സ്ത്രീകള്‍ എങ്ങിനെ വസ്ത്രം ധരിക്കണം എന്ന് പുരുഷന്‍ നിഷ്ക്കര്‍ഷിക്കുന്നത് ശരിയോ? അല്ലെങ്കില്‍ തിരിച്ചും?

Thursday, December 29, 2011

Year End Review, 2011 Department of Posts


Year End Review of Achievements and Initiatives of Department of Information Technology
Draft National Policies on Electronics-2011 and Information Technology-2011 Released
Steps taken to Make India Hub for Electronic Hardware Manufacturing
Four New Mission mode Projects (MMPs) Added under NeGP
Electronic Delivery of Services Bill Introduced in Parliament


Draft National Policy on Electronics – 2011

The Draft National Policy on Electronics, 2011 (NPE 2011) was released on 3.10.2011. The draft Policy envisions creating a globally competitive Electronics Systems and Design Manufacturing (ESDM) industry including nano-electronics to meet the country's needs and serve the international market. One of the important objectives of the Policy is to achieve a turnover of about USD 400 Billion by 2020 involving investment of about USD 100 Billion and employment to around 28 million by 2020. This includes achieving a turnover of USD 55 Billion of chip design and embedded software industry and USD 80 Billion of exports in the sector. Another important objective of the Policy is to significantly upscale high-end human resource creation to 2500 PhDs annually by 2020. The Policy also proposes setting up of over 200 Electronic Manufacturing clusters in the country.


Draft National Policy on Information Technology, 2011

Draft National Policy on Information Technology, 2011 (NPIT 2011) wasreleased on 7.10.2011. The Policy aims to maximally leverage the power of Information and Communication Technology (ICT) to help address economic and developmental challenges of the country. The focus of the IT policy is on deployment of ICT in all sectors of the economy and on providing IT solutions to the world. The Policy focuses on application of technology-enabled approaches to overcome developmental challenges in education, health, skill development, financial inclusion, employment generation, governance etc., to greatly enhance efficiency across the board in the economy. The Policy seeks to achieve the twin goals of bringing the full power of ICT within the reach of the whole of India and harnessing the capability and human resources of the whole of India to enable India to emerge as the Global Hub and Destination for IT-ITeS Services by 2020. It is rooted in the conviction that ICT has the power to transform India and improve the lives of all Indians.

E-Governance

Mission Mode Projects (MMP)- 4 New MMPs (Education, Health, PDS and Posts) have been added under NeGP taking the total number of MMPs under NeGP to Thirty One (31). Posts has been added as a Central MMP while the remaining three (3) MMPs (Education, Health and PDS) have been added as State MMPs.

A major initiative of the Government for ushering in e-Governance on national scale, called National e-Governance Plan (NeGP) was approved on 16thMay 2006. NeGP consists of Mission Mode Projects (MMPs) and program support components which aim at creating the right governance and institutional mechanisms, core infrastructure, policies & standards and the necessary legal framework for adoption of e-Governance in the country. It is implemented at the Central, State and Local Government levels. Significant achievements in this area are as under:


Electronic Delivery of Services (EDS) Bill provisioning mandatory delivery of all public services in e-mode in next five years has been approved by the Union Cabinet on 20.12.2011 and introduced in Lok Sabha on 27.12.2011.

Common Service Centres - As on 30th November, 2011, a total of 97,439 Common Service Centres (CSCs) have been rolled out in thirty three States and UTs. 100% CSCs have been rolled out in 13 States. A proposal to set up additional 1.5 lakh Bharat Nirman Common Service Centres so as to have one CSC in each Panchayat in whole of rural India has been prepared.

State Wide Area Networks - The State Wide Area Networks (SWANs) are already operational in 29 States.


State Data Centres - The State Data Centres have been made operational in 16 States.


e-District - e-District Pilot project has gone live in 12 States. Scheme for National Rollout of e-District MMP has been approved. Guidelines for National Rollout of e-District MMP has been finalized.


Capacity Building (CB) - Under the CB Scheme, State e-Mission Teams (SeMTs) have been setup in 32 States and UTs. Over 1000 Government officials have been trained under Specialized Training for e-Governance Programme (STeP). The first Chief Information Officer (CIO) training for officers of Central and State & UT officials has started on 7th November, 2011.

