tag:blogger.com,1999:blog-8726844009873922462.post1140658794613578604..comments2024-03-28T05:22:10.255-07:00Comments on Broadsword by Ajai Shukla - Strategy. Economics. Defence.: Pvt sector to develop Rs 10,000 cr army communications networkBroadswordhttp://www.blogger.com/profile/13076780076240598482noreply@blogger.comBlogger17125tag:blogger.com,1999:blog-8726844009873922462.post-26462175704813014352010-10-09T07:58:29.082-07:002010-10-09T07:58:29.082-07:00Protocols are set of steps followed by which is ag...Protocols are set of steps followed by which is again algorithm.<br />On encryption of data similar to physical structures of molecules was done at JNU, i had a look into the output and the person left for US to work in AT & T labs. <br /><br />On my algorithm writing it's own program to develop the shortest algorithm was done at University of Queensland. I am working more on mathematical models using learning algorithms to forecast credit risk.<br /><br />However I would like to work more shortening learning algorithms used by machines, a factors that we have not considered is using psychological coefficients or using ANN/ Bayesian GMM to include psychological factors in machines. This will help the machines to develop their own nodes or programs to make faster and smarter decisions.<br /><br />Wakeup India people are working on topics that we never thought of.Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-8726844009873922462.post-11705283759039211322010-10-08T03:20:22.932-07:002010-10-08T03:20:22.932-07:00Hack a defence network? Haha.
1. It's not goi...Hack a defence network? Haha.<br /><br />1. It's not going to be on the <br />Internet. Tiny non-classified portions of it may be accessible over a very strongly encrypted VPN, although even those systems will be isolated from the core network. <br /><br />2. Every action on systems of this network will be logged and analyzed by intrusion detection systems.<br /><br />3. Sabotage. While this is a genuine cause of worry, redundancy will ensure that it will take a very coordinated attack to temporarily disable a whole network.<br /><br />4. Encryption, Authentication, Authorization. COTS software are quite reliable now, but I wouldn't trust anything that is not open-source.<br /><br />5. Anon, I know you are kidding, but some people may take you seriously. The whole network will almost certainly be IP-based, whose protocols were designed for the specific purpose of surviving a nuclear attack.bookzhttps://www.blogger.com/profile/10498156790382629217noreply@blogger.comtag:blogger.com,1999:blog-8726844009873922462.post-59132977553433124962010-10-07T16:13:55.865-07:002010-10-07T16:13:55.865-07:00In my five years of research I have developed algo...In my five years of research I have developed algorithms that optimize network path in event of one non functional node. The algorithm was defined to follow a law and develop programs, the same algorithm could be made more robust with inclusion of awareness factors and encryption technology based on physical structure of molecules, self destructive encrypted packets. I am waiting call from DRDO.Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-8726844009873922462.post-34542497991971976962010-10-07T08:00:49.077-07:002010-10-07T08:00:49.077-07:00I was not aware about this....I was not aware about this....Web Designerhttp://www.tekaseo.comnoreply@blogger.comtag:blogger.com,1999:blog-8726844009873922462.post-54053701987255992182010-10-07T01:12:58.549-07:002010-10-07T01:12:58.549-07:00Ok here is my answer.
I work in an European natio...Ok here is my answer.<br /><br />I work in an European nation and work with so many Chinese. I was speaking to one of them and he told me that it was INDIA who attacked on China in 1962. This what they learned from their elders and media.<br /><br />Next I know what is quality of their work. <br />They can hack networks only if they are deployed using Chinese devices. These hackers are nothing but Chinese developers working for these networking firms.<br /><br />BSNL in INDIA always use networking devices from China. Like ZTE, Hawai ..... And you know what, its very easy for Chinese to hack these devices, because they know what is in Software.<br /><br />Do you understand what I mean ?<br /><br />So my advice. DO not buy Chinese networking devices.<br />A network is hackable only, when you know how it is made and what is Software. And Chinese have more insight it as they produce both hardware and software.<br /><br />Any argument on this ?<br /><br />So as Ajay suggested. I give a solution<br />Some INDIAN firm produce Networking devices, including the software ( Firmware ) and we should only use that in INDIA.Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-8726844009873922462.post-41585975714922122552010-10-06T20:11:19.123-07:002010-10-06T20:11:19.123-07:00Anonymous 21:17
