Interesting Reads – 2019-05-22
Read the Current Interesting Reads Post at
Current
IR Quiz at https://infoforuse.blogspot.com/2019/05/ir-quiz-2019-05-22.html
Archives
of Interesting Reads Posts at
https://infoforuse.blogspot.com/2019/01/interesting-reads-archives-2019-2018.html
https://infoforuse.blogspot.com/2019/01/interesting-reads-archives-2019-2018.html
Articles
- How Operating Systems Work: 10 Concepts you Should Know as a Developer
- Some introductory notes on Design and Analysis of Algorithms
- Network Visibility For Dummies
- What Is Quantum Computing?
- These 5 foods are claimed to improve our health. But the amount we’d need to consume to benefit is… a lot
- How Technology Is Transforming Women’s Healthcare
- Book: Foundations of Data Science
- 10 lessons from Benjamin Franklin’s daily schedule that will double your productivity
- The Power of Hidden Teams
- Cyber attacks are rewriting the ‘rules’ of modern warfare – and we aren’t prepared for the consequences
- Google vs Apple vs Microsoft: Which Online Office Suite Should You Be Using?
- Tech and the future of transportation: From here to there
- How to remove a Trojan, Virus, Worm, or other Malware
- How to tackle India’s sexual violence epidemic – it starts with sex education
- Bonus: The most transformative TED Talks (25 talks)
Events /
Announcements
- IMSc, ACM, IEEE CS, IEEE TEMS and CSI -- Presentation on “Big Data and Data Lakes on the Cloud” at IMSc on 31st May 2019
- ACM, IEEE CS & CSI: Mini Tutorial on “Demystifying ML & AI” on 25th May 2019
- SETS - Cyber Security Training Programs
- AIC – IIIT Kottayam Incubation Centre on IoT-Cloud Research for Societal Problems
- Facebook India Innovation Accelerator. Last date to apply 9th June 2019
- TIC 2019: Tamil Internet Conference.
Tutorial-cum-Hackathon Workshop
7-9 Jun 2019 & 6-7 Jul 2019 - TIC 2019: Tamil Internet Conference. 20-22 Sep 2019 at Chennai
- ACM-W Lady Ada Programming Competition. Last date 10th Jun 2019
- Asia Pacific Internet Governance Academy 2019 during 12-16 August at Seoul, Korea
- IEEE INDICON-2019 at Marwadi University, Rajkot, Gujarat during 13-15 Dec 2019
IR-Quiz
Participate
in the IR Quiz – 2019-05-22 and win Rs. 250/- worth Amazon Gift Voucher from Dynamic Group. Visit https://infoforuse.blogspot.com/2019/05/ir-quiz-2019-05-22.html
Access Links
Read
the current Interesting Reads Post at https://infoforuse.blogspot.com/2019/05/interesting-reads-2019-05-22.html
Current
IR Quiz at https://infoforuse.blogspot.com/2019/05/ir-quiz-2019-05-22.html
Archives
of Interesting Reads Posts at
https://infoforuse.blogspot.com/2019/01/interesting-reads-archives-2019-2018.html
https://infoforuse.blogspot.com/2019/01/interesting-reads-archives-2019-2018.html
Feedback
We
will be pleased to have your feedback on the “Interesting Reads” posts being
sent once in five days.
Pl.
share the links of any interesting things you come across so that we can
include them in these email posts.
Also,
pl. share the email ids of your colleagues, friends, peers and contacts, if you
want them to be included in the google group to get regular posts.
Pl.
send all your communications to hrmohan.ieee@gmail.com
With
regards
HR
Mohan
========================================================
Articles
How
Operating Systems Work: 10 Concepts you Should Know as a Developer
The
author of this post shares his takeaways from the Georgia Tech’s course
“Introduction to Operating Systems” which teaches the basic OS abstractions,
mechanisms, and their implementations and contains concurrent programming
(threads and synchronization), inter-process communication, and an introduction
to distributed OSs. The post highlights 10 critical operating system concepts
that one needs to learn if wants to get good at developing software.
