Author Archive Jayanthi

Avatar ByJayanthi

Four concepts of Blockchain

Reading Time: 2 minutes

Blockchain, the technology disrupter and the decentralized shared ledger has four important points that essentially define it. They are: Consensus, Immutability, Finality, Provenance. This blog post will define these four important concepts.

Provenance:

Blockchain will be a game changer for the supply chain management system. The IBM business blog describes provenance as an “immutable audit trail of ownership & location as it changes over time” (Source: https://www.ibm.com/blogs/insights-on-business/government/proving-provenance-with-blockchain/) This audit trail promotes transparency that can never be achieved with traditional database systems.

Read More

Avatar ByJayanthi

Empowering women

Reading Time: 2 minutes

I cannot think of a better word for the alphabet ‘E’ than “empowering women”. In a world, where girls play second fiddle to boys and boys are always the wanted “gender” – it is crucial to empower the girls. 

Growing up in conservative state(of course, most of India is conservative with the exception of the metros) of Tamil Nadu, studying Computer engineering(a long time ago! :)) was a big thing(that was empowering for those days)

What does empowering really mean? It seems that this word has been thrown around quite a bit. While empowering women and girls might mean different things to different people, my only thought is to “let women and girls do what they want in life” after teaching them good values. It is the thought of protecting girls(by the parents, husband) that leads to not empowering them adequately.

Because, I have always heard girls say

  1. That they were allowed to study – but only in some place close by
  2. That they were not allowed to study
  3. That they were allowed to study but not allowed to work(what if the man who married her sat and ate her earnings?! ;))
  4. That they “have” to work(this is the other extreme!!)
  5. That they are not allowed to drive
  6. And there are million other “don’t do this and don’t do that” rules for girls and women…. 

 

 So, how will we empower them?

  1. To start off, it is good to give them the best education in the college and in the field they would like to study. At least, the opportunity should be given. 
  2. The next step will be to make them financially independent. Having a career for themselves will make them mentally and physically strong.  Of course, once motherhood comes along, it is difficult to juggle between work and home and the decision to continue the career or not should be best left to the girl herself. 

So, what are the advantages of empowering the women?

  1. They are more confident 
  2. Can handle life in case, any calamity falls on the family
  3. With today’s soaring prices, it is always good to have two incomes instead of one…

Again, my thoughts on the subject!! ๐Ÿ˜‰

This post is for the alphabet ‘E’ for Blogchatter challenge…the previous is here…

Avatar ByJayanthi

Detroit, MI

Reading Time: 3 minutes

It was a beautiful day in June when we moved to this new place. The weather was so awesome, that one might be belied into thinking that this is the norm throughout the year! One could freely travel anywhere outside without the traditional layering of clothes. All outdoor places were buzzing with activity. Parks and fairs saw life.  So, what was this awesome place? This was the ‘Motor city’ or Detroit, USA.

Read More

Avatar ByJayanthi

Caesar Cipher

Reading Time: 2 minutes

But before we see what is Caesar cipher, let us have a brief understanding of Cryptography.

From time immemorial, we are trying to make sure that important and crucial information is readable only by the right people once it has reached its destination. What if a crucial message falls into wrong hands and is read by them? This is prevented by making use of Cryptography and its various strategies.There are a number of ways(or technically called ‘ciphers’) to hide a message and the Caesar cipher is just one of them. This is done by encoding(converting to a special form) the information to be sent at the senderโ€™s end and decoding(re-converting to original form) the information on the receiverโ€™s end.

Read More

Avatar ByJayanthi

What is ‘Blockchain’?

Reading Time: 2 minutes

Blockchain is the distributed, shared ledger system with no central authority. We have all encountered ledgers in our lives. We have our own personal ledgers for keeping track of transactions. But in the case of a large business scenario, the number of transactions is huge. The number of people keeping track of those very transactions is huge too. Each person involved in the business might have their own version of transactions. Blockchain solves this problem by each ‘node’ having their own copy of the ledger.

Read More

Avatar ByJayanthi

Asset

Reading Time: 1 minute

The Blogchatter A to Z has kicked off and I start off my set of posts primarily around the theme of technical and personal posts. My latest fascination has been ‘Blockchain’ and I am striving to do my technical posts around my latest interest. 

‘Blockchain’ is the common shared digital ledger that every participant in the business sees. In the Blockchain world, any thing that has value is  called as an ‘Asset’. Assets are sold and bought and these are recorded on the Blockchain ledger. Asset is the key aspect of Blockchain. 

