pdf_20230331_080908_0000 Flipbook PDF

pdf_20230331_080908_0000

11 downloads 115 Views 22MB Size

Recommend Stories


Porque. PDF Created with deskpdf PDF Writer - Trial ::
Porque tu hogar empieza desde adentro. www.avilainteriores.com PDF Created with deskPDF PDF Writer - Trial :: http://www.docudesk.com Avila Interi

EMPRESAS HEADHUNTERS CHILE PDF
Get Instant Access to eBook Empresas Headhunters Chile PDF at Our Huge Library EMPRESAS HEADHUNTERS CHILE PDF ==> Download: EMPRESAS HEADHUNTERS CHIL

Story Transcript

VISION To promote competent industry relevant education, skillful research and innovation for socially responsible computer science professionals with human values.

mission To impart high technical knowledge strong in fundamentals, practical skills and creative thinking that solves real world problems. To grow and become competent through innovation. To discover new knowledge through inventive research that encourages entrepreneurship and economic development of global society. To provide a creative balance of academic, professional and ethical values.

Page | 02

EDITORS DESK

Dear Readers, Warm Greetings! Welcome to the fourth edition of Techbiz, from the Department of Computer Science and Business Systems. Our department was established in the year 2019. After three successful editions, we decided to put ourselves out into the world once again with the fourth edition VOL. 2 ISSUE 2 of our magazine. We, the editorial board, take immense pleasure in bringing to you our very own magazine, and hope you enjoy it! We thank you for all the support and patronage you show us, and we hope you will continue to support us by reading our work. Cheers, The Editors.

Page | 03

TABLE OF CONTENTS 1. faculty ACHIEVEMENTS

05

2. STUDENTS ACHIEVEMENTS 07 3. INTERNSHIPS

09

4. course completion

10

5. WORKSHOPS AND WEBINAR 11 6. ARTICLES

17

Page | 04

faculty ACHIEVEMENTS Faculty Participation in Conference/FDP/Workshops/Training Programs

Dr. K. Devaki, Head of Department 1. Presented a paper titled “A Study on Challenges in Data Security During Data Transformation” in Computer Networks, Big Data, and IoT 49-66. (Part of the Lecture Notes on Data Engineering and Communications Technologies book series (LNDECT, volume 117)), (IEEE Xplore, Scopus Indexed).

Mrs. J. Jinu Sophia, Assistant Professor 1. Attended a 1-day Workshop on “Research Methodology" organized by Rajalakshmi Engineering College in association on 8.12.2022. 2. Attended a 2-day Workshop on “NAAC orientaion Workshop" organized by Rajalakshmi Engineering College from 15.12.2022 to 16.12.2022 3. Attended a 5-day Faculty Development Program on "Data Science Tools and Research" organized by VIIT, Pune in association with the Society of Data science from 01.11.2022 to 05.11.2022.

Mrs. S. Bakiyalakshmi, Assistant Professor

Attended a 1-day Faculty Development Program on "Cyber Security" organized by ICT on 0.2022

Completed NPTEL course on “Problem Solving through Programming in C” conducted by IIT aragpur from 23/7/2022 to 29/10/2022 and obtained ELITE certificate.

Attended a 5-day faculty development programme on “ Microsoft Power BI Data Analyst sociates” at Vels Institute of Science, Technology & Advanced Studies in association with ICT ademy.

Page | 05

Mrs. K. Poornimathi, Assistant Professor 1. Presented a paper titled “Smart Assistant for Enhancing Agronomics” in ECS Transactions in Vol. 109 and Issue 1, 01 Apr 2022..

Mrs. P. Menaga, Assistant Professor 1. Attended a 5-day Faculty Development Program on "Patent Drafting and Filing" organized by Rajalakshmi Engineering College from 29.11.2022 to 03.11.2022.

