Wednesday, April 7, 2010

Top 100 Tech Companies In India

1) Bharat Sanchar Nigam Limited (346162)
2) Tata Consultancy Services (189142)
3) Bharti Airtel Limited (185195)
4) Wipro Ltd (150008)
5) Infosys Technologies Limited (131490)
6) Hewlett-Packard India (119170)
7) HCL Infosystems Limited (118554)
8) Reliance Communications Ltd (117252)
9) LG Electronics India Pvt Ltd (82500)
10) IBM India Pvt Ltd (82450_
11) Videocon Industries Ltd (73842)
12) HCL Technologies Limited (65245)
13) Satyam Computer Services Ltd (64100)
14) Siemens Ltd. (60322)
15) Samsung India Electronics Pvt. Ltd. (52000)
16) Mahanagar Telephone Nigam Ltd (49093)
17) Redington (India) Limited (47175)
18) Cognizant Technology Solutions (45840)
19) Idea Cellular Ltd (44129)
20) Videsh Sanchar Nigam Limited (42540)
21) Bharat Electronics Limited (39526)
22) Tech Mahindra Limited (29367)
23) Philips Electronics India Ltd (26490)
24) Bharti Teletech (24920)
25) Sony India Limited (23000)
26) Moser-Baer India Ltd (20740)
27) i-flex Solutions Ltd (20609)
28) Exide Industries Ltd (18797)
29) ITI Limited (17767)
30) MphasiS Limited (17606)
31) MIRC Electronics Limited (15179)
32) Cambridge Solutions Ltd (15061)
33) Tata Teleservices Maharashtra Limited (TTML) (14218)
34) Larsen & Toubro Infotech Limited (12806)
35) Sterlite Optical Technologies Ltd (11982)
36) GTL Limited (11596)
37) Samtel Color Limited (11484)
38) Teledata Informatics Ltd (10952)
39) Finolex Cables Ltd (10526)
40) Patni Computer Systems Ltd (10476)
41) CMC Limited (9944)
42) Perot Systems Tsi (India) Ltd (9720)
43) Sonata Software Limited (9144)
44) Polaris Software Lab Limited (9043)
45) NIIT Technologies Ltd (8859)
46) Hexaware Technologies Ltd (8763)
47) Acer India Pvt Ltd (8690)
47) Salora International Limited (8690)
49) Tulip IT Services Ltd (8449)
50) Eveready Industries India Ltd (8397)
51) iGate Global Solutions Ltd (8051)
52) Prithvi Information Solutions Limited (7682)
53) Avaya Global Connect Limited (7614)
54) Aricent Technologies (Holdings) Limited (7331)
55) Rolta India Limited (7216)
56) 3i Infotech (6707)
57) Honeywell Automation India Limited (6439)
58) Amara Raja Batteries Ltd (6055)
59) Mindtree Consulting Limited (5977)
60) Birlasoft Ltd (5900)
61) Mascon Global Ltd (5672)
62) Sify Limited (5518)
63) Infotech Enterprises Ltd (5492)
64) Mastek Limited (5072)
65) Sasken Communication Technologies Ltd (4868)
66) Rashi Peripherals Pvt Ltd (4811)
67) Kpit Cummins Infosystems Ltd (4637)
68) Savex Computers Limited (4578)
69) Avnet India (4120)
70) Zylog Systems Ltd (4040)
71) NIIT Ltd (4008)
72) Canon India Pvt Ltd (4000)
73) Geometric Software Solutions Co Ltd (3942)
74) Genus Overseas Electronics Limited (3846)
75) Subex Azure Ltd (3710)
76) WeP Peripherals Limited (3633)
77) Zenith Computers Ltd (3549)
78) D-Link India Ltd (3416)
79) Nippo Batteries Co. Ltd (3392)
80) Aftek Infosys Ltd (3233)
81) Shyam Telecom Limited (3261)
82) Paramount Communications Ltd (3198)
83) ORG Informatics Limited (3145)
84) Persistent Systems Pvt. Ltd (3144)
85) Tata Elxsi Ltd (3083)
86) Northgate Technologies Ltd (3010)
87) Numeric Power Systems Ltd (2942)
88) Zensar Technologies Ltd (2854)
89) Cranes Software International Ltd (2848)
90) Phoenix Lamps Ltd (2800)
91) TVS Electronics Ltd (2771)
92) MIC Electronics Limited (2727)
93) Intex Technologies (India) Ltd (2592)
94) Opto Circuits India Ltd (2552)
95) Aztecsoft Limited (2441)
96) Supertron Electronics Ltd (2152)
97) Delta Energy Systems (India) Pvt. Ltd. (2130)
98) Panasonic Battery India Company Limited (1965)
99) FCI OEN Connectors Limited (1952)
100) Megasoft Ltd (1783)