Some
introductory notes on Design and Analysis of Algorithms
An
algorithm is a recipe or a systematic method containing a sequence of
instructions to solve a computational problem. It takes some inputs, performs a
well-defined sequence of steps, and produces some output. Once we design an
algorithm, we need to know how well it performs on any input. In particular we
would like to know whether there are better algorithms for the problem. An
answer to this first demands a way to
analyze an algorithm in a machine-independent way. Algorithm design and
analysis form a central theme in computer science. We illustrate various tools
required for algorithm design and analysis through some examples.
eBook: Network Visibility For Dummies
Advanced cyber threats, cloud computing, and
exploding traffic volume pose significant challenges if you are responsible for
your organization’s network security and performance management. The concept of
‘network visibility’ is frequently introduced as the key to improvement. But
what exactly is network visibility and how does it help an organization keep
its defenses strong and optimize performance? This ebook, presented in the
straight-forward style of the For Dummies series, describes the concept from
the ground up. Download this guide to learn how to use a visibility foundation
to access all the relevant traffic moving through your organization and deliver
the information you need to protect and maximize customer experience.
What
Is Quantum Computing?
Quantum
computing is poised to upend entire industries from telecommunications and
cybersecurity to advanced manufacturing, finance, medicine, and beyond — but
few understand how quantum computers actually work. In the near future, quantum
computing could change the world.
These
5 foods are claimed to improve our health. But the amount we’d need to consume
to benefit is… a lot
Food
gives us the nutrients we need to survive, and we know a balanced diet
contributes to good health. Beyond this, many people seek out different foods
as “medicines”, hoping eating certain things might prevent or treat particular
conditions. It’s true many foods contain “bioactive compounds” – chemicals that
act in the body in ways that might promote good health. These are being studied
in the prevention of cancer, heart disease and other conditions.
But
the idea of food as medicine, although attractive, is easily oversold in the
headlines. Stories tend to be based on studies done in the lab, testing
concentrated extracts from foods. The effect seen in real people eating the
actual food is going to be different to the effects in a petri dish. If you do
the maths, you’ll find you actually need to eat enormous amounts of particular
foods to get an active dose of the desired element. In some cases, this might
endanger your health, rather than protecting it.
These
four foods (and one drink) show the common healing claims around the foods we
eat don’t always stack up.
Related
Story: Science or Snake Oil: can turmeric really shrink tumours, reduce
pain and kill bacteria?
How
Technology Is Transforming Women’s Healthcare
From
"digital" birth control to a wearable breast pump, the women’s health
market is gearing up to see an unprecedented wave of innovation. This post explores
the current landscape and what technologies are taking off.
Book: Foundations
of Data Science
Computer
science as an academic discipline began in the 1960s. Emphasis was on
programming languages, compilers, operating systems, and the mathematical
theory that supported these areas. Courses in theoretical computer science
covered finite automata, regular expressions, context-free languages, and
computability. In the 1970s, the study of algorithms was added as an important
component of theory. The emphasis was on making computers useful. Today, a
fundamental change is taking place and the focus is more on applications. There
are many reasons for this change. The merging of computing and communications
has played an important role. The enhanced ability to observe, collect, and
store data in the natural sciences, in commerce, and in other fields calls for
a change in our understanding of data and how to handle it in the modern
setting. The emergence of the web and social networks as central aspects of
daily life presents both opportunities and challenges for theory.
Related Videos:
Lectures on the course “Foundations of Data Science” by the author of
the above book -- Dr. Ravi Kannan at the MSR India Lab
10
lessons from Benjamin Franklin’s daily schedule that will double your
productivity
Benjamin
Franklin is best remembered as one of the Founding Fathers of the United
States, but he achieved much more in his lifetime. During Franklin’s 84 years
alive, he invented the lightning rod, made significant discoveries in physics
and population studies, wrote best-selling books, composed music and played the
violin, harp and guitar at a high level, founded many civic organizations,
including the University of Pennsylvania, and much more.
How
did Franklin achieve so much more than his contemporaries, given he had the
same 24 hours each day to get things done?
The
answer to this question lies in Franklin’s daily schedule. Here’s how it works,
including 10 lessons that will double your productivity this week.
