Thursday, June 30, 2011

Project Abstract - E-Learning

E-learning comprises all forms of electronically supported learning and teaching. The information and communication systems, whether networked learning or not, serve as specific media to implement the learning process.[1] The term will still most likely be utilized to reference out-of-classroom and in-classroom educational experiences via technology, even as advances continue in regard to devices and curriculum.

              

E-learning is essentially the computer and network-enabled transfer of skills and knowledge. E-learning applications and processes include Web-based learning, computer-based learning, virtual education opportunities and digital collaboration. Content is delivered via the Internet, intranet/extranet, audio or video tape, satellite TV, and CD-ROM. It can be self-paced or instructor-led and includes media in the form of text, image, animation, streaming video and audio.

Abbreviations like CBT (Computer-Based Training), IBT (Internet-Based Training) or WBT (Web-Based Training) have been used as synonyms to e-learning. Today one can still find these terms being used, along with variations of e-learning such as elearning, Elearning, and eLearning. The terms will be utilized throughout this article to indicate their validity under the broader terminology of E-learning.

Power point presentation on E-Learning

Tuesday, June 28, 2011

Seminar on SMTP

Simple Mail Transfer Protocol (SMTP) is an Internet standard for electronic mail (e-mail) transmission across Internet Protocol (IP) networks. SMTP was first defined by RFC 821 (1982, eventually declared STD 10), and last updated by RFC 5321 (2008)[2] which includes the extended SMTP (ESMTP) additions, and is the protocol in widespread use today. SMTP is specified for outgoing mail transport and uses TCP port 25. The protocol for new submissions is effectively the same as SMTP, but it uses port 587 instead. SMTP connections secured by SSL are known by the shorthand SMTPS, though SMTPS is not a protocol in its own right.

 

While electronic mail servers and other mail transfer agents use SMTP to send and receive mail messages, user-level client mail applications typically only use SMTP for sending messages to a mail server for relaying. For receiving messages, client applications usually use either the Post Office Protocol (POP) or the Internet Message Access Protocol (IMAP) or a proprietary system (such as Microsoft Exchange or Lotus Notes/Domino) to access their mail box accounts on a mail server.

 

Power point presentation on SMTP

Sunday, June 26, 2011

Project - Human Resource Management Systems

A Human Resource Management System (HRMS) or Human Resource Information System (HRIS), refers to the systems and processes at the intersection between human resource management (HRM) and information technology. It merges HRM as a discipline and in particular its basic HR activities and processes with the information technology field, whereas the programming of data processing systems evolved into standardized routines and packages of enterprise resource planning (ERP) software. On the whole, these ERP systems have their origin on software that integrates information from different applications into one universal database. The linkage of its financial and human resource modules through one database is the most important distinction to the individually and proprietary developed predecessors, which makes this software application both rigid and flexible.

            

Power point Presentation on the topic Human Resource Management System

Seminar on Software as a service

Software as a service (SaaS, typically pronounced [sæs]), sometimes referred to as "on-demand software," is a software delivery model in which software and its associated data are hosted centrally (typically in the (Internet) cloud) and are typically accessed by users using a thin client, normally using a web browser over the Internet.

While practically every Internet service (such as Web search engine or web-based email) is driven by some underlying software, the term software as a service is often used in the context of business applications, and in some cases even more narrowly as software in a category which has on-premises software; i.e., equivalent applications that are installed in businesses' computer networks or personal computers.

 

SaaS has become a common delivery model for most business applications, including accounting, collaboration, customer relationship management (CRM), enterprise resource planning (ERP), invoicing, human resource management (HRM), content management (CM) and service desk management. SaaS has been incorporated into the strategy of all leading enterprise software companies.

According to a Gartner Group estimate, SaaS sales in 2010 have reached $9B, up 15.7% from 2009, and are projected to increase to $10.7b in 2011, up 16.2% from 2010. Gartner Group also estimates that SaaS applications, which accounted for a little more than 10% of the total enterprise software market last year, would represent at least 16% of worldwide software sales by 2014.

The term software as a service (SaaS) is considered to be part of the nomenclature of cloud computing, along with infrastructure as a service (IaaS) and platform as a service (PaaS).

Power point presentation on Software as a service

Ebook - Linux Kernel Development

Linux Kernel Development details the design and implementation of the Linux kernel, presenting the content in a manner that is beneficial to those who wish to write and develop kernel code. This book is for anyone who wants a fun, practical approach to the Linux kernel.

