21

P.I.N.G. 10.1

  • Upload
    ping

  • View
    249

  • Download
    10

Embed Size (px)

DESCRIPTION

Taking forward the legacy of its previous bearers, the Issue 10.1 introduces a new feature: the story of a startup which encourages its readers to fulfil their entrepreneurial ambitions. The interview feature entails an enthralling questionnaire with Mr. Kiran Deshpande, AirTight International. The featured article on Ethereum is best described by its subtitle 'Bitcoins on steroids' and the editorial feature on 'Machine Learning' peeks into the high octane world of machine intelligence.

Citation preview

Page 1: P.I.N.G. 10.1
Page 2: P.I.N.G. 10.1

Dr. Rajesh B. IngleBranch Counsellor

WWW.CREDENZ.INFO/PING SEPTEMBER 2014 P.I.N.G. ISSUE 10.1 2

The PICT IEEE Student Branch (PISB) was established in the Pune Institute of Computer Technology (PICT) in 1988 with the intent of amalgamating in its student members, an essence of a technical rationale and reason. PISB holds the merit of being one of the largest IEEE Student branches in IEEE Region 10.

Credenz ’14 brings with it a gusto and zest that is portrayed through a number of individual events which seek to give an impartial platform for students from institutions all over, adding ‘Cretronix’ to its quiverfull of competitions.

The PICT IEEE Newsletter Group (P.I.N.G.) is the official gazette of PISB issued bi-annually to concur with the two most cherished technical events hosted by PISB, Credenz and Credenz Tech Dayz. P.I.N.G. 10.1, like its preceding issues, moves to bring its acclaimed readership a multitude of technically rich and utterly enthralling writings. Our new feature, a review of a startup called ‘Anchanto’, which is a brainchild of our alumnus Mr. Vaibhav Dabhade, is truly a riveting read.

We thank our contributing authors and professionals for their intriguing articles, and hope to see and welcome them at Credenz ’14. A special thanks to our Design Advisors: Manali Desai and Tanveer Singh Mahendra, without whose support and assistance the culmination of this Issue would have been impossible. We would also like to acknowledge our junior volunteers for their diligent aid and perseverance to help make P.I.N.G. 10.1 a success.

Dear Readers,

I am happy to see the new edition of IEEE P.I.N.G. This unique activity of PICT IEEE Student Branch has established itself and made an impact all over. This newsletter provides platform for all the student members to showcase their talent, views and further strengthen IEEE activities.

It is a great pleasure to serve PICT IEEE Student Branch as a counsellor. This year is a very important year for all the members of IEEE Pune Section, as we are organising IEEE INDICON 2014 at Pune, from 11th to 13th December, 2014. During this conference, we will see many IEEE dignitaries including IEEE President Roberto de Marca, visiting Pune. I had an opportunity to attend IEEE Section’s Congress 2014 at Amsterdam, Netherlands during 21st to 25th August, 2014. This event was attended by more than 800 IEEE volunteers and staff from all over world. I am really happy to report here that Dr. Jayant Baliga is the recipient of IEEE Medal of Honour, 2014. We had seen Dr. Thomas Kailath receive this Honour in 2007. I could also meet Dr. Prasad Kodali from India who received IEEE Service Award in Honours Ceremony during Section’s Congress 2014.

At PISB, we try our level best to create an environment where students keep themselves updated with the emerging trends, technology and innovations. At PISB many events are conducted throughout the year and widely appreciated by students, acclaimed academicians and industry professionals alike. The events include IEEE Day, workshops, Special Interest Group (SIG) activities, Credenz and Credenz Tech Dayz. Credenz is the annual technical event held in September each year.

I thank all the authors for their contributions and interest. On behalf of IEEE Pune Section, I wish the PISB as well as this newsletter all success. I congratulate the P.I.N.G. team for their commendable efforts.

1 P.I.N.G. ISSUE 10.1 SEPTEMBER 2014 WWW.CREDENZ.INFO/PING

Page 3: P.I.N.G. 10.1

the

men

tor s

peak

sFlashback

It was the unlikely combination of my fascination with literature and technology that ultimately drove me to join P.I.N.G.

in spring 2012. Like others before me, and many after, I was intrigued with the range of opportunities and possibilities that a seemingly simple magazine had to offer. Talk to any former P.I.N.G. editor, and they’ll tell you that it’s the release of their very first magazine that is the most cherished moment of their short collegiate career in P.I.N.G. Those two months fuelled by ambitions placed well above mother Earth, would make us strive day in and night just to gain some altitude and live up to the high and mighty expectations of our seniors, but the end result, after all this, made us strut around like we’d discovered fire!

It was after the release of my team’s first issue that I realized the potential that P.I.N.G. had and its importance in an organization such as ours. I recognized it as a tool that can not only be a platform to express our ideas, but also as an effective medium of outreach. So, we thought of introducing P.I.N.G. at conferences and tech-events around the country thereby, spreading awareness about the activities of PISB alongwith showcasing technical literature authored by students, experts and academicians together. Wherever it was presented, P.I.N.G. was well received and as a result encouraged us to widen its reach and improve its content. It was at this moment that P.I.N.G. transformed from being a small college newsletter to a well

sought after technical magazine.

A great aspect of working as an editor in P.I.N.G. was that even under the able guidance of seasoned seniors, you were pretty much given a free leash on doing anything you wanted in the magazine. This practice was adopted early on, and its effect is seen in every issue brought out with something new to differentiate it with the previous issues, be it design or features. Even now, every editor who passes through P.I.N.G. leaves a visible legacy behind to be carried on by the next batch of editors and so on. In May 2013, I was appointed as one of the Lead editors of P.I.N.G. and we welcomed the new batch of P.I.N.G. editors from the junior year. Working with those exuberant and overly enthusiastic fresh minds gave me a whole new perspective of P.I.N.G. With no dearth of creativity around, we were able to introduce bold new features and further increase the popularity of P.I.N.G. In due time, we were in a position to get our crack enterprise sponsored and thus Credenz ’13 saw the release of the first issue of P.I.N.G. to be sponsored by a technical company.

Quite early on, I realized I had got into something that I truly loved doing. The things I learnt working in a team, applying myself to innovate, managing contingencies, and thinking out of the box has given me the exposure I would have hardly gotten elsewhere. More importantly, it gave me the opportunity to work with some of the brightest and colourful minds I have met, while collaborating in a team or competing in Doodle Jump. However, like most other things, my tryst with P.I.N.G. too had an expiration date. Even as I wished P.I.N.G. farewell, I knew I was leaving it in capable hands. Without further ado, I invite the readers of this new issue through P.I.N.G.’s famous adage:

Are you ready to be PING’d?

(Rahul belongs to the Class of 2014 and currently works as an Associate Consultant, Tibco Software Inc.)

3 P.I.N.G. ISSUE 10.1 SEPTEMBER 2014 WWW.CREDENZ.INFO/PING

cogn

osce

nti p

ens

dow

n

Will The Mainframe Survive?In an era of microchips and virtual cloud

Mainframe - is it still a viable option? This large, powerful computing system that supports many users,

services and extensive computing capacity, was traditionally programmed using COBOL. Mainframes are classic high-performance multi-processing systems, with certain advantageous distinctions as compared with supercomputers.

Nearly 800,000 out of 2 million world-wide COBOL programmers will retire in the near future. Close to 70% of the business transactions around the world run on Mainframe (COBOL), with Mainframes being used in business areas ranging from finance to airlines.

Mainframe CPU speed is measured in MIPS (Million Instructions Per Second). Most of the applications were developed using COBOL language interacting with various types of VSAM files such as ESDS, KSDS, RRDS (Database technologies prior to RDBMS). Later on, relational database DB2 was used. As COBOL improved, data storage started migrating from flat files to DB2. Some applications used PL/I language & databases such as IMS (Hierarchical Database) & IDMS (Network Database). However, the best combination was COBOL & DB2.

As the use of Mainframes flourished, performance became a key factor and Online Transaction Processing (OLTP) became essential, giving birth to the CICS - Customer Information Control System, and COBOL/CICS/DB2 became a deadly combination. Today, one will find that maximum number of applications on legacy Mainframes use this combination.Different technologies are used within each

organization. E.g. an organization’s HRMS and payroll may be on Oracle Apps, the intranet site could be developed using a SFDC framework and is uploaded on to cloud to provide access to their employees spread across the globe, but business applications are preferably run on Mainframes.

As technology is advancing today in mobile & cloud area, it’s putting a pressure on Mainframe platform to perform better. IBM - the supplier of world’s 90% of Mainframe systems, too, is advancing with equal speed

to enhance hardware & software in primary, secondary storage & CPU speed.

Many organizations still prefer their data and business logic to be on Mainframe whereas the UI is developed using latest technology. Today,

when you log on from your mobile device on some application, it creates multiple transactions on the Mainframe side which demands Mainframe to perform better and faster every day. With architecture getting improved from client/server to Service Oriented Architecture (SOA) and Enterprise Service Bus (ESB), IBM comes along with middleware products such as MQ Series & IBM Websphere. IBM leads in providing such products for more than a decade in a row that help various organizations in integrating their applications seamlessly.

Cloud technology and the like may give a tough fight in the near future but only time will tell if the classic horse will continue to race along!

-Santosh KulkarniDelivery Manager

ZenSar Technologies

WWW.CREDENZ.INFO/PING SEPTEMBER 2014 P.I.N.G. ISSUE 10.1 4

Rahul Baijal, Former Editor, P.I.N.G.

Page 4: P.I.N.G. 10.1

the

edito

rial

Machine LearningCan a machine know us better than ourselves?

Quoting science-fiction writer Issac Asimov, “I do not fear computers. I fear the lack of them.”, lets

reminisce for a moment about the world we live in- coffee machines, MRI scans and the constant buzz on our latest smart-phones. Now imagine for a minute. A coffee machine that makes a unique coffee blended to your mood, equipment that pre-warns you about upcoming health issues and cell phones that recognize you by how you handle them. Welcome to machine learning, where your habits, penchants and choices compile to make you feel like you really are on a star trek.

