You are on page 1of 161




S.No. Contents Page No.
1. Technical Section 5

o 6 computing conspiracy theories 6

o Contact Lenses Get Built-IN 10
Virtual Graphics
o GO 12
o How your brain sees virtual you 15
o Mobile Botnets 17
o Multipoint Server 2010 coming to 20
the classroom
o NEHALEM Microprocessor 22
o Playstation 4 Graphics Engine 27
o Probing into MARS 30
o Web spoofing 33

2. Managerial Section 37

o Discrimination against disabled in 38

o Engineers in Management 39
o Lalu Prasad Yadav 41
o LLC 43
o Indian Public Transport is the 45
Costliest in the World
o Online Coupons 47
o Secured and Unsecured Loans 48
o Team Work 50
o Verbal Abuse 52
o News Time 54


3. Literary Section 56

o Book Summary – The White Tiger 57

o I for India 58
o Jingle All the Way 60
o Life is a Journey 62
o Media 64
o Nocturnal Reverie 67
o Gravity 70
o Shattered Memory 71
o Success 72
o What is so real about reality TV? 74

4. Popular Science Section 76

o 5 Plugin Hybrid Cars 77

o 12 Gmail Tips and Tricks 79
o Browser Wars 86
o iPod Vs Zune 94
o Rehabilitation Robotics 96
o Robots evolve to deceive one 98
o Tiny Printable Batteries 100
o Antimatter 102
o Windows Vista Vs Windows 7 104

5. Vive’le Hesitation 107

o Welcome Note 108

o Calmness 110
o Choice 112
o Journeying Life with nature 114
o Multiple Faces 116
o Ramayana 120
o Rebel 122
o Relationships 124


o Through the rain… 126
o Will he? 128

6. Guest Section 131

o Rendezvous with Mr. Himanshu 132

Pandey, Vibration Consultant
C.E.O. , Vibal Vibration
Diagnostics Pvt. Ltd.
o Rendezvous with Mr. Parul 136
Kumar Sharma, Design Engineer,
Freescale Semiconductor

7. My Branch 138

o Why join IEEE? 139

o 125th IEEE Anniversary @ 140
o FERVOUR ‘09 144
o Dr. Vikram Sarabhai Inter-College 151
Rotating Shield Quiz ‘09
o My Branch, My View 154
o Musings 155

8. Editorial Board 157

9. Credits 159



Section Editors:
Prem Singh, IT 3 (
Nitisha Jain, IT 3 (



The recipe of a conspiracy theory is disarmingly simple: all you need is an occurrence, the
suggestion of a dark cabal, a willful disregard for evidence and a creative mind.


The Theory: Michael Drosnin claims to have found hidden messages in the Bible using
specially written software. Some say it's an elaborate hoax tailored to make money from book
sales, but other conspiracy theorists cite rather more sinister motives, given that Drosnin gained
the ear of top officials in the Israeli Mossad and the United States Department of Defense.

In his book The Bible Code, Michael Drosnin describes how he used software to search for
hidden messages in the Hebrew Old Testament. The messages allegedly foretold events that
occurred thousands of years after the Bible was written.

More importantly, other messages are warnings to the present age, the exact time at which
computer technology would have been able to unearth them.

Analysis: Scientific papers presented analysis of Drosnin's results and concluded that they're
statistically significant. More recent papers, also reviewed by experts, say that they're not.

It seems surprising that God would have left messages that could only be discovered by a
powerful computer, and which would be argued over only by academics.



The Theory: The US government knows that little green men exist – and it also knows that we'll
never find them by listening to radio signals. So to keep us off the scent, it promotes futile SETI

SETI stands for the Search for Extra Terrestrial Intelligence. It works by pointing large radio
telescopes into space and listening for radio signals that have the hallmark of intelligence.

Till date, the scheme has found nothing, despite over two million years of processing time
being clocked up in the SETI@ home program, where volunteers contribute PC time over
the internet to analyze signals.

COVER-UP: Is this really an alien listening base or perhaps something more sinister?

Analysis: The well-known Drake equation allows us to work out how many civilizations in the
galaxy we might be able to hear radio signals from. The equation itself is widely accepted, but
there's considerable debate over the values of the variables it uses. Today's best estimates suggest
there may be two or three such civilizations. Needles and haystacks immediately come to mind.

So if it's well-known that the technology will have a very low rate of success, why bother using
it? Are the conspiracy theorists correct on this one? Well, wait a minute. NASA might have had
a SETI program at one time, but it doesn't any more. The fact that SETI research now receives no
public money seems to derail the idea that the US government is using it to distract people from
the real way to reach aliens.



The Theory: Project Echelon – a joint initiative by the British, American, Canadian, Australian
and New Zealand governments – intercepts their citizens‘ phone calls, texts and emails. Powerful
computers scan their content looking for certain incriminating keywords.

The government is keeping tight-lipped about this one, but, according to civil liberty
campaigners the system can intercept satellite communications, snoop on mobile phones and tap
into the public telephone system.

Analysis: Quite frankly, after 9/11 and 7/7 it would be rather surprising if the American and
British governments didn't intercept communications. The motive and the technology are both


The Theory: The US government has powerful computers that are vastly faster than the
speediest known supercomputer and can crack any encoded message. In 2002, a 64-bit encoded
message was cracked. It took 331,252 PCs working together for almost five years.

Today's 128-bit ciphers would take 18,446,744,073,709,551,616 times longer to crack, and what
the best experts can suggest is that by 2055 it would be possible to crack these using $42,000
billion worth of specialist hardware.

That would seem to derail this particular conspiracy theory, but if the US government manages
to develop a practical quantum computer then even a 128-bit encrypted message would be
instantly crackable.

STATE OF THE ART: Even the fastest modern computers struggle with 64-bit messages so we
doubt they can crack everything.

Analysis: The fact that any government would crave this capability is indisputable – but most
experts agree that none of them has it. One thing's for sure: if the government had this
technology then there's no way the CIA would shout about it. As a result, this is one theory that
will run and run.


The Theory: Every time we use Google, the words or phrases we enter are recorded so that the
company can learn about our surfing habits. Whether your interests lie in the realm of politics or,
shall we say, something more 'adult' in nature, our darkest secrets are laid bare.

Motives differ depending on who you listen to. Some say that Google sells the information to
advertisers who inundate you with tailored spam. Others suggest that the security agencies are
given tip-offs on people searching for bomb-making information.


Analysis: Google admits that it uses cookies to track your surfing habits and then processes this
information to present you with relevant advertisements while you search. But the real crux of
this theory is whether Google can link all that information to you as an individual. This is far
more unlikely, as the company would need the cooperation of your ISP in order to identify you
from your IP address.


The Theory: The Conficker Worm has received no shortage of publicity in recent months.
According to some, it was written by the Chinese government as a test bed for advanced cyber

Because its creators could upload new instructions to infected PCs, nobody knew what Conficker
might be able to do – and that's what made it so scary. It also made it the stuff of conspiracy
theories. In this particular one, the Chinese government will use it to bring the internet to its

Analysis: This goes against the more conventional theory that suggests that Ukraine is the
worm's source. The fact that it doesn't infect PCs with a Ukrainian keyboard layout might be a
red herring, but virus expert Eugene Kaspersky is 60 per cent certain that Conficker does have its
roots in the Ukraine.

He also believes that its purpose is less sinister than has been suggested. But before you dismiss
this talk of cyber warfare, we should point out that the concept does have legs – the Georgian
government accused Russia of perpetrating a cyber attack on official websites just before the
country was invaded in 2008, and Estonia experienced a cyber blackout in 2007.

Monica, EE – 3
Delhi College of Engineering



A contact lens that harvests radio waves to power an LED is paving the way for a new kind of
display. The lens is a prototype of a device that could display information beamed from a mobile

Realizing that display size is increasingly a constraint in mobile devices, Babak Parviz at the
University of Washington, Seattle, hit on the idea of projecting images onto the eye from a
contact lens.

One of the limitations of current head-up displays is their limited field of view. A contact lens
display can have a much wider field of view. "Our hope is to create images that effectively float
in front of the user perhaps 50 cm to 1 m away," says Parviz.

His research involves embedding nanoscale and microscale electronic devices in substrates like
paper or plastic. He also wears contact lenses. "It was a matter of putting the two together," he

Fitting a contact lens with circuitry is challenging. The polymer cannot withstand the
temperatures or chemicals used in large-scale microfabrication. So, some components – the
power-harvesting circuitry and the micro light-emitting diode – had to be made separately,
encased in a biocompatible material and then placed into crevices carved into the lens.

One obvious problem is powering such a device. The circuitry requires 330 microwatts but
doesn't need a battery. Instead, a loop antenna picks up power beamed from a nearby radio
source. The team has tested the lens by fitting it to a rabbit.

The future versions will be able to harvest power from a user's cell phone, perhaps as it beams
information to the lens. They will also have more pixels and an array of microlenses to focus the
image so that it appears suspended in front of the wearer's eyes.

Despite the limited space available, each component can be integrated into the lens without
obscuring the wearer's view, the researchers claim. As to what kinds of images can be viewed on
this screen, the possibilities seem endless. Examples include subtitles when conversing with a
foreign-language speaker, directions in unfamiliar territory and captioned photographs. The lens
could also serve as a head-up display for pilots or gamers.

Mark Billinghurst, director of the Human Interface Technology Laboratory, in Christchurch,

New Zealand, is impressed with the work. "A contact lens that allows virtual graphics to be
seamlessly overlaid on the real world could provide a compelling augmented reality experience,"
he says.

This prototype is an important first step in that direction, though it may be years before the lens
becomes commercially available.


Ashish Grover, CSE-3
University School of Information Technology



Google never seems to just be satisfied with the status quo, and when they run out of fields to
compete in, they create their own! Google‘s new ―Go‖ programming language is one of their
newest ventures, a language which is an amalgamation of Python and C++.

The Go language, development in September 2007, has been unveiled by Google along with the
release of a free and open source compiler. In fact, Google has released both with a stand-alone
compiler implementation with cryptic names such as 6g (amd64 compiler), 8g (x86 compiler),
and 5g (ARM compiler) and one which is a front-end for GCC (gccgo).

Born out of frustration with existing system languages, Go attempts to bring something new to
the table, and mix the ease of dynamically typed and interpreted languages with the efficiency of
compiled languages.

So why make a new programming language?

Google believes that the current languages have run their course. The prominent languages in
use today (C/C++, Java, C#) are all based around a similar syntax, and updating and adding new
features in these language consists of piling on libraries, with little or no upgrade to the core of
the language itself. What Google intends to do, requires more than just the addition of a new

The landscape of computing has changed a lot since C, and as Google notes ―Computers are
enormously quicker but software development is not faster.‖ Languages have had to morph quite
a bit to take on support concepts such as parallel processing, and garbage collection.

Go, on the other hand has been designed by Google from the ground up as ―a concurrent,
garbage-collected language with fast compilation‖.

In order not to alienate the majority of developers though, its syntax is quite similar to C, and
would not take much time for a developer to catch on to.

It is designed to simplify the creation of application which can better utilize today‘s multi-core
processors. The language supports concurrent execution and communication between concurrent
processes natively, and is fully-garbage collected.

―Goroutines‖ allowed are Google‘s answer to threading in Go, and any function call which is
preceded by the go statement runs in a different ―goroutine‖ concurrently. A feature called
channels allows for easy communication and synchronization between such routines.

Unlike other object oriented languages, Go has a much ―simplified‖ type structure, which
disallows sub-classing! Go offers a different flavour of object oriented programming using
interfaces, which Google believes will simplify usage.


By using interfaces, explicit type hierarchies need not be defined; instead, a type will satisfy all
interfaces which are subsets of its methods. The relationships between types and interfaces need
not be defined explicitly! This can have some interesting implications as people can add
interfaces to connect unrelated types even later in the development of an application.

Go seems inspired by Python as well. Python has been one of Google‘s favoured languages and
was the sole language supported on Google‘s AppEngine when it was launched. Like Python, Go
supports ―slices‖, which allow you to refer to parts of arrays using a simple syntax. Thus for an
array ―a‖ with 100 elements, a[23,42] will result in an array with elements 23 through 42 of ―a‖.
Go also tracks the length of arrays internally, further simplifying array usage. Additionally, Maps
in Go allow you to create ―arrays‖ with custom index types, and are a native feature of the

One consistent point in the features of Go is that it is better to have one excellent
implementation of commonly used features such as garbage collection, strings, maps etc. rather
than have them rethought and re-implemented in each program.

Go is …

… simple

package main

import "fmt"

func main() {

… fast

Go compilers produce fast code with higher speed. Typical builds take a fraction of a second yet
the resulting programs run nearly as quickly as compared to C or C++ code.

… safe

Go is type safe and memory safe. Go has pointers but no pointer arithmetic. For random access,
use slices, which know their limits.

… concurrent

Go promotes writing systems and servers as sets of lightweight communicating processes,

―goroutines‖, with strong support from the language. Run thousands of ―goroutines‖ if you
want—and say good-bye to stack overflows.

… fun


Go has fast builds, clean syntax, garbage collection, methods for any type, and run-time
reflection. It feels like a dynamic language but has the speed and safety of a static language. It's a
joy to use.

… open source

As nearly all Google products, Go is ―beta‖ and not yet suitable for production use. By releasing
it early Google hopes to garner a community around it and expects that enough people will be
interested in it to justify continued development.

So, get out there and grab Go now! Like any Google product it has the capacity to become
standard for the next generation.

Prem, IT 3rd yr



As players who stay up all night fighting imaginary warriors demonstrate, slipping into the skin
of an avatar, and inhabiting a virtual world can be riveting stuff. But to what extent does your
brain regard your virtual self as you?

Brain scans of avid players of the hugely popular online fantasy world, World of Warcraft,
reveal that areas of the brain involved in self-reflection and judgment seem to behave similarly
when someone is thinking about their virtual self as when they think about their real one.

Disentangling how the brain regards avatars versus real individuals may help explain why some
people spend large chunks of their life playing immersive online games, says Kristina Caudle, a
social neuroscientist at Dartmouth University in Hanover, New Hampshire, who led the study
along with her adviser William Kelley.

"It's hard to imagine from an outsider's perspective what might drive someone to spend 30 hours
a week immersed in a completely imaginary world," she says. More than 11 million people play
World of Warcraft each month.

Innocent or Intelligent?

Previously, researchers have observed that people easily adopt the persona of their virtual selves,
for instance, by acting more aggressively when their avatars are tall than when they are short,
irrespective of an individual's height in the real world.

To probe what brain activity might underlie people's virtual behaviour, Caudle's team convinced
15 World of Warcraft players in their twenties – 14 men and 1 woman – who play the game an
average of 23 hours a week, to drag themselves away from their computers and spend some time
having their brains scanned using functional MRI.

While in the scanner, Caudle asked them to rate how well various adjectives such as innocent,
competent, jealous and intelligent described themselves, their avatars, their best friend in the real
world and their World of Warcraft guild leader.


When Caudle's looked for brain areas that were more active when volunteers thought about
themselves and their avatars compared with real and virtual others, two regions stood out: the
medial prefrontal cortex and the posterior cingulate cortex. That makes sense as prior research
has linked the medial prefrontal cortex to self-reflection and judgment.

Interestingly, however, there was "next to no difference" in the activity in these regions when
people thought of themselves and of their avatar, says Caudle, who presented the results at the
annual meeting of the Society for Neuroscience.


Caudle's team also noticed key differences between how people thought about the virtual and
real worlds, which must be a necessity for preserving your sense of reality. "Clearly you don't
think of your virtual self as your real self," she says.

They found activity differed in a region called the precuneus, implicated in imagination. "It
makes good sense to me if you're thinking about things in a virtual world you might get
[activation in] these areas," says Caudle.

Better Selves

In the future, Caudle hopes to study volunteers who spend less time playing World of Warcraft
to see if there are differences in how their brains discriminate between real and virtual worlds.

It could be that people whose brain activity is more similar when thinking of themselves and
their avatars are likelier to end up hooked, she says.

Liane Young, a social neuroscientist at the Massachusetts Institute of Technology in Cambridge

is interested in what brain activity can tell us about our relationships to our virtual characters.
"You have this control over your avatar such that you've created this better version of yourself. I
wonder whether these neural processes support reasoning about our better selves in some kind of
wishful thinking sense."

Prem, IT 3rd yr



In a number of markets, mobiles seem poised to overtake desktop and laptop computers as the
preferred way of connecting to the internet; the main reason being their ‗mobility‘. As with all
technology, popularity can be a driver for new functionality and business value. When this leads
to new technology such as internet banking, there is incentive for criminals to abuse these
technologies for monetary gain. In wired networking, a recent evolution has been the surge in
botnets, which are large groups of internet connected hosts under control of a single attacker.

Over the last ten years, a significant evolution has taken place in the appearance of organized
computer crime using malicious code. This evolution can be tracked by looking at the intended
functionality of code involved, and the effects it attempts to generate within a target population.

During the late 80s and nineties, computer crime dominantly consisted of the distribution of
computer viruses and the obvious defacement of websites. Both actions did not often lead to
direct monetary gain for the cracker, but helped him build out an online reputation. It was very
much a social event.

Recently, however, there has been a significant increase in the employment of criminal use of
information technology with as direct goal to garner funds.

In addition, major changes regularly take place in what type of information is most valuable to
an attacker. Initially, credit card numbers were a popular target, but recently the appearance of
specific Trojans for on-line games such as World of Warcraft, are also in demand.

In such volatile environments, a mechanism that would assist in updating the actual malicious
code installed on a compromised client became needed. This would allow an attacker to
regularly refocus his information theft efforts to obtain maximum gain from his malicious code

A botnet, defined by the Honeynet project as a network of compromised machines that can be
remotely controlled by an attacker, is a solution that allows this type of functionality. In a botnet,
machines that are compromised will attempt to get in touch with the attacker, also known as
botherder, and await its commands. The botherder is then able to remotely control which
information is being acquired by the malware, or he can peruse each individual infected host as a
drone to assist in infecting additional machines through the transmission of spam or by scanning
the network and attacking vulnerable services.

The connection between botnet member and herder can be set up in many ways. Initially, IRC
was a popular means of control. Each individual machine would connect to a specific IRC
network, join a specific password-protected channel and await commands from the botherder,
who is also active on the channel. This way, the botherder could issue a command to download
additional features from a server under his control.


Generally, crackers will not be interested in investing time and effort in extending their attack
software to support these devices unless these would either endanger their business model or
allow significant opportunity to increase profits. Recent industry analysis has indicated that
mobile phones are .poised to overtake the PC as the dominant internet platform in some markets.
The study makes this prediction based on high mobile phone ownership combined with an active
interest in accessing the internet from these devices.

At this point in time, most information stored on mobile devices is still synchronized with
desktop PCs. This means that an attacker can still gain access to most confidential information
such as e-mail by compromising a desktop machine. However, should this prediction come to
fruition, it would be likely that some information is exclusively stored on the mobile devices
themselves. As the device is always available, it would make sense to store potentially sensitive
calendar or password information purely on this device.

Another evolution of interest is the rise of internet banking on mobile devices. Many banks now
allow mobile internet banking through a WAP website from a PDA or mobile phone. Many
banks have also started an SMS banking program, which allows clients to perform banking
transactions through the use of the short message system.

These latter systems generally work through the deployment of an SMS server at the mobile
provider, which exchanges transactions with an SSL enabled web server running at the bank.
While the transaction from mobile provider to the bank is as such protected against attacks
against confidentiality and integrity, security of the actual short message between the mobile
device and the cell phone provider depends on the security features it chooses to deploy. Average
deployments seem to consist of no more than a cyclic redundancy check in combination with the
IA5 encoding format. More importantly, there is no end-to-end encryption between the mobile
user and the banking application. Solutions such as Secure SMS have been developed but are not
yet in widespread use.

In cases where additional network encryption applies to SMS, it could still be possible for an
attacker to intercept text messages by introducing a malicious base station into a specific area.
However, such attack would only cover a limited area which is likely to contain an even more
limited amount of SMS banking users. An attack focusing on the mobile end points, in
comparison, would be targeted and more difficult to detect and trace. Even where applications
would use end-to-end encryption between a Java banking application on the mobile device and
the banking provider, a client-side attack could still prove effective.

The use of botnets consists of four major components:

1. Infection of a machine with malicious botnet code;

2. Connection to the command & control channel set up by the attacker;


3. Downloading of secondary payload on command of the attacker;

4. Performing an attack or additional scanning, gathering information.

These events usually happen sequentially, with a loop between the attack execution and the
command & control channel. For example, data gathered during a scan initiated by the secondary
payload may be transferred back to the attacker through the command & control channel, or a
new command may be triggered through the command & control channel to have the host
download and execute additional attack payload.

In a standard DoS attack, a network of infected PCs, a "botnet", would swamp a server with so
many requests to view a web page that it would be unable to handle legitimate requests. Now
Patrick Traynor of the Georgia Institute of Technology in Atlanta and colleagues have shown
how a cellphone network could be the vehicle for an attack that would cut off calls for millions
of users.

It was found that a botnet of fewer than 12,000 infected cellphones could disrupt 93 per cent of
traffic - voice calls and SMS messages - to a hypothetical database of 1 million subscribers. In a
real-life attack the owners of infected handsets would be unaware that their phone was part of a
botnet. The first phone botnet is believed to have been assembled earlier this year after an SMS
worm called "Sexy Space" cascaded across cellphone networks. Users who clicked on a link in
the message had software installed on their handset that was capable of communicating with a
central server, making it possible for their phone to be controlled remotely by a third party.

However, the question still remains as to whether mobile botnets will be used commercially or
not. These threats are certainly feasible, but whether they will be implemented by an attacker
remains to be seen. This is because while smartphones are powerful, they are still not as
attractive a target as PCs, which can be hijacked to send large amounts of spam or host malicious
websites. While a mobile botnet might be used to bring down part of a cellular network, it's not
clear how profitable such an attack would be.

Namita Gauri
EEE, 4th yr
Northern India Engineering College



Microsoft leverages an old solution to an old problem with new technology

Back in the days before PCs, users hooked up to computers using terminals, with the computer
itself as a centralized shared resource. Later, the concept evolved into so-called "client-server"
computing, with desktop computers connecting to servers. Now, it seems like what was old is
new again, particularly when the topic is education and the vendor is Microsoft.