The author, a core kernel developer, shares valuable knowledge and experience on the very latest Linux kernel.

 

      

 

The book discusses the major subsystems and features of the Linux kernel, including their design and implementation, their purpose and goals, and their interfaces. Specific topics covered include: process management, scheduling, time management and timers, system call interface, memory addressing and management, caching layers, VFS, kernel synchronization, debugging, and the kernel community.

The book covers the new 2.6 Linux kernel, and includes numerous sections on its new features, such as the new O(1) scheduler, the new I/O schedulers, the new block layer, and kernel preemption.

This book is an authoritative, practical guide that helps programmers better understand the Linux kernel, and to write and develop kernel code.

 

Download Ebook

Linux Kernel Development
Linux Kernel Development

Project Abstract - Combinatorial Approach For Preventing Sql Injection Attacks

A combinatorial approach for protecting Web applications against SQL injection is discussed in this paper, which is a novel idea of incorporating the uniqueness of Signature based method and auditing method. The major issue of web application security is the SQL Injection, which can give the attackers unrestricted access to the database that underlie Web applications and has become increasingly frequent and serious. From signature based method standpoint of view, it presents a detection mode for SQL injection using pair wise sequence alignment of amino acid code formulated from web application form parameter sent via web server.

 

                  

 

On the other hand from the Auditing based method standpoint of view, it analyzes the transaction to find out the malicious access. In signature based method It uses an approach called Hirschberg algorithm, it is a divide and conquer approach to reduce the time and space complexity. This system was able to stop all of the successful attacks and did not generate any false positives.

Project - Time Attendance

Time and attendance, or Workforce Management, systems are used by companies of all sizes to record working hours of employees primarily in order to pay their wages. Some companies have a requirement to record the number of hours spent on specific tasks in order to cost jobs accurately. This is referred to as job costing.

A workforce management system enables an employer to have full control of all employees working hours right at an operators fingertips. It is also invaluable for ensuring compliance with labour regulations regarding proof of attendance.

Companies with large employee numbers might need to install several clocking points in order to speed up the process of getting all employees to clock in or out quickly or to record activity in dispersed locations.

 

                  

 

Depending on the supplier, identification method and number of clocking points required, prices vary widely.

A Workforce Management System protects a company from payroll fraud and provides both employer and employees with confidence in the accuracy of their wage payments.

Project Abstract - Resequencing Analysis Of Stop-And-Wait Arq For Parallel Multichannel Communications

In this paper, we consider a multichannel data communication system in which the stop-and-wait automatic-repeat request protocol for parallel channels with an in-sequence delivery guarantee (MSW-ARQ-inS) is used for error control. We evaluate the resequencing delay and the resequencing buffer occupancy, respectively. Under the assumption that all channels have the same transmission rate but possibly different time-invariant error rates, we derive the probability generating function of the resequencing buffer occupancy and the probability mass function of the resequencing delay. Then, by assuming the Gilbert–Elliott model for each channel, we extend our analysis to time-varying channels. Through examples, we compute the probability mass functions of the resequencing  buffer occupancy and the resequencing delay for time-invariant channels. From numerical and simulation results, we analyze trends in the mean resequencing buffer occupancy and the mean resequencing delay as functions of system parameters. We expect that the modeling technique and analytical approach used in this paper can be applied to the performance evaluation of other ARQ protocols (e.g., the selective-repeat ARQ) over multiple time-varying channels. Index Terms—In-sequence delivery, modeling and performance, multichannel data communications, resequencing buffer occupancy, resequencing delay, SW-ARQ.

Project Abstract - Cell Breathing Techniques For Load Balancing In Wireless Lans

Maximizing network throughput while providing fairness is one of the key challenges in wireless LANs (WLANs). This goal is typically achieved when the load of access points (APs) is balanced. Recent studies on operational WLANs, however, have shown that AP load is often substantially uneven. To alleviate such imbalance of load, several load balancing schemes have been proposed. These schemes commonly require proprietary software or hardware at the user side for controlling the user-AP association. In this paper we present a new load balancing technique by controlling the size of WLAN cells (i.e., AP’s coverage range), which is conceptually similar to cell breathing in cellular networks.