Assets are further classified into tangible assets and intangible assets. Tangible assets are those that can be seen and visualized. Examples of tangible assets are car, motorcycle, house.

Intangible assets are those that are abstract and cannot be seen but they play an equally vital part in the blockchain  cosmos. Examples of intangible assets are mortgage, patent, trademark. 

Cash is yet another form of ‘asset’ but it is completely anonymous. We cannot track its movements. We don’t know who we received it from and where it will go next. 

We discussed ‘Asset’ in the Blockchain world. Drop by tomorrow as I continue my ‘Blockchain’ journey…

Avatar ByJayanthi

Blockchain trainings!

Reading Time: 2 minutes

Technology is a fickle thing. The requirements change at the speed of light!(not exactly – but fast enough! :))  No sooner do we think that “Java” is the most required skill in the technology space, in comes,  “Data analytics”, “Security” and “PMP”!!

Now it is artificial intelligence(AI), machine learning and the Blockchain wave that is sweeping the technology landscape and we hear that there will(or there already is) a shortage of professionals in these areas.  This results in organizations and professionals scampering to reskill in these areas and looking for appropriate trainings. This post will list the popular Blockchain trainings around Bangalore, India and around the world.

Deal from GoDaddy!

  1. Edureka:

  Edureka’s ‘Blockchain certification course‘ is a live, instructor led course. This course provides “an overview of the structure and mechanism of Bitcoin, Ethereum, Hyperledger and Multichain Blockchain platforms”( Source: https://www.edureka.co/blockchain-training) In addition, this course teaches you to create your blockchain and render smart contracts on Ethereum.

2. Simplilearn

     Simplilearn offers ‘Blockchain basics‘ course and ‘Blockchain certification course’. Both the courses are online and self-paced. A few points regarding the Blockchain certification course. It helps the learner develop “a strong understanding of Blockchain technology and understand what Bitcoin is and how it works” (Source: https://www.simplilearn.com/blockchain-certification-training)

3. Coursera: IBM Blockchain Foundation for developers

In this course, IBM Blockchain experts guide one to understand the basics of Blockchain technology. It also helps one to build a simple blockchain solution. In addition, there are several tests, quizzes to asses the knowledge of the student.

4. Udemy: 

Udemy has mutiple courses on Blockchain. They can be found at this link

This post just listed a few of the sites that offer Blockchain training. For more information on each of these trainings, click the links given.

Join me as I begin my A to Z BlogChatter Challenge from April 1st!

Avatar ByJayanthi

A to Z Theme Reveal with Blogchatter!

Reading Time: 1 minute

This year I will be participating in my first ever ‘A to Z BlogChatter Challenge’. The challenge here is to blog everyday for the 26 alphabets starting from 1st April. Sundays are rest days!(Thank God! :)) More details about this blog challenge can be found here

A theme is thought to be a good way to approach the blogging challenge.  Keeping in tune with my blog, I will be choosing ‘technical blogs’ and ‘personal thoughts’ as my theme for this challenge!

Wish me luck as I embark on a new blogging adventure! ๐Ÿ™‚

Avatar ByJayanthi

2018 Cybersecurity Trends

Reading Time: 2 minutes

We are already far into the New year and with it are coming new developments in cybersecurity. 2017 was an exciting year for the cybersecurity industry, and as its growth is bound to continue into 2018, there are plenty of things you need to watch out for. Here, we are going to go over the major ones.

  1. AI Attacks

Artificial intelligence has now entered the mainstream and there is an abundance of free and commercial AI solutions. It was only a matter of time until cybercriminals dived on to the AI trend.

Well, now, they have. AI software can learn from past events in order to help predict and identify cybersecurity threats. AI is used by almost 87% of the US based cybersecurity professionals. However, it is a double-edged sword because hackers can easily use AI to launch sophisticated cyber attacks.

It can, for example, be used to automate the collection of certain information which can be sourced from public domain support forums, code anks and social media platforms.

  1. Ransomware and IoT

The Internet of Things ransomware is not making headlines yet, because IoT typically does not store valuable data. But we should still not underestimate the potential for IoT ransomware to damage devices. For example, critical systems relying on IoT, such as power grids, can fall victim to cybercriminals.

If a cybercriminal was to gain hold of a grid and the ransom was not paid, they could shut down the grid. Other IoT risks include smart cars, smart home appliances and production lines.

