Skip to main content

Posts

Starting Simulation in Excel

Steps for Starting Simulation in Excel 1. Generating randomness In simulation most important work is to generate random ness. You can use inbuilt rand()function for the same. When you enter the formula =RAND() in a cell, you get a number that is equally likely to assume any value between 0 and 1. Thus, around 25 percent of the time, you should get a number less than or equal to .25; around 10 percent of the time you should get a number that is at least .90, and so on 2. In order to conduct discrete simulation you need to use values of a discrete random variable. 3. Excel's VLOOKUP function stands for vertical lookup helps to find specific information in large data tables such as an inventory list of parts or a large membership contact list. Enter the data in the cells. Let the first column of data contains the part names (say B ) and the second column (column C) contains the price of each part. Vlookup can be used 1.Click on cell B1 and type the title lets say Pa

Wikipedia still among the top 10 internet sites in the world

Source:http://economictimes.indiatimes.com/news/news-by-company/corporate-trends/best-companies-to-work-for-2012-what-makes-google-top-the-list/articleshow/14804662.cms Wikipedia is still in the top internet sites. The public knowledge website is more than a decade old but still ranks in the top 10 websites. As compared to other social networking sites Wikepdia is not user friendly but still it is popular as it is seen as the knowledge guru. As written in an article in economic times Wikipedia , the free, open-source online encyclopedia which is largely unchanged from when it began in 2001, needs upgrading in an era where people are turning to social media like Facebook and Twitter. Users feel the need to improve the interface from user point of view."

Google Penguin

Google Penguin is a Google algorithm. The update is aimed at decreasing search engine rankings of websites that violate Google’s Webmaster Guidelines by using black-hat SEO techniques such as keyword stuffing, cloaking,participating in link schemes,deliberate creation of duplicate content, and others. Naming the algorithm update Penguin update went live on April 24, 2012 How different Penguin from previous updates? Before Penguin Google released a series of algorithm updates called Panda. It aimed at downranking websites that provided poor user experience. To identify such websites, a machine-learning algorithm by Navneet Panda was used, hence the name. The algorithm follows the logic by which Google’s human quality raters determine a website’s quality. In January 2012 Google launched page layout algorithm update which targeted websites with little content above the fold. All the three updates that Panda, Penguin and page layout update share is to display highe

Google Panda

Google Panda Google Panda is a change to the Google's search results ranking algorithm /as on February 2011.Google's Panda has received several updates since the original rollout in February 2011, and the effect went global in April 2011. Google's new Panda machine-learning algorithm is named after engineer Navneet Panda. Basic goal was to look for similarities between websites people found to be high quality and low quality. Major Objective: The change aimed to lower the rank of "low-quality sites", and return higher-quality sites near the top of the search results. The Panda process Google Panda was built through an algorithm update that used artificial intelligence. Human quality testers rated thousands of websites based on measures of quality, including design, trustworthiness, speed and whether or not they would return to the website . Google has introduced many new ranking factors and some of the older ranking fa

New Plan For Cyber Security

 By:- Josy Joseph, TNN In the face of incessant attacks on its crucial networks, the government is finalizing an elaborate plan to upgrade India's cyber security capabilities. By stepping up protection levels, putting in place real time command- and- control centers and delineating responsibilities among various agencies, the government hopes to take on the onslaught of international cyber attacks on its critical infrastructure.  Among the proposals are dedicated command- and- control centers to monitor critical infrastructure real time, and computer emergencies response teams for key sectors such as power and elaborate protocols for all involved. Senior sources told TOI that the cabinet committee on security " should approve in a few weeks" the multilayer security plans to protect India's critical infrastructure. " the NSA (National Security Advisor) and the cabinet security are working on the final plan." sources said. On top of this plan

While The World Braces For E-threats, India Moves Slow

By- Rajat Pandit, TNN After the first four "real" battlefields of land, air, sea and now increasingly space, India needs to get serious on the virtual front as well. The country should begin planning a full-fledged military cyber command, instead of the current piecemeal and disjointed steps to bolster cyber security, grappling as it already is with incessant online espionage and other attacks from China, Pakistan and others. This was the clear takeaway from the deliberations on cyber security and cyber warfare at the high-profile Munich security conference on Sunday, even though hardly figured in the discussions. experts said, the emergence of "cyber weapons" like the Stuxnet Software "Worm" that was used to sabotage Iran's nuclear program, had changed the entire security ball game, almost on a par with the use of nuclear bombs in 1945. "Someone used a cyber weapon in peacetime to physically destroy what the nation(Iran) could describe as

See and Learn

By: Diptiman Dewan children understand better when they see than when they read.If technology can be made an enabler to let children study subjects with a visual dimension added to books. learning is faster and consequent and dropouts rates of students also decline. "computers bring about a dramatic change from the mundane process of learning at school and reduce dropout rates, as seen in pilot projects we have conducted in Karnataka. using networking technology, teachers and students can see each other real -time.while kids from multiple villages can see and hear one other on screen, they also take the same class together. every child is audible and visible in the different classrooms," explains Aravind Sitaraman, President, Inclusive Growth, CISCO. Cisco is using networking technology to educate children in rural areas. "one teacher- many classrooms" is a method followed whereby students can see the teachers and what he or she teaches; the teacher can point