Big
Bang
Indians
PROUD TO BE INDIANS

Wednesday, October 3, 2007

ActiveX Data Objects

ActiveX Data Objects (ADO) is an application program interface from Microsoft that lets a programmer writing Windows applications get access to a relational or non-relational database from both Microsoft and other database providers. For example, if you wanted to write a program that would provide users of your Web site with data from an IBM DB2 database or an Oracle database, you could include ADO program statements in an HTML file that you then identified as an Active Server Page. Then, when a user requested the page from the Web site, the page sent back would include appropriate data from a database, obtained using ADO code.

Like Microsoft's other system interfaces, ADO is an object-oriented programming interface. It is also part of an overall data access strategy from Microsoft called Universal Data Access. Microsoft says that rather than trying to build a universal database as IBM and Oracle have suggested, finding a way to provide universal access to various kinds of existing and future databases is a more practical solution. In order for this to work, Microsoft and other database companies provide a "bridge" program between the database and Microsoft's OLE DB, the low-level interface to databases.

OLE DB is the underlying system service that a programmer using ADO is actually using. A feature of ADO, Remote Data Service, supports "data-aware" ActiveX controls in Web pages and efficient client-side caches. As part of ActiveX, ADO is also part of Microsoft's overall Component Object Model (COM), its component-oriented framework for putting programs together.

ADO evolved from an earlier Microsoft data interface, Remote Data Objects (RDO). RDO works with Microsoft's ODBC to access relational databases, but not nonrelational databases such as IBM's ISAM and VSAM.

Monday, September 24, 2007

Active Directory

Active Directory is Microsoft's trademarked directory service, an integral part of the Windows 2000 architecture. Like other directory services, such as Novell Directory Services (NDS), Active Directory is a centralized and standardized system that automates network management of user data, security, and distributed resources, and enables interoperation with other directories. Active Directory is designed especially for distributed networking environments.

Active Directory features include:

  • Support for the X.500 standard for global directories
  • The capability for secure extension of network operations to the Web
  • A hierarchical organization that provides a single point of access for system administration (management of user accounts, clients, servers, and applications, for example) to reduce redundancy and errors
  • An object-oriented storage organization, which allows easier access to information
  • Support for the Lightweight Directory Access Protocol (LDAP) to enable inter-directory operability
  • Designed to be both backward compatible and forward compatible

Hard-drive encryption

Hard-drive encryption is a technology that encrypts the data stored on a hard drive using sophisticated mathematical functions. Data on an encrypted hard drive cannot be read by anyone who does not have access to the appropriate key or password. This can help prevent access to data by unauthorized persons and provides a layer of security against hackers and other online threats.

The concept of hard-drive encryption is simple enough. When a file is written to the drive, it is automatically encrypted by specialized software. When a file is read from the drive, the software automatically decrypts it while leaving all other data on the drive encrypted. The encryption and decryption processes are transparent to all common applications such as word processors, databases, spreadsheets or imaging programs. A computer equipped with hard-drive encryption appears, from the user's point of view, to function as any other computer would.

Windows Vista Enterprise and Ultimate editions offer a hard-drive encryption program called BitLocker that employs two-factor authentication.

z coordinate

A z coordinate is the third-dimensional coordinate in a volume pixel, or voxel. Together with x and y coordinates, the z coordinate defines a location in a three-dimensional space.

Open Source

Generically, open source refers to a program in which the source code is available to the general public for use and/or modification from its original design free of charge, i.e., open. Open source code is typically created as a collaborative effort in which programmers improve upon the code and share the changes within the community. Open source sprouted in the technological community as a response to proprietary software owned by corporations.

A certification standard issued by the Open Source Initiative (OSI) that indicates that the source code of a computer program is made available free of charge to the general public. The rationale for this movement is that a larger group of programmers not concerned with proprietary ownership or financial gain will produce a more useful and bug -free product for everyone to use. The concept relies on peer review to find and eliminate bugs in the program code, a process which commercially developed and packaged programs do not utilize. Programmers on the Internet read, redistribute and modify the source code, forcing an expedient evolution of the product. The process of eliminating bugs and improving the software happens at a much quicker rate than through the traditional development channels of commercial software as the information is shared throughout the open source community and does not originate and channel through a corporation's research and development cogs.