To understand the language in which machine learning is expressed and understood, we have to look at the grass root-level. “Computational Learning Theory” does just that, it studies the performance parameters of algorithms and decides their feasibility. It takes into consideration factors like time complexity and resource allocation. An interesting insight into this theory was proposed by Leslie Valiant in 1984: A learner is provided with samples and is asked to select a generalization function  (“hypothesis”) so that any concept given its arbitrary approximation ratio, probability of success, or distribution of the samples, can be learnt. When designing an application integrated with machine learning, the golden rule as recommended by machine learning wizard Pedro Domingos is given as follows: (Fig. 1)

The fundamental model of machine learning is, always measure the performance of your classifier on out-of-sample data. A classifier behaves like a learning curve. It is a system that inputs a vector of discrete and/or continuous training values and outputs a single discrete value called the class. It is very unlikely that the exact examples in the training set will recur at test time. Another major consequence is that data alone is not enough. We could facilitate this better with an example.

Consider that we are trying to locate a good diner in our neighbourhood, without having to eat at every single one in that area. How could we go about this feat? We could take a look at their menus or get reviews from our friends and family. We could probably get a hearty meal at a good diner if not necessarily the best one. Every learner must then embody some basic assumptions beyond the distinct data supplied to it in order to generalize and arrive at the closest, if not the best possible outcome.

Our algorithm will work with 100 % accuracy with training data present in the classifier, but could give 60% accuracy for test data. In order to solve this problem of over-fitting, we then decompose the generalization error into bias and variance, where bias is a learner’s proclivity to consistently learn the same wrong thing and variance being the tendency to learn random things irrespective of the read signal.

5 P.I.N.G. ISSUE 10.1 SEPTEMBER 2014 WWW.CREDENZ.INFO/PING

Recent developments in behavioural targeting have helped improve our understanding of machine learning better. Any kind of collaborative filtering assumes that, preference for a certain service is static. The subsequent pigeonholes that result are avoided by implementing response modeling, which believes that the users who agreed on a service once, may not agree in

the future. Response modeling estimates the probability of the response for each offered service where profile data serves as training data doing away with statistical restrictions, making our machine learning experience more dynamic.

Spotzot is a behavioural marketing startup which anonymously captures the consumer’s unique ID, along with his location and intent based on product category and keywords such as mall or brand, each time a customer makes an API call to access their offers. By tracking the ongoing buying behaviour of each visitor, Spotzot is able to present consumers with a personalized experience that showcases deals from their favourite brands, items, and merchants wherever they go.

In the field of natural language processing, amassing data points for input key reference is being refined further by linking the World WideWeb to our machine learning experience. With the advent of machine learning, scientists hope to prognosticate some deeper traits like machiavellianism, narcissism and psycopathy with data obtained from social –networking sites thereby precluding a crime

from taking place.

IBM has now envisioned a c loud-based c o g n i t i v e system where t e a c h e r s would be able to create a personalized syllabus for students and address their k n o w l e d g e gaps thus, n a r r o w i n g the horizon

between their understanding and the content to be taught. Machine learning will help monitor a student’s development and enable teachers to modify their teaching based on the data analyzed. Gamification elements can also be included depending on a student’s interest and his drive.

Jeff Hirsch, CEO of AudienceScience,  jokes that 10 years down the line we might look back and laugh that we ever had to search something on Google in order to find it. Our machines will predict our requirements even before we know it and integrate life-long learning agents making them more human-like. Such is the divination of machine learning. Our future is here, in the now.

-The Editorial Team

WWW.CREDENZ.INFO/PING SEPTEMBER 2014 P.I.N.G. ISSUE 10.1 6

Fig. 1

The Polaroid PoGo™ It is a small portable printer that produces full color 2” x 3” prints using an “inkless” technology. The images are created from heat activated crystals in the photo paper. The photos are water proof, tear proof and smear proof.

Page 5: P.I.N.G. 10.1

star

tup

The Story of An EntrepreneurAn endeavouring journey

Entrepreneur rockstar Steve Jobs decided to name his company ‘Apple’, as it would come up before its rival Atari in

the phonebook. Anchanto’s Vaibhav Dabhade is made from the same mould. He wanted to create something that is very enchanting, like a magical spell, so he zeroed in on “Anchanto” as the masthead for his startup. From a Polytechnic college to a fledging business in Singapore, P.I.N.G. chronicles the journey of a student, an entrepreneur and his startup.

School Days:Despite his many talents, Vaibhav describes himself as a “Student who only attended practicals at PICT.” What stands out here is the need for practical knowledge and the courage to avoid following the crowd, to make a mark for himself. “I did attend a lot of practicals, used to hang out in the PICT computer labs, which used to be open till late night. Did a lot of work in the labs.” Further executive MBA program stints at the prestigious IIM-C and Harvard Business School only sharpened the gut instincts that he says are a part of his upbringing and personality. Moreover, it served another purpose- networking with other talented individuals of similar ink.

“It was amazing to go to IIM Calcutta for my executive education there. It was nice to network with people coming from different companies for their executive education. I attended managerial excellence program there. It was very good, getting a perspective from different companies at that age and the experience was very good. Attending IIM after some industrial experience was definitely very helpful. Harvard Business School was great. I was happy to be there, such a historical institution. Great professors, great colleagues, very good networking opportunities too, to connect with different people.”

The beginning:Earning quarter million dollars as salary, working at a senior position in a multinational company, Vaibhav was living the ‘Indian Dream’. But beyond the comfort and security of the clichéd nine-to-five job, there was always a desire to lead a life out of the ordinary. “So it was always an ambition to do something from scratch, I was always waiting for a good time to have enough experience and savings to start a business”, says the founder-CEO of Anchanto.

An entrepreneur’s dream, a vision to succeed and a small office-space in PICT was all Anchanto needed to embark on its journey. But one can’t just start up a company without risking it all. ”Virtually sold everything I had. Everything.”, reminisces Vaibhav.

7 P.I.N.G. ISSUE 10.1 SEPTEMBER 2014 WWW.CREDENZ.INFO/PING

Then came the mistakes:Building an operation from ground up is not that easy, and Vaibhav admits that Anchanto has had a steep learning curve. In his own words:“I’ve made mistakes. Every day there is a mistake. You always make mistakes. Sometimes they are small, sometimes big. It’s a part of life. One of the mistakes that I can share is when we developed our first product, we did not listen to the market. We had a vision; we implemented something that we thought will work but we failed miserably. Second mistake I think I made is I had a few wrong team members back in our India Development Center, so removing them was a very painful process. Few other mistakes- one more to share, more critical one- I think I delayed some of the support functions- recruitments and getting people on board, those are the major ones.”

And Anchanto has surely evolved. For one, take timing, which is everything when it comes to taking decisions in a business. Vaibhav is pretty clear on this topic when he explains how you could be ahead of time, and nobody would want to buy your product. ”You could be behind time and the market is already saturated. So you’ve got to make sure that the product and the consumer are ready for each other at the same time. You need to get a correct product in the market at the correct time otherwise, it will not fly.”

Today, Anchanto helps e-commerce companies scale their products by handling everything after the company deploys its products, uniquely providing for the back-end needs of e-commerce companies by managing everything from inventory to delivery.

Life at Anchanto:Every successful startup comes down to three

things: People, Profit and Planet. Profit and Planet follow if one can manage people, and a good work culture is vital to bringing out the best in people. At Anchanto, no one is treated as an employee or a resource, but as a team member. Everyone has the freedom of working according to his methods, to get the right blend of creativity and efficiency, empowering them to deliver the best results.This holistic approach has helped Anchanto grow out of the startup phase and elevated it to the next stage. A good product, an excellent service, and a dynamic work culture have propelled Anchanto to expand at an exuberant rate. Several venture capital firms have invested in the company, and there has been a Series A round recently.

Will Anchanto be the Next Big Thing in e-commerce? Only time can tell. But Vaibhav’s resilient voice resonates with ambition and determination as he reveals his plans for the future, “We’re growing pretty fast, perhaps exponentially. Five years down the line, we want to be the biggest in Asia. That’s our ambition, let’s see how it goes.”

We thank Mr. Vaibhav Dabhade for his time and contribution to P.I.N.G.

-The Editorial Team

WWW.CREDENZ.INFO/PING

“So it was always an ambition to do something from scratch, I was always waiting for a good time to have enough experience and savings to

start a business.”

SEPTEMBER 2014 P.I.N.G. ISSUE 10.1 8

Page 6: P.I.N.G. 10.1

tech

virt

uoso

Quantum TunnelingTranscending into the electronic future

Newtonian or classical mechanics is developed based on the principle of mechanical motion of the

macroscopic bodies. Modern technology is developed mostly by using the properties of microscopic particles like electrons and photons. Classical mechanics fails to explain all the behavior of microscopic particles. Hence, quantum mechanics is developed which can explain the behavior of microscopic particles satisfactorily. Also, it provides new dimensions in advanced technology. For example, a p-n junction diode conducts only when it is forward biased, above its cut-off potential. With the help of quantum mechanics it is proved that a specially designed p-n junction diode also conducts remarkably when we apply voltage below its cut-off voltage. This phenomenon is explained by the quantum mechanical behavior of electrons or quantum tunneling. It is the behaviour of electrons wherein they travel through a barrier which they cannot pass, ordinarily. The quantum mechanical behavior of electrons is used to design many electronic, medical and computer devices in modern technology.

High frequency switch

A heavily doped p-n junction diode of thickness 100 A0 is used for this purpose. The heavy doping results a broken band gap in which conduction band electron states on the n side are more or less aligned with valence band hole states on the p side such that electrons are able to tunnel the junction even at a voltage far less than its cut-off voltage and diode respond appreciably and quickly. This property is used to design tunnel diode which acts as high frequency switch.

Analysis of DNA samplesScanning Electron Microscope (SEM) fails to analyze the DNA samples properly because of its biological nature as it disturbs the ultra high vacuum conditions of the microscope. So Scanning Tunneling Electron Microscope (STEM) is designed which can be operated at normal vacuum conditions. An extremely fine probe of atomic order is held very close to the sample. Electrons tunnel from the surface of the sample to the probe of stylus producing an electrical signal. Nowadays, this technique has been used to study the details of DNA samples for incidents like crime, accidents.

