TechWire

Tag - Software

අත්වැරදීමකින් Delete වුන Files Recover කර ගැනීමට පහසු මගක්

අපේ අතින් බොහෝ වෙලාවට වෙන දෙයක් තමයි අත්වැරදීමකින් Files Delete වීම. නැතිනම් Delete කරන ලද File එකක් පසුව අවශ්‍ය වීම. අප සාමාන්‍ය ආකාරයට Delete කළහොත් Recycle bin මගින් Recover කර ගැනීමට හැකිවේ. නමුත් Permanantly Delete කරන ලද (Shift+Del) files recover කරගැනීමට Software එකක් අවශ්‍ය වනවා.

 

ඒ අතරින් පහසු Software එකක් Recuva කියන්නේ. අපි බලමු Permanant delete කරපු File එකක් Recover කරන්නේ කොහොමද කියල. Read More

ඕනෑම Windows Password එකක් Reset කරන්නේ මෙහෙමයි

windows-password-recover

හදිසියකින් වත් Windows password එක අමතක වුනොත් PC එක Format කරන එකද කරන්නේ? අපි අද කියලා දෙන්නේ, Format නොකර Password එක Reset කරගන්න විදිය පිළිබඳව. මේ සඳහා අපි Software එකක් භාවිතා කරනවා. Software එකක් නොමැතිව වුවුද Reset කරන්න පුළුවන්, ඒත් ටිකක් අපහසුයි. අපි ඒ පිළිබඳව පසුව ලිපියකින් දක්වන්නම්. දැන් අපි බලමු කොහොමද මේ දේ කරගන්නේ කියලා. Read More

යුනිකෝඩ් සහ සිංහල යතුරුලියනය

මෙම ලිපියෙන් මාගේ බලාපොරොත්තුව ප්‍රාදේශීයකරණය හෙවත් සිංහලට පරිවර්තනය සඳහා අවශ්‍ය වන තාක්‍ෂණික පසුබිම ගැන මූලික සටහනක් තැබීමටයි.

Official Unicode Consortium code chart

නිළ යුනිකෝඩ් කේත වගුව – සිංහල කොටස (මූලාශ්‍රය: විකිපීඩියා)

අන්තර්ජාලය තුළ සිංහල අකුරු සුලබව භාවිතාවනු දක්නට ලැබුණේ ‘යුනිකෝඩ්’ නම් කේතන ක්‍රමයේ ආගමනයෙන් පසුවයි. යුනිකෝඩ් ක්‍රමය යටතේ සෑම අක්‍ෂරයකටම, සෑම ඉලක්කමකටම සහ සෑම සංකේතයකටම අදාළ වන සම්මත ආවේණික ඉලක්කමක් ඇත. ක්‍රියාත්මක මෙහෙයුම් පද්ධතිය මත හෝ, ක්‍රියාත්මක පරිගණක වැඩසටහන මත හෝ පවතින භාෂාව මත හෝ මෙම ඉලක්කම රඳා නොපවතී. ඔබ මෙම ලිපිය විවිධ මෙහෙයුම් පද්ධති හරහා කියවුවහොත් විවිධ අකුරු හැඩ යටතේ දර්ශනය වුවද, අක්‍ෂරයන් වෙනස් නොවේ. යුනිකෝඩ් ක්‍රමයේ විස්මය එයයි. ඒ පිළිබඳ වැඩිදුර තොරතුරු යුනිකෝඩ් වෙබ්අඩවියෙන් දැනගත හැක. Read More

2014 with Millennium IT

Founded in 1996 by Tony Weerasinghe, MillenniumIT has established itself as one of the leading software companies in Sri Lanka. Starting off as a systems integrator, the company has specialised in delivering high performance capital market software solutions.

2014 was another great year for MillenniumIT, with several key projects going live, the initiation of new deployments and also bagging several esteemed awards in the industry. It is also great to see them giving back to society through various CSR projects, especially the housing project in the north. As we step into 2015, let’s take a look at the many achievements of MillenniumIT for 2014, through the below infographic.

2014-MIT-Edited

MillenniumIT Rated as the Most Respected Technology Firm in Sri Lanka

LMD’s Most Respected ranking of the Sri Lanka’s top businesses for the year 2014 is just out. Millennium IT is rated as the most respected company in the Technology sector in Sri Lanka this year.

