest-driven tools of mass collaboration are morally all sizes proliferate and collaborate in
By 2025, the ”digital arms race” between those intent on harm and those collaborating to prevent it will have become a central feature of our justice and law-enforcement systems
What will “smart cultur look like in 2025?
Human resources, education and training: Europe’s prosperity and societal wellbeing in the digital world of 2025 will depend in large measure on our pool of human talent, skills and creativity able to exploit the limitless global potential of the digital world. 70% of Europe’s workforce of 2025 is already part of our workforce today, while we are increasingly competing with much younger societies whose pools of digitally-empowered talent will eventually out-number ours under any demographic scenario. Europe has no choice. We will need to be as good as or better than the best anywhere. Our schools and universities won’t be the biggest so they will have to be the best, which means they will have to become leaders in what by 2025 looks
CSI Communications | JUNE 2010
24
rsuasion will be needed to prevail.
8
Commission - of policy areas in which the trends identified in this report need to be further examined and acted on, and where action – or inaction – over the next five years will prove decisive for Europe’s economic and social well-being in the digital world of 2025, and beyond. The Technologies Collaboration
the years to come. Open access and self-organization with self-governance is still considered by some to be the most desirable model for Internet activity. But government efforts and regulatory rules are already apparent around the world to control on-line access or on-line conduct deemed – by democratic processes or not as the case may be – to be illegal, threatening or troublesome. It is by no means clear what regulatory or control models and for which purposes, will have emerged by 2025 in our democratic societies – and elsewhere. Power to the people: By 2025, digitallyenabled, purpose-driven masscollaboration on the “demand” side may well have swept away many – if not most – inward-looking economic and political institutions whose power has been built on the control of information or distribution channels or of a specific technology. Many if not most markets, whether for products or ideas, will have become “conversations” between consumers and producers in which permanent direct engagement and powers of persuasion will be needed to prevail. Will the digital technologies and tools of mass collaboration draw human society closer together? Digital politics and government: By 2025, digitally-enabled masscollaboration will have long-since become the dominant paradigm of electoral politics– indeed many would argue that it already has. Transferring digital campaigning models and tools to government and governance, or creating new ones, looks no less ineluctable as empowered citizens
demand ever-greater transparency and collaboration in public life. These trends point to a blurring of the line between direct and representative democracy, and a new role for government as mediator between empowered, engaged stakeholder communities. Digital society: Arguably the most important question we have confronted in this exercise is also the most difficult to answer: over the next 15 years, will the digital technologies and tools of mass collaboration draw human society closer together through common understanding and purpose, or will they rather fragment our societies into myriad self-conscious, self-communicating, self-absorbed, selfcollaborating communities of special interest or specific identity, with unpredictable social, political and economic consequences?
Every policy arena will have to address this question What digital world do we want? The fundamental political question Europe’s democratic societies and political leaders must confront today is, quite simply, what place do we want Europe to occupy in the digital world of 2025, and what public policies do we need – starting today – to make it happen? The foreseeable spread of digitallyenabled mass collaboration into most human activity takes this question way beyond digital technology and “ICT” sector policies themselves. Every policy area will have to address it – the sooner the better. The last section of this report (see inside back cover) offers an indicative list particularly for the attention of the incoming European Parliament and European
Driving
Mass
Overview Tomorrow’s digital technologies will be the result of today’s R&D investments. The trend is very clear: at every level of the valuechain from computer processing power and data storage to network capabilities, software tools, intermediate applications and digital content, R&D investments are increasingly driven by the prospect and promise of exploding worldwide demand for the ability of individuals (and now also “things”) to communicate and collaborate with each other online, en masse. The aggregate effect must surely be to shift mass collaboration into a much higher gear by 2025: more people will be connected, with mobile devices to connect to the Internet anywhere at any time; user interfaces to access the network will be simplified and more intuitive; many new intermediate tools, applications and services will be part of the network or available through the network to manage and make sense of vast volumes of data; and much content will itself be built on new technologies and tools of mass collaboration. Not your grandmother’s microchip The opening shot in the digital communications revolution was the invention in 1958 of the microchip. Ever since we have witnessed a relentless exponential explosion in the processing power of these components, even as their physical size has shrunk. This phenomenon was famously postulated in 1965 by Intel Corporation co-founder Gordon Moore, who predicted that the computing power of microchips 17/09/2009 16:37 would double every two years. Since then there has been continual debate over how long “Moore’s law” can continue to apply. Astonishingly, the industry view today is until at least the 2020s! By then, a single chip could well be able to replace today’s biggest supercomputer. How? A single chip could well be able to replace today’s biggest supercomputer
Manycore 5 processors: Instead of putting a higher number of transistors on the core of a single chip, new designs work with several cores within a single chip. This is called a “manycore processor”. Such processors excel in handling multimedia, speech
CSI Communications | JUNE 2010
25
recognition and networking applications investment trends tell us that the because they can run processes in telecommunications industry is parallel and can “serve” a high number rapidly developing technologies to stributed computing: In distributed computing a program runs simultaneously on of users simultaneously. But even with transport far greater volumes of digital ultiple computers or any other devices with centralbits processing unit manycore technology, our need for an embedded communications at much faster ke game stations) that communicate over a network.speeds The main goalmuch of abigger distributed computing power already often exceeds through “pipes” what has to ledcomputer to the – what industry calls “terabit mputing system is istoavailable. connectThis users power in athe scalable way. Although development distributed computing. of very networking”, because they will be able anycore processors allow offor the creation powerful computers, network to transport many terabits per second. A It is more efficient to increase nsmission speeds and bandwidths terabit is one trillion bits. To get a sense computing power by networking e increasingcomputers much more of how much data that is, consider this: togetherrapidly than mputer processing when 7.7 million people simultaneously D i s t r ispeeds. b u t e d This c o mmakes puting: In watched Barack Obama’s inauguration more efficientdistributed to increase computing computing a program runs online on January 20, 2009, this led simultaneously on multiple computers wer by networking computers together to a peak of 3.5 terabits of data per or any other devices with an embedded combine their capacity “on demand”. second transmitted over the Internet. In central processing unit (like game the mass collaboration world of 2025, stations) that communicate over a much will no longer be stomised chips: As chips grow ever more powerful, theygreater may volumes also become more network. The main goal of a distributed exceptions but could the norm. ecialized. By 2025 – indeed well before byusers some accounts – there be dedicated computing system is to connect Combined with massively increased to computer power in a scalable way. ips for a wide-range of applications, operating at speeds vastly higher than today, computer power, massively increased Although manycore processors allow ovided that the volume of demand creates the necessary production economies of network speed and capacity will turbofor the creation of very powerful ale and that enhanced performance justifies any price premium compared with evercharge a world of mass collaboration, computers, network transmission particularly by enabling ubiquitous, instant olving genericspeeds chips.and bandwidths are increasing two-way video communications on both much more rapidly than computer fixed and wireless networks. processing speeds. This makes it more
It is more efficient to increase computing power by networking computers together
, fatter pipes efficient to increase computing power Internet everywhere rabit Networking: The investment trends tell us that the telecommunications industry by networking computers together to • Next Generation Networks (NGN): apidly developing technologies to transport far greater volumes of digital communicombine their capacity “on demand”. Communications services such as radio, tions bits at much faster speeds much what the industry calls Customised chips: Asthrough chips grow ever bigger “pipes” TV, fixed –telephone, wireless telephone more, because powerful, they rabit networking” theymay willalso be become able to transport many terabits A and Internet connectionper are second. still typically morebits. specialized. well made through variety7.7 of abit is one trillion To getBya 2025 sense– indeed of how much data thatavailable is, consider this:a when before by some accounts – there could infrastructures, technologies llion people simultaneously watched Barack Obama’s network inauguration online on January be dedicated chips for a wide-range and standards, including copper wire, , 2009, this led to a peak of 3.5 terabits of data per second transmitted over the Internet. of applications, operating at speeds coaxial cable, fiber optics, Internet the mass collaboration world of 2025, much greater volumes excepvastly higher than today, provided that protocol will (IP),no andlonger Digitalbe Terrestrial the volume of demand creates the Broadcasting. Now, major investment ns but the norm.
necessary production economies of by network operators and telecom scale and that enhanced performance equipment manufacturers is focused mbined with massively computer power, massively increased network speed justifies anyincreased price premium compared on the development and deployment of d capacity willwith turbo-charge a world of mass collaboration, particularly by enabling everevolving generic chips. Next Generation Networks exclusively iquitous, instant two-way fixed and wireless networks. based on the Internet Protocol (IP) and Faster, fatter pipesvideo communications on both thus capable of transporting any and all T e r a b i t N e t w o r k i n g : T h e
digital communications and services over the Internet. This is often called the ”IP everywhere” model6 based on “high leverage” all-IP multi-service, fully converged, scalable wireline and wireless networks. These networks will feature constant innovation in broadband and optic technologies to transport and deliver traffic more reliably and efficiently, and to enable new applications and business models. Getting everybody connected to broadband networks must be Europe’s aim
Getting everybody connected: The specific choice of network technology by a network operator willing to serve a specific geographic area will be influenced by many factors, such as expected demand and population density. Getting everybody connected to broadband networks, allowing full participation in the digital world of 2025, must be Europe’s aim. Convergence of networks and services: From the user’s perspective, the “IP everywhere” model amounts to a convergence of networks and services, opening up the possibility of access to all digital communications services through any single device connected to the Internet.
In the future, the Internet will be able to connect everything and anything The Internet of everything The Internet of Things: Today we connect people and computers to one another via the Internet. In the future, the Internet will also be able to connect everything and anything, including inanimate objects, sensors, and actuators. These are called “cyberphysical systems”, or more popularly The Internet of Things. They will enable the mass collaboration of things with things, and things with people. RFID: A key enabling technology for the Internet of things is Radio Frequency Identification, or RFID. An RFID tag is basically a microchip that can be applied to or incorporated into a product, animal, or person for the purpose of identification and tracking using radio waves. IPv6?: For this vision to become reality, however, billions of individual “things” will first need to be given a unique Internet address, just as human beings and computers are today. Today’s “Internet Protocol version 4 (IPv4)”– the system of software standards underlying the Internet – does not have
CSI Communications | JUNE 2010
26
enough address capacity to do this. The more recent “IPv6” protocol may help eliminate this barrier, but by 2025 much more address capacity will be needed. Some experts foresee a worldwide population of up to 7 trillion radioenabled devices by 2025 Calling all cars Smart spectrum management: To connect to the Internet of everything, many things will incorporate a radio, autonomously transmitting and receiving signals, in order to collaborate with other things and people. Some experts foresee a worldwide population of up to 7 trillion radio-enabled devices by 2025. But it is quite simply beyond the wit of man to allocate radio spectrum for trillions of radios, as we have done since the invention of radio transmission itself to prevent interference between different categories of users. Indeed, we are already running up against the political impossibilities of making sufficient spectrum available for everybody – let alone every thing. Could new technology break the spectrum constraint once and for all? Some on the leading edge think so. They are working on intelligent – or ”cognitive” – radio devices that would be able to negotiate continuously and autonomously among themselves in any given locality to make sure all have sufficient spectrum to operate without causing interference. Toward a 2025 world of mass collaboration among trillions of radios, to further enable the mass collaboration of people and things via the Internet of everything? Stay tuned. The most powerful device in many homes today is not a PC but a game station Cloud 9? The Cloud: What, we may fairly wonder, will it all add up to – all this hyper computing power, linked to hyper-connectivity, delivering any and all IP-based services, accessible anytime, anywhere? “The Cloud”, say some, searching for an appropriate metaphor to describe a disembodied digital world in which we no longer need to acquire and carry around with us all of our own personal computing hardware and software tools, but rather can access and use them anytime, anywhere, safely and securely through the Internet – from on-line providers whose location is irrelevant.
The metaphor of the Cloud does seem to capture a scenario made possible by current technology trends (although there is no single agreed definition7). But at least as plausible is a world of 2025 in which the Cloud has become part of a much broader, seamless software platform that also spans more powerful and applications-rich PCs, as well as a wealth of smaller devices. The most powerful device in many homes today is not a PC but a game station.8 Cleaner mobile pipes and smarter networks? The promise of the Cloud is driving R&D in the telecommunications sector too – beyond faster, fatter pipes, toward cleaner mobile pipes and smarter networks, able to: ¬¬ Identify the type of content being transmitted, and thus provide flawless, content – specific services (as for example intellectual property protections); ¬¬ Ensure security in the network, not just on the end-points of a connection; ¬¬ Operate with any mobile Internet platform. A more reliable Internet? The Internet will also have to provide much more reliable and instantaneous data transmission than it does today if it is to become the world’s dominant digital infrastructure. That will require massive investment in new nextgeneration networks and in additional layers of software in the core network, as well as in local access installation and maintenance. The race is on: If the history of new technologies teaches us anything, it is that the demand side – human beings responding to the resulting products and services on offer – will ultimately dictate their success or failure. 9 Whether or not any or all of these added-value network functions end up primarily as in-built services of the Internet itself, or rather as capabilities of PCs, servers, and other devices connected to the Internet, or some mix of both, the mass collaboration world of 2025 will demand global digital communications capability which is converged and interoperable, instantaneous, scalable, secure, content-aware, reliable and survivable. The race is on within and between ICT sectors, and around the world, to deliver that vision. Call it the
Cloud. So much power, so little software What, we would do well to ask, is the world of 2025 actually going to do with all that vastly expanded computing and transmission capacity, beyond expanding its availability to many more of the 75% of humanity not yet connected? Good question. The answer in one word: software. Software is what will turn that raw digital power into economic and social goods, and as that power continues to expand exponentially, the opportunities for software become as limitless as the human imagination. Software is what will turn raw digital power into economic and social goods
“Re-booting” the software industry: Will software actually develop fast enough to fill the computer and network capacity foreseeable by 2025? Software industry leaders point out that today the industry is still in its infancy. Creating software able to exploit the emerging “parallelism” of the digital infrastructure – and especially to deliver the complexity, “concurrency” and security at scale necessary for far more ambitious software applications, will require a fundamental change in software engineering tools and techniques, not just incremental progress, while at the same time the Internet itself becomes a programming environment and no longer just a publishing environment. Here again, the race is on – to create the tools to create the next generations of software that will power a user-driven world of mass, software-assisted collaboration. Software as a service: The possibilities of the Cloud likewise create new challenges and opportunities for the software industry. The prospect of “software as a service” delivered over the Internet challenges existing software architecture built for onpremise, serverbased software deployment. New architectures will be needed for data management in the Cloud, and integration of Cloud-based applications. Beyond “click and point”: Along the way, this race promises to take us way beyond the “click and point” model of the man/machine interface, toward active, empowered interfaces able to transform machines from tools to intelligent, networked human helpers
CSI Communications | JUNE 2010
27
for non-critical tasks. And instead of a mouse and keyboard, input devices will move into our physical space, in 3D, making them far easier to use than today’s tools.10 The volume of Internet traffic in 2012 will be 100 times greater than it was in 2002 Drowning by data The Internet is producing unprecedented growth in the amount of data we are generating, capturing, replicating and storing. The volume of Internet traffic in 2012 will be 100 times greater than it was in 2002. In 2007, the amount of data generated already surpassed our capacity to store it. By 2010 digital data is already expected to double every few days. But in a typical organization today, only 25% of retained data is structured in a way that can be used to extract knowledge, and very few workers have the extraction skills necessary to do it. The ability of software to manage and extract intelligence from our evergrowing data sinks will become a major competitive advantage in the digital world of 2025 – and essential to save us from drowning in our own tsunami of undigested, undigestible data. And that’s not all on the technology front... The scope of scientific research, technological development and product innovation based on digital communications technologies is today virtually limitless. Here are just a few of the most important and promising for a 2025 scenario of mass collaboration. Load-adaptive control: The digital world of 2025 will contain unimaginable numbers of microchips, all consuming minute quantities of electric power and thus emitting heat and in many cases (indirectly), greenhouse gases. Already today data centers in the U.S. alone consume about 2 percent of the power supply, and that figure is expected to roughly double by 201111. But here again, technological help is on the way. Already super-computers can be water-cooled rather than aircooled, reducing CO2 emissions. New microchips are under development that will be able to conserve energy by rationing their own internal power consumption. This is called loadadaptive control, whereby a single microchip is able to turn itself on and off from microsecond to microsecond depending on the job it has to do, thereby reducing significantly its total electric power consumption.