Mr. K. Sudharson, Assistant Professor 1. Attended a 5-day Faculty Development Program on "IoT Induced Artificial Intelligence for Emerging Computing Paradigms" organized by Dr B R Ambedkar National Institute of Technology, Jalandhar from 04.10.2022 to 08.10.2022 2. Attended a 5-day Faculty Development Program on "Online Faculty Development Program on Recent Trends in Artificial Intelligence and Cyber Security" organized by Shri Vishnu Engineering College for Women from 01.11.2022 to 05.11.2022 3. Attended a 5-day faculty development programme on “Cloud Practitioner (AWS)” organized by Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology from 14/11/2022 to 18/11/2022

Mrs. M. Maharasai, Assistant Professor 1. Attended a 10-day Faculty Development Program on "Microsoft Power Bi Data Analyst Associates" organized by ICT ACADEMY, SAIRAM ENGINEERING COLLEGE in association with ICT ACADEMY from 08.11.2022 to 18.11.2022 2. Attended a 10-day Faculty Development Program on "CLASSIFICATION OF ATRIALFIBRILLATION DISEASE USING MACHINE LEARNING" organized by Intellectual Property India in association with ICT ACADEMY from 10.11.2022 to 25.11.2022

Page | 06

Student's achiEvements Student Participation in Competitions

TECHATHON PRODUCT DEVELOPMENT - FINALIST (November)

Srinithi A 3rd Year

Deepak Kumar A 3rd Year

Vishal Ananth J 3rd Year

SVC Upagraha 22 - Shark Tank SECOND PRIZE on November

AWS DeepRacer Student League India 2022 - PARTICIPANT Deepan Kumar R 3rd Year

Jeevan Muthu I 3rd Year

NATIONAL BIO ENTERPRENEURSHIP COMPETITION PARTICIPANT (October)

Srinithi A 3rd Year

Varshini S 3rd Year Page | 07

DESIGN-A-THON - SECOND PRIZE (November)

3rd Year Varun Kumar V Dheephiga A M Maarcus Reniero L

Organization : UiPath Role : Student Developer Champion

Selected as one of the 74 champions among 7 countries by showcasing RPA skills.

PSG SRISHTI - CODEVERSA PARTICIPANTS (October)

Sundar N 3rd Year

2nd Year Ameen J Abilash V Ashivin A Praveen D Ganesh S A Shreyash M Bhuvanesh M Mari Sankar P Arun Kumar P Brianbojoyou J Page | 08

INTERNSHIP PROGRAM Interns are like not-cut diamonds; They have flaws, some of them are totally worthless, but once you cut them well, they can become something great one day, And that’s what I’m doing, I’m cutting diamonds… - Barney Baszuro

Here are some of our department's finest diamonds...

Organization : Young Indians Role : Graphic Designer

Project: Designed two books names "Why YI" and "Why YUVA" and recognized as Creative Team of the year

Richard V 3rd Year

Sundar N 3rd Year

Page | 09

COURSE COMPLETION The purpose of learning is about learners being prepared for their future and reaching their fullest potential as lifelong learners

NPTEL - Data Structure and Algorithm Competivtive Programming Forage - Goldmen Sachs Virtual Experience Program Mastercard - Mastercard Cybersecurity Shyamkarttik S 2nd Year

Pritika C 3rd Year Great Learning - UI/UX

RPA Design and Development Diploma InternEzy - Data Structure and Algorithm

Mari Sankar P 2nd Year Mohideen Zafraan M 2nd Year RPA Design and Development Diploma

Page | 10

and 1. EFFECTIVE IDEATION TECHNIQUES FOR UI/UX DESIGN UX/UI design has become more “Trendy” as things move online. Now, with the upcoming of “Internet of Things”, nearly everything needs some sort of attention to the user experience. The Effective Ideation Technologies workshop organized by the department of computer science and business systems in association with the innovation cell and industry interaction cell on 28th October 2022 was conducted by Mr. Aravindan, Senior UX designer, Zeta. The workshop was great and engaging, learning a lot of UX concepts and using the Figma tool. Figma is a cloud-based design and collaboration tool used by designers, developers, and product teams to create user interfaces, prototypes, and design systems. It allows for real-time collaboration and communication between team members, enabling them to work together on the same project simultaneously. It also involved different terminologies used in UX design such as wireframe, design, prototype, etc. Participants were segregated into teams and the activity session began. The activities were very interesting and they learned a lot by coming up with an idea for an application and creating a personal storyboard based on the application. They were inquisitive to learn a lot about UI/UX and the workshop satisfied their queries on how to get started with various ideation techniques.