Wednesday, March 31, 2010

India, U.S. ties proposed against cyber terrorism

India has suggested close partnership with the U.S. in cyber security, particularly against cyber terrorism, as the two countries take their economic and technological collaboration to the next level.

Indian Minister of State for Communications and Information Technology Sachin Pilot made the suggestion in talks with senior officials at the White House and in the US Department of Commerce during a week long visit, Indian officials said Tuesday.

Highlighting the mutual advantages of establishing close India-US collaboration in the area of cyber security, in particular against cyber terrorism, he also emphasised the need for bilateral initiatives to be specific, result-oriented and time-bound.

Healthcare and skill formation were among other ideas that came up in talks on how to take the India-US economic and technological collaboration to the next level, including through fostering joint innovation with broad-based benefits.

Among the officials who called on him were the newly appointed Under Secretary for International Trade Administration Francisco Sanchez, Federal Chief Technology Officer Aneesh Chopra, Federal Chief Information Officer Vivek Kundra and Senior Adviser for Innovation to the US Secretary of State Alec Ross.

In interactions with trade and industry bodies, pilot described the opportunities that India presented in the field of Communications and Information Technology, not only for services but also in manufacturing.

In exchanges with the members of the US India Business Council (USIBC), and the National Association of Manufacturers (NAM), Tuesday, he spoke about the Indian government's commitment of the to use information technology as a platform for providing access to services to those who had not benefited so far.

Stressing the mutually beneficial nature of the bilateral economic relationship, Pilot pointed to the broadly balanced trade in services, the fast rate of growth of US exports to India and the rapid growth in Indian investments flowing into the United States.

He said that the two governments should work to provide an enabling environment in which goods, services and persons can move freely to utilize emerging opportunities from which both sides stand to gain.

Pilot who also visited New York and Philadelphia, met with senior executives from a number of US and Indian companies to discuss the potential for further collaboration between India and the US in the field of technology, particularly with regard to using Communications and Information Technology to promote inclusive growth.

Experts hack iPhone SMS database in 20 sec


Two security researchers have found an exploit to hack iPhone's SMS Database in 20 seconds, while displaying their skills at the Pwn2Own contest at the CanSecWest Security show. Ralf Philipp Weinmann of the University of Luxembourg and Vincenzo Iozzo of German company Zynamics found this exploit for the iPhone that won them $15,000 prize, reported ZDNet.



iPhone was not the only thing to get hacked. Safari on Snow Leopard and Internet Explorer 8 as well as Firefox browsers on Windows 7 got hacked too, according to TechTree. Weinmann and Iozzo collaborated to finding vulnerability and then writing an exploit - the entire process took two weeks. As a part of the hack, iPhone users have to visit a website hosting malicious code and then steal iPhone's SMS database - all in the matter of 20 seconds! Weinmann explained, "Basically, every page that the user visits on our [rigged] site will grab the SMS database and upload it to a server we control".

Thomas Dullien, Weimann's colleague explained that the attacker had potential to do more damage without leaving the iPhone Sandbox, a tightly-controlled set of resources for running unverified codes. The exploit was written to bypass the digital signatures for verifying if the code in memory is from Apple or not. Weinmann pointed out that there's a non-root user called 'mobile' with certain user privileges and using that exploit, he could can do anything that 'mobile' (non-root user) can do.

Charlie Miller, principal security analyst at Independent Security Evaluators, found an exploit to hack Safari on a MacBook Pro without physically touching the machine and won $10,000 worth prize money.

