Saturday, 27 October 2018

General Data Protection Law.



     Now, The data is a matter of trust :)



The Indian talent I.T. The Information Technology is just prevailing in the Indian markets not just by creating revenue but also by addressing the challenges. India today growing more digitally the e-wallets, government services, social media, financial transactions and what not went digital. We created the biggest IT service market and we just captivated the entire world. The biggest asset to our industry today is data. But, the other side of the coin Are you sure that your data is reaching the right place? Don’t u worried about your privacy? Definitely Yes.  Let us speak today ARE THE REGULATIONS FIT THE CONTEMPORARY IT INDUSTRY? WILL THESE REGULATIONS PROTECT THE CONSUMERS? HOW STRONG IS INDIA’S DATA PROTECTION FRAMEWORK?
 To check all the above sequence of questions India drafted the bill on data protection. The cross-border data transfer is always a threat to the national integrity and its citizen's privacy. The bill has just ensured that the rights of all the stakeholders are protected. There has been a lot of study and India has just incorporated the best practices from China and European countries.
The core principles of India’s data Protection Bill is:

Right to be forgotten: The individual has the right to restrict the use of data at any point in time.
Data localization: Yes, the cross-border sharing is a big threat to the nation. So, the bill passes the regulations to store the copy of data in Indian servers.
Maximum penalty provision: The illegal data usage is now the punishable civil offense.
Incorporation of the data protection authority to regulate the law: The government official department and the ministry will be the authority and protects the customer’s interest.

The slogan of the data protection bill is “right to privacy is the fundamental right”. It also says that it is necessary to create a collective culture that fosters a free and fair digital economy, respecting the informational privacy of individuals, and ensuring empowerment, progress and innovation. The bill has rightly recognized that the data in India will solve a lot of problems and helps the nation the better place to live.

India generates much more data with just one proposed regulatory body to overview the entire regulation. In the current draft Indian Personal Data Protection Bill 2018, the focus is apparently on data monitoring and control (in certain aspects). Further, neither the draft Bill nor the report has delineated the technology aspect of the framework — how the Right to be forgotten, Right to access, and other rights being extended to data principals will be exercised.

Now, the data has become the matter of trust for India, the draft hasn’t used the phrased “right to erase” but the “right to restrict or prevent”.

Everything is sounding good but the reality stands in it’s enforcement. The bill has left us with unanswered questions like the storage of data, how it’s going to tackle the security related issue, when it comes to data storage and hence is a little raw in its approach, a nightmare for many big data, artificial intelligence (AI), machine learning (ML), and IT companies.


 Apart from all criticism, the BILL should really encourage and it’s really the great take off against all the odds.

Sunday, 2 September 2018

Now, find your Sweet heart with Data Analytics !




LOVE in Online !!! Days were gone where we search for the loving peer in our college classrooms and hostile office rooms. We live in the digital age where the web is the world.
In the early 90s, chatting, instant messaging, and the Internet community were ways that individual connected online. In recent years, social media platforms including Facebook and Twitter have attracted people around the world to build and expand their social network online. As with such technical and cultural context, online dating services have emerged for the purpose of helping users find new people online who are well-matched with them. The concept of online dating has become famous in the early 2000s. Now, the one in every 18 Americans is using Big data Analytics to find there companionship.  

The online dating sites collect data about customers like there hobbies, interests, passion, likes, dislikes etc. The information is analyzed, compiled in a database system and then shifted to a variety of different algorithms to predicts the best matches. The dating sites use different algorithms to find the best matches and thereby they compete themselves for better customer satisfaction.  


Here is how I explain the basic algorithm that the online dating sites use.
The site asks the questions and thereby they evaluate ur compatibility. They give the points for every question. 

 Alice

Sunday, 25 March 2018

BLOCK CHAIN .

       The way I understand the Blockchain

  Blockchain - The biggest financial revolution of the decade.

