Tuesday 21 May 2019

Interesting Reads – 2019-05-22


Interesting Reads – 2019-05-22   

Read the Current Interesting Reads Post at



Articles

  • How Operating Systems Work: 10 Concepts you Should Know as a Developer
  • Some introductory notes on Design and Analysis of Algorithms
  • Network Visibility For Dummies
  • What Is Quantum Computing?
  • These 5 foods are claimed to improve our health. But the amount we’d need to consume to benefit is… a lot
  • How Technology Is Transforming Women’s Healthcare
  • Book: Foundations of Data Science
  • 10 lessons from Benjamin Franklin’s daily schedule that will double your productivity
  • The Power of Hidden Teams
  • Cyber attacks are rewriting the ‘rules’ of modern warfare – and we aren’t prepared for the consequences
  • Google vs Apple vs Microsoft: Which Online Office Suite Should You Be Using?
  • Tech and the future of transportation: From here to there
  • How to remove a Trojan, Virus, Worm, or other Malware
  • How to tackle India’s sexual violence epidemic – it starts with sex education
  • Bonus:  The most transformative TED Talks (25 talks)

Events / Announcements

  • IMSc, ACM, IEEE CS, IEEE TEMS and CSI -- Presentation on “Big Data and Data Lakes on the Cloud” at IMSc on 31st May 2019
  • ACM, IEEE CS & CSI: Mini Tutorial on “Demystifying ML & AI” on 25th May 2019
  • SETS - Cyber Security Training Programs
  • AIC – IIIT Kottayam Incubation Centre on IoT-Cloud Research for Societal Problems
  • Facebook India Innovation Accelerator.  Last date to apply 9th June 2019
  • TIC 2019: Tamil Internet Conference. Tutorial-cum-Hackathon Workshop
    7-9  Jun 2019  & 6-7 Jul 2019
  • TIC 2019: Tamil Internet Conference.  20-22 Sep 2019 at Chennai
  • ACM-W Lady Ada Programming Competition. Last date 10th Jun 2019
  • Asia Pacific Internet Governance Academy 2019 during 12-16 August at Seoul, Korea
  • IEEE INDICON-2019 at Marwadi University, Rajkot, Gujarat during 13-15 Dec 2019

IR-Quiz

Participate in the IR Quiz – 2019-05-22 and win Rs. 250/- worth Amazon Gift Voucher  from Dynamic Group. Visit https://infoforuse.blogspot.com/2019/05/ir-quiz-2019-05-22.html

Access Links




Feedback

We will be pleased to have your feedback on the “Interesting Reads” posts being sent once in five days. 

Pl. share the links of any interesting things you come across so that we can include them in these email posts. 

Also, pl. share the email ids of your colleagues, friends, peers and contacts, if you want them to be included in the google group to get regular posts.  

Pl. send all your communications to hrmohan.ieee@gmail.com 

With regards
HR Mohan

========================================================

Articles

How Operating Systems Work: 10 Concepts you Should Know as a Developer

The author of this post shares his takeaways from the Georgia Tech’s course “Introduction to Operating Systems” which teaches the basic OS abstractions, mechanisms, and their implementations and contains concurrent programming (threads and synchronization), inter-process communication, and an introduction to distributed OSs. The post highlights 10 critical operating system concepts that one needs to learn if wants to get good at developing software.


Some introductory notes on Design and Analysis of Algorithms

An algorithm is a recipe or a systematic method containing a sequence of instructions to solve a computational problem. It takes some inputs, performs a well-defined sequence of steps, and produces some output. Once we design an algorithm, we need to know how well it performs on any input. In particular we would like to know whether there are better algorithms for the problem. An answer to this  first demands a way to analyze an algorithm in a machine-independent way. Algorithm design and analysis form a central theme in computer science. We illustrate various tools required for algorithm design and analysis through some examples.


eBook: Network Visibility For Dummies
Advanced cyber threats, cloud computing, and exploding traffic volume pose significant challenges if you are responsible for your organization’s network security and performance management. The concept of ‘network visibility’ is frequently introduced as the key to improvement. But what exactly is network visibility and how does it help an organization keep its defenses strong and optimize performance? This ebook, presented in the straight-forward style of the For Dummies series, describes the concept from the ground up. Download this guide to learn how to use a visibility foundation to access all the relevant traffic moving through your organization and deliver the information you need to protect and maximize customer experience.


What Is Quantum Computing?

Quantum computing is poised to upend entire industries from telecommunications and cybersecurity to advanced manufacturing, finance, medicine, and beyond — but few understand how quantum computers actually work. In the near future, quantum computing could change the world.