Diagnosis of BrainSuperconducting Quantum Interface device is used to detect the problems related to brain like tumor and generation of cancer cells such that it can be prevented at an early stage. When two superconductors are separated by a thin insulating layer it conducts, even without applying voltage. This is due to the tunneling of cooper pair (which is formed at superconducting stage) between them. Magneto encephalography is designed with this principle which acts as a non-invasive method of recording minute magnetic fields emanating from the brain.

Digital data storageRecent research in Single Electron Transistor

9 P.I.N.G. ISSUE 10.1 SEPTEMBER 2014 WWW.CREDENZ.INFO/PING

(SET) provides new ideas which are going to revolutionize the random access memory and digital data storage. Also, it is suitable for ultra low power and high speed applications. Modern technique of lithography and nanotechnology makes it possible to confine electrons to sufficiently small dimensions (10 nm) such that the quantization of both their charge and energy are easily observable. Such confined electrons are allowed to tunnel through two tunneling junctions: i) to a drain and to a source electrode ii) through a capacitor to a gate electrode, a single electron transistor is formed. This transistor turns on when one electron is added to the “small island” and turns off when it is removed. These on and off states provide the ones and zeros that digital computer needs for calculation. The behavior of this device is purely quantum mechanical. Due to the quantization of electronic charge and energy, logic operations can be performed based on not just the electrical charge of carriers but also their spin. As an example, information can be transported or stored through the spin-up or spin-down states of electrons. This is a new area of research, and issues include the injection of spin-polarized carriers to store the information.

Ultra sensitive microwave detectorAnother important application of SET which is based on the principle of quantum tunneling is referred as microwave detector. At low bias voltages and temperatures a single quasi particle may only be introduced to the island through photon assisted tunneling. Once this happens, the quasi particle is trapped on the island because it takes long time to tunnel off. When it is trapped, charge is transported through the system at the rate of two electrons at a time. Since photon assisted transition merely switches the detector current on, this device is not limited to one electron tunneled through the system per absorbed photon. This makes the device extremely sensitive and potentially useful detector for microwave radiation.

Quantum Tunneling has now opened up new vistas in this technical evolution and promises to build more potential applications, winning over the trivial technologies.

-Dr. K.C. NandiProfessor in Physics

Pune Institute of Computer TechnologyPune

WWW.CREDENZ.INFO/PING SEPTEMBER 2014 P.I.N.G. ISSUE 10.1 10

TRRAM-Transparent Resistive Random Access Memory, is world’s firsttransparent computer chip. The technology could enable the windows or mir-rors in your home to be used as computer monitors and television screens.

Page 7: P.I.N.G. 10.1

Titan The world’s fastest supercomputer

Titan is not the comeback football team. Titan is a supercomputer by  Cray  at  Oak Ridge National

Laboratory  used in a variety of science projects, ranking as the world’s fastest. Titan can crunch so many calculations; it has the equivalent processing power of 500,000 laptops.

In 50 years computers have roughly doubled in speed every 2 to 2.5 years, regularly increasing the performance of electronic devices and giving hardware and software designers a comfortable knowledge of what’s ahead and how best to prepare for it. Titan’s best chance of achieving exascale computing power rests with an architecture that utilizes more powerful nodes than any systems in place today. This will be achieved via a marked increase in the number and the types of processing cores. These days performance is enhanced by essentially just ramping up the number of Central Processing Units (CPUs), Titan’s hybrid architecture will couple different types of processors, allowing each to do what it does best, thus increasing

the power and efficiency of the overall machine. Specifically, Titan will incorporate the familiar AMD Opteron CPUs alongside general-purpose Graphics Processing Units (GPUs). The point of view for Titan’s hybrid, multi-core architecture is twofold: one is to increase computational power, and the other is to accomplish this exponential increase in computing power with only a slight increase in power consumption, a major expense when you’re dealing with the most powerful machines in the world.

All that computing might is for nil without software capable of managing it. Software is a major although an unsung factor in the future of high-power computing. It will matter increasingly to businesses of all kinds as more and more products and services move into the cloud. Adaptive Computing has revealed that it developed the software that boosted Titan’s efficiency from 70% to about 95% which is similar to the software that optimizes the cloud. Software of Titan uncovers and exploits three levels of parallelism: distributed, in which a task or

11 P.I.N.G. ISSUE 10.1 SEPTEMBER 2014 WWW.CREDENZ.INFO/PING

physical domain is divided among a number of nodes; thread level, in which each task from the distributed workload is divided into discrete threads of execution on local processors; and vector level, in which the threads are further divided and sent to the GPUs for increased performance.

Titan employs  AMD Opteron  CPUs in concurrence with  Nvidia Tesla  GPUs to improve energy efficiency while providing a monumental increase in computational power over Jaguar. It uses 18,688  CPUs paired with an equal number of GPUs to perform at a theoretical peak of 27 petaFLOPS; in the  LINPACK benchmark  used to rank supercomputers’ speed, it performed at 17.59 petaFLOPS.

The number of AMD Opteron cores that Titan uses amounts to a whopping 2,99,088- a power equivalent of over 50 million FP32 CUDA cores, approximately. There are more than multiple dozens of 10Gb ethernet links inbound to the machine. It is predicted that the next round of upgrades will take Titan to around 20-30PB of storage, at peak transfer speeds of 1TB/s.

Titan is available for any scientific purpose; access depends on the importance of the project and its potential to exploit the hybrid architecture. Any selected code must also be executable on other supercomputers to avoid sole dependence on Titan. Six vanguard codes were the first selected that dealt mostly with  molecular scale physics or climate models. The inclusion of GPUs compelled authors to alter their codes. The modifications typically increased the degree of parallelism, given that GPUs offer many more simultaneous  threads  than CPUs.

The combined use of CPUs and GPUs is not new to the computing world, but Titan’s selection of the peripherals and port

usages brings an extremely tolerant, stable and high-throughput processing system over an extremely large scale deployment. This is one of the most brilliant outlooks of the engineering involved in the Titan’s development, allowing it to perform about 20 quadrillion calculations per second. Titan’s computational abilities could be applied to solve critical and complex problems in various areas such as astrophysics, biology, earth science and chemistry. Titan could easily run more than five of these supercomputing jobs at ‘once’.

Titan is the first step towards ensuring America’s exascale future. With Titan, the world has embarked on a new era in simulation, one sure to contribute immensely to science and our competitive technological future. China’s latest Tianhe-2 Supercomputer technically outperforms the Titan, however Titan being extremely scalable, another iteration of the revolutionary supercomputer would most certainly bring in a power-beast of unparalleled computing strength.

-Sharmila KarpeWalchand Institute of Technology

Solapur

WWW.CREDENZ.INFO/PING SEPTEMBER 2014 P.I.N.G. ISSUE 10.1 12

Wifi Backscatter University of Washington engineers have designed a new communication system that uses radio frequency signals as a power source and reuses existing WiFi infrastructure to provide Internet connectivity to these devices. This technology is the first that can connect battery- free devices to WiFi infrastructure.

Page 8: P.I.N.G. 10.1

feat

ured

arti

cle

Julian Assange’s Wikileaks had shaken up the entire world. Centralised Agencies were always suspected of misconduct,

but WikiLeaks provided evidence. Edward Snowden’s whistleblowing acts sparked a revolution of decentralization of the web. Agencies and authorities like CIA,NSA or even Facebook and Google couldn’t be trusted. A need for a trustless, decentralized setup was felt. This gave birth to the concept of Web 3.0. It seeks to decentralize everything on the internet to provide better security and privacy. Ethereum is one vision which aspires to achieve such decentralisation.

When 19yr old hacker Vitalik Buterin joined the Bitcoin Magazine, he realized the true scope of the bitcoin technology. He also realized that the bitcoin setup had some drawbacks which prevented the use of bitcoin for applications other than cryptocurrency. Bitcoin works on the concept of blockchain. A blockchain is a public ledger of all bitcoin transactions that have ever been executed. It is constantly growing as ‘completed’ blocks are added to it with a new set of recordings. The blocks are added to the blockchain in a linear, chronological order. The blockchain

determines the order of transactions. However, bitcoin has a design flaw. It allows you to direct a few BTC to a merchant, wait for the delivery and then send the same BTC to yourself and try to convince the network that your BTC arrived first. Additionally, the scripting language in bitcoin isn’t Turing Complete (a Turing complete language can solve any problem that can be defined mathematically given infinite space and time). It doesn’t support loops to avoid infinite loops during transaction verification. This cripples the ability of a programmer to develop applications. It is limited to ensure security. This is the reason why it is so hard to fork bitcoin. Developing applications on the bitcoin setup is difficult. That is where ethereum comes in.

Ethereum is a modular, Turing-complete contract scripting system married to a blockchain. It is designed with a philosophy of simplicity, universality and non-discrimination. It provides a built-in Turing complete scripting language called Ethereum Script, which is basically a stripped-down version of Python and is designed specifically for building blockchain based applications.

13 P.I.N.G. ISSUE 10.1 SEPTEMBER 2014 WWW.CREDENZ.INFO/PING

It allows generation of applications like Decentralized Domain Name Systems in just 5 lines of code. Decentralized DNS allows high resistance against internet censorship and DDoS attacks. It is harder for government agencies to block websites. This enables superior protection against internet censorship. Ethereum makes use of the philosophy of bitcoin to achieve far more than just cryptocurrency.

The founders of ethereum believe that developers can develop smart contracts in order to make middlemen and government agencies redundant. Some bitcoin experts say that ethereum could lead to the birth of the first ‘autonomous organisation’ which will be run completely by bots. Ethereum could also be used for applications like peer-to-peer gambling. Two people can submit money to a contract generated by the ethereum script. Once a contract is programmed with proper logic, nobody can cheat. It eliminates the need of a bookie. Advanced contracts on ethereum can also allow decentralized banking like setting up of a savings account and almost any other task.

Smart contracts, cryptographic “boxes” that contain value and only unlock it if certain conditions are met, can also be built on top of the platform, with vastly more power than that offered by bitcoin scripting because of the added benefits of turing-completeness, value-awareness, blockchain-awareness and state.

