Tuesday, May 11, 2010

Internet Safari - Awareness Program


Internet Safari is an awareness project jointly conducted by the National Internet Exchange of India (NIXI) and the International School of Information Management (ISiM), University of Mysore. The project aims to spread awareness about the internet and its usage among the faculty and students of Government schools, particularly those wherein the penetration of the internet is least. The objective of the project is to introduce the children to the internet technology and its tools and thus enable them to harness the unlimited possibilities beyond.
The project started with compiling a courseware that could be taught to the primary school children. I was decided to develop a courseware from scratch and present it using multimedia technology replete with animations. After a lot of effort the courseware was ready and a plan to implement the project was drawn. A total of 17 students of ISiM volunteered to teach the children.
The first leg of the project was scheduled on 12-13 April 2010 at the International School of Information Management (ISiM). The students were drawn from four schools.
1. Government School, Vontikoppal, Mysore
2. SaiBaba School, Jayalakshmipuram, Mysore
3. Mathrumandali School, Near Kalidasa Road, Mysore
4. Lalitha Convent, Vontikoppal, Mysore
The classroom was decorated with plants so as to lend a lively ambience to the proceedings. The schedule for each day was divided into 3 sessions. Two theory sessions of 45 mins each were held in the morning with a break in between. The afternoon session included 3 hours of hands-on practice that included real time Internet usage.
The program began with the lighting of the lamp by 4 children, each representing a school that participated in the event. Mr. Ashish Ray gave an introduction to internet technologies and a brief insight into the curriculum of the course. Mr. Chidananda K and Ms. Bhagyalakshmi then taught the students about the basics of internet technologies like, Connecting to the Web, Browsers, Forms, Searching, Email, E-Governance & Online Communities. Each topic was elaboraly explained with powerpoint presentations. Other relate topics like ISP, Basic components required to connect to the internet, how to choose internet connection etc were also covered.
Ms. Sukrita also presented the topic of GMAIL as an example of email account. Ms. Kavitha complimented her effort with teaching the basic of internet messaging using yahoo messenger as an example. Ms. Samatha then, covered the topics of social networks specially dedicated for kids. Ms. Bhagyalakshmi covered the topics concerning video hosting on internet using Youtube as an example.
The participating students were provided with lunch on both the days. They were also given ice creams during the session breaks.
A group of 17 volunteers handled the program effectively by dividing themselves into various sub-groups to delegate the responsibilities. The ‘Training group’ was responsible for tutoring. The ‘Target group’ identified set of schools and co-ordinated with them to get the students to attend the program. The ‘Management group’ coordinated with the other teams to arrange the logistics and handle the overall supervision of the activities.
The team comprised of,
Ashish Ray
Kavita
Neeranjan
Chidananda K
Samatha
Ram Prabhakaran
Gagan
Soumya
Phani
Bhagyalakshmi
Sukritha
Sunil Kumar B A
Dun YunQuing
Rajalakshmi
Akshaey
Wu Lijuan
Vamshi


On completion of the course (theory and practical sessions), an Online Quiz was organized. The quiz comprised of 50 objective type questions for a total 100 marks. Of all the students who took up the test, best 5 performers were selected for a prize.
The five winners were,
Varsha Urs C
Keerthi Kumar
Pragyna
Meghana
Pramashree


Feedback forms were circulated among the participants. The filled up forms were collected from them to know their opinion about the course and the way it was handled. Prof. Shalini R. Urs, Executive Director, ISiM presented the prizes to the five winners of the quiz. She also handed over the participation certificates and the courseware (interactive multimedia disk) to each of the participant. She invited couple of participants to speak about their opinion of the event. In the end, all the participants and the coordinators of the event posed for a group photograph.  


