project proposal

Posted in Uncategorized on December 3, 2010 by geejula

Global GPRS Security (GRS)

GPRS offers a number of security enhancements over GSM security. The standards themselves also technical features, which a network operator may choose to use. As well as these features, there are additional security technical features that may be used from proprietary and other industry organizations.

Why i am doing MSc in Computing:

Posted in Uncategorized on November 17, 2010 by geejula

The reason i am doing this course is to improve my skills and knowledge in computer field .

The MSc programmed Computing Science provides me with the advanced concepts, software design methods, and analytic skills necessary for creating information-driven systems and applications in any domain of society. where i  haven’t  learned in B-Tech(Computer Science egg).

The master’s degree programmer Computing Science is an excellent way to specialize in the modern design issues of
competitive algorithmic and software systems and their application.

And when comes to Research in computer science Discoveries in Informatics have a large impact on our everyday lives.

CLOUD COMPUTING

Posted in Uncategorized on October 15, 2010 by geejula

CLOUD COMPUTING

Sanjeeva kumar geejula

Computer science department Griffith College (Dublin)

Introduction:

Cloud computing are clusters of distributed computers. Provide on-demand resource and services over the web. Clouds that provide on-demand computing instances can use these instances to supply software as a service.  For some cloud computing applications, security is still somewhat immature.

Literature review:

This slideshow requires JavaScript.

Let’s say you’re an executive at a large corporation. Your particular responsibilities include making sure that all of your employees have the right hardware and software they need to do their jobs.

Buying computers for everyone isn’t enough — you also have to purchase software or software license to give employees the tools they require. Whenever you have a new hire, you have to buy more software or make sure your current software license allows another user. It’s so stressful that you find it difficult to go to sleep on your huge pile of money every night.

example : Microsoft office.

Cloud computing is often offered with a pricing model that lets you pay for only used service. What i mean is pay as you go. Usually cloud computing is used by large organizations, some companies that depend on cloud computing have infrastructure that scale over several data centers.  Companies that require additional services simply request them from the cloud. Cloud computing provide several important benefits over today cloud’s usage in which an company purchases servers at a time and operates them for themselves. First, cloud service enjoys the same economies of scale that data centers provide. Security is an area of cloud computing that presents some special services.  First Cloud computing services are often remote they can suffer the latency and bandwidth related issues linked with any remote application. Because hosted cloud services serve multiple customers, various issues related to multiple customers share the same piece of hardware can arise the problem. Also, having data accessible to third parties can present security, compliance, and regulatory issues. [1][2]

Some trusted companies came across with set of hardware and software technologies to enable the construction of trusted platforms. Chips that are now bundled with commodity hardware will play a secure role to prevent threat. [2]

Conclusion:

In this report, we argue that what is a cloud computing — cloud is actually an application (software’s, websites, like… face book…meebo chat room…and many more) which we run on our system without installing it. And even we came across with security features. In future we see more security future for cloud computing.

References:

[1] Robert L.Grossman  2009IEE computer society University of Illinois at Chicago and open data group.

[2] Nuno Santos  Krishna P. Gummadi  Rodrigo Rodrigues   MPI-SES.

[3] B.D Payne, M. Carbone, and w.lee. Secure and Flexible Mon-itoring of Virtual Machine, 2007.

[4] T.R.Peltier,J.peltier. and J.Blackley. Information Security Fundamental, publication, Boston, MA, 2003.

[5] D.G Murray improving Xen security through disaggregation in Proc.of VEE 08.

[6] http://www.google.ie/images?hl=en&q=image+of+cloud+computing&um=1&ie=UTF-8&source=univ&ei=8YLmTPvWFNC7hAeXg63XDA&sa=X&oi=image_result_group&ct=title&resnum=1&ved=0CDAQsAQwAA&biw=1280&bih=615

My Area of Intrest

Posted in Uncategorized on September 27, 2010 by geejula

Actually i want to know few things in detail…..

* Networking?

* Embedded systems(programming the processors)?

Networking— we all know that internet is a global interconnected computer network….that  uses TCP/IP protocal as platform…

how this TCP/IP layers are used in real time internet?

even we came across of IP address ….when our internet provider fix’s the internet he say this (128.23.34.6.) is your IP  address..

how this IP address are used in internet?

how the routers are programmed using this IP address?

how this IP address are sub divided…

How the processers are programmed–


DELETE : THE VIRTUE OF FORGETTING IN DIGITAL AGE

Posted in Uncategorized on September 27, 2010 by geejula

ISSUES :

Remembering and forgetting,Storage of Data,Retrieving the Data,Power and Time,Panopticon(means -in global world internet is watching every one by means of camera’s are storage  ),Time/Decision, all these issues where discussed in a book called DELETE: THE VIRTUE OF FORGETTING IN DIGITAL AGE written by Viktor Mayer-Schonberger, Winner of the 2010 Don K. Price Award for Best Book in Science and Technology Politics, Section on Science, Technology, and Environmental Politics (STEP) by the American Political Science Association.

In the past the storage and retrieval of information  was limited. So if people want to remember they used to written down the things or they have to depend of human memory. As the time past, more and the more could me recorded, but retrieving the data in analogue world was still difficult.

However, in the present world, digital recording and advance of cheep and vast storage made easier to record everything  including our personal collections of digital photos, email in boxes and soon…At the same time recall methods have advance, so that i can look up an email i sent more then ten years ago.

By this human forgetting to machines remembering is the main them of :vikator mayer -delete.

DIGITAL REMEMBERING :

Because of digital remembering a newly qualified teacher failing to get a job on account of the picture of her on a social networking site, the psychotherapist refused entry to the USA because of a journal article, published several years ago, in which he mentions having taken a drug. examples of how society is now able to remember facts about your life that you have forgotten yourself. This the problem of perfect memory and history of forgetting humankind’s battle against it .

Power and time:

There is a loss of power, as information about us is duplicated and reused , with or with out permission , and even negation of time . Among the issues are two terrifying possibilities, that perfect memory threatens reasons, abstract thought and the ability to make decision in the present, and that the reasons for retaining data now may seem sensible, but what if it should fall into the wrong hands in the future. Having clearly and concisely built a picture of the problem, form the early days of human history to the present, Mayer then turns to some potential solutions.

* Information privacy issues.

*Digital rights management.

*Effectively tuning search engines.

That is say, every piece of information, from files on your hard drive, thought your email and even your search terms and online purchase history is given an expiration date.  Up to this point we have been taken in, we are willing  to overlook the odd overstatement–information retrieval is easy for example.

After reading this book i came to point that most of the things which viktor mayer mentioned where right.

This is deliberate on his part, perhaps you all will disagree with me, applying a expiration date on each and every  file which is uploaded on internet is not a good idea. But… but we need to hide some files on internet which is not helpful for society… If a user want to access such files he need to provide his personal details… by this ..it make easy for the gov to track that person.

thanks……


Hello world!

Posted in Uncategorized on September 23, 2010 by geejula

Welcome to WordPress.com. This is your first post. Edit or delete it and start blogging!