The
Power of Hidden Teams
he
most-engaged employees work together in ways companies don’t even realize. This
5 part series on Engaging Employees covers: The Power of Hidden Teams; Engagement Around The World, Charted; Using Improv To Unite Your Team; Where
Measuring Engagement Goes Wrong; and The Most Engaged Employee In The World.
Cyber attacks are rewriting the ‘rules’ of modern warfare – and we
aren’t prepared for the consequences
Governments are becoming ever more reliant on
digital technology, making them more vulnerable to cyber attacks. In 2007,
Estonia was attacked by pro-Russian hackers who crippled government servers,
causing havoc. Cyber attacks in Ukraine targeted the country’s electricity
grid, while Iran’s nuclear power plants were infected by malware that could
have led to a nuclear meltdown.
In the US, president Trump recently declared a
“national emergency” to recognise the threat to US computer networks from
“foreign adversaries”.
Politically-motivated cyber attacks are becoming
increasingly commonplace but unlike traditional warfare between two or more
states, cyberwarfare can be launched by groups of individuals. On occasion, the
state is actually caught in the crosshairs of competing hacking groups.
This doesn’t mean that states don’t actively prepare
for such attacks. British defence officials have said they’re prepared to
conduct cyber attacks against Moscow’s power grid, should Russia decide to
launch an offensive
In most cases, cyberwarfare operations have been
conducted in the background, designed as scare tactics or displays of power.
But the blending of traditional warfare and cyberwarfare seems inevitable and a
recent incident added a new dimension.
Related
Post: Tallinn Manual on International Law Applicable to Cyberwarfare.
Related
Post: The next war will be an information war, and we’re not ready for it
Related
Post: Ready, aim, click: we need new laws to govern cyberwarfare
Google vs Apple vs Microsoft: Which Online Office Suite Should You
Be Using?
You don’t necessarily need to install a desktop
application to get your hands on a decent office suite any more, and the
biggest names in tech all have free, online productivity tools you can access
from any browser—so which one should you be using? We take a look at the
features, strengths, and weaknesses of each.
Tech and the future of transportation: From here to there
Transportation is about to get a technology-driven
reboot. The details are still taking shape, but future transport systems will
certainly be connected, data-driven and highly automated.
How to remove a Trojan, Virus, Worm, or other Malware
If you use a computer, read the newspaper, or watch
the news, you will know about computer viruses or other malware. These are
those malicious programs that once they infect your machine will start causing
havoc on your computer. What many people do not know is that there are many
different types of infections that are categorized in the general category of
Malware.
Malware - Malware is programming or files that are
developed for the purpose of doing harm. Thus, malware includes computer
viruses, worms, Trojan horses, spyware, hijackers, and certain type of adware.
This article will focus on those malware that are
considered viruses, trojans, worms, and viruses, though this information can be
used to remove the other types of malware as well. We will not go into specific
details about any one particular infection, but rather provide a broad overview
of how these infections can be removed. For the most part these instructions
should allow you to remove a good deal of infections, but there are some that
need special steps to be removed and these won't be covered under this
tutorial.
Related
Story: Simple and easy ways to keep your computer safe and secure on the
Internet
Related
Story: How to Protect and Harden a Computer against Ransomware
Though these stories are dated, they are still
useful.
How to tackle India’s sexual violence epidemic – it starts with sex
education
“Do you masturbate?”, “When did you first have
sexual intercourse?”, “Did you ask for consent?” These are just some of the
taboo-breaking questions I asked convicted rapists in a Delhi prison during
interviews for my research.
Most of these men did not understand what consent
meant or that it needed to be sought. Their stories also highlighted a sense of
entitlement and ownership over the victim. I was not particularly surprised by
their discomfort and lack of awareness. I myself had never received any form of
sex education at home or at school while growing up in India.
Related
Story: How to stop violence against women in India — it starts with
training police officers
Related
Story: India's sex offenders register a first step to curb assaults – but
cultural attitudes to women still need challenging
Bonus: The most
transformative TED Talks (25 talks)
These are some of the TED Talks that had you looking
at the world differently by the time the credits rolled (in no specific order).