Sensors will scavenge energy directly from the surrounding environment, with no need to be connected to an electric power source Wireless sensor networks: New microchips under development will be able to continuously sense different physical states and send this information to the IP network. Moreover, users will be able to more easily programme wireless sensor networks themselves, without having to depend on service providers. Performance features and applications now foreseen include: ¬¬ Sensors will scavenge energy directly from the surrounding environment, with no need to be connected to an electric power source ¬¬ Incorporation in medical products that patients use regularly, for example to measure irregularities in a heart rhythm, or enable a central monitoring and inference system to maintain a patient under permanent remote surveillance; ¬¬ DNA sequencing chips able to perform a complete individual human gene sequence in a matter of minutes; ¬¬ Measurement of atmospheric and pollution conditions in any local environment; ¬¬ L i m i t l e s s e x t e n s i o n a n d intensification of geo-positioning systems. DNA sequencing chips will be able to perform a complete individual human gene sequence in a matter of minutes
The Immersive Web: One vision of how we will interface with the Internet of Things is often called the “Immersive Web”. The foreseeable progress in the quality of optical sensors will lead to cameras that will have a resolution close to that of the human eye. This, together with developments in High Definition displays, will enhance our virtual experience in a world of lifelike two-way hyper broadband video. It will feel much more realistic than today’s small and less than smooth webcam video picture quality. The Semantic Web: Today, Internet search engines identify documents containing the words we put in them. But work is underway on software algorithms enabling machines to answer questions beginning “why”, “how” or “what”, to search for, share and combine information on the web in
ways that provide relevant information in context, and allow machines to talk to machines to perform these tasks. Tim Berners-Lee has called this “The Semantic Web“.12 A word of caution Let’s not forget that we are still in the infancy of the digital revolution. The Law of Accelerating Returns cautions us that over the next 100 years we will see as much technological progress as we have seen in the last 20,000 years. And even over the next 15 years – the horizon of this exercise – we will undoubtedly see the emergence of digital technologies and capabilities we have not yet imagined. But whatever the uncertainties there appears to be no going back. The Internet is becoming the key communications infrastructure of the world. In that sense then, the vision of a digital world in 2025 driven by mass collaboration is not really vulnerable to technological surprises. Whatever they turn out to be, they will be surprising only if they do not accelerate our headlong rush into that massively collaborative future. Toward the Digital Economy of 2025 Overview As we have seen, by 2025 we may expect to inhabit a world of digitally-enabled mass collaboration built on “fast, fat mobile pipes and smart networks”, connected by the Internet to limitless computing power and – most importantly – to billions of human beings and inanimate objects. To assert that, as a consequence, the “traditional economy” will by 2025 be radically transformed, superseded by a “global digital economy”, is already to repeat no more than conventional thinking. Indeed, it is self-evident that digital communications are already changing traditional models of production, supply and demand at every level of the value chain for ever increasing numbers of economic sectors and actors. To assert that, as a consequence, the “traditional economy” will by 2025 be radically transformed, superseded by a “global digital economy”, is already to repeat no more than conventional thinking. Indeed, it is self-evident that digital communications are alreadychanging traditional models of production, supply and demand at every level of the value chain for ever increasing numbers of economic sectors and actors. In the digital economy of 2025, who will be prepared to pay for what? Looked at from the other end of the value chain, who will be prepared to invest in what? Who will be offering
CSI Communications | JUNE 2010
28
d for the short or long term and be geographically dispersed. It is, in a conventional ry sense, invertebrate.
20
to get your web-based systems up and running. A VE can operate without creating a new legal entity. It can be created for the short or long term and be geographically dispersed. It is, in a conventional statutory sense, invertebrate. New models may be needed to maintain Europe’s levels of social security in the digital world of 2025 Bye-bye Bismarck? An industrial fabric woven by the global collaboration of countless web-enabled, if not virtual, enterprises – many internally spread across the globe – bears little resemblance to the 19th century industrial bedrock upon which Otto von hal security systems13. New collaborative m odels and structures may well need to evolve over the next 15 years to maintain Europe’s levels of social security in the digital world of 2025. what value added, and through what structures? What will be the role of government? Contributions to this EIF project do not and cannot provide perfect vision on these questions. But they do help focus on certain themes and trends which look likely to shape the digital economy of 2025. Below we summarize those examined during this project. Smart systems, smart – sustainable – growth In the digital economy of 2025, digital intelligence will be embedded not just in individual things, but across entire systems, and systems of systems, notably those constituting the core infrastructures that enable our societies to function. Smart infrastructure – including transport, energy and other utilities, environmental management and public services – will therefore become not just a source itself of new growth and employment, but also the necessary foundation for economy-wide “smart growth” and competitiveness. This prospect is not without its own sustainability challenges. A smart world of smart growth could lead to exponential consumption of electrical power by digital devices running far richer software, as well as exponential hardware waste. Smart solutions for both these potential environmental constraints will also need to have become features of the digital economy of 2025. The web-enabled enterprise In a scenario where “the real economy” of remunerated goods and services produced by business remains the central value-creating mechanism of the global 2025 economy, much digitally-enabled collaborative transformation will be
internal within enterprises. The successful enterprises of 2025 will be those that exploit rather than resist digitallyenabled external market forces acting from both the demand and supply sides, and internal demand for enhanced operational and social ways of working. This may be thought of as the “web-enabled enterprise” The successful enterprises of 2025 will exploit rather than resist digitallyenabled external market forces The successful web-enabled enterprise of 2025 will also be a participant in collaborative global networks with other enterprises, all seeking to benefit from the experience and capabilities of each other. Many will also be internally “unbundled” – with functions such as central management, R&D, product design and development, and production spread around the world to exploit specific local conditions. The virtual enterprise From the web-enabled enterprise it could be a short jump in some sectors to “the virtual enterprise” which no longer exists in the conventional sense but uses the Internet to operate its business. A VE could be set up by a single individual or it might be an ad hoc partnership between businesses or individuals to exploit a market opportunity. In a scenario where Internet enabled and empowered individuals will be able to easily group, regroup, associate with one another, and break those associations, social networking skills and tools may come to prove decisive for success. We have no established policy frameworks for a world of VEs. The speed at which VEs could be formed or dissolved is in principle only limited by the time it takes
A generation of school teachers with self-taught e-skills will not prove adequate to prepare youngsters for the digital economy of 2025 Skills and education There is a clear and obvious need for ensuring that current and future generations will be Internet-literate in a world where the Internet has become the dominant economic and social platform. A child entering school this year (2009) will 16:38 enter the workforce 17/09/2009 in about 2025. A generation of school teachers with self-taught e-skills, often also ill-equipped, will not prove adequate to prepare youngsters for the digital economy of 2025. The key to success, now clearly demonstrated wherever adopted around the world, is to redesign education itself around participative, digitally-enabled collaboration within and beyond the individual educational institution. By 2025 this will have become the dominant worldwide educational paradigm underlying the economic strength of every successfully society. The development of globally-competitive professional IT skills throughout the productive economy will prove decisive But while this educational revolution will prove necessary to prosper in the digital economy of 2025, it will not in itself prove sufficient. Beyond widespread Internet literacy, the development of globallycompetitive professional IT skills throughout the productive economy will prove decisive. This will be particularly crucial for Europe in the service sector, which already represents close to 70% of our economy (broadly defined). But even beyond technical skills, the digital economy of 2025 will demand a flexible workforce, with a mindset of continual change and the capacity to change
CSI Communications | JUNE 2010
29
and adapt in response to the complexity of the global economy. 70% of Europe’s workforce of 2025 is already part of our workforce today. This capacity for change is itself a personal skill which can and must be developed and nurtured at all levels of education and professional life. Regulatory rules for the digital road A 2025 paradigm of mass collaboration enabled by digital networks and services, converged through the Internet, presupposes a stable and predictable policy environment for the “telecommunications” sector which creates attractive conditions for the billions of Euros of necessary private investment in both. Today we speak of the need for investments of hundreds of millions of Euros in Europe’s “next-generation networks”. By 2025 we will be speaking of the “next-next-generation” The future character and enforcement of intellectual property rights will remain one of the central public policy issues The future character and enforcement of intellectual property rights will thus certainly remain one of the central public policy issues, if not the central economic policy issue, for IPR-dependent industries in any 2025 scenario, with intense debate over statutory IPRs and enforcement frameworks in Europe and elsewhere. Given current thinking and trends, it is reasonable to speculate that by 2025 the IPR environment will include new digital tools – including new collaborative tools – for more effective and efficient creation, management and enforcement of IPRs, as well as greater use of business models based on the voluntary offer by rights holders of licensing terms and conditions tailored to appeal to particular markets. From social networking to economic mainstream Much of the digitally-driven economic transformation we have already seen boils down to the facilitation, extension and disintermediation of existing business processes and models. This trend will certainly continue to expand and accelerate. But it is no longer the only digitally-rooted transformational force acting on economic life. The migration of social networking models and tools (Web 2.0)14 into economic life is also gathering momentum. In a number of areas this has already gone beyond early trial and error to demonstrate the power of personalized, people-centric, communitybased economic collaboration.15 This trend is arguably ripe with transformational economic power because it harnesses to economic processes and business
structures the most deep-seated human motives and emotions at almost any scale of collaboration, as well as cultural and other societal values specific to any particular community of economic interest. Time alone will tell how deeply such socially-rooted collaborative digital paradigms will penetrate and contribute to the transformation of economic life. But we can already glimpse its potential today. Community-based consumer empowerment A new balance of power is already evident in certain markets where consumers increasingly exploit the power of mass collaboration. The further adaptation and spread of socialnetworking tools and models looks certain to accelerate this trend. We are not talking here just about far greater market transparency, such as the ability to compare prices or the ability to bypass traditional retail channels, although that has already become an important Internetbased enhancer of individual consumer power in many product and service markets. It is also the collective power of a given community of shared consumer interests which may increasingly drive supply side strategy from the earliest stages of product conception through to final purchase and after-sales life. Unsurprisingly, this trend is most apparent and advanced today in digital product markets. In these sectors, consumers have themselves already become generators, in some cases coproducers, co-creating the world’s largest free encyclopedia, writing non-commercial software and widely sharing and building on shared digital content. The degree to which such consumer-generated or coproduced content will by 2025 compete with the products and services of traditional media industries (music, movies, books and other print media) is unclear. Concerns over quality and reliability could well draw some consumers back to more traditional, professionally produced and paid-for intellectual products offered on-line, and perhaps combining the two models16. (What is clear however is that consumer generated on-line content based on or incorporating the unauthorized use of copyrightprotected work is a growing concern for copyright owners.) Consumer collaboration is already making the market for consumer products competitive as never before Beyond media sectors, consumer collaboration is already making the market for consumer products competitive as never before. Before booking a hotel you can
look at customer reviews. If you see a new product advertised, you only have to type the make and model number in a search engine to instantly find out whether it has frequent hiccups or is a good buy. And if you are in doubt whether to go to a movie based on the trailer from the publisher, you can find websites reporting the opinions of thousands of people who have been rating the film. There is every reason to believe that this phenomenon is only in its infancy, if only because consumer habits and behaviour patterns do not evolve as rapidly as the networking tools and services available to them. But as the next generations of digital natives mature, this dynamic, changing balance of power between consumers and producers looks certain to become a defining force in the digital economy of 2025. Empowered consumers and market transparency may not, however, mean the end of market and social segmentation, to be replaced by one global, level playing field for every participant in the new Internet economy – in short, a world where everyone is connected and therefore “equal”. Indeed, the socialization of the Internet could well have an opposite effect, reinforcing individual identity within existing social groups and communities, and raising the barriers to full “membership” and participation in them. In this scenario, markets become much more sharply segmented and consumer power much more tightly focused. People are willing to make an encyclopedia for free or develop software purely because they enjoy the process and seeing their knowledge and creativity recognized by peers Social production At an even more informal level, we see a steady increase in what can be called the “social production” of economic goods. We see that people are willing to make an encyclopedia for free or develop software purely because they enjoy the process and seeing their knowledge and creativity recognized by peers. Many successful “Web 2.0” projects have resulted from people creating Internet tools to solve problems they encountered themselves, such as keeping track of all the blogs on the Internet or sharing video and photos online. We have seen that such tools, products or services clearly represent an economic force and economic value, whether monetized or not. To value social production as an economic component is not easy. There are several obstacles to overcome. In economics one normally ought to wait a number of years to gather historical data. In the case of social production however we are still
CSI Communications | JUNE 2010
30
unfamiliar with how to create the metrics for measuring and valuing social production, particularly when there is no pricing signal. One way to further our insights in this matter may be to base such metrics on social production patterns or user-centric innovation processes and measures of utility. It may also be argued that estimates of value-destruction in sectors vulnerable to un-remunerated social production should be deducted from estimates of added-value. It is likewise unclear whether collaborative social production will improve or dilute the quality of output, depending on the level of professionalism. “Markets are conversations” has become a widely-repeated mantra Monetizing models: all advertising, all the time? “Markets are conversations” has become a widely-repeated Web 2.0 mantra to describe how sellers now have the possibility to converse directly with their own customers, and to target consumers with offerings through context-sensitive advertising on established third-party Internet platforms. Free search engines, social websites and consumer review/ feedback sites as well as most news sites are today monetized through paid advertising and links, not through payment for access. At the same time, the increasing power of digital tools and systems to collect and process vast amounts of data raises important questions of principle and practice concerning the use of personal information. On the one hand, it is personal. On the other, it can be valuable for targeting or personalizing advertising – often with benefits for consumers. It is reasonable to expect that by 2025 this advertising-based business model will have become an integral, widely-understood and accepted form of collaboration between webbased commercial or social platforms and consumers, operating with much more precise targeting tools and within clear rules (legislated or market-imposed). In this scenario, the advertising model looks likely to remain a primary Internet monetization model, thereby also continuing to multiply channels for SMEs to enter the market through affordable, targeted, user-friendly advertising. That said, some market participants doubt that there will be sufficient demand for advertising to fully sustain all social and commercial on-line media by 2025. There is some evidence already that social networks could become so intrinsic to the fabric of society, ”like air”, that their users will become oblivious at best, hostile at worst to the presence of advertising. Other market participants point out that the advertising