Page | 11

2. TRENDING ARCHITECTURAL CHANGES AND INDUSTRY NEEDS A workshop was conducted on 15th October 2022 at the main seminar hall, workshop block from 10:30 am to 12:30 pm. The workshop was hosted by the department of Computer Science and Business Systems, and the chief speaker for the guest lecture was Mr.Kaja Muyenudeen. He is a Lead Database Engineer with a decade of experience working with leading organisations dealing with global enterprise customers, and effective team management as a technical escalation point. The session started with the welcome address followed by the prayer song. Before the start of the lecture, Dr. K. Devaki gave a presidential address about the importance of databases and cloud computing, and how they have been helping us manage and organize data. He then talked about the basic ecosystem of software in terms of database management, as well as popular databases being used by companies to build and manage their products and software such as Oracle, Apache Cassandra, Microsoft SQL Server, MongoDB, AWS DynamoDB, and how these databases used to be managed during the earlier days of software development. The workshop focused on how to manage and convert their data to the cloud instead of arranging more hardware. Cloud computing has entered almost every aspect of life whether it’s social or professional development, representing network computations that run through cloud-based software applications on servers dispersed throughout the internet. It is accessible through browsers on mobiles, desktops, laptops, and tablets. He also discussed the various steps involved in data management like gathering business requirements, understanding business roadmaps, identifying relationships, etc. The workshop took a massive turn when he started discussing industry 5.0 and the new changes happening in and around the industry and the requirements the industries need and the challenges they face now. Industry 5.0 is a concept that focuses on the integration of advanced technologies with human workers to create a more efficient and productive manufacturing process. The session then came into its final phase with an interactive Q&A session where our students asked brilliant doubts and were patiently answered by our guest speaker. The workshop then ended with a Vote of thanks and finally the national anthem.

Page | 12

This webinar gave us the importance of the management of Databases in today's modern technological world and also emphasized on the changes and challenges faced by companies due to cloud migration. The session was interactive and practical and helped us gain a new perspective on database technology. This webinar turned out to be an opportunity for everyone who desires to discover more about cloud computing and other database management services.

Page | 13

3. APPLIED DATA SCIENCE AND CAREER PATHS The virtual webinar on ‘APPLIED DATA SCIENCE AND CAREER PATHS’, held on Google Meet, was carried out by Mr. Varun Muralidharan, Data Scientist, GAP Inc, San Fransico, United States of America. The webinar started with an introduction to Data Science, and career paths in Data Science and Analytics. The introduction was brief and accurate. Concepts related to Data Science and Analytics were covered. Applications of Data Analytics and Business Analytics and their usage in the current generation were delivered. The usage of Data Pre-processing, Data Warehouses, and many other fields related to Data Science were brought particularly. Data science is the study of data to extract meaningful insights for business. It is a multidisciplinary approach that combines principles and practices from the fields of mathematics, statistics,artificial intelligence, and computer engineering to analyze large amounts of data. Uses of data science 1. Data science may detect patterns in seemingly unstructured or unconnected data, allowing conclusions and predictions to be made. 2. Tech businesses that acquire user data can utilize strategies to transform that data into valuable or profitable information. 3. Data Science has also made inroads into the transportation industry, such as with driverless cars. It is simple to lower the number of accidents with the use of driverless cars. For example, with driverless cars, training data is supplied to the algorithm, and the data is examined using data Science approaches, such as the speed limit on the highway, busy streets, etc. Page | 14