Microsoft has unveiled its MultiPoint Server 2010 -- a system that uses a PC as a central
computer and hooks multiple keyboards, monitors, and mice each to it as terminals via USB 2.
Called "shared resource computing," each user's experience is as if he or she were the only
user on the system.

Designed for educational institutions with limited IT resources, Windows MultiPoint Server
2010 enables schools to access technology at a lower overall cost of ownership with lesser
ongoing operations costs per user.

MultiPoint Server 2010 will enable students to get the valuable 21st-century skills that come
only from personal engagement with a computer. And, MultiPoint Server 2010 was designed to
be easy for teachers to set up and use. MultiPoint Server 2010 will provide a user experience
very similar to a Windows 7 desktop, and offers system management tools that have been
simplified for teachers so less time is spent on dealing with technology and more time is
dedicated to teaching.


MultiPoint Server 2010 is one of the latest projects for Microsoft's Unlimited Potential group.
The group was formed to work on education and economic issues in the developing world.
Unlimited Potential aims to reach the next 1 billion people by 2015 by exploring solutions in
three key interrelated areas- transforming education, fostering local innovation, and enabling
jobs and opportunities.

MultiPoint can be used in a computer lab with a small group working on a student controlled
application. It can also be applied in a classroom with a large number of students participating
while a teacher controls the application Microsoft is currently working with independent
software vendors to develop educational software using the Microsoft MultiPoint platform.

Microsoft plans to make MultiPoint Server 2010 available worldwide during the first half of next
year. Microsoft already has MultiPoint pilot programs running in other several other Asian
countries as well as in Latin America, the Middle East and Africa, and also Central and Eastern

At launch, Multipoint will have language versions for Chinese (Simplified and Traditional),
English, French, German, Italian, Japanese, Korean, Portuguese (Brazilian), Russian, Spanish,
and Turkish. The company has not yet said what the product will cost. However, it will be
available via OEMs and through Microsoft's Academic Volume Licensing program or through
Authorized Education Resellers and Large Account Resellers in each.

Nitisha Jain,
IT 3rd yr



In 1965, Intel co-founder Gordon Moore made an observation that has since dictated the
direction of the semiconductor industry. Moore noted that the density of transistors on a chip
doubled every year. That meant that every 12 months, chip manufacturers were finding ways to
shrink transistor sizes so that twice as many could fit on a chip substrate. Moore‟s observations
and predictions morphed into a concept we call Moore's Law.

Over the years, people have tweaked Moore's Law to fit the parameters of chip development. At
one point, the length of time between doubling the number of transistors on a chip increased to
18 months. Today, it's more like two years. That's still an impressive achievement considering
that today's top microprocessors contain more than a billion transistors on a single chip.

Another way to look at Moore's Law is to say that the processing power of a microchip doubles
in capacity every two years. That's almost the same as saying the number of transistors doubles --
microprocessors draw processing power from transistors. But another way to boost processor
power is to find new ways to design chips so that they're more efficient.

This brings us back to Intel. Intel's philosophy is to follow a tick-tock strategy. The tick refers to
creating new methods of building smaller transistors. The tock refers to maximizing the
microprocessor's power and speed. The most recent Intel tick chip to hit the market (at the time
of this writing) is the Penryn chip, which has transistors on the 45-nanometer scale. A nanometer
is one-billionth the size of a meter -- to put that in the proper perspective, an average human hair
is about 100,000 nanometers in diameter.

So what's the tock? That would be the new Core i7 microprocessor from Intel. It has transistors
the same size as the Penryn's, but uses Intel's new Nehalem micro architecture to increase power
and speed. By following this tick-tock philosophy, Intel hopes to stay on target to meet the
expectations of Moore's Law for several more years.

The microarchitecture is named after the Nehalem Native American nation in Oregon. The code
name itself had been seen on the end of several roadmaps starting in 2000. At that stage it was
supposed to be the latest evolution of the NetBurst microarchitecture. Since the abandonment of
NetBurst, the codename has been recycled and refers to a completely different project, although
Nehalem still has some things in common with NetBurst. Nehalem-based microprocessors utilize
higher clock speeds and are more energy-efficient than Penryn microprocessors. Hyper-
Threading is reintroduced along with an L3 Cache missing from most Core-based

The first computer to use Nehalem-based Xeon processors was the Apple Inc. Mac Pro
workstation announced on March 3, 2009. Nehalem-based Xeon EX processors for larger servers
are expected in Q4 2009. Mobile Nehalem-based processors are planned to follow in late 2009 or
early 2010.



Various sources have stated the specifications of processors in the Nehalem family:

 Two, four, six, or eight cores

 731 million transistors for the quad core variant
 45 nm manufacturing process
 Integrated memory controller supporting two or three memory channels of DDR3
SDRAM or four FB-DIMM channels
 Integrated graphics processor (IGP) located off-die, but in the same CPU package.
 A new point-to-point processor interconnect, the Intel QuickPath Interconnect, in high-
end models, replacing the legacy front side bus
 Integration of PCI Express and Direct Media Interface into the processor in mid-range
models, replacing the Northbridge
 Simultaneous multithreading (SMT) by multiple cores which enables two threads per
core. Intel calls this hyper-threading. Simultaneous multithreading has not been present
on a consumer desktop Intel processor since 2006 with the Pentium 4 and Pentium XE.
Intel reintroduced SMT with their Atom Architecture.
 Native (monolithic, i.e. all processor cores on a single die) quad- and octa-core
 The following caches:
 32 KB L1 instruction and 32 KB L1 data cache per core
 256 KB L2 cache per core
 4–8 MB L3 cache shared by all cores.
 33% more in-flight micro-ops than Conroe.
 Second-level branch predictor and second-level translation lookaside buffer.
 Modular blocks of components such as cores that can be added and subtracted for varying
market segments.


The Nehalem microprocessor can be seen as a chip that has two main sections: a core and then
the surrounding components called the un-core. The core of the microprocessor contains the
following elements:

 The processors, which do the actual number crunching. This can include anything from
simple mathematical operations like adding and subtracting to much more complex
 A section devoted to out-of-order scheduling and retirement logic. In other words, this
part lets the microprocessor tackle instructions in whichever order is fastest, making it
more efficient.
 Cache memory takes up about one-third of the microprocessor's core. The cache allows
the microprocessor to store information temporarily on the chip itself, decreasing the
need to pull information from other parts of the computer. There are two sections of
cache memory in the core.


 A branch prediction section on the core allows the microprocessor to anticipate functions
based on previous input. By predicting functions, the microprocessor can work more
efficiently. If it turns out the predictions are wrong, the chip can stop working and change
 The rest of the core orders functions decodes information and organizes data.

The un-core section has an additional 8 megabytes of memory contained in the L3 cache. The
reason the L3 cache isn't in the core is because the Nehalem microprocessor is scalable and
modular. That means Intel can build chips that have multiple cores. The cores all share the same
L3 memory cache. That means multiple cores can work from the same information at the same

Scalable microprocessors are an elegant solution to a tricky problem -- building more processing
power without having to reinvent the processor itself. In a way, it's like connecting several
batteries in a series. Intel plans on building Nehalem microprocessors in dual, quad and eight-
core configurations. Dual-core processors are good for small devices like smart phones. You're
more likely to find a quad-core processor in a desktop or laptop computer. Intel designed the
eight-core processors for machines like servers -- computers that handle heavy workloads.

Intel says that it will offer Nehalem microprocessors that incorporate a graphics processing unit
(GPU) in the un-core. The GPU will function much the same way as a dedicated graphics card.


According to Intel, the Nehalem microarchitecture uses a system the company calls QuickPath.
QuickPath encompasses the connections between the processors, memory and other components.
QuickPath connectivity improves the memory bandwidth, allowing more information to pass
each second.


QuickPath allows processors to take shortcuts when they ask other processors for information.
Imagine a quad-core microprocessor with processors A, B, C and D. There are links between
each processor. In older architectures, if processor A needed information from D, it would send a
request. D would then send a request to processors B and C to make sure D had the most recent
instance of that data. B and C would send the results to D, which would then be able to send
information back to A. Each round of messages is called a hop -- this example had four hops.

QuickPath skips one of these steps. Processor A would send its initial request -- called a "snoop"
-- to B, C and D, with D designated as the respondent. Processors B and C would send data to D.
D would then send the result to A. This method skips one round of messages, so there are only
three hops. It seems like a small improvement, but over billions of calculations it makes a big

In addition, if one of the other processors had the information A requests, it can send the data
directly to A. That reduces the hops to 2. QuickPath also packs information in more compact


In a microprocessor, everything runs on clock cycles. Clock cycles are a way to measure how
long a microprocessor takes to execute an instruction. Think of it as the number of instructions a
microprocessor can execute in a second. The faster the clocks speed, the more instructions the
microprocessor will be able to handle per second.

One way in which microprocessors like the Core i7 try to increase efficiency is to predict future
instructions based on old instructions. It's called branch prediction. When branch prediction
works, the microprocessor completes instructions more efficiently. But if a prediction turns out
to be inaccurate, the microprocessor has to compensate. This can mean wasted clock cycles,
which translates into slower performance.

Nehalem has two branch target buffers (BTB). These buffers load instructions for the processors
in anticipation of what the processors will need next. Assuming the prediction is correct, the
processor doesn't need to call up information from the computer's memory. Nehalem's two
buffers allow it to load more instructions, decreasing the lag time in the event one set turns out to
be incorrect.

Another efficiency improvement involves software loops. A loop is a string of instructions that
the software repeats as it executes. It may come in regular intervals or intermittently. With loops,
branch prediction becomes unnecessary -- one instance of a particular loop should execute the
same way as every other. Intel designed Nehalem chips to recognize loops and handle them
differently than other instructions.


As software applications become more sophisticated, sending instructions to processors becomes

complicated. One way to simplify the process is through threading. Threading starts on the


software side of the equation. Programmers build applications with instructions that processors
can split into multiple streams or threads. Processors can work on individual threads of
instructions, teaming up to complete a task. In the world of microprocessors, this is
called parallelism because multiple processors work on parallel threads of data at the same time.

Nehalem's architecture allows each processor to handle two threads simultaneously. That means
an eight-core Nehalem microprocessor can process 16 threads at the same time. This gives the
Nehalem microprocessor the ability to process complex instructions more efficiently. According
to Intel, the multithreading capability is more efficient than adding more processing cores to a
microprocessor. Nehalem microprocessors should be able to meet the demands of sophisticated
software like video editing programs or high-end video games.

Prem, IT 3rd yr
Nitisha Jain, IT 3rd yr



If you know anything about PC gaming, you've probably heard of Crytek, the envelope pushing
company that busted out a game so graphically intense in Crysis that most computers
spontaneously combusted upon trying to run it. The intense hardware requirements of the game
resulted in underwhelming sales upon its initial release, though the game has sold over 1.5
million copies to date now, 18 months after its release, as more and more PC gamers finally
acquire the capability to simply run it.

Crytek is at it again, building on the framework of Crysis' Cry Engine 2, with the forthcoming
Cry Engine 3, which they say will be perfect for the upcoming PlayStation 4, despite their
limited knowledge on the system. The Cry Engine 3 is the first rendering engine being built for
the next generation consoles, and was recently shown off at the Game Developer's Conference in
San Francisco.

One of the key features touted by the Cry Engine 3 is its scalability, which will make it perfectly
suitable for the varying capabilities of the 3 next generation consoles, as well as PC game

Whereas many engines have difficulty achieving full compatibility with specific hardware, such
as the Unreal Engine, or are simply too weak or too powerful for the hardware, the Cry Engine
3 will attempt to make all of these problems a matter of the past.


The scalability will play a huge role in games developed for multiple formats, allowing easy and
flawless portability between different hardware systems. This should make the engine ideal for
PlayStation 4 gamers, as they should see the full benefit of the PlayStation 4's power, whereas
PS3 and Xbox360 cross platform games have been very similar, but the developers have
been unable to fully maximize the PS3's power with their game engines. In fact the
scalability makes the engine perfect for even current generation systems, so we're likely to see
PS3 games using the Cry Engine 3 before the PS4 even launches.

Some of the features that will be present in the Cry Engine 3 include:
• Integrated vegetation & terrain cover generation system
• Real time soft particle system & integrated FX editor
• Multi-core support
• Real time dynamic global illumination
• Deferred lighting
• Natural lighting & dynamic soft shadows
• Volumetric, layer & view distance fogging
• Screen Space Ambient Occlusion
• "Uber Shader" technology (I can get down with some uber technology)
• Eye adaptation & high dynamic range (HDR) lighting
• Motion blur & depth of field
• Parametric skeletal animation
• Facial animation editor
• Subsurface scattering
• Dynamic path finding (plenty of games that could use a dose of this)
• Natural world effects
• CGI quality time of day system
• High quality 3D water
• Dynamic volumetric light beams & light shaft effects
• Streaming environments
• Integrated multi-threaded physics engine
• Interactive & destructible environments (for all us gamers who love blowing stuff
• Rope physics
• PolyBump
• Data-driven sound system
• Dynamic sounds & interactive music
• Environmental audio

These are just some of the advanced features that are coming with the Cry Engine 3. Screenshots
and demos from the show were running on current generation hardware, so naturally they don't
show off what the engine will look like running on a PlayStation 4, but it's an impressive looking
engine nonetheless.
Not to be outdone, Epic Games is also working on an upgrade to their popular Unreal Engine,
now in its third iteration. The Unreal Engine 4 is planned for the PlayStation 4 and other next
generation consoles, though the engine has been given an incredibly wide window of possible
release, anywhere between 2012 (the PlayStation 4's probable release date) and 2018. We have to


believe the engine is coming much sooner than 2018 (which would actually set it more in line
with the PlayStation 5's probable release), as gamers and developers alike have expressed
concerns over the Unreal Engine 3, over both its texture pop-in, and its over-saturation in the

One technology which may or may not make into the PS4 is ray tracing. Ray tracing is a
stunning rendering technology that creates near photo-realistic images (and yeah, we've heard the
term photo-realistic graphics in gaming for a long time, but this technology really does push that
line, at least in still images, as we've yet to see it in a game, though several demos have been
released showcasing the technology in action), naturally at a massive computational cost, making
it unusable by present gaming systems, including computers. Whether or not PS4 hardware will
be powerful enough to allow for ray tracing is unknown at this time.

What we know is that these are just the first of many future rendering engines and technologies
which will be used for the PlayStation 4, and that many more will surface once the system's
specs are detailed. Get ready to wipe plenty of drool from your chin once the first screens of the
PlayStation 4 start gloriously bombarding us in the near future.

IT 3rd yr



NASA scientists will soon brush the dust off some Martian rocks that are practically bursting
their seams to give their lively account of the red planet's past. The Mars Science Lab -- aptly
named "Curiosity" will be there on Mars in 2011.

―Curiosity‖ will be the first red planet rover since Spirit and Opportunity. Though it would be
hard to match the twins' toughness, Curiosity will have a much greater range, more instruments,
and a bigger, stronger robotic arm. It will be nuclear powered instead of solar, so there will be no
worries about dust on solar panels causing energy supplies to plummet. It will have much more
power, more consistently.

The small, car-sized rover will ramble about on the rocky surface, gizmos at full tilt, not only
brushing dust off rocks but also vaporizing them with a laser beam, gathering samples to analyze
on the spot and taking high resolution photographs.

"Curiosity‖ will be prospecting for organic molecules, the chemical building blocks of life. To
answer the question 'Is there life on Mars?' the most reasonable and productive approach is to
look for organic compounds, which could be from life past or present, or from meteorites

The rock record is of particular interest to researchers. It has a record from billions of years ago
and can answer questions like 'Where and for how long might Mars have been habitable?' 'Was it
cold or warm there in the past?' 'Was the water there acidic or salty?'"


"Curiosity‖ will even land in a new fashion. Spirit and Opportunity were sitting on top of a
Lander that hit on the surface and bounced, protected by airbags, before coming to rest and
opening up. They then had to drive off the top of the Lander. A descent stage called Sky Crane
will gently lower Curiosity (no airbags needed) via cables, which will be cut once the rover's
wheels set down.

The most important difference is that Spirit and Opportunity aren't analytical labs – they are
more for observing. This newest rover will be performing a more comprehensive study of the
Martian environment.

Remote sensing instruments located on Curiosity's mast will scout around for promising targets
and perform some long-distance analysis before the vehicle moves in for a closer look.

"Curiosity‖ will have a laser on its mast that can take aim at a rock and vaporize a small spot on
it. This produces a plasma cloud that tells us about that rock's chemistry. We can look at the light
reflected off the cloud to characterize rocks and soils from up to 9 meters away and we‘ll be able
to classify minerals, ices, and organic molecules without having to drive as much.

The mast also sports a high-resolution camera called, naturally, Mastcam. It will observe,
photograph, and videotape geological structures and features, like craters, gullies, and dunes.


The rover's robotic arm wields its own unique instruments. APXS, the Alpha Particle X-Ray
Spectrometer, will measure the abundance of chemical elements in the dust, soils, rocks, and
processed samples. MAHLI, the Mars Hand Lens Imager, will return color images like those of
typical digital cameras and act like a geologist's magnifying lens. Its images could be used to
examine the structure and texture of rocks, dust, and frost at the micrometer to centimeter scale.

One laboratory instrument inside the rover's body will explore the red planet by "sniffing" the
air, bird-dog style. SAM, short for Sample Analysis at Mars, has vents that open to the
atmosphere to determine where to take samples, for example if it detects methane in the area.

That's important because methane can be released by microbes or by liquid water reacting with
rock at depths under the surface. Water 'down under' could be a niche for subterranean life. SAM
can also be used to sniff the gases released after baking a rock or soil sample in its oven.

In addition, Curiosity will carry instruments for observing Martian weather and measuring
cosmic radiation bombarding the planet's surface.

This rover is intrinsically spectacular in terms of what the mission will do. It's a keystone for the
future. It sets the stage for understanding whether organics are preserved on Mars and will tell us
what we need to use to find out.

Megha Ronjhiya
ICE, 4th yr



Web spoofing is an Internet security attack that could endanger the privacy of World Wide Web
users and the integrity of their data. The attack can be carried out on today‘s systems,
endangering users of the most common Web browsers, including Netscape Navigator and
Microsoft Internet Explorer.

Web spoofing allows an attacker to create a ―shadow copy‖ of the entire World Wide Web. The
key to this attack is that the attacker's Web server sits between the victim and the rest of the Web.
This kind of arrangement is called a "man in the middle attack" in the security literature.

Access to the shadow Web are funneled through the attacker‘s machine, allowing the

attacker to monitor all of the victim‘s activities including any passwords or account numbers the
victim enters. The attacker can also cause false or misleading data to be sent to Web servers in
the victim‘s name, or to the victim in the name of any Web server. In short, the attacker observes
and controls everything the victim does on the Web.

Web page spoofing is an activity that hackers use to direct Web site visitors to a Web site that
looks like the one they believe they are visiting. The actual site, however, is hosted in a different
location, usually for the purpose of gathering personal or confidential information that is used in
identity theft.


Spoofed Web sites are often used in conjunction with spoofed emails .The messages contain a
link to the site, then when a visitor logs onto the site, they are prompted to provide account
information, usernames and passwords, or a Social Security Number or date of birth.

A spoofed Web site appears identical to the Web site that is being copied, although it may have a
different URL. However, hackers can also disguise the URL, which makes it very hard to
distinguish a spoofed site from the real one.

Spoofing Attacks in physical and electronic world

Spoofing attacks are possible in the physical world as well as the electronic one. For example,
there have been several incidents in which criminals set up bogus automated-teller machines,
typically in the public areas of shopping malls.

People using computer systems often make security-relevant decisions based on contextual cues
they see. To appreciate the range and severity of possible spoofing attacks, we must look more
deeply into two parts of the definition of spoofing: security-relevant decisions and context.

Security-relevant Decisions

By ―security-relevant decision‖ we mean any decision a person makes that might lead to
undesirable results such as a breach of privacy or unauthorized tampering with data.

Deciding to divulge sensitive information, for example by typing in a password or account

number, is one example of a security-relevant decision

Contextual cues

The appearance of an object might convey a certain impression. You might think you‘re dealing
with a popup window when what you are seeing is really just a rectangle with a border and a
color different from the surrounding parts of the screen. Particular graphical items like file-open
dialog boxes are immediately recognized as having a certain purpose.

Is manual.doc the text of a user manual? (It might be another kind of document, or it might not
be a document at all.) URLs are another example. Is MICR0S0FT.COM the address of a large
software company? (For a while that address pointed to someone else entirely. By the way, the
round symbols in MICR0S0FT here are the number zero, not the letter O.)

Starting the Attack


example of Web transaction during a Web spoofing attack:

(1) The victim‘s browser requests the page from the attacker‘s server;

(2) The attacker‘s server requests the page from the real server;

(3) The real server provides the page to the attacker‘s server;

(4) The attacker‘s server rewrites the page;

(5) The attacker‘s server provides the rewritten version to the victim.


Since the attacker can observe or modify any data going from the victim to Web servers, as well
as controlling all return traffic from Web servers to the victim, the attacker has many
possibilities. These include surveillance and tampering.


The attacker can passively watch the traffic, recording which pages the victim visits and the
contents of those pages. When the victim fills out a form, the entered data is transmitted to a
Web server, so the attacker can record that too, along with the response sent back by the server.


The attacker is also free to modify any of the data traveling in either direction between the victim
and the Web. The attacker can modify form data submitted by the victim.

Protective measures

Web spoofing is a dangerous and nearly undetectable security attack that can be carried out on
today‘s Internet. Fortunately there are some protective measures you can take.


In the short run, the best defense is to follow a three-part strategy:

1. Disable JavaScript in your browser so the attacker will be unable to hide the evidence of the

2. Make sure your browser‘s location line is always visible;

3. Pay attention to the URLs displayed on your browser‘s location line, making sure they always
point to the server you think you‘re connected to.

As of yet, there is no fully satisfactory long-term solution to this problem.

Every approach to this problem seems to rely on the vigilance of Web users. Whether we can
realistically expect everyone to be vigilant all of the time is debatable.

Nitisha Jain
IT, 3rd yr



Section Editors:
Karan Sharma, EEE 3 (
Yash Kumar, EEE 3 (



The discrimination against disabled people in the workplace is one of the worst issues that
plagues the ideologies and constitution of society at large. Governments, all across the world,
have hence passed many laws and acts that prevent workplace prejudice when it comes to
matters that concern disabled people. The provisions of these acts are basically put forth to
prevent job discrimination against disabled people during the recruitment process, promotion,
bonus, etc. Following are some of the provisions of the laws, related to discrimination in the

One of the biggest problems that was faced by many disabled people in workplace was the lack
of appropriate infrastructure. Most the business establishments have to build extra infrastructural
provisions for the disabled people; for example, special ramps for wheelchairs or provision for
documents written in Braille. Large-sized corporations, in fact, take a step forward and provide
their disabled employees with specially trained dogs as guides.