Let us assume that there are two people raghava and rakesh . raghava borrows some money from rakesh and rakesh  writes it on a piece of paper signed by raghava. After some days raghava denies the existence of such document and claims that rakesh has forged that piece of paper. rakesh would now find it difficult to prove that raghava actually owes him Money.
In this example, rakesh  and raghava are two nodes.
Now assume the same scenario, but among a society. So there is ’k’ pair of people transacting with each other. And the only proof that each pair has, is that piece of paper. Looking at this scenario, one person, gayathri comes up with a solution. She suggests maintaining a common notebook of the transaction for the entire society. She designates town hall to be the place where every exchange takes place. In the common notebook, every pair writes the transaction and then the notebook is kept safely. People rejoice and accept gayathri as their leader.
That notebook can be called a database.But one day, somebody spills wine on the notebook. This makes the notebook illegible. Taking the advantage of this situation, raghava again denies taking money from rakesh.
This is the problem databases face - a single point of failure.
Irritated by this problem, gayathri comes up with another solution. She suggests maintaining multiple notebooks. She chooses some trustworthy people from the society and gives them a notebook each. Now every time a transaction or exchange takes place between two people, gayathri instructs some of those trustworthy people to mention the transaction in their notebooks. So the data is repeated in the notebooks. Now, even if one notebook is destroyed, chances are that all the data regarding transactions are still present in the combination of other notebooks.
This is a distributed database and multiple notebooks are the multiple nodes.
But next day, another problem arises. gayathri has a friend named Raju who owes a lot of money to some people in the society. He asks gayathri for help and she agrees to help him. She instructs all the people with the notebooks to remove the entries where Raju  received money. Now Raju doesn’t owe any money based on the notebooks. Here,comes the technological solution.. The
Blockchain 

This  is the problem with distributed databases - they are centralized. That means one single entity owns all the nodes/resources and can make changes as they deem fit.
When the people from the society come to know of it, they remove gayathri from the leadership.
  1. They  decide to keep a notebook each. Every time a transaction is made between any two people, all the people from the town come together and mention it in their respective notebooks. So if there are n people in the society, then there are n notebooks and no one person controls the overall representation of the transactions.This is decentralization.
  2.  They also decide to never remove or delete an already mentioned transaction from the notebook. This is immutability.
Now when another group of people from the society, let’s call them C, try to change a record in their notebooks, all the other people also need to make the same change(as mentioned in the first point above, all the people write all the transactions in their notebooks). Before writing the transaction proposed by group C, all the other people notice that the transaction is not correct. So they come to realize that C is trying to make a fraudulent transaction. Hence they deny that transaction and not mention it in their notebooks. They also decide to banish the group C from further participating in the group. This is how Consensus is formed and voting is done to decide the validity of a transaction in Blockchain.
  •  A very enthusiastic  anitha , gayathri's mom suggested that the transactions form a chain, so they decided to call the collective set of fully replicated, decentralized, immutable notebooks as Blockchain.
So, well. This is the easiest example I can think of to explain Blockchain.
-The Blockchain is a decentralized, peer to peer, immutable storage network which is censor free and regulator free because of -the absence of one single controlling entity. Every transaction that is written is voted upon by a majority of nodes and changing something which was written before in the chain is computationally very difficult.
                                                                      - Pasupunoori.Raghava
                                                The tech savvy..........

Friday, 8 September 2017


“HYPERLOOP”- THE GLIMPSE OF FUTURE OF TRANSPORTATION


“If you are bold and strong with your determination the entire world will come up and accept you”—This is the sentence told by my friend, vineeth this evening. Yes, as I feel it’s true writing this article about my favourite project of Tesla that is “HYPERLOOP”.


Firstly, let me introduce you the idea of HYPERLOOP :-


HYPERLOOP the word itself holds some power of transforming from the way we are yes , this idea is meant to transform the transportation system. The idealist behind it is the great “Elon Musk”. The basic idea of hyperloop is like the pod which contains passengers, travels at very high speed using magnetic levitation in a tunnel with partial vacuum. This the super-fast way of transportation which will be driven using electric motors.
Confused, let me explain   see, pod is like aerodynamic aluminium capsule like structure encapsulated with a tube surrounded by a cushion of air that permits the pod to move safely at such a high speed. The pods inside a tube carries passenger with the speed of 700 kmph (astonishing !!) and the tube is almost airless propels with the velocity close to the speed of the air. So, this mechanism will make the pods to travel inside the tube with high velocity with no frictional force. The energy which is needed to run the pods is self- created that is done by adjusting magnetic levitation between pods and tubes and some percentage of energy is also created through solar energy in turn converted in to electrical energy stored in the batteries.