4. Data Science applications provide a better level of therapeutic customization through genetics and genomics research. This webinar gave us the importance of Data Science in the field of Information Technology, Entrepreneurship, Finance, Health Care, Industrial Sector, and Banking. Applied Data Science specializes in data retrieval, recovery, and further in-depth study of statistics. Furthermore, applications of Applied Data Science were also discussed. The webinar also covered the importance of Higher Studies in the desired fields, based on one’s interest. Career paths and opportunities in the field of Data Science were precisely summarized by Mr. Varun. The session was quite interactive and effective and helped us to explore newly on Applied Data Science. This webinar turned out to be an opportunity for everyone who desires to discover more about Data Science and its applications, and also, this webinar gave a brief knowledge to everyone who aims for higher studies. Major sources of Data Visualization and Data Science were briefly summarized.

Page | 15

Students Seminar Present/Attended

YRC REC - Seminar Cyber Security Ethical Hacking Seminar

Deepak kumar A 3rd Year

YRC REC - Seminar Cyber Security Ethical Hacking Seminar

Varshini S 3rd Year YRC REC - Seminar Cyber Security Ethical Hacking Seminar

Srinithi A 3rd Year

YRC REC - Seminar Cyber Security Ethical Hacking Seminar

Senthilnayaki N 3rd Year

Trending Architectural Changes and Industry Need Applied Data Science and Career Paths

Vinay Parekh 3rd Year

Trending Architectural Changes and Industry Need

Effective Ideation Techniques for UI/UX Design Vishal Ananth J 3rd Year Page | 16

BLOCKCHAI N I N FI NANCE

-Mohideen Zafraan M 2nd Year

"I think a new social media company is needed that is based on a blockchain and includes payments," -Elon Musk on Blockchain We've all heard about Blockchain technology as one of the coolest and most futuristic implementations which is practiced in this era of business world. But have we wondered why it’s a factor that contributes to the betterment of the world?

Whereas most technologies tend to automate workers on the periphery doing menial tasks, blockchains automate away the center. Instead of putting the taxi driver out of a job, blockchain puts Uber out of a job and lets the taxi drivers work with the customer directly. -Vitalik Buterin, Co-Founder of Ethereum

security The Blockchain is known for its distributed nature which is based on its architecture and it reduces the need for data intermediaries such as transfer agents. This nature of blockchain makes it difficult to centrally control or coordinate an attack. This means that an attacker would need to compromise a large number of nodes in order to successfully attack the network. It's also designed to be tamper-proof against fraud and malicious third parties— making it virtually impossible to hack or manipulate.

Page | 17

transparency and trust The blockchain technology has the potential to increase transparency and trust for businesses. However, there are some potential drawbacks to be aware of. Blockchain technology is still in its early stages and there are not many established standards or best practices. As a result businesses may need to do their own research to determine whether or not blockchain is the right technology for them.

privacy Blockchain transactions can be encrypted, such that only the person with the decryption key can read the data. This can provide an additional layer of security and privacy for sensitive information.

money transfer To be faster and cheaper for both local and international transfers. Instead of using the common money transfer methods like RTGS,IMPS, NEFT,UPI and digital wallet, the cryptocurrencies are the medium of transfer. Similar to the way Google Docs allows users to work on the same project simultaneously, Blockchain gives users public access to money transfers that would otherwise be private. As a result, any modifications are monitored by all users, adding further security measures. Blockchain has especially impacted marketing, legal, and payments for countless businesses.

