24 Dec 2013

Cloud Computing


What is Cloud Computing?

  • Cloud computing is a phrase used to describe a variety of computing concepts that involve a large number of computers connected through a real-time communication network such as the Internet.
  • In science, cloud computing is a synonym for distributed computing over a network, and means the ability to run a program or application on many connected computers at the same time.
  • The phrase also more commonly refers to network-based services, which appear to be provided by real server hardware, and are in fact served up by virtual hardware, simulated by software running on one or more real machines. Such virtual servers do not physically exist and can therefore be moved around and scaled up (or down) on the fly without affecting the end user - arguably, rather like a cloud.

Why it is Chosen as A Subject in MCA?

In October 2007, the Academic Cloud Computing Initiative (ACCI) was announced as a multi-university project designed to enhance students' technical knowledge to address the challenges of cloud computing.
  • To provide an understanding of the basic concepts of parallel and distributed computing and their role in Cloud Computing.
  • To study the concept of Virtualization and relevant technologies available in the market.
  • To  understand the importance of Cloud computing for higher throughput.
  • To make aware about availability of various Cloud platforms. 
  • To study different application of Cloud and Cloud management techniques.

For More Information Click On This Video....

Applications of Cloud Computing.

Today cloud computing covers anything that involves delivering hosted services over the internet.
These services are generally divided into three categories:
  • Infrastructure-as-a-Service (IaaS),
  • Platform-as-a-Service (PaaS)
  • Software-as-a-Service (SaaS). 
  • Everything-as-a-Software(EaaS). 
Cloud Computing is the result of evolution and adoption of existing technologies and paradigms. The goal of cloud computing is to allow users to take benefit from all of these technologies, without the need for deep knowledge about or expertise with each one of them. The cloud aims to cut costs, and help the users focus on their core business instead of being impeded by IT obstacles.

Cloud computing shares characteristics with:
  • Client–server model.
  • Grid computing.
  • Mainframe computer.
  • Utility computing.
  • Peer-to-peer Networking.
  • Cloud gaming.
 

After Completing This Subject You are able to...

  • Understand the role of thread and process in distributed and parallel processing and can aware about the transformation of a stand alone or web based application from distributed  and/or parallel to Cloud application.
  • Understand the  principals of Cloud computing.
  • Ability to understand the concepts of virtualization.
  • Gain an exposure about Amazon Simple Work Flow Service for Java.
  • Aware about various services provided by Cloud Computing (SaaS, IaaS, HaaS etc…).
  • Gain an exposure about  various Cloud platforms available in the IT market.

15 Dec 2013

Why Computer Graphics is Selected as a Subject?

“Computer Graphics is the use of a computer to define, store, manipulate, interrogate and present pictorial output”.

Learning Objectives

  1. The objective of the course is to enable the students to:
  2. Gain basic understanding of the underlying theory of graphics display.
  3. Develop basic algorithms for the applications of Computer Graphics.
  4. Explore and apply graphics algorithms and primitives using the OpenGL language.

Computer graphics broadly studies the manipulation of visual and geometric information using computational techniques. A broad classification of major subfields in computer graphics might be: 
  • Geometry : studies ways to represent and process surfaces.
  • Animation : studies with ways to represent and manipulate motion.
  • Rendering : studies algorithms to reproduce light transport.
  • Imaging     : studies image acquisition or image editing.

Applications of CG

  • Computer Aided Design (CAD)
  • Computer Aided Geometric Design (CAGD)
  • Entertainment (animation, games,) ™
  • Geographic Information Systems (GIS)
  • Visualization (Scientific Vis., Inform. Vis.)
  • Medical Visualization

After Completing if Used as a Main Subject and Developed Skills then

                   Computer graphics designers will be in high demand amid a rise in the use of portable electronic and communications devices and electronic media. The BLS (Bureau of Labor Statistics) expects the number of jobs to grow by 61 percent from 2010 to 2020, which is much higher than the average for all occupations. Jobs for computer systems design companies will see the fastest growth rate, while computer graphics designer jobs in the advertising industry will be on the lower end of the scale.

                   According to May 2011 data from the Bureau of Labor Statistics, a computer graphics designer earns a mean annual salary of $48,690. The median salary is $44,010 per year or $21.16 per hour. The lowest 10 percent of earners make about $26,210 per year, while the top 10 percent earn $77,370 on average.


17 Oct 2013

General Information About Cracking.....

Cracking:-

Software cracking is the modification of software to remove or disable features which are considered undesirable by the person cracking the software.


 usually related to protection methods:
  • copy protection,
  • protection against the manipulation of software
  • trial/demo version,
  • serial number,
  • hardware key,
  • date checks,
  • CD check

                          The distribution and use of cracked copies is illegal in most countries. There have been varities over cracking software.The most common software crack is the modification of an application's binary to cause or prevent a specific key branch in the program's execution.
                       This is accomplished by reverse engineering the compiled program code using a debugger such as SoftICE, OllyDbg, GDB, or MacsBug until the software cracker reaches the subroutine that contains the primary method of protecting the software or by disassembling an executable file with a program such as IDA.
                          The binary is then modified using the debugger or a hex editor or monitor in a manner that replaces a prior branching opcode(operation Code) with its complement or a NOP opcode so the key branch will either always execute a specific subroutine or skip over it.
                            Almost all common software cracks are a variation of this type. Proprietary software developers are constantly developing techniques such as code obfuscation, encryption, and self-modifying code to make this modification increasingly difficult.
                                     Even with these measures being taken, developers struggle to combat software cracking. This is because it is very common for a professional to publicly release a simple cracked EXE or Retrium Installer for public download, eliminating the need for inexperienced users to crack the software themselves.
                                A specific example of this technique is a crack that removes the expiration period from a time-limited trial of an application. These cracks are usually programs that patch the program executable and sometimes the .dll or .so linked to the application.
                           Similar cracks are available for software that requires a hardware dongle. A company can also break the copy protection of programs that they have legally purchased but that are licensed to particular hardware, so that there is no risk of downtime due to hardware failure.
Another method is the use of special software such as CloneCD to scan for the use of a commercial copy protection application. After discovering the software used to protect the application, another tool may be used to remove the copy protection from the software on the CD or DVD.
This may enable another program such as
  • Alcohol 120%,
  • CloneDVD,
  • Game Jackal,
  •  Daemon Tools to copy the protected software to a user's hard disk.
                           Popular commercial copy protection applications which may be scanned for include SafeDisc and StarForce.In other cases, it might be possible to decompile a program in order to get access to the original source code or code on a level higher than machine code. This is often possible with scripting languages and languages utilizing JIT compilation.
                                      An example is cracking (or debugging) on the .NET platform where one might consider manipulating CIL to achieve one's needs. Java's bytecode also works in a similar fashion in which there is an intermediate language before the program is compiled to run on the platform dependent machine code.
                                          Advanced reverse engineering for protections such as SecuROM, SafeDisc or StarForce requires a cracker, or many crackers to spend much time studying the protection, eventually finding every flaw within the protection code, and then coding their own tools to "unwrap" the protection automatically from executable (.EXE) and library (.DLL) files.
                                          There are a number of sites on the Internet that let users download cracks for popular games and applications. Although these cracks are used by legal buyers of software, they can also be used by people who have downloaded or otherwise obtained pirated software.

Comments

© 2013-2016 ITTechnocrates. All rights resevered. Developed by Bhavya Mehta