LBS College of Engineering
Tuesday, October 21, 2008
Monday, October 20, 2008
What is happening in the name of........
Teaching a subject after accepting money from the students is called tuition, if the subject is a part of the curriculum. Whatever the alias we use, it will remain as a tuition class. Java and C++ are there in the syllabus of IT, MCA and CS courses (see the topics of the subject CS/IT2k 507P). In the new sillabus, it is there in third semester.Conducting tuition classes inside the campus is not appreciable and it is illegal. It is a sort of financial exploitation.
In your college, Dept of CSE anounced classes on various subjects in the name of 'xxx'. If it's for the wellbeing of the students, the fee should be nominal, Rs50/- or a maximum of Rs 100/- . This is what commented by Prof:Roy Choudhary, who was a member of NBA team.
Moreover, there exist some questions.
1) Who has given permission to conduct official tuition classes?
2) How do you fix the fee? Is there any regulatory committee?
3) Students have already paid a huge amount as tuition fee. After that, collecting an amount for teaching a subject is financial exploitation. How do you justify this exploitation?
4) Are these faculties willing to teach these subjects to help the students for their regular labs and classes to avoid money factor?
The department should conduct courses on subjects that are not included in the curriculum. A nominal fee should be collected from the students, and at the same time it should never become financial burden. These courses will help the students to learn and improve their knowledge on new areas of current technologies.
Labels: java, lbs, technology
Tuesday, August 29, 2006
Thinking like an administrator
"Computers are supposed to help us to solve our problems, but half the time they are the problem"This is for those who like system administration and programming/software development.
Tips on making a standard efficient network.
1) If your network consist of more than one OS , then always install DNS server
2)The network should be a centralized one.
3) If you use internet in your network then use subnetting and connect them to a single proxy server
4) Antivirus software should always be updated.
5) Your proxy server should use some filtering technique.
6) If your server is a flavour of linux, use IPTABLES.
7) Make the important passwords absolutely secret and also change them time
to time
8) Monitor the abuse of network.
9) Ensure the network should always be on.