When it comes to the recruitment process, companies and business establishments are not
permitted to reject job applications of disabled people on the basis of their disability. Some large
sized corporations, in fact have to give preference to disabled people during their selection
processes. The law of the land has also made provisions to safeguard the interests of disable
people within the organization. One of the most common provisions is to revise the periodic,
expected productivity. Some laws also make it mandatory for companies to appoint personnel,
who assist disabled people within the premises of the office.

The laws that prevent the discrimination of disabled people in the workplace also explicitly state
different guidelines that have to be followed by the companies, when it comes to appraisal of
salary, promotions and separation or termination. Similarly, strict laws related to traveling on
account of work, is also to be considered by the company. Tribunals and inspectors are, many a
times, also appointed to audit establishments and ensure that these laws are being followed.

One of the best examples of facilities that are provided by some companies for disabled people
are special keyboards and computers at the workplace. In order to take care of their employees,
many of these companies also provide the disabled people with chauffeured vehicle to assist
them in commuting to the workplace. These companies and establishments do not consider the
provision of these facilities as a service; they execute it as a duty. Most of these companies that
take these initiatives, eradicate discrimination against disabled people in the workplace in the
real sense.

Jenny Lee Cole
Banker, New Zealand



FACT: Approximately 80% of the students who go to IIMs are Engineers.

Typically in Engineering, We give exams twice a Year (called Semester Exam). Let us consider
a problem to design a joint which can buckle a rope at one end and will be bolted to an Iron
Frame on the other. It was given the Load to be supported by the Joint would be around 480 Kg
wt. The joint will be used in an equipment carrying Human life, which signifies a high factor of
safety. As an engineer one can solve this problem like any routine text book problem and came
up with numbers like the ideal number of bolts in the joint, what should be the recommended
size of the bolts, what will the width and thickness of the joint to support the stress (or load) etc

Sounds Geeky right? Boring? It was actually a joint which was supposed to be used in an
Elevator where on one side it will be the elevator and one the other end would be the rope, it was
designed for 6 people each having average weight of 80 Kgs, the factor of safety being 5,
meaning Designed for 6 people but can survive weight of 30 people. Now, why was the purpose
of the question? Because someone wanted to create a machine to transport people to higher
altitude or floors.

Lets again think the same thing all over again. There was a constructor who made a building
which was 5 floors high. The construction was complete, the first three floors were sold at good
price but the top two floors won‘t sell. An MBA goes to him and asks: What is the problem?

Constructor: The first three floors sold quickly but the top two are not being sold. Buyers are
coming enquiring and leaving.

MBA: Hmm, What are they saying?

Constructor: Flats are bought my families and typically all families have some elderly person,
who won‘t be able to frequently climb up 4 or 5 floors.

MBA: Ok, are there any other buyers?

Constructor: Yes, but they will pay me Rs. 50,000 less for 4th Floor and Rs. 1,00,000 less for
the 5th Floor.

MBA: Ok, so you need a solution which should cost you Less than Rs. 1,50,000 and also helps
you sell the flats. How about if we can mechanize the transportation of humans to the above

Constructor: I guess it will serve the purpose, but I can spare only 80 Sq. feet for it.

MBA: But the Mechanization will have a running cost, will the customer bear the running cost?


Constructor: In my last building, Customers were willing to pay Rs. 2,000 as maintenance fee.
So I guess we can collect 10,000 from 5 customers per month.

So, Now the MBA calls his friend, with 10 years of experience in Engineering and says
―I need a Transportation Machine which can carry a family of 6 People including Children, Men,
Women and Elders from Ground Floor to any floor of the building. The Space required by the
machine cannot exceed 80 Sq Ft. of floor area. The Machine should cost less than Rs. 1, 50,000
and should operate within Rs. 10,000 a Month‖.

The Senior Engineer got to work and pulled up his junior engineers in the Team. He quickly
calculated that the total weight of the family of 6 people will be around 80 Kgs x 6 = 480. He
will need to design

1. a Cabin to accommodate the passengers

2. a pulley system to pull the passenger up
3. a motor to automate the process
4. the joint to connect the pulley with the cabin.

He had 4 junior engineers. He gave each of the tasks to each of the engineers and supervised the

The purpose of the entire story is to provide the complete picture. Whenever we get a question in
our exams or curriculum, there are few things so striking. Firstly that we are given all the
values/data which are required to solve the problem and secondly, all the data / values which are
provided need to be used to solve the problem. If either of the one is not happening, 99% of
times you get a zero.

But, who framed the problem? Where did the problem come from? Where did the values come
from? Why you need a joint to carry 480 kgs of load?

MBAs find a need, and they frame the constraints of the wants to satisfy the need. From these
constraints comes a problem statement. Once they can frame a solution to the problem, they
fragment it into micro solutions and then get functional experts to solve each fragment. These
functional experts can be either people or software or calculators. The point is MBAs need not be
able to solve a problem, but be able to break it down to solvable sets of problems and know who
within their reach can solve it keeping the solution still cost effective.

Engineering teaches you to solve some given problems. MBA teaches you to find needs, and
create a problem out it with the relevant parameters plucked out of the environment which will
be relevant to solve the problem. Once, done, they can leave it on the engineers to solve it.I hope
this article gives a better perspective to all and sundry as to why engineers are needed in
management science. After all domain knowledge of both sciences will ease the work a lot.

Angad Lamba
ECE-2, 3rd Year




Perhaps the most charismatic and controversial of Indian politicians, "Lalu Prasad Yadav", is the
only politician who was welcomed by top management institutes across the globe for his great
leadership and managerial qualities in managing the miraculous turnaround in Indian railway
from $12billion deficit to $5.22billion surplus in just five years of his excellence as Minister of
Railways from 2004 to 2009 session under UPA government.

Born in a small village in Bihar, Phulwaria on June 11, 1948 in a poor peasant family could not
affect him much from being a born leader. His interest in politics came into action in early days
of academic life while he was doing L.L.B from Patna University to be a lawyer by profession.
Later he was elected as a Lok Sabha member in 1977 at a very early age of 29. He sprung to
national prominence in 1992 when emerged as a protector of Muslim rights in Bihar and had
been implicated for numerous scandals including ―fodder scam‖ in which his government
misappropriated millions of dollars set aside for subsidized fodder for animals, due to which he
had to resign from the post of Chief Minister of Bihar. Lalu was sent to jail five times during the

Lalu came again in action with full flow in 14th Lok Sabha elections in May-2004. His party RJD
(Rashtiya Janta Dal), which he formed in 1997 after breaking away from Janta Dal of which, he
holds the record of longest (15 years) serving president of Indian political party in Limca book of
records, won 24 seats, was ranked 5th among all parties. RJD then collaborated with UPA and
became the Railway Minister.

Lalu started as railway minister with more or less the same IAS officers & same workplace who
worked under the previous ministers. Previous railway ministry termed white tiger as a white
elephant; ministry of economical affairs predicted the total loss of $15.2 dollars possibly by 2015
and suggested privatization as the only solution. But, in the very first year he stated a profit of
$1.9 (9000cr.) billion. Since then, there was no looking back. He created benchmarks in Indian
railway ministry by improving profits from $1.9 billion in 2005 to $2.8 billion (14000cr.) in
2006, and then to $4.2 billion in 2007. In budget 2008, he announced the net surplus of nearly
$5.22 billion dollars. He left passenger fares untouched and found other profitable sources of
revenue like introducing additional 3000 coaches thereby earning 2000cr. In writing the
successful script for Indian Railways, IAS Officer Sudhir Kumar played a vital role in
engineering the financial turnaround. He took some very intelligent steps under the railway
minister to convert the white elephant into a grey horse; for example, long queues at railway
stations were terminated by strategic use of information technology as everything became online
and railway enquiry call centers were established. There was provision of foot-over bridges at all
railway stations to reduce accidents and inconvenience to the passengers; the length of platforms
at 560 stations was increased for running longer passenger trains.

This miraculous change in railway ministry caught eyes of everybody including Harvard
Business School who invited Lalu for sharing the secret of his wonderous deeds. He addressed a
‗class‘ of 130 students from Harvard and Wharton, outlining in Hindi how he scripted the


success story of country‘s loss making industry. IIM - Ahmadabad also introduced a case study
regarding this whole unbelievable surplus in such a short span of three years. IIM-A professor G.
Raghuraman who has been a keen researcher of Indian rail network, has already confessed that
he is not very optimistic about the continual progress of Indian railway once the duo between
him and Sudhir Kumar move out. So, are the fast paced-initiatives and innovative ideas of Lalu
Prasad Yadav and his aides to utilize optimally the assets of railway just a passing phase or will
it continue its upswing even under the guidance of current railway minister Mamta Banerji? Well
that‘s something only time will tell but one thing is for sure that Lalu has proved that India can
tackle the puzzle of mismanagement and corruption by developing ―street smart attitude‖ and
―corporate perspective‖.

Bharat Rana



A Limited Liability Company has a business structure that combines limited personal liability
feature of the corporation with the single taxation feature of a partnership and a sole
proprietorship, thus allowing income to flow directly to the members. It would behoove the
readers to note that the owners of a Limited Liability Company are called members and their
interest in the company is expressed in percentage. These members may be individuals,
corporations, other LLCs and foreign entities. For instance, in case of a Limited Liability
Company with 4 members, each member will have an interest of 25 percent. All members are
expected to file tax returns separately and the LLC files tax returns with the Internal Revenue
Service only for the purpose of providing information.

Limited Liability Company – Disadvantages

Formation: To start a sole proprietorship, one does not have to file any formation document or
pay filing fees. The formation cost of a Limited Liability Company is around $700, which is the
same as the cost required to form an S-Corp. Hence, for an individual, sole proprietorship may
be preferable to an S-Corp.

Difficulty in Raising Capital: A C-Corp and an S-Corp can raise capital by issuing shares.
However, the members of the LLC can only sell interest in the company subject to the operating
agreement that defines the financial and the management structure. Although, most states do not
require the LLC to have an operating agreement, it's not prudent to run a company without
having a proper operating agreement in place. This is because the agreement not only helps the
members overrun unfavorable state default laws but also ensures that the LLC is easily
distinguishable from a sole proprietorship.

Filing: The Federal Govt. does not recognize LLC for the purpose of taxation. The LLC is either
classified as a corporation, a partnership or a sole proprietorship for the purpose of taxation. IRS
Form 8832 is used to classify the LLC. If the LLC is classified as a sole proprietorship with one
member, IRS Form 1040 - Schedule C has to be used for tax purposes. In case of a partnership,
IRS Form 1065 is used while both C-Corp and S-Corp use IRS Form 1120. Shareholders in an S-
Corp and members in case of a partnership use Form K-1 for personal tax returns.

Despite the aforementioned limited liability company disadvantages, there are significant
benefits to incorporating a company as LLC. The biggest advantage of a Limited Liability
Company is that there is no question of double taxation since there is no tax at the entity level.
Income is passed directly to members just like in case of sole a proprietorship or a partnership.
However, unlike sole proprietorship and partnership, members of a Limited Liability Company
have limited liability. Limited liability feature of the S-Corp thus becomes available despite the
entity having to comply with very few legal and administrative requirements. Finally, a Limited


Liability Company can be formed with just one member whereas an S-Corp can be owned by
100 or fewer shareholders.

Angad Singh
ECE, 3rd yr




Yesterday while having the first sip of my second glass of tea I read the headlines of a famous
daily. It said, ―Delhi Government raises the price of the Metro ticket as well as DTC buses‖. At
that very moment I decided to find out what our counterparts in other parts of the world have to
pay. This brought me to a weird discovery of sorts.

First of all I need to mention New Yorkers whose costliest ticket is Rs 86.24 and their monthly
average income is Rs. 1, 37,903.00 then we look for some consolation in the Far East where the
average income is mere Rs. 4000.00 and costliest ticket is priced at Rs. 14.75. But when I read
the Indian figures I was taken aback. An average Indian earns Rs. 1950 per month and costliest
metro ticket is Rs. 22.00 I know these number seem meaningless. We cannot compare our
standards of living with theirs. That is why I decided to convert the figures and express them as a
percentage of average Indian household income. The result was not comforting at all.

PLACE FAIR Monthly Wages As percentage of

Indian Wages
Beijing 14.76 4,033 6.00
Mexico 30.36 9.570 6.25
Paris 99.0 90,583 2.25
Berlin 129.80 92,583 2.25
London 194.04 1,03,950 3.75
Barcelona 77.44 62,296 2.50
India 22.00 metro/15.00 1943 22.00/15.00

Let me tell how am I comparing. Taking the price of the costliest ticket and the average monthly
per capita income of the country, we express it as a percent of Indian monthly per capita income
(INR). This is what we get.

Though people in Europe and the Americas earn far more than us but they are still paying less
for their tickets. My favorite part keeping in mind that we are paying through our noses is the
fact that in spite and despite of all this over charging the DTC and DMRC are running in
constant losses. This is a slap on the mismanaged or simply put greedy face of the Delhi

In all major economies the fares are decided based on per capita income and the savings ability
of individuals. Instead in India the price is set on the basis of profit or loss margin. The DTC
shows a loss of 45 Crores while private players are making a profit. My simple question is why
do we (responsible) citizens of Delhi have to pay for the insincerity of the Government
employees and the faulty transport department?


Karan Sharma
EEE, 3rd yr



In this time of scarce sales and slowly reviving economy (I am referring to the US, we are much
better off in the Far East) any new means of brand promotion that kicks off sales is
commendable. One such tool is to introduce online coupons. Now let us see how you as a
customer benefit from such schemes.

If you haven't used online coupons yet, you don't know what you're missing. I have to be honest.
I used to laugh to myself when my grandmother would go digging through her "coupon pile"
when we were going out to eat or heading to the local grocer. However, I myself have started
using coupons on a regular basis; but not just any coupons; I've discovered the substantial
savings to be had when using online coupons.

There is no shortage of online coupons on the Web. Whether you need school supplies, clothes,
food, and gifts -- whatever you may need -- there are online coupons that will save you cash.
There are even websites dedicated to listing the latest and greatest online coupons.

Just how much money can you save with online coupons? It really does vary. The average
savings I experienced run between 10 and 20 percent. It may not sound like a lot, but over time it
adds up.

Many stores offer online coupons, so if there's something you're looking for, shop around. When
I don't have an online coupon for a store I want to buy something from, I look at the online
coupon directories or I do a Google search for the store name and "coupon code" next to it.

Unlike coupon clipping for groceries, online coupons take very little time at all to find and they
can save you hundreds of rupees each year. I highly suggest searching for online coupons before
doing any online shopping. You never know what you may find.

Karan Sharma
EEE, 3rd yr



The difference between secured and unsecured loans is important for corporates as well as
consumers since both require loans, albeit for different reasons. In other words, loans can be
availed for tending to commercial as well as personal needs. Depending upon the terms and
conditions of the lender, commercial and personal loans may be further classified as secured or

Secured Loans Vs Unsecured Loans

The difference between secured and unsecured loans can be best understood by examining the
collateral, the maturity period of the loan, the amount that can be borrowed and the rate of
interest on the loan. So, here goes:

Presence or Absence of Collateral

Secured Loans: Secured loans require the borrower to pledge some asset so that the disburser has
the option of seizing the asset in case the borrower does not repay the principal and/or interest on
the loan. Secured loans may be commercial or personal.

A commercial secured loan is procured by a business by using its assets as collateral. Businesses
use fixed assets which are integral to the process of production to meet long term capital
requirements. Short term loans are procured by companies by pledging current assets. Unlike
fixed assets, current assets can be converted to cash within one accounting year. Hence, they can
be used only to procure loans for meeting working capital requirements.

As far as secured personal loans are concerned, the borrower's CD (certificate of deposit) or
savings account balance acts as the collateral for the loan.

Unsecured Loans: Unsecured commercial loans or unsecured business loans are administered on
the basis of the creditworthiness of the business. In other words, the creditworthiness of the
enterprise and its goodwill acts as a security for the lender. It goes without saying that only
businesses of great repute can hope to avail these loans.

The borrower's credit score and credit worthiness are of immense significance when it comes to
availing unsecured personal loans or signature loans.

Maturity Period, Amount Borrowed and Rate of Interest

Secured Loans: In case of a secured loan, the lender feels confident about his/her ability to
recover the amount that is lent. The lender may be more amenable to agreeing on a longer
maturity period and the borrower may also be able to negotiate a larger loan amount. The rate of
interest on any loan is directly proportional to the risk encountered by the lender as a


consequence of extending credit. The underlying collateral helps the borrower procure a loan at a
reasonable rate of interest on account of less risk as perceived by the lender. The rate of interest
on a secured personal loan is fixed, thus eliminating uncertainty with regard to paying interest
and principal.

Unsecured Loans: Unsecured commercial loans are best suited for companies that have been
operational for a long period of time and have built-up quite a reputation for themselves.
Goodwill and repute can go a long way in helping the firm avail a large amount of money, as
loan, for an extended period of time without having to pay exorbitant interest.
Unsecured personal loans or signature loans may be availed for a maximum period of 5 years.
The interest charged on unsecured personal loans is higher than the interest charged on secured
personal loans.

Karan Sharma
EEE, 3rd yr



A basic management strategy is to promote team work, in order to get differently qualified
people together to work towards a single objective. Much is discussed about the term; but very
few people care to learn about its fundamentals, and even fewer are those who bother to employ
this attribute at a personal level and bring individuality to the team, thereby increasing the
comfort levels as well. Here‘s presenting a short piece of information on it:

A team is defined as a group of people who collectively work towards a pre-defined goal
utilizing their own skills, experience and knowledge.

There are various fun team building activities for work which can be undertaken to meet the
above mentioned criteria.

Brightening Up the Workplace Environment: Stimulating posters and art prints on teamwork
should be put up in the office. A "My teammate my friend" notice board should be put up
wherein team members can put up appreciation notes for fellow members who have helped them.

Themed Afternoon Events: A special theme day can be organized like a "Hawaiian day" or
"cowboy day" or a "karaoke lunch" where everybody can dress up casually according to the
theme and mix freely. The team members will get to spend social time with each other thereby
resulting in increased understanding and communication between them.

Celebrating Birthdays: A particular day of the month should be fixed when employee birthdays
that fall in that particular month can be celebrated. It gives the employees, a feeling of
belongingness towards the organization.

Interactive Seminars: At the entry point of the room where a seminar is about to be conducted,
placing sweets, candies, etc. can lighten up the atmosphere. Every team member should be
allowed to present his views on the topic followed by a discussion on the same.

Games: Games work wonders as team building activities for adults as they help create a positive,
fun environment. At the same time, they foster teamwork.

Following team building activities and games have been especially handpicked to make yours a
well integrated team.

Now I know You: This game should ideally be played in a team of 8-10 adults. Ask the team
members to list five things they have done in their life which differentiates them from others.
They can list things like "I have visited 5 foreign countries" or "I can play guitar". Compile this
list and handover copies of it to all the team members without mentioning the names against the
things done. The team members now have to go to each other and ask for the names of the team
members who have done a particular thing. The one who completes the list first with all the
correct names is the winner. This team building activity for work helps the team members in
knowing each other better.


Make a Castle: Employees should be divided in 3-4 teams. The team members should be seated
in a circle and provided with clay. When the leader of the group whistles, they start making a
castle. When he whistles again, the clay is passed on to the next member and he starts from
where the previous member has left. The team which finishes first is declared the winner .This
team building activity for work reinforces that each and every team member's contribution is
important to achieve the goal.

Catch Me if You can: This game can be played with a 5-8 member team. Let the team stand in a
circle. One of the team members stands in between and falls on others without lifting his feet.
The others have to save him from falling without breaking the circle. This team building activity
for workplace helps in building trust among the members. Read team building in the workplace
for more information on similar activities.

Make a Story: This game re-enforces how important communication skills are, to built a team.
Take one comic strip and tear it. Divide its various pages among the team members. The
members have to keep their pages hidden. Ask them to individually guess the correct story by
reading their page. When none of them is able to tell the correct story, let everybody open their
pages. Give the team members time to arrange the pages. The story will now be clear to them.
This team building activity for work shows that team members should communicate openly and
not hide anything. It also teaches that it is very important for a leader to communicate to his
subordinates, how their individual work contributes to the team's goal and how the team's goal
fits into the whole organization's goal.

Design your own Group Activity: Give full freedom to the team to design their own activity.
This is one of the most creative team building activities for work. The team members will
together conceptualize, plan and execute the entire activity. This leads to better communication
and co-operation among the teammates. Someone will automatically assume the role of a leader
and direct the others. This activity helps in identifying team leadership abilities as well.

Team Sports: Matches of popular team sports like basketball, baseball and football can be
organized. This will help in promoting team spirit among the team members. Such outdoor team
building games provide a much needed change from the mundane office routine.

Team building activities for work put team members in challenging positions where survival
without each others' support is next to impossible. They also help in identifying hidden strengths
of the team members which can be utilized for achieving organization goals.

Meghal Jain
St. Thomas, DU Alumnus



Verbal abuse at the workplace can be classified as subtle abuse and overt abuse. Overt verbal
abuse is when the employer insults the other person by shouting, name calling, threatening, using
derogatory language, etc. He/she may pick out mistakes and criticize the individual in front of
the other employees. On the other hand, subtle verbal abuse is when the employer criticizes or
passes sarcastic remarks without yelling or shouting. He/she may give this person a cold
treatment, while being nice and jovial with others. The employer may also try to avoid the
employee, when he/she tries to discuss issues and problems. As these things happen in a private
setting where there are no witnesses, no other person trusts what the abused person is saying and
many times, the individual starts feeling that the problem lies with him / her. This reduces his/her
self esteem to such a level that he/she does not find any option other than leaving the

The causes of verbal abuse in the workplace cannot be linked to any specific reason(s), rather, it
may differ from person to person. Most of the times, employers indulge in abuse because they
believe it to be the best way to make someone work. They think that having a cordial relationship
with their subordinates may make the latter lazy who may then start taking their work lightly.
There are others who abuse people verbally because they think that it is quite normal to do so.
Shouting may be a habitual way of communication in their families and hence they may not
realize the anxiety and discomfort they are causing other people. On the other hand, there are
also employers who abuse their employees verbally because they are unable to control their
emotions and feelings. People who are abused during their childhood can also become verbal
abusers themselves. Verbal abusers at workplace are usually seen as people who have low self
esteem, who insult others just to feel good about themselves. They think that by hurting others,
they are actually gaining control over the other person.