model itself is not necessarily adapted to all business models and products – notably in the cultural sector If Internet consumers used to “free” remain unwilling to pay, but become less susceptible to advertising, while some producers cannot apply the advertising model anyway, then indeed who will be prepared to pay for what? If the answer turns out to be that nobody will pay for anything, the digital world of 2025 will be a far different economic beast that anything we have imagined in this report. By 2025 people should be in a position to control how their own personal information is made available and used for commercial (or other) purposes Identity and privacy As noted above, the ability of commercial interests to better target consumers on-line on the basis of observed or reported interests and previous purchases has understandably sparked intense and growing debate about the on-line acquisition and use of personal information. Already companies often offer free access to specific services in exchange for more details about ourselves. Some say that willingly parting with personal information will become an established way we knowingly help advertising revenue compensate for free Internet services, notably free access to online media. Current trends seem to converge on one important conclusion: through the combined interaction of law, technology and Internet literacy, by 2025 people should be in a position to control how their own personal information is made available and used for commercial (or other) purposes. Whether we chose to make use of this ability is another question. Already today we can delete the “cookies” on our PCs as frequently as we wish or filter the information they gather, thereby controlling their ability to track our web history. How many of us know? How many of us do? Harnessing the “meta-data” “Web 2.0” has taught us that we all can be creators of on-line content, and that, beyond any value we create individually there is enormous potential for new understanding of markets and society from capturing and analyzing the “meta-data” we are collectively generating. Add to that the ability to capture and analyze data generated by an infinity of “things” connected to the Internet, and we can imagine a powerful new source of competitive advantage and governmental performance. The conceptual economy New ways of thinking about and describing the digital world and its economy
in 2025 continue to percolate. One is the “conceptual economy”, in which value will be in the meaning of products, not just their function, with meaning created by creative, educated people everywhere, empowered and sharing their creativity through web-based platforms supporting “open innovation”. In this understanding, creative talent itself becomes a new currency and asset in working life, influencing the choice of jobs and employers. Social & Political features of the Digital World in 2025 Overview As we have seen, by 2025 we may expect to inhabit a world where mass collaboration may have become the pervasive economic paradigm, powered by limitless networked computing power. But what about society itself? What will be the effects of these technological capabilities on our social interactions and governance in a hyper-networked world? It is useful at the outset to observe just how much has already changed in the last 10 years. Who would have thought ten years ago that today the biggest and most trusted tv station in the world would be a website, that you can win the American elections by building on-line communities, or that legislators would be twittering to engaged constituents from inside the halls of parliaments? Equally, there is a surge in online social behaviour, as we increasingly create, maintain and facilitate relationships via greatly expanded social networks, and use them to organize not just our own social activity, but social and political movements, organizations and events. New digital tools will have been developed by 2025 to further broaden and deepen these trends (high resolution twoway video capability looks to be one). This prospect poses fundamental questions: In the digital society of 2025, what will be the role of government and public service? • How will we deal with issues like security, privacy and identity? • How will we inform ourselves and make judgments? • How equalitarian and how virtual will society become? Digital democracy 2025 The digital tools of mass collaboration have already begun to blur the line between established forms of representative democracy and more direct democracy in which mobilized citizens are able to permanently engage in and often decisively influence policy priorities and legislative outcomes. Most legislative bodies have yet to welcome this phenomenon, let alone re-
CSI Communications | JUNE 2010
31
engineer themselves in order to facilitate and manage it on the basis of a clearly defined set of principles able to ensure that fundamental democratic values are preserved. By 2025, all will have had to. Government will itself need to innovate and empower within its own structures to play its role Digital government 2025: all for one, one for all By 2025 the governed will typically be at least as well-informed as governments, producing a transition from government as an institution to government as a platform where stakeholders – people – can actively participate, collaborate and add value. Rather than simply a decision-making body at the top of a pyramid, (democratic) government will also function as a coordinating and mediating platform at the centre of connected expert and stakeholder communities. In this scenario government will itself need to innovate and empower within its own structures to play its role, and thus will also need to attract and develop the talent necessary to deliver value in the new collaborative paradigm Democratic societies will need to balance the responsibility of the state to protect its citizens with individual privacy rights and freedom of Internet access Net Patrol By 2025 not just the model but the responsibilities of government will likewise have morphed to reflect the reality that the Internet has become the central nervous system of our economies and societies. Most notably, governments will have become at least as concerned with the cyber-security and safety of citizens and nations as they are with safety from physical harm or attack. Meeting this responsibility will require new concepts, new tools, new talent, and new frameworks for cooperation across society, because cyberspace is fundamentally different from physical space in two crucial ways: there are no frontiers, which means that threats can originate from any geographic location; identity is difficult to track – online you can be anonymous or use a fake identity. This means quite simply that security has to be addressed globally. It will not be sufficient to pursue these efforts in Europe alone.’ At the individual level, we already know that we should try to protect our PCs and other devices with software to protect them from criminal agents who want to capture credit card data, or turn our devices into distance-controlled robots for sending out spam without our knowledge. But personal security is only the beginning of what cyber-
societies will need to balance the responsibility of the state individual privacy rights and freedom of Internet access. Inde becoming primary feature between open, dem security will be all a about by 2025. differentiating National security vs. individual freedoms By 2025 our societies will be far more In a 2025 national security states which attempt to control the Internet not to protect their c dependent on smart digital systems in our environment of greatly expanded cyber-risk, core infrastructures than we are today. will need towill balance selves from their citizens. The democratic world’s societies democracies find it inc These systems will inevitably become the responsibility of the state to protect the need forcyber-attack, policies astowell shape future and economic rela targets of sustained as its citizens political with individual privacy rights possible physical attack, ranging from data theft or tampering, to hostile takeover of systems control, to the physical destruction of satellites or network infrastructure – all for the purpose of disrupting society. Indeed, the very nature of warfare – and the enemy – will shift, as states race to develop a fighting capacity in this space and to define rules of engagement. Nor will such cyber warfare strategies and capabilities be restricted to nations and their governments. Criminal and ideological movements are already active. Governments could find themselves at a disadvantage for retaining the technical talent and skills necessary to prevail, and will need to find unconventional ways to make use of them. Governments are already calling for a move from passive defense on the edge of vulnerable systems to active defense, including active surveillance. This said, cyber-security in 2025 will not be found only in technical solutions administered by public authorities. Government will need to create the platforms and tools for collaborative efforts with individuals, businesses and other non-governmental organizations to reduce vulnerabilities throughout society. And because cyber-attacks are both unforeseeable and unpredictable, crisis management systems need to be put in place, again involving a broad range of societal actors.
and freedom of Internet access. Indeed, this balance looks like becoming a primary differentiating feature between open, democratic societies and those states which attempt to control the Internet not to protect their citizens but to protect themselves from their citizens. The world’s democracies will find it increasingly difficult to ignore the need for policies to shape future political and economic relations with such states. Knock knock, who is it? Security and privacy in the digital world share one important feature: they both benefit from a climate of trust in the safety and reliability of the Internet. Key to the creation of this climate is trust in the identity of individuals, businesses, government and other organizations we encounter on-line. Today it is all too easy to set up a fake website for some malicious purpose that looks reliable, or is even a convincing copy of a trusted site, and fool a significant number of people into believing that it actually is what it appears to be. In the social networking sphere, it is likewise simple to disguise or misrepresent one’s true identity. These risks are difficult to counter, and continue to inhibit the growth of Internet use for legitimate purposes. But progress is at hand. By 2010, all European citizens, businesses and administrations will be able to benefit from a secure means of electronic identification (eID) that allows people online to enter secure zones where they can be sure that their privacy is respected and where they can make use of services without fear of attack
Knock knock, who is it? Security and privacy in the digital world share one important fea a climate of trust in the safety and reliability of the Internet. Key to is trust in the identity of individuals, businesses, government a encounter on-line.
Today it is all too easy to set up a fake website for some malicious or is even a convincing copy of a trusted site, and fool a signific believing that it actually is what it appears to be. In the social netw simple to disguise or misrepresent one’s true identity. These risks continue to inhibit the growth of Internet use for legitimate purp
But progress is at hand. By 2010, all European citizens, business be able to benefit from a secure means of electronic identificati online to enter secure zones where they can be sure that their privacy is respected By 2010, all and where they can make use of services businesses a without fear of attack by malicious software will be able or fraudsters. Well before 2025 we should all secure me be in possession of an electronic “European By 2010, all European citizens, identi Citizen .17 businesses Card” and administrations will be able to benefit from a secure means of electronic identification (eID)
CSI Communications | JUNE 2010
32
by malicious software or fraudsters. Well journalists of 2025 and vice versa, often not numbering and other technical aspects of before 2025 we should all be in possession working exclusively under the umbrella of a the Internet19. What world(s) do we want? of an electronic “European Citizen Card”.17 single newspaper, TV station or magazine. By Who do you trust? 2025 we may expect to have to think more The prospect that by 2025 ubiquitous The spread of digitally-enabled high-speed broadband access will become and to make choices. This has particular mass collaboration in the creation and relevance for politicians, who will need to commonplace has led some to predict that dissemination of “news” looks like another be active participants in this developing, we will be living in a much more unified and socially egalitarian world. Others suspect powerful lever for political The and Digital societal World no-holds-barred in 2025 marketplace of ideas. European Internet change by 2025. The new way of finding This said, the “old” electronic media, that the online world will be largely a Indicators for European Action Foundation news and processing it is to look at sources reflection and intensification of real world notably television and radio, reach mass not under intermediate editorial control. audiences with the same information and networks and communities, including social Major unedited “news” / video sites content, arguably creating an “informational and cultural distinctions. often provide many different unedited commons” and thus arguably fostering Another open question is the degree of virtualization that people will want in their perspectives without anybody editing what informed, participative citizenship. we see, leaving it up to us individually to lives. Humanity will presumably not escape Individually customized access to and use apply our own thinking and judgment about of information and communications could our Maslovian pyramid of physical and the sources we trust. Multiple bloggers undermine this societal function and effect. metaphysical needs20. Services like Second What world(s) we want? addressing the same do subject create the Serious political debate has yet to begin Life may have inspired the imagination of possible in commoncreating virtual worlds, same potentialthat to harvest information on thehigh-speed future relevancebroadband of communication The new prospect by 2025 ubiquitous accesswhat willisbecome from a range of sources in the marketplace that serves basic public interest objectives but very soon after its launch it became place has led some to predict that we will be living in a much more unified and socially apparent that what people create in Second of ideas, and to distill meta meaning from – and more specifically on the future place egalitarian world. Others suspect that the online world be largelyLife,a reflection and that. and character of public servicewill media in the and the actions that intenthey take, closely The spread of digitally-enabled Internet-based digital world of 2025. mimic real life. sification of real world networks and communities, including social and cultural distinctions. Arguably the most important question mass collaboration in the creation and One clear pressure point is the growing we have confronted in this exercise is also dissemination of “news” looks like another demand to accommodate languages powerful lever for political and is societal most difficultinto their answer:lives. over the next 15 Another open question the degree of virtualization that peoplethe will want other than English years, will the digital technologies and tools change by 2025. The new way of finding Humanity will presumably not escape Maslovian pyramid metaphysical Global our governance for a global Internet? of physical of mass and collaboration draw human society news and processing it is to look at sources 20 Meanwhile, global inter-governmental not under . intermediate editorial control.Life may closer will they rather needs Services like Second have inspired the imagination of together, what isor possible in fragment and multi-stakeholder debate on future Major unedited “news” / video sites our societies into myriad self-conscious, creating virtual worlds, but very soon after its launch it became that what people Internet governance and management looksapparent often provide many different unedited self-communicating, self-collaborating, selfcertain to intensify through the UN-based create in without Second Life, editing and the that they take, closely mimic real life. communities of special interest or perspectives anybody whatactions absorbed Internet Governance Forum18. One clear we see, leaving it up to us individually to specific identity, with unpredictable political, pressure point is the growing demand to apply our own thinking and judgment about economic and social consequences? Arguably thetrust. mostMultiple important we have confronted in this exercise is also the most accommodate languages other than English, the sources we bloggersquestion Conclusion: What Digital World Do We by many as a digital necessary condition for and tools of mass collaboaddressing theanswer: same subject the 15seen difficult to overcreate the next years, will the technologies Want? the continued existence by 2025 of a single same new potential to harvest information fundamental political question ration draw human society closer together, or will they rather fragment ourThe societies into myriad worldwide Internet. A second is the push for from a range of sources in the marketplace of Europe’s democratic societies and political more multilateral governmental oversight self-conscious, self-communicating, self-collaborating, self-absorbed communities of special ideas, and to distill meta meaning from that. leaders must confront today is, quite simply, of ICANN, the private, not-for-profit In this scenario, professional journalism interest or specific identity, with unpredictable political, economic and social consequences? what place do we want Europe to occupy in corporation responsible under mandate could be more alive than ever in 2025, the digital world of 2025, and what public from the U.S. government for managing the although the output may be published in policies do we need – starting today – to assignment of Internet domain names and different ways. More bloggers will be the make it happen? The foreseeable spread of digitallyenabled mass collaboration into most human activity takes this question way beyond digital technology and “ICT” sector policies themselves. Every policy area will have to address it – the sooner the better. On the next page we offer an indicative list – particularly for the attention of the incoming European Parliament and European Commission – of policy areas in which the trends identified in this report need to be further examined and acted on, and where action – or inaction – over the next five years will prove decisive for Europe’s economic and social well-being in the digital world of 2025, and beyond. References: 1
One of the world’s best examples of how the net-generation is using digital technologies to collaborate to transform the world around them is TakingITGlobal: http://www.tigweb.
