Home | Help     
Prev<< See More Youniverse >>Next
April 2010
 
By The Numbers

2.8% of urban Indian mobile population use the internet over their phones to check emails while 2.5% use the net to search for information.

Exams alert

All India Engineering Entrance Examination (AIEEE) will be held on 25th April, 2010 all over India and abroad for admissions in B.E./ B.Tech and B.Arch / B.Planning in various national level institutes like NITs, IIITs, deemed universities, government funded institutions and states like Haryana and Uttrakhand.

 
Thus Spake

The object of education is to prepare the young to educate themselves throughout their lives.

- Robert Maynard Hut
Interesting Facts  
 
The word "electric" was first used in 1600 by William Gilbert, a doctor to Queen Elizabeth I.
 
   

Did you know

 
 
Coins Have Ridges around the Edges: Perhaps you noticed that United States dimes, quarters, half-dollars, and silver dollars have ridges, or grooves, around their edges.
 
 

 

Technology Enabled Learning  

The Technology Enabled Learning (TeL) is a platform for providing Internet enabled Education. Its significance has increased as the penetration of Internet clearly indicates the worldwide acceptance of it as a communication tool. Technology Enabled Learning (TeL) uses Internet as a medium for leveraging the pitfalls of our traditional education system by providing an environment, which are more learners centric rather than being more instructors centric, powered by Internet Technology.

 
 
 
Smile Please..!   

Bill and the Pearly Gates

 

Bill Gates dies and is at the pearly gates talking with Saint Peter. Saint Peter says, "Bill, you've done some wonderful things in your life and have earned the right to choose where you'll spend the rest of eternity. You can choose between Heaven or Hell, but choose wisely."

Bill looks over Saint Peter's shoulder between the pearly gates and sees nothing but a lush green meadow. Deciding to heed Saint Peter's words, Bill asks if he could take a look at Hell. Saint Peter agrees and sends Bill to Hell.

The Devil greets Bill at the gates of Hell and he is immediately taken aback. Much to his surprise, there's one heck of a party going on. People are dancing, the alcohol is flowing, music is non-stop and everyone is having a blast.

Bill returns to Heaven to again discuss his decision with Saint Peter. He again looks over Saint Peter's shoulder and sees only a lush green meadow. Bill says to Saint Peter, "I've put a lot of thought into this decision and it may sound foolish, but I'd like to spend the rest of eternity in Hell." Saint Peter fulfills Bill's request and returns him to Hell.

When Bill gets back to Hell there's been a big change. People are writhing in agony, flames are burning, and moans of pain and despair are everywhere. Bill, being quite shocked at the sight asks the Devil, "What happened?? I was just down here a little while ago and everyone was having a great time!"

The Devil says, "Oh that... That was just the demo!"

 
From The Editors Desk
 

Heartiest Greetings!

In this issue of Youniverse, we have presented an article on "Technology Enabled Learning" the article provides an overview of this new frontier in education delivery.

More >>

Complex Simplicities  

Zooming User Interface (ZUI)

In computing, a zooming user interface> or zoomable user interface (ZUI, pronounced zoo-ee) is a graphical environment where users can change the scale of the viewed area in order to see more detail or less, and browse through different documents. A ZUI is a type of graphical user interface (GUI). Information elements appear directly on an infinite virtual desktop (usually created using vector graphics), instead of in windows. Users can pan across the virtual surface in two dimensions and zoom into objects of interest.

Simple Authentication and Security Layer (SASL)

In computing, Simple Authentication and Security Layer (SASL) is a framework for authentication and data security in Internet protocols. It decouples authentication mechanisms from application protocols, in theory allowing any authentication mechanism supported by SASL to be used in any application protocol that uses SASL. Authentication mechanisms can also support proxy authorization, a facility allowing one user to assume the identity of another. They can also provide a data security layer offering data integrity and data confidentiality services. DIGEST-MD5 provides an example of mechanisms which can provide a data-security layer. Application protocols that support SASL typically also support Transport Layer Security (TLS) to complement the services offered by SASL.