Most of the times, the victim is the only person who is verbally abused by the employer and this
makes him/her unable to voice his/her opinion. However, is important for the employee to take
some efforts to try and stop this behavior of the employer. Usually, employers verbally abuse
their employees because they do not react, out of respect for the position. The abuser sees it as
the employee's weakness and continues his behavior. Here are some ways in which you can try
to deal with the problem of verbal abuse in the workplace.

 If you are verbally abused by your boss, the first thing you have to do is to tell him to
stop this behavior directly. You do not have to yell at the person; rather say in a calm but
firm manner that you are not going to tolerate this behavior any more. Then, you can file
a formal complaint with the HR professional of the company. If your abuser is in a very
high position, most probably the organization will not take any action. However, if the
complaints come from a group of people, it is likely that some kind of action will be
carried out.
 Keeping a journal of what your boss said will also help you in fighting this problem.
Whenever you are verbally abused by your employer, write the timing and all the
possible details of what he/she said. You can write the names of the witnesses present, if


any. Do not forget to hide it well from your colleagues or coworkers and to keep copies
of this journal with you at home.
 Another option will be to record your conversation with your employer in a tape recorder.
Do not make the mistake of hiding it because if you are found out, you will end up in
more trouble. Instead, keep it on the desk and say that you are using the tape recorder so
that if you forget something that he/she said, you will not have to trouble him/her by
asking again. Most likely, your employer will avoid using any abusive remarks or even if
he/she does, it will be recorded.

Priyanka Sharma
ICE, 1st yr



Fortis Healthcare

Leading hospital chain Fortis Healthcare‘s board of directors has given its approval for acquiring
10 of Wockhardt's hospitals at Bengaluru, Mumbai and Kolkata for an undisclosed amount. The
company board approved in-principle, the broad terms and conditions for acquisition of 10
Wockhardt hospitals at Bengaluru, Mumbai and Kolkata with an aggregate bed capacity of 1902,
the company said in a filing to the Bombay Stock Exchange. Fortis has further authorized the top
management to finalize and execute the business transfer agreement with Wockhardt Hospitals.

These hospitals will be acquired on a going concern basis through one of Fortis' wholly owned
subsidiaries, the filing added. According to sources in the know, the deal would be in the range
of Rs 1,000- 1,200 crore and is for 10 of Wockhardt's hospitals -- three in Kolkata, two in
Mumbai and five in Bengaluru. Fortis has 28 hospitals in its kitty with around 3,300 beds and
has set a target of 40 hospitals -- about 7,000-bed capacity -- by 2011.

As the situation appears India is marching in to the healthcare corporate sector not as a huge
market but a business entity as well. It is too soon to call yet but we do expect our very own
domestic players to take the baton abroad and acquire or establish new standards in healthcare.

Reported By: Karan Sharma, EEE, 3rd yr

A Change in Japan

Japan's trade and farm ministers cancelled their planned trip to India for a crucial round of WTO
talks this week after the Liberal Democratic Party-led government was vanquished in Sunday's
general elections. India had invited Japanese Economy, Trade and Industry Minister Toshihiro
Nikai and Agriculture and Forestry and Fisheries Minister Shigeru Ishiba to participate in the
informal ministerial meeting in New Delhi on Thursday and Friday as part of efforts to revitalize
the WTO's stalled Doha Round of global trade liberalization talks. The Japanese government will
now dispatch to the meeting senior ministry officials, including vice trade minister Hiroyuki
Ishige, Kyodo news agency reported. Nikai and Ishiba, who were re-elected on Sunday, will
remain in office until the victorious opposition DPJ forms a new Government, widely expected
to take place in mid-September. "It is not appropriate for me to go (to the meeting) given the
change of government," Ishiba told reporters.

This new development was not foreseen as the LDP had an unbeaten streak in the top house for
over 54 years. A major shift in economic and bilateral cooperation policies is expected later this
year. It is a wait and watch situation for Indian policy makers so that we do not receive another
set back by this cancellation of business between the two nations.

Reported By: Yash Kumar, EEE, 3rd yr


Nokia sues Apple

Finnish giant Nokia, the world's largest cell phone manufacturer, has joined the ranks of people
suing Apple. The suit filed against Apple, the makers of the hugely popular iPhone, is regarding
patent infringement.

According to the suit, which was filed in the US Federal Court, Nokia claims that Apple's iPhone
uses wireless technology, among other things, which is patented by Nokia. It goes on to list
about 10 patent infringements, related to making calls and using Wi-Fi technology on the Apple
iPhone. Nokia has also claimed that 40 other cellphone manufacturers have licensed these
patents from them, something Apple never bothered to do.

In the cellphone world, these cases are a dime a dozen, with companies regularly suing each
other over patent infringement. In most cases, it is resolved by either agreeing to pay the
licensing fees or sharing each other's patents, something that Apple would certainly not like

The root of this legal action may lie in the fact that Nokia, which incidentally has shown a
quarterly loss for the first time this decade - thanks to the iPhone eating up some of its
smartphone market share - this could be a sweet deal. With iPhones being shipped since early
2007, licensing fees could amount to quite a fortune - at least several hundred million dollars, if
not a billion dollars.

Reported by: Karan Sharma, EEE, 3rd yr



Section Editors:
Anubha Kapur, ICE 3 (
Ira Tiwari, ICE 3 (



Introducing a major literary talent, The White Tiger offers a story of coruscating wit, blistering
suspense, and questionable morality, told by the most volatile, captivating, and utterly inimitable
narrator that this millennium has yet seen.

Balram Halwai is a complicated man. Servant. Philosopher. Entrepreneur. Murderer. Over the
course of seven nights, by the scattered light of a preposterous chandelier, Balram tells us the
terrible and transfixing story of how he came to be a success in life -- having nothing but his own
wits to help him along.

Born in the dark heart of India, Balram gets a break when he is hired as a driver for his village's
wealthiest man, two house Pomeranians (Puddles and Cuddles), and the rich man's (very
unlucky) son. From behind the wheel of their Honda City car, Balram's new world is a
revelation. While his peers flip through the pages of Murder Weekly ("Love -- Rape --
Revenge!"), barter for girls, drink liquor (Thunderbolt), and perpetuate the Great Rooster Coop
of Indian society, Balram watches his employers bribe foreign ministers for tax breaks, barter for
girls, drink liquor (single-malt whiskey), and play their own role in the Rooster Coop. Balram
learns how to siphon gas, deal with corrupt mechanics, and refill and resell Johnnie Walker
Black Label bottles (all but one). He also finds a way out of the Coop that no one else inside it
can perceive.

Balram's eyes penetrate India as few outsiders can: the cockroaches and the call centers; the
prostitutes and the worshippers; the ancient and Internet cultures; the water buffalo and, trapped
in so many kinds of cages that escape is (almost) impossible, the white tiger. And with a
charisma as undeniable as it is unexpected, Balram teaches us that religion doesn't create virtue,
and money doesn't solve every problem -- but decency can still be found in a corrupt world, and
you can get what you want out of life if you eavesdrop on the right conversations.

Sold in sixteen countries around the world, The White Tiger recalls The Death of
Vishnu and Bangkok 8 in ambition, scope, and narrative genius, with a mischief and personality
all its own. Amoral, irreverent, deeply endearing, and utterly contemporary, this novel is an
international publishing sensation -- and a startling, provocative debut.

Parul Bhardwaj
ICE 3rd yr


I....for INDIA

India, a country…
Or a mere coordinate?
On the web of meridians…
Just another little dot?
India, a home…
Or a land held hostage?
In the world of corpses…
Just another blood clot?
India, a symbol…
For love, for humanity?
Or a vulnerable host…
For terror, a target taut?
India, my motherland…
Or a mother‘s tragic story?
In the mirror of politics…
Dying slow… is it, or is it not?
India, the golden bird…
That flew higher than any sky?
Or the caged bird, sans wings…
That died in the battle it never fought?
India, my dream…
My love, my idea of life?
Will it wake to the cries of a million innocents…
Or every sacrifice… will be just a passing thought?


Surabhi Goswami
ICE, 2nd yr



While the bells jingle and tingle

And the harmony sets, just remember

What it meant for a lonely child

Taking his steps into a new world!

A world little soft and little prickly,

First smile of a serene teacher,

A small whack on the palm,

For first naughty mistake!

Scribble some undecipherable code

Like an egg for an A

And then thinking That‘s O

Why 9 comes before 10,

When 0 is nothing just an O!

Though stupid it may look

And stupid it be,

I still cherish my childhood memories

For what they mean to me

Just a starting full of laughs?

Or an imprint on my life

Or an easy start to an arduous life

Or some stupid mistake I forgot

Whatever it was, whatever it may be

It just doesn‘t matter


I still cherish for what it was

And what it meant to me!

Rohit Katyal
ECE-1, 4th yr


LIFE IS A JOURNEY- live it to the fullest

Life is a journey right from birth through old age to the grave. The question that always bothers
one is, where am I going? Is there a purpose to life?

No one begins a journey without knowing where he is going. We cannot fulfill our purpose if we
don‘t know the direction we are going to take. Each of us is unique and different. The greatest
mistake anyone can make is to try being like someone else. We need to discover our own
purpose. We need to discover our dream. The dream starts us for the journey. It gives a direction
and hope for the future. Oliver Wendell Holmer noted, ―The great thing in this world is not so
much where we are, but in what direction we are moving.‖

Dare to dream! Pursue your dreams! A dream by itself won‘t do. Your attitude towards life
matters. It is one of the main factors that determine whether or not you will live your dream.
Even if you are intelligent, talented, educated but lack the right attitude, you cannot enjoy life‘s

Dare to have a positive attitude! At the time of your birth, nothing is in your control. But as
you grow, you start making decisions that are accountable for whatever happens in your life.
Towards adulthood, your choices become all your own whether you admit it or not. You alone
are responsible for the choices you make. Attitude too is a choice! A positive attitude helps you
to pursue your dream and really live life to the fullest.

Dare to change! Be open to the opinions of others. Dare to accept your mistakes and correct
them in whichever way you can. As they say, ―the only constant in this world is change‖.

Dare to face fear and doubt- Fear, doubt and guilt are the three biggest factors that tarnish ones
self-image, and in the long run, affect the way we live our life. Dare to accept and change these.
Fear is driven out by faith, doubt by determination and guilt is driven out by forgiveness. The
first step to having a positive attitude is having a positive self- image, and one cannot have that if
any or all of these are present.

Dare to be different! Only a dead fish swims with the current. The live fish swims against it.
Standing up for your values matters.

Any journey is incomplete without a destination. One needs to know where one is heading.

Life is precious. Enjoy living it. It really is a gift from God. There is no greater joy than knowing
you are not alone in the journey of lufe. Enjoy where you are on the way, and enjoy where you
are going.


Happy walking!

Nikhil Bhardwaj
ICE, 3rd yr



A blessing for civilization or a curse in disguise?

“Media transforms the great silence of things into its opposite.”

“Power without responsibility--- the prerogative of the harlot through the ages.”

The above mentioned quotes quite aptly reflect the dual nature of media and its two completely
different dimensions. It brings to us the recent happenings in the world and educates about the
innumerable events going on in our country. But on the flip side it sometimes tends to embellish
details and fabricate the truth of the matter, adding sugar and spice to it and somewhere in the
process the precious facts are lost.

Several thousand years ago, it was Sanjay who through his divine vision narrated the entire
Mahabharat to Dhritrashtra. Today, in the 21st century, CNN and BBC brought gory details of
the Iraq war to the living rooms of millions of people across the globe.

The coronation of Barack Obama was viewed by the entire world just at the touch of a remote
button. The media brought the horrifying news of the blasts in busy areas of Delhi to the people,
forewarning them of the danger that may lie ahead so that they may be careful while in the
markets. It was only media that brought the dark reality of the 26/11 Mumbai blasts into broad
daylight and assisted the police in nabbing a few of the terrorists.

Media has the power to create viewpoints, to steer public opinions, to bring about a revelation in
the country, to drastically revolutionize the thinking and attitude of the people. It can link
cultures and diversities across the globe. It reaches people, touches their lives and affects their
routines. It can influence society in a path—breaking manner.

But the darker side face of media can be very treacherous and lethal.

Media is like a two-edged sword, with both ends razor sharp. If it facilitates, it also restricts. It
can build positive opinions but can create sinister impressions. We need the media‘s support but
we must handle it delicately.

Advertising media, for instance, can many a time create so much hype around a product that it is
shattering when the expectations of the people are not fulfilled and they feel cheated. The
glamour world is portrayed in sparkling light and many youngsters are blindly attracted towards
the glitter and glitz of this illusionary life but when harsh reality dawns upon them, it is too late
to make amends.


The world is for thousands a freak show; the images flicker past and vanish; the impressions
remain flat and unconnected in the soul. Thus they are easily led by the opinions of the media,
are content to let their impressions be shuffled and rearranged and evaluated differently.

The overdose of media has lulled people‘s independent thinking and the power of logic, it has
been numbed and is nebulous. People have become puppets of the media and their decisions are
in accordance with the flow of media.

The sting operations on the corrupt officials have till a certain extent rooted out the muck of
corruption, but the media has also shown irresponsibility by forcefully butting into the private
lives of people, prying and poking to get juicy tit bits of gossip about them, thus ruining their life
and disrupting their public image.

It also projects wrong values which are against the national spirit. A small fight is given
communal colour and is turned into a full scale religious riot. An example of this is the riots of
Godhra where thousands of people lost their lives and their families and homes were shattered.

It is impossible to read the daily newspaper without being diverted from reality. Headlines are
twice the size of the events. In the early hours of the morning one is full of enthusiasm for the
eternal verities—life is worth-living and then out of sinful curiosity we open a newspaper and the
morning is disillusioned and wrecked. When distant and unfamiliar and complex things are
communicated to the great masses of people, the truth suffers a considerable and a radical
distortion. The complex is made over to the simple, the hypothetical and the dogmatic, and the
relative into the absolute.

The job of the press is to encourage debate not to supply the public with external and false

The media on the positive side inculcates the feeling of nationalism and togetherness. When
India wins a medal in the Olympic Games, the television brings a live telecast of the events and
perpetuates the feeling of nationalistic pride. It spreads awareness about the various campaigns
and ads on cancer awareness, safe drinking water polio eradication, the deadly disease of swine
flu, AIDS and its precautions etc.

When a soldier is at the war front, his little transistor keeps him in tandem with the outside
world, stirs up his spirits and brings tears of joy to his eyes on listening to the fact that the entire
country and his fellow citizens are supporting him with their timely help and encouraging him
with their messages.

The media is like a beam of searchlight that moves restlessly about bringing one episode and
then another out of darkness into vision. Men cannot do the work of the world with this light
alone. They cannot govern society by episodes, incidents and eruptions. It is only when they
work in collaboration with the press it will reveal a situation intelligible enough for a popular


decision, thereby securing an illuminating future with better prospects for the denizens of the

Anubha Kapur
ICE, 3rd yr



Beside my solitary hearth of fire,

While the night outside wears eerie attire.

Fond memories overwhelm my desire,

As I gaze into the crystal orb of glittering sapphire.

My eyes begin to droop in delightful laze.

And reminiscent of the long-forgotten days

Begin to slowly appear; vivid in my mind

Recollections of the ancient past; not of me but my


I think alive, I dare to dream;

Before my eyes I wish to see.

Through dances of fire and billows of steam,

The world‘s greatest wonders come to me.

Let me take you to the era of bygone splendour,

Where still exists the magnificence of ornate palaces.

Where imposing, mighty empires once held out a wonder,

Wherein even today mystic legends find solace.

Let the centuries come alive once more,

To listen under the shade of aged trees!


The bugles echoing tales of heroic deeds

And legendary lovers in the days of yore!

Stepping into the heartland against the race of time,

Under the gaze of towering peaks high.

I hear a steeple clock in the distance chime,

As snow-melt rivers swiftly streak by.

Enchanting woods of majestic cedars and scented pines,

Or the tranquil divinity prominent near a shrine!

Sharing the charm of small hamlets or meadows,

Or tracing prints on the cool sand in moonlit shadows!

Beyond the boundless horizon, let me fly,

Leaving behind the shackles of turmoils old;

Where the dazzling sunsets, roll across the skies,

Bales of shimmering red and gold.

Taking with me on my sea of dreams

The whims and fancies possessed by youth!

I tear my gaze from all that merely seems,

And return to the grounds of somber truth!

I know the solemn monotone

Of waters beckoning unto me!


I know from where the breeze has blown

The whispers of the Eternal Sea!

As by the blazing fire I sit,

Fictional fancies before my mind‘s eye flit.

Redundant life presents a sullen obscurity,

I wander alone with neither peace nor security!

Anubha Kapur
ICE, 3rd yr



I wish I could've turned athletic,

But just my luck... I've turned magnetic.

Paper clips fly up to greet me.

Nails, it seems, can't wait to meet me.

I'm sticking to the baby's stroller.

Look at me, I'm so bi-polar.

I make the TV super active.

At least the spoons find me attractive.

The phone's for me. ssup he say.

Why don't you come and join us to play?

I think I'll have to join you later...

I'm stuck on our refrigerator.

I'm trying to get myself de-energized,

But everytime I find myself more energized.

O lord help me out with this,

So that I can smile under your bliss…

Pallav Piyush
3rd yr ,ICE



Draped with darkness the sun withers,

and leaves a question on my face,
only to find me dazed...
The mirror gazing at me
and my eyes at sixes and sevens
unable to meet the eyes of the mirror...

Out of the depths rise the waves of tears,

and the turmoil within me,
lets the tsunami gush forth,
its swerves from its course,
dating, it comes and pierces my heart
and shatters it in fragments of glass...

and when i try to mend it,

and build them in the frame,
gently do they leave an impression
on the soft palms of my hands...

and a touch makes known

the marred life lines a truth
that glass pierces though joined
leaves a thoughtful scar ...

Ruchir Mehta
ICE, 3rd yr



Success, superiority, ascendency... no doubt these are feelings that fill our hearts with happiness
pre-eminently. On the other side of the fence, are the so called calumnious realms like
losing,failure. But a deeper insight into the reality would make us feel splendid about ourselves,
even if it‘s a FAILURE. These are quite a few things we all get to hear from people around us.
So,what for do we read this? Well, grant me 5 minutes of yours and breeze through this. This is
not going to be yet another baseless succor. Instead, a rather practical one.

Dismissed from drama school with a note that she was wasting her time - Lucille Ball. She
happens to be a star having done various sitcoms like I love Lucy and The Lucy Show. She is
believed to have had one of the longest careers, especially on television. The disdainful remark
from her drama school teacher certainly didn‘t shake her.

Turned down by the deck of a recording company, which said guitar music is on the way out -
The Beatles. They were collectively included in Time magazine‘s list of the most important
people of 20th century.

A failed soldier, farmer and real estate agent. Cut from the high school basketball team, he went
home, locked himself in a room and cried - Michael Jordan. National Basketball Association
(NBA) website states, "By acclamation, Michael Jordan is the greatest basketball player of all

Too stupid to learn anything and that he should go to a place where he may win by the virtue and
his pleasant personality - this is what the opinion of the teacher of Thomas Edison was about
him. Edison is considered one of the most prolific inventors in history, holding 1,093.U.S patents
in his name as well as many patents in the United Kingdom, France and Germany.

Walt Disney‘s first cartoon production company went bankrupt. He was fired from a newspaper
telling him that he ‗LACKED IMAGINATION‘ and that his ideas were not original. He moved


on to become a multiple Academy award-winning American film Producer,director,screen-
writer,voice-actor,animator,enterpreneur,entertainer, international icon and philanthropist..

All the people I mentioned of surely wouldn‘t have been able to make it big if they didn‘t have
the determination or the self-belief. It is a mistake to suppose that men succeed through success;
they succeed much more through failures. Precept, study, advice, and example could never have
taught them as well as failure has done.

If you can fail as mightily and continually persist in the face of overwhelming obstacles, then
you too can be as successful as the people on the list-or maybe, even more!

Shivani Ghildiyal
EEE, 3rd yr



A flop item girl choosing her bride-groom and then rearing a child, the friendly neighbor pouring
out his dirty carnal escapades for the sake of money,13 failed ‗foul-mouthed, squabbling‘ ‗no-
bodies‘ or 'celebrities' living with each other---all of this, all in front of national television...

Welcome to the latest fad called 'reality TV' where everything seems to sell
lately...EVERYTHING...semi-naked botoxed babes, illiterate dhaba-wallahs and surprisingly the
lady with 2 kids with an illicit affair.

Without having any moral posturing, let us see what exactly is Reality TV?

Wikipedia (our one stop solution to every problem) describes it as: a genre of television
programming that presents purportedly unscripted dramatic or humorous situations, documents
actual events, and usually features ordinary people instead of professional actors.

Had the TV producers stuck to this ‗innocent‘ description, TV viewing wouldn‘t have been such
an embarrassment with your family as it is today. Utilizing sensationalism to attract viewers to
generate advertising profits, it has taken a filthy form lately. Flip through any channel and
guesses are that you will be bombarded with reality shows of varying shapes, kinds, formats-
celebrity reality, prank reality, makeovers, game show, talent hunt, adventure/fear based
shows...even bride-groom hunt shows(trust Rakhi Sawant to always have the last word)!!
just name it and its there.

But, however seemingly different their concepts might appear to be , all the reality shows, run on
the same path-putting ordinary people or celebrities in real-life situations and allowing viewers
to enjoy the unexplainable rush of watching them!

What clicks with the audience most about these shows are the shock effects , the concept of
reality and Out-of the box ideas that made them stand out from the run-of-the-mill shows. These
shows are high on drama-filled with teary-eyed and foul-mouthed participants who are so high
on adrenaline that they fight at the drop of a hat. Since in celebrity based shows the participants
are mostly unsuccessful actors they make the most of their stay on the show, with the females
dropping their clothes at the drop of a hat and males talking like they are on a movie set.

