Thursday, December 1, 2011

Mullapperiyar Dam Issue - Bluff of a Nation

Mullapperiyar Dam Issue – Bluff of a Nation

Quite often people call politicians a bluff.
But lately what is happening in the case of Mullapperiyar Dam issue is that Politicians have made the whole nation of Kerala a Bluff.
Mullapperiyar Dam – A time Bomb”!!!  Nonsense, for that matter any dam is a Bomb if it caves! Why not Bhakranamkal  in north India and Aswan in Egypty and Idukki Dam again in Kerala  do not become bombs?
In the media you can see Kerala politicians standing right on the top of the dam and saying it may cave in at  any moment. Our politicians will risk their lives, no no my friend, they will be the last to die!

Saddest part is that, the trick of the politicians has tricked the masses and they are repeating the choruses of the politicians en-masse .
Tremors can bring Mullapperiyar Dam down any moment”!!! – Why Mullapperiyar Dam only? Termors and Earth Quakes and Tsunamis can bring anything down. Idukki dam may come down before mullapperiyar.

For all this, reason is that the so called intelligent masses of kerala has understood the intelligence of 999 years of Mullapperiyar Dam Agreement with Tamilnadu now only. That also at a lease cost of one Indian Rupee. Looks IT techies of Kerala have told the politicians that 999 is 1K and too large a number.
Although the first agreement was in the pre-independence era and became null and void after independence, Kerala Chief Minister Mr. Achuthamenon graciously  ratified it in 1970 without thinking of 999.

“Dam 999”, it is a good entertainment movie and a good animation like Star Wars and Jurasic Park.
See it and enjoy. Nothing more.
Mullepperiyar Dam will stand for 999 years and no need of  crying hoarse.

Thursday, October 6, 2011

Adieu to Steve Jobs - Apple Co-founder

Apple co-founder Steve Jobs died last night after a two-year battle with cancer. He was 56. The news came just a day after his successor, Tim Cook, hosted his first product announcement, unveiling the iPhone 4S.

In an e-mail to Apple's employees, Cook said Apple "has lost a visionary and creative genius, and the world has lost an amazing human being." Most of the time, such words have a hollow ring, but no one who's followed technology and consumer products can argue with the impact Steve Jobs had on computing, communications, design, and using technology in ways that affected not only how people worked, but how they lived. Last night, as word of his passing spread, plaudits came in from all quarters. "The world rarely sees someone who has had the profound impact Steve has had, the effects of which will be felt for many generations to come," said Microsoft's founder Bill Gates, at one time Jobs' arch-rival. "For those of us lucky enough to get to work with him, it?s been an insanely great honor. I will miss Steve immensely."
Apple now faces a huge challenge. When Jobs stepped down, analysts pointed out that the iPod, iPhone and iPad weren?t simply the products of one man's efforts. This is true. But Jobs wasn't just a visionary. He was an advocate who pushed technology to provide products that were simple, consistent, and fit neatly into the lives of consumers. People like him come along once in a generation. Apple has his legacy to build on, but now they have to do it on their own. It's not a small task, but Jobs was smart enough to develop executive bench strength and a strong culture of innovation. As Gartner analyst Michael Gartenberg said: "This is a tremendous loss of an icon for the tech community, but it?s not the time to dismiss Apple."
You can see coverage of Steve Jobs here

Wednesday, September 28, 2011

Every Third Child should be Killed???!!!

Kerala's famous Juriprudist Justice V R Krsihna Iyer in a recent report to the Kerala Govt recommended that every thrid child to parents should be killed in the womb for a welfare society!!
Alas, the right to live exists only for two children.
Mr Krsihna Iyer due to his old memory (He is 95 now) forgot that his parents had 7 children, and all born after him - Ranganayaki, Vijayalakshmi, Meenakshi, Ramachandran and Lakshinarayanan would not have seen sunlight if he had made the recommendation immediately after his birth.!!!