 

         

 

The proposed scheme does not require any modification to the users neither the IEEE 802.11 standard. It only requires the ability of dynamically changing the transmission power of the AP beacon messages. We develop a set of polynomial time algorithms that find the optimal beacon power settings which minimize the load of the most congested AP. We also consider the problem of network-wide min-max load balancing. Simulation results show that the performance of the proposed method is comparable with or superior to the best existing association-based methods.

Project Abstract - Greedy Routing With Anti-Void Traversal For Wireless Sensor Networks

The unreachability problem (i.e., the so-called void problem) that exists in the greedy routing algorithms has been studied for the wireless sensor networks. Some of the current research work cannot fully resolve the void problem, while there exist other schemes that can guarantee the delivery of packets with the excessive consumption of control overheads. In this paper, a greedy antivoid routing (GAR) protocol is proposed to solve the void problem with increased routing efficiency by exploiting the boundary finding technique for the unit disk graph (UDG). The proposed rolling-ball UDG boundary traversal (RUT) is employed to completely guarantee the delivery of packets from the source to the destination node under the UDG network. The boundary map (BM) and the indirect map searching (IMS) scheme are proposed as efficient algorithms for the realization of the RUT technique.

 

 

Moreover, the hop count reduction (HCR) scheme is utilized as a short-cutting technique to reduce the routing hops by listening to the neighbor’s traffic, while the intersection navigation (IN) mechanism is proposed to obtain the best rolling direction for boundary traversal with the adoption of shortest path criterion. In order to maintain the network requirement of the proposed RUT scheme under the non-UDG networks, the partial UDG construction (PUC) mechanism is proposed to transform the non-UDG into UDG setting for a portion of nodes that facilitate boundary traversal. These three schemes are incorporated within the GAR protocol to further enhance the routing performance with reduced communication overhead. The proofs of correctness for the GAR scheme are also given in this paper. Comparing with the existing localized routing algorithms, the simulation results show that the proposed GAR-based protocols can provide better routing efficiency.

 

Project Abstract - Route Stability In Manets Under The Random Direction Mobility Model

A fundamental issue arising in mobile ad hoc networks (MANETs) is the selection of the optimal path between any two nodes. A method that has been advocated to improve routing efficiency is to select the most stable path so as to reduce the latency and the overhead due to route reconstruction.

 

 

In this work, we study both the availability and the duration probability of a routing path that is subject to link failures caused by node mobility. In particular, we focus on the case where the network nodes move according to the Random Direction model, and we derive both exact and approximate (but simple) expressions of these probabilities. Through our results, we study the problem of selecting an optimal route in terms of path availability. Finally, we propose an approach to improve the efficiency of reactive routing protocols.

Presentation on the topic mobile ad hoc networks

Tabu Search Algorithm For Cluster Building In Wireless Sensor Networks – Project Abtracts

The main challenge in wireless sensor network deployment pertains to optimizing energy consumption when collecting data from sensor nodes. This paper proposes a new centralized clustering method for a data collection mechanism in wireless sensor networks, which is based on network energy maps and Quality-of-Service (QoS) requirements. The clustering problem is modeled as a hypergraph partitioning and its resolution is based on a tabu search heuristic.

 

 

Our approach defines moves using largest size cliques in a feasibility cluster graph. Compared to other methods (CPLEX-based method, distributed method, simulated annealing-based method), the results show that our tabu search-based approach returns high-quality solutions in terms of cluster cost and execution time. As a result, this approach is suitable for handling network extensibility in a satisfactory manner.

Saturday, June 25, 2011

Project - Wireless hand signal transceiver for soldiers

The project is to build a wireless hand signal transceiver for soldiers that can facilitate communication when the current hand signal system doesn't work, such as too dark in the night or people being too far away from each other to see the real hand signals. The transceiver will be in the shape of a glove to enable convenient use and increase stealth. Short range RF will be used for the wireless communication, gyros/accelerometers will be used to detect different motions to make the transceiver a natural expansion of the current hand signal system, buttons on each finger are used to encode information like meters and numbers, an LCD screen will be installed on the back to display the received messages, and an earphone is used to alert the soldier upon receiving a new message.