Standards To ensure sharing of information and seamless interoperability of data and e-Governance applications, Policy on Open Standards, Biometric standards, Metadata and Data Standards, Localization and Language Technology standards, Network and Information Security, Digital Signature, Quality Assurance, Website Design Guidelines have been notified by DIT.

Mobile Governance - A Draft Policy on Mobile Governance has been formulated.

Awareness and Communication - 11 Workshops have been held across the country. The 14th National Conference was held in February 2011.


Citizen Engagement and Social Media Framework - For wider and deeper participation and engagement with all stakeholders especially public at large, a Citizen Engagement Framework for e-Governance Projects has been developed.

Electronics Hardware Manufacturing (EHM)

The Government has attached high priority to electronics hardware manufacturing. It is keen to develop an ecosystem, which will make India a global destination for electronics system design and manufacturing. The significant achievements during the course of the year are as follows:

Setting up of Semiconductor Wafer Fabs: An Empowered Committee (EC) for identifying technology and investors for setting up Semiconductor Wafer Fabrication (Fab) Manufacturing facilities in the country was constituted. The EC after interacting with the potential investors will crystallize the nature and quantum of Government support in physical/financial terms and recommend to the Government the course of action to attract investments in the sector.

Roadmap for promoting growth of semiconductor design and services industry: India Semiconductor Association (ISA) has carried out a “Study on semiconductor design, embedded software and services industry” with the support of Department of Information Technology (DIT). The report covers Very Large Scale Integration (VLSI) design, Embedded software design and Hardware/board design. A roadmap has been prepared to enable semiconductor design and services industry to move up the value chain and maintain growth rate of revenue of over 17% p.a.

Roadmap for promoting growth of electronic components industry:Electronic Industries Association of India (ELCINA) has carried out a Study entitled “ELCOMOS - Electronic Components, Hardware Market and Manufacturing Output Study including related Assemblies and Value Chain in India” with DIT’s support. A roadmap has been prepared for promoting growth of electronic components industry.

Communications and Brand Building Campaign for promotion of ESDM sector in India: The Campaign has been launched with the objective to build “Made in India” as leading global brand in ESDM and increasing awareness regarding initiatives taken by Government to promote investments in ESDM sector.

Mandatory compliance of safety standards for electronic items: A draft Order in respect of safety standards for 16 selected electronic items has been prepared and consultations are underway with the Department of Consumer Affairs and Bureau of Indian Standards to notify mandatory compliance.

National Informatics Centre (NIC)


National Informatics Centre (NIC) is the premier S&T organization under the aegis of the Department of Information Technology, Ministry of Communications and IT. It is the principal e-Governance solution provider. During last one year, it has implemented several e-Governance applications and services in addition to strengthening the computing and data communication infrastructure in the country. Notable achievements of the year are:

Augmentation of NICNET: During last one year, NIC has established three National Data Centres in the country to support large e-Governance applications. NIC is also facilitating the hosting of more than 7000 websites/portals of various Government Departments.

e-Procurement: GePNIC is developed as a generic e-Procurement System by which manual tendering activity is carried out in a secure environment. GePNIC has been implemented in 13 State and UTs 35,146 tenders worth over Rs 45,218.10 Crores, have been processed successfully during current financial year till 30th Nov 2011. Department of Commerce has decided adoption of NIC’s e-Procurement System in Government departments of 23 states as a part of MMP on e-Procurement.

e-Court: It is a project of great importance aimed at creating ICT infrastructure for various levels of judiciary from Supreme Courts to sub-district courts, resulting in improved level of disposal of cases at various levels. The ICT infrastructure has been set up in more than 450 court complexes during the current financial year.

e-Counseling for admissions to professional courses: e-Counseling System of NIC has helped crores of students in the admission process for various professional and technical courses of more than 20 State Boards of Technical Education resulting in considerable saving of time and money on the part of admission aspirants as well as the State boards.

e-Office: e-Office enables working in the Government leading to greater transparency and efficiency. This application has been implemented in more than dozen Central Government departments and some of the State Govt. Secretariat ushering into an electronic age of management of Government files.