 

Other pictures taken during the event

To know more about the event/project, write to office@isim.ac.in


Tuesday, May 4, 2010

NVI Awareness Program


An event Report of
NEW VENTURES INDIA AWARENESS PROGRAM
4-6 PM, 27-Apr-2010, ISiM, University of Mysore


‘The New Ventures India’ is a joint initiative of the CII - Sohrabji Godrej Green Business Centre, Hyderabad and the World Resources Institute, Washington DC. The initiative was established and supported by USAID under the Global Development Alliance. The mission of the organization is to match scalable green business opportunities with skills, talent, technology, markets and money. The program identifies companies within its portfolio and facilitates the funding for these projects.

An awareness program was organized on 27-Apr-2010 in Mysore at ISiM with an objective to sensitize various stakeholders about green business opportunities and what NVI is doing to assist the development and growth of green businesses by facilitating fruitful interaction between entrepreneurs, mentors, business advisors and potential investors. The event was aimed at attracting emerging entrepreneurs who are currently running green business enterprise and are looking to scale up. The service providers, investors, successful entrepreneurs, policy makers were also targeted.

The program started at 4PM with Prof. Shalini R. Urs, Executive Director, ISiM  introducing the guests to the audience. Mr. Hemant Nitturkar, New Ventures India was the first person to speak. He introduced NVI as a business accelerator that supports environmentally- and socially-responsible enterprises in emerging economies. He also said that they identify small and medium-size enterprises (SMEs) with high-growth potential that generate strong social and environmental benefits and provide then them with business advisory services and access to capital. Additionally, they facilitate with local and international investment communities and networks to help further develop capital resources available to these enterprises. He proudly said that NVI operates a global network of six centers of sustainable entrepreneurship in Brazil, Mexico, China, Colombia, Indonesia and India. He also spoke about the emerging opportunities in the Green Business Space.

Ms. Nandini Vaidyanathan, CARMa Ventures Services was the next speaker. She addressed the gathering on the topic of ‘Things to watch out for while growing your Business’. She started her talk by addressing the basic issues like what it takes to become an entrepreneur in the first place. She then explained with examples the various nuances that make a difference in the business plan. She advised the entrepreneurs to revisit their business model often, put in place the processes and people among other things.

The final presentation was by Mr. Indus Khaitan, The Morpheus. He spoke about ‘What do investors look for before investing in a company’. He spoke in particular about the 5 main ingredients that any investor will look for in a start-up before investing in it.

After the presentations, the panel addresses to some of the queries from the audience. After the Q&A session, the audience and the panel members left for networking over high tea. 


Event Photographs

 

Thursday, April 15, 2010

ISiM Workshop on SNA

A three day workshop on the social network analysis was organized at the ‘International School of Information Management (ISiM)’, University of Mysore. This document elaborates the details of the 3 day event.

About the workshop/relevance:
Social network analysis as a field of study is growing rapidly and in popularity. It is now evolving into a new paradigm across academia, business, industry, popular culture and folklore. It is both an approach and a tool to uncover and understand the hidden side of connections that drive certain phenomenon involving a network of human players. SNA is the technique of mapping and monitoring the relationships and flow of knowledge between individuals, teams, organizations, electronic devices, URLs and other interconnected entities. With the success of social networking tools like Facebook, Twitter, Myspace and Orkut with the masses, their influence on the group behavior and opinions are being increasingly felt every day. SNA is since being perceived from being a suggestive metaphor to an analytic approach to a paradigm, with its own theoretical statements, methods, social network analysis software, and researchers.


Workshop Objective:
Introduce the audience to the goals and perspectives of network analysis.
o Understanding of network data and issues related to collection, validity, visualization and mathematical/computer representation.
o Methods of detection and description of structural properties such as centrality, cohesion, subgroups, cores, roles etc.


At the end of the course, the participants will be,
o Able to examine data in 'social networks way'
o Identify and formulate network analysis problems
o Solve them using network analysis software and Interpret the obtained results.