Page | 18

fraud is a threat that's not to be afraid of Blockchain is actually a very good asset in fraud prevention. While blockchain has many useful features, there are a few specific features that are important for fraud detection and prevention. Blockchain stores information in a ledger with transaction information within each block, along with a unique hash that refers to the previous block. Every person within the network receives a copy of the transactions as well. Because of these features, blockchain technology is resistant to distributed denial-of-service attacks, hackers, and other types of fraud. As a result, fraud loss in the business can be reduced and employee morale can be increased by Blockchain technology.

conclusion As you all know, the impact of blockchain technology on the cryptocurrency market has been significant. It has enabled the creation of a new class of digital assets known as cryptocurrencies, which are decentralized and not controlled by any central authority. This has led to the creation of a whole new market for buying and selling cryptocurrencies, as well as a range of related products and services such as cryptocurrency exchanges and wallet providers. Overall, the adoption of blockchain technology has had a profound impact on the cryptocurrency market and has enabled the creation of a new financial system that is decentralized, transparent, and secure Page | 19

AI - A COMPANION TO ALL FIELDS



- Adhithyan Aravind 2nd Year

“Is artificial intelligence less than our intelligence?” —Spike Jonze

Artificial intelligence (AI) is truly a revolutionary feat of computer science, set to become a core component of all modern software over the coming years and decades. This presents a threat but also an opportunity. AI will be deployed to augment both defensive and offensive cyber operations. Additionally, new means of a cyber-attack will be invented to take advantage of the particular weaknesses of AI technology. Finally, the importance of data will be amplified by AI’s appetite for large amounts of training data, redefining how we must think about data protection. Prudent governance at the global level will be essential to ensure that this era-defining technology will bring about broadly shared safety and prosperity

AI ON BIG DATA In general terms, AI refers to computational tools that can substitute for human intelligence in the performance of certain tasks. This technology is currently advancing at a breakneck speed, much like the exponential growth experienced by database technology in the late twentieth century. Databases have grown to become the core infrastructure that drives enterprise-level software. Similarly, most of the new valueadded from software over the coming decades is expected to be driven, at least in part, by AI.

Page | 20

Within the last decade, databases have evolved significantly to handle the new phenomenon dubbed “big data.” This refers to the unprecedented size and global scale of modern data sets, largely gathered from the computer systems that have come to mediate nearly every aspect of daily life. For instance, YouTube receives over 400 hours of video content each minute. Big data and AI have a special relationship. Recent breakthroughs in AI development stem mostly from “machine learning.” Instead of dictating a static set of directions for an AI to follow, this technique trains AI by using large data sets. For example, AI chatbots can be trained on data sets containing text recordings of human conversations collected from messenger apps to learn how to understand what humans say, and to come up with appropriate responses. One can say that big data is the raw material that fuels AI algorithms and models. The main constraint on innovation is no longer the difficulty in recording and storing information, but the finding of useful insights among the sheer abundance of data now being collected. AI can notice patterns in mammoth data sets that are beyond the ability of human perception to detect. In this way, the adoption of AI technology can make even mundane and seemingly trivial data valuable.

AI AND CYBER SECURITY Hardly a day passes without a news story about a high-profile data breach or a cyber-attack costing millions of dollars in damages. Cyber losses are difficult to estimate, but the International Monetary Fund places them in the range of US$100–$250 billion annually for the global financial sector. Furthermore, with the ever-growing pervasiveness of computers, mobile devices, servers, and smart devices, the aggregate threat exposure grows each day. While the business and policy communities are still struggling to wrap their heads around the cyber realm’s newfound importance, the application of AI to cyber security is heralding even greater changes. One of the essential purposes of AI is to automate tasks that previously would have required human intelligence. For instance, chatbots can be used to field customer service questions, and medical assistant AI can be used to diagnose diseases based on patients’ symptoms. This kind of automated cyber defense is necessary to deal with the overwhelming level of activity that must now be monitored.