Millennium IT is a technology innovation driven company that powers more than 30 global and national financial institutions around the globe. MillenniumIT’s systems are used by exchange businesses around the world including London Stock Exchange, Borsa Italiana, Oslo Børs, Turquoise, ICAP, the London Metal Exchange, Johannesburg Stock Exchange and a series of emerging market exchanges. Millennium IT has provided technology for London Stock Exchange group and powers one third of the entire European equities market and is one of the fastest trading systems in the world. Founded in 1996, MillenniumIT was acquired by the international diversified exchange business London Stock Exchange Group in October 2009.

This is the 10th issue of the special edition that measures peer perceptions of corporate admiration. LMD has given a give a face-lift to the ranking system this year by adopting the Olympic Ranking System. This year, they are being awarded gold, silver and bronze medals!

Millennium IT has awarded 3 GOLD, 1 SILVER and 3 BRONZE and is ranked at 34th the list across all industries. Virtusa is ranked at 39th with 2 GOLD, 2 SILVER and 5 BRONZE. DMS Software technologies has secured 61st place with 1 GOLD and 1 BRONZE medal. WSO2, MicroImage has ranked 73rd and 92nd respectively. Last year, Virtusa cooperation was the only Sri Lankan software business that got its name in the list appearing in the second fifty of companies.

Most Respected ranking is conceptualized by LMD, and conducted by Nielsen. Rankings are based on survey results on opinions expressed by respondents going in to details of why the companies were perceived as being the ‘most respected.’

We, the TechWire editorial team congratulate Millennium IT and other companies for their achievement. We anticipate information technology companies to show their true colors in the years to come, with far greater contribution to Sri Lanka’s economy in getting its way as “most respected”.

2014-Most-Respected-Entities-1

2014-Most-Respected-Entities-2

2014-Most-Respected-Entities-3

(source: lmd.lk)

What does it take to get a job at Google?

“How many golf balls can fit into a school bus?” is one of the many brain teasers that were famously asked at Google interviews. If by any chance you are aiming for an career at Google, the good news is that such riddles are not interview questions any more. The bad news is that there are various other narrow criteria that you need to fit into. Given below is a small infographic explaining on what it takes to get a job at Google. It might give you insights on what to look in an candidate if you are hiring for your software company. (Infographic credits : staff.com)

What it takes to work at Google

Free Anti Virus Guards. Which one is for you?

If you are wondering about having a good virus guard, well, here are some little details about freely available and most famous virus guards on the internet. If I didn’t mention about a virus guard that means either it is not that good or I haven’t had a chance to use it and experience it.

#1 Bitdefender

BitDefender

My personal favorite! Even though it is not very famous, you simply can’t proceed without talking about the best you can find, can you? This doesn’t have a cool appearance or whatsoever. However it literally does the job. Which is detecting threats. It protects your computer from the all kind of viruses and it automatically keeps the virus database up to date. Mostly it doesn’t interrupt you at all when detecting viruses but of course it gives you a small notification balloon. Simply it diverts the virus to a quarantine folder from where you can easily recover the file, if it is a false action or if it is an important file to you. Only con is that there is no internet security but guess what, if you are using Google Chrome as your default browser, it has a small add-on called; Bitdefender TrafficLight, which will give you an average protection when you browse. This one is super light, fast, and commercial free product.

http://www.bitdefender.com/solutions/free.html

http://www.bitdefender.com/solutions/trafficlight.html

#2 Avast

Avast

This one was my #1 before I got to know about Bitdefender. However unlike Bitdefender, it covers some extent in internet security in the free version. It has a nice, gadgetmatic, windows 8 like appearance. High download rate in www.download.cnet.com and high popularity in this industry. So many options are available to change and customize its behavior. It has an option called “Sandbox”, where you can run an application in a secure environment so that it won’t harm your computer if it has a threat. According to VB100, latest comparative statistics ( http://www.virusbtn.com/vb100/latest_comparative/index / Oct-2013), when you compare Avast against Bitdefender, its proavitive and reactive detection levels are lower.