WHY HYPERLOOP ?
             1.“ Invention is all about making the world better place to live ”. It is estimated that on an average the people spend 20% of their income to travel because of this conventional ,costly transport system and what Hyperloop aims is getting it down to 5%.
               2. Hyperloop is 100% Environment friendly with zero pollution .(It’s great deal of the century bcz  todays transport system is worsening the environment)
                3.Time is the big boss in today’s fast moving world imagine what if you travel 700 km in an hour !
                4. Hyperloop is the mark of the fourth industrial revolution underlying all fiction foresaw flying cars and teleporters .
               5. Effective ,efficient in terms of cost and speed respectively than Japanese bullet trains, high speed trains and even aeroplanes.
             6. High resistive to natural calamities like earthquakes , the hyperloop tubes is mounted on a series of pylons, each pylon placed every 100 feet  or so . The pylon will allow for slip due to thermal expansion and earthquakes , ensuring that the tubes will not be broken by any such movement.

DRAWBACKS-
   1.  Issues of public approvals, legislations and regulations as it is all for the public domain. Political scenarios etc
     2.Untrained work force.
     3.Difficult process of re-engineering.

Feasibility:
Tesla collaborating with spacex is conducting the feasibility study in different places of the world and getting it promoted to the next generation transport system.
Already, the U.S.A approved the project and sent for the case study the first line is between the Los Angeles and California city.
The countries like China is also studying the possibilities of the project.
In India the project is positively received and the government of A.P is finding for the possibilities of line between Vijayawada to Amaravathi.
 
Elon musk  defines Hyperloop as the new age of technology which is going to change even the global transport system.
It’s all something which the normal people cannot even imagine bringing the last corner to it’s account is all want by the makers of Hyperloop. I wish let’s all to be  in the account of Hyperloop.


          Just imagine  the way it impacts the world.... 





Saturday, 2 September 2017

"LOCKY "THE NEW RANSOME VIRUS IS TO HIT INDIA



"LOCKY" --The ransome virus is expected to hit INDIA



A new crypto-ransomware type was recently discovered using an uncommon distribution method. Dubbed as “Locky”, the ransomware variant infiltrates system through a malicious macro found in a Word document. While ransomware that relies on macros have been rarely seen, the distribution technique could be linked the notorious banking malware DRIDEX, which uses similar methods.
Locky gets into victims' systems through email masquerading as an invoice with a corresponding attached Word document that's laced with malicious macros. According to researchers, the subject line of the email reads: ATTN: Invoice J-98223146 with a message that says, "Please see the attached invoice (Microsoft Word Document) and remit payment according to the terms listed at the bottom of the invoice."


Given its dangerous nature, macros are disabled by Microsoft by default. Enabling macros, as their security bulletin notes, “makes your computer vulnerable to potentially malicious code and is not recommended.” When macros are enabled and the downloaded document is opened, the installation of the malware begins. Otherwise, the unknowing victim will see lines of incomprehensible text that advises users to “Enable macro if the data encoding is incorrect”.
Locky's malware executable file is downloaded from a web server. Once installed, it begins looking for attached drives (including networked drives) and encrypts files such as documents, images, music, videos, archives, database, and other web application-related files. Encrypted files will be renamed and  appended with a “.locky” extension. Much like other ransomware variants, a ransom note in varying languages is left in every directory that has been encrypted. The message directs victims to a Tor network to make payment in Bitcoins (0.5 BTC).
[Read: How ransomware works and how to protect yourself]Researchers at Palo Alto Networks have recorded 446,000 sessions involving this new ransomware, over half of which (54%) were detected to have affected victims in the United States. Trend Micro detects this ransomware variant as RANSOM_LOCKY.A . In addition to the United States, it is seen globally, including in countries as Japan, Germany, France, Italy, United Kingdom, Mexico, Spain, Israel, and India.
Closer analysis by our researchers also shows that aside from having the same macro downloaders, there appears to be similarities on how the DRIDEX and Locky macro downloaders are coded. Both use the same file name (ladybi.exe) when dropped to the system.
Further, our researchers have come across a link between Locky and other crypto-ransomware variants. Locky, CRYPTESLA, and CRILOCK are packed by the same packer. This could either mean that this tool is used by the same distributor, or that this packer is readily-available and accessible to different ransomware authors.
Ransomware infections remain a crippling and highly effective attack form used to extort huge profits from their targeted victims. One of the most notable incidents involves a highly publicized ransomware attack that paralyzed the systems and networks of the Hollywood Presbyterian Medical Center for more than a week. The hospital's administration later admitted to paying the ransom of 40 Bitcoins, or $17,000, to restore the affected systems. Earlier reports pegged the ransom at $3.6 million, which HPMC later corrected in an official memo.