 

                          

Reference material on the project

Presentation

Paper

Source: University of Illinois

Author :Xiaoli WANG, Yang XU

Project -Spin Bike Studio Project

The majority of spin studios consist of mechanical bikes with no way for members to compare their performance against their peers. Our goal is to create a cost-effective method for upgrading these bikes without having to completely upgrade their studio with expensive bikes, which do not have network capabilities. Our senior design project involves collaboration with a mechanical engineering design team and a start-up company called Flywheel Concepts. We will design a system that acquires measurements from legacy spin bikes that do not contain an electrical system. Our goal is to use microcontrollers for each bike to collect data such as resistance, power, and rpm. We will wirelessly transmit this data onto a central system, which will be interfaced with a display where members of a spin cycle class can compare their performance with others. In order to test the system, we will design a simulation box that mimics the outputs that we will be receiving from the mechanical engineering team. This will include variable resistance, output power, and rpm. Each bike will have its own seven-segment display that shows the measurements obtained. The central display will be incorporate all of the data from each bike on a user-friendly display on a computer.

Final paper

Design review

Seminar on Online identity management

Online identity management (OIM) also known as online image management or online personal branding or personal reputation management (PRM) is a set of methods for generating a distinguished Web presence of a person on the Internet. That presence could be reflected in any kind of content that refers to the person, including news, participation in blogs and forums, personal web sites (Marcus, Machilek & Schütz 2006), social media presence, pictures, video, etc.

Online identity management also refers to identity exposure and identity disclosure, and has particularly developed in the management on online identity in social network services (Tufekci 2008) or online dating services (Siibak 2007).

One aspect of the online identity management process has to do with improving the quantity and quality of traffic to sites that have content related to a person. In that aspect, OIM is a part of another discipline called search engine optimization with the difference that the only keyword is the person's name, and the optimization object is not necessary a single web site; it can consider a set of completely different sites that contain positive online references. The objective in this case is to get high rankings for as many sites as possible when someone search for a person's name. If the search engine used is Google, this action is called "to google someone”.

Another aspect has to do with impression management, i.e. "the process through which people try to control the impressions other people form of them". One of the objective is in particular to increase the online reputation of the person.

Online identity management often involves participation in social media sites like Facebook, LinkedIn, Flickr, YouTube, Twitter, Twitxr, Last.fm, Myspace, Orkut and other online communities and community websites, and is related to blogging, blog social networks like MyBlogLog and blog search engines like Technorati.

But it can also consist in more questionable practices. Hence in the case of social network services users have the possibility to buy 'friends' so to increase their visibility

             

 

Presentation on the topic  Online identity management

Seminar on Website Marketing

Internet marketing, also known as digital marketing, web marketing, online marketing, search marketing or e-marketing, is the marketing (generally promotion) of products or services over the Internet.

Internet marketing is considered to be broad in scope because it not only refers to marketing on the Internet, but also includes marketing done via e-mail and wireless media. Digital customer data and electronic customer relationship management (ECRM) systems are also often grouped together under internet marketing.

Internet marketing ties together the creative and technical aspects of the Internet, including design, development, advertising, and sales. Internet marketing also refers to the placement of media along many different stages of the customer engagement cycle through search engine marketing (SEM), search engine optimization (SEO), banner ads on specific websites, email marketing, and Web 2.0 strategies.[citation needed]

In 2008, The New York Times, working with comScore, published an initial estimate to quantify the user data collected by large Internet-based companies. Counting four types of interactions with company websites in addition to the hits from advertisements served from advertising networks, the authors found that the potential for collecting data was up to 2,500 times per user per month.

     

 

Presentation on the topic website marketing

Seminar on Personality development

Personality Development quintessentially means enhancing and grooming one’s outer and inner self to bring about a positive change to your life. Each individual has a distinct persona that can be developed, polished and refined. This process includes boosting one’s confidence, improving communication and language speaking abilities, widening ones scope of knowledge, developing certain hobbies or skills, learning fine etiquettes and manners, adding style and grace to the way one looks, talks and walks and overall imbibing oneself with positivity, liveliness and peace.

The whole process of this development takes place over a period of time. Even though there are many crash courses in personality development that are made available to people of all age groups, implementing this to your routine and bringing about a positive change in oneself takes a considerable amount of time. It is not necessary to join a personality development course; one can take a few tips and develop his or her own aura or charm.