http://www.avast.com/index

#3 Avira

Avira

This one is quite famous and has a competition in the free virus guard market with AVG. Avira could be pretty annoying if you are a person that should not to be interrupted while you are working. It always pop ups notifications, update details, and all sort of stuff using the system speakers. Detection wise, it’s nearly in Avast detection range.

http://www.avira.com/en/avira-free-antivirus

#4 AVG

AVG

Name by itself says it all. Anti-Virus Guard or AVG is the most used virus guard of all time. It gives you enormous features even in the free application; automatically scanning removable devices, schedule scans, and much more. AVG can secure your browsing up to a certain extent. But these extra features can consume a lot of memory from your RAM and it may slow down your PC or laptop. Sometimes you may have difficulties in the uninstallation process too.

http://www.avg.com/ww-en/free-antivirus-download

Conclusion

            I have used many virus guards personally and have experienced all most everything on the free market and some of the paid products. By in my experience, I advise you to consider following points when you are going to use a free virus guard.

If you are looking for a hustle free, smooth running, let him do the job type product, go for Bitdefender.

If your want some advance options that you need to take authority and take care of your own protection, you can use either Avast or Avira.

I personally don’t advise you to use AVG, unless or otherwise you know how to manage advance options that are available in AVG. This product can be quite useful if you know how to use it very well.

At last, final decision is yours. If this article somehow helped you to get an idea on famous free virus guards, that would be enough for me.

Wish you everyone a threatless PC! 😉

2013 with WSO2 – Infographic

WSO2 founded by Dr Sanjeewa Weerawaran in 2005, has progressed in leaps and bounds in the past 8 years. Providing clients with an open source middleware platform, WSO2 has attracted some big clients such as eBay, and has won several awards as well.

2013 has been quite a year for WSO2, from providing services to Boeing and Deutsche Telekom, to extending its footprint to the mobile domain. As we have embarked on the new year, lets take a look at the impressive achievements of WSO2 in 2013 through the below infographic.

2013 with WSO2---infographic

A Logic that Urinates (Part II)

Note from the editor: This is the last of the two-part article series on how real world problems can be solved using fuzzy logic. Part I of this article can be found here.

Fuzzy logic brings in a solution

The brilliant intellectual Lotfi Zadeh introduced Fuzzy Logic in 1973, which constitutes a beautiful solution to problems like the one articulated above. Fuzzy Logic, in its core, builds a sophisticated mathematical framework that can translate semantics expressed in vague human terms into crisp numeric form. This enables us, humans, to express our knowledge in a particular domain using a language familiar to us, but still make that knowledge solve concrete numeric problems. For example, our knowledge can be expressed like the following rules that are used to determine whether a candidate should be chosen for a job depending on his experience, education and salary expectation levels.

  • If Experience is High, Education level is Medium and Salary expectation is Low, then hire the guy.
  • If Experience is Medium, Education level is High and Salary expectation is High then do not hire the guy.
  • If Experience is High, Education level is Somewhat High and Salary Expectation is Very High then do not hire the guy.

Rules like above can be formed using our knowledge, experience, gut feeling, etc about the domain. The collection of rules is typically termed Fuzzy Rulebase. We feed the rulebase into a Fuzzy Logic System (FLS), which aggregates and stores this knowledge. Most notably, the FLS stores the knowledge in a numerical logic that can be processed by a computer. After that FLS is capable of answering questions like the following.

If the Experience level is 4 (out of 5), Education level is 3 and Salary Expectation is 4, should we hire the guy?

No need to mention that, the richer the rulebase is, the more accurate is the outcome.

Lotfi Zadeh

A Little further insight into Fuzzy Logic

How does Zadeh’s new logic perform its wonders under the hood? If fuzzy logic is a complex and amazing structure, the magic brick it is built by is the concept termed possibility. Zadeh’s genius is to identify that, in human discourse, likeliness does not refer to likelihood, but to membership. Let me exercise my teaching guts to describe this in a more digestible form. When we humans are confronted with a question like “How hot is 25oC?” we do not think it like “What is the likelihood that 25oC can be considered hot?” (Do we?). We rather think it like “Up to which degree does 25oC belong to the notion ‘hot’?”. To put the same thing in different terms, it’s about “the degree of belongingness to something” but not ”the probability of being something”. You might now be thinking of giving up the idea of becoming Zadeh’s follower, but I suggest you to hold on and give it a second thought.