In ethereum, the state of a block is made up of objects called “accounts”, with each account having a 20-byte address and state transitions being direct transfers of value and information between accounts. An ethereum account contains four fields:i) The nonce, a counter used to make sure each transaction can only be processed once ii) The account’s current ether balance iii) The account’s contract code, if present

iv) The account’s storage (empty by default)Like bitcoin, ethereum has a token. Ethereum runs on ‘fuel’ called ether. Developers and Machine providers can buy ether to get returns in exchange for developing applications on ethereum. Ether can currently be bought using Bitcoins. The genesis sale of ether in July 2014 was one of the most successful crowd-fundings ever. In just two weeks, over $ 13 million worth of ether was bought. This money will be used to develop applications and to pay for more and more staff and developers at ethereum. In general, there are three categories of applications that can be built on ethereum. The first is financial applications. It allows development of sub-currencies, hedging contracts, savings wallets, wills and even full-scale employment contracts. The second is semi-financial where along with money there is heavy non-monetary side involved. The third includes applications like voting and decentralized governance. Another application is decentralized file storage where users can rent out some space on their personal hard drives to earn money while driving down the cost of file storage.

Like bitcoin, ethereum is a shaky concept. However, if it succeeds, it will revolutionalise the way this world works. It is a concept worth putting your money on. Ethereum co-founder sums up the project beautifully. “I like to look at the ethereum project as a blank canvas, where anyone can create digital masterpieces. The technology behind it serving as a catalyst, enabling people to unfold their innate playful creativity. If the network and blockchain were to be the canvas, then the paints and colors would be the lines of code running transparently and censorlessly on top. Everyone is invited to co-create.”

-Aditya ShirolePune Institute of Computer Technology

Pune

WWW.CREDENZ.INFO/PING SEPTEMBER 2014 P.I.N.G. ISSUE 10.1 14

EthereumThe open, yet your trusted protocol

OLEV Online Electric Vehicle, a technology developed by Korea Advanced Institute of Science and Technology, uses wireless power transfer method. It is based on electromagnetic resonance principle and uses magnetic materials in both transmitter and pickup elements to transfer the power wirelessly.

Page 9: P.I.N.G. 10.1

DarknetSo dark the con of man

Some people believe in a hidden dimension where spirits coexist and interact with us. That might or might

not be true, but there absolutely is a hidden dimension in cyberspace. Alternatively called the Deep Web, the darknet is both a haven and a playground for those with a criminal intent. Darknets are small niches of the Deep Web, which is itself a catch-all term for the assorted Net-connected stuff that isn’t discoverable by the major search engines.

Darknets are distinct from other distributed peer-to-peer networks as sharing is

anonymous (where IP addresses are not publicly shared), and thus users can communicate with little fear of governmental interference. Recently darknets have been discussed in many fields of network security, largely because users who occupy such areas access it for various reasons. Some publish on darknets out of privacy concerns or for fear of political reprisal, while others publish on darknets for criminal gain.

One might think himself, “Why let such dangerous information get out in this world and create a chaos?” However, there is also a bright side of the darknet. The idea of the darknet is based upon three assumptions:

Any widely distributed object will be available to a fraction of users in a form that permits copying; Users will copy objects if it is possible and if they are interested in doing so; and Users are connected by high-bandwidth channels. The same anonymity that makes Onion land a haven for weapons dealers and perverts also makes it a bastion of a more noble cause: Free speech.

Many countries lack the equivalent of the United States’ First Amendment. Darknets grant everyone the power to speak freely without fear of censorship or persecution.

According to the Tor Project, anonymizing Hidden Services have been a refuge for dissidents in countries where the exchange of ideas is frowned upon; and served as mirrors for websites that attract governmental or corporate angst, such as GlobalLeaks, Indymedia, and Wikileaks. The Tor Project says that authorities offer similarly secure tip lines, and that some militaries even use Hidden Services to create online secure command and control centres.

Anyone can access this hidden internet very easily, but caution is necessary while exploring this territory. There is a ton of unsavoury content as well as a large number of criminals – and being caught up in criminal activity is possible!

-Utsav MundadaPune Institute of Computer Technology

Pune

15 P.I.N.G. ISSUE 10.1 SEPTEMBER 2014 WWW.CREDENZ.INFO/PING WWW.CREDENZ.INFO/PING SEPTEMBER 2014 P.I.N.G. ISSUE 10.1 16

Mind-playThrow trucks with your thought

‘I think, therefore I am’ If this is the most admirable quote then what about the new technology which can

be described as, ‘Think and Play?’

Yes, now it is possible to play video games without using traditional devices like joystick, but just with mere thought. This new technology is recognised as ‘Neurogaming’. This technology uses non-invasive brain computer interface that incorporate the player’s neurological or other physiological functions into virtual action. It uses devices like EEG (electroencephalograph) head-sets, which record electrical activity along the player’s scalp. Neurogaming integrates a broad array of inputs, including a player’s heart rate, brain waves, pupil dilation, hand and body gestures, and changing emotional state to drive such rich game play. Neurogame developers use increasingly sophisticated sensory, emotional, cognitive and behavioural technologies to create deeply adaptive and radically compelling gaming experiences. Neurogaming is ideally suited to take advantage of output technologies like augmented reality and virtual reality

to make entirely new gaming experiences possible. Zack Lynch, executive director of the Neurotechnology Industry Organization, in a Neurogaming Conference and Expo which was held in May,2014 said, “It is about integrating your whole nervous system into the gaming experience.” Imagine, players would smash boulders by concentrating or scare away demons with angry facial expressions, comparably, sensors that pick up on changes in your voice tone and pitch as you give commands would drive your squad to react differently depending on how the command is given.

The technology is still a tyro, yet there are companies who have already launched applications based on neurogaming. Google’s Project Glass already has game designers chomping at the augmented reality bit. Project glass is a head mounted display that highlights information in hands-free way driven by sense and voice commands. Throw Trucks With Your Mind is a multiplayer-focused game where you can throw trucks with your mind. Using your brainwaves, you unleash your psychokinetic powers on other players. No guns, no gimmicks. The game uses a first person shooter. A gamer will fight entirely through NeuroSky’s Mind Wave mobile headset peripheral that reads the electrical activity of your brain. Mind Light is a video game aimed at children 8-12 years of age and is based on evidence- based principles of intervention with anxiety-disordered children and adults.

While mobile screens and flat screens dominate our visual senses today, it won’t be much longer before our eyes get hit with full flavours of visual amazement as augmented reality and virtual reality output technologies finally hit the mainstream.

-Swamini H. LungeP.R.Pote College of Engineering

Amravati

tech

nocr

ats

Page 10: P.I.N.G. 10.1

CymaticsAn acoustic spectacle

We always feel that sound is something that we hear. Have you ever thought that it is possible to

‘visualise’ sound and create energy patterns? This science of visualising sound is termed as Cymatics, which offers a number of useful applications to mankind.

Visualising Sound We all are aware that sound is a form of energy that creates in us the sensation of hearing. It is in the form of longitudinal waves. Hence, one would wonder how sound can be visualised. Very loud sound can be visible due to the vibrations it induces in objects nearby, like a wine glass being shattered due to voice resonance. But studies have also proved that sounds of different frequencies have been able to produce different patterns in particles which were placed on a vibrating medium. It is believed, that sound has some influence on the structure of elements in nature since they resemble some natural structures. Its valid explanation would be, sound produces patterns in liquid-like paste, sand or fine particles placed on a plate

vibrating by means of a driving source of a fixed or changing frequency. Cymatics, is the art of visualising sound by

observing a vibrating plate or membrane with fine particles or a liquid on it. The vibrations in the plate may be induced by a sound driver fed by a frequency generator. Due to the vibration of the surface, the particles have been viewed to rearrange themselves, forming a pattern on it. This is caused as a result of the varying intensity of vibrations on different regions of the vibrating surface which is dependent on the frequency of the driving source and the geometry of the surface. These patterns display the effect of cymatic frequencies on water, oil and other bodies poured in cymascope.

Observations:It has been observed that as the frequency of the driving force is increased, more intricate patterns are formed on the vibrating medium. Very often, sounds and music produce patterns that replicate patterns in nature like the internal structure of a snow flake, the crystalline structure of a diamond

17 P.I.N.G. ISSUE 10.1 SEPTEMBER 2014 WWW.CREDENZ.INFO/PING

etc. A plasticiser substance will always form a spherical ball when placed on a vibrating membrane due to the wave trains produced by it. Spores of club moss have a tendency to form circular shapes which are constantly moving outwards from the centre and pulling towards the centre at the periphery of the circular formation when placed on a vibrating membrane. These Chladni patterns are thus like a ‘negative’ of the wave shape moving through the plate as the particles are gathering where the wave is not present.

The Science related to Cymatics:The formation of beautiful patterns due to the sound acts like a bridge between Science and Arts. This may have a connection with the String Theory which states that everything is made up of one dimensional strings which can form any shape and vibrate. An electron is also considered to be a ball of string if seen under a very powerful microscope. Thus the String Theory is a way of stating that everything in any dimension of the universe is created by vibration of cords of energy (Strings). However, the String Theory is still under development and we do not know all the facts yet. Some scientists believe that the

entire universe might have been formed due to Cymatic Effect. According to the Big Bang model, the universe was concentrated at a single dense and hot point after which the Big Bang occurred and there was an expansion of the Universe, leading to many explosions and chemical reactions and the formation of sub atomic particles. Even today, the universe is expanding. Researchers believe that it was the sound of the explosion which caused vibrations leading to the formation of different objects made of sub-atomic particles which comprise of the various elements of nature today. Thus sound is said to affect the structure of everything right since the universe was formed from sub-atomic particles to cellular level.

Applications:Cymatic theory can be used in studies working towards interpreting the complex sounds produced by dolphins by using SONAR beams. The various patterns visualised as a result of these sounds are interpreted to create a dictionary of the Dolphin Language based on object displayed in front of the dolphin.