  1. Multi-factor Authentication

63% of data breaches involve leveraging weak, stolen or default passwords. This is because many organizations are still using a single-factor authentication, which only relies on the use of a password.

Companies tend to shy away from implementing multi-factor authentication because they think it can damage the user experience. But there is a growing awareness of password theft and, as such, it is likely that we will see a number of companies and websites implementing multi factor authentication as standard.

  1. Adoption of Advanced Cybersecurity Tech

There are many new cybersecurity technologies emerging which we will probably see a wider adoption of in 2018. For example, the use of remote browsers can be useful to isolate your userโ€™s browsing session from the main network.

Speaking of networks, deploying an encrypted VPN can be much more efficient deterrent than a single firewall and antivirus, keeping malware and sniffing well out of striking distance.

Also, dispersion technologies which imitate a companyโ€™s most valuable assets act as a honeypot trap for attackers trying to steal the data.

Plus, there will be developments in the use of technologies which can detect and respond to strange behaviour. Endpoint Detection Response systems can monitor endpoints and alert system security admins of suspicious behaviour. Also, network traffic analysis can be used to determine the type, size and origin of data packets, helping to prevent DDoS attacks which can bring down entire networks.

Cybersecurity is a serious industry and is worth over $120 billion. We will only see it grow in the years to come. If you want to learn more about cybercrime and cybersecurity, check out our infographic below.

-By Guest writer

Cyber crimes Infographic 2018

Avatar ByJayanthi

Why I don’t have a cooking blog?

Reading Time: 3 minutes

It was just around 12:00 noon on a Sunday afternoon, and she was doing her homework in her room with full enthusiasm. She had Math, Physics worksheets to complete and she was constantly having doubts about how to solve the mysterious problems. She would run to her brother to solve all her problems. He was her “demi-god” who knew the answers to all her questions. 

Suddenly, a beautiful smell seemed to be emanating from the kitchen(or so, she thought) She knew her mom was cooking lunch and there had to be some non-vegetarian dish, since it was a Sunday. What was it? She would soon know… and she continued studying. 

Finally, it was lunch time. As she sat down to eat, she was given some rice and some gravy was poured on it. She took one mouthful of it and as her mother looked at her eagerly for compliments – she exclaimed that “It tastes like spicy fish rasam,amma!! :)” All her mother’s dreams of getting good grades from her daughter went down the drain as “meen kozhumbu”(fish tangy gravy) was renamed as “spicy rasam” – which basically means that the gravy was too runny and watery!!

She had just turned 10 then, and …. as the days rolled by, every dish received critical comments.

  1. The one glass of milk that she had to have in the morning – could neither be too hot nor too cold. It had be the perfect temperature with the correct amount of sugar and health mixes.
  2. Idli was her favorite and it needed the perfect accompaniment like ‘sambar’. The sambar needed the correct amount of tanginess and taste. Unfortunately for the daughter, the mother found cooking to be a chore and one that she wanted to be done with for the day as quickly as possible! (But does that ever happen with four people in a house?!!) 
  3. Lunch had to be tasty and the gravies that her mother made were expected to be to perfection.The mother always added a lesser amount of salt marring the dish, once too often! ๐Ÿ™‚ And boy , was she not pleased!!
  4. Sending lunch to school was a different ball game altogether. The menu had to be chosen such that they were filling – yet tasty and retained their original appearance by lunch time.  Normally when the lunch was packed in the morning(usually, some variety rice) it had solidified by the afternoon!! The daughter would dig her spoon right into the tiffin box – only to get a big blog of rice stuck together!! (Yuck!!)

   In summary, Idli, noodles, pasta and biriyanis were her favorite foods. Dosa had to be crispy. Chappathis had to be the perfect circle shape(which the mother had never mastered! :)) Rajma chawal was ruled out as it did not have taste. Egg rice was too dry. 

Now coming to biriyanis – she loved biriyanis. The biriyani should not be too sticky and they needed the perfect amount of spice! The  biriyani from each restaurant was greatly analyzed. Was ‘Biriyani zone’ better or was it ‘Paradise’? She felt that meat marinated in some restaurants were better than the others. Had the mother mastered the biriyani that she wanted? The daughter thought so…(thankfully! :))

The daughter’s taste buds were in stark contrast to the mother. Where did the daughter get such smart taste buds from, she wondered? Had she inherited it from her grandfathers?

Only when she satisfies the food critic in her house, did the mother think that she will venture into food recipes… until then….it will be the technical blogs which the mother hopes she has mastered! ๐Ÿ™‚