I believe that Zadeh touches the real nerve in the problem when he makes this distinction between likelihood and membership. After understanding this by heart it’s an easy ride into the rest of the theory. As the next step we can introduce a term for concepts like ‘hot’, ‘beautiful’ or ‘high’. Fuzzy logic calls them fuzzy sets. A fuzzy set is an association between a number and a possibility value (Possibility is a number between 0 and 1 – just like probability, but at the same time radically deviating from it conceptually).

fuzzy2_3

Following figures provide examples. First one defines the fuzzy set “LOW” when input values are given from 1 to 5. For instance, if an examiner evaluates a student’s proficiency in a subject with a number between 1 and 5, how much will each mark mean to be ‘LOW’? We know that 1 is absolutely low. Therefore we consider the possibility of mark 1 being in the fuzzy set ‘LOW’ as 1.0 (maximum possibility). Also we can agree that mark 5 cannot be considered ‘LOW’ at all. So its possibility of being ‘LOW’ is zero. Marks between these two have varying degrees of membership in the fuzzy set ‘LOW’. For example, if the examiner gives mark 4 we consider student’s proficiency to be ‘LOW’ only with a degree of 0.25.

The fuzzy set ‘HIGH’ (last plot) is defined in a similar way. What about the middle one though? It’s not a fuzzy set that stands for a brand new concept, but one that stands for a modification of a previously defined concept. The modifier ‘VERY’ is applied to the concept ‘LOW’. Noting that the modifier is an intensifying modifier (one that further strengthens the concept) we square each possibility in ‘LOW’ to get possibilities in ‘VERY LOW’. Gut feeling says that membership of mark 4 in fuzzy set ‘VERY LOW’ should be less than its membership in ‘LOW’. And the numbers resemble that notion.

  • Possibility [4 is VERY LOW] = 0.25 * 0.25 = 0.0625

graph_low

graph_verylow

graph_high

It’s not difficult to grasp the idea of fuzzy variables. They are fundamentally measurements or entities that can take fuzzy sets as their values. Example fuzzy variables can be temperature, student’s proficiency, candidate’s experience and so on. After that we can combine a fuzzy variable with a fuzzy set to construct a meaningful statement like “temperature is LOW”. These can be termed atomic statements. To express it formally, an atomic statement is of the form:

  • <fuzzy variable> is <fuzzy set>

Now we walk the next step by combining several atomic statements into a compound statement. A compound statement would look something like “Student’s math proficiency is LOW, English proficiency is HIGH and music proficiency is MEDIUM”. These types of statements are useful when making judgments based on a combination of factors. For instance, a judge panel might want to make a final decision on whether to pass a student from the exam by looking at all his subject level proficiencies. Suppose that the judge panel decides this: “If there is a student whose math proficiency is MEDIUM, english proficiency is MORE OR LESS LOW and music proficiency is HIGH we will pass him”. This is termed a fuzzy rule. More appropriately, a fuzzy rule is a compound statement followed by an action. Another rule can be: “If the student’s math proficiency is VERY LOW, English proficiency is high and music proficiency is LOW we will fail him”.

If the judge panel can compile a bunch of rules of this form it can be considered to be the policy when evaluating students. In fuzzy logic vocabulary we call it a fuzzy rulebase. It is important to note that a fuzzy rulebase need not be exhaustive (meaning that it does not have to cover all possible combinations of scenarios). It is sufficient to come up with a rulebase that covers the problem domain to a satisfactory level. Once the rulebase is fed to a fuzzy logic system it is capable of answering questions such as “If the student’s math grade is 3 (in a scale of 1 to 5), English grade is 2 and music grade is 3, should we pass him?”. This is all one needs to understand to use a fuzzy logic library. Inner workings of the theory on how it really derives the answer based on rulebase are beyond the scope of a blog post. Also I think that 90% of readers would be happy to learn that the math bullshit is going to end from here.