Several contest that the term ‗reality TV‘ is not apt for what we view today. The word reality is
defined as "the quality or state of being actual or true, or a real thing or fact.‖ Combine the two
and you get a definition something like, "actual, true, or real things on the television.‖.What we
view is far from that. But coining of a term appropriate to what is shown is far from our
problems. The basic problem with reality TV is that these shows are becoming more and more


provocative and outrageous. As eminent film-maker Mahesh Bhatt says, ―Today, washing one‘s
dirty linen on prime time is big business. We live in shameless times. People do not mind
becoming guinea pigs in the name of reality to amuse the nation and make a quick buck. And the
audience gets a high on its daily dose of ‗reality‘ about the private lives of people like

Concluding, the only reality of this whole sad situation is that networks, advertisers, and showbiz
folks keep getting richer, while the nation is being fed on the daily fodder of voyeurism,
negativity and unabashed exposure all in name of titillating ―reality‖.

Niharika Joshi
EEE, 3rd yr



Section Editors:
Aneesh Jain, CSE 3 (
Raghav Goyal, ECE 2 (



3 digit fuel efficiency anyone?

During the summer and fall of 2008, when gas prices rose to more than $4 per gallon and some
regions experienced fuel shortages, things started to change dramatically in the auto industry.
There's no doubt that the steady rise in fuel costs scarred our automotive psyches. Couple that
with a deepening recession and that was enough to cause many drivers to hold back on a new car

As new car buyers seemed to vanish and as drivers began spending less on gasoline, auto
executives appeared to be scrambling for a better image. Some are now touting plug-in hybrid
cars as the next step in fuel-efficient technology.

Have you pulled your car up to the gas pump lately and been shocked by the high price of
gasoline? As the pump clicked past $20, $30, $40 or even $50, maybe you thought about trading
in your car for something that gets better mileage. Or maybe you're worried that your car is
contributing to the greenhouse effect.

The auto industry has the technology to address these concerns. It's the hybrid car. There are a lot
of hybrid models on the market these days, and most automobile manufacturers have announced
plans to manufacture their own versions.

While people are currently impressed by hybrid models that average more than 40 or 50 miles
per gallon (17 or 21.3 kilometers per liter), plug-in hybrids may soon be able to offer drivers
triple-digit fuel economy.

The Toyota Prius is already one of the most popular and recognizable hybrid cars on the market.
In early 2009, the company reached its first major milestone, claiming to have sold its one-
millionth hybrid in the United States, and sales of the third-generation Prius looked to be a
positive note among dismal global car sales.

So many Prius enthusiasts were excited to learn that Toyota planned to introduce a plug-in
version of the ubiquitous hybrid. Toyota hasn't released much information about the Prius plug-
in hybrid just yet, but we do know it will be modeled after the recent third generation Prius and
feature a lithium-ion battery pack. And it may be a while before we see a mass-produced version
of the car, too -- by the end of 2009, Toyota will have leased 200 of the initial versions of the
plug-in hybrid to fleet customers in Japan, 150 vehicles in the United States and an undisclosed
amount in Europe.

Looking for ways to further improve fuel-economy, manufacturers are exploring enhancements
to the basic hybrid concept. One promising avenue is the plug-in hybrid car. In simplest terms,
plug-in hybrid cars incorporate traditional hybrid technology but benefit additionally from plug-
in charging.


Expanding further on plug-in hybrid technology are two vehicles still in the concept stage. The
Chevrolet Volt, which was introduced at the 2007 Detroit Auto Show, and the Ford Edge with
HySeries Drive, also introduced in 2007, combine elements of plug-in charging with other
potentially fuel-conserving technologies.

Many hybrid vehicles conserve additional fuel by incorporating a shut-off system that shuts
down the engine during stops. In these cars and trucks the electric motor alone may propel the
vehicle for short distances.

Hybrids are the fuel-efficient autos that combine electric motors with internal combustion
engines are have been getting a lot of buzz in the U.S. lately, especially with gasoline prices of
US$4.00 to $5.00 per gallon. There are waiting lists for the most popular hybrids, such as the
Toyota Prius, and automakers are scrambling to introduce dozens of new models. Moreover,
history suggests that these market-share gains are not dependent on high gasoline prices and that
the market share of the next generation of hybrids the plug-in hybrid should grow even more

Automotive history also suggests that the next iteration of hybrid technology that is the plug-in
hybrid may be poised to make even larger market-share inroads. Although plug-ins are not yet
commercially available, prototypes have been tested extensively. Automakers, including GM and
Toyota, are pouring billions into their development, and some models, such as the Chevrolet
Volt, are set to debut in 2010. These vehicles feature rechargeable lithium-ion batteries that can
be recharged from a conventional electric outlet and can store more energy than the nickel-
hydride variety used in the current generation of hybrids. In plug-in hybrids, the electric motor is
the primary source of power, and a small internal combustion engine serves as an auxiliary
power source. The biggest limitation on plug-in technology currently is the cost of the lithium-
ion batteries.

But as battery prices come down, plug-ins could capitalize on the trail blazed by the current
generation of hybrids, which has helped consumers grow more comfortable with nontraditional
engine types. Across industries and product lines, consumers characteristically respond more
aggressively to improvements made to a successful innovation than to the initial innovation.
It is not difficult to imagine a similar interaction between the hybrid and the plug-in hybrid. With
all the positive attributes of the conventional hybrid, as well as significantly better fuel economy,
the plug-in could very well be the midsized SUV of the next decade. If that happens, the plug-in
will certainly need a new S-curve of its own, and both auto manufacturers and dealers should be
prepared for a faster-than-expected increase in demand. In the meantime, however, we can place
confidence in the S-curve prediction that the conventional hybrid, regardless of the future path of
gas prices, is here to stay.

Raghav Goyal
ECE, 2nd yr



1. Insert an Image Inline in Gmail

To add an inline image to an email you are composing in Gmail:
 Make sure rich text editing is turned on in the Gmail message you are composing
and Insert images is enabled.
 If you see a Rich formatting » link above your message's text editor, click it.
 See below for turning on image insertion.
 Position the text cursor where you want the image to appear.
 Click the Insert Image button in the message's formatting toolbar.

To upload an image from your computer:

 Make sure My Computer is selected.

 Click Choose File and open the desired graphic.
 You can click Choose File again to add another image while others are already uploading
in the background.
 Make sure the desired image is highlighted.

To use an image located on the web:

 Make sure Web address (URL) is selected.

 Enter the image's URL under Image URL.
 Click Add Image.
Images you have uploaded from your computer remain available in the Insert Image dialog while
you compose the message (but not for other emails).
After insertion, you can resize and move images easily.

Enable Image Insertion in Gmail

To turn on Gmail's Insert Image button:
 Follow the Settings link in Gmail.
 Go to the Labs tab.
 Make sure Enable is selected for Inserting images.
 Click Save Changes.

Insert an Image Inline in Gmail without Insert images Enabled

To insert an image found on the web fast in any Gmail message:
 Make sure the image is located at a web server.
 That means you can open the image in your browser and have an address line that starts
with "http".
 You can upload the image to your web host or use a graphic you found on the web
(which you can use without violating any terms).
 If you don't have a web site, turn to a free image hosting service instead.


 If the image is larger than some 640x640 pixels, considershrinking it to more handy
proportions before you put it online.
 Locate the image on the web site or open it directly in your browser.
 If the image appears on a page together with other items:
 Click on the image with the right mouse button.
 Select View Image from the menu.
 Hit Ctrl-A (Windows, Linux) or Command-A to highlight the image.
 Hit Ctrl-C (Windows, Linux) or Command-C.
 Make sure rich text editing is turned on in the Gmail message you are composing.
 If you can see a Rich formatting » link above the editing area, click it.
 Position the cursor in the Gmail message where you want the image to appear.
 Hit Ctrl-V (Windows, Linux) or Command-V.
 If you use an image uploaded to a free image hosting service:
 Click on the image.
 Now click the Link button in the rich-text formatting toolbar.
 Copy and paste the image's page address at the free image hosting service under To what
URL should this link go?. If you uploaded the image to ImageShack, for example, you
could link to "".
 Click OK.
 Continue composing the message.
If inserting an inline image does not work in your browser, try in Mozilla Firefox.

2. Block a Sender in Gmail

With a simple filter, Gmail can send all incoming mail from your favorite forwarders to the
Trash folder as it arrives. As an alternative, you can archive these messages and equip them with
a label for later review.
To have Gmail send messages from a specific sender to the Trash automatically:
 Follow the Create a filter link (at the top of any Gmail mailbox, near the search buttons).
 Type the desired email address under From:.
o You can block an entire domain by entering just that. To block all mail from both and, type "".
o To block more than one address, separate them with "|" (not including the
quotation marks). You can block both and by typing "|", for
 Click Next Step ».
 Make sure Delete it is checked under Choose action.
 Click Create Filter.
o Check Also apply filter to __ conversations below to delete previously received
 To archive and label instead of delete messages, choose Skip the Inbox (Archive
it) and Apply the label: under Choose action when setting up the filter.


3. Sending and Receiving Larger Files with Gmail

Message and Attachment Size Limits in Gmail

Gmail processes messages up to 25 MB in size. This limit is applied to the sum of the message's
text and the encoded attachment.
Typically, encoding makes the size of the file grow slightly.
Messages exceeding the limit sent to your Gmail account will bounce back to the sender.
Messages larger than 25 MB that you try to send from Gmail will yield an error.
Sending and Receiving Larger Files with Gmail
The most straight forward way to work around the message size limit in Gmail is to:
 Put the file you want to send on a web server.
o You can password-protect the file to prevent public access.
o There are many options for getting web space for free.
 Mail a link to the file from Gmail.
 The additional benefit you get for this slight inconvenience is that you avoid irritating
or annoying people with huge attachments. Sure, downloading the file from the web
server will take just as long, but the recipient can decide when to do and when to stop it
with the pleasing feeling of being in control.
 Alternatively, you can split the file in smaller chunks (which I do not recommend) or
try a file sending service.

4. Using filters

Gmail's filters allow you to manage the flow of incoming messages. Using filters, you can
automatically label, archive, delete, star, or forward your mail, even keep it out of Spam -- all
based on a combination of keywords, sender, recipients, and more.
To create a filter:
1. Click Create a filter (next to the Search the Web button at the top of any Gmail page).
2. Enter your filter criteria in the appropriate field(s).
3. Click Test Search to see which messages currently in Gmail match your filter terms.
You can update your criteria and run another test search, or click Next Step.
4. Select one or more actions from the list. These actions will be applied to messages
matching your filter criteria in the order in which the actions are listed -- for example,
you could choose to Forward matching messages to a specific email address,
then Delete the messages.
5. If you'd like to apply this filter to messages already in Gmail, select the Also apply filter
to x conversations below checkbox.
6. Click Create Filter.
To create a filter from within a message:
1. Click the drop-down menu next to Reply.
2. Select Filter messages like this.
3. Enter your filter criteria in the appropriate field(s).
To edit or delete existing filters:
1. Click Settings (at the top-right of any Gmail page).
2. Click Filters.


3. Find the filter you'd like to change and click its edit link, or click delete to remove the
4. If you're editing the filter, enter the updated criteria for the filter in the appropriate fields,
and click Next Step.
5. Update any actions and click Update Filter.

5. Create Labels As and When You Need Them in Gmail

Labels you apply to messages are the flexible Gmail equivalent to folders you put messages
To create new labels in Gmail just as you need them:
 Click the Labels drop-down menu with the message or messages you want to label
checked or open.
 Select Create new.
 Type the desired label name under Please enter a new label name:.
 Click OK.

6. Clean Up the Gmail Inbox Screen

Many an email program or service has a preview pane. The preview shows a bit of the message's
body — just enough so you have to scroll, and then scroll again, and again.
Gmail has no preview pane, but it has what it dubs "snippets". The snippets show a few words
from the message's body — just enough so you're confused and the inbox screen is filled with
meaningless text; or just enough so you can get an better idea what the message is about than
from just the subject and sender alone.
If you prefer your Gmail inbox cleaner, you can avoid the snippets easily, and maybe get rid of
the indicators telling you whether messages have been sent to you only or to a group, too.
To rid the Gmail inbox of distracting personal level indicators and text snippets:
 Follow the Settings link in Gmail.
 Go to the General category.
 To disable personal level indicators (› indicating mail with your email address in the To:
or Cc: line and » signifying messages that were sent to you only):
 Make sure No indicators is selected under Personal level indicators:.
 To prevent Gmail from showing emails' first few words as snippets after the Subject on
the inbox screen:
 Make sure No snippets is chosen under Snippets:.
 Click Save Changes.

7. Create a Google Calendar Event from a Message in Gmail

It Takes Just a Few Clicks

"Sure," I thought. The weather was splendid. The bikes were ready. Only I had mistaken the next
weekend for the weekend after the next weekend. (Then, the weather was fine, the bikes ready
and everything wonderful.)


I really should have added the event to my Google Calendar— or any calendar. But adding it to
Google Calendar is easiest from Gmail. All it takes are a few clicks. Gmail will even, at least
usually, extract the correct time and location so data entry mishaps are less likely (on your end).
To use the information in an email to create a Google Calendar event right from Gmail with all
the essential data pre-filled:
 Open the email that contains the event information.
 Follow the Add to calendar link in the right column, next to the message's text.
 If you do not see an Add to calendar link, Gmail has not recognized anything to schedule.
You can still, on your own, turn the email into an event. See below.
 Enter any missing details and guests.
 Click Save Changes.
 If you have added new guests' email addresses, decide whether you want to invite them
by email.
 Close the event window.
To add an event from an email in which Gmail did not find event info to use automatically:
 Open the message.
 Click the More actions... drop-down menu.
 Select Create Event.
 Enter event details manually.
 Click Save Changes.
 Close the event window.

8. Define Your Own Gmail Keyboard Shortcuts

To change the default Gmail keyboard shortcuts to more handy keys:
 Follow the Settings link in Gmail.
 Go to the Labs category.
 Make sure Enable is selected under Custom keyboard shortcuts.
 Click Save Changes.
 Follow the Settings link again.
 This time, go to the Keyboard Shortcuts section.
 Edit all desired keyboard shortcuts.
Use '\' together with the corresponding decimal ASCII code to use non-printable characters. "\27"
stands for ESC, for example, and "\127" for DEL (you cannot, alas, use the latter for the text
input field only accepts three characters).
Click Save Changes.

9. Delete Your Gmail Account

So you have one Gmail account too many?

No; you don't have to tell me any reasons. I won't ask.
Gmail will ask you to click numerous times and for your password, too. It will not ask for
reasons, though, when you cancel your email account.
To cancel a Gmail account and delete the associated Gmail address:
 Go to Google Account Settings.


 Follow the Edit link next to My products.
 Click Delete Gmail Service under Delete a Service.
 You can also choose Close account and delete all services and info associated
with it to remove your entire Google account (including your search history,
Google Docs, iGoogle page, AdWords and AdSense as well as other Google
Make sure Yes, I want to permanently delete and remove
from my Google account. is checked.
Enter an alternative email address under New email address.
 Gmail will already have entered the secondary address you used when creating
the Gmail account.
 The alternative email address becomes your new Google account user name.
 Make sure you enter an email address to which you have access. You need that
access to complete deleting your Gmail account.
Enter your Gmail password under Current password.
Click Remove Gmail.
Open the "Gmail Removal Confirmation" email from "" at
the email address you specified as your new.
Follow the deletion link in it.
Type your Gmail password under Password:.
Click Verify.
 Keep in mind that you cannot undo this step.
People who mail your old Gmail address will get back a delivery failure message. Make sure you
announce a new or alternate old address where desired.

10. Find All Mail Exchanged with a Contact in Gmail

Looking for a message in Gmail? Use the search field!
If you want to know what mail you exchanged recently with a certain contact there is a
comfortable alternative to typing the person's email address in the Gmail search field, however.
To find messages sent to and received from a person in Gmail:
 Select Contacts from the left column menu in Gmail.
 Click the desired person.
 If you do not exchange messages frequently with the contact, you may have to click All
Contacts first.
 Under Recent Conversations, find mail exchanged with the contact.

But what if you want to move or copy your precious collection of correspondents — to another
Gmail account, for example, or to a desktop email program such as Outlook, Mozilla
Thunderbird or Eudora? Fortunately, exporting contacts from Gmail is just as easy as
accumulating them.

11. Export Your Gmail Contacts

Gmail makes it easy to maintain an address book. Everybody with whom you communicate is
automatically added to your Contacts. Of course, additional data can be entered as well.


To export your full Gmail address book:
 Select Contacts from the left Gmail navigation bar.
 Now click Export at the bottom or in the contacts' toolbar (using Gmail's older version).
 For a maximum of compatibility, select Outlook CSV.
 Both Outlook CSV and Gmail CSV export all data. The Gmail format
uses Unicode to preserve international characters under all circumstances, but
some email programs — including Outlook — do not support that. Outlook CSV
converts names to your default character encoding.
Click Export or Export Contacts.
Download the "gmail-to-outlook.csv" or "gmail.csv" file to your Desktop.

12. Add an Invitation to an Email in Gmail

After you have discussed attending that exciting match, artful performance or interactive meeting
in detail with your friends, family or colleagues, are you ready to finalize, substantiate and
materialize your plans?
Would You Rather Do It in 3 Steps or in 1?
Usually, that involves opening your calendar, creating an event, and finally, manually, inviting
other attendees to make sure everybody has all the correct details. If you use Gmail and Google
Calendar, all these actions meet happily in one task: send an email.
In Gmail, you can add to any message or reply you send an invitation. If the event does not yet
exist in your Google Calendar, it will be set up automatically, too.
To make an email or reply you compose in Gmail contain an invitation:
 Start composing a new message or reply in Gmail.
 Click Add event info.
 Type the event title under Event:.
 Specify a location (optional) under Where:.
 Set the event's time and duration under When:.
 Continue composing and eventually send your message.

Add More Invitees or Details

The event specified by Add event info will automatically be added to your Google Calendar, and
all recipients of the message receive an invitation to attend it. To add more invitees or make the
event repeat, for example, click more event options ».
If you open the more event options » window, make sure you do send email invitations from
there (Google Calendar will ask you to when you save the event), because in this case, Gmail
will not.

Amar K



My goal of writing this article is to give my readers some insight into which web browser to
choose from the plethora of options available. I would be reviewing the three main web browsers
presently, which I am using namely Google Chrome, Mozilla Firefox and Internet Explorer.

What is a Web Browser?

Most of you must be well acquainted with this web jargon. But for those few novices who are
unaware of it, a web browser is a software application for retrieving, presenting, and traversing
information resources on the World Wide Web. Any information resource is identified by
a Uniform Resource Identifier (URI) and may be a web page, image, video, or other piece of
content. Hyperlinks present in resources enable users to easily navigate their browsers to related

The primary purpose of a web browser is to bring information resources to the user.

The world‘s first web browser was WorldWideWeb and was introduced on February 26, 1991,
by British scientist Sir Tim Berners Lee. WorldWideWeb (WWW) was the first program which
used not only the common File Transfer Protocol (FTP) but also the Hypertext Transfer Protocol
(HTTP), invented by Berners-Lee in 1989. At the time it was written, WorldWideWeb was the
only way to view the Web. It was later renamed Nexus to avoid confusion with the World Wide
Web (WWW).

To inform you about the different web browsers available, I would like to give you the list of
main the web browsers for the last 3 years.

Internet Users
Year Web Browser
(in millions)

Maxthon 2.0, Netscape Navigator 9, NetSurf 1.0, Flock 1.0, Safari

2007 1262
3.0, Conkeror

Konqueror 4, Safari 3.1, Opera 9.5[13], Firefox 3, Amaya

2008 1565
10.0[5], Flock 2, Google Chrome 1, Amaya 11.0[5]

2009 Internet Explorer 8, Chrome 2, Safari 4, Firefox 3.5 In Process


As I have already mentioned, my aim is to comprehensively review and compare three main web
browsers currently having the lion‘s share of the market, hence I start off with it.

Contender #1: Google Chrome 3


First launched on: September 2, 2008

Present version: Google Chrome 3 (BETA) on 7 August, 2009

The good:
 Reliability. Chrome's multiprocessing architecture makes a bad Web page less likely to
take down the whole browser.
 Speed. Chrome loads fast and keeps your surfing super-fast.
 Simplicity. Its clean design wastes no screen space.
 Searching. The Omnibox lets you type search terms or URLs into a single spot and
figures out what you want.
 Privacy. Chrome offers an "Incognito" mode that lets you easily leave no footprints from
where you've been.


 Very Pretty: The new Google Chrome beta is also prettier. The themes now have been
fully incorporated. And the new beta also improves the New Tab and Omnibox features.
 Security: Chrome is one of the most secure web browsers. In fact, Chrome was also the
only browser that wasn't cracked in seconds or minutes in the recent PWN2OWN hacker
competition. In fact, Chrome never was busted.
The bad:
We‘re still waiting for a more comprehensive plug-in support and the confirmed extensions
system that will allow third-parties to create add-ons taking built-in capabilities to new levels of
functionality. Google should take care of all this while smoothing out rough edges if the business
world is to accept Chrome as its default corporate browser.
It is compatible with Windows only and hence doesn‘t work on Linux and Mac. Therefore, the
users of Linux and Mac cannot use Chrome.
All in all, Chrome 3 Beta looks like a sound release adding some a sought-after features to
what‘s already a solid browser base. If Google manages to bake in more new stuff into a final
Chrome 3 release, the Chrome browser might become a dangerous rival to Apple‘s Safari and a
noteworthy alternative to Mozilla‘s Firefox.

Contender #2: Firefox 3.5

Status: FireFox 3.5.2 launched around June 2009
The good:
 Strong foundation. Mozilla has already built a loyal following with Firefox, and it
doesn't intend on letting that go. With Firefox 3.5, you know you'll have a powerful
library of add-ons and support already at your fingertips, not to mention the slew of other
assets unveiled in previous versions of Firefox .
 Speed. The organization believes the public is ready to experience the fastest browser it's
produced yet with the launch of Firefox 3.5,
 Competitive edge. Mozilla's developers have good reason to watch what Chrome is
doing -- and work to match it, if not one-up it.
The bad:
 Security questions. Some studies -- albeit, Microsoft-funded ones -- have suggested
Firefox, with its frequent new versions, is more susceptible to threats than the other
 Crash potential. Unlike Chrome, Firefox does not have separate environments for each
tab -- so one rogue page can still take the whole program down.
 Support. Firefox has worked hard to snag a small portion of the browser market share,
and most early predictions show Chrome taking away more of its user base than IE's.
 Google's focus on Chrome will also take away some of its previous focus on Mozilla's
development efforts. Will Firefox be able to remain a key player in the browser war?