Page | 21

We have passed the level of complexity at which defense and identification of hostile actors can be performed without the use of AI. Going forward, only systems that apply AI to the task will be able to deal with the complexity and speed found in the cyber security environment. Perhaps the most effective weapon in a hacker’s arsenal is “spear phishing” — using personal information gathered about an intended target to send them an individually tailored message. An email seemingly written by a friend, or a link related to the target’s hobbies, has a high chance of avoiding suspicion. This method is currently quite labour-intensive, requiring the would-be hacker to manually conduct detailed research on each of their intended targets. However, an AI similar to chatbots could be used to automatically construct personalized messages for large numbers of people using data obtained from their browsing history, emails, and tweets. In this way, hostile actors could use AI to dramatically scale up their offensive operations.

AI will not only augment existing strategies for offense and defence but also open new fronts in the battle for cyber security as malicious actors seek ways to exploit the technology’s particular weaknesses. One novel avenue of attack that hostile actors may use is “data poisoning.” Since AI uses data to learn, hostile actors could tamper with the data set used to train the AI to make it do as they please. “Adversarial examples” could provide another new form of attack. Analogous to optical illusions, adversarial examples consist of modifying an AI’s input data in a way that would likely be undetectable by a human, but is calculated to cause the AI to misclassify the input in a certain way.

Page | 22

THE NEW VALUE OF DATA AI technology will alter the cyber security environment in yet another way as its hunger for data changes what kind of information constitutes a useful asset, transforming troves of information that would not previously have been of interest into tempting targets for hostile actors. While some cyber-attacks aim solely to disrupt, inflict damage or wreak havoc, many intend to capture strategic assets such as intellectual property. Increasingly, aggressors in cyberspace are playing a long-term game, looking to acquire data for purposes yet unknown. The ability of AI systems to make use of even innocuous data is giving rise to the tactic of “data hoovering” — harvesting whatever information one can and storing it for future strategic use, even if that use is not well defined at present. A recent report from The New York Times illustrates an example of this strategy in action. The report notes that the Chinese government has been implicated in the theft of personal data from more than 500 million customers of the Marriott hotel chain. Although commonly the chief concern regarding data breaches is the potential misuse of financial information, in this case, the information could be used to track down suspected spies by examining travel habits or to track and detain individuals to use them as bargaining chips in other matters.

Data and AI connect, unify and unlock both intangible and tangible assets; they shouldn’t be thought of as distinct. Quantity of data is becoming a key factor to success in business, national security, and even, as the Cambridge. The Marriott incident shows that relatively ordinary information can now provide a strategic asset in the fields of intelligence and national defense, as AI can wring useful insights out of seemingly disparate sources of information. Therefore, this sort of bulk data will likely become a more common target for actors operating in this domain Page | 23

IMPLICATIONS FOR POLICY AND GOVERNANCE These unfolding developments will force a rethinking of prevailing cyber security strategies. In an increasingly interconnected system, identifying the weakest link becomes more challenging, but also more essential. As sensors, machines, and people become interwoven providers of data for valuable AI systems, there will be a proliferation of entry points for cyber attacks.

While commonly thought of as a threat to privacy, AI also has the potential to help preserve privacy and exert control over proprietary data and its derived assets. The very same pieces of technology that enable more threatening types of cyber-attacks are also driving growth in the civilian economy and enabling more effective cyber defense. Policymakers will have to carefully consider how to regulate the use of these technologies, balancing the need to keep powerful weapons out of the hands of malicious actors without stifling innovation. It will be essential to

Cyber security requires a comprehensive strategy to minimize the weakest links; a piecemeal approach to cyber policy will not work. Since the training data that feeds the most important and revolutionary AI technologies is global in scope, gathered from across many different countries, it is clear that governance at the national level alone will not suffice.

harmonize such jurisdictions.

policies

across

national

Since hostile actors are capable of reaching across borders with stupendous ease, any country that unilaterally restricts the use and development of these technologies within its borders would be putting itself at a competitive disadvantage. AI algorithms learn from data to produce a valuable new prediction tool, and the output of AI can be separated from the original training data. Therefore, to truly control the data and its value, any assets that are produced from data must also be controlled. Page | 24

The infrastructure that allows the recording, storage and analysis of big data should be treated as an asset just like it is in any other sector. Furthermore, some sectors, such as finance, have systemic implications and are even more important to protect due to third-party linkages. Governing institutions will need to continue to improve their security posture in these and many other areas, including identity fraud. Since the AI software used for attack purposes is capable of rapidly evolving, this is an ongoing requirement rather than a one-off investment.