MGNREGASoft: This application is a centrally hosted service being used by the Department of Rural Development, Government of India and various State Governments in the management of the whole work flow of the implementation of the Mahatma Gandhi National Rural Employment Guarantee Act right from registration to finalization of wages of workers of one of the largest social sector schemes in the world.

National Knowledge Network (NKN)
The Government’s decision to set up National Knowledge Network was announced in the Budget Speech of Union Budget for 2008-09. In March 2010 the Government approved the establishment of the National Knowledge Network (NKN) over a period of 10 years. The objective of the National Knowledge Network is to interconnect institutions of higher learning with a high speed data communication network. Network will consist of an ultra-high speed Core (multiples of 10Gbps and upwards), and over 1500 nodes. It is scalable to higher speed and more nodes also. The Core shall be complemented with a distribution layer at appropriate speeds. The participating institutions can directly or through distribution layer connect to the NKN at speeds of 100 Mbps /1 Gbps. The application areas envisaged under the NKN cover: Agriculture, Education, Health, e-governance, Grid Computing (High Performance Computing). As on 30th November, 2011, a total of 450 Institutions are connected to NKN, and 43 virtual classrooms have been setup.

Nanotechnology

Department of Information Technology (DIT) started Nanotechnology Development Programme during the 10th Plan with the objective to create infrastructure for research in nanoelectronics and nanometrology at the national level and also to fund small and medium level research projects in specific areas such as nanomaterials, nanodevices, Carbon Nano Tubes (CNT), nanosystems etc. Two major nanoelectronics centres have been set up in the country. These centres have become Centres of Excellence in Nanoelectronics (CEN) and are being recognized nationally and internationally and attracting young talent. The facilities of these centres are being made available to all other users in the country as well as abroad through Indian Nanoelectronics Users Programme (INUP) funded by DIT. More than 110 R&D projects from more than 100 external organizations across the country have been taken up so far under INUP. About 1150 manpower from more than 350 organizations across India have been trained through INUP.
****

Source : PIB dtd 28/12/2011

How to quickly Repair your Mobile Phone dropped in water?



Many of you get your mobile phone wet by one way or another. You worry as you mistakenly drop your mobile phone in water. It can also get wet if you are out in a heavy rain. However, there is no need to panic. It is possible to save your wet mobile phone by quickly repairing it. In order to save your mobile phone from water damage, you can consider these easy and simple solutions:

Act rapidly :
The first thing you have to do in order to save your wet mobile phone is to act rapidly. Quickly remove all the detachable parts as well as covers possible such as the back cover, battery, the SIM card, memory card etc. Next, take a piece of cloth or a tissue paper to wipe the excess water you are able to notice within the mobile phone. Make sure that you dry it completely. If you don' t do this, the water inside the mobile phone will begin to evaporate and gather in places which will be difficult to reach.

This will save your wet mobile phone and it will start working if it was under water for just a little while.

Using a Hairdryer :
Take a hairdryer and begin drying the mobile phone while giving more consideration to the place where the battery is located. The battery housing usually consists of tiny holes to let in air (so giving more space for water) inside the mobile phone.
Make sure that you are not holding the hairdryer very near to the mobile phone. Keeping it too close to the mobile phone may harm the electrical mechanism of the mobile phone. Keep on drying the mobile phone from a safe distance for about twenty to thirty minutes.

If solution number 1 and solution number 2 don't work, try solution number 3.

Drying for a long time:
Take off the covers as well as battery from the mobile phone. Put the phone in a dry as well as warm place to let the water inside the phone evaporate gradually from the little holes in the mobile phone.