Contender #3: Internet Explorer 8

The status: IE8 launched on 20 March 2009
The good:
 Support. Love it or hate it, Internet Explorer is hanging on to about three-quarters of the
browsing market with its default status in all Windows machines. You know developers
and designers are going to cater to it.


 Security. With Microsoft at its helm, IE hangs on to a reputation of safe and reliable
 Privacy. IE 8 was the first to offer a no-record browsing mode, branded here as InPrivate
 Searching. IE 8's Smart Address Bar offers similar functionality to Chrome's Omnibox,
letting you type in URLs or search terms and taking you to the right place.
 Added add-ons. IE 8 finally catches up to Firefox with a new "Gallery" full of third-
party add-on options.
The bad:
 Speed. Independent tests have found IE 8 to be significantly slower than the alternative
 Resources. IE 8 uses a lot of memory compared to its competitors -- a factor that could
considerably slow down the rest of your system.
 Crash potential. While IE 8 does use separate processes for tabs, similar to Chrome's
approach, it does not do so to the same degree
 Competition questions. Can IE's add-ons reach the level of Firefox's? Already, some
users are complaining of problems regarding even getting them to work.

So, while Chrome is faster and more secure and IE 8 is vastly improved over IE 7 and 6, the
bottom line is that Firefox gives me a better over-all Web experience. Those looking for
lightning speed go for Chrome since it is very fast. As far as security is concerned Chrome is
best in the business. So Chrome is also a viable alternative to Firefox. And, when you're like me
and you need to find information quickly on the Web all day long, that's no small thing.

Shashank Malhotra
CSE, 3rd yr



A doodle is a type of sketch, an unfocused drawing made while a person's attention is otherwise
occupied. Doodles are simple drawings that can have concrete representational meaning or may
just be abstract shapes. Stereotypical examples of doodling are found in school (or college)
notebooks, often in the margins, drawn while losing interest during class. Another common
example of doodling is during long phone conversations if a pen and paper are available.

Popular kinds of doodle include grotesque faces of teachers or companions, invented fictional
beings, political leaders, geometric shapes and animations made by drawing scenes in a sequence
on various pages of a notebook. In the movie Mr. Deeds Goes to Town, Mr. Deeds mentions that
"doodle" was a word made up to describe scribblings to help a person think.

The search giant Google is always known for its innovative approach to change the way we use
internet. Google has had several logos since its renaming from "Backrub". The current
official Google logo was designed by Ruth Kedar. The company also includes various
modifications and humorous features, such as cartoon modifications, of their logo for use
on birthdays of famous people, and major events, such as the Olympics. These special logos,
some designed by Dennis Hwang, have become known as “The Google Doodles”.

The first Google Doodle was a reference to the Burning Man Festival of 1998. The doodle was
designed by Larry Page and Sergey Brin to notify users of their absence in case the servers
crashed. Since then Google has always had a lot of innovative logos on their main page to
celebrate scientists, artists, special dates and events, a tradition started by Googler Dennis
Hwang. These „Google Doodles‟ have been extremely popular, and the search giant has
previously launched competitions across the world for the same. The competition originated in
the United Kingdom, and now also exists in the United States. The competition was also held
in Ireland in 2008. Now, students in India are being given the chance to have their doodle put up
proudly on the Google India page on November 14, Children‟s Day, with the „Doodle 4 Google‟

Google explains at its official site (www. “The theme of this
competition is 'My India'. We'd love to see what your country means to you when represented in
a doodle. Whether it‟s music or dance, Indian art, Mahatma Gandhi, the Taj Mahal, cricket,
scientific achievements or the Indian people as a community- we‟re interested in seeing these
representations of what India means to you and how you represent it using images.”

The participants will have to provide a title for their doodle (a maximum of 5-6 words) and a
supporting statement (a maximum of 100 words) to explain what India means to them and what
they have represented in the doodle.


The best doodles will be voted by a panel of judges as well as by the Indian public, and the
winning doodle will be featured on the Google India homepage for a day, to be viewed by
millions of people. Further details about the competition can be found at the official site, with
separate sections for students, for teachers wanting to encourage the idea in their school,
for registration, and a basic set of guidelines and templates in the Doodle Resource centre.

Here are some of the most popular Google doodles:

Happy St. Patrick's Day!

Doodle designed by Doodle 4 Google Ireland winner Evan O'Sullivan Glynn - March 17, 2009

Google‟s old logo for the Burning Man festival and the holidays...

Leonardo da Vinci's Birthday - April 15, 2005


Happy Valentine's Day - February 14, 2009

Google's 10th Birthday - September 27, 2008

2008 Summer Games in Beijing - August 8, 2008

Alexander Graham Bell's Birthday - March 3, 2008


Rabindranath Tagore's birthday

Albert Einstein‟s Birthday

Thanksgiving Day - November 27, 2008

B. Abhishek
CSE, 3rd year



Did Microsoft kick the pod where it counts or is the mighty whitey still the king of the ring?
Each player is loaded with features, flashy video capabilities and music storage galore. Both the
players stand out where they count but which one is better is still the debate. Let‟s look into both
the players and find out what makes them unique.

The iPod is an icon that set the pace for the product race. The Zune is a late comer to the party,
slightly drunk and making boastful promises. Zune's brown and green color scheme is cool but
iPod white is hard to beat and it looks just as good in black. Aesthetically the iPod is relatively
simple yet timeless. Straight lines and rounded edges capped in glossy plastic.

When it comes to size and weight there is hardly a battle to be fought in this arena. The Zune is a
heavyweight struggling to keep up with the tap dancing iPod. Despite weighing only 0.8 ounces
more than the iPod, the chubby Zune is noticeably heavier and bulkier than the iPod.

Counting on the features both players do music and video well. But, in an effort to stick it to
Apple, Microsoft packed an FM radio and Wi-Fi chip into their Zune. The Zune menu screens
and album art are much more pleasing to the eye and the Zune offers customizable wallpaper.
The iPod has a clock, games, contact list, calendar, notepad and stopwatch. An impressive list of
extras but nearly all are available on cell phones and aren't terribly relevant to portable music or
video. Sharing songs between two Zune‟s may be an exercise in Digital Right Management, but
it's a lot more useful on a media player than a stopwatch feature.

The Zune software has been agonizingly slow and annoying. iTunes has proven easier to update,
sync and navigate. The iTunes podcast subscription support is still the easiest way to get your
podcast fix. And strangely iTunes didn't seem to freeze up as much as the Zune software. This
issue seems even more peculiar when running Microsoft's own Windows XP operating system.

The Zune's D-pad may be reminiscent of an 80s model Nintendo controller; but it is quicker and
easier to navigate menus and long lists of music with the clicking D-pad button than rubbing
your thumb raw on the circular touch pad. So Zune takes over iPod in this field quite well. Also
the Zune Marketplace offers less variety and more absurdity with the Microsoft Points system.

Each player has a bright, crisp screen. The iPod's 2.5" screen offers the same 320x240 resolution
as the 3" Zune screen. As such, videos played on the iPod are just a touch sharper. Both players
come with top-notch ear buds and pump out great sounding tunes and no significant difference in
the clarity or quality can be made out from one player to the other.

The sleek, thin shape of the iPod feels natural and lightweight and the brick-like nature of the
Zune is less pleasing to hold despite the nifty textured surface. Having to go from portrait to
landscape mode to view pictures and videos with the Zune is somewhat counter intuitive,
especially when the menu and play/pause buttons get moved around to less ergonomic positions
in the process.


By the final tally it is still in favor of the iPod. But it‟s not too shabby considering this is the first
generation of Microsoft's Zune and the 5th of Apple's iPod. But, in the end, the king of the hill
remains un-toppled.

Swapnil Jindal,
CSE, 3rd year



S C I E N C E – A seven letter word that has revolutionized the face of God‟s earth. Science is
the result of man‟s unquenched thirst for knowledge. God gave him brain, and he used it to
unravel the mysteries of His world.

Just imagine – a day with no electricity. Hard to envisage? Today we cannot spend a minute
without electricity, let alone a whole day! This is what science has done to the world. Electricity
is just a minute example; science has given us almost everything surrounding us; we are
practically living in a scientific world, created over the centuries, by some super brains amongst
us. From wheels to cars, from huts to skyscrapers, from quills to ball pens, from letters to
internet, everything that scientists have developed has metamorphosed the world we live in.
Everyday, there‟s a new technology being developed, a new study being conducted, a new
research being carried on.

One branch of science which has always captivated man‟s attention is Robotics. The general
perception of a robot is some kind of a mechanized man that does mechanical, routine tasks on
command. This is just one example of a robot. In true sense, any machine or mechanical device
that operates automatically with human-like skills is a robot; yes, it means that even a child‟s
“remote waali” car is a robot!

Robots and automated machines have always fascinated me; especially when they are used in
conjunction with the human body. Rehabilitation Robotics is one such field where the focus is on
usage of robots to help people recover from physical trauma; people suffering from stroke are
exclusively benefitted. This special branch of robotics is just a beginning to make serious inroads
in the world of physical therapy. The field of rehabilitation robotics is an obvious direction for
robotics to take, as machines have become more affordable, and their ability to autonomously aid
human beings has increased.

Work in the field of rehab robotics was initiated in the 1970‟s, and now it has developed to a
point where the first commercially successful products are available. The 30 year gap is because
of many factors – complex technology, uncertainty of purchase funding and limited return on
investment to name a few.

In his paper, IEEE Transactions on Rehabilitation Engineering, Bolmsjö G, Neveryd H, Eftring

H, writes, “Rehabilitation is an activity which aims to enable a disabled person to reach an
optimum mental, physical, and/or social functional level. Thus, rehabilitation robotics deal with
advancing robotics’ technology to provide physically disabled people with tools to improve their
quality of life and productivity of work [Man-Machine Interaction].”

When compared to industrial robots, rehab robots are slower, and more compliant to facilitate
safe usage. The use of robots here is quite different from industrial applications, where robots
normally operate in a structured environment with predefined tasks, separated from human


operators. Furthermore, industrial robots are operated with specially trained personnel with a
certain interest in the technology. This may not be the case in rehabilitation robotics. Thus,
rehabilitation robotics have more in common with service robotics, which integrate humans and
robots in the same task, requiring certain safety aspects, and special attention to man-machine
interfaces. Therefore, more attention must be paid to the user‟s requirements, as the user is a part
of the process in the execution of various tasks. In rehabilitation robotics, the usefulness of
robotic devices is largely dependent on the degree of independence which they provide to their

Rehabilitation Robotics is a revolution in itself; combining medical science with engineering like
never before. This is the growth of science; it has made machines that can help a man battle his
physical disability, that too in less amount of time with more accurate results.

Nidhi Gurnani
ICE, 4th yr



In a Swiss laboratory, a group of ten robots is competing for food. Prowling around a small
arena, the machines are part of an innovative study looking at the evolution of communication,
from engineers Sara Mitri and Dario Floreano and evolutionary biologist Laurent Keller.

They programmed robots with the task of finding a "food source" indicated by a light-coloured
ring at one end of the arena, which they could "see" at close range with downward-facing
sensors. The other end of the arena, labelled with a darker ring was "poisoned". The bots get
points based on how much time they spend near food or poison, which indicates how successful
they are at their artificial lives.

They can also talk to one another. Each can produce a blue light that others can detect with
cameras and that can give away the position of the food because of the flashing robots
congregating nearby. In short, the blue light carries information, and after a few generations, the
robots quickly evolved the ability to conceal that information and deceive one another.

Their evolution was made possible because each one was powered by an artificial neural network
controlled by a binary "genome". The network consisted of 11 neurons that were connected to
the robot's sensors and 3 that controlled its two tracks and its blue light. The neurons were linked
via 33 connections - synapses - and the strength of these connections was each controlled by a
single 8-bit gene. In total, each robot's 264-bit genome determines how it reacts to information
gleaned from its senses.

In the experiment, each round consisted of 100 groups of 10 robots, each competing for food in a
separate arena. The 200 robots with the highest scores - the fittest of the population - "survived"
to the next round. Their 33 genes were randomly mutated (with a 1 in 100 chance that any bit
with change) and the robots were "mated" with each other to shuffle their genomes. The result
was a new generation of robots, whose behaviour was inherited from the most successful
representatives of the previous cohort.

In their initial experiments, the robots produced blue light at random. Even so, as the robots
became better at finding food, the light became more and more informative and the bots became
increasingly drawn to it after just 9 generations.

But as it is for real animals, it's not always in the robots' best interests to communicate the
location of food. The red ring only has space for 8 robots, so not if every bot turned up, they had
to physically shove each other for feeding rights. The effects of this competition became clear
when Mitri, Floreano and Keller allowed the emission of blue light to evolve along with the rest
of the robots' behaviour.

As before, they shone randomly at first and as they started to crowd round the food, their lights
increasingly gave away its presence. And with that, the robots became more secretive. By the
50th generation, they became much less likely to shine near the food than elsewhere in the arena,
and the light became a much poorer source of information that was much less attractive to the


Nonetheless, the light never became completely useless. As the bots became more savvy in their
illuminations and relied less and less on the lights, individuals that actually did shine near food
pay a far shallower price for it. Because of that, the evolutionary pressure to keep others in the
dark was lower and the information provided by the lights was never truly suppressed.

This also meant that the robots were incredibly varied in their behaviour. With the yoke of
natural selection relaxed, processes like genetic drift - where genes pick up changes randomly -
were free to produce more genetic diversity and more varied behaviour. After around 500
generations of evolution, around 60% of the robots never emitted light near food, but around
10% of them did so most of the time. Some robots were slightly attracted to the blue light, but a
third were strongly drawn to it and another third were actually repulsed.

Mitri, Floreano and Keller think that similar processes are at work in nature. When animals
move, forage or generally go about their lives, they provide inadvertent cues that can signal
information to other individuals. If that creates a conflict of interest, natural selection will favour
individuals that can suppress or tweak that information, be it through stealth, camouflage,
jamming or flat-out lies. As in the robot experiment, these processes could help to explain the
huge variety of deceptive strategies in the natural world.

Raghav Goyal
ECE, 2nd yr



For a long time, batteries were bulky and heavy. Now, a new cutting-edge battery is
revolutionizing the field. It is thinner than a millimeter, lighter than a gram, and can be produced
cost-effectively through a printing process. In the past, it was necessary to race to the bank for
every money transfer and every bank statement. Today, bank transactions can be easily carried
out at home. Now where is that piece of paper again with the TAN numbers? In the future you
can spare yourself the search for the number. Simply touch your EC card and a small integrated
display shows the TAN number to be used. Just type in the number and off you go. This is made
possible by a printable battery that can be produced cost-effectively on a large scale. It was
developed by a research team led by Prof. Dr. Reinhard Baumann of the Fraunhofer Research
Institution for Electronic Nano Systems, ENAS, in Chemnitz, Germany together with colleagues
from TU Chemnitz, Germany and Menippos GmbH. "Our goal is to be able to mass produce the
batteries at a price of single digit cent range each," states Dr. Andreas Willert, group manager at

The characteristics of the battery differ significantly from those of conventional batteries. The
printable version weighs less than one gram on the scales, is not even one millimeter thick and
can therefore be integrated into bank cards, for example. The battery contains no mercury and is
in this respect environmentally friendly. Its voltage is 1.5 V, which lies within the normal range.
By placing several batteries in a row, voltages of 3 V, 4.5 V and 6 V can also be achieved. The
battery is composed of different layers: a zinc anode and a manganese cathode, among others.
Zinc and manganese react with one another and produce electricity. However, the anode and the
cathode layer dissipate gradually during this chemical process. Therefore, the battery is suitable
for applications which have a limited life span or a limited power requirement. The tiny batteries
could be used to power products like musical greeting cards without the battery being quite as
visible. The near future promises to bring us books that will be filled with digital paper, which
will display the text of any book we wish to read.


These batteries can be printed directly onto thin substrates, such as paper, so they are far more
flexible than any other battery. Because ink is used to produce Power Paper, the batteries are
considered dry, and don't need the metal casing that conventional batteries do to contain harmful,
toxic chemicals. This lack of casing allows electronics manufacturers to utilize the power source
in many shapes and sizes. Since it doesn't require special production equipment, Power Paper
can be made outside of clean- or dry-room conditions, which lowers production costs.

The researchers have already produced the batteries on a laboratory scale. At the end of this year,
the first products could possibly be finished.

They describe the process as a type of “rubber lip” pressing the printing paste through a screen
onto the substrate. A template covers the areas that are not to be printed on. They said that
through this process it is possible to apply comparatively large quantities of printing paste, and
the individual layers are slightly thicker than a hair.

Raghav Goyal
ECE-1, 2nd yr



Antimatter is exactly what you might think it is -- the opposite of normal matter, of which the
majority of our universe is made. Until just recently, the presence of antimatter in our universe
was considered to be only theoretical. In 1928, British physicist Paul A.M. Dirac revised
Einstein's famous equation E=mc2. Dirac said that Einstein didn't consider that the "m" in the
equation -- mass -- could have negative properties as well as positive. Dirac's equation (E = + or
- mc2) allowed for the existence of anti-particles in our universe. Scientists have since proven
that several anti-particles exist.

Photo by NASA/Getty Images

In this composite image of the Crab Nebula, matter and antimatter are propelled nearly to the
speed of light by the Crab pulsar. The images came from NASA's Chandra X-ray Observatory
and the Hubble Space Telescope.

These anti-particles are, literally, mirror images of normal matter. Each anti-particle has the same
mass as its corresponding particle, but the electrical charges are reversed. Here are some
antimatter discoveries of the 20th century:
 Positrons - Electrons with a positive instead of negative charge. Discovered by Carl Anderson in
1932, positrons were the first evidence that antimatter existed.
 Anti-protons - Protons that have a negative instead of the usual positive charge. In 1955,
researchers at the Berkeley Bevatron produced an antiproton.


 Anti-atoms - Pairing together positrons and antiprotons, scientists at CERN, the European
Organization for Nuclear Research, created the first anti-atom. Nine anti-hydrogen atoms were
created, each lasting only 40 nanoseconds. As of 1998, CERN researchers were pushing the
production of anti-hydrogen atoms to 2,000 per hour.

When antimatter comes into contact with normal matter, these equal but opposite particles
collide to produce an explosion emitting pure radiation, which travels out from the point of the
explosion at the speed of light. Both particles that created the explosion are completely
annihilated, leaving behind other subatomic particles. The explosion that occurs when antimatter
and matter interact transfers the entire mass of both objects into energy. Scientists believe that
this energy is more powerful than any that can be generated by other propulsion methods.
So, why haven't we built a matter-antimatter reaction engine? The problem with developing
antimatter propulsion is that there is a lack of antimatter existing in the universe. If there were
equal amounts of matter and antimatter, we would likely see these reactions around us. Since
antimatter doesn't exist around us, we don't see the light that would result from it colliding with
It is possible that particles outnumbered anti-particles at the time of the Big Bang. As stated
above, the collision of particles and anti-particles destroys both. And because there may have
been more particles in the universe to start with, those are all that's left. There may be no
naturally-existing anti-particles in our universe today. However, scientists discovered a possible
deposit of antimatter near the center of the galaxy in 1977. If that does exist, it would mean that
antimatter exists naturally, and the need to make our own antimatter would be eliminated.
For now, we will have to create our own antimatter. Luckily, there is technology available to
create antimatter through the use of high-energy particle colliders, also called "atom smashers."
Atom smashers, like those at CERN, are large tunnels lined with powerful supermagnets that
circle around to propel atoms at near-light speeds. When an atom is sent through this accelerator,
it slams into a target, creating particles. Some of these particles are antiparticles that are
separated out by the magnetic field. These high-energy particle accelerators only produce one or
two picograms of antiprotons each year. A picogram is a trillionth of a gram. All of the
antiprotons produced at CERN in one year would be enough to light a 100-watt electric light
bulb for three seconds. It will take tons of antiprotons to travel to interstellar destinations.

Animesh Gupta



Buying a Windows OS used to be so simple. A new version appeared, most people agreed it was
better than the last one and you'd get a copy for your next PC and the job done.

Then, Windows Vista changed it all and brought a revolution to the Windows OS. But, Microsoft
made a big flaw by making it heavy, which is the major negative point of Vista. Deciding which
operating system to opt for is now tough, since Vista has amazing graphics and security system
which makes it stand out from all other operating systems. But on the other hand it is very heavy
to be used by major percentage of computers. The choice might be easy. If you have old or
extremely basic hardware, for instance, then XP will have a definite advantage: its relatively
lightweight core means the operating system can theoretically run with only 64MB of RAM, so
there'll be plenty of resources left over for your applications. However, if you have high-end
requirements, such as using a powerful PC to run heavy-duty applications, Vista and Windows
7 come into their own. They're better optimized for multicore CPUs, and Windows 7 in
particular includes a number of tweaks to make the best of the latest hardware.

Windows 7 was released on a huge scale. And, it seems Microsoft has learnt from its mistakes it
did in Vista. It offers similar graphics and facilities, and that too at a reduced hardware cost.
Let‘s analyze the two market holders on the mentioned criteria:


Vista takes the longest time to get started, XP comes in second place and Windows 7 is the

Vista produces poor copy speeds in our small file tests, XP again is placed second and Windows
7 comes out on top.

In transferring larger than 1GB files, Vista surprisingly just manages to win out over XP. Both
are beaten by the speedy Windows 7, though.


These issues are a real shame, though, because Vista does have some useful networking features
to offer. The Network Map displays a helpful graphical view of all your devices and the Network
Setup Wizard can be genuinely useful. It's generally simpler to find and connect to wireless
networks as well, while WPA2 encryption helps to keep you secure. And if things do go wrong,
at least you'll benefit from Vista's detailed status reports. For example, Vista will let you know if


your network is OK but you've lost your internet connection. Then the Diagnose and Repair
option will try to fix the issue without requiring much input on your part. Internally, nothing too
complicated is happening, but anything that helps you avoid using cryptic command-line tools
should be welcomed.

Windows 7 takes Vista's networking features and adds homegroups – a simple way to create a
network and securely share your pictures, music, videos, documents and printers. Sounds good,
right? We're not entirely convinced. Homegroups will only work with Windows 7 systems, so if
you've got an old XP or Vista PC then you'll have to create and manage your network the old-
fashioned way. Once you've figured out how to do that, it's hard to see why you'd ever move to
homegroups in future. It's even possible that users will largely ignore them and continue to create
and manage networks just as they always have.


