Friday, 25 October 2013

AADC – Android Application Development Challenge to be held at Fluxus’14 – IIT Indore

mailer header
FLUXUS 2014, IIT Indore and i3indya Technologies are organizing a National Level Event AADC (ANDROID APPLICATION DEVELOPMENT CHALLENGE) at FLUXUS 2014, an Annual Techno-Cultural Event of IIT Indore for the first time in India.
Prove your creativity at National Level
Join AADC
(Android Application Development Challenge)
Prizes Up to Rs 1 Lakh to be won!!
Event Details are as follows
Round 1   (Android Workshop to be held in 30 Zonal Centers)
·         The Android Outreach workshop will be organized in 30 different Zonal Centers/Colleges all across India from 15th October 2013 to 3rd February 2014.
·         The workshop will be organized by i3indya Technologies, Delhi (Workshop Partner –FLUXUS 2014, IIT Indore & Android Mega Event Prize Sponsor)
·         The duration of workshop will be of 21 hours and will be covered in 3 days.
·         The Fees of Workshop will be Rs 1,000/- per head.
·         Each Student will get the following during the workshop :
-          Software Toolkit  CD (Containing Software, Study Material, e-books, Tutorials etc)
-           Certificate of Participation from FLUXUS 2014, IIT Indore & i3indyaTechnologies.

Round 2   (Prelims of AADC at Zonal Center)
·           At the end of workshop on 3rd day, Prelims round of Android Mega Event will be organized at the Zonal Center.
·         2 (Two) WINNERS will get Direct Entry to the Final Round of AADC at FLUXUS 2014, IIT Indore where participants from PAN India would be participating.
·         Winning team will also get Certificate of Merit from FLUXUS 2014, IIT Indore & i3indya Technologies.

Round 3   (Finale of AADC at IIT Indore)
·         Winners of all zonal centers will be competing against each other at the Mega Event AADC at FLUXUS 2014, IIT INDORE during 7th – 9th February 2014.
·         Winner of the finale round will be awarded and honored by FLUXUS IIT INDORE.
·         A certificate of excellence will also be awarded to the Winner from FLUXUS INDORE.
·         Chance to work with i3indya Technologies on Application Development projects. Prizes worth Rs 1,00,000/- which will include Tablets/Android Phones will be given the winner as well as runner ups.

Know More about this Event

FLuxus 2014 Official Site

Thursday, 24 October 2013

10 Biggest Tech Things That Died In 2013!!

2013 was definitely a year of big tech deaths one after another the tech giants declared the demise of everything. Here's a list of 10 biggest death of 2013,
1. Google Reader
Google, which counts about a zillion products among its offerings, also regularly cleans house and kills off numerous programs. The killing that raised the biggest stink this year was that of Google Reader, the RSS reader that the company snuffed in July, resulting in a feeding frenzy among alternative RSS readers.

2. BlackBerry, Dell, BMC as public companies
No more BBRY, DELL or BMC on Nasdaq. Well, we suppose it’s possible any of these networking companies that have gone private this year could return to the public market, but all have a ton of work to do. (BlackBerry also did away with the Research in Motion name this year.)

3. Cloud storage provider Nirvanix
After seven years, this company that pulled in $70 million in venture financing pulled the plug. To customers, the turn of events happened quickly, with Nirvanix giving just a few weeks notice that it was time to get your data the heck off its servers and onto your own on another provider’s.

4. Windows RT tablets (other than Microsoft Surface 2)
Microsoft’s Windows RT tablet partners have been dropping off one by one, with Dell and Asus among the latest throwing in the towel in 2013 on such ARM-based devices. Microsoft continues to fight the good fight, or at least some kind of fight, and released a new RT tablet, the Surface 2, in September.

5. AltaVista search engine
Yes, yes, the once novel search engine was actually still alive this year, hiding within the confines of Yahoo. Until Yahoo over the summer obliterated it and a handful of other little-used services such as RSS Alerts and something called Yahoo Neighbors Beta.

6. Original iPhone
Apple and most of its customers have moved on from the original 2007 iPhone 2G, with seven models being released since then, most recently the iPhone 5s and 5c. Apple in June labeled the original iPhone as “obsolete,” meaning no more repairs or parts from Apple stores.

7. Hotmail
Yes, you might still have a Hotmail address, but Microsoft at least behind the scenes killed off Hotmail in May, switching over to Outlook.com. Among the new things for Microsoft’s messaging customers this year: SMTP support and deeper integration with SkyDrive cloud storage.