This theory is used in Cymatic Treatment as well. Since the vibrations produced patterns, it was believed that vibrations are responsible for evolution. Thus, a set of frequencies that match the natural frequency of a particular region of the body can be transmitted to the diseased area in order to make it healthy again.

In a few years from now, doctors will be able to prevent the slowdown of aging by recording the frequency of their DNA when they are young and transmitting that frequency to their cells when they get old, in order to rejuvenate them, hoping to challenge mortality!

-Supratika BanerjeePune Institute of Computer Technology

Pune

WWW.CREDENZ.INFO/PING SEPTEMBER 2014 P.I.N.G. ISSUE 10.1 18

Vantablack A UK based company manufactured a material actu-ally blacker than black, using carbon nanotubes. When a photon hits the nanotubes, it is absorbed and converted into heat. Light goes in but cannot come out!

Page 11: P.I.N.G. 10.1

While a cluster of four particles connected to a central sphere can have two states like a conventional bit, a 12-particle cluster could have around 8 million unique states, representing 2.86 bytes of data or about 23 conventional bits. Based on this calculation, the team has proposed that just a table spoonful of this ‘digital colloid’ could sum up to one terabyte of storage space. Such a large storage scale sounds fictitious and expensive as well, but Sharon Glotzer ensures that currently efforts are being taken to use cheap materials that could not only fill spoons, but buckets without being too heavy on our wallets.

Advantages: Like noted earlier, a liquid hard drive would take infinitesimal amount of space for itself, and yet provide its users with a large digital storage space. In fact, somewhere in near future, we may actually carry it in vials, perhaps tied along our necks, like pen-drives but with larger storage capacities.

Limitations: Klaus-Peter Zauner of University of Southampton, UK, has noted that there is no evident way as of yet to read from and write data to large numbers of clusters floating in a liquid.

Potential applications: The liquid form of data storage may first get

implemented in the field of robotics, and hence artificial intelligence could benefit largely.

As noted by Sharon Glotzer, this ‘wet computing’ makes use of biocompatible nanoparticles, which can be easily associated with the human body. This could make ‘human-computer interfaces’ or biologically friendly ‘neural implants’ possible. These neural implants may then show the potential of assisting human brain in accessing additional information or calculate computational tasks. All this can be done without using a complex calculator. This could allow individuals to learn new information at rates like never before. Another implementation could be a sensor for primarily keeping a tab on glucose levels of diabetes patients, by introducing this digital fluid into their bloodstream. ‘Passive sensors’, which could be used for signalling when food that is packed gets spoiled, could also be made.

Of course, realizing such an intricate idea may take sometime, but serious work has already begun in that direction. Reading and writing into liquid is still a major setback that Ms. Glotzer would be dealing with, till then though, our hard drives surely remain solid!

-Shamli SinghPune Institute of Computer Technology

Pune

WWW.CREDENZ.INFO/PING SEPTEMBER 2014 P.I.N.G. ISSUE 10.1 20

Electronic ‘Nose’A highly sophisticated embedded control unit, consists of fifteen commercial sensors, a data acquisition system and a computer connected together as a system. It “smells” or registers the gases in the environment, processes the data obtained using a recognition pattern and warns the presence of other gases.

Liquid Hard Drives1 TB in a tablespoon!

Since the advent of data storage devices in 1952, there has been a speedy revolution in their shapes and sizes. It all started

with magnetic tapes to hard drives, magnetic disks and virtual memory. Hard drive has managed to survive the longest in this genre. It was built by Seagate Technology in 1980 first; although there has been a considerable reduction in its size over the years, the one thing that has been common in all these years was its state – solid.

As the second half of this year rolled by , researchers have set out to introduce liquid state in this area. A certain liquid, yet unnamed by them, along with specific plastic nanoparticles deposited on it, is about to become the next trend in hard drives. Principle: A regular Rubik’s cube solver may already know that it can be twisted in only certain ways around a central point. The same principle applies here. Clusters of spheres of nanomaterial used for storing data can be arranged around a central sphere in a limited number of ways. The team of researchers at University of Michigan, headed by Sharon Glotzer and David Pine, realized these states could represent information.

The idea was tested by using five nanospheres in a liquid. They switched naturally between just two states, like the conventional 0’s and 1’s of computing bits.

How does it work? Fluids or ‘soft matter’ are being used, which includes all liquids, foams, polymers as well as some biomaterials. The most significant point with respect to this is that, all these materials behave differently at different temperatures, and their behaviour is almost predictable. The physical changes involved are changes in shape at molecular level. A colloidal solution of specially designed, dimpled, plastic nanoparticles has been

used to demonstrate the idea. Being a colloidal solution means that the particles do not dissolve permanently, and retain their required properties.

When liquids are heated, particles re-orient themselves in predictable ways. In this study, the nanoparticles were arranged in groups of four or more with a central binding sphere for the cluster. Heating the system causes the nanoparticles to shift around on the surface of central sphere and adopt different configurations. A simple four-particle cluster has only two distinguished configurations, apart from the default unstimulated state. The other two shapes have similarity to chiral molecules i.e. no matter which way you turn them, they are always asymmetric. These two states can be read as 0 and 1. Thus, each cluster holds with it a single bit of data. The plastic nanoparticles, deposited on a liquid form a one-bit cluster, which is the essential block for data storage. The concept has been called ‘wet computing’ and researchers have already started calling the liquid as ‘digital colloid’.

19 P.I.N.G. ISSUE 10.1 SEPTEMBER 2014 WWW.CREDENZ.INFO/PING

Page 12: P.I.N.G. 10.1

WWW.CREDENZ.INFO/PING SEPTEMBER 2014 P.I.N.G. ISSUE 10.1 22

WiTricityDisrupting traditional energy transfer

Coming home from college, you may notice that your smartphone was low on battery ONCE AGAIN. Everyday,

you face the same problem. It is not hard to imagine that in the next few years, your mobile phone will charge in your pocket, flat screen TV that won’t need power cord, and an electric car that can be fuelled by a cordless panel in the floor. This all is possible by the technology called wireless electricity.

WiTricity or wireless electricity is the transfer of electric energy or power over a distance without use of wires. It works like this: WiTricity builds a “source generator”, which generates an oscillating magnetic field in the region around it. The source can get its electrical energy from a battery or being plugged into an outlet or another electrical device. One or more wireless power capture device can capture energy from the magnetic field and convert it into electrical power that can be used to power a device or charge battery. In some cases one or more “Resonant repeaters” are used to extend the distance range over which the magnetic field can travel, by transferring energy over a distance. In short, when you bring a device in a magnetic field, it induces current in that device thereby permitting power transfer. This is a highly resonant wireless power transfer technology, besides being strikingly distinct from Tesla’s creations.

WiTricity technology is not “Electricity in the air”, but rather a technology that uses oscillating magnetic fields to have the wireless energy exchange. With proper design the stray magnetic and electric fields can be kept well below the established human safety limits that regulate all electromagnetic consumer devices. Its ability to transfer power safely, efficiently and over a distance makes it convenient, more reliable and environment friendly. WiTricity technology can be used to provide direct wireless power, automatic wireless charging, etc.

It can be used for consumer, automotive, industrial, medical and military applications. In the industrial field and military field especially, delivering power in harsh environments can be complicated, usually involving running physical wiring into remote locations, or using fossil fuels and combustion engines to inefficiently generate power. WiTricity technology can help power or charge industrial applications ranging from sensors all the way up to unmanned vehicles.  WiTricity has systems for applications ranging from the charging of electric vehicles to mobile phones and Bluetooth headsets. WiTricity Corporation has been working with many of the top automakers around the world to turn consumer wishes into reality.   With the introduction of the WiT-3000 Development Kit, WiTricity Corporation has delivered a wireless “park-and-charge” self-charging design for EVs and HEVs.  A typical WiTricity-enabled system encompasses power sources and capture devices that incorporate specially designed magnetic resonators, which efficiently transfer power over distance via the magnetic near-field. These proprietary source and device designs, and the electronic systems that control them, support efficient energy transfer over distances that are many times the size of the sources/devices themselves.

Eliminating cables and batteries by using highly resonant power transfer can provide huge productivity and safety improvements for a modern world. The human race is almost co-dependent on fossil energy. WiTricity seeks to eliminate these dragging dependencies by bringing in a Green solution. WiTrcity has received only moves to show its imminent success.

-Satyam MantriPVG’s COET

Pune

SwiftThe next generation of concise coding

The coolest smartphone today is the iPhone. Mere ownership of the phone guarantees a certain amount of status

that attracts nerds and business people alike. Even higher in the echelons are those who develop these gadgets- the revolutionary iPod, the brilliant iPhone, the slim Mac and the uber iPad. Appleheads who want to surf on this new wave of technology should look no further as history was created at WWDC’14 when Apple launched an app written in a new programming language-SWIFT.

What is SWIFT?Swift is a programming language launched by Apple which will be used for developing iOS applications in future. It was developed over a period of four years by a team led by Chris Lattner. The language is developed on the lines of Objective C and Python but with modern features and syntax.

Why SWIFT?The interesting thing of Swift is that the length of the code has shortened considerably. The language got its name Swift because of the speed of its performance. Apps developed in this new language will run 93 times faster than it would have run if developed only in Objective C. Swift can be considered as a better version of Objective C as there are some constructs like generics, tuples, curried functions which Objective C does not support. So a developer can easily update the code without any problem and will not

have to write a code all over again if he wants to update it in Swift.

Features of SWIFTThe striking feature of Swift is the new concept of Swift Interactive Playgrounds. With this feature, the developer can immediately access the results of the code he is writing. He can also see a graph of the result of his code at different instances. By using the Timeline Panel, he can see what the code is exactly doing when the app is running. Another interesting fact is that Swift has its own REPL (Read-Eval-Print-Loop) shell.

How to Learn SWIFT?Apple has given a wide range of sources to the public from where they can easily master programming in Swift. Apple has released iBooks which provides complete guidance to Swift programmers. A video tutorial series and Swift Quick Start tutorial is also available for programmers and beginners alike. Apple has also published some sample codes written in Swift.

