Social Icons

Showing posts with label technology. Show all posts
Showing posts with label technology. Show all posts

Tuesday, March 19, 2024

Beyond Coding: Unveiling India's Aatmanirbharta by Nurturing Civic Consciousness

1.    As the digital landscape of India continues to evolve, with advancements in technology reshaping the nation's socioeconomic fabric, it's crucial to recognize that progress extends beyond the realms of IT. Amidst the fervent pursuit of innovation and economic growth, lies a silent yet critical determinant of our collective destiny: civic consciousness. In this blog post, I pivot my focus from IT peculiarities to a broader societal imperative – the pressing need to cultivate a robust civic sense. Let's delve into few prevalent instances undermining India's path towards Aatmanirbharta, shedding light on the pivotal role of civic awareness in shaping our nation's future.

2.    Civic sense encompasses a broad spectrum of behaviours and attitudes that contribute to the smooth functioning of society. It involves:

  • Littering
  • Traffic violations(huh!!You try driving in a Indian City)
  • Vandalism
  • Disregard for public hygiene (spitting, urinating in public)
  • Illegal encroachments on public land
  • Noise pollution
  • Disrespectful behavior in public (.....is a proud moment)
  • Defacement of public property (graffiti, posters)
  • Non-adherence to queueing norms
  • Disrespectful behavior towards public servants
  • Disregard for public safety regulations

4.    In essence, it's the glue that holds the fabric of society together.


5.    Unfortunately, despite strides in various sectors, India continues to grapple with a deficit in civic sense. As India marches towards Aatmanirbharta, it's paramount to recognize that economic self-reliance alone cannot guarantee a prosperous future. The realization of this ambitious vision hinges upon the collective commitment of every citizen towards nurturing a robust civic sense. 

6.    Efforts to cultivate civic consciousness must begin at the grassroots level, encompassing education, public awareness campaigns, community initiatives, and policy interventions. Schools play a pivotal role in instilling values of citizenship and social responsibility in the younger generation, laying the groundwork for a more enlightened society.

7.    Moreover, fostering a culture of accountability and civic engagement requires concerted efforts from all stakeholders – government bodies, civil society organizations, businesses, and individuals alike. It demands a paradigm shift wherein civic sense becomes not just a moral obligation but a cornerstone of national identity in character.

8.    So, while economic prosperity is undeniably crucial, it is incomplete without a strong foundation of civic sense. As we aspire towards Aatmanirbharta, let us not overlook the significance of nurturing responsible, conscientious citizens who embody the true spirit of self-reliance. Only then can we truly realize the vision of a progressive, harmonious, and resilient India by 2047.

Sunday, December 10, 2023

Demystifying Quantum Computing: A Comprehensive Guide to Types and Technologies

The realm of quantum computing is a fascinating one, brimming with diverse technological approaches vying for supremacy. Unlike its classical counterpart, which relies on bits, quantum computing leverages qubits, able to exist in multiple states simultaneously. This unlocks the potential for vastly superior processing power and the ability to tackle problems beyond the reach of classical computers. But how is this vast landscape of quantum technologies classified? Let's embark on a journey to understand the key types of quantum computers and their unique characteristics:

The field of quantum computing is rapidly evolving with diverse technologies vying for dominance. Here's a breakdown of the types I could find:

1. Simulator/Emulator: Not a true quantum computer, but a valuable tool for testing algorithms and software.

2. Trapped Ion: Uses individual ions held in electromagnetic fields as qubits, offering high coherence times.

3. Superconducting: Exploits superconducting circuits for qubit representation, offering scalability and potential for large-scale systems.

4. Topological: Leverages topological states of matter to create protected qubits, promising long coherence times and error correction.

5. Adiabatic (Annealers): Employs quantum annealing to tackle optimization problems efficiently, ideal for specific tasks.

6. Photonic: Encodes quantum information in photons (light particles), offering high-speed communication and long-distance transmission.

7. Hybrid: Combines different quantum computing technologies, aiming to leverage their respective strengths and overcome limitations.

8. Quantum Cloud Computing: Provides access to quantum computing resources remotely via the cloud, democratizing access.

9. Diamond NV Centers: Utilizes defects in diamond crystals as qubits, offering stable and long-lasting quantum states.

10. Silicon Spin Qubits: Exploits the spin of electrons in silicon atoms as qubits, promising compatibility with existing silicon technology.

11. Quantum Dot Qubits: Relies on the properties of semiconductor quantum dots to represent qubits, offering potential for miniaturization and scalability.

12. Chiral Majorana Fermions: Harnesses exotic particles called Majorana fermions for quantum computation, offering potential for fault-tolerant qubits.

13. Universal Quantum: Aims to build a general-purpose quantum computer capable of running any quantum algorithm, the ultimate goal.