Vista's User Account Control (UAC) is too eager to prompt you when you make system changes.
However, the idea of limiting what malware can do is a good one and so although it's much-
loathed, UAC does make you safer on the web.

What's more, UAC acts as the foundation for other useful features, including Internet Explorer's
Protected mode. This places strict limits on what IE can do, preventing it from writing to most of
your hard drive or the Registry without your permission. ActiveX controls, toolbars and other
add-ons inherit the same high level of security, so any malware you encounter won't be able to
install further nastiness.
Windows 7 features a much more customisable UAC that is noticeably less irritating. Multiple
security levels mean that you can choose how many alerts you see – so easily annoyed users can
pretend that UAC doesn't exist while resting safe in the knowledge that their system is protected
from third-party meddling.
Encryption is the other big development in recent years. BitLocker delivers full volume
protection in Vista, and Windows 7 extends this to removable devices. Unfortunately, this
feature only comes with high-end editions of Windows, so low-end Windows 7 and Vista users
will be in the same position as their XP cousins.
The real value of modern Windows security comes in its low-level changes, though. System
services are more isolated and run with fewer privileges, reducing the damage that malicious
code can do. A new TCP/IP stack offers improved encryption and authentication options, and
Address Space Layout Randomisation loads system files as random memory addresses, making
it far harder for basic malware to exploit key system functions.


Windows 7 generally outdoes both Vista and XP. Microsoft really does appear to have learnt its
lessons and, while it hasn't fixed everything, the latest incarnation of Windows does show
significant improvements over its predecessor – impressive for a pre-release version. The
finished Windows 7 can only be better, and it should finally give long-standing XP fans a reason
to upgrade.

Aneesh Jain
CSE, 3rd yr



Section Editors:
Surabhi Goswami, ICE 2 (
Karthikeya Ramesh, ECE 2 (



An exclusive column… for creativity.

A whole new section for spirituality.

Relationships, too… inseparable for they are!

So, what do I write to catch your eye? Or, simply putting in something to fill the space would

What exactly should I write about relations, bonds and all the clichéd stuff? Over-hyped, over-
rated and repeated like over a million times each breathing day!

Is this just the right place to fret over all the ‗settings‘ gone wrong? Or, cry about the plans gone
awry? Or, say, give a list of all we‘ve ever dreamt of… pristine waterfalls, romantically blue
skies, long walks, blah blah? Would you be interested?

Philosophy‘s got a lot many takers. But, when Ayn Rand, Paulo Coelho and the likes are at hand,
what is it that would make you read this? And, recommend it ahead.

Now, a universal fact, latently accepted though, is that none‘s so mature as to teach relationship
dynamics. More so, because templates don‘t work here!

It‘s no stencil that I make, you copy, and the next one applies blindly! It‘s like clay… broken,
joined, moulded, remoulded… but, never the same!

So, all that we, at the editor‘s desk, could think of was an assortment of some things known,
some questioned, some preached, some tried… ultimately, things basically human!

Without anticipating much, if you just take a moment off, and catch a glimpse of what we‘ve got
to offer, you might just find it intriguing enough to at least read through the whole of it.

No issues, if you don‘t!

And, even if we have… do you actually give a damn?

Better not… for life‘s really really short!

Keep smiling… and please, while you‘re alive… LIVE!!!


Surabhi Goswami
ICE, 2nd yr



“By three methods we may learn wisdom-

First, by reflection, which is noblest;

Second, by imitation, which is easiest;

And third by experience, which is the bitterest.”

Wonder if Confucius was at all confused when he thought of something so deep!

But, we‘re no philosophers, thus, making it easier for us to excuse our proud selves from
understanding this.

But, at times, we find ourselves standing at a place we don‘t know where to go from. And that
exactly is the point which can make us, or break us.

Fast world, it is. You compete; you‘re into a rat-race. You rest and let it be, you‘re just another
frog-in-the-well! What, then, are you supposed to do?

Now, may be you‘re expecting, I‘d come with some trick to get spiritual, meditate, deep breathe,
in another line or two. Why? Just because this is an article to be put under a certain section of the
magazine? Or, for I, as the writer, have a limit to the liberty I can take? There have to be words
like ‗holy‘, ‗calmness‘, ‗rejuvenation‘, ‗soul-searching, or else, this stands a fear of being

Sorry to say, or write whatever, but setting aside all the clichés… the best connection, the best
relationship one can ever build is with one‘s own self. Unless you know what you are, no one
anywhere can recognise you.

In times when bonds are made to be broken, ties are knotted to be tested, feelings are expressed,
only to end up being twisted, tormented and trashed, the only way you can hold on to your sanity
is by loving yourself.

And if it all seems tough, like there‘s no way out… all doors locked, and you‘re all alone with
just stress, pain, chaos… all hurt, wounded, exhausted… try forgetting it all. Move on, leave
what you hate, discard what troubles you… do anything… but, move on!

Spirituality, by the way, comes handy here!


Blame-games, if by chance, are what you dig into, you‘ve always got God to accuse of not being
fair. In small things, like eating a chocolate when you‘re on diet, and then praying before you go
to sleep, that it doesn‘t affect you. Or, in larger issues, as in when you‘re freshly out of a
relationship… was it not God‘s fault? If it had to be broken, why did he get it started in the first

Not perfect advice, I admit… but that‘s what works. It‘s not like, I‘d say it‘s all about karma,
destiny and all that stuff, and you‘d happily read through the remaining lines, blindly trusting
whatever intellectual crap I churn out.

Signing off with something I wrote as an SMS a while back when I was upset with the way
things were shaping up around me… not a divine mantra, but it might just help you.

‗Not everyone’s born to be in your good books,

Not all deserve your happy looks.

Life’s great, if you just let it be,

Don’t allow mean folks to mess up your story.

Keep smiling,

Dump all trivial worries in cold store,

And as for the little problems,



Surabhi Goswami
ICE, 2nd yr



I made a choice today,

With one voice I say.

The choice ain't an easy one,

For it I will have to run,

In the morning sun.

But with one voice I say,

I made choice today.

I am prepared to run,

Because I know the journey will be fun.

Life itself is one,

The choice I make is a difficult one.

But then life itself is a riddle,

With I in the middle.

So with one voice I say,

I made a choice today.

I don't know will I succeed,

but I have sown the seed.


The choices will make me who I am,

maybe close to a man.

Sahil Chhuttani

ECE-2, 2nd yr



Crystal cases, solitary mazes,

Came by, went away, in life‘s phases,

A delicate bed of flowers, a thorny dry desert,

All tried and tested, with some ease, some effort.

Witnessed weaker times, seen gold turn hay,

Cried, prayed, to turn the storm‘s way,

Fought a few battles, wishing to change fate,

Reached up, fell down; saw peaks and valleys of love-hate.

Flowed along gentle streams, meandering, splitting,

Hit often by rocks, that I kept meeting,

But, none, I wonder, hit hard enough to stop,

Gave space to all that caught sight – boundless ocean, tiny drop.

Overpowered fear, when accompanied the waterfalls,

Lost in the woods, free soul, took no calls,

Never thought of embracing the luring Savannas, leaving the unkempt forests,

To be with what makes me happy; so what, if it‘s not deemed the best?

The beaches, as I crossed, offered no shelter to hide,

The soft breeze made no sense, when, crashing down came the tides,


Wild, hoarse, they came, saw and conquered all,

Revolted I had indeed, but waiting for nothing, time and tide stood tall.

Everything shattered, all disheveled,

Beauty of my paradise, lost forever,

All in pain, I lie unmoved,

Killing me… every breathless tremor.

Just a prayer on my lips,

Free me now… of this strife,

For though I am alive…

There is no life!!!

Surabhi Goswami
ICE, 2nd yr




I was once a child. Free to express myself earnestly, without any guile. Uncolored by public
opinion, preconceived notions or any form of external bias. It was easy back then, when I could
clearly discern the good, the bad and the ugly. Back then my world was an ideal place, a heaven
of sorts-untouched by uncaring words and thoughtless action. A world where people meant what
they said and there was honor among equals.

There was once an inner conscience guiding me. Pricking me when I lied, prodding me to be
appreciative and grateful, allowing me not to nurse grudges and helping me forgive and forget.
Though strong it was in counsel, weak was its voice or perhaps its voice was drowned in the
voices of the world. Over the years I find that that voice is all but dead, wasting away.

I knew not the existence of multi-'face‘ted people back then, or of the myriad ways words and
actions could be perverted into seeming what they weren't. At this point I‘m reminded of a poem
by Gabriel Okara:

Once upon a time, son,

they used to laugh with their hearts
and laugh with their eyes;
but now they only laugh with their teeth,
while their ice-block-cold eyes
search behind my shadow.

There was a time indeed

they used to shake hands with their hearts;
but that's gone, son.
Now they shake hands without hearts
while their left hands search
my empty pockets.

'Feel at home'! 'Come again';

they say, and when I come
again and feel
at home, once, twice,


there will be no thrice -
for then I find doors shut on me…

Yes, I‘m glad there was a time when we used to shake hands with our hearts and laugh with our
hearts. The time when our whole being embodied honesty in words and action. When we could
take things at their face value and didn‘t have to bother much about ‗reading‘ into anything.
Back then a conversation was when you could be uninhibited and carefree. Conversations were
never exercises in Critical Analysis.

I once saw things in BLACK and WHITE


Now, all I see is GREY

As I grow older and mature and knowledgeable and other ‗what-not‘s, I find life is difficult and
not a clear case of black and white. I hear about ‗self IMPROVEMENT‘ courses, I wish I could
undergo a ‗self MAINTAINENCE‘ course too. To maintain the innocence I once I had. To
maintain the virtues my parents made me familiar to. To continue laughing with my heart.

No more is right and wrong applicable universally. What is right for me may not be right for you,
but its right nonetheless. Morals and principles are relative to the person and the ends justify the
means. People sanctimoniously deride the one who takes recourse to such measure to achieve his
ends-the operative word here being sanctimonious.

What is said may often not be what is meant, what is said may often not be what is done either.
Put in a call to customer services, find yourself put on hold and enjoy a recording tell you how
important your call is.

Diplomacy and mannerism have become the keystones of this day‘s existence. Smile in the name
of diplomacy, spew out half truths and whole lies. Sugarcoat realty so that you don‘t hurt
another‘s sensibility. Make the other feel happy about his mistake and in turn be guaranteed of
the same treatment.

We have people who are just as comfortable standing up for something as they are comfortable
standing against it. Changing with the times they call it. Adaptability they call it. But never is it
called ‗lack of integrity‘. I can be in a group and praise a person and tell him all he wants to hear.
I‘ll put him on a pedestal of my choosing. The next day I‘ll be with some other people and mock
the very person I praised yesterday. I replace him with someone else on the pedestal. All this, to
achieve my goals.


I‘ve learnt to pull a few muscles and rustle up a mechanical smile without happiness. I‘ve learnt
to be muti-‘face‘ted according to the demands of the situation. No more will you see what I feel
written on my face. No more will you know the extent of my hurt or happiness unless I tell you
so. Even then I wouldn‘t be able to ‗cause I‘ve lost touch with myself, or its too embarrassing.

No more is it a good thing to show your happiness or your share your success openly with many.
You do not know the jealousy and spite that it will fester.

No more can you share the pain and sadness or the troubles that beset your life, you‘ll walk
alone, others have no time or patience to slow down and stay by you.

At this juncture I cant help but quote Gabriel Okara again:

'Feel at home'! 'Come again';

they say, and when I come
again and feel
at home, once, twice,
there will be no thrice -
for then I find doors shut on me.

The ability to speak out our mind, express ourselves in all honesty and give an actually honest
opinion on anything is a faculty we have carefully de-cultivated. For all the 'Individuality' we
harp about, we have become, but the product of collective thought. We spend our days building
upon what has already been said and done. We spend time discussing and splitting hairs about
'what is wrong' with 'what is, rather than thinking of what 'could be'.

So helplessly do I find myself trapped in this race to glory. I have to be as good as-if not better
than the man who ran in front of me. For that I need to work ‗smart‘ and use any possible means
at my disposal. That is the rhyme of the day.

I find myself in this day and age, surrounded with things to enjoy and live for but I can‘t. I have
to study for the next exam.

But believe me, son.

I want to be what I used to be
when I was like you. I want
to unlearn all these muting things.
Most off all, I want to relearn
how to laugh, for my laugh in the mirror


shows only my teeth like a snake's bare fangs!

So show me, son,

how to laugh; show me how
I used to laugh and smile
once upon a time when I was like you."

Stanley Varkey

ECE-2, 2nd Year



Cotton and saint, so incongruent, yet connected,

Tasteless, impassive, from external forces… unaffected,

Cotton moulds into yarn, painfully ages as a thread,

To cover others, takes up a selfless life ahead,

A saint, likewise, overlooks faults, which he finds in others,

Lets the goodness flourish; all evil, he kills in cover!

Cranes turn into swans,

Deserts shape up into green lawns,

The company of a saint changes all,

Nobility lifts you… not letting you fall!

Hands with flowers always bear fragrance,

Like saints, buds too, have no foes, no friends,

He, who severed them, and he, who protected their life,

Both treated the same way… equality endures all strife!

Nothing worse than an attitude like a fly‘s,

That jumps into oil, and, itself too dies,

Sole aim to spoil others, even at its own cost,

In gratifying its ulterior motives… everything, it has actually lost!

Some things don‘t change; no sense gets into some heads,


To help, you might have approached, but all that‘s right is what they‘ve said,

No matter how much you care, how much in your love, you believe,

The sight of tempting flesh, does even the most obedient pet crow ever leave?

Surabhi Goswami
ICE, 2nd yr



Should I write a poem? Should I write a tale?

Of what my life's been so far, or how many times I've failed?
You think you know how it's done? Why are you so sure?
Hasn't nineteen years of life been a good enough cure?
Didn't the World always say, "There's nothing special about you?
Many came and did what you do, and we know the outcome too?
So follow us and lead a path instead, that has been tried and tested.
It will provide you with all the rewards for the efforts you've invested.

We tell you to expect nothing more, nothing less.

And so you shall stay clear of all mess.
We offer you a life free of disappointments, a life you'll feel content with.
We will tell you about the ups and downs, and how they are to be dealt with.
So choose this life for all its worth, if you are wise enough.
Or risk everything you've lived for so far, and then regret your stupid bluff"

I keep wondering what the World had meant? Now that I've come so far...
How can I not be special? How can I not be unique? Now that I have the power...
I am a part of so many lives, in ways I haven't a clue.
How can everything i've been through, be just a rerun for you?
Nothing's new to you I know, but its true to me.
Whatever's foolish to you, is new to me.

So tell me what I should do? I wish to seek answers from you but you turn away from me.
You want me to think but expect me to obey-
Eyes and mouth shut, why should I throw my life away?
True, there are secrets that still lie hidden.
But why do you tell me of them, if they're meant to be forgotten?
What made you think I will listen?
For there isn't much you state for a reason!
I am a rational being, with a little courage in heart.
And thus, you shall see me tread that same dangerous path.
That offers risks and failure and pain,
and perhaps, mine will be another name
that you can write on that list of yours,
amongst the Many people who chose a different course.
For what's dangerous to you is an adventure for me.


Whatever's failure to you, is an achievement for me.
For what's reward to you, is trash for me
And what's safe to you, is punishment for me.

Chandni Singh
English Hons., 3rd Year
LSR College, DU.



In life, we all constantly strive to find the golden rule of a successful rapport with everybody and
everything we come across. From birth to death, a person`s success or failure is measured to a
large extent by the kind of relationship he/ she has had with the elements of this world: people.
But striking the right chord in a relationship often proves a hard nut to crack.

The world seems to constantly echo with a disconcerting chorus of voices, the result of frustrated
relationships between parents and their children, husbands and wives, friends, siblings, in-laws,
employees and colleagues—individuals disillusioned with themselves for not being able to relate
successfully to their environs.

The most interesting aspect of this scenario is that, today there happens to be no dearth of
methods to arrive at that elusive "success" in the act of relating.

The phenomenal flux of changes in every sphere of our lives since the last century has redefined
the role of human relationships. Social revolutions such as the women`s lib, the cult of the
individual, and even the human potential movement have repatterned the basic premises of
relationships. A good relationship today is not one that just lasts but one that coexists with self-
respect, individuality and the need to grow.

For example, an individual in a marriage shouldn‘t be a repository of one`s own needs and
desires; in fact both the people involved should be totally committed to their relationship. They
must be ready to take responsibility for themselves as well as the relationship. It is necessary to
be able to think of others‘ needs and desires, while being involved in any relationship, however
difficult it may be to reconcile the same with our own ambitions and beliefs. This is the single
most important factor involved in sustaining any relationship. To make any relationship work
over a period of time, however, requires that both display understanding…..and patience. Both
are important.

To do so, and to be able to still feel a sense of fulfilment in the relationship, however, requires
both those involved to be mature enough to be able to understand the needs and desires of the
other, and it is here that most people tend to be unable to comprehend the complexities thus
involved. To think and act in the way that you would instinctively do while reconciling it with
the manner in which someone else might expect you to behave can indeed be very difficult.


There is no fixed formula for a successful relationship, of course. But understanding and patience
are always the most critical components. It is possible to match up to everyone‘s expectations,
most of all our own, if we only are able to attune our own desires with what the world around us
might have. A little relating can help. And it isn‘t so tough after all.

Karthikeya Ramesh

ECE-2, 2nd Year



A soft breeze, blowing at my door,

Swift, subtle notes, from a distant shore,

Tender tickles on the window pane,

I just see and smile, something in me refrains!

Just gaze, and feel the drizzle outside,

Myriad thoughts on edge as I find,

Nothing locks me, why still am I afraid,

To go out and wet myself… before the clouds fade?

I don‘t need another soul, to make me deal,

Nothing but my senses alone can feel,

The beauty around, just a step away,

Luxury of a life time… wrapped in a moment some way!

And, so I‘m out here… among the falling leaves,

And the bathing birds dancing brightly on the trees,

Tiny pebbles shining clean against wet towers,

All in supreme splendour… a long awaited fresh shower!

Set myself free, as I soak feet in puddles,

Pitter-patter, pure drops, I‘m close to snuggle,

Stroking the flowers – multi-hued – as if to tease,


Caressing with a queer calm… the fragrant breeze!

Kissing the grass, now… I am all alone,

Yet, a strange ease… on my face, only raindrops shone,

He, up there, made simple things lovelier, not in vain,

I know… walking on an endless road…

I need no one else to walk through the rain!

Surabhi Goswami
ICE, 2nd yr



First in his arms,

Then on his back,

As time flies by,

They go hand-in-hand.

They- who share- the most sacred relation,

They- who face together- all sorrows, all elations,

Wherever he goes, the little one follows,

Each moment lived, as if there‘s no tomorrow.

On the rattling cycle, in the swanky car,

Without a promise, together, they go far,

The little one knows, he‘ll be cared for anyway,

He can count upon him, at the oddest hours of the day.

All his needs, even the not-needed wants,

Will be fulfilled; but how… he cares not,

He knows he‘s safe, when those eyes behold him,

He fears not, when together, even if the light‘s dim.

He trusts all will be fine; he doesn‘t need to bother,

For next to him is the most selfless soul… holding his hand, his father!



And the seasons change,

So does the bond,

As time flies by,

Different are the ripples in the same pond.

Now there‘s no longer a little one, the age‘s on his side,

But there‘s someone towing a burden inside,

There are no more laps, no hands are held,

Where‘s the affinity that they once felt?

Nothing of trust is left to be seen,

To spare a moment to talk, no one‘s keen,

The respect‘s probably still there, but the love is missing,

With every falling petal, away they‘re inching.

Anything in return, he had never expected,

But he needs to be cared for, not left dejected,

He fears if ever his age makes him helpless,

Will the ‗little-one‘, now grown, be as selfless?

Will he need to ask, or he‘ll get without a request,

The very basic things, to live and rest,

His wants have ceased, neither magnanimous are his needs,

Longs for only some respect, his wishes deserve to be paid heed.



There‘s a big question seeking answer,

A doubt- just one,

Now that it‘s his turn,

Will he be his father‘s true son???

Surabhi Goswami
ICE, 2nd yr



Section Editors:
Suchir Gupta, ECE 4 (
Saumya Joshi, IT 4 (



A Rendezvous with Mr. Himanshu Pandey

Vibration Consultant, C.E.O.
Vibal Vibration Diagnostics Pvt. Ltd.

Interviewed by Saumya Joshi, Suchir Gupta

Sir, we’d be glad if you could please throw some light on your educational qualifications in
chronological order.
I did my B.Sc Pass Course (Physics, Chemistry and Mathematics) from DAV College,
Chandigarh in 1983.Meanwhile, in 1986; I was also pursuing Post Graduate Diploma in
Marketing and Sales management (PGDMSM) on the basis of my B.Sc degree. In 1987 I
pursued B.E. in Metallurgy from PEC, Chandigarh. I have also done a Certification in plant
engineering and maintenance management from National Productivity Council (NPC) in 1991.

Can you please describe your most rewarding college experience.

I was the Cultural Secretary and a college color holder in the college Dramatics Club. I
represented my college in various cultural fests at IIT-Kanpur, IIT-Delhi-rendezvous, BITS etc.

Why did you opt for such an unusual branch?

I chose maintenance management as a profession because in late eighties and early nineties
philosophy of maintenance was undergoing changes from breakdown maintenance to periodic
maintenance to predictive maintenance. The philosophy of maintenance was seen as changing
from black collar to a white collar job. So for a fresh option I went into this field.

As you said you were the backbone of your college’s cultural front, so what did you learn
from your participation in extracurricular activities?
Outspokenness and a confidence to prove your point. The exposure to stage removes various
inhibitions and what I got was an Effective Public Speaking.

Where did you start your career from and did it grow?


I was a trained vibration analyst in my company IRD-MECHANALYSIS. My job was to
pinpoint the faults associated with rotary equipments like unbalance, misalignment, looseness
and resonance etc. I decided that I can make out a career as an entrepreneur. So I decided to
launch a condition monitoring company of my own.