Swift is truly the language that meets today’s needs – fast, modern, safe and interactive – as described by the developers at WWDC. With the reach, acceptance and the ubiquity that Apple enjoys today, Swift has the potential to change the landscape of app development of the future, provided Apple follows the vision of its revolutionary co-founder that all software should be free!

-Rohan ChandavarkarPune Institute of Computer Technology

Pune

21 P.I.N.G. ISSUE 10.1 SEPTEMBER 2014 WWW.CREDENZ.INFO/PING

Page 13: P.I.N.G. 10.1

For those parts of robots which cannot be replaced by this material we could use ‘programmable matter’. This term refers to matter, which has the ability to change its physical properties in a programmable fashion, based upon user input or autonomous sensing. It begins with a closed spaced collection of miniature computers, which on receipt of instructions reconfigure themselves and shift their positions to construct a new shape entirely!These “soft-robots” would be lighter than rigid robots as they would not need a highly s o p h i s t i c a t e d mechanics system, nor would they need multitudes of storage units with software to instruct it regarding every minute detail.

Integrating this material with already existing robots would be an economical project as very common substances are used that have low cost and low maintenance and operate on cheap energy resources.

Applications:Small deformable surgical robots could be built that would move through the body to reach a particular point which needs care or cure without damaging any of the organs or vessels along the way. Robots are used even now in surgeries but they are rigid. Although small, they could damage delicate vessels during movement through the body. This would make any part of the body accessible for treatment.

Very strong and sturdy robots could be

built using this material that can be used in search-and-rescue operations by squeezing through rubble, looking for survivors. The Defense Advanced Research Projects Agency (DARPA) took part in developing this material for their specific need of theirs; they wanted robots that could squeeze through tight spaces and then expand again to move

around a given area. With rigid robots, any accident could be perilous to humans working alongside them. Squishy bots would not depend on springs and joints for the movements as rigid robots do, and this would eliminate the need for highly precise displacements. Research is being furthered on this material to make it better in ways that

would be suitable for robots in different environments. The team is considering use of magneto rheological and electro rheological fluids. We hope to see this concept implemented soon to witness our intelligent non-living replicas!

-Shruti PalaskarPune Institute of Computer Technology

Pune

WWW.CREDENZ.INFO/PING SEPTEMBER 2014 P.I.N.G. ISSUE 10.1 24

Robo Brain A large-scale computational system that learns from publicly available Internet resources, is currently downloading and processing about a billion images, videos and how-to documents. The information is being translat-ed and stored in a robot-friendly format that robots will be able to retrieve later.

Squishy RobotsThe pliable intelligence

Bio-inspired robotics, is the directed effort of robotics towards emulating biological systems, to the best possible

extent.

Now, try to picture the most advanced robot that you’ve seen or read about. It must be brilliantly programmed to make complex movement, execute difficult algorithms etc. but they are all of a fixed shape; they are rigid, hard and non-deformable. Rigidity and inflexibility were some major drawbacks as alloys used as components were inflexible, since flexible materials could not be used in robotics. Now we have a new material that is both rigid and flexible!

A professor in the Mechanical Engineering department of MIT, Anette Hosoi, along with her associates has developed a new material for achieving highly deformable, flexible, rigid, hard, soft structures—according to our need. With the application of heat to this material, it “softens” and is easily moldable to a different shape, even with a little application of pressure. When allowed to cool back down, it regains its original shape and becomes “hard” again.

This phase-changing material is made from wax and foam: it can transition between different states of matter. Solid-solid state change is most applicable for robotics. While heat release hardens it, absorption softens.

A balance between temperature and pressure is needed for effective use of this material in implementation. It can neither be too

hard nor too soft. Its new shape, or resulting properties cannot be predicted. Hence, we are required to apply optimum pressure and heat.

Foam is used because when squeezed, it reduces to a small fraction of the space of its normal size and retracts back on removal of pressure. Wax, when heated to a particular moderate low temperature, changes the hard substance to a soft-pliable one. Foam is dipped into heated wax and it is allowed to get absorbed fully before being removed. On cooling, it solidifies into a mesh like cubical lattice with multiple “nodes and edges”. These unit structures can be treated as individual units while applying deformations, hence increasing the level of achievable flexibility.

If the robots’ outer shell were made using this, the shell would become tenable and supple, granting control over the entire structure indirectly. This would give it the self-healing property on heating. A mesh of wiring under this shell, which would conduct electricity, can be used to heat the wax. A stronger material akin wax, like solder, can be used to replace it to make the robot even more temperature controlled. Other replacements could be liquid metals, magneto rheological fluids and electro rheological fluids. These fluids have particles suspended in them, which respond to magnetic and electric fields. This material on a robot is the realization of the sci-fi fantasy in Terminator 2 where the bot not only self-heals but phase-changes too.

23 P.I.N.G. ISSUE 10.1 SEPTEMBER 2014 WWW.CREDENZ.INFO/PING

Page 14: P.I.N.G. 10.1

WWW.CREDENZ.INFO/PING SEPTEMBER 2014 P.I.N.G. ISSUE 10.1 26

Temporary Social MediaFleeting social interactions

Over the years, with the advent of Facebook and twitter, the world is getting closer. We’re sharing more

with others than even before. Though this has given us a pseudo feeling of being more connected, at the same time it has brought its own problems to plain sight. With everyone getting more privacy centred over the past decade, a need of a new genre of social network has come to light,where people could freely express their feelings without the fear of their incriminating photos, posts or tweets being held over their head for the rest of their life.

The idea that one could make their posts disappear automatically is in play. This would make social media more like everyday conversations that aren’t recorded for an eternity or be displayed on someone’s wall of shame for the whole world to see. The sudden rise in the download of the popular Play Store app Snapchat only strengthens the belief that people are ready for a more discrete social network, which keeps their private life separate from their digital one. Snapchat, like Facebook too is a product of an Ivy League Dorm Room, but its ability to display a particular message to the receiver for only set amount of time is what makes it special and popular. The messages seem to “vanish”, rather than being saved permanently for potential discovery by parents, co-workers and other unwanted viewers. 

Although Snapchat’s anti-permanency stand adds to its charm, Snapchat too has flaws that might make it collapse on its founding pillar like the ability to screen shot the incoming snap. Moreover it was recently confirmed by the company that its promise of deleting snaps is not always kept, they might inadvertently remain on the Snapchat servers for a considerable amount of time. The leak of these photos or a hack on their server is a disaster just waiting to happen which would completely destroy the companies credentials. Future growth expectations in this area come in the form of similar photo-sharing services like Taptalk and Instagram’s Bolt.

Regardless of its flaws, the idea of temporary social media is crucial as it imparts the ability to communicate freely, to be oneself without the fear of being judged, punished, discriminated or be taken out of context by others. Temporary social networks have given us a broader control not only over what and with whom we share but also for how long we share something. This is just the beginning of a much bigger revolution where the internet janta will demand for their right to privacy and be given a greater voice over what happens with their data once it leaves their devices.

-Prathamesh SaygaonkarPune Institute of Computer Technology

Pune

Cryogenic GrindingChilling to the core

As we have progressed through the centuries, technology has advanced through leaps and bounds. There

is one such revolutionary tecnology which is surfacing in machinery, cryogenic grinding. Cryogenic grinding, also known as  Cryomilling, is the act of cooling or chilling a material and then reducing it to a small particle size.

The term “Cryogenics” originates from a Greek word which means creation or production by means of cold. As prices for energy and raw materials rise and concern for the environment makes safe waste disposal difficult and costly, resource recovery becomes a vital matter for today’s business. Cryogenic grinding technology can efficiently grind most tough materials and can also  facilitate  cryogenic recycling of tough composite materials and multi -component scrap. This method is useful for grinding of work-pieces made of material that soften on ambient temperature and hence are more difficult to grind.

For example, thermoplastics are difficult to grind to small particle sizes at  ambient temperatures  because they soften and have a tendency to become sticky. When chilled by dry ice, liquid carbon dioxide or liquid  nitrogen, the thermoplastics can be easily grinded into a fine powder suitable for electrostatic spraying and other powder processes. Microbiologists use this technique for grinding of plant and animal tissues. Samples that require extraction of nucleic acids must be kept at -80 °C or lower during the entire extraction process. Cryogenic grinding is often the only technique suitable for grinding of soft and flexible materials.

This technique is executed in various forms. Solenoids are used for milling samples in Freezer Milling which is a type of Cryogenic grinding. Solenoid is used so that the grinding media is the only thing in motion in the

system.   The reason for this is that at liquid n i t r o g e n ’ s temperatures (–196°C) any moving part will come under huge stress leading to  potentially  poor  reliability. Using solenoid in cryogenic milling has been proved to be a very reliable method of processing temperature sensitive samples in the laboratory for over 50 years.

Another form is known as Cryomilling which is a variation of mechanical milling. In this, metallic powders or temperature sensitive samples and samples with volatile components are milled in a cryogen  slurry or at a  cryogenic temperature under processing parameters, so a nanostructured microstructure is attained. Cryogens are usually liquid nitrogen or liquid argon. Cryomilling takes  advantage  of both the cryogenic temperatures and conventional mechanical milling.  The extremely low milling temperature suppresses recovery and  recrystallization  and leads to finer grain structures and more rapid grain refinement. The embrittlement of the sample makes even elastic and soft samples ready for grinding. Tolerances less than 5  micro-meter can be achieved.

And this is not the end, cryogenic grinding also has many applications in the field of biology. This indeed has been a revolution in the ways of performing grinding operations.

-Mausam YedePune Institute of Computer Technology

Pune

25 P.I.N.G. ISSUE 10.1 SEPTEMBER 2014 WWW.CREDENZ.INFO/PING

Page 15: P.I.N.G. 10.1

Lasers could never be used for long range applications. This was chiefly because of the fact that even high intensity lasers fizzled out after travelling a short distance. However, demonstrations conducted by passing lasers through such an air waveguide have shown that a laser wave can efficiently mediate through this passage without suffering from dissipation of signal strength. As a matter of fact, the ray arrived at the destination with a much higher power than that was previously thought possible. Using an air guide, lasers can be used to clear the massive space debris surrounding the earth or it can be used to detect radioactive or hazardous materials without any kind of somatic behaviour. Evidently, this approach is helping to reduce the risk factor tremendously.