CSI Communications | JUNE 2010
33
of 2025, and beyond.
32
12
2 3
4 5
6
7
8
org There is however a school of thought which holds that the digital world will be impossible to model. In doing so, we would do well to beware “macromyopia”, the well-proven tendency to overestimate the short-term impact and under-estimate the long-term impact of new technology. Global Trends 2025: A Transformed world, National Intelligence Council (US), 2008. A manycore processor, sometimes also called a multi-core processor, combines two or more independent processing cores into a single package composed of a single integrated circuit (IC). A dual-core processor contains two cores, and a quad-core processor contains four cores etc. For example, all digital television infrastructures including cable, satellite and terrestrial broadcast are moving rapidly from MPEG toward unified, all Internet-protocol transport. Wikipedia defines it as ‘a style of computing in which resources are provided “as a service“ over the Internet to users who need not have knowledge of, expertise in, or control over the technology infrastructure (“in the Cloud”) that supports them.’ The total capacity of the thousands of game stations networked in the Folding@Home
9
10
11
About ‘The Digital World in 2025’
grid project led by Stanford University is an order of magnitude larger than Road Runner at Los Alamos, the world’s largest computer. PEW Internet memo on Cloud Computing Applications and Services: Today, 69% of online Americans have used Cloud computing. 51% of these Internet users who have done a Cloud computing activity say a major reason they do this is that it is easy and convenient. 41% of Cloud users say they use online applications because they want to be able to access their data from any computer. 39% quote ease of sharing information as a major reason they use applications in cyberspace or store data there. For instance, user interfaces could be intelligent surfaces that will allow us to move information around with our hands without using mechanical input devices like a mouse. Gartner Group study on Green computing: Gartner predicted recently that nearly 50 percent of data centers worldwide would have trouble finding the electricity to power and cool their computing equipment. And the EPA states that over the next five years, power failures and limited availability will stop operations at more than 90 percent of data centers.
http://www.w3.org/2001/sw/ : Berners-Lee is a co-creator of the world wide web. 13 Bismarck’s program “included Health Insurance; Accident Insurance (Workman’s Compensation); Disability Insurance; and an Old-age Retirement Pension, none of which were then currently in existence to any great degree.” http://en.wikipedia.org/ wiki/Otto_von_Bismarck 14 Wikipedia defines “Web 2.0” as the second generation of web development and web design that facilitates information sharing and collaboration on the World Wide Web. The advent of Web 2.0 led to the development and evolution of web-based communities, hosted services, and web applications. Examples include socialnetworking sites, video-sharing sites, wikis, blogs, etc. Web 2.0 does not refer to an update to any technical specifications, but rather to cumulative changes in the ways software developers and end-users use the Web. 15 For example: http://corporate-marketingbranding.suite101.com/article.cfm/ branding_with_social_media 16 See for example http://www.wired.com/ epicenter/2008/06/ency/ 17 eID will offer a secure zone where providers guarantee that only services based in cooperating jurisdictions are available. It will allow for the restriction of e-mail or downloads from non-trusted servers to non-active content if the user decides this, or even fall back to text only e-mail. In such secure zones, which users may choose to enter or not, they will benefit from the rich possibilities of Web 2.0 without risking exposure. (This electronic ID is not the same as a travel document like a passport, which is used only for physical control of identify.) Currently the EU is funding projects to test eID such as “SaferChat”, “eID electronic delivery” and “eID change of address” mechanisms that will allow for easier authentication and verification of transactions. 18 http://www.intgovforum.org/cms 19 http://en.wikipedia.org/wiki/ICANN; http:// www.icann.org 20 http://en.wikipedia.org/wiki/Maslow’s_ hierarchy_of_needs 17/09/2009 16:38
The European Internet Foundation launched the project “The Digital World in 2025” with a major conference in Brussels on November 13th 2008. This was followed by a full programme of events over the first four months of 2009 (see back cover), during which key themes and issues were further developed and debated. This report evolved in parallel to this programme, through successive drafts. Along the way, EIF members were invited to make suggestions on the evolving text directly to the editors, and many did. EIF members met again on May the 6th in Strasbourg to review the first full draft, and members were invited to make final comments during two final rounds thereafter. This report intends to be a faithful reflection and synopsis of this rich input from EIF members and guests. Its contents are the entire responsibility of its editors, and do not necessarily reflect the views of any individual EIF member. CSI Communications | JUNE 2010
34
ARTICLE
Bridging the Digital Divide and a Comprehensible Model to Develop Handy E-government in Developing Countries L. Pradhan1, B B Mohapatra1, A K Panda2 and S Dehuri3 1 Department of Business Management, Fakir Mohan University, Vyasa Vihar, Balasore-756019, Orissa, India. Email: satchi_d@yahoo.co.in 2 Abhaya Kumar Panda, Vice-Principal, Fakir Mohan (Auto.) College, Balasore-756001, INDIA. E-mail: abhyapanda2007@rediffmail.com 3 Department of Information and Communication Technology, Fakir Mohan University, Vyasa Vihar, Balasore-756019, Orissa, India. Email:satchi.lapa@gmail.com
The objective of this paper is two folds. First, we advocate of bridging the digital divide between rich and poor with low cost Information and Communication Technology infrastructures, which can fuel to develop a fully functional E-government. In the sequel, the communication between the government and its citizen via computers and world-wide web (3W) can make the life simple. Further, with a greater emphasis on addressing the factors that have influence in digital divide, we analyze some of the additional bottlenecks for digital divide in developing countries. Despites the numerous efforts at different levels of government, academic and practitioners still E-government is chaotic and unmanageable. E-government presents a number of challenges for public administrators. To help public administrators think about e-government and their organizations, the second fold describes a model of four stages for fully functional e-government. The stages outline the multi-perspective transformation within government structures and functions as they make transitions to e-government through each stage. Technological and organizational challenges for each stage accompany these descriptions. At the same time, how the e-government becomes amalgamated with traditional public administrative structure is another hot item of this paper. 1. Introduction There is a general consensus in the International Development Community about the need to lessen the strikingly differential extent to which rich and poor countries are enjoying the benefits of Information and Communication Technology (ICT), a differential that is often referred to as the digital divide [1]. There is also considerable support for the view that if the digital divide is to e diminished to any significant degree, the countervailing policy package will need to incorporate low cost versions of IT, rather than products designed for the higher average incomes prevailing in the developed countries. World over, the view is that large scale national level planning is needed to bridge digital divide and also to reap digital dividend. In the developing countries like India, government has been propelling towards information age and convergence by announcing enabling policies
toward development and progress with an ultimate goal of â&#x20AC;&#x153;Internet for Allâ&#x20AC;?[2, 3]. The Internet is one of the hot components of ICT becomes more important because it can help to bridge the gap of digital divide (e.g., Internet is not only used for communication but also a market place). However, implementation of some of the policies have been plagued with various operational, procedural, regulatory issues and supporting legal framework, which is inhibiting the reach and benefit of the Internet to masses in the nation. Further the fruits of IT sector yielded results only to the most developed and computerized economies. On the other hand, the Internet, on-line trading, etc. failed to cure century old malaises, viz. illiteracy, poverty, and unemployment in developing countries. In developing countries the digital divide is not only restricted to undeveloped district/state with traditionally weak
CSI Communications | JUNE 2010
35
infrastructure but also developed district/state. Hence, with some basic facts about digital divide based on global perspective, its definition and types, societal implications including reasons in developing countries, in first fold we will discuss the efforts of developing countries for bridging the digital divide through governmental policies and implementation of several projects. Technology allows government to service citizens in a more timely, effective, and cost efficient way [4]. E-government implementation may meet initial citizen resistance, require development expenses, and present certain implementation issues. Domestic and International impacts of e-government implementation are also substantial. Government departments and protocols are commonly held to be inefficient because they have little motivation to please the citizen, and the citizen does not have an alternative provider available to him for these services. The increase in technology and communication has changed some of these attitudes on a few sector of the government. As the scope of government responsibilities increases, so does its costs’, increasing the tax burden on the citizen. In an environment that requires employees to provide solution/results seven days a week, twenty four hours a day, citizens want a government that provides services and information to them on the same basis. Previously, the government could make itself available to citizens during the traditional fourty-two hours workweek, but this is no longer acceptable. Citizens must be at work and do not want to take time away from their jobs to wait in long inefficient queues to obtain government services. In order to cost effectively deliver the increasing number of services the government is required to provide, services must be increased while costs must be reduced. One of the greatest opportunities to accomplish this is by increasing the efficiency of the delivery of these services to the citizens. Viewing all these governments are going on-line and using the Internet to provide services to its citizens. There is not any universally accepted definition of the e-government [5]. In order to cover the variety of uses and the nuances sufficiently, several definitions are presented in [6,7,8]. However, almost acceptable definitions contributed by us is given below: “E-government is defined as utilizing the low cost infrastructure of ICT including Internet for delivering government information and services to citizens in a more timely, effective and cost efficient way.” While there are many emerging programs and initiatives on e-government throughout the world in all levels of government, it is our contention that it will require implementation over another decades, as infrastructure must be built, policy issues must be resolved, and interoperability established. In the last fold, this article will describes different stages of
e-government development to help public administrators of traditional administrative organizations think about e-government and their organizations. The stages of development outline the structural transformations of governments as they progress toward electronically-enabled government and how the Internet based government models become amalgamated with traditional public administration, implying fundamental changes in the form of government [9]. Finally, we will see how the underlying theory (i.e., theory of the growth model) can be helpful for the government of the developing countries. 2. Digital Divide: Definitions, Reasons and Social Implications The digital divide is a dynamic concept, which evolves over time. Older technologies tend to be more evenly diffused than newer ones. For example, TV sets are more evenly distributed than 3G mobile phones. There is not a single divide, but multiple divides: for instance, within countries, between men and women, between the young and the elderly, different regions etc. The main factor underlying these divides is differences in wealth, between countries and between individuals. While disparities in wealth continue to exist, the digital divide will persist. Due to the range of criteria which can be used to assess the imbalance, and the lack of detailed data on some aspects of technology usage, the exact nature of the digital divide is both contextual and debatable. Criteria often used to distinguish between the ‘haves’ and the ‘have nots’ of the digital divide tend to focus on access to hardware, access to the Internet, and details relating to both categories. Figures 1 and 2 illustrates the digital divide in two major ICTsInternet users and mobile users- and trends over the decade from 1997 to 2007. The clearest evidence of narrowing of the digital divide is to be found in mobile phone subscribers. 2.1 Facts and Definitions The digital divide is a term used to refer to
the gap between people who have access to the Internet and those that do not. It can also refer to the skills people have-the divide between peoples who are at ease using technology to access and analyze information and those who are not. The Internet users account for only 6% of worlds population and out of that 85% of them are in developed countries where 90% of all Internet hosts are located. This is the essence of global digital divide that needs to be transformed into global digital opportunity. For the Internet to be a true mass medium, it will have to achieve harmony among all consumer segments. There are different dimensions to digital divide such as economic level of individuals, economic prosperity of a nations, ethnicity, age (young/old), rural/urban, gender, geographic location, quantitative and qualitative aspects, dial-up and broadband access. The following are selected definitions for digital divide [1]: The well-documented distance between the information rich and the information poor. The gap between the technology haves and have-nots. The gap that exists between those who have and those who do not have access to technology (telephones, computers, Internet access) and related services. The gap in opportunities experienced by those with limited accessibility to technology, especially the Internet. This includes accessibility limitations in social issues, cultural issues, disability issues, economic issues, learning issues, etc. From the above definitions, world can be divided into people who have and who do not have access to or potential to use modern artifacts, such as telephone, television, mobile or the Internet; digital divide exists between those in cities and rural areas, educated and uneducated, economically well off and deprived
Internet users per 100 inhabitants 1997-2007 (Source: ITU)
Fig. 1 : Graphs of Internet Users/100 Inhabitants (International Telecommunication Union)
CSI Communications | JUNE 2010
36
Mobile Phone subscribers per 100 inhabitants 1997-2007
Fig. 2 : Graphs of Mobile Phone Subscribers/100 Inhabitants (International Telecommunication Union)
classes; developed, developing and least developed countries. The other observations that further help in explaining digital divide are: differences based on race, gender, geography, economic status and physical ability; in access to information, the Internet and other information technologies; in skills, knowledge and ability to use information and other technologies. Further, the stress is on access, knowledge and content. Thus any endeavor to reduce digital divide should take care of these three aspects together. Further, digital divide can be classified as: Global digital divide: This is the first divide where-in the Internet users account for only 6% of world population and 85% of them are in the developed countries where 90% of the Internet hosts are located; Regional digital divide: Within Asia, 50% of South Korea is expected to be online by 2004, while Indonesia will be a mere 1%. India will be in between these two; and National digital divide: Within India, states such as Maharashtra, Karnataka, Tamil Nadu and Andhra Pradesh are more digital than Bihar and Uttar Pradesh and population proportion wise also the disparity is much wider. Also, within a state, there is an urban–rural digital divide; within urban, there is educated– uneducated digital divide; amongst educated there is rich–poor digital divide. 2.2 Reasons and Social Implications Viewing a developing country like India; it has a population of over one billion, 70% living in villages. The adult literacy rate is about 58.8% and female literacy rate is about 47.3% as on 2002[7]. There are 18 languages officially recognized, each having a different character set. Around 50 million people speak English. Despite
a strong and fast growing IT industry, access to Information and Communication Technologies (ICTs) remains very low, particularly in rural areas. For any revolution to take place, there are certain prerequisites needed. The digital revolution too requires an enabling environment that India has not put in place as yet. The main bottleneck is infrastructure. Access to technology is constrained by infrastructure parameters like electricity, IT penetration, teledensity and Internet industry. 2.2.1 Electricity The per capita electricity consumption in India remains around 363 kW, far below 4959 kW in Hong Kong (one of the regions technology powerhouses), 5421 kW in Britain and 11,822 kW in the USA (i.e., shown in Fig. 3). 2.2.2. IT penetration The present indicators of IT penetration in Indian society are far from satisfactory. The personal computer (PC) penetration is 0.58% (Asia is at 3.24% and world average is at 7.96%) [8]. The installed base of computers is 7 million and a new computer still cost more than Indian Rupees (INR) 20,000 plus basic additional software (MS Windows, MS Office and anti-virus)
costing an additional INR 20,000. 2.2.3. Teledensity Despite ongoing deregulation of India’s telecommunications sector, its national teledensity is one of the lowest in the world, improving slowly from 0.06% (1990), 2.86 (2000), 3.58 (2001) and 5 (2003). The rural and urban teledensities were 0.93 and 10.16 (2001) and 1.49 and 15.16 (2003), respectively. India’s new telecom policy of 1999 seeks to increase telephone penetration to 7% (75 million telephone connections) by 2005 and to 15% (175 million connections) by 2010. It encourages development of telecoms in rural areas to increase teledensity from the current level of 1.49% (2003) to 4% by 2010. According to Morgan Stanley, over the next 5 years 55% of country’s Internet subscriber additions will be from global system for mobile communications segment, 29% from code division multiple access based wireless in local loop (WLL) services (WLL-CDMA) and 16% from wireline segment. By 2007, India will have 19 million WLL subscribers, 47.5 million global system for mobile communications (GSM) subscribers and 51.1 million wireline subscribers . 2.2.4. Internet Industry The Internet arrived in India during 1995 for public use through Videsh Sanchar Nigam Limited (VSNL), the then country’s international telecom carrier. The current Internet subscriber base is only 0.4%, in sharp contrast to Asian countries as South Korea with 58, Malaysia with 11 and China with 2%. The number of Internet service provider (ISP) licenses issued currently are 587, in that operational ones are 193; cities/ towns covered are around 360 and cyber cafes/kiosks established are about 12,200. The Internet subscriber base grew very slowly from 0.01 million subscribers (1995) to 0.14 million (1998). The end of VSNL monopoly in 1999 led to phenomenal surge in subscriber base growth from 0.28 million (1999) to 3 million (2001). However, from April 2001 onwards, growth rate started declining on all over India and reached 3.23 million (against a projected target of 4.5 million) in
CSI Communications | JUNE 2010
37
Developmental Stages of E-government Based on technical, organizational and managerial feasibilities, this fold can perceive that e-government is an evolutionary phenomenon and therefore e-government initiatives should be accordingly derived and implemented. In this regard, four stages of a growth model for e-government: (1) cataloguing, (2) transaction, (3) vertical integration, and (4) horizontal integration can be adopted in developing countries like India. These four stages are explained in terms of complexity involved and different levels of integration as shown in Figure 4. The discussions and examples here are based on a developed country model with its multi-layering of governments, however it ca be easily adopted in developing country like India. The discussion initiates from state government because it is the one in the middle of this structure, but the model is also applicable to local level such as district/ block/Gram-Panchayat. Stage I: Functionalities and Challenges In stage one of cataloguing, initial efforts of state governments are focused on establishing an on-line presence for the government. Many state governments’ efforts on web development and formson-line initiatives belong to this stage. Examples of functionalities at this stage are mostly limited to on-line presentations of government information. Sometimes, this information is very limited. Toward the end of this stage, mostly pushed by citizens’ demands, governments begin to establish index pages or a localized portal site in Technological and Organisational Complexity Complex
3.