These 5 foods are claimed to improve our health. But the amount we’d need to consume to benefit is… a lot

Food gives us the nutrients we need to survive, and we know a balanced diet contributes to good health. Beyond this, many people seek out different foods as “medicines”, hoping eating certain things might prevent or treat particular conditions. It’s true many foods contain “bioactive compounds” – chemicals that act in the body in ways that might promote good health. These are being studied in the prevention of cancer, heart disease and other conditions.

But the idea of food as medicine, although attractive, is easily oversold in the headlines. Stories tend to be based on studies done in the lab, testing concentrated extracts from foods. The effect seen in real people eating the actual food is going to be different to the effects in a petri dish. If you do the maths, you’ll find you actually need to eat enormous amounts of particular foods to get an active dose of the desired element. In some cases, this might endanger your health, rather than protecting it.

These four foods (and one drink) show the common healing claims around the foods we eat don’t always stack up.

Related Story: Science or Snake Oil: can turmeric really shrink tumours, reduce pain and kill bacteria?

How Technology Is Transforming Women’s Healthcare

From "digital" birth control to a wearable breast pump, the women’s health market is gearing up to see an unprecedented wave of innovation. This post explores the current landscape and what technologies are taking off.


Book: Foundations of Data Science
Computer science as an academic discipline began in the 1960s. Emphasis was on programming languages, compilers, operating systems, and the mathematical theory that supported these areas. Courses in theoretical computer science covered finite automata, regular expressions, context-free languages, and computability. In the 1970s, the study of algorithms was added as an important component of theory. The emphasis was on making computers useful. Today, a fundamental change is taking place and the focus is more on applications. There are many reasons for this change. The merging of computing and communications has played an important role. The enhanced ability to observe, collect, and store data in the natural sciences, in commerce, and in other fields calls for a change in our understanding of data and how to handle it in the modern setting. The emergence of the web and social networks as central aspects of daily life presents both opportunities and challenges for theory.

Related  Videos:  Lectures on the course “Foundations of Data Science” by the author of the above book -- Dr. Ravi Kannan at the MSR India Lab

10 lessons from Benjamin Franklin’s daily schedule that will double your productivity

Benjamin Franklin is best remembered as one of the Founding Fathers of the United States, but he achieved much more in his lifetime. During Franklin’s 84 years alive, he invented the lightning rod, made significant discoveries in physics and population studies, wrote best-selling books, composed music and played the violin, harp and guitar at a high level, founded many civic organizations, including the University of Pennsylvania, and much more.

How did Franklin achieve so much more than his contemporaries, given he had the same 24 hours each day to get things done?

The answer to this question lies in Franklin’s daily schedule. Here’s how it works, including 10 lessons that will double your productivity this week.


The Power of Hidden Teams

he most-engaged employees work together in ways companies don’t even realize. This 5 part series on Engaging Employees covers: The Power of Hidden Teams;  Engagement Around The World, Charted;  Using Improv To Unite Your Team; Where Measuring Engagement Goes Wrong; and The Most Engaged Employee In The World.


Cyber attacks are rewriting the ‘rules’ of modern warfare – and we aren’t prepared for the consequences
 
Governments are becoming ever more reliant on digital technology, making them more vulnerable to cyber attacks. In 2007, Estonia was attacked by pro-Russian hackers who crippled government servers, causing havoc. Cyber attacks in Ukraine targeted the country’s electricity grid, while Iran’s nuclear power plants were infected by malware that could have led to a nuclear meltdown.

In the US, president Trump recently declared a “national emergency” to recognise the threat to US computer networks from “foreign adversaries”.

Politically-motivated cyber attacks are becoming increasingly commonplace but unlike traditional warfare between two or more states, cyberwarfare can be launched by groups of individuals. On occasion, the state is actually caught in the crosshairs of competing hacking groups.

This doesn’t mean that states don’t actively prepare for such attacks. British defence officials have said they’re prepared to conduct cyber attacks against Moscow’s power grid, should Russia decide to launch an offensive

In most cases, cyberwarfare operations have been conducted in the background, designed as scare tactics or displays of power. But the blending of traditional warfare and cyberwarfare seems inevitable and a recent incident added a new dimension.

Full Post               
Related Post: Tallinn Manual on International Law Applicable to Cyberwarfare.
Related Post: The next war will be an information war, and we’re not ready for it
Related Post: Ready, aim, click: we need new laws to govern cyberwarfare

Google vs Apple vs Microsoft: Which Online Office Suite Should You Be Using?

You don’t necessarily need to install a desktop application to get your hands on a decent office suite any more, and the biggest names in tech all have free, online productivity tools you can access from any browser—so which one should you be using? We take a look at the features, strengths, and weaknesses of each.