The use of air guides doesn’t stop here. Earlier, it was impossible to carry out any kind of research in a nuclear reactor because of the hostile conditions prevailing inside it. However, using air as a waveguide, it is now possible to carry out instantaneous chemical analysis of any nuclear reaction.

This principle can also be used to improve a LIDAR (Light Detection & Ranging). A LIDAR is an optical remote sensing technique which works exactly like a RADAR but uses lasers instead. These LIDARs can be used to create high resolution topological maps and can also help to improve the navigation system aboard aircrafts and satellites. Air guides will also revolutionize communication systems by eliminating the use of cables for

transmission of signals and improving the relay networks worldwide.The dream to design and use laser weapons for combat was the brainchild behind the “Star Wars” programme of the US Defence System. Air guides can now help to develop a new breed of anti-ballistic missile systems and might also help in extra-terrestrial space explorations.

Despite the fact that air as a waveguide promises to provide a plethora of add-ons to the existing technological innovations, but they too have their own set of issues and pitfalls . First and foremost, it is very difficult to super heat large stretches of air columns without suffering colossal economic costs. Secondly, these guides cannot be generated in vacuum. They always need a medium to create the channel. Thus, ruling out any scope of using air waveguides for outer space communications. Also, these waveguides require a stable filament for generation. The filament should be able to maintain its stream as long as we want and should not terminate on its own.

This breakthrough bridges the gap between wired and wireless media, combining the best of both - security and flexibility, to deliver a more promising and reliable  technology. It has opened the doors to increase the bandwidth of lasers, which was otherwise a stagnant prospect for the last few decades. These air waveguides are like handy optical cables, which can be untangled at the speed of light to exchange data whenever and wherever we want. The versatility and diversity to which this technology can be implemented can greatly benefit mankind. In the future, air waveguides can act as a helping hand to researchers and scientists to develop new systems for civilian and military applications.

-Apoorva SomaniPune Institute of Computer Technology

Pune

WWW.CREDENZ.INFO/PING SEPTEMBER 2014 P.I.N.G. ISSUE 10.1 28

Nanomotors Assembled from nanoscale building blocks with nanowires as rotors, patterned nanomagnets as bearings, and quadrupole microelectrodes as stators, researchers at the University of Texas have built the smallest, fastest nano-motor.

Air WaveguideAir develops metal like properties: Stretch, bend and twist!

Fibre optic cables are most efficient for transmitting data at the speed of light. These cables have revolutionized the

world of network communication ever since their inception nearly four decades ago. Today, these cables have almost obliterated

traditional methods of networking, which use metallic wires.

In a traditional optical fibre, light is contained inside a transparent glass core by using the principle of Total Internal Reflection. These fibres are the best bet when it comes to choosing the quickest and most secure ways of communication. Researchers from the University of Maryland, USA have now succeeded in making air act as an optical fibre to guide light over long distance without any physical support or suffering any kind of attenuation. This air waveguide now has the ability to tackle and resolve challenges which were faced by the conventional optical fibre cable.

These air guides are produced by utilizing the change that eventuates in the optical density of any gas that occurs in the vicinage of an exceptionally intense fibre of light. According to the physical laws, any transmitted laser

pulse possesses very high power in open space and has the ability to transform into a laser thread or a filament. Such a narrow beam heats up the area around it creating a low density shell about itself as it progresses in the air medium. Refractive index of air

increases in the more intense central part of the thread which then acts as constraining agent, preventing light from spreading out by diffraction.

However, one beam isn’t competent enough to create a channel through which any kind of radiation can propagate. The trick is to use a square shaped bundle of four intense filaments of light generated using a femto-second laser. The phase difference between the adjacent beams is rigidly-controlled so as to prevent the quadruplet from merging into one central thread. Interference because of longitudinal waves induced in air causes an over-pressure of high density at the centre. To achieve thermal equilibrium, the gas profiles out leaving behind a hot core of low density in its wake. As a result, this tunnel-like hole has less refractive index than the surrounding air. This channel can now be used just like the prosaic optical fibre cable.

27 P.I.N.G. ISSUE 10.1 SEPTEMBER 2014 WWW.CREDENZ.INFO/PING

Page 16: P.I.N.G. 10.1

WWW.CREDENZ.INFO/PING SEPTEMBER 2014 P.I.N.G. ISSUE 10.1 30

Bridging the riftWith Mr. Kiran Deshpande, President, AirTight International

The Co-Founder and President of AirTight Networks, one of the leading companies in the domain of wireless

networking, Mr. Kiran Deshpande, has over thirty years of experience in the field of technology and business. Being a senior IEEE member, he talks about his journey and shares insights of the networking industry and its future.

Q You have studied in two of the most renowned institutes in India, BITS

and IIT- Bombay, how has it influenced you today?

A A national college broadens your perspective. I started discovering the

goodness of my education later in life. Back then, the degree that BITS offered was B.E. (Honours), which had non-engineering courses like economics, philosophy and political science with the engineering course. The broad base of this education proves to be critical because in your life you need the knowledge of all these things. As a student, I was reasonably sincere. I would say if I have to pass this test, then I should know the complete course material instead of making choices based on the probability of which topics the questions would be based on. That way you create an attitude to learn all life. In fact, when I was in my 11th grade we did not have English in the curriculum since there was an anti-English movement underway in northern India back then. But later we had a good teacher who would tell us Sherlock Holmes stories in Hindi (he cherishes). BITS, IIT and TCS helped me overcome the lack of formal education in English.So, when you have good teachers and a temperament to learn, it has a long term positive effect on you.

Q How does the education system today differ from yours? How good are the

students today?

AWell, I think parents and students are a lot aware. They are more pro-active.

Projects are smarter. We might have been intellectually good, but were naïve. I suggest students should think and not just look for readymade answers from the Internet, just because it has so much to offer. Often parents are out of depth of what their children are doing specially in the technology area, but I am not (laughs).

With this it is very important to preserve the ability to think. The serendipity of the traditional way of researching is lost. Accurate web search and readymade answers take you to a specific ‘page’ with precise answers, you don’t see the rest of the pages and you lose linear learning.

On your question of whether MBA or not, the notion that people need to have an MBA degree to become successful is not true. If you have the confidence and passion to run your business then it will definitely flourish. So, instead of wondering if management education is needed, the question whether a good formal education pitchforks you into a good career, should be asked!

inte

rvie

w

Neuromorphic ChipsCan your mobile phone develop a sixth sense?

Neuromorphic Chips are so called as they are microelectronic circuits based on our biological brains. They

are engineered in a way to perceive the world as we do, and respond to stimuli as we do. Imagine owning a phone which understands and interacts with you in humanlike ways. It could make our Android phone anticipate what we want next, alerts for organising our daily chores or presenting us with information on any desired topic. This technology is not going to be in the market until 2015. Qualcomm plans to use these chips in the Android phones.

IBM Research and HRL Laboratories have each developed neuromorphic chips under a $100 million project for the Defense Advanced Research Projects Agency. The current version of the Neuromorphic Physical Model (NM-PM) incorporates 50*106 plastic synapses and 200,000 biologically realistic neuron models on a single 8-inch silicon wafer in 180nm process technology. The system does not execute pre-programmed code but evolves according to the physical properties of the electronic devices.

Neuromorphic chips attempt to model in silicon the massively parallel way the brain processes information as billions of neurons and trillions of synapses respond to sensory

inputs such as visual and auditory stimuli. Those neurons also change how they connect with each other in response to changing images, sounds, and the like, that is the process we call life-long learning. The chips incorporate brain-inspired models called ‘neural networks’. That’s why Qualcomm’s robot simulates a neuromorphic chip which can do work without the help of past references. Instead of modeling the chips as closely as possible on actual brain biology, Qualcomm’s project emulates aspects of the brain’s behavior. For instance, the chips encode and transmit data in a way that mimics the electrical spikes generated in the brain as it responds to sensory information, and through this digital representation they can reproduce a huge range of behaviours seen in biology.

Qualcomm is especially interested in the possibility that neuromorphic chips could transform smartphones and other mobile devices into cognitive companions that pay attention to your actions and surroundings and learn your habits over time. It’s almost like your phone has a digital sixth sense. It will know what sort of images you usually like, or what time of the day we’re drowsy and need certain alarms to keep us vigilant.The goal of building these neuromorphic chips is the development of new, powerful computing architectures that could be used to model the brain and, perhaps, even serve as a stepping stone to a sophisticated, human-like artificial intelligence. The project is under development and the researchers wish to combine the chips with several sensory components at once, such as an artificial cochlea or retina, to create complex cognitive systems that interact with their surroundings on multiple levels, all in real time.

-Aneesha MathurPune Institute of Computer Technology

Pune

29 P.I.N.G. ISSUE 10.1 SEPTEMBER 2014 WWW.CREDENZ.INFO/PING

Page 17: P.I.N.G. 10.1

WWW.CREDENZ.INFO/PING SEPTEMBER 2014 P.I.N.G. ISSUE 10.1 32

seen senior citizens buy laptops and tablets just because they want to use Facebook. The use of the word ‘appliance’ has changed over the years, but it no longer just means a fridge or an oven as a computer device can also be an appliance. The computer field is tangible and unpredictable but exciting and bringing value to life.

Q Where do you see AirTight Networks in the next five years?

A AirTight has tremendous potential as Wi-Fi is beginning to take off as

default end user connectivity vehicle to a network. Secondly, radio spectrum is a resource whose value everyone has started to realise. Availability of more spectrum means more business and hence, more jobs and prosperity. Governments around the world are being asked to release more spectrum for unlicensed use. There is good scope for radio professionals and certainly good one for AirTight.

QYou have transitioned from an employee to employer. What do you think about

recruitment interviews?

A I am of the view too much focus on specific skills without looking at core

capabilities and ability to learn cannot help you determine the qualities of real professionals. For example, a good software programmer needs to be good at not just programming, but also at designing, scoping and many other things. I remember, I was writing data routines as a programmer in 1979-80 when my manager asked me why I was spending so much time on the data structure. I answered that these routine must not fail in year 2000 (nearly two decades away at that time). I said I don’t want you to call me at that time complaining your code is not working.