Simple
2002 and 3.5 million in 2003. The declining was due to low PC penetration, high Internet access costs and steep PC prices, besides poor connectivity. The Indian Government has been propelling towards ‘‘information age’’ and ‘‘convergence’’ by announcing enabling policies toward development and progress with an ultimate goal of ‘‘Internet for All’’. However, implementation of some of these policies have been beset with various operational, procedural, regulatory issues and supporting legal framework, which is inhibiting the reach and benefit of the Internet to masses in the country [10]. The digital divide has severe implications on the society, if not addressed properly. The factors that have influence in addressing digital divide include: Computer literacy: Those who can operate computers stand a better chance than those who cannot, though literate and otherwise competent, to get even a secretarial job let alone an administrative one. Use of electronic data interchange (EDI): An export company from a country that cannot use e-commerce over the Internet, may lose a large export order to another company from a different country that has collected more information through the Internet and submitted quotations through EDI. Singapore has announced that it will not trade with any company that cannot transact with it in paperless EDI mode over a computer network. If many other countries follow the suite, it results in a Global digital divide. As a consequence, exports may grind to a halt for a country just because its companies cannot transact in EDI over a network. Tech savvy operations: Those who know how to operate automated teller machine (ATM) can draw money faster and those who cannot operate need to spend more time at manual single window. Use of information: The cruelest blow is inflicted because of urban–rural divide. It may be exploited by the unscrupulous because of information that urbanite may be privy to while others may not. Working knowledge of English: Internet hosts more than 80% of the Web pages in English though only 54% of the Internet users are amongst English-speaking people. In India and other developing countries, the disparity is much wider, resulting in a language divide. Even within advanced countries, concerns are there about divides along racial and gender lines. In fact, digital divide is an amplifier of economic and social divides that exists universally. The only saving grace is in converting digital divide into digital dividend to mitigate the prevailing economic and social disparities.
which scattered electronic documents are organized so that citizens can search for and view detailed government related information and download necessary forms. This first stage is called ‘cataloguing,’ because efforts are focused on cataloguing government information and presenting it on the web. Though the technology at this stage is relatively simple, there are several challenges on managing these sites. Different departments require different amounts of on-line presence and demand resources allocated to them. Resource allocation in a political organization is always a problematic issue. Another important issue is the maintenance of the information. Along with procedural and policy changes, web pages need to be maintained and some data presented on government websites may be temporal. Date and time stamping may be essential at this stage, along with issues of consistency in format and user-interface from one agency to the next. Privacy will also surface as an issue at this stage, as it is possible for the government to track on-line activities like frequently accessed products, the length of time spent on each page, and the length of time spent searching. While this tracking information can be used toward improving the website and its offerings, the temptation to sell this information to external parties may also exist. Thus, several policy issues must be decided by the agency in establishing the site. Based on the reduced scope of the web site under this stage, organizational challenges are limited. The first challenge Horizontal Integration - Systems Integrated across different functions - real one stop shopping for citizens
Vertical Integration - Local systems linked to higher level systems - Within similar functionalities
Transaction – Services and Forms on-line – Working database supporting online transactions Catalogue – Online Presence – Catalogue Presentation – Downloadable Forms
Sparse
Complete
Integration Figure 4: Dimensions and Stages of E-government [9]
CSI Communications | JUNE 2010
38
is assigning responsibility for the overall coordination and planning of services on the state web site as well as having each agency assign responsibility for the maintenance of a web site. One central agency may assume responsibility for the coordination and planning efforts, such as a department of information technology, or an ad hoc group may be convened for this purpose. Individual agency assignment of website development and maintenance is more problematic. Outsourcing to a private vendor or state information technology agency is one solution. Outsourcing at this level may present problems in terms of the allocation of maintenance responsibility once the site is developed. In many cases, at this stage, an internal champion emerges among internal employees who have nontechnical job classifications. The second problem is assigning responsibility for the answering of e-mails. Web sites often include an email address for questions from site users. Often these questions may be wide ranging and beyond the ability of the web master. Some procedure must be established to address how these emails will be handled and how quickly. Stage II: Functionalities and Challenges In the second stage, e-government initiatives will focus on connecting the internal government system to on-line interfaces and allowing citizens to transact with government electronically. This stage can be called ‘transaction-based’ e-government, and at this stage, e-government efforts consists of putting live database links to online interfaces, so that, for example, citizens may pay their telephone bills on-line. The issue of transaction fulfillment is most critical at this stage. Government must answer a lot of questions. Should fulfillment be outsourced? How will the responsiveness and quality of the on-line system compare to the off-line system? The issue of integration comes onto the scene. Governments must answer questions like “should the web interface be integrated with existing functional systems?” If not, what kind of legacy system information is necessary to support the on-line activities? When and how are on-line and offline systems going to be integrated? How expensive will the integration be? How long will it take? As much of the information collected by governments may be politically sensitive, installation of appropriate security mechanisms may be an important technical consideration. At the same time, many other policy issues need to be resolved, such as authentication and confidentiality. Organizational challenges are much greater in this stage. Existing electronic databases
must be reprogrammed to handle such changes requiring internal committees to assess user demands and user interfaces in current systems. Issues of confidentiality and security must be addressed by the organization as a whole. This requires study of existing legislation to determine how public or private the database is for the agency. Although many public applications were no doubt upgraded during the Y2k crisis, many legacy systems still remain. It may not be possible to provide an interface for the citizen-customer without considerable investments. Stage III and IV: Functionalities and Challenges As the quantity of these e-transactions increase in stage II, governments will be pressed to integrate the states’ systems with these web interfaces, or in some cases, build on-line interfaces directly connected to their functional intranet. In ideal cases, web transactions should be posted directly to the internally functioning government systems with minimal interaction with government staff. However, citizens’ demands and changes in society will push governments to go further as the critical benefits of implementing e-government are actually derived from the integration of underlying processes not only across different levels of government but also different functions of government. By having similar agencies across different levels of governments and by having different agencies with different functionality talk to each other, citizens will see the government as an integrated information base. Ultimately a citizen can contact one point of government and complete any level of governmental transaction - a “one-stop shopping” concept. Also, from the viewpoint of all levels of government, this could eliminate redundancies and inconsistencies in their information bases for citizens. This integration may happen in two ways: vertical and horizontal. Vertical integration refers to local and state governments connected for different functions or services of government. As an example of vertical integration, a passport issuing system at a state office might be linked to a national database of passport office for cross checking. Another example would be the business licensing process. In contrast, horizontal integration is defined as integration across different functions and services. An example would be a passport officer make a query of a particular candidature criminal activity to local district police station because systems in both offices talk to each other before issuing an authenticate passport. In defining the stages of e-government
development, the vertical integration across different levels within similar functionality is posited to precede the horizontal integration across different functions. Since the discrepancy between different services of government is larger than the discrepancy between levels of government, vertical integration will be attained first before horizontal integration. Movements toward vertically integrated government systems within similar functionality are already visible, such as the national crime databases which take information from local crime databases and forward that information to the states which in turn compiles the data from all localities and forwards those statistics to a central database. This last stage of e-government-vertically and horizontally integrated-represents an ideal situation for citizens, in which citizens have on-line access to ubiquitous government services with levels of government and the functional walls inside government transparent to them. Beginning in stage three, communication and integration-oriented technologies become more important. As stage three targets to integrate agencies in state governments with their local counterparts, technically, a web of remote connections is a prerequisite. In this remote connection and virtual transactions, several technological issues emerge: signal authentication, format compatibility of electronic data interchange, exposure level of internal legacy system to outside, etc. A critical issue of where to stop arises when integrating the entire ‘value chain’ of governmental levels. As systems in state and local governments become vertically integrated, boundaries at different levels of government become less distinguishable as the lines between them blur and functions move back and forth between what was once the state from a citizen’s perspective. Accordingly, the role played by the government employee changes. In the old traditional off-line government, many government employees are responsible for processing localized governmental transactions. Once systems are integrated and automated, most transactions are automated, and government employees are now becoming more an overseer of the process than a simple task-oriented assembly-line worker. The scope of activities performed by each employee will extend beyond functional department boundaries. Even though stage three may provide improved efficiencies, privacy and confidentiality issues must first be considered. Technically, integration of heterogeneous databases and resolving conflicting system requirements across
CSI Communications | JUNE 2010
39
different functions and agencies are major stumbling blocks for any government to reach this stage. Data and process requirements in health systems may not be comparable to the requirements in transportation systems. However, it is not only a technical challenge but also a management challenge, as demonstrated by Figure 4. Horizontal integration requires a change in the mindset of government agency directors. When thinking in terms of information needs or transactions, many directors perceive their department as most important and disregard other agencies. This ‘silo’ structure may have worked well in industrial settings in which functions and services are specialized for economies of scale. However, with the support of the Internet, the government processes defined by specialization may not be efficient, effective, or citizen friendly. The concept of governance and management of government staff may be subject to re-evaluation from the perspective of e-government. Functional specialization may not be suitable as a governing structure in e-government. In view of these, emerging trends will turn public management both inside out and upside down. Public management will be turned inside out as the largely internal focus of management in the past is replaced by an external focus, specifically a focus on citizens and citizenship. Public management will be turned upside-down as the traditional topdown orientation of the field is replaced— not necessarily by a bottom up approach, but by a system of shared leadership. In many respects, horizontal integration provides more access for other governments and possibly businesses than it does for the citizen. The individual remains in control
because it is the individual who chooses to use or not use the capabilities of a website. 4. Summary and Conclusions This paper presents how to lessen the gap of digital divide in developing countries and describes four developmental stages of e-government based on observations of current practices. Technological and organizational challenges have been discussed for each stage. Currently, e-government initiatives at federal and state levels are rapidly evolving, but many challenges are still to be met. Among these challenges, the following three issues are fundamental ones governments have to take into consideration as they want to evolve into efficient and effective e-government in support of citizens’ demands: (1) universal access, (2) privacy and confidentiality; and (3) citizen focus in government management. The digital divide can never be contained in isolation but the effort has to be multi-dimensional and multi-pronged. ICTs are one of the enabling tools to bridge digital divide. Creation of ICT infrastructure and content are core methodologies and a thrust to technology growth in a planned manner will certainly lessen the gap. The four stages offer a path for governments to follow and suggest challenges, both in terms of the organization and technical aspects. In addition, these stages emphasize the citizen as a user of governmental services. In so doing, they suggest that major rethinking about how governments provide services may be needed. Finally, universal access and privacy and confidentiality issues as well as citizen-focused change must be considered throughout e-government development. References [1] J. James, “Bridging the Digital Divide with
Low Cost Information Technologies”, Journal of Information Science, 2001. [2] G. S. Bajwa, “ICT Policy in India in the Era of Liberalization: Its Impact and Consequences”, Global Built Environment Review, vol. 3, pp. 49-61, 2003. [3] S. S. Rao, “Bridging Digital Divide: Efforts in India”, Telematics and Informatics, vol. 22, pp.361-375, 2005. [4] D. Evans and D. C. Yen, “E-government: An Analysis for Implementation: Framework for Understanding Cultural and Social Impact”, Government Information Quarterly, vol. 22, pp.354-373, 2005. [5] L. E. Halchin, “Electronic Government: Government Capability and Terrorist Resource”, Government Information Quaterly, vol. 21, pp.406-419, 2004. [6] United Nations & American Society for Public Administration (ASPA), Benchmarking e-government: A Global Perspective, New York, NY: U. N. Publications, 2002. [7] D. L. McClure, “Government On-line: Strategies and Challenges”, Available at http://www. house.gov/reform, 2000. [8] G. Means and D. Schneider, Meta-capitalism: The E-business Revolution and the Design of 21st Century Companies and Markets, New York: John Wiley and Sons Inc., 2000. [9] K. Layne and J. Lee, “Developing Fully functionally E-government: A Four Stage Model”, Government Information Quaterly, vol. 18, pp. 122-136, 2001. [10] World Bank, ICT at a Glance, India, Development Data Group, World Bank, 2003. [8] ITU, “World Telecommunication Indicators”, http://www.itu.int/ITU-D/ict, 2003. [9] Internet Service Providers Association of India, “Internet Services Industry- an Overview”, http://www.ispai.com/overview. html, 2002.