Application of fuzzy logic into our location detection problem

Let me repeat our problem; we receive location coordinates in iPad with varying frequencies and tolerance levels. By looking at tolerance values and location coordinate frequency, we need to determine whether the device is in high accuracy or low accuracy location detection mode at a given time. We decided to determine the location detection mode every 30 seconds. At each 30 second boundary we used location coordinate values received within the last 30 seconds to determine the mode. All location related processing for the next 30 seconds are performed with respect to this newly figured out mode. For instance, if we decide that the device is operating in high accuracy location detection mode, we assume that the device operates in the same mode until we perform the evaluation after another 30 seconds. For this, we used following two parameters as inputs in the problem.

  • Tolerance values for best two location coordinates (coordinates with lowest tolerance values) within past 30 seconds
  • Number of location coordinate values received within past 30 seconds (highest possible value is 30 as we configure the device to receive location coordinates every second. However, when in low accuracy mode, number of coordinates received within 30 seconds is way less than 30).

We defined each of the 3 inputs to take values within a universe with 5 fuzzy sets: VERY LOW (VL), LOW (L), MEDIUM (M), HIGH (H) & VERY HIGH (VH). Then we worked out a bunch of fuzzy rules using these inputs and fuzzy sets. Rules are derived using gut feeling decisions on the domain. Following figure shows a part of the rulebase we constructed.

rulebase

We defined each of the 3 inputs to take values within a universe with 5 fuzzy sets: VERY LOW (VL), LOW (L), MEDIUM (M), HIGH (H) & VERY HIGH (VH). Then we worked out a bunch of fuzzy rules using these inputs and fuzzy sets. Rules are derived using gut feeling decisions on the domain. Following figure shows a part of the rulebase we constructed.

At run time we determine numerical values of our 3 input parameters. An example input set can be:

  • tolerence1 = 10 meters, tolerence2 = 25 meters, reading count = 20

Using the rulebase, fuzzy logic system is capable of deriving an answer to the question “Which location detection mode the device is currently operating in?”. Our experimental results were exciting. With the aid of fuzzy logic we arrived at a sensible solution that provides accurate results to a problem that is almost unsolvable using conventional crisp logic. Our app is now in AppStore as the most popular navigation app in Norwegian market.

Image sources: 1, 2, 3

A Logic that Urinates (Part I)

It is said, in North Korea, children are taught that their loving ex-leader Kim Jong Il did not even have to urinate because he was so pure. No excrement generated in his body due to his super-human purity. As a software engineer I think that most of our code behaves also like Kim Jong Il. Our code is ultra pure so that it surpasses every contingency in general human discourse occurring due to imprecision and vagueness. For instance, the statement start_time = 3 in a computer program literally means it while in human conversation “The event starts at 3” does not imply a rigid spontaneity. In a statement like the latter, we humans implicitly agree that the start time can fall within an acceptable time window centered around 3. In any society, a deviation of few seconds will be accepted. However, the program would not accept 3.0001 or 2.998.

This behavior with programs generally works. If you are developing accounting software, you probably don’t want to jeopardize your program logic with vagueness in human thinking. In fact lot of practices are involved in software delivery (such as manual testing, unit testing and code quality analysis) to cut the crap introduced by humanness and make the software as pure as Kim Jong Il. However, there are cases that a programmer is left with no other option but to stretch boundaries of his thinking a little further than the psychotic notion of purity and to get along with the real world while encountering its inevitable vagueness. Following is an example from a recent programming experience of mine.

tw_ipadmaps
Recently we implemented an iPad navigation app for a leading Norwegian GIS (Geographic Information Systems) company. The app is intended to help people when going on boat rides by providing specialized maps. In addition to this main purpose it is bundled with lot of other useful features such as path tracking, geo-fencing, geo-coding, social media sharing, etc.

