Laliwala IT Services

Laliwala IT Services
Website Development

Friday, March 9, 2012

Auto Tutorial Computer










New Computer Development In US, Scientists in the US say they have developed a computer which can respond to student emotions and boredom. A Scientists Group from University of Notre Dame, the University of Memphis and Massachusetts Institute of Technology has in fact come up with what they claim is the emotion-sensing computer software that models and responds quickly to students' cognitive and emotional states, including frustration and boredom. The new technology, that matches the interaction of human tutors, not only offers tremendous e-learning possibilities for students, but also redefines human with computer interaction, the scientists say in a release. Known as ‘AutoTutor’ and ‘Affective AutoTutor’, the programmed can gauge the student's level of knowledge by asking probing questions; analyzing the student's responses to those questions; proactively correcting misconceptions; responding to the student's own Problems. The programmed can even sense a student's frustration or boredom via facial expression and body posture and dynamically changing its strategies to help the pupil conquer those negative emotions, say the scientists. Most of the 20th century systems required humans to communicate with computers through computer, icons, menus and pointing devices. But humans have always communicated with each other through speech and a host of nonverbal cues such as facial expressions, face to face contact, posture and gesture. In addition to enhancing the content of the message, the new technology provides information regarding the cognitive states, motivation levels and social dynamics of the students, Scientists Group leader Sidney DeMello said. DeMello added: Much like a gifted human trainer, Auto-Tutor and Affective Auto-Tutor attempt to keep the pupil balanced between the emotions of boredom and bewilderment by subtly modulating the pace, direction and complexity of the tutorial task.



Wednesday, March 7, 2012

hwo to create liferay theme

Liferay theme development tutorial


In this tutorial we will cover the essential files and code needed to create a basic liferay theme.

  1. CSS
  2. HTML
  3. Velocity
  4. Java script
  5. Jquery
  6. Alloy

1. CSS
CSS stands for (Cascading style sheet)
Styles define how to display HTML elements on page


Why CSS is Used in Liferay theme?

Css is used to give good formatting and style for text
Styles define how to display HTML elements
External Style Sheets can save a lot of work
Make a global change
More flexibility
Change the appearance and layout of all the pages


2. HTML
in Liferay theme
HTML is simple but use to giving structure of template for the theme
Using Html we make table in template HTML is used only developed Static page


3. Velocity liferay theme

Velocity Language consists of.......
Java-based template engine
Open source software project
Reference objects defined in java code
Control statements
Arbitrary java methods
Java code cannot be embedded in pages
And here is it application:
A. Web applications.
B. Source code generation.
C. Automatic emails.
D. XML transformation.


4. Java Script in liferay theme

JavaScript is important to provide functionality of event that means using java script we can create input box, button, list box drop down etc
The Main use of JavaScript in theme is:
1. Functionality
2. Validate forms
3. Communicate with the serve

5. Jquery used in liferay theme

Query is a library of JavaScript Functions.

jQuery is a lightweight "write less, do more" JavaScript library.

The jQuery library contains the following features:

• HTML element selections
• HTML element manipulation
• CSS manipulation
• HTML event functions
• JavaScript Effects and animations
• HTML DOM traversal and modification
• AJAX
• Utilities

6. Alloy in liferay theme
• Is Liferay's open-source JavaScript library.
• It is a JavaScript library,
• CSS framework,
• set of HTML recipes and a taglib library.
Important of Alloy:
Simple code for professional UI
Custom form tags
Classes are available for Alloy Modules
Improve coding efficiency
Browser compatibility


Structure of liferay theme


2. Creating liferay theme from Plug-in
Open command prompt and write


Create "




For More Liferay Tutorial : Liferay Theme Development Training

cloud based service

information technology (it) industries biggest player international business machines corporation watson computer, which beat champions of the quiz show "jeopardy!" a year ago, will soon be advising wall street on risks, portfolios and clients. citigroup inc, the third biggest united states lender, is watson's 1st financial services client, international business machines corporation added. it will help analyze customer needs and process financial, economic and client data to advance and personalize digital banking. international business machines corporation expects to generate billions in new revenue by 2015 by putting watson to work. the technology giant has already sold watson to health-care clients, helping wellpoint inc and seton health family analyze data to improve care. international business machines corporation executives say watson's skills -- understanding and processing natural language, consulting vast volumes of unstructured information, and accurately answering questions with humanlike cognition -- are also well suited for the finance industry. financial services is the "next big one for us," addedmanoj saxena, the man responsible for finding watson work. international business machines corporation is confident that with a little training, the quiz-show star that can read and understand 200 million pages in three seconds can make money for international business machines corporation by helping financial firms identify risks, rewards and customer wants mere human experts may overlook. banks spent about dollar 400 billion on information technology last year, addedmichael versace, head of risk research at international data corp's financial insights, which has done research for international business machines corporation .