8. Fuduntu Linux
This cross between Fedora and Ubuntu, initially launched in late 2010 and optimized for low-power devices, met its end in April 2013. The decision was made, according to an official blog post, in part because the GNOME 2 desktop environment used by Fuduntu is becoming less well-supported than in the past.

9. Roadrunner Supercomputer
Roadrunner, the first supercomputer to break the once-elusive petaflop barrier — 1 million billion calculations per second — was decommissioned on March 31. The IBM system achieved petaflop speed in 2008, shortly after installation at Los Alamos National Laboratory. The lab’s Gary Grider said at the time that "Even in death, we are trying to learn from Roadrunner,” referring to experiments after the shutoff and before dismantling on topics such as operating system memory compression techniques.

10. Yahoo T-shirt rewards
Yahoo said in October that it will stop giving T-shirts as a reward for finding security vulnerabilities after a public shaming it's calling "t-shirt gate." The company received a drubbing from the Swiss security company High-Tech Bridge after it found four serious vulnerabilities in Yahoo's network, all of which have now been fixed. Starting Oct. 31, Yahoo will pay rewards ranging from $150 to $15,000 for vulnerabilities provided those flaws are new, unique or high risk. It plans to retroactively reward researchers who notified the company of issues going back to July 1 (Jeremy Kirk, IDG News Service).

Courtesy: Network World
Get More Updates about Technology.. subscribe www.i3indyatechnologies.blogspot.in
Trending Topic : Join India's First Android App Development Competition at FLUXUS 2014 - IIT Indore !! to know more visit www.aadc.in

Wednesday, 23 October 2013

Get Ready For Winter Training 2013-14 by i3indya Technologies

clip_image001
Your Passion could be your Profession!
Join Winter Training at i3indya Technologies



WINTER TRAINING 2013
on
Embedded Systems & Robotics
&
Ethical Hacking & Cyber Security

i3indya™ Technologies a globally recognized Company invites B.Tech/BE (any branch, year)/ MCA / BCA / MBA(IT) students for Winter Training/Internship 2013. The internship courses are starting from Dec-2013 till Feb - 2014.
Course Duration: 15 / 30 Days

Course Highlights - 15 Days Duration (45 hrs)
Course
:
Ethical Hacking & Cyber Security (Advance Module 1.1)
Certification
:
Participation Certificate by i3indya™ Technologies
Study Material
:
Books & CD Free to each participant
Topics
:
13 Topics Covered in 15 Days
Fees
:
5000/- per candidate

Course
:
Embedded Systems & Robotics
Certification
:
Participation Certificate by i3indya™ Technologies
Study Material
:
Books & CD Free to each participant
Topics
:
15 Topics Covered in 15 Days
Fees
:
7900/- per candidate

Course Highlights - 30 Days Duration (90 hrs)
Course
:
Ethical Hacking & Cyber Security (Advance Module 1.1 + 
Advance Module 1.2)
Certification
:
Participation Certificate by i3indya™ Technologies
Study Material
:
Books & CD Free to each participant
Topics
:
24 Topics Covered in 30 Days
Fees
:
10200/- per candidate

Course
:
Embedded Systems & Robotics
Certification
:
Participation Certificate by i3indya™ Technologies
Study Material
:
Books & CD Free to each participant
Topics
:
27 Topics Covered in 30 Days
Fees
:
10900/- per candidate

For More Information
Get all Updates
www.i3indyawintertraining.blogspot.in

Hurry Up!! Limited Seats Only!!

This Year You Can Organize Winter Training at Your College also!! Call Us to Know More!!

Call Us at
+91 95 6060 5666
(Extension: 2)

Visit:

#i3indya Technologies has been awarded
"Best Company for Embedded System and Robotics Training of the Year 2013" - by TIME RESEARCH
"Best Company for Ethical Hacking & Cyber Security Training of the Year 2013" - by PRIME TIME

Tuesday, 22 October 2013

Internet Safety : E-mail Tips from Mr OoPpSs Group

1. Get two email accounts, one for business and one for personal use. Only give out your personal address to family and friends to help reduce unwanted emails (otherwise known as “spam”). A more comprehensive approach would be to use a service which checks for spams , service like spamex is available to manage the same.email clipart

2. Try to memorize your password rather than writing it down. Use an acronym of a favourite saying or something that as true about you such as I Don’t Like Driving In The Snow password = idldits. You can then take that password and substitute some numbers for letters such as: id1dit5. Now that’s a good a password!