About the Faculty:

Kevin Crowston is a Professor of Information Studies at the Syracuse University School of Information Studies since 1996. He received his A.B. (1984) in Applied Mathematics (Computer Science) from Harvard University and a Ph.D. (1991) in Information Technologies from the Sloan School of Management, Massachusetts Institute of Technology (MIT). His current research interests include: empirical studies of coordination-intensive processes in human organizations; theoretical characterizations of coordination problems and alternative methods for managing them; and design and empirical evaluation of new kinds of computer systems to support people working together.


Facilities at the workshop:
Accommodation was offered to the outstation participants at a discounted rate at ‘The Fern Residency’. The delegates were handed the workshop kit that included A bag pack, Workshop presentation Material, Workshop CD (Pajek software, Presentation slides, Reference book etc), Notepad and a pen. The participants who were not carrying their own laptops were provided with individual desktops/laptops to be used during the workshop.


Workshop Schedule:
The contents of the workshop were spread over 3 days. The detailed session plan was as mentioned below.



Workshop Participants :
There were 29 participants in all for the workshop. They were drawn from all parts of the country and abroad. The classification of the participants is pictorially represented below.


Day 1 Proceedings:
The workshop started with the introduction of the participants. Each of them explained their objectives behind attending the workshop. The workshop started with running through the basics of graph theory. The distinction between the regular network analysis and the social network analysis was brought out. The participants were then informed about the various social networking relations that can exist between individuals – friendship, Liking, business transactions, information/knowledge sharing, formal relations, biological relations, associations and affiliations being few of them.


After the tea break, issues related to network analysis were taken up. Network was defined as the sum of the graph and its constituent data. The graph itself is constituted of two elements – Nodes and Links. Therefore network can be redefined as the data that resides on the nodes and that which can be interpreted by the links. More concepts were understood such as the size of the network, density of the graph, Average degree, directed network, reciprocity of the network, adjacency matrix, collecting network data and completeness of data.
After the lunch session, the participants were introduced to Pajek – Large Network Analysis tool. The ‘World Trade’ dataset was taken as an example to understand how the tool can be leveraged to understand the network and the social interactions among the nodes.



Day 2 Proceedings:
The day started with the review of previous day’s sessions. ‘Knoke’s Exchange Network’ (KnokBur) was taken as an example to understand some of the concepts of power law networks and degree distribution. After this, the issue of ‘Reachability’ was taken up for discussions. The concepts like ‘Walks’, ‘Paths’, ‘Cycles’, ‘Geodesic distance’ and ‘diameter’ were discussed as applicable to the social network analysis.
More concepts were introduced such as structural holes and Brokerage. These concepts help in identifying the centrality (nodes which are the most important in the network). It was learnt that even the central nodes can have varying degrees of centralization. Prof. Crowston explained further that based on the number of links that a node receives compared to the links that it sends, the ranking of a node can be determined. He also explained how different kinds of networks have to be analyzed differently to assign appropriate rankings to its nodes.


After the lunch break, the participants worked on various datasets/cases to implement their learnings. Some of them even tried to extract fresh network data for the purpose.


Day 3 Proceedings:
The final day’s session mainly concentrated on the concepts of ‘Position and Social Roles’. Positioning refers to identifying the nodes across networks that have similar attributes as defined by the patterns of relations. Social roles refer to the relation and identification of one node with respect to the other. For example, a ‘father’ is defined by the mandatory presence of the ‘child’ node etc.


During the lunch break, the team gathered for a group photograph. And after the lunch session, participants worked with datasets to explore more network concepts using the Pajek software. The workshop concluded with Prof. Kevin Crowston handing over the certificates to the participants.

Pictures taken during the event 


Day 1

Day 2


Day 3

To know more, please write to Mr. Jayanth Jagadeesh at (jayanth@isim.ac.in / office@isim.ac.in).

