Você está na página 1de 11

CBS E-Journal, Biz n Bytes,

Vol. 2, Dec., 2009

Proceedings
Of
National Conference
On
Information Management,
Computing and Security
(IMCS09)

3rd November 2009

Convener:
Dr.Col. S.P.S Bedi
Director, CBS, Landran, Mohali
Co-Convener:
Ms.Bikrampal Kaur
Head of Deptt, MCA, CBS Landran, Mohali

Organized by:
Department of Computer Applications
Chandigarh Business School, Landran, Mohali

http://www.cgc.edu.in/
ISSN 0976 0458

CBS E-Journal, Biz n Bytes,


Vol. 2, Dec., 2009

Organizing Committee
Mr.Sudhanshu Shrivastava
Asst.Prof., MCA Dept
CBS,Mohali, Landran,Mohali

Ms.Jaspreet Kaur Sandhu


Lecturer.MCA Dept.
CBS,Mohali,Landran,Mohali

Mr.Ravikant Potdar
Lecturer,MCA Dept.
CBS,Mohali,Landran Mohali

http://www.cgc.edu.in/
ISSN 0976 0458

CBS E-Journal, Biz n Bytes,


Vol. 2, Dec., 2009

FOREWORD
It gives me immense pleasure to know that the Department of Computer Applications,
Chandigarh Business School, Landran is Organizing National Level Conference on Information
Management, Computing and Security (IMCS09) on 3rd November 2009.I am sure that
IMCS09 is an excellent opportunity for researchers ,scientists and professionals from industry,
educational institutes and students to share and disseminate their innovative ideas and pioneering
views about the recent trends and development in the field of computer applications.
Today information includes both electronic and physical information. The information
management comprises of collection, compilation, collation and distribution of information.
Information management (IM) is the collection and management of information from one or
more sources and the distribution of that information to one or more audiences. This means the
organization of and control over the structure, processing and delivery of information.
Computing means any goal-oriented activity requiring, benefiting from, or creating computers.
Thus, computing includes designing and building hardware and software systems for a wide
range of purposes; processing, structuring, and managing various kinds of information; doing
scientific studies using computers; making computer systems behave intelligently; creating and
using communications and entertainment media; finding and gathering information relevant to
any particular purpose, and so on. Information security is the protection of information from a
wide range of threats in order to ensure business continuity, minimize business risk, and
maximize return on investments and business opportunities. Information security is achieved by
implementing a suitable set of controls, including policies, processes, procedures, organizational
structures and software and hardware functions. These controls need to be established,
implemented, monitored, reviewed and improved, where necessary, to ensure that the specific
security and business objectives of the organization are met. This should be done in conjunction
with other business management processes.
I welcome and thank all delegates, honorable guest, renowned speakers and participants for their
generous views, support and contribution n for the success of this conference. The organizers
have put in a lot of effort to make such a big event a grand success. I appreciate their planning,
coordination and hard work.
I wish you all a knowledgeable and rewarding experience.

http://www.cgc.edu.in/
ISSN 0976 0458

CBS E-Journal, Biz n Bytes,


Vol. 2, Dec., 2009

AUTHORS
Vinay Mehta
AshwathaNarayana Shastry.
Arvinder Singh Kang
Bikrampal Kaur
Chamkaur Singh Dhillon
Deepti Tara
Divya Dhara Gupta
Garima Shrivastava (Paper-1) (Paper2)
Jaspreet Kaur Sandhu
Jaspreet Kaur
Narinder Kumar
Navita Shrivastava (Paper-1)

(Paper2)

Nitin Bansal
Pawnee Mahendru
Parminder Singh
Sahil Sharma
Sandeep Singh Kang
Satish Alaria
Sudhanshu Shrivastava(Paper-1)

(Paper2)

Upasna Sharma
Vimal Kumar
Vijay Kumar
Yogesh Kumar

http://www.cgc.edu.in/
ISSN 0976 0458

CBS E-Journal, Biz n Bytes,


Vol. 2, Dec., 2009

AUTHOR WISE PAPERS


Vinay Mehta
Information Management - A green perspective
AshwathaNarayana Shastry
Information Security in Information Technology Industry in India
Arvinder Singh Kang
Internet Security and Ethical Hacking
Bikrampal Kaur

Evaluation In Inforamtion Retrieval


Chamkaur Singh Dhillon
Improving the performance of search engine technology
Deepti Tara
An Empricial study on Network Security Mangement during data extraction and sharing
in SAN.
Divya Dhara Gupta
Internet Security and Ethical Hacking
Garima Shrivastava
The State-of-the-Art Machine Learning Strategy for Predicting Protein Conformation from DNA
Sequence :Progress and Prospects
Application of Machine Learning Techniques to Explore Complex Networks in Cell Biology:
Simulating the Language of Living Cells
Jaspreet Kaur Sandhu
Criterias for evaluating the qaulity of information on the internet
Jaspreet Kaur
Search engines and Strategies
Narinder Kumar
Threats to Network Security and its Counter measures
Navita Shrivastava
The State-of-the-Art Machine Learning Strategy for Predicting Protein Conformation from DNA
Sequence :Progress and Prospects
Application of Machine Learning Techniques to Explore Complex Networks in Cell Biology:
Simulating the Language of Living Cells
http://www.cgc.edu.in/
ISSN 0976 0458