 

 

Presentation on the topic Personality Development

How to make a Presentation

Below are some of the ways to prepare for presentation/seminars

  • Think about the presentation beforehand. It is short-changing the organisers of the event and your audience if you only think about what you're going to say the day before or while travelling to the event. If necessary, clarify with the organisers exactly what is required of you and what facilities you will require.
  • Do use PowerPoint if the facilities are available. Although some speakers seem to have taken an aversion to PowerPoint, it is so convenient and ensures that your presentation has a clear structure and something for your listeners to take away.
  • Be very clear about how much time you have - and stick to that time in preparing and delivering your presentation. It's very difficult to 'cut' a PowerPoint presentation at the event itself, so it's a great mistake to run out of time. Most presenters prepare too much material; but nobody ever complains that a presentation was too short (it always allows more time for questions).
  • Be very clear about your key message - and ensure that everything in your presentation is both consistent with, and suppportive of, that key message. You should be able to articulate the message in a phrase or a sentence and indeed you might want to use that phrase or sentence in one of your first slides, or one of your last, or even both.
  •  

                      

    Source :http://www.rogerdarlington.co.uk/Presentation.html

    Presentation on the topic presentation/seminars

    Seminar on Project management

    Project management is the discipline of planning, organizing, securing and managing resources to bring about the successful completion of specific project goals and objectives.

    A project is a temporary endeavor, having a defined beginning and end (usually constrained by date, but can be by funding or deliverables), undertaken to meet unique goals and objectives, usually to bring about beneficial change or added value. The temporary nature of projects stands in contrast to business as usual (or operations), which are repetitive, permanent or semi-permanent functional work to produce products or services. In practice, the management of these two systems is often found to be quite different, and as such requires the development of distinct technical skills and the adoption of separate management.

    The primary challenge of project management is to achieve all of the project goals and objectives while honoring the preconceived project constraints. Typical constraints are scope, time, and budget. The secondary—and more ambitious—challenge is to optimize the allocation and integration of inputs necessary to meet pre-defined objectives.

       

     

    Power point presentation on Project management

    Seminar on leadership qualities

    Leaders do not command excellence, they build excellence. Excellence is “being all you can be” within the bounds of doing what is right for your organization. To reach excellence you must first be a leader of good character. You must do everything you are supposed to do. Organizations will not achieve excellence by figuring out where it wants to go, then having leaders do whatever they have to in order to get the job done, and then hope their leaders acted with good character. This type of thinking is backwards. Pursuing excellence should not be confused with accomplishing a job or task. When you do planning, you do it by backwards planning. But you do not achieve excellence by backwards planning. Excellence starts with leaders of good and strong character who engage in the entire process of leadership. And the first process is being a person of honorable character.

     

    Character develops over time. Many think that much of a person's character is formed early in life. However, we do not know exactly how much or how early character develops. But, it is safe to claim that character does not change quickly. A person's observable behavior is an indication of her character. This behavior can be strong or weak, good or bad. A person with strong character shows drive, energy, determination, self-discipline, willpower, and nerve. She sees what she wants and goes after it. She attracts followers. On the other hand, a person with weak character shows none of these traits. She does not know what she wants. Her traits are disorganized, she vacillates and is inconsistent. She will attract no followers.

    A strong person can be good or bad. A gang leader is an example of a strong person with a bad character, while an outstanding community leader is one with both strong and good characteristics. An organization needs leaders with both strong and good characteristics, people who will guide them to the future and show that they can be trusted.

    Source http://www.nwlink.com/~donclark/leader/leadchr.html

    Power point Presentation on leadership qualities

    Seminar on Linux Virtual File System

    A virtual file system (VFS) or virtual filesystem switch is an abstraction layer on top of a more concrete file system. The purpose of a VFS is to allow client applications to access different types of concrete file systems in a uniform way. A VFS can, for example, be used to access local and network storage devices transparently without the client application noticing the difference. It can be used to bridge the differences in Windows, Mac OS and Unix filesystems, so that applications can access files on local file systems of those types without having to know what type of file system they are accessing.

    A VFS specifies an interface (or a "contract") between the kernel and a concrete file system. Therefore, it is easy to add support for new file system types to the kernel simply by fulfilling the contract. The terms of the contract might change incompatibly from release to release, which would require that concrete file system support be recompiled, and possibly modified before recompilation, to allow it to work with a new release of the operating system; or the supplier of the operating system might make only backward-compatible changes to the contract, so that concrete file system support built for a given release of the operating system would work with future versions of the operating system.