Events /
Announcements
IMSc, ACM, IEEE
CS, IEEE TEMS and CSI -- Presentation on “Big Data and Data Lakes on the Cloud”
at IMSc on 31st May 2019
Presentation on “Big
Data and Data Lakes on the Cloud” at IMSc on 31st May 2019 at 5.00 p.m.
The formal pdf
invite is at
http://ieeecs-madras.managedbiz.com/pgms/2019/mm-190531-bigdata-on-cloud.pdf
and also at http://bit.ly/2HHtL4I
To facilitate logistics, please pre-register at http://bit.ly/2VF9jGy
http://ieeecs-madras.managedbiz.com/pgms/2019/mm-190531-bigdata-on-cloud.pdf
and also at http://bit.ly/2HHtL4I
To facilitate logistics, please pre-register at http://bit.ly/2VF9jGy
ACM, IEEE CS & CSI: Mini Tutorial on
“Demystifying ML & AI” on 25th May 2019
Theme:
Machine learning & Artificial Intelligence
Date,
Time & Venue: Saturday, 25th May
2019 from 9.30 a.m. to 12.30 p.m. at Amitysoft, 6/22, Second Floor, Dhandapani
Street, T. Nagar, Chennai - 600 017
Registration
at: http://bit.ly/2vEYwkV
SETS - Cyber Security Training
Programs
SETS
is conducting number of Cyber Security Training Programs as detailed below:
- Block Chain for Cyber Security (27-29 May 2019 - 3 Days) and
- Artificial Intelligence for Cyber Security (30-31 May 2019 - 2Days)
For
details see the brochure at https://www.setsindia.in/PdfDocs/CYBERBRC.pdf
AIC – IIIT Kottayam
Incubation Centre on IoT-Cloud Research for Societal Problems
The
incubation centre, AIC IIITKottayam Foundation, is a non-profit Sec.8 company.
It is sanctioned under the Atal Innovation Mission scheme of Govt. of India.
The centre will address the existing problems of entrepreneurs by providing
them sufficient input in terms of knowledge, guidance, mentoring, training, and
demonstrations. In addition, the space and facility will be provided to them.
The centre will incubate customers to increase the utility of technology
relating to IoT and Cloud solutions for societal benefits.
Incubates
at AIC-IIITKottayam will get opportunities to create their prototype and
implement them after a thorough market analysis is achieved from their end. The
product prototype could be initially designed with a 3D printer (if required);
the software prototype could be designed at the computing space available at
AIC-IIITKottayam; and, the real implementation could be carried out at the
hardware level.
In
addition, the software services, including platform services, will be designed
considering the end-to-end holistic picture of the product in the mind. Later,
the models will be exhibited jointly with the sales department of
AIC-IIITKottayam.
The
main focus of AIC-IIITKottayam would be to develop societal applications using
IoT cloud technologies or similar high-end technologies.
Applications
are open for Jobs (walk-in interviews) incubates, mentors and partners.
For
more details pl. visit http://icentre.iiitkottayam.ac.in
Principal
Investigator: Dr. Shajulin Benedict. Email: incubate@iiitkottayam.ac.in
Phone
/ WhatsApp: +91-482-2202155, +91-9443543746
Facebook India
Innovation Accelerator. Last date to
apply 9th June 2019
Facebook
is partnering with T-Hub to launch the second edition of the India Innovation
Hub Accelerator program, focused on 'AI for Social Good'. This edition of the
accelerator program aims to support startups that are focused on building
products and services, which are solving complex social problems, using AI in
the domains of Gender Equality, Decent Work and Economic Opportunity,
Innovation Infrastructure, Climate Change, and Peace and Justice.
Startups
selected for the program will receive support to scale their efforts and
improve their products and services, to better tackle fundamental challenges
facing the region, as well as scale internationally. Facebook will provide
technical support, mentorship, training on the use of Facebook products and
tools, and access to dozens of experts within the company. Through various
interventions, Facebook and T-Hub will help startups refine their methodology
and playbook, accelerating their growth.
Last
date to apply is 9th June 2019.