OSI dictates that in order to be considered "OSI Certified" a product must meet the following criteria:
  • The author or holder of the license of the source code cannot collect royalties on the distribution of the program
  • The distributed program must make the source code accessible to the user
  • The author must allow modifications and derivations of the work under the program's original name
  • No person, group or field of endeavor can be denied access to the program
  • The rights attached to the program must not depend on the program's being part of a particular software distribution
  • The licensed software cannot place restrictions on other software that is distributed with it.

Thursday, September 20, 2007

Blended Learning - Old Wine In A New Bottle

Before starting to define the concept of blended learning, its important to know the most unobtrusive fact about the concept - that it has been around in disguise for eons and its immortality is undisputable.

Before starting to define the concept of blended learning, its important to know the most unobtrusive fact about the concept - that it has been around in disguise for eons and its immortality is undisputable. Simply put, unblended learning is something unimaginable. Learning has always involved blending of different methods and only the uninitiated can think of a learning environment where a computer can carry out all the aspects of training without the assistance from other media. Though this term found entry into the e learning jargon only lately, we have been using blended learning since time immemorial. Teachers using different forms of exercises right from story telling and toys to using charts and reading aloud for training toddlers are using blended learning techniques.

Blended learning in corporate training

Blended learning fast seems to be replacing e learning in corporate training, if not elsewhere. Corporate training programs aim at improving revenue, reducing costs and enhance teamwork in general, rather than focusing on the individual development of employees. Learners, too, learn with a view to becoming effective at their jobs rather than for the sake of increasing knowledge. Keeping these trends in mind, blended learning can best address the needs of a corporate training program, since different sets of learners require different delivery methods. The key to enhance results lies in offering the perfect amalgam of media and delivery as per the requirement of a particular program. Learning experiences are categorized into steps in a blended learning model and the learner’s progression from one step to another keeps on building upon the previous learning experiences. This forms a ladder through which learners keep on climbing rung after rung to blossom into a tree of collaboration from the sapling of education. Organizations have graduated from the basic information exchange level to the level of expertise – all within scheduled time frames and fixed costs through blended learning techniques. A blended learning model allows the ease of combining either elements from a particular level, or complete levels to arrive at a single learning solution. The blend that a company selects depends upon various factors including requirements, costs, time on hand and available content.

Basic elements of blended learning

Broadly, blended learning models comprise of the following elements, mixed in varied proportions according to an organization’s requirements. Blended learning can be classified into

  • Learning through information
  • Learning through interaction
  • Learning through collaboration and
  • Learning through classroom experiences

E learning technology can be put to good use while learning through information, interaction and collaboration. This not only reduces cost attributed to enlarged periods of non productive activity on the part of the employees, commuting and employing instructors, but also creates reusable content, and reiterates core messages and concepts to ingrain them in the minds of the learners. At the same time, the classroom sessions develop interpersonal skills and the ability to communicate face to face.

Learning through information

Material based information is the first coherent step towards starting a learning program. Web based material can now be handed to the learners, thanks to e learning techniques, which can render the learning program easy to deliver and faster to implement. Making the information accessible all the time will give learners the liberty of scrolling through the content at their own convenience, which, in turn, will enhance understanding and enthusiasm.

Learning through interaction

The learner-instructor, learner-content, learner-learner, and learner-infrastructure interactions become all the more important in a blended learning environment. Web can assist all the above mentioned forms of interaction, which, together, help retain the knowledge that is acquired through information .Web simulations of real life situations allow learners to apply their knowledge practically, without the possibility of them affecting your business directly.

Learning through collaboration

Collaborative learning includes peer to peer discussions, conference calls, chat, team rooms and instant messaging. Technology has enhanced the concept of collaboration manifold, where learners, even though geographically remote, can communicate in real time. The collaborative environment also heightens the chances of collaboration between e learners and subject matter experts (SMEs).

Learning through classroom interactions

Conventional, tested and, by far, one of the most effective approaches to learning, classrooms are the best places to personally connect to peers and instructors. No technology can replace the advantages of this approach, which is exactly why no e learning or blended learning model will skip this element for any reason. But, as one would like to believe, blended learning has never attempted to replace classroom based learning. On the contrary, technology based learning takes care of the basic, mechanical and mundane aspects of learning to allow classroom based training centre around discussions on already learnt subject matter and behavioral and psychological modifications.

Bottomline

Blended learning involves the appropriate blend of varied components including courses, content portions, IM pings, blog feedback, and many other things. The ubiquitous problems of speed, scale and impact associated with most e learning models can be successfully solved by blended learning. Applying blended learning to all your learning needs will definitely leverage your organization vis a vis your competitors.