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
top 
 
 
Interesting Facts
 
The word "electric" was first used in 1600 by William Gilbert, a doctor to Queen Elizabeth I
     
The first public cell phone call was made on April 3, 1973 by Martin Cooper. The Motorola Dyna TAC 8000X was the first cell phone sold in the US; launched on April 11, 1984, it was designed by Rudy Krolopp and weighed 2 pounds.
In 1898, one of the first programs to be broadcasted on radio was a yacht race that took place in British waters.
Cats can see clearly in one-sixth the amount of light we humans would need. This is due to a special layer of cells at the back of their retinas, which acts like a mirror, reflecting light back to the retina's cells.
African Grey Parrots have vocabularies of over 200 words.
The word rodent comes from the Latin word `rodere' meaning to gnaw.
Charles Dickens always slept facing north, in an effort to battle insomnia – when he traveled, he would carry a compass with him and move his bed around so it was correctly aligned. He also liked to face north while writing, believing it aided his creativity.
The Nobel Peace prize was first awarded in 1901 to Jean Henry Dunant, who was the founder of the Swiss Red Cross.
 
 
 
 
   
 
Did you know
 
Coins Have Ridges around the Edges: Perhaps you noticed that United States dimes, quarters, half-dollars, and silver dollars have ridges, or grooves, around their edges. They were not put there for decoration, but had a very important purpose at one time in history. During our country’s earlier years, all coins were made of gold or silver, and did not have ridges. Each coin’s value was based on the amount of gold or silver in it. For example, a $10 gold piece contained ten dollars worth of gold, and silver dimes contained ten cents worth of silver. But some dishonest people sought to make an illegal profit from these coins. They filed off the edges and sold them for their value in gold or silver. The smaller-sized coin often went unnoticed, but this dishonest practice decreased the value of the original gold or silver coin. To prevent this, the government began milling, or grooving, the edges so a coin could easily be identified if it was trimmed. Coins today are no longer made of pure gold or silver, but the milled edges remain because people are accustomed to seeing them that way. At the U.S. Mint in Philadelphia, one
single stamping machine can produce 10,000 coins every minute of every hour of every day of the week.
How did T-shirt get its name: One of the earliest prototypes for the T-shirt dates to 1880, when sailors in the U.S. Navy were issued an elbow and hip length undershirt; when laid out on flat surface, it resembled a perfect "T". This military undergarment was transformed over the next few decades, and became a staple in civilian men’s wardrobes by the 1950s. Today the possibilities are infinite for this humble cotton basic that is equally at home on farmers, students, celebrities, super hunks and career women.
Piano: The king of instruments, the piano has 88 keys, each producing a unique tone. The black keys represent sharps and flats. The white keys are named after the first seven letters of the alphabet. Starting at the left, the first white key is A, with the lowest tone. The second is B, and so on through G, and starting with A again at the eighth key. The distance between any piano key of the same name is an octave. The highest tone on the piano is the eighth C. A piano covers the full spectrum of all orchestra instruments, from below the lowest note of the double bassoon to above the top note of the piccolo which span the frequency range 27.5 Hz (A0) to 4186 Hz (C8). A grand piano can be played faster than an upright (spinet) piano because it has a repetition lever that allows the pianist to repeat the note when it is only half way up. An upright piano requires letting the key all the way up to reset the hammer action. The piano was inventor by Italian Barolomeo Cristofori in 1726. The word piano is an abbreviation of piano et forte (literary soft and loud). The record for the longest public solo piano playing was set in May 2009 by Canadian-born artist Gonzalez (b. Jason Beck) who played for 27 straight hours at Theatre Cine 13 in Paris.
 
 
International copyright: The earliest case on copyright law dates to the year 561 over the ancient Irish manuscript, the Cathach of St. Columba. But the first proper copyright law is the Statute of Anne, the Copyright Act 1709, named after Queen Anne, monarch of Great Britain at the time. In 1886, the Berne Convention was established to recognize copyrights among nations. Perhaps the most convenient issue about the Berne Convention is that an artist or author does not have to register or claim for copyright it is automatically achieved when the work is recorded. The United States signed the Berne Convention only in 1998. The United States and some Latin American countries had entered into the Buenos Aires Convention in 1910. This convention required a copyright notice on the work, such as “All rights reserved.” Some other countries chose to sign The Universal Copyright Convention, drafted in 1952 by UNESCO. The World Intellectual Property Organization (WIPO) was created in 1967 to promote the protection of copyright throughout the world. WIPO is a specialized unit of the United Nations and more than 180 nations have signed up to it. Still, there is no such thing as an “international copyright.” Each country has its own copyright laws. However, most countries offer protection to foreign works under international treaties. Generally copyright lasts for 50
years after the death of the creator, although some countries allow only 25 years. For anonymous works copyright will be 95 years from publication or 120 years from creation, whichever is shorter. You can also choose to have copy left on your work; that is when you make it available for free. Copyright law does not protect sightings of Elvis – unless you have a photo to prove it.
 