For
details pl. visit https://t-hub.co/innovation_accelerator/
TIC 2019: Tamil
Internet Conference. Tutorial-cum-Hackathon Workshop: 7-9
Jun 2019 & 6-7 Jul 2019
TIC
2019 -- Tamil Internet Conference proposes to conduct a Pre-Conference Tutorial
cum Hackathon which is open to students and professionals. Here, Participants
will be trained on the usage of Tamil NLP/ChatBots during the Tutorial.
Participants can also come up with their own ideas and prototype them during
Hackathon. Top three products will be recognized with prizes. For Registration
of workshop, follow the link:
More
details at https://tamilinternetconference.org/tic2019/index.php/workshop/
TIC 2019: Tamil
Internet Conference. 20-22 Sep 2019 at
Chennai
The
18th Edition of Tamil Internet Conference (TIC 2019), is jointly organized by
International Forum for Information Technology in Tamil (INFITT) and Anna
University, Chennai, India from
September 20-22, 2019 . TIC 2019 invites the submission of technical
papers from researchers who are involved in different aspects of Tamil
Computing and Information Technology to send their research work for
presentation in one of the technical sessions of the main track of the
conference which will be held in Anna University Chennai, India during the
above period.
TIC
2019 welcomes double-blind anonymous submissions on significant, original, and
previously unpublished research on all the aspects of Tamil computing. Kindly
go through the attached brochure to know the scope of the conference.
More
details at https://tamilinternetconference.org/tic2019
Asia Pacific
Internet Governance Academy 2019 during 12-16 August at Seoul, Korea
The
Asia Pacific Internet Governance Academy (APIGA) is a 5-day capacity
development workshop focused on topics related to Internet Corporation for
Assigned Names and Numbers (ICANN) and Internet governance. It is targeted at,
but not limited to, undergraduate and graduate students from universities and
tertiary educational institutions in South Korea and Asia Pacific. Anyone from
the Asia Pacific region, interested in Internet governance issues and related
international activities, and between the ages of 18 and 35, are welcome to
participate.
APIGA
2019 will be held in Sejong Hotel in Seoul, Republic of Korea, from 12-16
August 2019. APIGA is co-hosted by ICANN and the Korea Internet & Security
Agency (KISA),
For
fellowship and more details pl. visit https://community.icann.org/display/GSEAPAC/Asia+Pacific+Internet+Governance+Academy
ACM-W Lady Ada Programming Competition. Last date 10th Jun
2019
ACM W India pleased to inform the
launch of Lady Ada Programming competition
for girl students. This coding contest
will act as platform to develop and showcase the coding talent which will
empower the girl techies across India.
ACM-W creates a portal of
opportunities for girls to explore, enhance and expand their coding skills.
This coding contest happens in three levels with the first two rounds online
and the last round at IIT Gandhinagar,
Gujarat.
The Last Date for Registration : 10th
Jun 2019 .
Registration link: http://assessments.reliscore.com/acmw/register53146/
IEEE INDICON-2019 at Marwadi University, Rajkot, Gujarat during 13-15
Dec 2019
IEEE INDICON 2019 – the flagship
conference of the IEEE India Council – will be held at Marwadi University,
Rajkot, Gujarat from December 13 to 15, 2019 with the theme “Applying
Artificial Intelligence in Engineering for prosperity and betterment of humanity”.
The Call for Papers is now available
on the IEEE INDICON 2019 website; http://indicon2019.in/
IR-Quiz
Participate
in the IR Quiz – 2019-05-22 and win Rs. 250/- worth Amazon Gift Voucher from Dynamic Group. Visit https://infoforuse.blogspot.com/2019/05/ir-quiz-2019-05-22.html
Archives
of Interesting Reads
To
access the past posts of Interesting Reads, pl. visit
Feedback
We
will be pleased to have your feedback on the “Interesting Reads” posts being
sent once in five days.
Pl.
share the links of any interesting things you come across so that we can
include them in these email posts.
Also,
pl. share the email ids of your colleagues, friends, peers and contacts, if you
want them to be included in the google group to get regular posts.
Pl.
send all your communications to hrmohan.ieee@gmail.com
With
regards
HR
Mohan