14. Quantum Dot Cellular Automata (QCA): Utilizes arrays of quantum dots to perform logic operations, promising high density and low power consumption.

15. Quantum Repeaters: Enables long-distance transmission of quantum information, crucial for building a quantum internet.

16. Quantum Neuromorphic Computing: Mimics the brain's structure and function to create new forms of quantum computation, inspired by nature.

17. Quantum Machine Learning (QML): Explores using quantum computers for machine learning tasks, promising significant performance improvements.

18. Quantum Error Correction: Crucial for maintaining the coherence of quantum information and mitigating errors, a major challenge in quantum computing.

19. Holonomic Quantum Computing: Manipulates quantum information using geometric phases, offering potential for robust and efficient computation.

20. Continuous Variable Quantum: Utilizes continuous variables instead of discrete qubits, offering a different approach to quantum computation.

21. Measurement-Based Quantum: Relies on measurements to perform quantum computations, offering a unique paradigm for quantum algorithms.

22. Quantum Accelerators: Designed to perform specific tasks faster than classical computers, providing a near-term benefit.

23. Nuclear Magnetic Resonance (NMR): Employs the spin of atomic nuclei as qubits, offering a mature technology for small-scale quantum experiments.

24. Trapped Neutral Atom: Uses neutral atoms trapped in optical lattices to encode quantum information, offering high control and scalability.

These are all the types of quantum computers I could find in my survey. The field is constantly evolving, so new types may emerge in the future.

Sunday, December 01, 2019

Blockchain Technology Workshop : IIIT Raipur

Dr. SPM IIIT-Naya Raipur, established by the International Institute of Information Technology University Act,2013 of the Government of Chhatissgarh, is a joint venture by Chhattisgarh State Government and National Thermal Power Corporation (NTPC).A workshop on Blockchain Technology was organized from 28-30 Nov 2019 at the campus with the following aims:

(a) To disseminate the knowledge of Blockchain technology among students, researchers and academicians.

(b) To discuss the current status of the Blockchain development and research work in India and across the world.

The material and slides presentation is shared at link https://drive.google.com/open?id=1s9mZtR7hnyQF4YQ5VYAxgKUiCMenWxlf

Few pics shared below



















Friday, September 18, 2015

1 millions plus Profile Views

1. When you look at your profile on Google, you can see your total number of views that means you can tell how many times your content has been seen by other people, including your blog posts and profile page.When you look at someone else’s profile or page, you can also see their total number of views. 

2. Just crossed a Million plus views on my page.....incl blog...thought to share.Not a big deal though viz a viz established techno blogs who have hits in billions....


 

Tuesday, November 19, 2013

Facebook on Basic Phone : Possible@YESS!!!

1.  The penetration of smartphones in the market is rapidly setting new benchmark verticals.Smartphones have changed our basic routine access exercise of switching on laptops or workstations to access our facebook,gmail and other accounts...but somehow this access to facebook and other accounts has been limited to smartphones only...and thus the basic mobile user still has the traditional method of accessing the mails and social networking sites....but thankfully this is not likely to go on for long...
 
2. One Mr Sumesh Menon, co-founder and CEO of U2opia Mobile,has fine-tuned USSD (Unstructured Supplementary Service Data) technology and is using it to allow anyone with a mobile phone to connect to Facebook. Unstructured Supplementary Service Data (USSD) is a protocol used by GSM cellular telephones to communicate with the service provider's computers. USSD can be used for WAP browsing, prepaid callback service, mobile-money services, location-based content services, menu-based information services, and as part of configuring the phone on the network. Thus even if a user has a very basic phone and no data connection, he can use USSD to connect to Facebook.

3.  Offcourse the concept of USSD is not new per se as a technology..users have all been using it in some way or the other in routine.For example, when you check your remaining pre-paid balance in the phone using a code, you use the USSD technology.So basically it is a kind of 1G solution that works in a 3G world.For those who wish to know about the 'G' family...please click here to find the 'G' Generation.

HOW TO USE THIS SERVICE :

-  In India, it is available to almost all mobile phone users, except those who are using network of BSNL.

-  To access Facebook from a basic (or from a smartphone that has no data connection) a user has to first subscribe to the service by dialling *325#.

-  Once the service is active, which happens within a few minutes, users can utilize the USSD menu to go through their timeline, check status updates, post status updates and check likes or comments on their posts. The service also allows access to Facebook Messenger and users can exchange messages with their friends.

-  There is no limit on how many times you can access Facebook or how many messages you can send to your friends on Facebook messenger. While different operators charge different price for the service, usually the price is around Re 1 per day, making it a cost-effective way to keep in touch with friends.

Few interesting points about this :

-  The underlying technology is called FoneTwish.