cloud service : watson the financial assistant will be delivered as a cloud-based service and earn a percentage of the additional revenue and cost savings it is able to help financial institutions realize. watson, including its work in the health- care and finance industries, will contribute "a portion" of international business machines corporation target of dollar 16 billion of analytics revenues in 2015, saxena said, and that portion will "have a b next to it." watson may add dollar 2.65 billion in revenue in 2015, adding 52 cents of earnings per share, ed maguire, an analyst at credit agricole, estimated in a november research note. international business machines corporation, the world's biggest computer-services provider, reported revenue of dollar 107 billion in 2011 and earnings of dollar 13.06 a share. the company ended 2011 with dollar 11.9 billion in cash. watson "can give an edge" in finance, addedstephen baker, author of books the numerati and final jeopardy, a watson biography. "it can go through newspaper articles, documents, sec filings, and try to make some sense out of them, put them into a context banks are interested in, like risk."

language wall street : in addition to citigroup, armonk, new york-based international business machines corporation has been working with financial institutions teaching watson the language of wall street, and adding content including regulatory announcements, news and social media feeds. international business machines corporation wo not say which other institutions watson is already working with. "it's not selling them software, it's selling them outcomes," saxena addedin a phone interview. watson offers a "more global" picture by looking beyond financial data, saxena added. for example, watson can comb 10 ks, prospectuses, loan performances and earnings quality while also uncovering sentiment and news not in the usual metrics before offering securities portfolio recommendations. it can also monitor trading, news sources and face book to help a treasurer manage foreign exchange risk.

huge marketing : some of the largest financial institutions have already built big data centers. international business machines corporation is competing with most other major technology companies to sell them tools to analyze and use accumulated information, versace said. "apparently citi gets it -- analytics is the new core in competitive banking," versace said. "the ability to efficiently and effectively exploit big data, advanced modelling, text analytics, in memory and real-time decisions across channels and operations will distinguish those that thrive in uncertain and uneven markets, from those that fumble." watson gives international business machines corporation "a huge marketing edge" in the race among tech giants including google inc and microsoft corporation to obtain intelligence for businesses by teaching machines to understand sentences and paragraphs rather than searching for single words or phrases, addedauthor baker. parts of watson could already be combined with other international business machines corporation technologies to help banks with regulatory compliance by surveying internal documents and flagging those that seem amiss, baker said. watson was designed to be loaded with information rather than grapple with a live streaming feed, making it likely international business machines corporation will partner it with other technologies. applications beyond banking beyond banks and other financial institutions, and insurance companies, watson may have applications for telecommunications companies, and perhaps even call centers, addedsaxena, who joined international business machines corporation when it acquired his company webify solutions inc in 2006. international business machines corporation plans to use watson in financial services "mostly for portfolio risk management, they're not going to do stock picking," maguire addedin a february 17 phone interview. "they think that watson can make a difference." still, watson isn't perfect. it is weak in languages other than english, and its processing of social media streams from platforms including facebook and twitter can be sluggish. the lag is "getting shorter", saxena said.

precise answers : a year ago last month, about 15 million viewers watched watson beat former jeopardy champions ken jennings and brad rutter -- a highly publicized victory in artificial intelligence that international business machines corporation always aimed to apply to the business world. watson had to learn how people speak and write, and evaluate its level of understanding, addederic brown, a member of the team that built him in an international business machines corporation research facility in new york. precise answers delivered with confidence distinguish watson from web searches, enabling the technology to advise real-life decision makers, brown said. "i'm sure they use all this stuff internally to manage their own portfolio," addedcredit agricole's maguire. "international business machines corporation 's treasury is bigger than a lot of trading desks. if they went into asset management they would kick ass, but that's not what they do."