Today in the secular world Human Capital is the biggest Capital.
Indian Software Indsutry thrives on Intelligent Human Capital.

Many of the famous personalities would not have been alive today, If Krsihna Iyer's policy was implemented.

Krishna Iyer thinks that He is lucky beacuse he is the second child of his parent!!!

Tuesday, August 9, 2011

Malware

Malware is the biggest threat to Cyber Security especially in th E-Commerce World, because Malware can steal your credentials / password and steal your money from Banks and Credit cards without your knowledge.

According to Wikipedia:-
Malware, short for malicious software, consists of programming (code, scripts, active content, and other software) designed to disrupt or deny operation, gather information that leads to loss of privacy or exploitation, gain unauthorized access to system resources, and other abusive behavior.
The expression is a general term used by computer professionals to mean a variety of forms of hostile, intrusive, or annoying software or program code.
Software is considered to be malware based on the perceived intent of the creator rather than any particular features.
Malware includes computer viruses, worms, trojan horses, spyware, dishonest adware, scareware, crimeware, most rootkits, and other malicious and unwanted software or program. In law, malware is sometimes known as a computer contaminant

Malware is planted on your computer through internet by cyber-criminals and it sends secret information from your computer to them. Once the malware is there on your computer, when you do an internet transaction using your credit card or bank account, all the informations like user-id, password, account number etc are sent to the cyber-criminal.

Lesson is: Do not use your computer through which you do internet transactions,  for Chatting with unknown people or visiting dangerous un-secure sites.

Do You Want to Email Spoof?


E-mail spoofing is e-mail activity in which the sender address and other parts of the e-mail header are altered to appear as though the e-mail originated from a different source to impersonate and forge emails.

Though it can be legitimate, it is usually fraudulent. Because the purpose is so often malicious, "spoof" (an expression whose base meaning is innocent parody) is a poor term for this activity, which can confuse newcomers so that more accountable organizations such as government departments and banks tend to avoid the usage, preferring more explicit descriptors such as "fraudulent" or "phishing"

It is commonly used in spam and phishing e-mails to hide the origin of the e-mail message. By changing certain properties of the e-mail, such as the From, Return-Path and Reply-To fields (which can be found in the message header), ill-intentioned users can make the e-mail appear to be from someone other than the actual sender. The result is that, although the e-mail appears to come from the address indicated in the From field, it actually comes from another source.

Occasionally if the spam requires a reply from the recipient,  the source of the spam e-mail is indicated in the Reply-To field; if this is the case and the initial e-mail is replied to, the delivery will be sent to the address specified in the Reply-To field, which could be the spammer's address. However, most spam emails (especially malicious ones with a Trojan /virus payload, or those advertising a web site) forge this address too, and replying to it will be to  an innocent third party.

It is much more difficult to spoof or hide the IP or Internet Protocol address. The IP address is a 32 or 128 bit numerical label assigned to each device participating in a network and originates through the network provider making it more difficult to spoof or hide. Although this kind of verification is difficult for individual users, companies can use this technology as well as others such as cryptographic signatures (e.g., PGP "Pretty Good Privacy" or other encryption technologies) to exchange authenticated email messages. Authenticated email provides a mechanism for ensuring that messages are from whom they appear to be, as well as ensuring that the message has not been altered in transit.

Now do you want to send a spam email?!!!

There are Websites allowing that!

See the site: http://anonymizer.com

WARNING: Mind that any Legal Consequence will be yours and not mine!!!

Tuesday, July 5, 2011

Business Process Transformation (BPT ) - A Business Example

BUSINESS PROCESS TRANSFORMATION
“An organizational make-over”
“Transformation is new, and it has to be done.”