Describe a time when you were faced with problems or stresses at work that tested your
coping skills. What did you do?
Somewhere in the year 2000, lot of emphasis of industrial market was on IT and Industrial
automation. I decided to elevate the strategy of condition monitoring to a machinery information
company. But since IT was not my core competence, so the gap between the market demand and
core competence increased. Lots of projects were lost.

To cope up with this, I focused on the stress management to do a condition monitoring of myself.

How did this thought of opening a company of your own come into your mind?

I thought that I can utilize my talents and my capabilities as an entrepreneur and venture out in
some reputed industrial plant where I was enjoying a very good brand image and personal
contacts. So I looked ahead for this plan and launched my company ‗VIBAL VIBRATION

What are the vision and mission of the company?

VISION- I want to have a world class condition monitoring concept which will take care of both
man and machine. The machine parameter will be ‗vibration‘ and the man‘s parameter will be
‗stresses‘. I want to cut down on both vibration and stress.

MISSION- I want to spread out the concept of condition monitoring for the betterment of
industry and society both.

Can you explain your organizational structure?

This is a Flat Organization. We will have engineers, Managers and CEO, which I am me myself.
As of now we don‘t have many workers but soon we will be outsourcing engineers for the
condition monitoring task.


What are the organization’s plans for next 5 years?

Our plans are to cut down on the hiring cost and operational experiences. I want to work on 5 to
6 global projects after showing my web presence. Prior to this we were busy organizing the tools
required to work on the concept which we procured last year.

What is the basic type of work done by you?

Our work is to do vibration audit of critical rotary equipments to identify the cause of excessive
vibration and to remove the cause.

We work according to a 3-tier strategy of:

 Detection

 Analysis

 Correction of equipment problems

Which particular equipment and software do you use for your job?

We use Microprocessor analyzer and balancer, named IRD-880 with inbuilt printer is used by us.
As per the software part I have my own software which is basically used for data collection and
various comparisons.

Please brief us about vibration technology. What are the day-to-day responsibilities of this

Vibration Technology is all about measuring vibration and to analyze the cause of excessive
vibration and to remove its cause.

Day-to-Day job is to take the feedback from customer about the health of machine and to act
accordingly to control the vibration.

Sir, you have visited our college many a times in the past for giving guest lectures. How do
you see such lectures as a source of motivation for students? How can this knowledge of
vibration technology be helpful for us?


Basically it‘s all a concept of maintenance management. I am studying man as a machine.
Students can also apply this conditioning monitoring on their own lives to remove the stress
triggers which we all face in today‘s world.

Few enlightening word for our readers.

Plan your work and work your plan. Knowledge is the best investment that you can do in
yourself and Success is a personal characteristic what you set out to achieve.



Mr. Parul Kumar Sharma, Design Engineer, Freescale Semiconductor

Interviewed by Saumya Joshi, Suchir Gupta

Tell us something about your Professional Life sir?

I work as Design engineer in Freescale. I have been associated with chip design in
semiconductor Industry for last 10 years. My primary application area has been interface and
data connectivity products.

What kind of job profile does FreeScale offer?

Freescale offers very diverse job profiles for Electronics & Computer Engg. The jobs are in the
field of VLSI, Programming, Embedded design

What all kinds of projects are undertaken at Freescale Semiconductors?

Freescale caters to networking, multimedia, automotive and wireless domains.

What are the career prospects in Electronics Industries? Can you throw some light on why
is there a major shift of Electronics Students towards Software Industries?

Career prospects in Electronics Industries are indeed very bright. Electronics industry is very
wide and differentiated segment and a lot of software industry is actually an offshoot of
electronics industry. Today's products require both hardware & software functions to run in a
gadget. This way both electronics and software engineering contribute to same product.

Apart from the technical Knowledge, what all qualities should a student possess, to excel in
the industrial world?

Apart from technical knowledge, person must have

 Pleasant communication skills,

 Hard working

 Self discipline.

 Be proactive, should take initiative


 Open minded to ideas and people

 Logical thinking

Sir please rate the existing Education System of India on a scale of 10? Do you feel some
reforms are needed to improve Research and Development in India?

4/10, although situation varies from place to place.

 First of all the colleges must focus on learning by doing rather than learning by
rote memorizing.

 In practical life you learn more by doing and one needs to balance between study
and practice.

 Experimentation challenges mind more and make one a better engineer.

For Research:

India (Government & Industry) should fund more research projects in colleges for
graduate and post graduate students to work on ideas, improve themselves and give back
the findings to industry. India needs to replicate US system. Colleges should put more
effort to get industry projects and it is the responsibility of college management to create
a research centric eco system.

What will be the biggest challenges in front of electronics industry in this post recession

Coming up with new and innovative products that create consumer aspiration & demands
is the major challenge. Electronics Industry has responded well to all challenges in last
60 years. The impact of electronics in everyday life is a testimony to this fact.



Section Editors:
Megha Ronjhiya, ICE 4 (
Priya Mittal, IT 3 (
Anuradha Garg, EEE 2 (



IEEE is the institute of Electrical And Electronics Engineers. The institute not only provides a lot
of benefits to their members but is surely a platform for them to showcase their technical and
managerial skills through various events organized the whole year round. Its membership helps
the students by organizing meetings and conferences, by hosting educational programs, by
providing various awards and scholarships and the IEEE consultant services.
Its educational resources help in any field of engineering. These consist of online learning
programs, educational activities, introduction to certain short-term courses at conferences and
meetings, etc. In utilizing these resources, one can become aware about latest developments in
the field of technology.
As an IEEE member, apart from membership one also receives the IEEE magazines and
newsletters. These publications explore the developing applications and implementation of new
technology. They also provide a forum for discussions on engineering, science and technology.
Students and young professionals can gain knowledge about innovative work and latest research
at universities. Students can also get ideas about research centers worldwide. Members can also
access IEEE digital library which is an immense source of journals, magazines, newsletters, and
Apart from all these, it also provides opportunities to showcase one's talent by volunteering for
organizational and managerial work. It helps develop the soft skills which are in demand today at
the professional front. In these economically difficult times, the IEEE membership can also offer
help in searching for job opportunities or training programs that can guide one as to how can this
challenging, competitive world be faced.
One of the most important benefits of its membership is the opportunity to network with people
around the globe. We can communicate through students and professionals from different
countries, can share and exchange our ideas and gain knowledge.

Priya Mittal
ECE 3rd year



The IEEE 125th Anniversary R10 student congress was held at the National University of
Singapore, from 16th-19thjuly 2009.It was a unique three-day event with a single objective to
improve the organizational performance and grooming individual skills of its participants. This
event provided unparalleled opportunities by bringing forth innovative and groundbreaking ideas
in IEEE Students. On 15th July, all of us converged at Singapore to participate in the 12th
Anniversary R10 Student Congress.

The event started off on 16th July with the student delegates from various countries taking part in
an ice breaker session. It was a very informal session, which made all of us instantly
comfortable. We participated in the „Green-Technology and Sustainable Energy Resources‟
competition in which we had to formulate a proposal on a sustainable technology that we would
like to implement in a village. I have got the Bronze Honours for the same. The event gained
momentum with the speech by the Chairman of the organizing committee, Ramesh Krishnan.
The IEEE President 2008, Lewis Terman, assured that inspite of the current economic downturn,
the reputation and the working of IEEE was perfectly untarnished.


This was followed by an open discussion forum on „World @ 2020‟ where the students and the
dignitaries interacted and discussed some worthwhile issues. Then it was time for the formal
dinner and the R10 SAC Awards ceremony. The awards were conferred upon the individuals
who contributed towards IEEE‟s core mission of „Engineering the Future‟. The day concluded
with the exhilarated and jubilant students retiring to their dorms. The next day was much more
interesting, Joe Lillie, MGAB Chair, who captivated everyone with his leader ship talks. All of
were left spell bound by his impressive style of presentation. He touched topics like
communications, the art of negotiation, project management, teamwork, introspection of one‟s
skills and expected us to execute them in our real life practices. We were made aware of
Microsoft‟s efforts for fostering technology especially among student branches in India. The
humanitarian technology challenge briefly described its humanitarian causes in Region 10. Then
the most exciting secret was unraveled and that was the „City Tour of Singapore‟, in which all of
us had a great time and it really proved to be a red letter day.

Cultural Night at NUS, Singapore


The next dawn was super thrilling as we had a lot many activities lined up. Post lunch, the
students proceeded to their „Breakout Sessions‟. Then we attended a seminar held on
Mechatronics by Prof. Masayoshi Tonizuka. The evening session was fun-filled and jocund. It
was exhibition time in which 14 stalls has been exhibited which reflected our cultural identity.
Delhi, Hyderabad, Pakistan and Bangladesh sections won the exhibition after a tough
competition. The stage was set on fire with a Bollywood dance with Pakistan Delegates,
traditional songs and a Taiwanese dance which deserved a huge round of applause. As the
departing day approached nearer, a sense of sadness hung in the atmosphere. Nevertheless, we
carried on with our last day‟s target. The panel of IEEE senior volunteers discussed the relevance
and experience of working with IEEE. After some refreshment, winners of the „Green
Technology and Sustainable Development for the Future‟, Poster making competition and
vibrant student section exhibition were announced.

Lewis Terman presented my team Bronze Honours for the “Green-Technology and Sustainable
Energy Resources‟ competition”


After the award ceremony, R10 SAC Chair Dr Mini presented mementos to all IEEE dignitaries
present at the congress. The chairman of the organizing committee summed up his delightful
experience in a grandiloquent manner. The last day saw the exchange of gifts as token of
remembrance. At last it was time for us to bid a farewell with a promise of staying in touch for
years to come. Then we departed back to our home countries with invaluable knowledge and a
spirit to strengthen IEEE and ensure to take this organization to the apogee of success. Last but
not the least I would also like to thank and gratitude my branch, my seniors and my colleagues
for their support, valuable suggestions, able guidance and motivation. Their support has been a
great source of encouragement for me. I am indebted to all those who have given me a Lifetime

Puneet Walia
ECE, 3rd yr
Head- Infrastructure & Logistics



30TH -31ST JANUARY, 2009

The annual festival of the IEEE Student Branch of BVCOE - Fervour 2009, was organized in the
month of January. This extravaganza witnessed some truly eye catching events and was held on a
much larger and magnanimous scale than its predecessors. With a wide spectrum of activities,
the fest drew massive participation not only from numerous Delhi and NCR colleges, but also
from premier institutes all over the country.

The 2-day fest encompassed events ranging from technical to managerial, from literary to
informal; thus providing the students with a perfect opportunity to portray their vivid capabilities
and showcase their talents in various fields of learning.

The following were the highlights of the fest:


Plan De Negocios: National Level Business Plan Contest

Our country India is an upcoming economy which is at the moment trying to build a stable and
secure infrastructure. In the recent years we have made some amazing breakthroughs in the field
of technology. To meet our requirements we are making efforts to seek new technologies and
innovative ideas that can be converted into major successful ventures.

The Business Plan contest was a platform for such ideas to be heard and for start up projects to
be felicitated for their efforts.

The entries were invited for the undergraduate and post graduate categories under the broad
themes of education, healthcare, environment, social entrepreneurship, energy and knowledge

A large number of entries were received out of which only 10 were selected for the post graduate
category and 15 were finalized for the undergraduate category. Huge cash prizes were awarded
to all the winners.

The Post Graduate category was judged by Dr. Rakesh Kumar and Prof. D.P Singh. The winners
belonged to institutions such as BITS, Pilani and Symbiosis Institute of International Business,

The Under Graduate category was judged by Prof. BL Gulati and Mr.Supreet S.Vaid. The
winning teams belonged to IIIT, Allahabad, IGIT and BITS Pilani.


National Students’ Symposium

Engineers of today need to keep up with the fast-paced developments in technology. They need
to use their imagination and engineering expertise to innovate and invent. Thus, writing a
technical paper becomes a daunting, yet exhilarating task for them.

Keeping the same in mind, the IEEE student branch at BVCOE organized National Students‘
Symposium with the theme of ―Emerging Technologies in Future‖, during FERVOUR‘09.
Technical paper presentation presents an excellent opportunity for demonstrating competent,
technical and innovative talents in form of papers. It provides a platform where the intellect gets

NSS at FERVOUR‘09 drew participants from across the nation. The papers presented catered to
a wide range of topics, from nanophysics to web computing. The event was divided into 2
categories: Poster Presentation and Oral Presentation.

The winners in the Poster Presentation category were from National Power Training Institute,
Badarpur, and Bharati Vidyapeeth‘s College of Engineering. The prizes in the Oral Presentation
category were bagged by two teams from Bharati Vidyapeeth‘s College of Engineering. Papers
from both the category were judged by Mr. C.L. Gulati, Mr. S.K. Saxena and Mr. Tiwari.

International Education Fair


Realizing the importance of higher education abroad, IEEE student branch at BVCOE organized
INTERNATIONAL EDUCATION FAIR (IEF) as one of its major events.

IEF at FERVOUR' 09 had participation from many elite organizations including USEFI, N+I

These groups and organizations are involved in assisting students applying to foreign universities
for post graduate courses. The event was very successful and attracted a large number of
students. During this event, many interested students who wished to pursue education in the near
future abroad were benefited by getting their queries resolved by the respective counsellors on
the prospects of masters and doctoral programs in different fields in engineering.

Delhi School Summit

This event basically aimed at inviting more and more of the school students to the college and
imparting awareness to them about the significance and importance of the field of Science and
Engineering. The students were taken on a tour inside the college premises to give them an
insight of an engineering college.

Fervour 2009 provided the school students with an opportunity to showcase their artistic,
creative and oratory skills through various events organized especially for them.

The Delhi School Summit was a huge success and the events gave a good exposure to the
students and helped them to hone their skills.

Other Events Organized

Following is the list of the events organized under Fervour 2009 as per their respective


1. Technical Events

Being the fest of a premier engineering college, various technical events were organized to give
an opportunity to the students to test their technical skills. These were :
• Trace the maze
• Brainstorming - The recall game
• Project Exhibition
• Line Follower Robot Competition
• Circuit Making
• Automation Quiz

2. Managerial Events

Fervour 2009 provided an opportunity to the students to develop their managerial skills by
organizing various managerial events. The Managerial Section was one of the major highlights
of the fest.

The various managerial events were as follows:

 Plan De Negocios
 Case Study
 Markkinointi-MBA Guru
 Conundrums
 Business of Cricket
 Bullz N Bears

3. Literary Events

Fervour 2009 provided the students with an opportunity to hone their literary and oratory skills
by presenting an amalgamation of varied literary events, ranging from quizzes to group

The various Literary Events were :

 Connect the dots - The General Quiz

 Speak your mInD!!
 Debate
 Spin-a-yarn


4. Programming Events

Programming is a technique which every engineer should be aware of ; it constitutes an integral

part of the study of engineering. Fervour 2009 realized the importance of programming and
organized various events in this field to recognize and promote the programming skills of

These events were:

 C++ Programming
 VHDL programming

5. Gaming Events

Fervour 2009 organized two major gaming events in order to entertain the students and to
encourage their gaming skills.

These events were :

 LAN Gaming-RuinatioN
 EXPLORE- The Treasure Hunt

6. Informal Events

Besides the technical, managerial and literary events, a whole lot of informal events were also
organized in order to incorporate some fun in the fest.

Following are the informal events :

 Matki Phod
 PENgeance-The Pen Fight
 mEet oR deLEtE
 filMy CHakKaR
 RJ crazy-FEVER 104

7. Art Attack

Fervour 2009 provided the students with an opportunity to show their artistic and creative skills
by varied art events.


The various art events were as follows:

 Graffiti
 Collage Making

8. Sports events

Keeping in mind the importance of sporting activities, two sports events were introduced in
Fervour 2009.

The sports events were:

 Futsal
 Chess

FERVOUR 2009 was a huge success and it fulfilled its promise of bringing out the technical as
well as creative side of every student involved in it.

In the upcoming years, we assure you even bigger and better events to look forward to that shall
leave you astounded.

Anubha Kapur
ICE, 3rd yr



Dr. Vikram Sarabhai Rotating Shield Quiz is an annual General Quiz held to commemorate the
contributions and achievements of the father of India‘s Space Program. It was held at Bharati
Vidyapeeth‘s College Of Engineering on 23rd October 2009. The active participants from various
premier colleges that come under IEEE Delhi Section namely IIT DELHI, DCE, NSIT, JMI ,
BVCOE, USIT ,AMITY, GTBIT, MAIT and St. STEPHENS participated in the event.

The quiz commenced at 10 o‘clock in auditorium. The participation was open for everyone and a
team of two members was allowed.

This annual event saw massive participation this year, with over 92 teams registering for the
quiz. The quiz was held in two stages: Prelims and Final.
4 grueling rounds were conducted in the final stage which tested the knowledge of the
participants in nearly every sphere of technology, history and current affairs possible under the
sun. All rounds in the final stage were visual in nature.


The most surprising aspect of the day was that the winner of this mind boggling quiz was a sole
participant Harish Alagappa, a student of Amity Aerospace Institute, whereas the other 5 teams
comprised of 2 participants each.

The winners were as follows:-


1. Harish Alagappa Amity Institute of Aerospace First

Engineering, Noida

2. Udit Anand Netaji Subhas Institute of Second

Technology, New Delhi
Roshan Shankar

3. Sharat Nambissam Netaji Subhas Institute of Third

Technology, New Delhi
Ankit Dhul

The winners were awarded with the rotating shields and cash prizes worth Rs. 9000/-.

Winners’ Shields


In all, huge participation in the quiz proved the growing popularity of the event, the branch and
the college as a whole.

Priya Mittal
ECE 3rd year



Serving as the STAR coordinator for one year was a source of immense proud and honor to
me. As of now, people know about the branch for its successful organization of events like
quizzes, debates, guest lectures and the annual fest "FERVOUR"; but not many people are
aware about the social side of the IEEE student branch. STAR is one such program under the
WIE Affinity Group.
STAR stands for “Student Research and Research Engineers/ Scientists”. As is evident, that
the program was designed for the school kids; especially for the girls of the IX and X classes.
Since these two important years lay the foundation for the upcoming years which are crucial
for the entire career of a student's life, the STAR coordinator's work is to make the girl
students aware about career aspects in science, especially in the field of engineering.
As a STAR coordinator, I had the opportunity to visit two government schools for
conducting interactive sessions with the students. Not to anyone‟s surprise, their knowledge
about engineering was minimal. So, I started the session with a little introduction. I tried to
inspect about their aims. Then I started talking about science, technology and engineering and
their future. I also carried with me the circuit of the 'power supply' that we had built in our
first year. Undoubtedly, it proved to be a source of great fascination for them. I also
explained to them the various electrical components.
To my greatest amazement, many students asked me about the entrance exams for
engineering. They were also interested in more such sessions and some of them even
demanded for sessions on Robotics. In all, the satisfaction I gained from such activities is

Megha Ronjhiya
ICE, 4th yr
WIE Chairperson (A.Y. 2009 – 2010)
STAR Coordinator (A.Y. 2008 – 2009)



“For life is a winding road.....a journey replete with promises ..... sometimes it just takes a
moment to realize an opportunity and discover oneself.....”

IEEE, the words that come to my mind, are excellence... perfection... evolution... progress.

IEEE is a pioneer body in technological advancement and scientific research. And I feel highly
fortunate to be a small part of this highly acclaimed organization, being a member of the Student
Branch of my college.

Although this association has only just begun and its been merely a few months since I became
actively involved, but I can say with full confidence that this experience has been quite fulfilling
and has given me the freedom of expression and a perfect platform to hone my aptitude and
quench my thirst for knowledge.

Experience is not gained in a day‘s work but it is a collection of various events. It is unique to
every individual and depends on the perception of situations and our reaction to them. I was very
lucky to explore my organizing skills during the Vikram Sarabhai quiz. The interaction with
students from innumerable colleges was very enriching.

Performing the role of the editor of the Literary Section in PRATIBIMB, also gave me a sense of
contentment and a platform to unleash my creativity and imagination. Working in collaboration
with other members and sharing our viewpoint and outlook in different matters has indeed
broadened the spectrum of my thinking as an individual.

Each passing moment of this association unfolds new vistas and opens new doors of learning.
IEEE surely provides an opportune stage to portray one‘s talents, nurture skills, develop
imagination and kindle creativity and ambition.

The ocean of knowledge is immense and to explore the unchartered waters, IEEE is the perfect
ship, which shall help me to find the pearls of wisdom from the never-ending depths of the
ocean. For me, this inevitable curiosity to unveil the many mysteries of our world, science is the
most magnificent tool and IEEE gives me an access to a plethora of technical know-how.

It has indeed been a truly wonderful experience to work under the munificent guidance of our
Branch Counsellor, Rahul Bahl Sir and I look forward to learning more under his supervision.
The members of the current executive committee have also motivated me and encouraged me to
prove my mettle. I wish to receive the same kind of support from them in the future as well.


This is just the beginning of an extraordinary journey, which is ever-evolving and dynamic.
IEEE has enriched my thinking and given me an enlightened vision. It is indeed a treasure trove
and I hope that I can seek the many more jewels it has in store for me through my endeavours in
contributing to the IEEE student branch.

Anubha Kapur
Editor (Literary Section)
ICE, 3rd yr





Ankit Ahuja, CSE 4 (

Moksha Sharma, ICE 4 (


Prem Singh, IT 3 (

Nitisha Jain, IT 3 (


Karan Sharma, EEE 3 (

Yash Kumar, EEE 3 (


Aneesh Jain, CSE 3 (

Raghav Goyal, ECE 2 (


Anubha Kapur, ICE 3 (

Ira Tiwari, ICE 3 (

My Branch (Report Section)

Megha Ronjhiya, ICE 4 (

Priya Mittal, IT 3 (
Anuradha Garg, EEE 2 (


Suchir Gupta, ECE 4 (

Saumya Joshi, IT 4 (

Vive' le Hesitation

Surabhi Goswami, ICE 2 (

Karthikeya Ramesh, ECE 2 (




1. Mr. Rahul Bahl The Branch Counselor for his support
and guidance, without whom this e-journal wouldn't
have been possible.

2. Ms. Nidhi Gurnani The Chairperson of the branch for

her valuable suggestions.

3. Mr Ankur Vijay The Web Administrator without whom

this e-journal would never have released.

4. Mr. Ankit Ahuja The Vice-Chairperson and Web

Consultant of the branch, and the Co-Editor-in-Chief of
Pratibimb, for his constant inputs for the betterment of
the journal.

5. Mr. Shrey Malhotra The website designer without

whom this attractive new layout would not have been