Tuesday, September 18, 2007

ASP.NET : GridView - Set focus to control and select full text on the edited row

Sorry for not posting anything since last few days, actually I have loaded myself with loads of development.

You will find lots of my post on GridView, JavaScript, DetailsView and FormView. I am working on DataGrid and GridView since its early days and have done extensive programming on it.

For the question on setting focus on textbox and select full in the edit template of the GridView control, here is my offer:

For example, we have two textbox TextBox1 and TextBox2 as TemplateField.
Now, when user click on edit button then selected GridView row turns into edit mode and the TextBox1 should get focus with all its text selected by default. If user moves on to TextBox2 then again its text should get selected.
Code:
protected void GridView1_RowDataBound(object sender, GridViewRowEventArgs e)
{
TextBox tmpText1 = ((TextBox)(e.Row.FindControl("textbox1")));
TextBox tmpText2 = ((TextBox)(e.Row.FindControl("textbox2")));

if (e.Row.RowState == DataControlRowState.Edit e.Row.RowState.ToString() == "Alternate, Edit")
{
// Set the focus to control on the edited row in reverse, last column in
// GridView should come first here.

tmpText2.Focus();
tmpText2.Attributes["onfocus"] = "javascript:this.select();";

tmpText1.Focus();
tmpText1.Attributes["onfocus"] = "javascript:this.select();";

}
}

I would be more than happy to answer any question / queries.

Thursday, September 6, 2007

Science


RSS to JavaScript

Technology News

RSS to JavaScript

Friday, August 31, 2007

Backbone of India's success

If India is shining today, the credit goes mostly to India's southern states. These states have played a major role in making India a global player and a force to reckon with.

According to a Confederation of Indian Industry study on 'Key factors making India a major global player: The Southern Stake,' cities like Bangalore, Hyderabad and Chennai have emerged as growth poles, creating centres of excellence in information technology, biotech and pharmaceuticals.

The study says that South India forms the backbone of India's comparative advantage in the services sector.

The study points out that southern states have also leveraged their traditional strengths in textiles, marine products, gems and jewellery and engineering. The states have led the way in producing 'knowledge workers' by creating centres of academic excellence, according to the CII study.

"Majority of India's H1-B visas are issued to South Indians, and Chennai has the longest waiting list for F1 visas," said Jayanta Roy, senior advisor, International Trade, CII, who prepared the study.

He said that the southern states are performing well above the national average in terms of gross domestic product growth.

The study points out that to be a major economic power and substantially reduce poverty by 2010, the roadmap ahead should be to rein in fiscal deficit, though macro indicators are mostly under control. Steps to reduce the huge transaction costs incurred for doing business in India need to be initiated soon.

"Nurture IT, biotech, pharmaceuticals as growth drivers for the economy and expand niche in the services sector and knowledge economy," states the CII study.

The study also says that it was important to leverage sunrise sectors in manufacturing like auto parts and components and other supply chain engineering products, to propel India as a global economic force.

The CII study also advocates 'work on creating growth clusters and investment in brand equity to recreate the success of Bangalore in other cities.'

The study urges heavy investment on infrastructure and removal of red tape, such measures being in line with the focus on reducing transaction costs on a national level. The study points out that the urban agglomeration of Bangalore alone contributes to around 40 per cent of India's services exports ($8 billion per annum) and around 12 per cent of goods exports ($6 billion per annum).

Dynamic clusters with sectoral specialisation, like Tirupur, exported $800 million worth of goods.

The study mentions that export-oriented growth strategy in China also centered around growth clusters. Currently, the Shanghai-Suzhou growth pole in China accounts for exports worth $182 billion, roughly three times India's national figure.

The CII study vouches for establishment of free ports with world-class logistics. "Make administrative procedures hassle free," asserts the study. It also calls for more investment in agriculture to create effective supply chains and expand value-added food processing industries.

As a way forward, the study also points out that India will have to effectively strategise between multilateralism and bilateralism. Trade liberalisation is inevitable and Indian industry will have to be prepared to grab the opportunities and minimise risks from globalisation, adds the study.
The CII study sets a target of increasing India's exports to 2 per cent of global exports (i.e. $178 billion) by 2010 in order for India to claim its rightful spot as a global player.


A GDP growth at a minimum of 10 per cent for the next decade is imperative if India is to emerge as an economic superpower and effectively address the issues of unemployment and poverty.