3. Don’t give the password to your e-mail service or to anyone that you don’t know or trust. Try to avoid using services that do not allow you to change your password, but rather set it for you.

4. Don’t download any attachments from people you don’t know, or from people you don’t trust.

5. Scan attachments with a virus program before downloading them, even if they come from a friend.

6. Try to avoid sending private or secret information through e-mail.

7. If you absolutely have to send private or secret information through e-mail, make sure you encrypt it first.

8. Don’t spam people, you could get into trouble with your ISP and have your account terminated. In fact, this is becoming common practice as more services implement no-spam policies.

Join Ethical Hacking and Cyber Security Blog

Know More about all kinds of Crimes and How to Secure Yourself

http://i3indyatechnologies.com/workshop/information-security-workshop.html

Monday, 21 October 2013

Join AADC for FLUXUS'14, IIT INDORE ! and Won prizes up to Rs 1 Lakh

mailer header copy

IIT Indore and i3indya Technologies are organizing a National Level Event on ANDROID APPLICATION DEVELOPMENT for Fluxus 2014, an Annual Techno-Cultural Event of IIT Indore.

Prove your creativity at National Level

Join AADC

(Android Application Development Challenge)

Prizes Up to Rs 1 Lakh to be won!!

Event Details are as follows

Round 1   (Android Workshop to be held in 30 Zonal Centers)

·         The Android Outreach workshop will be organized in 30 different Zonal Centers/Colleges all across India from 15th October 2013 to 3rd February 2014.

·         The workshop will be organized by i3indya Technologies, Delhi (Workshop Partner –FLUXUS 2014, IIT Indore & Android Mega Event Prize Sponsor)

·         The duration of workshop will be of 14-16 hours and will be covered in 2 days.

·         The Fees of Workshop will be Rs 1,000/- per head.

·         Each Student will get the following during the workshop :

-          Software Toolkit  CD (Containing Software, Study Material, e-books, Tutorials etc)

-           Certificate of Participation from FLUXUS 2014, IIT Indore & i3indyaTechnologies.

 

Round 2   (Prelims of Android Mega Event at Zonal Center)

At the end of workshop on 2nd day, Prelims round of Android Mega Event will organized at the Zonal Center.

·         2 (Two) WINNERS will get Direct Entry to the Final Round of Android Mega Event FLUXUS 2014, IIT Indore where participants from PAN India would be participating.

·         Winning team will also get Certificate of Merit from FLUXUS 2014, IIT Indore & i3indya Technologies.

·         Name of the Winning Team will be uploaded on FLUXUS 2014 & i3indya Technologies website.

 

Round 3   (Finale of Android Mega Event at IIT Indore)

·         Winners of all zonal centers will be competing against each other at the Mega Event at FLUXUS 2014, IIT INDORE during 7th – 9th February 2014.

·         Winner of the finale round will be awarded and honored by FLUXUS IIT INDORE.

·         A certificate of excellence will also be awarded to the Winner from FLUXUS INDORE.

·         Chance to work with i3indya Technologies on Application Development projects. Prizes worth Rs 100,000/- which will include Tablets/Android Phones will be given the winner as well as runner ups.

 

Make your College Prelim Center for Fluxus 2014

http://www.fluxus2014.i3indyatechnologies.com/register-for-workshop.html

Know More about this Event

http://www.fluxus2014.i3indyatechnologies.com/

 

FLuxus 2014 Official Site

www.fluxus.in

www.i3indyatechnologies.com

+91 95 6060 5666

 

Saturday, 19 October 2013

Book Your Seat Now!!! for i3indya Technologies' Weekend Training






Join Weekend Training by
i3indya Technologies
i3indya Technologies have taken initiative towards providing Weekend Training Sessions for the students of various disciplines. If you are interested in learning new things apart from your regular college studies, then this is the best option for you. You can easily register for the training session you are interested in.