Kaspersky shares insights about global spam network

Kaspersky Lab has announced the publication of an informative article by Maria Namestnikova that explores the relationship between spam and the global economy.

The article looks at how spam has developed into a fully-fledged industry that expands and contracts in synch with the global economy. This view is given credence by the fact that the client/spammer relationship adheres to the same set of business principles that any legitimate commercial undertaking would. It also means that the spam industry is as susceptible to changes in the health of the national and international economy as any other industry, legitimate or otherwise.

The author uses the example of the global financial crisis to demonstrate this dependency. The downturn in spam activity during August 2008, and again in October of the same year, followed exactly the same curve as the global economy. The economic downturn had led, unsurprisingly, to swaging cuts in the spam advertising budgets of small and medium-sized businesses.

Not every area of spam-based adverting took such a hit though. Spam advertising the chance to rent or buy real estate, primarily office space vacated by the previous tenants, went into overdrive. The amount of this type of spam is usually insignificant because the majority of real estate agencies are established companies that would not consider using the services of the spammer.

Maria's article also examines why January 2009 saw the start of a significant increase in the level of spam advertising the services of the spammers themselves. Although this type of spam had always existed, it had never been pushed quite as aggressively as it was during the crisis period.

The article concludes by stating that the recovery of the spam industry reflects the general recovery in the economy as a whole.

Scientists develop laser security for Internet


Scientists at Tel Aviv University have developed a new security system for Internet using a special laser that will help in keeping hackers' prying eyes off for good. It is developed using fiber optic and computer technology that transmits binary lock-and-key information in the form of light pulses.

Dr. Jacob Scheue, who came up with this device, said that a shared key code can be unlocked by the sender and receiver, and absolutely nobody else. "Rather than developing the lock or the key, we've developed a system which acts as a type of key bearer. The trick is for those at either end of the fibre optic link to send different laser signals they can distinguish between, but which look identical to an eavesdropper."



Adding to that, he said, "We've already published the theoretical idea and now have developed a preliminary demonstration in my lab. Once both parties have the key they need, they could send information without any chance of detection. We were able to demonstrate that, if it's done right, the system could be absolutely secure. Even with a quantum computer of the future, a hacker couldn't decipher the key."

Tripura gets tough with cyber crime

The Tripura government Wednesday notified guidelines that propose stringent action, including a 10-year jail term, against those involved in cyber crime.

"If anybody is found guilty of indulging in cyber crime, he can be prosecuted with a maximum of 10-year imprisonment and a fine of Rs.200,000," police spokesman Nepal Das told reporters.

He said the government has notified guidelines for private cyber cafes and internet dhabas. "If the cyber cafe and internet dhaba owners violate these guidelines, stringent actions will be taken against them," Das added.

"There shall not be any cabin in any cyber cafe and proper records with detailed identity of the users shall be maintained by the cyber cafe and internet dhaba owners," the guidelines added.

"Children below the age of 18 years should come to cyber cafe and internet dhaba with their guardians," said the guidelines.

The spokesman said surprise raids will be conducted on cyber cafes and internet dhabas to ensure adherence to the Information Technology Act 2000.

The government has also designated certain police officials who can be informed by people about cyber crimes.

Durham Holdings' motion patent may threaten iPhone


The rights granted to Durham Holdings to a "method and apparatus for controlling a computer system" that would use motion sensors to steer the interface on a handheld, such as a PDA or smartphone, could pose trouble for high end phones.

In a blog written for Electronista mentioned that Apple has motion patents of its own but didn't file them until October 2007, more than a year before the July 2006 filing for the Durham Holdings patent. Experts also say that not many of the people are aware of Durham Holdings, as it has no real public presence, including either online or in government records.



An original patent holder, Ygomi, also said it knows nothing about the company that obtained rights to the patent. Such deliberately low-key firms can sometimes be "patent trolls", or particular varieties of intellectual property holding companies that exist solely to find overly broad patents and then sue others, making a living off of royalties without actually producing goods based on those patents.

Among the techniques would be picking icons by tilting left or right, or moving the device up and down to scroll.