PGDIM Batch 2010 (MIS course)

Back Row (L to R): Kevin, Shajia, Sanil, Ratan, Sourav & Jayanth Jagadeesh
Front Row (L to R): Gulam, Salah Saif, S. Kishore (Faculty), Kunal, Mohd. Hosein, Tabassum & Vidya Priya

Monday, February 8, 2010

ECM - Class 2010


Standing (L to R): Shwetadri, Alka, Karjan, Pravin, Prasanna, Vijay, Pavan, Mr. Bhanu Potta, Ganesh, Mohammad, Aswani, Jahfar, Salem, Sivamallaiah
Kneeling (L to R): Artmiz, Nikesh, Kiran, Priyanka, Khushboo
Sitting: Chiranjeevi

BioInformatics - Class 2010


Last Row: Sivamallaiah, Srikanth, Adithya, Ganesh, Prof. VP Kallimani, Shwetadri, Priyanka, Aswani, Nazia
Middle Row: Kiran Babu, Nagamallikarjuna, Pravin, Vikash
Front Row: Vijay, Karjan, Prasanna

IPR & Cyber Laws - Class 2010


Standing (L to R): Salem, Prasanna, Vijay, Karjan, Mohammad, Jahfar, Pavan, Aswani, Ganesh, Srikanth
Middle Row (L to R): Sagar, Suraj, Shobana, Priyanka, Khushboo, Nazia, Kiran, Alka, Artmiz
Front Row (L to R): Adithya, Vikash, Nagamallikarjuna, Nikesh, Shwetadri, Prof. AVR Rao, Chiranjeevi, Kiran Babu, Sivamallaiah, Pravin, Jayanth

Seminar on 'Enterprise Content Management (ECM)'

Date and Time: Saturday, 6th Feb 2010, 10Am to 1PM
Venue: ISiM, University of Mysore

The event started with Prof. Shalini Urs, Executive Director, ISiM welcoming the guests. Mr. Bhanu Potta, faculty for ECM to the M.Tech students of ISiM, then introduced the two guests – Dr. Arun Gowda and Mr. Arjun Thomas. Of the two speakers, Dr. Arun Gowda who is currently the Global Product Manager with Emerging Market Services Unit of Nokia was the first one to address the gathering.

Dr. Arun delivered his lecture on the topic of ECM in Pharma Research Enterprises. He started off the presentation by pointing out that the latest cinematic blockbuster - AVATAR had a script that ran into 6000 pages and it grossed USD 2 bn worldwide. With that as yardstick, he asked the audience to imagine what amount of content must have been developed to bring out ‘Lipitor’ – cholesterol reducing drug by Pfizer grossing an yearly revenue of over USD 10 bn for over a decade now. Citing this as a metric of the amount of content/research that goes into the making of a Pharma product. He then gave an insight in to the typical life cycle of a pharma drug and the various types of content that gets generated all along.

He further pointed out that the typical drug related content follows a life cycle of five stages – Collection, Storage, Processing, Analysis and Dissemination. All along the data cycle, the technology acts as the enabler to draw conclusions and interpretations. He acknowledged the role of the Web crawlers, Analytic tools, Data mining techniques and Advanced Search features in assisting the clinical research.

Dr. Arun then went on to point out the various forms of content that get generated during the lifecycle of drug research. The Clinical Test Protocol, Case reports Forms and Clinical Trial Data forms the bulk of data. These data, which is inherently confidential in nature is then stored in a secure database. The data is then analyzed employing advanced Clinical Trial Data Management (CDM) softwares. The analysis is done by the copy editors, Statisticians and Medical writers who report their findings through Regulatory Submission Reports, Posters and Publications among other means. He stressed that the entire process is carried out under utmost data confidentiality environments, perhaps next only to those in automobile manufacturing industry.

He made a special mention of Oracle, Accenture and Quintiles as the leading technology providers for clinical R&D data analysis. Pennside, PharmARC, Genpact and TCS are some of the companies known for their expertise in Pharma related Data Analytics.

The second part of the seminar was on the topic of ‘ECM in IT Enterprises’ presented by, Mr. Arjun Thomas, Sr. Consultant at the Knowledge Management Office at Dell Perot Systems. Mr. Arjun started his presentation by defining the ECM as applicable to the IT enterprise. He pointed out that the IT companies typically ride the wave of ECM and are more likely to endorse new trends in the field.