It suggests tariff rationalisation as per East Asian standards and liberalisation of consumer goods imports. The study also calls for establishment of dedicated trade policy division in all states to coordinate policy with Union ministry of commerce; such a move will be in keeping with the diversity of needs and priorities in a continental polity like India.

Thursday, August 30, 2007

Information Revolution and India

FEW technologies have provoked as much wide-eyed hyperbolic writing anywhere as the information revolution, based on the personal computer and the ever-expanding, apparently limitless power of the Internet. In India, nothing has attracted as much media adulation or official enthusiasm as information technology (IT) - itself seen as a magic wand, a technical "fix", a shortcut to rapid economic growth and development. Even as we integrate ourselves into the global IT market essentially as cyber coolies via the business process outsourcing (BPO) route, many of our policymakers see the growth of IT-enabled services as a substitute for the hard tasks of addressing the basic needs of the people and guaranteeing them minimum food security, health care, education and employment.

All manner of utopian scenarios are painted about India's destiny as an "IT superpower" and a "knowledge-based society". By 2008, if not earlier, India will annually export $50 billion worth of computer software (or about a tenth of its present gross domestic product [GDP]) and "conquer" a substantial chunk of the global IT market even as the bulk of India's domestic population achieves computer literacy. Reality bears a rather sharp contrast to these extravagantly optimistic projections. As of now, India's software exports account for less than 2 per cent of the global market. The IT sector as a whole represents less than 3 per cent of the GDP. Even if these ratios double in the next five years, IT will still be a fraction of the economic size of, say, trade.

True, computer sales in India have grown by leaps and bounds - from just under one million four years ago to a little over three million units in the last fiscal year, up 32 per cent over the preceding year. But they account for less than one-50th of global computer sales. The world over, 100 of every 1,000 people are connected to the Internet. In the high-income Organisation for Economic Cooperation and Development (OECD) countries, 500-plus of every 1,000 people are Internet users. Even in Third World countries such as Mexico, Lebanon and Malaysia, or the United Arab Emirates, Internet connectivity is 100 to 300-plus per 1,000. In India, it is about 20.

Bangalore, with its 1,60,000 IT and BPO workers, is described - without the batting of an eyelid - as India's Silicon Valley, or a serious competitor to it. But California's Santa Clara county alone has over 2,00,000 computerniks. All told, the San Francisco Bay Area has about a million IT professionals. If value addition (and appropriation) is considered, the difference between the real and false Silicon Valley, on a good guess, could be several hundredfold.

The Internet is certainly a great medium of communication, data storage and processing, signal and image generation, and much else - the more so because it is free, open and universally accessible. But it need not have been free or open. It could well have been ridden with patented software and other restrictions, denying one access unless one paid a fee. For instance, had Tim Berners-Lee, who conceived of the World Wide Web, decided to patent his idea in 1989, he would, of course, have made pots of money - as have Jeff Bezos of Amazon.com, Jerry Yang of Yahoo, or Sabeer Bhatia of Hotmail fame.

But there would have been 16 different "webs" on the Internet. Berners-Lee has been quoted: "Goodness knows, there were plenty of hypertext systems before that didn't interoperate. There would have been a CERN Web, a Microsoft one, Apple's HyperCard would have started reaching out Internet roots. And all of these things would have been incompatible."

Berners-Lee thinks software has been patented bloody-mindedly and totally commercially. This runs counter to "the spirit" of the Net and is "terribly stifling to creativity. It is stifling to the academic side of doing research and thinking up new ideas. It is stifling to the new industry and the new enterprises that come out of that."

It is precisely "the spirit of openness and sharing" that makes the Internet an attractive tool or weapon for citizen intervention and "cyber-activism". This use has spread far and wide - witness the global justice movement, or the mass mobilisation against the war on Iraq and its occupation, and the Defeat-Bush campaign in the United States and elsewhere, or the invaluable public service South Asia Citizens' Wire network run by Harsh Kapoor (www.sacw.net) , archived at (www.insaf.net) , which has for years fearlessly trained its fire on communalism.

However, as John Naughton argues, "cyberspace - the most gloriously open, uncensored and unregulated public space in history - could easily become a highly controlled and regulated environment... " This could happen not just through hyper-commercialisation and corporate concentration but through the state's intrusion into the private lives of citizens. This is occurring in countries such as China and Singapore, and in many West Asian, Latin American and European states. In India too, and now in the U.S., the state has armed itself with draconian powers to intercept emails and otherwise monitor and control information flows.

The information revolution is not a substitute for basic, gut-level, and long-neglected social agendas.