-  Any operator can use FoneTwish to enable access to Facebook through USSD for its users.

-  Service is used by over 40 operators in 30 countries.

-  Currently, there are over 10 million users across the world who access Facebook through USSD.

LIMITATIONS :

-  Facebook will be limited to a text-based service when used through USSD.

-  A user cannot access photographs on his phone through FoneTwish.

-  Offcourse there will be limitations w.r.t the proper web based experience that we see on a smartphone...but still..kudos to the effort and congrats to basic phone users.

4.   Well there may be one good news that as on date such phones will be more secure than smartphones.Too early to say before they get broken  too...lets wait and watch...

Monday, July 01, 2013

E-Governance and Security Challenges

Copy of the presentation that I gave at the Mini Seminar held under the aegis of IETE at AVCC,NOIDA on the subject : E-Governance and Security Challenges.



















Friday, April 12, 2013

GPS SPOOF!!!!

1.   Unlike the regular IT hacks wherein we keep seeing MAC spoofing,IP spoofing etc....what can one imagine if a GPS is spoofed.....:-)...can it make a plane land at a wrong coordinate?...YES!!!if it goes by the claims of a Iranian.

2. A US stealth drone was captured by spoofing its GPS coordinates, a hack that tricked the bird into landing in Iranian territory instead of where it was programmed to touch down...Phew..i bet u will read that again(Source :http://www.theregister.co.uk/2011/12/15/us_spy_drone_gps_spoofing/ )

3.   The 1700-word article cited an unnamed Iranian engineer who said he's studying the inner workings of the American bat-wing RQ-170 Sentinel that recently went missing over Iranian airspace. He said the spoofing technique made the craft “land on its own where we wanted it to, without having to crack the remote-control signals and communications” from the US control center.(Source :http://www.theregister.co.uk/2011/12/15/us_spy_drone_gps_spoofing/ )

4. Thats hell of a HACK...if it actually is!!!!!!salutes to the guy who could do it in real....now i wonder what all could land at forbidden places if it is really possible.....:-)

Thursday, December 13, 2012

FACEBOOK : The New Playground @ Dangerous

1.    It does not date back long in the past time corridors when I as a kid used to go to play grounds in the evening to play with my friends...meet them....fight with them...abuse them...get abused and then get back home for studies and prepare for next days school work and the cycle repeated every day...week and months.But what happens today with a typical metro kid....a school child in the bracket age of 10+ goes to Facebook to play with friends...he meets them.....abuses them at times...gets abused on the wall or vide posts.So more or less....things stand at the same place ,only the grounds have changed.First it was the actual play grounds and now it is all getting virtual.....blame it on lack of infrastructure with concrete eating much of space in metro's or lack of parental monitoring owing to their ultra busy lives.....for the new era generation...social networking sites like Facebook is the new PLAYGROUND.....the virtual one for a change!!!!


2.    So the rules remain the same....ie we have our social circle like we used to have in past...we meet vide post and comments...we like each other for something and dislike each other for some thing...here we cannot shake hands and hug each other but yess we can take grudges out of each other via so many means like hacking....cyber bullying...post hatred... cyber stalk...mobbing...sexting,internet trolling etc...the list is actually endless and the related terminology is on a phenomenal increase.So a typical new gen kid for whom Facebook kind social networking sites are the new playground to play....the proneness to the bad elements in the society remains actually higher then in past....for here it is just a matter of few compromised screenshots...hacked passwords and the kid is on way to become a victim...

3.   The recent case of Amanda Todd is indeed beginning of such sad but many in line expected incidents waiting to happen....today we may allow our kids to have a Facebook account or some social networking website account but without effectively monitoring the kid remains as prone as Amanda Todd.For this to happen the parent have to have basic IT IQ quotient to monitor to avoid any such incident.Like past when a child could be left at home assuming safe..it does not remain the same today....he has access to smartphones....he has access to tablets...internet via so many means.Even basic forensic knowledge possessed by the parents is bound to fail if the same is happening in Cloud rather then on the machine at home...

4.   Its time for the parents to equip themselves with the tools and knowledge required to monitor and watch the kids...also realizing that today's kids are more smarter in terms of grabbing the technology then ever....if you have reached reading till here...u must read the complete story here

Sunday, February 26, 2012

HUMANE COMPUTING

1.  The cyber space keeps coming up with such new terms and will continue doing so for years to come.So this is one term I heard of when I recently got an opportunity to attend a Two day symposium conducted by CSI ie COMPUTER SOCIETY OF INDIA,Indore Chapter.The Computer Society of India is the first and the largest body of computer professionals in India.

2.  So whats exactly HUMANE COMPUTING to which even google has limited answers....what i could gather from the forum which was presided by distinguised and expert speakers is produced below in as brief to understand possible words.

