QEEE session on Industry Bridge by CII
29th January 2016
QEEE session on Industry Bridge by CII (Security issues in Cloud Computing and Data visualization techniques) was organized by Computer Science and Engineering Department, Dronacharya College of Engineering, Gurgaon, on 29th January 2016. The session was presided by Prof. G. Saravana Kumar, IIT Madras and Mr Subrahmanya Rao Sr. Director - Technology at Cognizant Technology Solution. Faculty Coordinator Ms Renu of CSE department along with 20 students attended the session.
First Session :
Prof. Saravanakumar started the first session with discussion on topic “Data Visualization” Data visualization is both an art and a science. It is the presentation of data in a pictorial or graphical format. It enables decision makers to see analytics presented visually, so they can grasp difficult concepts or identify new patterns. Data created by internet activity and an expanding number of sensors in the environment, such as satellites and traffic cameras, are referred to as "Big Data".Processing, analyzing and communicating this data presents a variety of ethical and analytical challenges for data visualization. Patterns, trends and correlations that might go undetected in text - based data can be exposed and recognized easier with data visualization software.
He further added that Data visualization refers to the techniques used to communicate data or information by encoding it as visual objects (e.g., points, lines or bars) contained in graphics. It makes complex data more accessible, understandable and usable.
Data visualization can also :
1. Identify areas that need attention or improvement.
2. Clarify which factors influence customer behavior.
3. Helps to understand which products to place where.
4. Predict sales volumes.
Second Session :
Mr. Subrahmanya Rao presided the second session on security if “Cloud Computing”. Cloud computing the practice of using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server or a personal computer is a kind of Internet - based computing that provides shared processing resources and data to computers and other devices on demand.
Cloud Computing Security is the set of control - based technologies and policies designed to adhere to regulatory compliance rules and protect information, data applications and infrastructure associated with cloud computing use. Cloud security is an evolving sub - domain of computer security, network security, and, more broadly, information security. It refers to a broad set of policies, technologies, and controls deployed to protect data, applications, and the associated infrastructure of cloud computing.
The session also covered the objectives of taking the issues of Cloud Computing Security and Security identification of threats. He mentioned Cloud security architecture is effective only if the correct defensive implementations are in place.
Prof. Subrahmanya Rao added that Cloud Computing due to its architectural design and characteristics imposes a number of security benefits, which include centralization of security, data and process segmentation, redundancy and high availability. Cloud computing has “unique attributes that require risk assessment in areas such as availability and reliability issues, data integrity, recovery, and privacy and auditing”. It is generally recommended that information security controls be selected and implemented according and in proportion to the risks, Cloud security architecture is effective only if the correct defensive implementations are in place.
Through this session students gained in depth Knowledge on various concepts of Data visualization, cloud computing;control deployed to protect data and application.