Courtesy : saparavur.blogspot.com

Dopt order: Extension of Risk Allowance till 31.12.2011

No.21012/01/12008-Estt.(Allowance)
Government of India
Ministry of Personnel. Public Grievances and Pension
Department of Personnel & Training

New Delhi, December 28 2011
OFFICE MEMORAPUM
Subject: Extension of Risk Allowance till 31.12.2011.
The undersigned is directed to refer this Departments OM No.21012/01/2008-Estt.(AL) dated 19.07.2011 vide which payment of Risk Allowance was extended till 31.12.2011. Extension of Risk Allowance for a further period of six months beyond 31.12.2011 has been considered and it has been decided that Risk Allowance may be continued at the existing rates for a further period of six months upto 30.06.2012 or till such time Risk Insurance Scheme is implemented, whichever is earlier.
sd/-
(Zoya C.B.)
Under Secretary to the Govt. of India

Source: www.persmin.nic.in

View Original Order

All In One Tool For System Checkup, System Cleanup, System Speedup, Network Security And PC Performance

Toolwiz Care is a free tool kit designed to speed up your slow PC. With multi-functional optimization suite, this Windows system optimizer provides a collection of tools which includes System Checkup,System Cleanup,System Speedup,and 40+ powerful tools to enhance your PC performance, local and network security, and optimize the start-up procedure. Toolwiz team guarantees users that Toolwiz Care will stay free forever. This tool kit is designed for all levels of PC users from beginners to experts.
Latest Version: 1.0.0.230
Operating System:Windows XP/2003/Vista/Server 2008/7
Category:Diagnostic Software
File Size: 3.9 M




  • The Disk Cleaner tool will clean out all junk files.
  • The Registry Cleaner tool will make the PC system more stable by cleaning out the bad Registry entries.
  • The Registry Defrager rebuilds PC’s Registry, making the entire system run quicker and smoother.
  • The History Cleaner protects the user’s privacy by deleting all activity history and surfing traces.
  • The Fast Defrger will de-fragment the hard drive with it’s smart engine, keep the PC running efficiently and prevent the formation of other fragmented files.
  • The Checkup module provides a full report of user’s PC system and allows the user to fix all problems with one simple click.
  • The Boot Report provides a easy to read report that shows the start-up time of user’s system. It offers a detailed list of the processes loaded since booting.
  • The Startup Optimizer allows the user to disable or delay the loading of any startup entries. It also provides the users with suggestions of standard processes.
  • The Game Booster concentrates every system resource for gaming purpose. It temporarily shuts background processes and other unnecessary Windows services. The Game Booster also cleans out the RAM and intensifies processor performance.
  • The Password Generator creates highly secure passwords with upper and lower case letters, numbers and punctuation symbols.
  • The File Undelete data recovery software ensures recovery of data permanently deleted from the Recycle Bin or with the help of SHIFT + DELETE key.

Wednesday, December 28, 2011

Overview of Print to Post

Print to Post is an unique product of India Post that offers total solutions to the businesses covering printing services, mail room services, distribution services and bill collection services. In the past, businesses were going to printers for their print requirements, mailing agents for pre-mailing requirements and post office for mailing requirements. With Print to Post service, businesses can walk to the Post office for a one-stop-shop service that combines printing, inserting, sealing, franking, mailing , distribution and collection of the bills

Once printed, the bills and other communication will be sent by letter post or Speed Post, as per the requirements of the customer. The entire communication chain becomes easy and integrated, through Print to Post services. The facility provides state of the art high speed variable printing in multi-colour duplex printing systems.
Range of solutions offered under Print to Post The primary objective of Print to Post’ is to provide value addition to the businesses, by providing an integrated service covering the following areas.

  • Printing of bills, invoices, direct mailers, etc that involve variable printing process in a large scale.
  • Pre-mailing processes including inserting, sealing, franking etc using mechanized systems.
  • Distribution of the materials through Standard Post, Registered Post or Speed Post as per the requirement of the customers.
  • Collection of bills from the customers through Post office network.

Benefits to the customers: Printing, distribution and collection under one roof

With Print to Post, businesses can focus on their core business effectively and leave the non-core areas like printing, mailing, distribution and collection to India Post, which has the required expertise in distribution and collection across India. Under this service, printing, distribution and collection will be under one roof, thus providing enormous cost advantage to the businesses. The target sector of this brand new service is Government, Banking, Insurance, Utilities, Telecom and other organizations. Already India Post is handling the mails of banking and insurance sectors along with the mail of sectors like electricity, water supply and other public utilities. In the Print to Post, India Post will have the capacity to print these mailers efficiently, month after month, and deliver the printed mail to customers in time.