Not surprisingly the app needs to determine user’s current location to enable most of its features. For this, we employed location services API that ships with iOS. It uses various sources such as GPS, access tower data and crowd-sourced location data when determining the geo-coordinates of the device location. Each of these location sources has different implications on accuracy and battery consumption. For instance, GPS is by far the most accurate method, but drains the battery faster. On the other hand, wifi iPads that amount to a significant fraction of the iPads that are currently in use, do not have GPS receivers. The only accessible location information for them comes from crowd sourced location data from wifi hot spots that agree to share their location. Inevitably these location coordinates are less reliable. One nice thing with iOS location API is that, along with every location coordinate it also provides information on how accurate (or how inaccurate) the reading can be. This is called the tolerance value. For example, when we see a location coordinate (in the form latitude – longitude) 35.45o, 4.87o with tolerance 20 meters, we know that the user’s actual location can be anywhere inside a circle of radius 20 meters centered at the point (35.45o, 4.87o). With our experiments we figured out that when GPS is used to determine the location, tolerance level is as low as 5 meters. However, with wifi iPads, the best we observed was 65 meters. To make things more complicated, even the iPads with GPS receivers, at times, can go low down in accuracy (with tolerance levels as high as several hundreds of meters). This particularly happens when the device is in the vicinity of objects like huge concrete structures or large trees that effectively blocks GPS signals.

Need to determine location accuracy mode

Experimentation clearly suggested that there are two disparate modes that an iPad can be operating at a given moment with respect to location detection; high accuracy mode and low accuracy mode. These two modes are characterized by the following behaviors.

High Accuracy Mode (HAM) Low Accuracy Mode (LAM)
Tolerance value is low for most location readings Tolerance value is high for most readings
Location readings are received in regular intervals (can be as frequent as once in a second) Location readings are received less frequently (usually only few times in a minute)

When in high accuracy mode we can treat received location coordinates as the actual location. In addition we can happily ignore intermittent low accuracy readings (readings with high tolerance values – these can occur even in high accuracy mode occasionally). In contrast, the programmer has to make every attempt to use all acceptable readings (readings without crazily high tolerance, such as more than 1 km) when in low accuracy mode since only few location readings are typically received during 1 minute. Also, corrections may need to be applied (depending on the purpose) since the accuracy level is low. Because the developer has to apply two kinds of logics depending on the accuracy mode, it’s necessary to determine the mode that the device is operating at a given moment. One should also note that the mode could change with time; for instance, when a person is moving with a GPS iPad, the device can be operating in high accuracy mode mostly, but can also switch to low accuracy mode when it is close to a big building.

Difficulty in drawing the line between two modes

The first (and probably the toughest) challenge is to correctly figure out whether the device is operating in HAM or LAM. It doesn’t take much thinking to identify that one can use both tolerance value and location reading frequency to determine the mode. If most tolerance values are low and the device is receiving location readings in regular intervals, it should be in high accuracy mode. However, formulating the logic is not as simple as it sounds because it needs explicit manifestation of numeric boundaries between the two modes. For example, let’s say that we decide to conclude the operating mode as HAM when the best tolerance is less than 20 meters and 15 readings or more are received within a period of 30 seconds. It’s not difficult to illustrate the problem associated with this approach. Consider the following 3 cases.

Case 1: Best tolerance is 18 meters and 15 readings are received within 30 seconds.
Case 2: Best tolerance is 21 meters and 15 readings are received within 30 seconds.
Case 3: Best tolerance is 18 meters and 13 readings are received within 30 seconds.

Intuition suggests that most probably the device should have been operating in the same mode in all 3 cases. However, our previous logic with stubborn numeric boundaries results in case 1 being identified as high accuracy mode, while the other two being recognized as low accuracy. Can you see the problem here? The problem is not about using numeric boundaries (we have to do that as long as we program for a Von Neumann computer). However, the problem lies in selection of the numeric boundary. What justifies selection of 20 meters as the tolerance boundary? Similarly, how confident are we, that the frequency boundary should be 15? A sufficient probe into the problem would reveal that it’s almost impossible to develop a sound heuristic that determines these boundary values “accurately”.

Where exactly is the problem?

tw_fuzzy3
The problem really lies on the discrepancy between skills of humans and computers. Humans are clever in dealing with concepts than with numbers while computers are better in handling numbers. This is evident in that we could distinguish between the two modes easily when we were talking in terms of concepts (to reiterate our previous statement -> ‘If most tolerance values are low and the device is receiving location readings in regular intervals, it should be in high accuracy mode’). The moment we try to put this logic in terms of numbers, we run into chaos. This is a clear case where ‘pure logic’ leaves us in a desperate abyss.

Await Part 2…
Await Part 2 of this article where we explore how fuzzy logic brings in the solution to this problem.

Image sources: 1, 2, 3, 4