                        

     

    Presentation on the topic virtual file system

    Ebook - Linux System Administration

    You can rely on the fully updated second edition of Linux System Administration for answers to all your questions about installing, configuring, and administering Linux. Written by two Linux experts, this book teaches you, step-by-step, all the standard and advanced techniques you need to know to set up and maintain a secure, effective Linux environment. Scores of clear, consistent examples illustrate these techniques in detail--so you stay on track and accomplish all your goals

                    

    Coverage includes:
    * Installing a Linux server
    * Setting up and maintaining user and group accounts
    * Setting up Linux system security
    * Sharing files using Samba and NFS
    * Implementing a backup strategy
    * Troubleshooting common Linux problems
    * Setting up the X Window System
    * Setting up TCP/IP and connecting to the Internet
    * Setting up a mail server
    * Maintaining filesystems and partitions
    * Configuring printers
    * Improving system performance
    * Writing shell scripts
    * Using Webmin for cross-distribution GUI administration
    The Craig Hunt Linux Library
    The Craig Hunt Linux Library provides in-depth, advanced coverage of the key topics for Linux administrators. Topics include Samba, Network Servers, DNS Server Administration, Apache, Security, and Sendmail. Each book in the series is either written by or meticulously reviewed by Craig Hunt to ensure the highest quality and most complete coverage for networking professionals working specifically in Linux environments.

                   

     

    Download Ebook

    Sybex.Linux.System.Administration.eBook

    Internet Marketing Strategy

    Developing a successful internet marketing strategy is an essential part of your online success. In order to succeed, you must develop and implement a strategic plan that includes all of the following:
      • A great product
      • A web site specifically designed to sell
      • A killer marketing strategy
    Each step plays an important role in your overall strategy and must be developed to its fullest potential. If even one step fails, your chances of success will be minimal.

    Developing Your Product

    Your first step will be to develop a great product. You're probably thinking that's easier said than done, but it's really not. The absolute best product is one that you can develop yourself and deliver over the Internet. With today's technology, there is absolutely no reason why you can't create your own product. The knowledge you have within your own mind is extremely valuable. Everybody is good at something, has a special talent or some specialized knowledge. Use this knowledge to create a product.
    The key to developing a great product is exclusiveness. Your product should be unique and not be in competition with hundreds of other similar products. You must give your potential customers exactly what they want. Develop a high-quality product that fills a void to increase your chance of success.
    Another consideration of great importance is your target market. Keep in mind, the Internet is a global marketplace. Develop a product with a large geographic target and a wide appeal. A great product will fulfill a need or desire and provide instant gratification.

    Source: http://www.web-source.net/3steps.htm

    Presentation on Topic

    Seminar on Internet Marketing

    Internet marketing, also known as digital marketing, web marketing, online marketing, search marketing or e-marketing, is the marketing (generally promotion) of products or services over the Internet.

    Internet marketing is considered to be broad in scope because it not only refers to marketing on the Internet, but also includes marketing done via e-mail and wireless media.Digital customer data and electronic customer relationship management (ECRM) systems are also often grouped together under internet marketing.

    Internet marketing ties together the creative and technical aspects of the Internet, including design, development, advertising, and sales. Internet marketing also refers to the placement of media along many different stages of the customer engagement cycle through search engine marketing (SEM), search engine optimization (SEO), banner ads on specific websites, email marketing, and Web 2.0 strategies.[citation needed]

    In 2008, The New York Times, working with comScore, published an initial estimate to quantify the user data collected by large Internet-based companies. Counting four types of interactions with company websites in addition to the hits from advertisements served from advertising networks, the authors found that the potential for collecting data was up to 2,500 times per user per month.

     

    Presentations on topic Internet marketing

    Seminar on Affiliate marketing

    Affiliate marketing is a marketing practice in which a business rewards one or more affiliates for each visitor or customer brought about by the affiliate's own marketing efforts. Examples include rewards sites, where users are rewarded with cash or gifts, for the completion of an offer, and the referral of others to the site. The industry has four core players: the merchant (also known as 'retailer' or 'brand'), the network, the publisher (also known as 'the affiliate'), and the customer. The market has grown in complexity to warrant a secondary tier of players, including affiliate management agencies, super-affiliates and specialized third party vendors.