CBS E-Journal, Biz n Bytes,


Vol. 2, Dec., 2009

AUTHOR WISE PAPERS


Nitin Bansal
An Empricial study on Network Security Mangement during data extraction and sharing
in SAN.
Pawnee Mahendru
Improving the performance of search engine technology
Parminder Singh
Performance Analysis of QOS for IEEE 802.11 E
Sahil Sharma
Internet Security and Ethical Hacking
Sandeep Singh Kang
Performance Analysis of QOS for IEEE 802.11 E
Satish Alaria
A Software process improvemment Model
Sudhanshu Shrivastava
The State-of-the-Art Machine Learning Strategy for Predicting Protein Conformation from DNA
Sequence :Progress and Prospects
Application of Machine Learning Techniques to Explore Complex Networks in Cell Biology:
Simulating the Language of Living Cells
Upasna Sharma
Threats to Network Security and its Counter measures
Vimal Kumar
Search engines and Strategies
Vijay Kumar
A Software process improvemment Model
Yogesh Kumar
Improving the performance of search engine technology

http://www.cgc.edu.in/
ISSN 0976 0458

CBS E-Journal, Biz n Bytes,


Vol. 2, Dec., 2009

PAPERS

Information Management - A green perspective by Vinay Mehta


Information Security in Information technology Industry in India.
Internet Security and Ethical hacking
Evaluation In Information Retrieval
Improving the performance of search engine technology
An Empirical study on Network Security Management during data extraction
and sharing in SAN
The State of the Art Machine Learning strategy for predicting Protein
Conformation from DNA Sequence: Progress and Prospects.
Application of Machine Learning Techniques to explore complex Networks in
cell Biology :Simulating the language of Living Cells
Criterias for evaluating the quality of information on the internet
Search Engines and Strategies
Threats to Network security and its Counter measures
Performance Analysis of QOS for IEEE 802.11E
A Software process improvement model.

http://www.cgc.edu.in/
ISSN 0976 0458

CBS E-Journal, Biz n Bytes,


Vol. 2, Dec., 2009

Information Management A Green Perspective


Vinay Mehta
CEO, PoleVault Technologies Pvt Ltd, Chandigarh
[Keynote Presentation held on 3-Nov-09]
Abstract: In this age of information explosion, information management has become a huge
challenge for organizations and nations. What is noteworthy however is that information
howsoever it may have been created, by whosoever it may have been created, whatsoever
number of times it may have been used, and may have lost its relevance with time comes to be
treated at par with all other new information. And this is what increases the burden of
information management. The author expounds the basic tenets of nature with an example of
data storage mechanism of a tree - to come out with a new model of Information Management so
that instead of carrying loads of information in our storage media for years together, the
information manages itself on its own depending on the number of factors affecting it. This
would simplify our lives manifold and make us much more productive in everyday life.
1.0

Information

I would like to define Information as anything that carries no value or little value in itself, but its
proper use delivers great value. Often, I use an example of a newspaper advertisement or a web
advertisement that by itself does not cost us anything, but if someone uses the information inside
it and applies, it could change his / her life. Similarly that piece of information may be obsolete
after sometime and shall get stored by default somewhere. This way we keep accumulating
information in our cabinets, our drawers, our almirahs that are full of information but rarely used
for productive purposes. Imagine if the amount of data within an organization is so huge that it
needs scores of Storage Area Networks (SANs) to keep it safe and sound, the data of a nation
must run into trillions of megabytes to be stored for ages. This way the information management
becomes a humungous challenge, and in the coming centuries half of our efforts as a world
community might go into keeping what we have already generated, knowing what is relevant,
what is not and in the process, losing some of the key information to bring some order into
Information Management. Therefore the information of present age needs to be
R organized,
R managed and
R processed (computed),
R Secured and
R Shared or communicated
2.0

Information needs an actor

It is obvious that any piece of information needs an actor to act upon it to process it. If you need
to cull out some data for previous years, you need to dig into your databases to get it out using
queries. If you need some old text out, you need to search it in your files you created months
back. So without action, you can not get the desired information. By itself it does not tell how
old it is, how irrelevant it is to you or how useful it could be to you before you use it. In other
words, Information Model of present times treats information as a static entity that neither
changes according to its exposure nor modifies itself destroys itself depending on the
environment it is in or based on how it was created or for whom it was created.
http://www.cgc.edu.in/
ISSN 0976 0458

CBS E-Journal, Biz n Bytes,


Vol. 2, Dec., 2009

In short, the information models of present age are not intelligent, they are static definitions of
constructs in which bits and bytes are stored as information that keeps lying like a dud till some
application acts upon them and do something with them. In contrast, let us see how nature is
managing its information since billions of years.
3.0

Natures Dynamic Information Model

Look us look at the Green way the way nature stores the information in a tree.