Duration: 2 Days / 16 hrs
Venue: New Delhi and Ludhiana (Punjab)

Course Details and Fees:
SHORT CIRCUIT 1.1 (Mobile Controlled Robotics)
Fees: FREE
ACCESS DENIED (Basic Internet & Cyber Security)
Fees: FREE
HOOKER BOTZ 1.0   (IR Sensor Based Autonomous Robotics)
Fees: Rs 1000/- only
CYBER DISEASE   (Ethical Hacking & Cyber Security)
Fees: Rs 1000/- only
VISION BOTICS   (6th Sense Robotics)
Fees: - INR 3600/- Only (for Group of 2 Students with Kit)
          -  INR 4500/- Only (for Group of 3 Students with Kit)
          -  INR 5400/- Only (for Group of 4 Students with Kit)
          -  INR 3200/- Only (for Group of 4 Students no Kit)

For More Details

We are offering Limited Seats per batch, So Hurry Up!!


Call Now
+91 95 6060 5666

Visit:

#i3indya Technologies has been awarded
"Best Company for Embedded System and Robotics Training of the Year 2013" - by TIME RESEARCH
"Best Company for Ethical Hacking & Cyber Security Training of the Year 2013" - by PRIME TIME

Subscribe Our New YouTube Channel - Watch latest Workshop Videos and Tutorials




Friday, 18 October 2013

Types of Cyber Crimes : Short Description about all kinds of Cyber Crimes by Mr OoPpSs

Types of Cyber Crimes



☛ FINANCIAL CLAIMS: This would include cheating, credit card frauds, money laundering etc.

☛ CYBER PORNOGRAPHY: This would include pornographic websites; pornographic magazines produced using computer and the internet (to down load and transmit pornographic pictures, photos, writings etc.)

☛ SALE OF ILLEGAL ARTICLES: This would include sale of narcotics, weapons and wildlife etc. by posting information on websites, bulletin boards or simply by using e-mail communications.

☛ ONLINE GAMBLING: There are millions of websites; all hosted on servers abroad, that offer online gambling. In fact, it is believed that many of these websites are actually fronts for money laundering.

☛ INTELLECTUAL PROPERTY CRIMES: These infringement, trademarks violations etc. include software piracy, copyright.

E-MAIL SPOOFING: A spoofed e-mail is one that appears to originate from one source but actually has been sent from another source. This can also be termed as e-mail forging.

☛ FORGERY: Counterfeit currency notes, postage and revenue stamps, mark sheets etc. can be forged using sophisticated computers, printers and scanners.

☛ CYBER DEFAMATION: This occurs when defamation takes place with the help of computers and or the Internet e.g. someone published defamatory matter about someone on a websites or sends e-mail containing defamatory information to all of that person’s friends.

☛ CYBER STALKING: Cyber stalking involves following a person’s movements across the Internet by posting messages on the bulletin boards frequented by the victim, entering the chat-rooms frequented by the victim.

☛ THEFT OF INFORMATION CONTAINED IN ELECTRONIC FROM: This includes information stored in computer hard disks, removable storage media etc.

E-MAIL BOMBING: E-mail bombing refers to sending a large amount of e-mails to the victim resulting in the victims’ e-mail account or mail servers.

☛ DATA DIDDLING: This kind of an attack involves altering the raw data just before it is processed by a computer and then changing it back after the processing is completed.

☛ SALAMI ATTACKS: Those attacks are used for the commission of financial crimes. The key here is to make the alteration so insignificant that in a single case it would go completely unnoticed e.g. A bank employee inserts a program into bank’s servers, that deducts a small amount from the account of every customer.

☛ DENIAL OF SERVICE: This involves flooding computer resources with more requests than it can handle. This causes the resources to crash thereby denying authorized users the service offered by the resources.

☛ VIRUS/WORM: Viruses are programs that attach themselves to a computer or a file and then circulate themselves to other files and to other computers on a network. They usually affect the data on a computer, either by altering or deleting it. Worms, unlike viruses don not need the host to attach themselves to.

☛ LOGIC BOMBS: These are dependent programs. This implies that these programs are created to do something only when a certain event occurs, e.g. some viruses may be termed logic bombs because they lie dormant all through the year and become active only on a particular date.

☛ TROJAN HORSE: A Trojan as this program is aptly called is an unauthorized program which functions from inside what seems to be an authorized program, thereby concealing what it is actually doing.

☛ INTERNET TIME THEFT: This connotes the usage by unauthorized persons of the Internet hours paid for by another person.

☛ PHYSICALLY DAMAGING A COMPUTER SYSTEM: This crime is committed by physically damaging a computer or its peripherals.

Source: OoPpSs Group And Internet Crime Report


Know More about all kinds of Crimes and How to Secure Yourself