I agree with you that referring t...Anonymous 21:17<br /><br />I agree with you that referring to the Chinese (or our own citizens) as "chinkis" is repugnant and racist.<br /><br />I don't, however, agree that it reflects on me. If someone wants to be racist, that is his or her decision. <br /><br />You won't ever find me referring to people as "chinkis" or "niggers" or "wogs". But if someone wants to use those terms, I think it is important to allow that because that person is revealing more about himself or herself than about the subject of the comment.Broadswordhttps://www.blogger.com/profile/13076780076240598482noreply@blogger.comtag:blogger.com,1999:blog-8726844009873922462.post-46602135519100324722010-10-06T16:44:37.106-07:002010-10-06T16:44:37.106-07:00I hope, the algorithm designed by DRDO has laws th...I hope, the algorithm designed by DRDO has laws that would help the program to develop it's own algorithm<br />In case attack by foreign programs or infected systems.Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-8726844009873922462.post-25977452933623993732010-10-06T12:51:22.941-07:002010-10-06T12:51:22.941-07:00In a giant first step towards bringing India’s rep...In a giant first step towards bringing India’s reputed IT industry...<br /><br />OR<br /><br />In a giant first step towards bringing India’s reputable IT industryAnonymousnoreply@blogger.comtag:blogger.com,1999:blog-8726844009873922462.post-90921347002661628762010-10-06T12:19:37.390-07:002010-10-06T12:19:37.390-07:00This is a good area for involving the private sect...This is a good area for involving the private sector. Our information security capability and encryption enabling capabilities is considerably superior to Chinese or Pak capabilities in this area.<br /><br />We should play to our strengths and focus on IT as a force multiplier.eagle2000https://www.blogger.com/profile/00002415575348848726noreply@blogger.comtag:blogger.com,1999:blog-8726844009873922462.post-65004266430548014422010-10-06T10:58:49.885-07:002010-10-06T10:58:49.885-07:00a good step .... ajay will it be like AFNET .... a...a good step .... ajay will it be like AFNET .... also is there any thought given to unification of all the networks (if navy gets one)Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-8726844009873922462.post-75184241450925529502010-10-06T08:47:29.964-07:002010-10-06T08:47:29.964-07:00Anon@6 October 2010 17:21
Indians are the biggest...Anon@6 October 2010 17:21<br /><br />Indians are the biggest hipocrites. When a white guy calls them a Paki they are so hurt, but they have no qualm about calling the others "chinki". Look yourself in mirror first. Not sure why the blog owner allows such comments, probably a reflection of himself.Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-8726844009873922462.post-44592983746912060502010-10-06T08:04:03.727-07:002010-10-06T08:04:03.727-07:00@ Broadsword. Good reply to anony Ajai. On this i ...@ Broadsword. Good reply to anony Ajai. On this i remember a line my friend use to say. "Whatever you do, you can not satisfy everyone, there will always be an a**h**e shouting/grinning/crying somewhere in the corner".<br /><br />We need to find solutions to the problem, not to be scared of the problem. Have some positive attitude people and if you guys are worried about a problem then try to find a solution instead of question others when they try to move ahead.<br /><br />Good move by GOIInt64https://www.blogger.com/profile/01823375639414441710noreply@blogger.comtag:blogger.com,1999:blog-8726844009873922462.post-32842611038177755682010-10-06T06:36:53.145-07:002010-10-06T06:36:53.145-07:00Anonymous 17:21:
So what's your suggestion? T...Anonymous 17:21:<br /><br />So what's your suggestion? That we communicate through carrier pigeons and hand-scribbled notes like Osama bin Laden, for fear of being electronically intercepted and infiltrated?<br /><br />This country is already too full of people who can dredge up three problems for every solution. It takes nothing to list out the difficulties; take a break from that and try to list out some solutions?Broadswordhttps://www.blogger.com/profile/13076780076240598482noreply@blogger.comtag:blogger.com,1999:blog-8726844009873922462.post-62641142060412011492010-10-06T04:51:36.841-07:002010-10-06T04:51:36.841-07:00O sirji, all this networking is fine but what guar...O sirji, all this networking is fine but what guarantee do we have against these networks being hacked and disabled by the chinkis? The Chinks know we are strong on the IT side and they'll definitely try to hack us to the stone age as a prelude in any future conflict with us.Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-8726844009873922462.post-53779048559400154222010-10-06T00:22:44.525-07:002010-10-06T00:22:44.525-07:00“The contribution of the Indian industry in acquir...“The contribution of the Indian industry in acquiring and developing Technologies in critical areas shall be a key criterion in assessment of various proposals (sic).”<br /><br /><br /><br /><br /><br /><br />SUPER DUPER GREAT NEWSAnonymousnoreply@blogger.comtag:blogger.com,1999:blog-8726844009873922462.post-40303956663194644722010-10-05T22:38:42.584-07:002010-10-05T22:38:42.584-07:00Should we expect Anthony to do a Rob-bin-hood on p...Should we expect Anthony to do a Rob-bin-hood on pvt sector this time as well? :-(<br /><br />- ManneMannenoreply@blogger.comtag:blogger.com,1999:blog-8726844009873922462.post-84843657721376916142010-10-05T21:14:44.941-07:002010-10-05T21:14:44.941-07:00Well its only the EOI. We have to wait and see who...Well its only the EOI. We have to wait and see who bags the contract finally? Hope the winner will be chosen based on merit !!Unknownhttps://www.blogger.com/profile/15924100765085144784noreply@blogger.com