About the Authors Lopamudra Pradhan is a Doctoral candidate at the Department of Business Management, Fakir Mohan University, Vyasa Vihar, Balasore, India. She completed her MSc in Applied and Analytical Economics at Utkal University and her MPhil in Economics from Sambalpur University in 2002 and 2004, respectively. Her areas of research include e-governance, e-agriculture and e-readiness. Dr. Bibhuti Bhusan Mahapatra is working as a Reader at the Department of Business Management, Fakir Mohan University, Balasore, India. He obtained his MA (IRPM) and MPhil from Berhampur University. In 1991, he got his PhD on Industrial Wages from Berhampur University, India. He has contributed several books and articles, which are published in journals of national and international repute in areas like e-readiness, industrial management, organisational and human psychology, etc. Dr. Satchidananda Dehuri is a Reader at the Department of Information and Communication Technology, Fakir Mohan University, Vyasa Vihar, Balasore, India. He received his M.Tech. and PhD in Computer Science from Utkal University, Vani Vihar, Orissa, in 2001 and 2006, respectively. He completed his Post-Doctoral studies in Engineering Sciences at the Soft Computing Laboratory, Yonsei University, Seoul, South Korea, under the BOYSCAST Fellowship Programme of Department of Science and Technology, Government of India. He was at the CTS, Indian Institute of Technology Kharagpur as a Visiting Scholar in 2002. During May–June 2006, he was a Visiting Scientist at the Center for Soft Computing Research, Indian Statistical Institute, Kolkata. His research interests include evolutionary computation, neural networks, pattern recognition, data warehousing and mining e-agriculture and e-readiness. Dr. (Maj.) Abhaya Kumar Panda is serving as a Principal of Fakir Mohan (Auto.) College, Balasore, India. He received his MCom, MBA and PhD from Utkal University, India. He has published many books and contributed about 35 articles in various national and international journals of repute in the fields of finance, banking, marketing and e-readiness, etc. He successfully guided many PhD scholars in the areas of commerce and management.
CSI Communications | JUNE 2010
40
CSI Communications | JUNE 2010
41
CALL FOR PAPERS
ICSIP-2010
International Conference on Signal and Image Processing 15 – 17, Dec 2010 at Chennai, India Jointly organized by RMD College of Engineering and University of Mysore In association with
Computer Society of India Div IV & Chennai Chapter and IEEE Computer Society, Madras Chapter The International Conference on Signal and Image Processing (ICSIP), organized by RMD Engineering College jointly with University of Mysore provides academia and industry a platform to discuss and present the latest technological advances and research results in the fields of theoretical, experimental, and application of signal, image and video processing. ICSIP 2010 seeks contributions in the form of papers and cases on the theme as well as a broad range of issues relating to innovative applications of ICT & other appropriate technologies in achieving the theme related topics including, but not limited to: • Track 1 : Image Processing : Image Compression, Image Segmentation, Image Enhancement, Image Registration, Mosaicing, Video Surveillance, Video Summarization. • Track 2 : Pattern Recognition : Object Recognition, Distance Measures, Feature Extraction, Defeat Detection, Shape Analysis. • Track 3 : Document Processing: Document Analysis and Recognition, Handwriting Analysis, Character Recognition, Language Recognition, Multimedia Documents, Text Classification. • Track 4 : Computer Vision : Image Rectification, Stereo Vision, Object Detection, Motion Estimation, Camera Calibration. • Track 5 : Biometrics : Face, Fingerprint, IRIS, Signature, Gait, Multimodal and Emerging Biometrics. • Track 6 : Data Mining and Knowledge Discovery: Machine Learning, Text Mining, Evolutionary Computing, Ontology, Spatial Knowledge, Machine Learning, Rule Mining, Intelligent Information, Dynamic Programming. • Track 7 : Information Retrieval : Content Based Retrieval, Indexing, Structural Data, Multimedia Database, Image Retrieval, Video Retrieval, Text Retrieval, Biometric Retrieval, Multimodal Retrieval. • Track 8 : Information Coding : DCT Coding, Watermarking, Cryptography, Steganography, Data Hiding, Teleradiology, Index Coding, Signal Encoding, Indexing Documents For more detailed list of topics, pl. refer: http://www.rmd.ac.in/icsip2010/topics.html Submission: Authors are invited to submit the full paper by email to icsip2010@rmd.ac.in by 15th July either as a MS Word or PDF file. The format of the paper may be downloaded from http://www.rmd.ac.in/icsip2010/paper_format.doc Important Deadlines • Submission of full paper: July 15, 2010 • Acceptance notification: August 15, 2010 • Submission of camera-ready manuscripts: August 30, 2010 For additional details, pl. contact: Prof. Dr. R. M. Suresh, Chair – Programme Committee at rmsuresh@hotmail.com OR Mr. H. R. Mohan, Chair Div IV at hrmohan.csi@gmail.com Website: www.rmd.ac.in/icsip2010/ Prof. Dr. P. Nagabhushan Advisor – ICSIP-2010 Prof. of CS & Director of Planning and Development University of Mysore, Mysore
Prof. Dr. K. Sivaram Chair – OC – ICSIP-2010 Principal RMD Engg College Kavaraipettai
Prof. Dr. R. M. Suresh Chair – PC – ICSIP-2010 Vice Principal, Prof. of CSE, RMD Engg College Kavaraipettai
CSI Communications | JUNE 2010
42
CALL FOR PAPERS
NCRTIT-10
National Conference on Recent Trends in Information Technology 12 – 13, August 2010 at Chennai, India Organized by : Department of Information Technology B. S. Abdur Rahman University In association with Computer Society of India Div IV & Chennai Chapter and IEEE Computer Society, Madras Chapter The main objective of the conference is to provide a platform for Professionals, Academicians, Research Scholars and Students of various institutions and research organizations to exchange their innovative ideas and research work relating to the recent developments and trends in Information Technology. Original papers are invited from research scholars, academicians, PG students and Industrialists. The topics include but not limited to: Bio-Computing & Biometrics; Cloud Computing; Data Mining/Text Mining; Distributed & Parallel Computing; E-Governance; Grid Computing; High Performance Computing; Inter Network Security; Knowledge Management; Mobile/Sensor/Ad-hoc Networks; Multimedia/Image Processing; Network Security/Cryptography; Pattern Recognition; Pervasive Computing; Semantic Web; Social Web Applications; Soft Computing; Software Engineering & Quality Assurance; Virtualization; VOIP; Blue Tooth Technology; Web Content Management; Web Mining and Information Extraction Submission: Submissions must be of original contributions and should not have been presented or published anywhere. Authors of the accepted paper must guarantee that at least one of the authors will attend the conference and present the paper. IEEE format should be followed and the length of the paper should not exceed 8 pages in total. The papers of the registered candidates only will be published in the conference proceedings. Submitted papers will be assessed by at least two reviewers. Important Dates: • Last date for submission of Full paper • Confirmation of acceptance • Camera Ready paper and conference registration • Conference Dates
: : : :
5th Jul 2010 15th Jul 2010 29th Jul 2010 12-13, Aug 2010
Registration Fee: • PG Students and Research Scholars • Academicians • Industry Professionals
: : :
Rs. 300/Rs. 750/Rs. 1000/-
Registration: Duly filled-in registration form along with a crossed Demand Draft for the full amount drawn in favor of “Society of Information Technologists”, payable at Chennai should be sent to the Conference Convener on or before 29-072010 at the address: Dr. T R Rangaswamy, Convener, NCRTIT-10, Department of Information Technology, B.S. Abdur Rahman University, Vandalur, Chennai – 600 048 For additional details, pl. contact: Dr. T.R. Rangaswamy at ncrtit10@bsauniv.ac.in Phone: 044-2275 1347/48/50/ 75 Extn : 216 / 218 OR Mr. H.R. Mohan, Chair Div IV at hrmohan.csi@gmail.com Website: www.bsauniv.ac.in
CSI Communications | JUNE 2010
43
a report
World Telecommunication and Information Society Day (WTISD)-2010 A Report prepared by: Dr. Dharm Singh, Organizing Secretary Honorary Secretary CSI, Udaipur Chapter, Dept. of Computer Science & Engineering, College of Technology & Engineering, MPUAT,Udaipur (Rajasthan) India. E-mail: dharm@mpuat.ac.in, singhdharm@hotmail.com Tel.: +91-9414736473, +91-294-2470305
Inaugural Session of WTISD-2010 : (L to R) Prof. S C Bhatia, Er. R P Gupta, Mr. K P Lall, Prof. R K Aeron, Dr. R S Shekhawat, Dr. Dharm Singh
World Telecommunication and Information Society Day (WTISD)-2010 was organized by Computer Society of India- Udaipur Chapter, The Institute of Engineers (India), Udaipur Local Centre and Techno India NJR Institute of Technology, Udaipur on 17th May, 2010 at Techno Campus, Udaipur Rajasthan. The Chief Guest at the inaugural function was Er. R P Gupta, Ex-President IE(I) and Vice President World Federation of Engineering Organization (WFEO). Mr. K P Lall, National Coordinator, UNIDO and Dr. Suresh Bhatia, Execom Member, CSI Udaipur were the Guests of Honor. The Keynote Speaker was Prof R.K. Aeron, Director-Pacific Institute of Technology, Udaipur. Er. R S Vyas, Chairman, OC welcomed the guests and students to the celebration and technical workshop session and also shared the information about the MOU signed between Techno India NJR Institute of Technology and Sheffield Hallam University U.K. Dr. R S Shekawat, Chairman, CSI, Udaipur briefed about the CSI activities. The Techno India NJR WTISD Award-2010 was conferred on Dr. Ashok Kumar Sharma, Dean, YMCA,
University of Science and Technology, Faridabad (Haryana) in recognition of his significant contribution in the field of ICT. He was also presented with a cheque of rupees twenty one thousand. The technical session in the form of a panel discussion was chaired by Er. R.N. Mathur, GMTD, BSNL. Udaipur. Expert panelists were Er. Deepika Pokharna, DGM, BSNL, Udaipur, Er. J. K. Verma,Technical Director, NIC, Udaipur, Er. Nilay Mathur, Director, NIIT, Udaipur, Er. Ashok Jetawat, Director IICC, Udaipur. Er. Deepika Pokharna threw light on the technologies and hurdles in the implementation of ICTs in urban areas. Er. Nilay Mathur traced the history of development of communication technologies. Er. J. K. Verma presented the role of National Informatics Centre (NIC) in the Urban Development. Mr. R N Mathur, while concluding, stressed on the implementation of 3G and 4G technologies which would provide access to multimedia applications. Dr. Deepak Sharma proposed the vote of thanks.
CSI Communications | JUNE 2010
44
a report
NWCN-2010: National Workshop on Computer Networking A Report prepared by: Dr. Dharm Singh, Hon. Secretary CSI, Udaipur & Mr. H. R. Mohan, Chairman, Div. IV
Inaugural Session of NWCN-2010: (L to R) Er. RS Vyas, Dr. SS Rathore, Prof. AK Sharma, Prof. SS Chahal, Prof. VK Srivastava, Dr. RS Shekhawat, Dr. Dharm Singh
A three days National Workshop on Computer Networking (NWCN-2010) was organized by CSI Udaipur Chapter & Div IV, The Institution of Engineers (India), ULC and Techno India NJR Institute of Technology, Udaipur during 17-19 May, 2010 at Techno Campus, Udaipur Rajasthan. Objectives of the workshop were hand-on computer networking trying to make education in computer networking more concrete. Inaugural Session: At the inaugural session, Prof. S S Chahal, Hon’ble Vice Chancellor of MPUAT, Udaipur and Chief Guest, shared his views about the development of computer networking in the rural areas for the development of farmers and their betterment and the Guest of Honor Prof. VK Shrivastava, Dean, CTAE, MPUAT, Udaipur spoke on the advancement in the field of computer networking.. The VC Prof. S.S. Chahal, also released a book titled “A Practical Approach towards Computer Networks” authored by Dr. Dharm Singh, Hon. Secretary of CSI Udaipur and Organizing Secretary of the workshop. Prof. AK Sharma, Dean, YMCA University of Science and Technology, Faridabad delivered the keynote address Er. R S Vyas, Chairman, OC welcomed the guests, participants and students to the workshop and shared the information about the MOU signed between Techno India NJR Institute of Technology and Sheffield Hallam University U.K. Dr. R.S Shekawat, Chairman, CSI, Udaipur gave a brief information about the Computer Society of India. Dr. S.S Rathore Chairman, IE(I),ULC shared his views about the Institution and its development. Invited Talks: Invited talks in technical session were delivered by Dr. Manju Mandot- RV University, Amit Sanghi from Bikaner Engineering College, Er. Nitesh Mathur- Cisco System India, Mr. Uttam Sharma and Mr. Jitendra Jhakar, RNS Infotech, Jaipur and Mr. Arvind Sharma, CEG, GoR Jaipur. Er. Mathur discussed about
current challenges of networks, Cisco solutions and demo of IP Communicator, WEBEx and explained their practical implementation. Technical Sessions & NJR Memorial Lecture: The workshop proceedings were scheduled and deliberated in eleven sessions which included keynotes addresses and hand-on experience. Dr. Dharm Singh delivered the “NJR Memorial Lecture” with practical issues pertinent to communication over network and has expressed that workshop will provide a strong base to the computer networking education. Valedictory Session: Prof. Bob Harris, Sheffield Hallam University was the Chief Guest and Prof. Dharmendra Shadija, Sheffield Hallam University and Mr. S. N. ZindalFormer Director General, Software Technology Parks of India were the Guest of Honour. In his address, The Chief Guest Bob Harris, focused how Indian people can initiate joint technology development projects with U.K. Universities. Prof Shadija presented the importance of Semantic Web. Prof. P.N. Goswami proposed the vote of thanks. Open House Session: An open house session followed by dinner was organized at Cambay Spa Resorts, Udaipur and chaired by Er. H.V. Paliwal. Experts discussed and enhanced their knowledge by sharing their thoughts. The discussion and knowledge sharing among the students, participants and guests were very useful and many key participants had suggested to organize similar events regularly. Recommendations: Hands-on networking laboratory experiments should be complement components to classroom lectures of Computer Networks. The Design of physical infrastructure should be scalable. City administration should plan for laying the optical fibre cable for Gagabit connectivity so that each and every house can be connected through optical fiber.