     
 
Pizza: The earliest known pizza dates from about 200 BC. For centuries Greeks and Italians used flat round bread with toppings on it. But it was the Italians who added tomatoes and cheese to make the pizza as we know it. The world’s first pizzeria, Antica Pizzeria Port’ Alba in Naples, opened in 1830 and is still in business. The modern Pizza was created by Naples baker Raffael Esposito. In 1889, he created a pizza for King Umberto and Queen Margherita while they were visiting Naples, topping the pizza with red tomatoes, white cheese and green basil to resemble the Italian flag. He named the pizza in honor of Queen Margherita. The queen was keen to try this “new” food fad but were reluctant to visit the pizzeria. Thus she became the first person to order a take-out (take-away) pizza. Today, more than five billion pizzas are sold annually, more than one billion in frozen form. Even so, it is second in popularity to the hamburger, of which more than 5,5 billion are sold annually. Interestingly, although US citizens eat twice as much meat as Europeans, the
Margherita (without a meat topping) remains the most popular pizza choice in the US. The favorite pizza topping for Europeans is tuna. The word “pizza” is from the Latin verb pìnsere, to press, first recorded in a Latin text dated 997 AD from the town of Gaeta in Southern Italy. Cheese Pizza Day is celebrated every year on September, 5th.
 
 
 
 
Technology Enabled Learning
 

The Technology Enabled Learning (TeL) is a platform for providing Internet enabled Education. Its significance has increased as the penetration of Internet clearly indicates the worldwide acceptance of it as a communication tool. Technology Enabled Learning (TeL) uses Internet as a medium for leveraging the pitfalls of our traditional education system by providing an environment, which are more learners centric rather than being more instructors centric, powered by Internet Technology. The Technology Enabled Learning (TeL) has laid a new chapter in education. Through the Technology Enabled Learning (TeL), learners can now undergo training sitting at their home or any other place with Internet accessibility and continue their education.

Education shapes the destiny of a nation. It is the principle instrument of developing human capabilities and transforming the economy. The traditional structure of the classroom has existed for thousand of years and has evolved by passing through various phases. The first phase was the Gurukul where gurus imparted knowledge to shishyas. Then came the second phase where the teacher taught using blackboard and chalk. In the third phase virtual aids like OHP and multimedia took over the traditional system of imparting education.

Now comes the Education Revolution! Barriers of time and space have been eroded. Education becomes ONLINE. Technology Enabled Learning (TeL) is Internet enabled technology driven education that allows you to study Anytime Anywhere as per your convenience.
Technology Enabled Learning (TeL) is an umbrella term that describes learning done on a computer, usually connected to a network, giving us the opportunity to learn almost anytime, anywhere. Technology Enabled Learning (TeL) is not unlike any other form of education - and it is widely accepted that Technology Enabled Learning (TeL) can be as rich and as valuable as the classroom experience or even more so. With its unique features Technology Enabled Learning (TeL) is an experience that leads to comprehension and mastery of new skills and knowledge, just like its traditional counterpart.
Instructional Design for Technology Enabled Learning (TeL) has been perfected and refined over many years using established teaching principles, with many benefits to students. As a result colleges, universities, businesses, and organizations worldwide now offer their students fully accredited online degree, vocational, and continuing education programs in abundance.
Some other terms frequently interchanged with Technology Enabled Learning (TeL) include:
Online learning
Online education
eLearning
Web-based training
Computer-based training (generally thought of as learning from a CD-ROM)
Technology Enabled Learning (TeL) is a broad term used to describe learning done at a computer.
Why Technology Enabled Learning (TeL)
We have to keep on learning so that we can grow personally, professionally, socially and economically. For thousands of years, the paradigm of learning was the classroom-training model. In a time when formal learning was scarce, resources were concentrated around and centered on the availability of the educator, rather than the learner. Today Technology Enabled Learning (TeL) is the self- paced learning methods combine advanced technology and multimedia in a format that engages students so they learn faster, participate more actively and consequently, retain information longer.
Features of Technology Enabled Learning (TeL)
"Good teaching is good teaching, no matter how it's done." The old adage still rings true, and Technology Enabled Learning (TeL) brings with it new dimensions in education.
Some of the unique features of Technology Enabled Learning (TeL) are listed below:
Learning is self-paced and gives students a chance to speed up or slow down as necessary
Learning is self-directed, allowing students to choose content and tools appropriate to their differing interests, needs, and skill levels
Accommodates multiple learning styles using a variety of delivery methods geared to different learners; more effective for certain learners
Designed around the learner
Geographical barriers are eliminated, opening up broader education options
24/7 accessibility makes scheduling easy and allows a greater number of people to attend classes
On-demand access means learning can happen precisely when needed
Travel time and associated costs (parking, fuel, vehicle maintenance) are reduced or eliminated
Overall student costs are frequently less (tuition, residence, food, child care)
Potentially lower costs for companies needing training, and for the providers
Fosters greater student interaction and collaboration
Fosters greater student/instructor contact
Enhances computer and Internet skills
Draws upon thousands of years of established pedagogical principles
Has the attention of every major university in the world, most with their own online degrees, certificates, and individual courses
Benefits of Technology Enabled Learning (TeL)