3.  The concept would be easier to understand with the help of few examples cited by the speaker :

-  Firstly imagine one typical branded washing machine getting faulty after few months of completion of warranty.Is it typical? or could it have been programmed to do so intentionally?

-  Secondly ,remember the movies I-Robot@Will Smith or Robot@my favorite Rajini Sir......both the movies revolve around the protagonist struggle to control his creation, the  robot whose software was upgraded to give it the ability to comprehend and generate human emotions.....so in both the cases laws of robotics failed and the plan back fired!So both the movies were based on imagination that may be possible in future...both were runaway hits...

-   Thirdly, the matrix series(triology)...that depicts a future in which reality as perceived by most humans is actually a simulated reality created by sentient machines to pacify and subdue the human population, while their bodies' heat and electrical activity are used as an energy source. So the lead computer programmer is drawn into a rebellion against the machines, involving other people who have been freed from the "dream world" and into reality.

-   Fourthly....any time a computer programme is made ...the code is written...so many aspects are considered at design level but any where is human thought process or kind of human psych is involved?.....no!!!m sure on that...windows or linux OS has got nothing to do with human emotions....person who is drunk and is in inebriated state would be able to conduct some kind of damage via the system that he might not have attempted if he was not drunk!!!!!

4.   So by giving these examples here I am trying to make you think the reverse way....@we all are getting IT/Computer savvy in our life but when we see it from the top...do we need to become COMPUTER SAVVY?...or it should have been the reverse way...the gadget/IT around us should have become HUMAN SAVVY....u might need to read this sentence twice since I might have just pinged ur thought process and not actaully conveyed the actual meaning.The field is actually just setting in and will take much time to evolve.....its neither black nor white...its just grey...and its upto the present genre of scientists and developers to actually start sorting out black and white!!

5.   "The term Humane Computing comes to encourage study of ethics, empowerment,empathy, equality, environmental sustainability with reference to the use of technology. Since it involves coming together and study of humans as well as computers, it involves technical as well as soft subjects and diverse disciplines
ranging from computing technology to soft disciplines like sociology, psychology, education, medicine, behavioral science and communication theory. The study of Humane Computing will be able to provide insights, which may make it possible to bridge the digital divide and which may help tilt the usage of computing in a direction, which makes it work for promoting ethical practices."

6.   So thats HUMANE COMPUTING in the most grey manner...the field as on date is not even an understood thing but yes...the field is enough to create a mind start thinking of ahead ie FUTURE....

Friday, October 15, 2010

Another Wowwwwww!!!!-CYBERTECTURE

1.   First watch this video and then read few lines on what CYBERTECTURE is?



2.  A state of art technological concept that appropriates a emblematic relationship between the urban fabric and technology. It excogitates both hardware of built environment and software system and technologies from micro to macro scales of development.I am sure the video would have opened thinking horizons to what mroe can be done with this.....wish to read more....click here

Friday, October 08, 2010

Security Enabled Hardware :INTEL - McAfee Merger

1.      “Security is more effective when enabled in hardware” provisions for something in the pipe known as Security Enabled Hardware.Howzzz that???? There has been a lot of speculation about the rationale behind Intel's recent acquisition of McAfee....well if u r not aware of this Intel’s proposed $7.7billion purchase of McAfee that comes as the most magnanimous takeover deal in the chip giant’s 40-odd-year history....u better be now....although there is no product roadmap to speak of yet.




2.       McAfee technology deeply desegregated into Intel products would mean adding security functionality into Intel’s chip. But would this pushing security into silicon be able to negate the increasingly sophisticated and dynamic threats from cyber crime? Though components of security could be significantly enhanced if chips were designed integrating this way. What about updates,patches etc


3.       Security in the 21st century is about being dynamic, responding to the ever-changing threat landscape in real-time, which you can do with a cloud-based system powered by a network of threat intelligence sensors and reputation-based technologies that stop threats before they even hit the device. Pushing security down to the hardware level makes it very difficult to be reactive, agile or fundamentally secure.

Saturday, February 13, 2010

NVIDIA : Optimus technology

1. nVidia has come up with the OPTIMUS TECHNOLOGY for the mobile PCs ie Laptops, Notebooks etc. This technology selects and switches the graphics processor for an application, depending upon the type of application. It automatically swops between an integrated graphics and the discrete graphic card based upon whether the application running needs a brawny 3D chip, or not. This helps the device in offering improved performance in applications when required, while saving on battery by reducing power drain in applications that can do without 3D support.

2. Notebooks with nVidia technology as on date include Asus UL50Vf, N61Jv, N71Jv notebooks.

3. Thanks http://www.thinkdigit.com/

Powered By Blogger