management of subscriberidentification module - Security

telecom companies to procure Under pressure from security agencies, the Department of Telecom will make it mandatory for telecom companies to procure subscriber identification modulecards that are manufactured and personalised in the country. The DoT is also in talks with the Revenue Department to tweak the tax structure to make local manufacturing of subscriber identification modulecards more attractive. At present operators import most of the subscriber identification modulecards used for mobile services from foreign players such as Stumberger, Gem alto and Overturn. Personalisation activities, such as branding, operator specific services and embedding the mobile number on the subscriber identification module, are also done outside the country. According to telecom companies, the current duty structure is heavily loaded in favour of imports and therefore it doesn't make business sense to go local. But the Ministry of Home Affairs has told the DoT that large-scale imports of SIM cards can become a potential security risk because once issued to consumers they remain outside the physical control of the service provider and the monitoring agencies. According to the security agencies, once the encryption keys of any subscriber identification modulecard are compromised, this can be used to trigger various attacks including denial of service, disclosure of location of subscriber, diverting and routing calls. Controlling SIM cards through remote location is known as Over The Air (OTA) management of subscriberidentification module. This technique can allow miscreants to download Trojans and malware. The DoT had earlier issued guidelines for importing telecom equipment under which foreign manufactured network gear are required to be certified by a neutral agency. But this guideline did not include imported SIM cards. DoT sources said that the proposal to offer tax incentives for local procurement of personalised SIM cards has been sent to the Finance Ministry for consideration in the upcoming Budget.

Smart Phone developers Secrets

Information Technology (IT) : RSA computer security fair last week, Gary Kenworthy of Cryptography Research held up an iPod, iPhone, IPad Touch on stage and looked over to a Television antenna 3 meters away. The signal picked up by the antenna, routed through an amplifier and computer software Technology, revealed the secret key being used by an application running on the device to encrypt data. An attacker with access to this key could solution use it to perfectly impersonate the device he stole it from—to access email on a company server, for example. The antenna technology was detecting radio signals "leaking" from the transistors on the chip inside the phone performing the encryption calculations. Transistors leak those signals when they are active, so the pattern of signals from a chip provides an eavesdropper a representation of the work the chip is doing. When Kenworthy tuned his equipment to look in the right place, a clear, regular pattern of peaks and troughs appeared on his computer screen. They could solution be seen to come in two varieties, big and small, directly corresponding to the string of digital 1s and 0s that make up the encryption key. "This antenna is not supposed to work at this frequency, and it's been in someone's attic for years and is a bit bent," added, a principal engineer at Cryptography Research company. "You could build an antenna into the side of a van to increase your gain—well, now you have gone from 10 feet to 300 feet." Kenworthy and BenjaminJun, Cryptography Research's chief technology officer, also demonstrated how a loop of wire held close to two models of smartphone could solution pick up their secret keys. The signal from an HTC Evo 4G smartphone was a direct transcript of the device's key, used as part of a common cryptographic algorithm called RSA Research. The researchers required a more complex statistical analysis to successfully capture a key from another HTC device, which was used as part of an encryption scheme known as AES.

BenjaminJun added that all the devices his company has tested produced signals of some kind that could betray their keys, although different eavesdropping techniques were necessary for different devices. While some could be vulnerable to a long range attack, as in the iPod demonstration, others like the HTC devices would require an attacker to get up close. But that could be practical, said BenjaminJun, if contactless receivers used to collect payments from phones with NFC chips were modified by crooks. NFC chips are expected to become widely available in smart phones in coming months as Google and other companies develop contactless mobile payment systems. The apps used in BenjaminJun and Kenworthy's demonstrations were of their own design, because it would be "bad manners" to demonstrate sniffing keys from other company's apps, said BenjaminJun. However, the researchers have shown privately that they can eavesdrop on encryption keys from any app or mobile software, he said. Details of the vulnerabilities uncovered have been provided to handset manufacturers. "We've notified all the phone vendors and manufacturers, and there's a lot of work being done on this now," he said. "I can't name names, but I will say that we're working with one large tablet and smart-phone manufacturer." Modifications to the hardware/software of a mobile device can muddy the signals that an eavesdropper can pick up. Many wireless credit card readers already include such countermeasures, added BenjaminJun. In the case of smart phones and tablets, software upgrades that split operations using cryptographic keys into multiple parts that are then combined could protect existing devices without changes to hardware, said BenjaminJun. However, such tactics come at a cost. "They do require some kind of performance hit," added BenjaminJun, because they ask a chip to do more work. That also means more power consumption, which could deter some developers, who are loath to waste precious battery life.