He pointed out that since the advent of the Web 2.0 framework, many new channels of content creation have emerged. He compiled most of the new channels in a wagon wheel picture.

He particularly, pointed out the popularity of Wiki’s, Facebook, Blogs, Folksonomy, Youtube, RSS feeds and SlideShare among our generation and their impact on the social life. In a lighter vein, he also pointed out that “These days, one is so busy social networking on the internet that he has no time for face-to-face socializations”.

He then put forth the concept of incorporating these tools within an organization’s intranet to engage the employees as an organizational strategy. Such a technique could result in better dissemination of information, formation of collective opinions and effective management of human resources. He also opined that such a framework can also be employed to create whitepapers to capture knowledge and expertise that could be archived for later use.
He further mentioned how the ECM tools can be leveraged to meet organizational goals. He concluded his talk with some tips on looking out for usability and customer experience factors to create an effective ECM system.

The event concluded with Prof. Shalini proposing the ‘Vote of Thanks’ and presenting the speakers with a memento.

View Event Pictures

Wednesday, January 27, 2010

Special Lecture: Information Control and Terrorism

A special Lecture on “Information Control and Terrorism: Tracking the Mumbai Terrorist Attack through Twitter” by Dr. H. Raghav Rao Professor of Management Science and Systems, University at Buffalo, was organized by ISiM on January 19,2010 at 12.30 PM.

Prof. Rao’s talk about information warfare, situational awareness and decision making by terrorists in the context of Mumbai terror attacks, began with a very brief account of his personal interviews with the Mumbai police during August 2009, as part of his research. Revisiting the events that led to killing of least 173 people and wounded another 308 people on 26th of Nov 2008, he pointed out that data shows that live media feeds provided the terrorists with vital information about the situation and helped them in getting an upper hand. As soon as the unfortunate event began unfolding, social networking sites such as Orkut, Facebook and Twitter were flooded with situational information that described in detail the events happening at CST, Leopold CafĂ©, Taj Mahal Hotel and Oberoi Trident. These vital pieces of information poured in by the common users were mostly the details of the latest developments at the hot spots. Soon, the media also sprung into action and started competing with Twitter in beaming the whole show live to the world.

Twitter - a free social networking and microblogging service that enables its users to send and read messages (tweets) of up to 140 characters and can be forwarded to other people just like SMS’es, were critical sources both for the terrorist and others. Prof. Rao opined that though intentions may be to share information about the developments, they do end up as a source of sensitive information about the situation and the rescue operations to the terrorist also.

Drawing excerpts from, “Mumbai Terrorist Attack: Dossier of Evidence (2009)” and “26/11 Mumbai Attacked", Edited by Harinder Baweja, Roli, 2009, Prof. Rao evidenced that the terrorists , through synchronous monitoring of Twitter and other live media established the situational awareness (SA). SA is being citied as one of the facts that enabled terrorists to hold their grounds for three days. Citing another example from the book, 26/11 Mumbai Attacked, wherein, a certain Pakistani handler monitoring the media alerts and commands the on-spot terrorists that the media were aware that they were hiding in room number 360 and 361. He further instructs them to relocate to another holding position and also to destroy any cameras in the building.

The audience - a mix of students, academics, journalists and persons from the police and army participated in the lively discussions that followed the talk. Some among the audience also opined that the media should be banned from telecasting the proceeding Live, to which Prof. Rao responded saying that it might be difficult to have a blanket ban; however it could be a good idea to delay the broadcast. He suggested that ‘information control’ could be employed as a means to maintain information superiority such that it prevents the terrorists from making informed decisions. Prof. Rao concluded that it is important to understand the dangerous implications of uncontrolled and ad hoc dissemination of situational information.

"Click Here" to see the photographs taken during the event.