Artificial intelligence will reach human levels by around 2029. Follow that out further to, say, 2045, we will have multiplied the intelligence, the human biological machine intelligence of our civilization a billion-fold.” — Ray Kurzweil Page | 25

LINUX KERNEL -Ganesh S A 2nd Year

recent linux kernal improvemnt The biggest recent improvement—and nothing else is even close—is Linux will now become the platform for virtual private networks (VPNs). While Linux, thanks largely to OpenVPN, has long been an important VPN player, the addition of WireGuard, a revolutionary approach to VPNs, changes everything.

introduction After all these years, the core developers of Linux keep innovating. New versions will be faster and more stable. Linux runs pretty much everything: all of the world's 500 fastest supercomputers; most of the public cloud, even on Microsoft Azure; and 74% of smartphones. Indeed, thanks to Android, Linux is the most popular end-user operating system, nudging out Windows by a 4% margin (39% vs. 35%).

Why is it such a big deal? WireGuard has a rare quality in a security program: Its code is clean and simple. It also comes with state-of-theart cryptography technology support for the Noise protocol framework, Curve25519, ChaCha20, Poly1305, BLAKE2, SipHash24, and HKDF. What's even more important for users is it's much faster than its rivals. Benchmarks have shown WireGuard is more than twice as fast as OpenVPN. It's also cross-platform, so while you can run on a Linux server, your clients can be on Windows, macOS, BSD, iOS, Android, and of course, the Linux desktop Page | 26

The Linux 5.6 kernel also boasted several other major improvements. First, for those still running 32-bit systems, Linux solved its "end of time" problem. You see, at 03:14:08 Greenwich Mean Time (GMT, a.k.a. Coordinated Universal Time) on Tuesday, Jan. 19, 2038, the world ends. What will happen is the value for time in 32-bitbased Unix-based operating systems, like Linux and older versions of macOS, will run out of 32bit numbers. They would then start counting time backwards with negative numbers. And you thought the Y2K bug was scary! It all began because Unix, Linux's dad, dates the beginning of time in seconds from the Epoch: 00:00:00 GMT on Jan. 1, 1970. The rub was since Unix started as a 32-bit operating system, it kept time as a single signed 32-bit integer number. Those are a lot of seconds, but it's not enough. The fix retrofits even 32-bit Linux to use 64-bit numbers. Of course, this only delays the problem until 5:30:08 GMT Sunday, Dec. 4, 29,227,702,659. I'm OK with that.

Linux is a complex example of the wisdom of crowds. It's a good example in the sense that it shows you can set people to work in a decentralized way - that is, without anyone really directing their efforts in a particular direction - and still trust that they're going to come up with good answers. - James Surowiecki

conclusion Systems running on old software are probably not running as well as they might. New generations of software, certainly including Linux, create new technology and business opportunities. Operating systems are not a completely mature technology; there are still big improvements to be made.

Page | 27

P ATE NT S -Lihith Aravind R P 2nd Year

introduction Patent is a form of Intellectual Property Right granted and protected by law. It offers protection over creative labour for a specified period of time. The word Patent refers to a monopoly right over an invention. A patent is a grant of right, privilege or authority over an invention.

"Industries transform when certain patents expire.” ― Hendrith Vanlon Smith Jr, CEO of Mayflower-Plymouth

A patent is an exclusive right granted for an invention, which is a product or a process that provides, in general, a new way of doing something, or offers a new technical solution to a problem. To get a patent, technical information about the invention must be disclosed to the public in a patent application.

