Thursday, August 18, 2011

A royal journey



The forest is filled with its lush greenery every where Appu loves to play here. The river cuts through the forest with its crystal clear waters reflecting like sparkling jewels. This river has been gods blessing on our village. Its water has been a primary source of water supply since ages. The fishes in the river are the only hope of decent meal during the rains. Today the sky has its dark clouds hovering on the entire village. The baby sparrows are grown and are making a lot of noise. The mother has got some fresh supply of worms. This summer the mango tree gave many sweet mangoes. We feasted on them for weeks. Every tree in this forest has been Appu and my friend. We have grown playing with all the trees. No lad in the village knows about this forest the way I know about it.I know where exactly do we find the bigger fishes in the river. I even know the flowering and fruit bearing tree cycle. The reason why I am so close to the forest is Appu. Appu is the closest friend I could ever have. We are like one soul in two different bodies. Staring at the river I can see papa is busy with his sheep's grazing over the river bed. I need to tell him that it is going to rain. Appu seems least interested in leaving the forest. I will leave him and go with papa home. Appu will see Padma and come behind her. Chintu what are you doing in the forest? Papa I came with Appu here. The school left us early and Appu wanted to have a bath in the river. I have told you that you must not waste time in the forest. I was going to take Padma for a bath. I would have taken Appu also. Where is Padma? She is unwell. I have kept her in the shed. Chintu go get Appu we need to go home. Yes papa. I will go and fetch that useless elephant. Appu you need to walk fast papa is calling. Chintu sat on Appu and went towards his house. Papa came with his sheep along. Appu was a very good elephant he always obeyed me. Though he liked the forest he would leave it when ever I told him to. I knew one thing Appu loved me the same way as I loved him. My family always looks after elephants. My ancestors use to train elephants for the kings ride. The biggest elephants were given to the king. Our family’s job was to train the elephant and groom them. My family and Appu’s family have a very deep bond Abolishment of monarchy has put my family out of are business.My father wanted to give Padma to the local minister so that he would use Padma for the rally. Animal right activist opposed this idea. The animal right activists do not understand that these elephant had a duty to fulfill. They were not like their stray fellows. These elephants have been looked after my fore fathers since ages to serve the king. As Appu is the last elephant from the pure breed. I wont at least Appu should find a king to ride on him. I hope that some day a king will ride on him fulfilling his duty.

Wednesday, August 17, 2011

Crazy Letter to a friend

Hi,
    Hope you are feeling good today sitting in the lap of man made luxury (reference to the cozy chair you are sitting on). Today’s world is filled with human made marvels. With the state of the art technology you can connect to anybody or everybody without much effort. These things are a blessing with evil out comings. Let me give you an example it would help you understand better. We always store people number in the phone directory. We never bother to even have a look at the number. I won’t say this is a practice of sheer blindness instead it is technological addiction. The other reason could be that some even have a host of numbers at their disposal due to multiple service providers in the competitive market; it becomes difficult to remember all the numbers. The major cause of concern which I want to highlight in this email is that a person may have many logical explanations as to why he can’t recognize a friend’s number. After reading some of these facts, I want you to ponder on the evils of technology.

If there is anybody to blame then it would be wise to blame cutting edge technology for making innocent people its slave.
Hope after reading this email I have opened you eye and entered you heart again.
Have a Good day Buddy!!!   