Courtesy : saparavur.blogspot.com

Logging on with a touch or a phrase







Passwords are a pain to remember. What if a quick wiggle of five fingers on a screen could log you in instead? Or speaking a simple phrase?
Neither idea is far-fetched. Computer scientists in Brooklyn are training their iPads to recognize their owners by the touch of their fingers as they make a caressing gesture. Banks are already using software that recognizes your voice, supplementing the standard PIN.
And after years of predicting its demise, security researchers are renewing their efforts to supplement and perhaps one day obliterate the old-fashioned password.

"If you ask me what is the biggest nuisance today, I would say it's the 40 different passwords I have to create and change," said Nasir Memon, a computer science professor at the Polytechnic Institute of New York University in Brooklyn who is leading the iPad project.
Many people would agree. The password has become a monkey on our digital backs - an essential key to our many devices and accounts, but increasingly a source of exasperation and insecurity.
The research arm of the Defense Department is looking for ways to use cues like a person's typing quirks to continuously verify identity - in case, say, a soldier's laptop ends up in enemy hands on the battlefield. In a more ordinary example, Google recently began nudging users to consider a two-step log-in system, combining a password with a code sent to their phones. Google's latest Android software can unlock a phone when it recognizes the owner's face or - not so safe - when it is tricked by someone holding up a photograph of the owner's face.
Still, despite these recent advances, it may be premature to announce the end of passwords, as Bill Gates famously did in 2004, when he said "the password is dead."
"The spectacularly incorrect assumption 'passwords are dead' has been harmful, discouraging research on how to improve the lot of close to two billion people who use them," Cormac Herley, a researcher at Microsoft, the company that Mr. Gates founded, wrote in a recent paper. Mr. Herley suggested instead that developers try "to better support the use of passwords" - for example, by helping people protect their wireless connections from eavesdroppers. "Passwords," Mr. Herley continued, "have proved themselves a worthy opponent: all those who have attempted to replace them have failed."
The touch-screen approach of Professor Memon in Brooklyn works because, as it happens, each person makes the same gesture uniquely. Their fingers are different, they move at different speeds, they have what he calls a different "flair." He wants logging in to be easy; besides, he said, some people find biometric measures like an iris scan to be "creepy." In his research, the most popular gestures turned out to be the ones that feel most intuitive. One was to turn the image of a combination lock 90 degrees in one direction. Another was to sign one's name on the screen. In principle, the gesture can be used to unlock a device, or an app on the device that safely holds a variety of passwords.
Despite their resilience, passwords are weak, notably because their users have limited memories and a weakness for blurting out secrets. Most people need dozens of them, and they tend to pick ones that are so complex they need to be written down, or so simple they can be easily guessed. Recently, criminals have become adept at stealing passwords by sneaking malicious software onto computers or tricking users into typing them into an illegitimate site.
Companies like Facebook and Twitter have sought to address the frustration with passwords by allowing their usernames and passwords to open the door to millions of Web sites, a convenience that brings obvious risks. A thief with access to a master username and password can have access to a host of accounts.
Rachna Dhamija, a California computer scientist turned entrepreneur, sought to combat those weaknesses by breaking up the password. The user first logs in to the service that Ms. Dhamija built, UsableLogin, and signs in with her own partial password. Behind the scenes, the service verifies that the user is on an authorized device, and pulls the third piece from the cloud, generating a unique password for any Web site that the user wants to log in to - Facebook, for instance. In other words, one piece of the password rests with the user, another is stored in her device, and a third piece is kept online.
"You take a secret and you spread it across," said Ms. Dhamija, whose service was recently acquired by Webroot Software, based in Broomfield, Colo. "You're spreading the risk. The password is not stored in its whole form anywhere."
But even if a user has been authorized at the start of a session, what if someone else gains access to her computer an hour later? Darpa, the Defense Department's technology research arm, has invited security researchers to develop ways to verify a user every instant, based on the way the individual uses the machine - "for example, how the user handles the mouse and how the user crafts written language in an e-mail or document," it explains on its Web site.
Each of these techniques is driven by the notion that a password alone is an insufficient means to verify online identity. Think of them as a fortification: a password-plus. Many companies use a smart card or a security "dongle" - a small piece of hardware that plugs into the computer and functions as a key - as that second step of verification to allow access to internal networks. Today, biometrics - an individual's unique physical traits - are emerging as an alternative.
At least a half-dozen banks in the United States ask their customers to verify who they are by reciting a two-second phrase to a computer over the phone, in addition to punching in their PINs. It could be as simple as "at my bank," and a million customers could recite the very same phrase and still sound unique, according to Nuance Communications, a company based in Burlington, Mass., that makes the technology.
As mobile phones become bodily appendages for people worldwide, they too are emerging as instruments to verify identity. Google introduced its two-step process earlier this year. It sends a six-digit code to an application on a Google user's cellphone to be entered, along with a password, when signing onto a Google account on a computer or tablet. The code can also be sent as a text message for those who don't have smartphones, or it can be conveyed through a phone call.
The extra step is not mandatory, and the company will not say how widely it has been adopted. But as vulnerable as passwords are to theft and compromise, Google says, it is increasingly important for a user's identity to be verified through another channel - a cellphone, in this case.
"I think we'll start to see people using their mobile devices as their pervasive identifiers," said Brendon Wilson, a security researcher at Symantec. "The password will no longer be the final arbiter that you are you. You will see layers on top."
© 2011 The New York Times News Service