Page | 28

what kind of patent do they provide? In principle, the patent owner has the exclusive right to prevent or stop others from commercially exploiting the patented invention. In other words, patent protection means that the invention cannot be commercially made, used, distributed, imported or sold by others without the patent owner's consent.

how long a patent last? The protection is granted for a limited period, generally 20 years from the filing date of the application.

“When we think about business from this perspective: creating value for other peoples lives, solving problems for other people, meeting other peoples needs, fulfilling other peoples desires and receiving payment for those good things that we're doing - the ideas and the creativity flow more fluidly.” ― Hendrith Vanlon Smith Jr, CEO of Mayflower-Plymouth

Page | 29

VOL 01

RPA AND UIPATH A Game-Changing Duo for Business Automation

“ RPA, RPA, automation all the way, Say goodbye to routine tasks that once took all day ”

-Sundar N 3rd Year

These days, businesses are always on the lookout for ways to improve their operations, save money, and work smarter, not harder. That's where Robotic Process Automation (RPA) comes in - it's a fancy software that lets companies automate boring tasks that they used to have to do themselves. This means that employees can work on more important stuff that requires their brains and creativity. In this article, we'll take a closer look at RPA, why it's such a big deal, and all the cool things it can do.

The Emergence of RPA The rise of RPA has been steady, but it has only recently gained widespread adoption. In the past, companies used to employ people to do repetitive tasks, but now with RPA, they can have a digital workforce to do it for them. RPA has become more user-friendly and affordable, making it accessible to companies of all sizes and across all industries.

The Importance of RPA The benefits of RPA are many. By automating routine tasks, RPA frees up employees to focus on higher-value tasks that require human intelligence and creativity. RPA can also help companies reduce costs and increase efficiency. According to a recent study, companies that adopt RPA can expect to see a return on investment (ROI) of between 30% and 200% within the first year of implementation. Page | 29 Page | 30

Use Cases of RPA RPA has a wide range of use cases, but some of the most common include finance and accounting, human resources, customer service, healthcare, and manufacturing. For instance, RPA can automate accounts payable and receivable in finance and accounting, employee onboarding and offboarding in human resources, and medical billing and claims processing in healthcare.

UiPath UiPath is a leading RPA enterprise that provides an innovative platform for businesses to automate their processes. Their platform includes tools for designing, deploying, and managing automated processes. UiPath's technology is used by thousands of companies worldwide and has been recognized as a leader in the Gartner Magic Quadrant for RPA.

Statistics According to a recent report by Grand View Research, the global RPA market size was valued at USD 1.1 billion in 2020 and is expected to grow at a compound annual growth rate (CAGR) of 33.6% from 2021 to 2028. The report also states that the major drivers of RPA adoption are increasing demand for automation across industries and the need for cost-effective solutions.

conclusion RPA is a transformative technology that is changing the way businesses operate. With its ability to automate routine tasks, RPA frees up employees to focus on higher-value tasks, reduces costs, and increases efficiency. UiPath is a leading enterprise that's making RPA accessible to businesses of all sizes and across all industries. With the impressive ROI and numerous use cases, it's no surprise that RPA is rapidly gaining traction across the business world.

Page | 31 29

CREDITS EDITORS-IN-CHIEF Dr. K Devaki - HoD of CSBS Mrs. S Bakiyalakshmi - AP / CSBS Dheepiga A M - 3rd Year

EDITORIAL BOARD Mohideen Zafraan M Adhithyan Aravind Lihith Aravind Ramanujan Shereya P V Ganesh S A Suprajaa A Akshaya S

-

2nd 2nd 2nd 2nd 2nd 2nd 2nd 2nd

Year Year Year Year Year Year Year Year

DESIGNERS Rithik Sudharshan V Mari Sankar P Nandine S Swetha D

- 3rd Year - 2nd Year - 2nd Year - 2nd Year

Get in touch

Social

© Copyright 2013 - 2024 MYDOKUMENT.COM - All rights reserved.