    Affiliate marketing overlaps with other Internet marketing methods to some degree, because affiliates often use regular advertising methods. Those methods include organic search engine optimization, paid search engine marketing, e-mail marketing, and in some sense display advertising. On the other hand, affiliates sometimes use less orthodox techniques, such as publishing reviews of products or services offered by a partner.

    Affiliate marketing—using one website to drive traffic to another—is a form of online marketing, which is frequently overlooked by advertisers.While search engines, e-mail, and website syndication capture much of the attention of online retailers, affiliate marketing carries a much lower profile. Still, affiliates continue to play a significant role in e-retailers' marketing strategies.

     

    Presentations slides on Affiliate marketing

    Ebook Search Engine Optimization Starter Guide

    Welcome to Google's Search Engine Optimization Starter Guide. This document first began as an
    effort to help teams within Google, but we thought it'd be just as useful to webmasters that are new to
    the topic of search engine optimization and wish to improve their sites' interaction with both users and
    search engines. Although this guide won't tell you any secrets that'll automatically rank your site first
    for queries in Google (sorry!), following the best practices outlined below will make it easier for search
    engines to both crawl and index your content.

     

              

    Search engine optimization is often about making small modifications to parts of your website. When
    viewed individually, these changes might seem like incremental improvements, but when combined

    with other optimizations, they could have a noticeable impact on your site's user experience and
    performance in organic search results. You're likely already familiar with many of the topics in this
    guide, because they're essential ingredients for any webpage, but you may not be making the most
    out of them.

    Even though this guide's title contains the words "search engine", we'd like to say that you should
    base your optimization decisions first and foremost on what's best for the visitors of your site. They're
    the main consumers of your content and are using search engines to find your work. Focusing too
    hard on specific tweaks to gain ranking in the organic results of search engines may not deliver the
    desired results. Search engine optimization is about putting your site's best foot forward when it
    comes to visibility in search engines.

    Download Ebook

    Search Engine Optimization Starter Guide

    Seminar on Search Engine Marketing

    Search engine marketing, (SEM), is a form of Internet marketing that seeks to promote websites by increasing their visibility in search engine result pages (SERPs) through the use of, paid placement, contextual advertising, and paid inclusion. Search engine optimization (SEO) is "optimizing" website pages to achieve higher ranking in search results via the process of selecting specific keyword expressions associated to the website SEM is utilizing various means of "marketing" a website in order for it to become more relevant in regard to search engine searches and their rankings. It should be asserted that SEM is NOT SEO and vice versa. SEM constitutes Ad words which comprises pay per call (particularly beneficial for local providers as it enables potential consumers to get in touch directly to a company with one click), article submissions, advertising and making sure SEO has been done. Also, key word analysis needs to be done for both SEO and SEM; but not necessarily at the same time. SEM is a constant and tedious task. It frequently needs to be updated and monitored continually. Another part of SEM is Social Media Marketing (SMM). SMM is a type of marketing that involves exploiting social media to influence consumers that one company’s products and/or services are valuable. You can do SEM without doing SMM but you can't do SMM without doing SEM because SMM is a higher level of SEM.

     

     

    As the number of sites on the Web increased in the mid-to-late 90s, search engines started appearing to help people find information quickly. Search engines developed business models to finance their services, such as pay per click programs offered by Open Text in 1996 and then Goto.comin 1998. Goto.com later changed its name to Overture in 2001, and was purchased by Yahoo! in 2003, and now offers paid search opportunities for advertisers through Yahoo! Search Marketing. Google also began to offer advertisements on search results pages in 2000 through the Google AdWords program. By 2007, pay-per-click programs proved to be primary money-makers for search engines. In a market dominated by Google, in 2009 Yahoo! and Microsoft announced the intention to forge an alliance. The Yahoo! & Microsoft Search Alliance eventually received approval from regulators in the US and Europe in February 2010

    Presentation on Topic Search engine marketing

    Seminar on Time management

    Time management is the act or process of exercising conscious control over the amount of time spent on specific activities, especially to increase efficiency or productivity. Time management may be aided by a range of skills, tools, and techniques used to manage time when accomplishing specific tasks, projects and goals. This set encompasses a wide scope of activities, and these include planning, allocating, setting goals, delegation, analysis of time spent, monitoring, organizing, scheduling, and prioritizing. Initially, time management referred to just business or work activities, but eventually the term broadened to include personal activities as well. A time management system is a designed combination of processes, tools, techniques, and methods. Usually time management is a necessity in any project development as it determines the project completion time and scope.