It in five year's time


If we have a good look at the two words information and technology, they two belong to two separate parts of are modern world. Though they represent two different parts of our world, their integration has been the important corner stone in development of are age. As we are in the “Information age”, we see information is available freely everywhere. Social networking has grown into a humongous monster that has feasted upon the information provided by individual or organizations. With the ever growing population everyone wants to share information and get connected with people around the world. When we deal with information we look at three basic underlying pillars availability, integrity and confidentiality. To increase the amount of information available on the internet and so that a larger amount of data can be accessed by an individual there are major developments that are taking place. It is noted that computers which are connected to the internet using the addressing scheme IPv4, each computer in the internet is capable of reaching up to 4.3 billion other computers. Although IPv4’s 4.3 billion unique addresses, it is forecast that by 2011, the address space will be exhausted. A new format called IPv6 is slowly replacing IPv4 in some countries. IPv6 has the capability to address 2128 computers. It is the known fact that in the period of five year’s all major country will follow the IPv6 address format which will assure the availability of information worldwide. Most networks have a firewall, many have an IDS, all of them have antivirus , anti spam and some have an IPS. But none of the vendors are making it easier to combine and manage all of these technologies into a unified whole. With development of various IDS correlating with each other the concept of HIDS (host intrusion detection system) and NIDS (network intrusion detection system) functioning separately will dissolve. Imagine a scenario - an administrator is paged from the console. He or she quickly gets access to the machine only to learn that Mary’s computer in the head office has sent an alert - several of his system files have been modified. The console also presents the administrator with summaries and graphs of recent traffic reported by Mary’s HIDS, as well as those on the head office network. An attacker has scanned the entire network looking for susceptible machines, found one with Mary and exploited the hole in an outdated HTTP server that was left running. Even worse, Mary’s machine has reported a lot of outgoing traffic directed at one particular external machine. The console’s analysis has labeled this anomalous behavior as a potential DoS attack. Now our administrator has a report of what happened exploit - scan and successful attack, why it happened - HTTP server is outdated, and the results - corrupted system files and malicious out-bound traffic. The administrator can quickly review the client configurations which are readily available at the console due to the recurring scans taking place, learn that no other machines have the vulnerable server in place and proceed to cleaning up Mary’s machine. So that this situating become real it is essential that the console will need to communicate with multiple pieces of the network architecture: firewalls, routers, switches and even different ID systems. This development will need a collaborative effort from fields like AI and ubiquitous computing.
                        Not only the field of information assurance and integrity has come a long way but also authentication of information has seen some major development. Mechanism of authentication has evolved Biometrics itself has evolved from finger print analysis to typing speed detection. What we can expect to be implemented in future is fully automated biometric system in airport where travelers will instead simply pass through an automatic gate that will instantly verify their identity and security risk. UK is one of the first countries to under take the initiative to implement this technology. We also can expect biometric technologies like body shape recognition, full internal organ structure detection, analysis of face and head vibration during talking and analysis of other electrical and magnetic fields, created by man’s body or of its reactions to such fields. Technology has enhanced itself with attributes of mobility, portability, sleek and stylish. Stationary desktop computer are replaced with light weight, portable laptop. Even the laptop has lost its charm with the tablet and smart phones. Next five years the cell phone will evolve into a fully developed computer that fits into your pocket. New trends in mobile application could be money transfer where we can transfer money through SMS. Mobile advertising is also something which will catch up by 2015 when the reach of internet will increase more than the reach of television. Mobile web browsing capability is expanding rapidly in an effort to display sites in a manner similar to a PC. This includes complete audio and video, dynamic content, support for advanced technologies such as Ajax, Flash and faster page load times.
                        GPS technology will also be some thing to watch out for. Garmin & TomTom are developing a car GPS unit that will not only give warnings about impending danger coming your way, but also try to link to steering mechanism and guide the driver to safety. Traffic pattern detection and also suggesting alternatives, improvement in Bluetooth compatibility few states have now accepted usage of cell phones with Bluetooth hands-free devices while driving, so the future GPS devices will help you in synchronizing with your cell phone and making calls with Bluetooth hands-free devices effortlessly. There are many more innovative technologies that will hit the IT industry in the near future. They all will make are life a lot simpler, interesting and adventures. The fields which will see a large amount of technological change will be Artificial Intelligence, Social Networking, Cloud Computing, Animation, Cellular Technologies to name a few. The microprocessor becomes the heart of every machine grating it the capability to think and react. Every major organization is into engineering a future driven with state of the art technologies. This will create a holistic experience for the consumer.
It is difficult to judge the future of technology with loads of innovative minds put to work but it will be full of fun filled surprises.

         

About Me

My photo
Everything and anything can inspire me.

Followers