CSI Communications | JUNE 2010
45
Coimbatore
ANITS BANGALORE
portal and effort put in for enhancing the membership and image of CSI. More than 80 CSI members participated in this event and got an opportunity to meet their old friends in this platform.
MUMBAI
BANGALORE : (L to R) Dr. R K Ramanathan, giving a vote of thanks Dr. Anirban Basu, Dr. C R Chakravarthy, Prof. V Rajaraman, Prof. H N Mahabala, Dr. S Ramani, Dr. Swarnalatha R Rao CSI look on.
CSI Day was celebrated by CSI Bangalore Chapter on Saturday, 6th March 2010 at Koramangala Club. Following Senior Fellows of CSI were specially invited for the function. Prof. V Rajaraman-Professor, Jawaharlal Nehru Centre for Advanced Research, Dr. S. Ramani-Professor IIIT-B, Prof. H.N. Mahabala-Professor, IIIT-B, and Dr. C R Chakravarthy were all the special invitees for the function. Prof. H N Mahabala in his talk expressed that Computer Society of India [CSI] has ignited the computer field. In IT many countries have benefited from India. We should aim at Innovation for simple applications. CSI will re-invent & become the knowledge of India. Dr. Ramani in his address shared the thought about the individuals. Each one should think about what they can do to CSI. CSI can facilitate through industries to get benefit to the society/users. IEEE-CSI can be the best platform for recognition and in this line, International certification like Computer Software Development Associate [CSDA] may be made mandatory for Educational Institutions. Prof. V Rajaraman has shared his thoughts about How CSI started in India. CSI was established with a motive to progress in Computer Science field which can reach user / society. Knowledge dissemination was the primary goal of CSI. CSI should be de-facto member of Accreditation body for retaining its image in the society. Dr. C R Chakravarthy mentioned that he has been associated with CSI right from 1960’s – from the inception of CSI. He mentioned that the main motivating force of CSI was from Mr. F.C. Kohli of TCS and Prof. R. Narasimhan (Late) of TIFR. Infact they were the father figures of CSI. Dr. Chakravarthy very much appreciated the effort put in by Mr. S Mahalingam the President of CSI in establishing the knowledge
mumbai : Annual Student Convention “iDeate 10” in progress
The annual CSI Student Convention iDeate 10 was held this year at Fr. Conceicao Rodrigues College of Engineering, Bandra, on the 23rd of March, 2010. The Inauguration was held in the college auditorium. The chief guest for the event was Mr. Hemant Nerulkar with Mr. V. L. Mehta as the guest of honor. The Inauguration began with a short prayer followed by the lighting of the lamp and the felicitation of the Chief Guest. Mr. Nerulkar spoke a few words on the industry and its relevance to the 200 students present. Seminars on Cloud Computing, Obfuscated Coding, Ethical Hacking, Rich Internet Applications, SCADA and a seminar by Apple Computers, How to Build a Search Engine in 30mins, Workshops on Photoshop, MAYA, HTML 5, Rubix Cube Workshop and Gaming Events : FIFA, Counter Strike were held during the convention. The day was a huge success with participation of over 250 students from 10 colleges across Mumbai. CIO Club meet was organised on 26th May,2010 at Police Gymkhana, Marine Drive, Mumbai. The meet was a part of the Cyber Safety Awareness week organized by Mumbai Police, NASSCOM and CSI, Mumbai Chapter. The purpose of the meet was to have a CIO – Police Interaction to deliberate on “Social networking- Is it a threat to Cyber Security’. Opening address was given by Mr. M. D. Agrawal, President CIO Club, Mumbai, Vice President cum President Elect, CSI, DGM, BPCL. The key note address for the function was delivered by Mr.
CSI Communications | JUNE 2010
46
D. Sivanandhan, Commissioner of Police, Mumbai. He elaborated on the security arrangements provided by Mumbai Police to the citizens of the City on a constant basis and also on the awareness expected from the citizens and the corporates in supporting the police. He also spoke extensively on the website “ www.copconnect. in “ which is created by Mumbai police for Citizen- police interaction. He also stressed on the point that citizens and corporates should approach the police for any issues relating the cyber crimes/ cyber harassments.
The workshop was useful for both new practitioners and students to learn the basics as well as for seasoned experts to pick up new insights and tips into computer forensics, incident response and investigations. The chapter organized one-day training on “Developing and Writing structured Use Cases” on 27th April. 2010 at Hotel Suncity Residency, Andheri East, Mumbai. The workshop was conducted by Prof. V K Garg. The workshop gave the participants hands on understanding on skills in developing and writing usecases for variety of software applications.The workshop also helped the participants gain an in depth understanding of use case methodology and to estimate software development effotrts using Use Cases.
mumbai : From Left .Mr. M.D. Agrawal, Mr. Kutty Nair, Mr. D. Sivanandan, Mr. Vijay Mukhi, Mr. Nitin Khanapurkar & Mr. Rajiv Vaishnav during the CIO Club.
The Keynote address was followed by very engrossing panel discussion to debate on “Social networking- Is it a threat to Cyber Security’. The panelists included Mr. Kutty Nair, Chairman, MIEL e-Security Pvt.Ltd, Mr. Ashish Dandekar, CIO, Power Exchange India Ltd, Mr. Hareesh Tibrewala, Joint CEO, Social Wavelength, Mr. Jadhav, ACP, Mumbai Police. The CIO- Police Interaction ended with Networking Dinner. Workshop on “Documenting S/W Requirements Using IEEE Standards 830-1998” on 25 March 2010. The chapter organized one-day training on Documenting S/W Requirements Using IEEE Standards 830-1998 on 25th March. 2010 at the chapter office. The training was conducted by Prof. V K Garg. The training helped the participants understand the concepts related with software requirement. Prof. Garg also gave a case study to thoroughly understand IEEE Standards 830-1998. The training also helped the participants to know how to prepare a good SRS The program was successful and was a value addition to the participants. The chapter conducted four-day certification course on Project Management 4.0 from 22nd to 25th April 2010 at the chapter office. The training helped the participants learn the Fundamentals of project management skills, concepts and techniques, Identity stakeholder needs requirements and document project scope, Develop work breakdown structures, Document project management plan, Estimate project cost and schedule, Understand dynamics of project management including HR and communication aspects of effective team building & management and Establish a dependable project monitoring and control system. The chapter organised a one-day seminar on “Computer Forensics” on 27th April. 2010 at Hotel Tunga International, Andheri East, Mumbai. The speaker Dr. Vishnu Kanhere explained the basics of Computer Forensics. Dr Kanhere aptly covered Forensics Investigation in different Operating systems. Dr. Kanhere also showed a Demo of the Forensics Tools - EncaseTM and others. The seminar was very successful and well attended by professionals from various facets of IT domain.
mumbai : Mr. D Sivanandan addressing Mumbai Chapter on Cyber Safety Awareness.
Program on Cyber Safety Awareness for engineering students, professors and staff was organized by Mumbai Chapter and the CSI Student Branch of the collegeat the Dwarkadas J. Sanghvi College of Engineering on Tuesday 25th May 2010. The program was a part of the Cyber Safety Awareness week organized by Mumbai Police, NASSCOM and CSI, Mumbai Chapter that was launched in Mumbai today. Mr. Amitabh Gupta, the Additional Commissioner of Police, Mumbai who was the chief guest, stressed the importance of alertness and action by both the Police as well as the public, in dealing with cyber crime. He explained the rationale behind the cyber safety week awareness campaign and encouraged the participants to be alert and proactive. He assured them that the Police are technologically well equipped and ready for any threat. At the outset Principal Dr Hari Vasudevan welcomed the gathering, followed by a basic overview of information security by Prof. Nilay Yajnik of NMIMS. Dr Vishnu Kanhere, Chairman, CSI Mumbai Chapter then gave a practical insight into cyber crimes like phishing and other attacks. He explained the pervasiveness of computer crimes and how their numbers have exploded. He gave a practical exposition of computer abuse techniques including steganography, use of anonymizer, IP,email and SMS spoofing, and he along with Mr Brijesh Singh, Joint Commissioner of Police covered the basic dos and don’ts to protect users on the net. Mr Brijesh Singh presented the shape of things to come in terms of cyber terrorism and crime with some interesting cases. Dr Vishnu Kanhere emphasized that cyber threats and crimes, can be effectively dealt with if users take precautions, and these threats should not deter students and teachers from using this wonderful medium and the emerging technology for their benefit. Use of updated browsers and systems, secure computers and networks, using updated firewall and antivirus software, use of strong passwords, taking care in doing financial transactions online, securing and not divulging personal information, not relying / believing in strangers on the net, regular backups and finally seeking timely help from ISPs and Police when in trouble, would provide a good level of protection.
CSI Communications | JUNE 2010
47
The program was attended by over 50+ Students and teachers / faculty and technical professionals, was very lively and participative. Program on Cyber Safety Awareness for doctors was organized by Computer Society of India Mumbai Chapter at the K.J Somaiya Medical College and Hospital, Sion on Monday 24th May 2010. The program was a part of the Cyber Safety Awareness week organized by Mumbai Police, NASSCOM and CSI, Mumbai Chapter. The medical profession has been transformed by increasing use of computers and the internet for diagnosis, treatment, communication, patient care, records and even teaching. Doctors and hospital administration is falling prey to phishing attacks, email hacking and other cyber threats, frauds and incidents. Mr. D. Sivanandhan, the Commissioner of Police, Mumbai who was the chief guest, stressed the importance of alertness and action by both the Police as well as the public, in dealing with cyber crime. He explained the rationale behind the cyber safety week awareness campaign and encouraged the participants to be alert and proactive. He assured them that the Police are technologically well equipped and ready for any threat. Mr. Vijay Mukhi gave a practical demonstration of phishing and other attacks like email spoofing, SMS spoofing, and he along with Dr Sadanand Date Additional Commissioner of Police and Mr. Baviskar, DCP of Mumbai Police covered the basic dos and don’ts to protect doctors on the net. Dr Vishnu Kanhere emphasized that cyber threats and crimes, can be effectively dealt with if users take precautions, and these threats should not deter Doctors and Medical professionals from using this wonderful medium and the emerging technology for the growth of their profession. Use of updated browsers and systems, secure computers and networks, using updated firewall and antivirus software, use of strong passwords, taking care in doing financial transactions online, securing and not divulging personal information, not relying / believing in strangers on the net, regular backups and finally seeking timely help from ISPs and Police when in trouble, would provide a good level of protection. The program was attended by over 200+ Doctors and health care professionals, was very lively and participative.
was “Business in the Dark and how can we protect ourselves: Case of Online frauds” Mr. Deshpande said that, “Online frauds have increased multiple folds in couple of years. It has become big headache for all viz. Banks, Law enforcement and we as end users. To protect ourselves we need to know how these fraudsters work.
PUNE : Mr. Parag Deshpande delivering lecture on “Online Frauds”
Lecture was open to all and was aiming at any individual who is doing on-line transactions or interested in knowing how to protect oneself from cyber crimes, Students, Users, Security / network / data base administrators, auditors and fraud examiners, chief risk officers, Those seeking career in computer forensics and cyber crime investigation., Senior, Mid Level and Operational Management and staff, Professionals, Consultants.
rourkela
cochin
rourkela : Mr. V K Garg, addressing the delegates at the seminar.
cochin : Dr. Sabu M. Thampi delivering a talk on “Advances in P2P Systems”
The chapter conducted a technical talk on “Advances in Peerto-Peer (P2P) Systems” by Dr. Sabu M. Thampi, Professor, Dept. of Computer Science and Engineering, Rajagiri School of Engineering and Technology, Kochi on Thursday, 13th May 2010. The talk provided an overview of P2P technology with respect to its origin, architectures, benefits, applications and security aspects of P2P networks.
PUNE Computer Society of India, Pune Chapter’s First Public Lecture Meeting as A Part of their monthly series of Events was organized on 24th April 2010 at Symbiosis Institute of Computer Studies and Research (SICSR), Pune. Guest Speaker was Mr. Parag Deshpande, and the subject
The chapter organized a Conference on “ ICT in Society” jointly with The Institute of Engineers India, Rourkela and Purushotam Institute of Engineering and Technology, Mandiakud, Rourkela at AN Patel Memorial Seminar Hall located at NIT campus where Dr. P M Khilar, Asst. Professor of NIT deliberated a talk on “Distributed Network”. Mr. R Prasad, Vice-Chairman , CSI RKL Chapter presented on “Role of Computer Society of India”. Prof. Dulal Acharji of PIET delivered on “Popularizing ICT through flexible admission system for creating new application and job areas”. Mr. Punyaban Patel, Asst Prof & HOD of IT department of PIET delivered welcome address and Mr. S. Panigrahi, Secretary of CSI conducted the seminar program. Mr. V K Garg told that in software and computer industry, Indian engineers have achieved global excellence in abroad. Mr. N. K. Swain told that ICT has application in all engineering fields like civil, mechanical, mining etc. Prof. Patel told that PIET is taking a plan to communicate with the faculties and welfare trust members of all engineering /management colleges for taking care of their neighbor schools that the dropout rate of children could be minimized. At the end Mrs. N. Adhikary, Asst. Prof, PIET proposed a vote of thanks.
CSI Communications | JUNE 2010
48
Student Branches
BVICAM, New Delhi
The Branch in association with Delhi Section of Indian Society for Technical Education (ISTE), New Delhi, organized an evening symposium on “Role of Professional Societies in Quality Enhancement of Technical Education” held at Bharati Vidyapeeth’s Institute of Computer Applications and Management (BVICAM), New Delhi. The symposium began with the opening remarks in the presence of the chief guest for the day Prof. D. P. Aggarwal, Chairman, Union Public Service Commission (UPSC), New Delhi, and highly eminent speakers Mr. S. N. Gupta, Chief Regulatory Advisor and Director Govt. Affairs, BT Global Services, India & SAARC, and Prof. P. V. Gupta, Ex-advisor, Apeejay Group of Institutions, in the benign presence of Prof. Ranjit Singh, Chairman, ISTE, Delhi Section, Prof. M. N. Hoda, Immediate Past Chairman, CSI, Delhi Chapter and Director, BVICAM, and Prof. N. D. Kaushika, Principal, BVCOE.