     

                 

    Here are the various presentations on the topic Time Management

     

    Ebook - Java™ Application Development on Linux

    Why another book on Java? Why a book on Java and Linux? Isn’t Java a platform-independent system? Aren’t there enough books on Java? Can’t I learn everything I need to know from the Web?
    No doubt, there are a host of Java books on the market. We didn’t wake up one morning and say, “You know what the world really needs? Another book about Java!” No. What we realized was that there are a couple of “holes” in the Java book market.
    First, Linux as a development platform and deployment platform for Java applications has been largely ignored. This is despite the fact that the *nix platform (meaning all UNIX and UNIX-like systems, Linux included) has long been recognized as one of the most programmer-friendly platforms in existence.

                          
    Those few resources for Java on Linux that exist emphasize tools to the exclusion of the Java language and APIs.
    Second, books on the Java language and APIs have focused on pedagogical examples that serve to illustrate the details of the language and its libraries, but very few of these examples are in themselves practically useful, and they tend to deal only with the issues of writing programs, and not at all with deploying and maintaining them. Anyone who has worked on a major software project, especially a software project that is developed and deployed in a business for a business, knows that designing and coding are only about half of the work involved. Yes, writing Java code is only slightly affected by the development and the deployment platform, but the process of releasing and maintaining such applications is significantly different between platforms.

    Download ebook

    Java Application Development on Linux

    Seminar on Java Security

    Java's security model is one of the language's key architectural features that makes it an appropriate technology for networked environments. Security is important because networks provide a potential avenue of attack to any computer hooked to them. This concern becomes especially strong in an environment in which software is downloaded across the network and executed locally, as is done with Java applets, for example. Because the class files for an applet are automatically downloaded when a user goes to the containing Web page in a browser, it is likely that a user will encounter applets from untrusted sources. Without any security, this would be a convenient way to spread viruses. Thus, Java's security mechanisms help make Java suitable for networks because they establish a needed trust in the safety of network-mobile code.

     

                   

    Java's security model is focused on protecting users from hostile programs downloaded from untrusted sources across a network. To accomplish this goal, Java provides a customizable "sandbox" in which Java programs run. A Java program must play only inside its sandbox. It can do anything within the boundaries of its sandbox, but it can't take any action outside those boundaries. The sandbox for untrusted Java applets, for example, prohibits many activities, including:

    • Reading or writing to the local disk
    • Making a network connection to any host, except the host from which the applet came
    • Creating a new process
    • Loading a new dynamic library and directly calling a native method

    By making it impossible for downloaded code to perform certain actions, Java's security model protects the user from the threat of hostile code.

    Ppt on Java Security

    Free Ebook on Teach Yourself Java in 21 Days

    This book is intended for people with at least some basic programming background, which includes people with years of programming experience or people with only a small amount of experience. If you understand what variables, loops,
    and functions are, you’ll be just fine for this book. The sorts of people who might want to read this book include you, if

    • You’re a real whiz at HTML, understand CGI programming (in perl, AppleScript, Visual Basic, or some other popular CGI language) pretty well, and want to move on to the next level in Web page design
    • You had some Basic or Pascal in school and you have a basic grasp of what programming is, but you’ve heard Java is easy to learn, really powerful, and very cool.

     

    What if you know programming, but you don’t know object-oriented programming? Fear not. This book assumes no background in object-oriented design. If you know object-oriented programming, in fact, the first couple of days will be easy for you.

    Download Free ebook

    Link

    Web Services in Java

    Web services are Web based applications that use open, XML-based standards and transport protocols to exchange data with clients. Web services are developed using Java Technology APIs and tools provided by an integrated Web Services Stack called Metro.

     

    The Metro stack consisting of JAX-WS, JAXB, and WSIT, enable you to create and deploy secure, reliable, transactional, interoperable Web services and clients. The Metro stack is part of Project Metro and as part of GlassFish, Java Platform, Enterprise Edition (Java EE), and partially in Java PlatForm, Standard Edition (Java SE). GlassFish and Java EE also support the legacy JAX-RPC APIs.

    Power point presentation on web services in java

    ppt