â         What is a Business Process ?
         Step By Step Work Activity
>>        It has a Beginning & End
>>     Clearly defined INPUT & OUTPUT
â         BPT Synonyms:
>>   Business Process Redesign,
>> Business Process Re-Engineering
>> Process innovation,
                    >> Business reinvention and so on

â         Why BPT?
           >> Business Transformation is a Change Management strategy  aimed to align People,    Process and Technology more closely with business strategy and vision of the Company.
           >>In turn this helps to support and innovate new business strategies

A BPT Example in Banking
Cashing a Check
                                                



Disadvantages of Legacy Processes Involved

>> 1. One Clerk for each function

e.g. SB A/C, Current A/C, DD etc

 >> 2.  Load may not be Balanced  among clerks

>> 3. Lengthy & Redundant Process

>> 4. Poor Customer Service (Important Stake holder )

â         Why?
>>   Concentrate on Functions rather than end-to-end process (Function Vs Process)
>> Lack of Authority (A Clerk cannot  approve a check  for payment)
>>   Lack of  information (Because of Manual Registers)
<<>> Need of Technology : Right information to right people at right time

â         Advantages
>> Length of Process is considerably reduced
>> Efficient
>> Better Customer Satisfaction
â        Any Further Improvement Possible?
WHY Come to Bank at ALL?

Tuesday, March 29, 2011

Technical Equation of Life


Wheel of Life


Give points between 0 and 10 (10=ideal) scale for your satisfaction level for each of the 8 areas of your life and draw a graph connecting. Center of the circle is zero and outermost is 10.
How does the shape show?
Is it a smooth figure?

Now think where you can improve with what correction? (e.g developing more friendships, spending more time at home etc)
Draw another wheel with the correction.

Personality in Audulthood.
Is there development in Adulthood?
More marked shift in personality occurs in adulthood and not in adolescence.
E,g. When adults make profound role shift (in marriage, a new job etc)
These are universal development sequence in mastery styles
These styles are unique to each adult which are the basis for experiencing various events in life
Universal changes in health, appearance and intellectual functioning have parallel in personality.

Patterns in Men
   Young men  - Active mastery
    Middle ages - Passive mastery
    Old - Magical mastery (distorted from reality -> It is OK, God will take care attitude)
Women
    Young - Passive
     Old - Active
Lifespan cognition Research
Processing Efficiency - Show age related decrease
Knowledge - greater when relevant to any task. They predominantly work in one's thought process

Thinking is the application of reasoning and other cognitive processes to one's available knowledge to achieve some goal.

Inner voice & Personal brilliance
-To avoid becoming victim of one's success
-Deal with recognising and strengthening one's inner voice and the ability to understand the inner voice of others
-Fundamental concepts includes the use of the four catalysts of personal brilliance - Awareness, Curiosity, Focus, Iniative
-Approaches can be several depending on the competeness of the professional
-Holistic intervention modules
-Using biological, psychological, social, spiritual dimension of an individual

Wishing you life events where you cherish the benefits of solving life's technical equation.

The value of experience is not seeing MUCH, but seeing WISELY


Effective Leadership

Who You Are?
    Education
    Experience
    Network (Connection with people)
    Networth (Money)
    Family
    Your body
This makes your Platform.
What you do with it is your PURPOSE
Platform is a spring board
Purpose leads to the impact you make over time.

Platform Vs. Purpose
 
 
Key drivers

             
Consumption
A need to have Eduaction
High life style
Consumption is his success
 
Low Platform / High purpose(Satisfied being a Teacher)
Altruism: desire to do good
E.g. Early stage companies

Sense of Legacy
To leave something behind (a legacy)
is the primary sense of a leader

High platform / High performance
Needs feelings for people many times away from you (down the heirarchy or un-connected)
Must have long view of time (takes a life time to make a difference)
Not fazed by failure, willing to pay personal price
Driven by sense of legacy (builds an emotional infrastructure)
Physical infrastructure just gives your presence, intellectual infrastructure matters
So Focus on emotional infrastructure

Emitional Infrastructure Companies
Leadership proximity
Rich communication lines (multiple network , not just boss to subordinate)
Vision, values
Use of Technology