The smallest unit on a tree is a leaf. The information the leaves carry about their health and
growth is self- contained. The cells within the leaf have the information about how to grow, how
to make food, how to survive in storms or rough weather, how to live, and even when to fall. It is
not dependent on the branch for taking a decision on these in normal case of growth (most of the
times in their life-time).
If we look at the branch, information about its growth, its divisions into sub-branches, further
leaves, are all contained within its cells, and are not dependent on the stem for this information
in normal case. In fact in case of any obstruction or condition, it is able to take a decision on its
own about the direction it has to grow and how much.
Lets us look at the stem. It represents the life support system, apart from being a physical
support system as well. It can be said that the basic infrastructure is available to all components
of the tree through the stem - physical support, water, other nutrients, life support processes in
these they act as one entity, as a tree. The stem and its processes are similar to the passive and
active IT infrastructure in any network.
In all these components, the information storage is happening in their basic cell structure
according to the need, exposure, growth, potential to grow and other factors. And as a system the
information is changed or modified or destroyed or shed appropriately depending on these
factors with time.

http://www.cgc.edu.in/
ISSN 0976 0458

CBS E-Journal, Biz n Bytes,


Vol. 2, Dec., 2009

If we look at this model of Information, it is no doubt dynamic, constantly changing itself,


adapting itself and carries itself only as much as is needed (in the form of a seed), you may call it
the most relevant information in a compressed form, that can be used again!
Therefore in a tree adaptive changes in information happen. Whereas the core Information
genetic information - remains same, other information changes with time, weather and water or
resource availability.
4.0

Todays Information Systems

Compare the Tree (as Information Object) with the Information in IT processes of todays
Information Systems. You will find that there is absolutely no adaptive change in information
within them. You would find the core Information remaining same, and the other information
also remains same w.r.t. time and other factors, unless they are acted upon by applications.
This static behaviour is depicted by all of our passive Infrastructure, active Infrastructure,
application Infrastructure as well as information storages.
This is precisely the reason why information is not easily shared, it is not secure nor is it prone to
misuse. There are no adaptive changes happening in the data and there are no ways to change
how it is processed depending on what it is exposed to.
I give you a simple example:
R A file shared with another user has same format and a static password.
R If encrypted, it can be opened with a private key (that is same for all users)
R Time relevant components of the information within the file remain same, they do not
change or nor do they get highlighted unless the application whos using it is aware
enough.
5.0

Imagine a Dynamic Information Model for IT world

Therefore I ask you not to think your information as data. Data usually connotes a dud or static
piece of information which does not change at all with time or exposure. It needs an intelligent
actor to make it useful. Instead I ask you to visualize an Information Object that contains data
and acts dynamically! Just for some time, forget all about what you have learnt in data
management systems, and visualize the following:
Any information (say, a worksheet) going out of your system or network having
R Adaptive locks depending on who opens the information a trusted one within or outside the
network or a stranger;
R Ability to tell before it is used that components in this file may be outdated since it old
R Ability to kind of destroy itself beyond a certain time or age
R Ability to get differently processed depending on the exposure
To reinforce this idea, I would give you another example from nature. Very often I have used a
particular road to my college campus, now my office campus as well. On the left side of it, there
are two kinds of trees as you can see in the images below. One planted in three rows on extreme
left, they stand straight adjacent to the boundary walls of Museum and Art Gallery and the
College of Art, sector 10, Chandigarh, and the others planted on the road edges and have lesser
space to grow in the vertical direction. Look carefully at the images below:
http://www.cgc.edu.in/
ISSN 0976 0458

CBS E-Journal, Biz n Bytes,


Vol. 2, Dec., 2009

Now see the Tree Information Object which is very adaptive in respect of its angle of stem, the
percentage of foliage, and even the location of flowers changes with respect to what it is exposed
to. And all this forms a part of the basic information system of the Tree. I would call it as
Adaptive Computing happening even in the primitive cells of the stem which calculates all the
physical parameters and changes the direction of its growth and way it grows.
6.0

Think Information Objects

Now that you have been imagining the tree information object, think of our own information
files or database as Information Objects, NOT data. This would make it adaptive and it would
have the
o Ability to get differently processed depending on the exposure
o Ability to have different encoding based on where they are going
o Ability to get differently transported depending on their state
o Ability to age with time
And think that these information objects are available to you as a part of OS or base network
layer in your information system setup! A simple example would make you understand the ease
it would bring to your life: Think of worksheets or files in your system behaving differently
depending on
o what they contain
o by whom they have been sent to you,
o how frequently you have used them, &
o what their age is!
7.0

Conclusion

I believe, once we start thinking in a different way on a totally different model or pattern, we are
sure to come up with ways to create it and generate it. The progress we can have with dynamic
information objects would help us achieve Information Management in much more easier natural
way and help us explore hitherto unexplored potential that human race is destined for. We at
PoleVault encourage ways to keep thinking different and as Steve Jobs said remain hungry all
the time.
[Copyright All ideas presented herein are original and are copyrighted in the author and the
PoleVault Technologies Pvt Ltd, Chandigarh]
http://www.cgc.edu.in/
ISSN 0976 0458

Você também pode gostar