Upgrade to Pro — share decks privately, control downloads, hide ads and more …

Techie Corner: August 3rd week

cogzidel
August 20, 2012

Techie Corner: August 3rd week

Presentation created by Suchithra- Team Lead, Cogzidel Technologies

cogzidel

August 20, 2012
Tweet

More Decks by cogzidel

Other Decks in Technology

Transcript

  1. MODORI
    MODORI is the first OS which will replace windows fully from computer map.
    MODORI is an offshoot of Ms Researches singularity OS. In Midori the tools and libraries
    are completely managed code. MODORI is designed to run directly on native hardware
    (x56,x64,ARM). MODORI can be also seen as MS’s answer those who are applying
    virtualization as mean to solving issues within contemporary compiling.
    The main idea behind MIDORI is to develop a light weight portable OS which can be
    mated easily to lots of various applications.

    View full-size slide

  2. Importance
     Actually Os is loaded onto a hard disk physically located on that machine.
    As windows is dependent on hardware, it might face opposition from
    contemporary ways of working , because people are extremely mobile in
    using different devices in order to get diverse information.
     Due to this trend installing different applications on a single computer
    may let to different compatibility issues however the machine require
    updating. The new OS will solve these problems by the concept of
    virtualizing. This will solve problems such as
     Widespread security vulnerabilities
     Unexpected interaction among different applications
     Failure caused but errant extension.

    View full-size slide

  3. DATABASE SECURITY
    Securing a database allows organization to protect the corporate data from threats
    from external sources
    Data base security is a serious issues, if not implemented correctly the consequences
    can be costly to companies if their vital data is hacked into or their customer data
    leaks out which can even lead to cases to identity theft.
    Methods
    Database security can be classified based on the key areas of the security concerns
     Server security
     Database connections
     Table access Control
     Restricting database access

    View full-size slide

  4. This is normally achieved with authentication mechanism.
    In a network which promotes server security. Every server should be configured to permit
    only trusted IP addresses.
    Good Practices
    For the security of network date, it is suggested that not to permit dynamic application
    to update the database without the appropriate authentication
    Vulnerabilities
    Some of the solutions for vulnerability are
     Encrypting the data
     Putting a firewall around the database server
     Implement a VPD ( virtual private Database)

    View full-size slide

  5. Technology news
    On Aug 6th 2012, Knight capital group launched new york stock exchange trading
    program for individual investor. $440 million trading loss incurred by knight capital
    group stemmed from old computer software accidentally reactivated when a new
    software program was installed. The old system triggers buy and sell order. Once it went
    live on the market. It was unclear how the old code evades the control system. Once
    activated the software multiplied stock trade by one thousand and the staff spends 45
    mins looking through 8 set of software before discovering what happened. Every chief
    technology officer is thinking that they don’t know which buried in some link of code or
    what unanticipated change will lead to failure. When facing such problems which they
    have never seen before.

    View full-size slide

  6. LINUX
    What is Linux?
    • A fully-networked 32/64-Bit Unix-like Operating System
    • Unix Tools Like sed, awk, and grep (explained later)
    • Compilers Like C, C++, Fortran, Smalltalk, Ada
    • Network Tools Like telnet, ftp, ping, traceroute
    • Multi-user, Multitasking, Multiprocessor
    • Has the X Windows GUI
    • Coexists with other Operating Systems
    • Runs on multiple platforms
    • Includes Source code
    Where did it come from?
    • Linus Torvalds created it
    • With assistance from programmers around the world
    • First posted on Internet in 1991

    View full-size slide

  7. • Linux 1.0 in 1994; 2.2 in 1999
    • Today used on 7-10 million computers
    • with 1000’s of programmers working to enhance it
    Why is it significant?
    • Growing popularity
    • Powerful
    • Runs on multiple hardware platforms
    • Users like its speed and stability
    • No requirement for latest hardware
    • It’s “free”
    • Licensed under GPL
    • Vendors are distributors who package Linux

    View full-size slide

  8. MOUNTAIN LION OS
    Its time for us to move with Apple OS instead of using windows.
    Some of my views about Mountain Lion OS and its features,
     200 new features
     Very good security
     Very high user download
     Easy accessibility
     Airplay Mirroring- encrypted streaming
     Built in sharing
     Dashboard, widget browser
     Game center
     Gate keeper
     Iclould
     Notification center
     Photo Booth
     Power Nap
     Quick Time X
     Security
     Time machine

    View full-size slide

  9. This week presentation is combined by G. Suchithra.
    E-mail : [email protected]
    Skype: suchithra.george
    Thanks to CL,PM,COO,CTO,CEO.
    Special Thanks to demonstrators,
    • Ragini
    • Valarmathi
    • Kousalya
    • Senthil Ganesh

    View full-size slide