Enables education anywhere, anytime and to anyone: The world-wide-web empowers the University to deliver training & critical information to its wide spread student base no matter where & what time zone the users are in. They can just access it whenever they feel like, from home or from office.

Always on: Class starts when you want. Facilitates self-paced learning- It gives the students the flexibility to go through the programme content at the time that is most convenient to him and thereby achieves an appropriate balance of work, family, community and educational commitments.
Better Access: Determining the best time to schedule a class and lure the student into the "brick and mortar" classroom is one of the major drawbacks of traditional training programs. Technology Enabled Learning (TeL) provides access to training for students when and where they need it.
Cost Savings: A much-touted benefit of Technology Enabled Learning (TeL) is cost savings. Lot of amount can be saved in travel and downtime alone by using Technology Enabled Learning (TeL). Training materials can be updated for a fraction of the cost of revising materials distributed by other means. Payback can be seen clearly over the near and long term.
Learner Focused: Technology can personalize content and anticipate learner's future information learning needs. It also can match content with each individual's learning style, experience and skills.

Measurable: Powerful Learning Management System (LMS) features make the implementation, hosting, tracking, testing, auditing and administration of online courses a flawless process. Technology Enabled Learning (TeL) provides secure and reliable systems for recording and capturing what an individual knows and is able to do.

Better Learning Outcomes: Research from around the world has proven that the Technology Enabled Learning (TeL) results better outcomes in terms of learning and knowledge retention when compared with traditional methods of teaching.

Faster Response Time: Time sensitive training can be delivered faster than through traditional classroom methods. By using communication technology to deliver training to multiple sites at the same time, Technology Enabled Learning (TeL) becomes a competitive advantage.
Better Use of "Experts": An expert presenter or trainer can be used more cost effectively with Technology Enabled Learning (TeL) than through traditional classrooms. Programs that require the presence of an expert can send the expert's message to multiple sites simultaneously - saving time and money. And the message is consistent for every delivery of the course.
Conclusion
In the new age, a lot of people admire the technology, innovations, and the invention of new things. As the research continues to progress and people look into the future, there is a possibility that technology will change our education system of learning. Technology Enabled Learning, specifically the computer and the Internet, would be able to replace the traditional school. Significantly, there are always good and bad consequences from changing one to another. A lot of people might think that Technology Enabled Learning is a good thing since it helps people and changes our life style to become easier, better, and faster.
 
 
 
Zooming User Interface (ZUI)

In computing, a zooming user interface or zoomable user interface (ZUI, pronounced zoo-ee) is a graphical environment where users can change the scale of the viewed area in order to see more detail or less, and browse through different documents. A ZUI is a type of graphical user interface (GUI). Information elements appear directly on an infinite virtual desktop (usually created using vector graphics), instead of in windows. Users can pan across the virtual surface in two dimensions and zoom into objects of interest. For example, as you zoom into a text object it may be represented as a small dot, then a thumbnail of a page of text, then a full-sized page and finally a magnified view of the page.