QWhat message would you give to the first time entrepreneurs?

AMy advice would be, have a tremendous desire to fall in love with your idea! Only

then you can fight all the odds that come your way. Enjoy the process and plan your capital smartly depending on its nature, whether equity or non-equity. Always present your team well, because a strong team represents a serious venture. At times, the investors want to judge your logical reasoning more importantly than the accuracy of your answer. They will also test your ability to recruit smart people. A smart entrepreneur will always recruit smarter people. And finally, serious investors want serious plans or else they won’t fund you. Don’t be shy of asking for more money. You can find $1m easily but may find it difficult to get $50,000 (smiles).

QNow in your life, apart from your job, what would you like to indulge in?

A I would like to nurture my social life. Photography is something that I find

rejuvenating. When I see through the lens of my camera, the artist in me comes alive. I was lucky to have my entire education in minimum funds because of scholarships and low fee structure due to government grants to institutions like IITs and philanthropic view of founder of BITS, Shri G. D. Birla. So now I see how many opportunities I can create to return back to the society. Other than that, I would like to just watch Tom and Jerry or some good comedy movie on a weary afternoon (laughs).

We thank Mr. Kiran Deshpande for his time and contribution to P.I.N.G.

-The Editorial Team

Slime Mold A brainless networking organism can organise its cells to create the most optimum route through a maze, exhibiting decision making capabilities when subjected to unfavourable changes in temperature and humidity, which makes it crawl slower, saving its energy.

WWW.CREDENZ.INFO/PING

Q You have worked in 3 companies namely TCS, IMR and Tech Mahindra which

was known as MBT back then. How were the working environments different in each company?

AI was probably amongst the first 300-400 employees in TCS. Those were

formative days of offshore IT services which society at large did not know anything about. TCS led the way. I used to be asked questions like why am I working with an unknown small Tata company. What they did not know was that TCS had undertaken a major US project and successfully completed it back in 1974, when I was still in BITS. I was lucky to work for a company whose CEO is called the Father of Indian Software industry (Dr. F. C. Kohli). He always encouraged innovation and cross functions. He is 91 today and still has a day long schedule. That’s a lesson for all of us. I joined the second company as a VP, where my CEO was encouraging and energetic which helped me with my work. While at IMR, I was head hunted by MBT. I learnt business as a CEO. I took some decisions that proved to be very favourable for the company and had a good stint as the CEO of MBT.

Q What is your motivation behind starting AirTight Networks?

AI took time off after quitting MBT as I had completed 22 years in the industry

and wanted to try something different. It was a chance meeting with our Co-Founder & CTO Dr. Pravin Bhagwat at IITK. He had done pioneering work in wireless and had some ideas. That’s the genesis of AirTight. We decided to build a company, and hired top notch talent from IITs and some other high ranked schools. A team of 15-20 engineers built a prototype and we approached potential investors in India. We had little luck here, some did not understand our ideas and

others lacked in appetite for money. We then moved to California and raised the first capital venture round.

Q What are the features of WIPS that make it stand out in the market of intrusion

prevention systems?

AWe focused on three key capabilities of WIPS:

1. Accurate classification of environment - determine which of the Wi-Fi devices detected in the vicinity are connected to the enterprise network. 2. Reliable intrusion prevention - Block all Wi-Fi connections that violate defined corporate wireless policy or pose a threat to enterprise network security without affecting neighbour’s legitimate Wi-Fi communication.3. Precise location tracking - Locate vulnerable or threat-posing device and take action.

QHow do you manage BYOD (Bring Your Own Device) trend?

A In an enterprise, a personal computer given to an employee has been prepared

with all the security such as Anti Virus, Personal Firewall etc. However, same is not true of employee owned devices such as smart phones. AirTight Wi-Fi sensors can detect smart devices and won’t allow the devices to be connected to the authorized network until it is sanitized as per the policy. It can hold it until somebody authorizes it to be connected to the network.

QWhat do you think about the future of IT?

A Computing is no longer a business phenomenon, but a social one. I have

31 P.I.N.G. ISSUE 10.1 SEPTEMBER 2014

Page 18: P.I.N.G. 10.1

Junior Council: Aakanksha GurjarAbhiraj DarshankarAditya SarodeAkshat JainAkshay KhondeAmrutha KulkarniAnjali DeosarkarAnkit BhagatAnkita MalaniAntara KolarAvanti JoshiAvanti KulkarniChetan SatputeDheeraj ReddyGandhali SheodeGauri SabnisGirija GodboleHimani DeshpandeKanchan WaikarLeena DamleLinali MoreMadhuri PhuteNatesh Raina Nikhil KulkarniNishad Dawkhar

Omkar AcharyaParag AhivalePranav GaikwadPratik WaghmarePriyanka RathodPushkar BadgujarRahul AgnihotriRajnandini DeshmukhRaunaq KocharRohan SoganiRucha SialRutuja KaleSakshi KasatSayeram EswarShivee GuptaShrusti PatilShruti ShettyShubham ChintalwarShubham PathakSnehal RaskarSonal JoshiSuraj GavhaneTanmay DurejaVaibhav TulsyanVinay Khade

PISB Office Bearers 2014-2015PISB Office Bearers 2014-2015

Chairperson:Vice Chairperson:

Treasurer:Vice Treasurer:

Secretary:

Joint Secretary:

Secretary of Finance:Joint Secretary of Finance:

VNL Head:VNL Team:

PRO Head:PRO Team:

Creative Head:Senior Designer:Design Team:

Ajinkya RajputShivam Gupta

Ritesh PoreyTejas Mehta

Ashay KambleSidhesh BadrinarayanAkshay BholeSayali MagarRicha Yadav

Bhushan Charkha

Ankit Ahuja

Arpit KhandelwalAbhishek MaratheAkhil KoulShubham KhedekarTarun Notani

Yashaswini KadamAnmol AgarwalSoutri Mukherjee

Manali DesaiTanveer Singh MahendraAkshay AgrawalChinmay GangurdeSiddhant Patil

Branch Counsellor: Dr. Rajesh B. Ingle

P.I.N.G. Head:P.I.N.G. Team:

Webmaster:Web Team:

WIE Secretary:

Senior Council:

Shivani NaikAdvait KulkarniAishwarya MaliManasi GodseVrushada Tawar

Soham MoreMeghraj BendreShubham KhandelwalSiddha Karkare

Ayushi AgrawalRadhika Shouche

Abhinav KaulAman NigamAnirudh SudarshanAnkita ChiraniyaAvani JoshiIshita MograJeevjyot Singh ChhabdaKriti KesarwaniParinita MatharuRahul DhavalikarRashmi VarmaSaniya KaluskarSaurabh AbhaleSharika KhuranaSudipto Chatterjee

Page 19: P.I.N.G. 10.1

SEED Infotech Ltd. is one of the leading vocational training companies in India. Incorporated in 1994 by Narendra Barhate and Shrikant Rasane, both of whom are IIT Mumbai alumni and Ex-DRDO scientists, SEED Infotech operates in IT Training, Consulting and Staffing domain of IT & ITES. With over 20 years of experience, SEED Infotech has a manpower of over 600 qualified & certified professionals and has trained over 4,50,000 students & professionals till date. SEED Infotech offers individual, institutional as well as corporate training programs which go beyond the obvious to enable and enhance employability in IT Software Development, Testing, Infrastruc-ture Management Services, ERP and Digital Marketing. As Training Partners, SEED Infotech has association with Global Technology Giants such as SAP, Microsoft, Oracle, RedHat, Salesforce, HP and EC-Council and provide testing and assessment services through Prometric, Pearson-Vue, Kryterion, etc. Headquartered in Pune, SEED Infotech has 58 + centers, across locations in India with more than 2,25,000 sq. ft. of state of the art infrastructure. Providing placement assistance through Job Fests, Campus Recruitments and its network of 500 + Recruitment Partners is a major strength of SEED Infotech. With a reputed clientele across India, SEED Infotech is venturing over-seas as well. SEED Infotech has been awarded with the Maharashtra State IT HRD Award in 2007 for its excellent contribution in the employability enhancement trainings.

C-307, Namrata Apts, Bhau Patil Road, Bopodi, Pune – 411020; INDIAEmail : [email protected], [email protected]

Alliance Thermal, Manufactur-er of custom engineered Burn-ers, combustion systems and Gas flaring systems.

The systems / equipments are designed to meet the custom-ers product quality, environ-mental norms and energy use objectives.

Page 20: P.I.N.G. 10.1

Answer to this crossword lies within the included articles

crossword

1. Systems that interact with the surroundings in real time.(9-6)2. An aliter name for Liquid terabytes.(7-7)5. A new form of computing that powers world’s largest private clouds and optimizes them.(8-9)6. A marketing startup with ‘Constant Vigilance’ philosophy.(7)7. Latest addition to the programming world which bridged the gap between developers and Apple’s breakthrough technologies.(5)10. The most preferred language for classic large scale parallel processing systems.(5)12. A process that cools and transforms objects to particle size.(11)13. A laser touch to the traditional remote sensing technology.(5)16. Microscope that has made critical forensic study simple.(4)17. Technology that brings art and science together.(8)18. This material can make robots flexible.(4) 19. A peripheral that keeps a check on your thoughts.(4-4)20. An improvised architecture based on which IBM developed the MQ series.(3)21. A concept that organized tracking of transactions.(10)

3. Fluids sensitive to the electric field.(15)4. Devices that help to monitor changes in energy levels.(7-7)8. A safeguard from the invisible, yet potent cyber threat(4)9. With this app, Instagram aspires to take photo sharing culture to a new level.(4) 11. An official center for unofficial updates(3-7)14. Chinese counterpart of Titan, rather the only better one.(7)15. A system rapidly adopted worldwide that has personalized company workplace.(4)22. Given enough memory and time, this language can predict whether a solution to a mathematical problem exists.(6-8)23. A technology which made virtual clones of objects a reality, best used in gaming.(9-7)24. Carrier less electricity.(9)

Across Down

Page 21: P.I.N.G. 10.1