Tech and the future of transportation: From here to there

Transportation is about to get a technology-driven reboot. The details are still taking shape, but future transport systems will certainly be connected, data-driven and highly automated.


How to remove a Trojan, Virus, Worm, or other Malware

If you use a computer, read the newspaper, or watch the news, you will know about computer viruses or other malware. These are those malicious programs that once they infect your machine will start causing havoc on your computer. What many people do not know is that there are many different types of infections that are categorized in the general category of Malware.

Malware - Malware is programming or files that are developed for the purpose of doing harm. Thus, malware includes computer viruses, worms, Trojan horses, spyware, hijackers, and certain type of adware.

This article will focus on those malware that are considered viruses, trojans, worms, and viruses, though this information can be used to remove the other types of malware as well. We will not go into specific details about any one particular infection, but rather provide a broad overview of how these infections can be removed. For the most part these instructions should allow you to remove a good deal of infections, but there are some that need special steps to be removed and these won't be covered under this tutorial.

Related Story: Simple and easy ways to keep your computer safe and secure on the Internet
Related Story: How to Protect and Harden a Computer against Ransomware
Though these stories are dated, they are still useful.

How to tackle India’s sexual violence epidemic – it starts with sex education

“Do you masturbate?”, “When did you first have sexual intercourse?”, “Did you ask for consent?” These are just some of the taboo-breaking questions I asked convicted rapists in a Delhi prison during interviews for my research.

Most of these men did not understand what consent meant or that it needed to be sought. Their stories also highlighted a sense of entitlement and ownership over the victim. I was not particularly surprised by their discomfort and lack of awareness. I myself had never received any form of sex education at home or at school while growing up in India.

Related Story: How to stop violence against women in India — it starts with training police officers
Related Story: India's sex offenders register a first step to curb assaults – but cultural attitudes to women still need challenging

Bonus:  The most transformative TED Talks (25 talks)

These are some of the TED Talks that had you looking at the world differently by the time the credits rolled (in no specific order).


Events / Announcements

IMSc, ACM, IEEE CS, IEEE TEMS and CSI -- Presentation on “Big Data and Data Lakes on the Cloud” at IMSc on 31st May 2019

Presentation on “Big Data and Data Lakes on the Cloud” at IMSc on 31st May 2019 at 5.00 p.m.

The formal pdf invite is at
http://ieeecs-madras.managedbiz.com/pgms/2019/mm-190531-bigdata-on-cloud.pdf
and also at 
http://bit.ly/2HHtL4I

To facilitate logistics, please pre-register at 
http://bit.ly/2VF9jGy

ACM, IEEE CS & CSI: Mini Tutorial on “Demystifying ML & AI” on 25th May 2019

Theme: Machine learning & Artificial Intelligence

Date, Time & Venue:  Saturday, 25th May 2019 from 9.30 a.m. to 12.30 p.m. at Amitysoft, 6/22, Second Floor, Dhandapani Street, T. Nagar, Chennai - 600 017


Registration at: http://bit.ly/2vEYwkV

SETS - Cyber Security Training Programs

SETS is conducting number of Cyber Security Training Programs  as detailed below:

  • Block Chain for Cyber Security (27-29 May 2019 - 3 Days) and
  • Artificial Intelligence for Cyber Security (30-31 May 2019 - 2Days)

For details see the brochure at https://www.setsindia.in/PdfDocs/CYBERBRC.pdf

AIC – IIIT Kottayam Incubation Centre on IoT-Cloud Research for Societal Problems

The incubation centre, AIC IIITKottayam Foundation, is a non-profit Sec.8 company. It is sanctioned under the Atal Innovation Mission scheme of Govt. of India. The centre will address the existing problems of entrepreneurs by providing them sufficient input in terms of knowledge, guidance, mentoring, training, and demonstrations. In addition, the space and facility will be provided to them. The centre will incubate customers to increase the utility of technology relating to IoT and Cloud solutions for societal benefits.

Incubates at AIC-IIITKottayam will get opportunities to create their prototype and implement them after a thorough market analysis is achieved from their end. The product prototype could be initially designed with a 3D printer (if required); the software prototype could be designed at the computing space available at AIC-IIITKottayam; and, the real implementation could be carried out at the hardware level.

In addition, the software services, including platform services, will be designed considering the end-to-end holistic picture of the product in the mind. Later, the models will be exhibited jointly with the sales department of AIC-IIITKottayam.

The main focus of AIC-IIITKottayam would be to develop societal applications using IoT cloud technologies or similar high-end technologies.

Applications are open for Jobs (walk-in interviews) incubates, mentors and partners.