ZUIs use zooming as the main metaphor for browsing through hyperlinked information. Objects present inside a zoomed page can in turn be zoomed themselves to reveal further detail, allowing for recursive nesting and an arbitrary level of zoom. When the level of detail present in the resized object is changed to fit the relevant information into the current size, instead of being a proportional view of the whole object, it's called semantic zooming. Some experts consider the ZUI interface paradigm as a flexible and realistic successor to the traditional windowing GUI. But little effort is currently spent developing ZUIs, while there are ongoing efforts for developing GUIs.
Picsel Technologies has been developing technologies since 2000 to realize very fast zooming of multiple document formats including HTML, Word, Excel, PowerPoint, PDF, and various image/movie formats. The resulting UI effect is much like that of the recently released iPhone by Apple. Although zooming of a particular document format is only a part of what a "true" ZUI can be, it is an important step toward efficient use of limited display space on small screens.
Most recently, Microsoft's Live Labs has released a zooming UI for web browsing called Deep Fish for the Windows Mobile 5 platform.

Apple's iPhone (premiered June 2007) uses a stylized form of ZUI, in which panning and zooming are performed through a touch interface. It is not a full ZUI implementation since these operations are applied to bounded spaces (such as web pages or photos) and have a limited range of zooming and panning.

 
 
 
Simple Authentication and Security Layer (SASL)

In computing, Simple Authentication and Security Layer (SASL) is a framework for authentication and data security in Internet protocols. It decouples authentication mechanisms from application protocols, in theory allowing any authentication mechanism supported by SASL to be used in any application protocol that uses SASL. Authentication mechanisms can also support proxy authorization, a facility allowing one user to assume the identity of another. They can also provide a data security layer offering data integrity and data confidentiality services. DIGEST-MD5 provides an example of mechanisms which can provide a data-security layer. Application protocols that support SASL typically also support Transport Layer Security (TLS) to complement the services offered by SASL.

John Gardiner Myers wrote the original SASL specification (RFC 2222) while at Carnegie Mellon University. That document was obsoleted by RFC 4422, edited by Alexey Melnikov and Kurt Zeilenga. SASL is an IETF Standard Track protocol, As of 2010[update] a Proposed Standard.
SASL mechanisms
A SASL mechanism implements a series of challenges and responses. Defined SASL mechanisms include:
"EXTERNAL", where authentication is implicit in the context (e.g., for protocols already using IPsec or TLS)
"ANONYMOUS", for unauthenticated guest access
"PLAIN", a simple cleartext password mechanism. PLAIN obsoleted the LOGIN mechanism
"OTP", a one-time password mechanism. OTP obsoleted the SKEY Mechanism
"SKEY", an S/KEY mechanism
"CRAM-MD5", a simple challenge-response scheme based on HMAC-MD5
"DIGEST-MD5", HTTP Digest compatible challenge-response scheme based upon MD5. DIGEST-MD5 offers a data security layer
"NTLM", an NT LAN Manager authentication mechanism
"GSSAPI", for Kerberos V5 authentication via the GSSAPI. GSSAPI offers a data-security layer
GateKeeper (& GateKeeperPassport), a challenge-response mechanism developed by Microsoft for MSN Chat
A family of SASL mechanisms is planned to support arbitrary GSSAPI mechanisms.
SASL-aware application protocols
Application protocols define their representation of SASL exchanges with a profile. A protocol has a service name such as "ldap" in a registry shared with GSSAPI and Kerberos.
 
 
 
From The Editors Desk
 
Kayalvizhi M.S
Email - kayal@mindlogicx.com
 
Heartiest Greetings!

In this issue of Youniverse, we have presented an article on "Technology Enabled Learning" the article provides an overview of this new frontier in education delivery.

Our regular section on "Exam Alerts" informs you of the important dates of the upcoming entrance examinations. The section on "Complex simplicities" explains selected tech jargons and their meaning every month.

We hope you would find the information presented in this issue of Youniverse interesting and useful.

We welcome your thought, views, comments & suggestions to share information as knowledge.

 
Editor
 
 
Feedback
 
Please provide us with your feedback on how you feel about the Youniverse newsletter.You can also send us your queries on the VEDAS services.
top
Email to info@vedaslive.com
 
 
 
     Terms of use       Sitemap    Contact us
©Mindlogicx Infratec Limited.