BVICAM, New Delhi : (L to R) Prof. N D Kaushika, Prof. P V Gupta, Prof. Ranjit Singh, Prof. D P Aggarwal, Prof. M N Hoda and Mr. S. N. Gupta
In his welcome address Prof. M. N. Hoda, stated that active involvement of professionals with the professional societies like CSI, IETE and ISTE is the need of the hour. This not only provides opportunity to collaborate but also to update about the state of the art. In his presidential address, Prof. D. P. Aggarwal, highlighted the role of technical institutions in grooming up of the upcoming IT professionals. He emphasized on the essence of quality education which should involve clarity of concepts imparted to them. He focused that mere teaching, from blackboard and PowerPoint presentations, is not sufficient to enhance learning. He said that the teachers should encourage the students to widen their horizons of thought process as learning is a dynamic process and not a static one. He mentioned that the role of teachers has been redefined; now teachers and facilitators and students are active learners. He also stressed on the fact that internet should be used as a means to facilitate knowledge gathering process; rather that a direct means of learning. He clearly stated that the overall growth of a student is very essential as today’s professionalism embodies 30% knowledge of course material, 35% soft skills and 35% attitude. Mr. S. N. Gupta, put forward his ideas and knowledge regarding “Better Life, Better Citizens using Technology”. He told that how the next generation network (NGN) would provide seamless converged services from Telecom, Internet & Broadcasting infrastructure at any time, anywhere from any device as per the wish of customer. Prof. P. V. Gupta highlighted the importance of “Entrepreneurship in Technical Education”. He gave instances of many entrepreneurs like Bill Gates who are amongst the most successful men of today’s world. He said that a college campus can be an ideal incubator for
hatching business. To begin with; students projects can be focused in commercial manner and give them an insight of entrepreneurship. He said there is an entrepreneur within every human being and can be nurtured well with proper guidance. HE was of the opinion that with entrepreneurship we can change not just ourselves but also the world. The symposium concluded with memento presentation followed by a vote of thanks by Prof. A. Q. Ansari, Head, Deptt. of Electrical Engg., Jamia Millia Islamia, New Delhi. Mrs. Parul Arora, Lecturer, BVICAM, was co-ordinator of the event. The branch in association with Delhi Chapter has organized a Four Days extensive 2nd Workshop on “Lean Six Sigma Green Belt Workshop” under collaboration with KINDUZ Consulting, Hyderabad. KINDUZ Consulting is a niche consulting firm that delivers focused ‘Business Improvements’, with ‘Business Results’ for its customers. The Topics covered in the workshop include; Recognizing Business and Organizational Priorities, Defining Improvement Goals, Measuring Current Capability, Analyzing Root Causes and Constraints, Improving, Controlling Improvements, Design for Six Sigma, etc. over four days. Mr. Pavan Kota, CEO, KINDUZ Consulting, himself was the trainer for the workshop. All the participants were from corporates.
BVICAM, New Delhi : All the participants along with Prof. M N Hoda, Dr. Roger Prestwich and Ms. Aarti Roy, the trainer from KINDUZ.
At the end, Prof. M N Hoda, Chairman, CSI DC, conducted a feedback session with the participants. He found participants very enthusiastic and thrilled by the quality of the workshop. Dr. Roger Prestwhich, Professor at Metropolitan State University, USA, was invited as Chief Guest for the Valedictory session. He, gave away Certificates and Mementoes to the participants. The workshop was conducted at BVICAM, New Delhi.
Pioneer Institute of Professional Studies, indore
Pioneer Institute of Professional Studies, Indore : Guest releasing the Conference Souvenir (L to R) Dr. V K Jain, Dr. P K Jain, Prof. S G Shah, Dr. Rajkamal, P C Jain , Dr. N S Chaudhari, Dr. K R Pardashani, Dr. Pawan Patni, CA Prashant Jain.
The Inaugural Session was graced by the auspicious presence of the Chief Guest Dr. Rajkamal, Director of SOE and Ex Vice-Chancellor,
Licenced to Post Without Prepayment MR/TECH/WPP 241/WEST/09-11
Registered with Registrar of News Papers for India - RNI 31668/78 Regd. No. MH/MR/WEST-76-2009-11
DAVV, Indore;, Special Guest, Dr. S G Shah, Vice President, CSI Division III; Dr. K R Pardasani, Head of MCA, MANIT, Bhopal AND Dr. N S Chaudhary, Prof. IIT, Indore Dr. Pardashani in his keynote speech discussed about Data Mining and Data Warehousing. He also highlighted the various issues related to demand for mining for high quality decisions at various levels in an organization to cope up with the challenges in the current scenario. On this occasion, Dr.N.S.Choudhary, IIT, Indore was conferred “Pioneer IT Excellence Award-2010” He has done significant research work on game AI, Neural Network Models like binary neural nets and bidirectional nets, context free grammar parsing, and graph isomorphism problem. He talked about the various studies and experiments going on in the field of neural networks, parallel computing, and optimization algorithms. Dr. S G Shah discussed about the developments in the field of Information and Communication Technology and its impact on globalization. He also talked about career opportunities in the field of ICT. He highlighted the contribution and activities of CSI in the field of IT. Dr. V K Jain, Director (MCA) and Conference Chairman provided and overview of the conference and technical sessions. He said that over 150 papers were received from various organizations/Institutions across India and they were reviewed by team of Professors. The Theme of First Session was “IT & Business Intelligence”, which covered 20 Papers. The Session was Chaired Dr. C T Bhunia, Director, Bengal Institute of Technology & Management & the Session was Co-Chaired by Prof. Ravi Jain, IIST, Indore. The Theme of Second Session was “Managing Trends in IT” that included 21 Papers. The Session Chaired Dr. M P S. Chawla, SGSITS, Indore & Session was Co-Chaired by Dr. V K Jain, PIPS, Indore. The Theme of Third Session was “Data Warehousing & Data Mining” that comprise of 22 Papers. The Session was Chaired Dr.V.R. Sathe, Impetus, Indore & Session Co-Chaired Dr. Aruna Tiwari, SGSITS, Indore. The Theme of Fourth Session was “Network Security” that comprised of 20 Papers. The Session Chaired Dr. P Dandekar, Professor, KCBTA, Indore & Session Co-Chaired Dr. Rakesh Katare, Professor, Rewa University, Indore. The Conference also covered a Panel Discussion on “IT Education a Road Map Ahead”. The eminent panelaists were Dr. V K Jain, as a Moderator, Dr. Suresh Jain, Dr. P Kanungo. In the Valedictory Session Dr. P K Chande, Group Director, Truba Institute, Indore was the Chief Guest. Dr. P K Jain, Chairman, Pioneer Institute congratulated the Conference Team for their Positive Efforts & excellent team work.
If undelivered return to : CSI, 122, TV Indl. Estate, Mumbai - 400 030
Coordinator of Student Branch Chapter of CSI, Prof. Sadique Khan proposed his Vote of Thanks to the Conference Delegates for their Participation, Cooperation and Support.
RVCE, BANGALORE
RVCE, Bangalore : Prof. K N Raja Rao & Dr. B S Satyanarayana
The branch organized a Techno-cultural festival by name “Master Mindz 2010” on Saturday, 24-04-2010 in the college. Departments of CSE & ISE [PG studies] has taken the lead in association with other Post Graduate departments in organizing this event. The aim of this fest was to give chance for M.Tech students to exhibit their talents and excel in competitions. The programme started with formal inauguration graced by Dr. B S Sathyanarayana – principal RVCE and Prof. K N Raja Rao – advisor RVCE at 9.00 am in the college auditorium. Dr. Sathyanarayana & Prof. Raja Rao advised the students to make use of opportunity and to conduct such meaningful events. The various competitions like : Quiz, Dumbcharades, Laugh-a-thon, Debate, Photography, Collage, Sudoku etc were conducted systematically in different venues. The response for each competition was over-whelming. The faculty coordinators have assisted in Evaluating & judging the performance of participants. Three best performing participants were selected for awarding prizes. The closing ceremony was conducted in formal way of valedictory. The Winners were honored with certificate & trophy which was distributed during valedictory by the principal & advisor. The Deans of various PG departments, Faculty coordinators & the student coordinators have executed this activity which witnessed the glory of good beginning. The students from M.Tech[Software Engineering] have bagged maximum number of prizes. More than 200 M.Tech students from various M.Tech branches have participated in different events and benefited.
Published by Suchit Gogwekar for Computer Society of India at 122, TV Indl. Estate, S K Ahire Marg, Worli, Mumbai-400 030 • Tel.: 022-249 34776 and Website : www.csi-india.org • Email : hq@csi-india.org and printed by him at GP Offset Pvt. Ltd., Mumbai 400 059.
CSI Communications | JUNE 2010
50
24th CSI Karnataka Student Convention Date : 22-23 October 2010 Hosted by : SJCE Mysore Organized by : CSI Bangalore Chapter For details contact: B G Sangameshwara, bg.bgsangam@yahoo.com, Tel.: 0821-2548285, csi_bc@yahoo.com, Tel.: 080-22862215, 22860461
November 2010
June 2010
ICAET-10: International Conference on Advances and Emerging Trends in Computing Technologies: Date : 21 – 24, Jun 2010 at Chennai, India, Organised by: School of Computer Science & Engineering, SRM University in association with University of Arkansas, Little Rock, USA, Div II & Div IV, Computer Society of India, IEEE Computer Society, Madras Chapter. For details contact: Dr. S Chellaiah, Conference Chair ICAET-10 at icaet10@ srmuniv.ac.in OR Mr. H R Mohan, Chair, Div IV at hrmohan.csi@gmail.com
August 2010 DCMC-10: Divisional Conference on Mobile Computing
5th CSI National Conference on IT for Defence Date : 12-13 November 2010 Host: CSI Bangalore Chapter Organized by: SIG-IS, Div.IV, CSI For details contact: drchakra32@gmail.com,csi_bc@yahoo.com, Tel.: 080-22862215, 22860461 National Conference on IT for Rural & Agriculture Development Date : 23-24 November 2010 Host: Indian Institute of Business Management, Patna Organized by: Patna Chapter For details contact: Prof. A K Nayak 45th Annual Convention Date : 25-27 Nov. 2010, Mumbai Venue : Mumbai Host: CSI Mumbai Chapter For details contact: www.csi-2010.org
Date: 11-12, August 2010 at Chennai Organised by: Dept. of CSE & TIFAC CORE, Velammal Engineering College, Chennai in association with Computer Society of India, Div. IV on Communications & Chennai Chapter. For details contact: Prof. B. Rajalakshmi, Convener, DCMC-10 at vecdcmc10@gmail.com Phone: 044 - 26590579 OR Mr. H R Mohan, Chair Div IV at hrmohan.csi@gmail.com Website: www.velammal.org
December 2010
NCRTIT-10: 2nd National Conference on Recent Trends in Information Technology
Date: 16 August 2010 Hosted by: Goa University Organised by: CSI Goa Chapter For details contact: shekhar_sahasrabudhe@presistent.co.in;
ICoAC 2010: 2nd International Conference on Advanced Computing Date: 14-16, Dec 2010 at Chennai, India Organised by: Dept. of Information Technology, Anna University Chennai, MIT Campus and IEEE Madras Section and Supported by Computer Society of India Div IV & Chennai Chapter, IEEE Computer Society, Madras Chapter, Centre for Development of Advanced Computing (CDAC) and University Grants Commission (UGC) For details contact: Dr. S. Thamarai Selvi, Professor, Dept. of Information Technology, MIT Campus, Anna University Chennai, Chromepet, Chennai 600044, India. Phone: 91-44-22516319 / 22516015. Email: thamaraiselvis@gmail.com OR Mr. H R Mohan, Chair Div. IV at hrmohan.csi@gmail.com Website: www. annauniv.edu/icoac2010
Workshop on Cloud Computing
January 2011
Date: 12–13, Aug 2010 at Chennai Organised by: Dept. of IT, B S Abdur Rahman University in association with CSI Div IV, Chennai Chapter and IEEE Computer Society, Madras Chapter For details contact: Dr. T.R. Rangaswamy, convener at ncrtit10@bsauniv. ac.in Phone: 044-22751347/48/50/75 Extn : 216 / 218 OR Mr. H R Mohan, Chair Div.IV at hrmohan.csi@gmail.com
1st CSI Goa State Student Convention
Date: 20–21, Aug 2010 at Chennai Organised by: CSI Div. IV, Chennai Chapter, SIG-Grid computing and IEEE Computer Society, Madras Chapter For details contact: Dr. P. Sakthivel, Chairman, CSI Chennai at sakthi_velp@yahoo.com OR Mr. H R Mohan, Chair Div. IV at hrmohan. csi@gmail.com
September 2010 CSI Region-VI Student Convention Date: 4-5 September 2010 Hosted by: MIT Pune Organised by: CSI Pune Chapter For details contact: shekhar_sahasrabudhe@presistent.co.in;
DWDM-2010: 2nd National Conference on “Applications and Trends in Data Warehousing, Data Mining and Data Modeling” Date: 24-25 September 2010 Hosted by: Thapar University, Patiala Organised by: CSI Region-I, Division-III and Chandigarh Chapter For details contact: Dr. R K Sharma at doaa@thapar.edu, Dr. Harish Kumar at harish32us@yahoo.com
October 2010
The 26th National Student Convention Date : 8-10 October 2010 Hosted by : Mar Baselios College of Engineering and Technology, Trivandrum Organized by : CSI Trivandrum Chapter For details contact: Mr. Srinivasan Ravindran, E-mail: srini@oneviewsys Ms. Mini Ulanat, E-mail: mini.ulanat@gmail.com
COMAD-2010 International Conference on Management of Data Date : 8-10 December 2010 Hosted by: VNIT, Nagpur, Maharashtra Organized by: CSI Division III, SIG-Data, Region VI and Nagpur Chapter For details contact: Prof. Deshpande, psdeshpande@cse.vnit.ac.in
ICSIP-2010: International Conference on Signal and Image Processing Date : 15-17 December 2010 Organized by: RMD College of Engineering and University of Mysore in association with Computer Society of India Div IV & Chennai Chapter and IEEE Computer Society, Madras Chapter For details contact: Prof. Dr. R M Suresh, Chair-Programme Committee at icsip2010@rmd.ac.in or rmsuresh@hotmail.com OR Mr. H R Mohan, Chair Div. IV at hrmohan. csi@gmail.com Website: www.rmd.ac.in/icsip2010/ International Conference on Software Quality Date : 20-22, January 2011 Organized by: CSI Division II, Region-V and Bangalore Chapter For details contact: Dr.Anirban Basu, anirbanbasu@qualityplusindia.com ConfER-2011: The 4th National Conference on Education & Research Date : 23-24 January 2011 Hosted by: Shambhunath Institute of Engineering & Technology, Allahabad Organized by: CSI Division V, Region-I and Allahabad Chapter For details contact: Prof. J P Mishra (e-mail: dean_tpo1948@yahoo.com), Mr. Zafar Aslam (e-mail: zafar.aslam@cmcltd.com)
M D Agrawal Vice President & Chair, Conference Committee, CSI