For more details pl. visit http://icentre.iiitkottayam.ac.in

Principal Investigator: Dr. Shajulin Benedict. Email:  incubate@iiitkottayam.ac.in
Phone / WhatsApp: +91-482-2202155, +91-9443543746

Facebook India Innovation Accelerator.  Last date to apply 9th June 2019

Facebook is partnering with T-Hub to launch the second edition of the India Innovation Hub Accelerator program, focused on 'AI for Social Good'. This edition of the accelerator program aims to support startups that are focused on building products and services, which are solving complex social problems, using AI in the domains of Gender Equality, Decent Work and Economic Opportunity, Innovation Infrastructure, Climate Change, and Peace and Justice.

Startups selected for the program will receive support to scale their efforts and improve their products and services, to better tackle fundamental challenges facing the region, as well as scale internationally. Facebook will provide technical support, mentorship, training on the use of Facebook products and tools, and access to dozens of experts within the company. Through various interventions, Facebook and T-Hub will help startups refine their methodology and playbook, accelerating their growth.

Last date to apply is 9th June 2019.


TIC 2019: Tamil Internet Conference. Tutorial-cum-Hackathon Workshop:   7-9  Jun 2019  & 6-7 Jul 2019

TIC 2019 -- Tamil Internet Conference proposes to conduct a Pre-Conference Tutorial cum Hackathon which is open to students and professionals. Here, Participants will be trained on the usage of Tamil NLP/ChatBots during the Tutorial. Participants can also come up with their own ideas and prototype them during Hackathon. Top three products will be recognized with prizes. For Registration of workshop, follow the link:


TIC 2019: Tamil Internet Conference.  20-22 Sep 2019 at Chennai

The 18th Edition of Tamil Internet Conference (TIC 2019), is jointly organized by International Forum for Information Technology in Tamil (INFITT) and Anna University, Chennai, India from  September 20-22, 2019 . TIC 2019 invites the submission of technical papers from researchers who are involved in different aspects of Tamil Computing and Information Technology to send their research work for presentation in one of the technical sessions of the main track of the conference which will be held in Anna University Chennai, India during the above period.

TIC 2019 welcomes double-blind anonymous submissions on significant, original, and previously unpublished research on all the aspects of Tamil computing. Kindly go through the attached brochure to know the scope of the conference.


Asia Pacific Internet Governance Academy 2019 during 12-16 August at Seoul, Korea

The Asia Pacific Internet Governance Academy (APIGA) is a 5-day capacity development workshop focused on topics related to Internet Corporation for Assigned Names and Numbers (ICANN) and Internet governance. It is targeted at, but not limited to, undergraduate and graduate students from universities and tertiary educational institutions in South Korea and Asia Pacific. Anyone from the Asia Pacific region, interested in Internet governance issues and related international activities, and between the ages of 18 and 35, are welcome to participate.

APIGA 2019 will be held in Sejong Hotel in Seoul, Republic of Korea, from 12-16 August 2019. APIGA is co-hosted by ICANN and the Korea Internet & Security Agency (KISA),


ACM-W Lady Ada Programming Competition. Last date 10th Jun 2019

ACM W India pleased to inform the launch of Lady Ada Programming   competition for girl students. This coding  contest will act as platform to develop and showcase the coding talent which will empower the girl techies across India. 

ACM-W creates a portal of opportunities for girls to explore, enhance and expand their coding skills. This coding contest happens in three levels with the first two rounds online and the last round at  IIT Gandhinagar, Gujarat.

The Last Date for Registration : 10th Jun 2019  .



IEEE INDICON-2019 at Marwadi University, Rajkot, Gujarat during 13-15 Dec 2019

IEEE INDICON 2019 – the flagship conference of the IEEE India Council – will be held at Marwadi University, Rajkot, Gujarat from December 13 to 15, 2019 with the theme “Applying Artificial Intelligence in Engineering for prosperity and betterment of humanity”.

The Call for Papers is now available on the IEEE INDICON 2019 website; http://indicon2019.in/

IR-Quiz

Participate in the IR Quiz – 2019-05-22 and win Rs. 250/- worth Amazon Gift Voucher  from Dynamic Group. Visit https://infoforuse.blogspot.com/2019/05/ir-quiz-2019-05-22.html

Archives of Interesting Reads 

To access the past posts of Interesting Reads, pl. visit

Feedback

We will be pleased to have your feedback on the “Interesting Reads” posts being sent once in five days. 

Pl. share the links of any interesting things you come across so that we can include them in these email posts. 

Also, pl. share the email ids of your colleagues, friends, peers and contacts, if you want them to be included in the google group to get regular posts.  

Pl. send all your communications to hrmohan.ieee@gmail.com  

With regards
HR Mohan