India's National Anthem, Jana Gana Mana, turned 100 today


India's national anthem, Jana Gana Mana, completes 100 years on Dec 27th. As a proud Indian we all know to sing our famous National anthem in tandem without any mistake but many few knows its history. Glad to bring to your notice that our National anthem is 100 years old and anniversary falls on 27th of this month.

Gurudev Rabindranath Tagore's 'Jana Gana Mana' was first performed on December 27, 1911, at the Calcutta session of the Indian National Congress and then adoptedas the National anthem. Let us join together and pay our respect to this great event.



Jana Gana Mana is the national anthem of India. It is written by first Nobel laureate Rabindranath Tagore in Bengali, after written Bengali converted in to Hindi. It was first sung at the Kolkota (Calcutta) Session of the Indian National Congress on 27 December 1911.


Our national anthem takes fifty-two seconds. It is the symbol of peace and our unity. Thank for all Indian to respect our national anthem.

I am requesting all citizens please respect our national anthem

The full national anthem in Hindi


जन गण मन अधिनायक जय हे
भारत भाग्यविधाता
पंजाब सिन्धु गुजरात मराठा
द्राविड़ उत्कल बंगा
विन्ध्य हिमाचल यमुना गंगा
उच्छल जलधि तरंगा
तव शुभ नामे जागे
तव शुभ आशीष मांगे
गाहे तव जयगाथा

जन गण मंगलदायक जय हे
भारत भाग्यविधाता
जय हे, जय हे, जय हे
जय जय जय जय हे!

The full national anthem in English

" Jana Gana Mana Adhinayaka Jaya He
Bharat Bhagya Vidhata
Punjab Sindh Gujarat Maratha
Dravida Utkala Banga
Vindhya Himachal Yamuna Ganga
Ucchala Jaladhi Taranga
Tubh Shubha Name Jage
Tubh Shubha Ashisha Mange
Gahe Tubh Jaya Gata
Jan Gan Mangaldayak Jay He
Bharat Bhagya Vidhata
Jaye He ! Jaye He ! Jaye He !
Jaye,Jaye,Jaye,Jaye He "



ஜன கன மன - தேசிய கீதம் தமிழில்



ஜன கன மன அதிநாயக, ஜய ஹே
பாரத பாக்ய விதாதா
பஞ்சாப சிந்து குஜராத் மராத்தா
திராவிட உத்கல பங்கா
விந்தியா ஹிமாச்சல யமுனா கங்கா
உச்சல ஜலதிதரங்கா
தவ சுப நாமே ஜாகே
தவ சுப ஆஷிஸ மாகே
காஹே தவ ஜய காதா
ஜன கன மங்கள தாயக ஜய ஹே
பாரத பாக்ய விதாதா
ஜய ஹே, ஜய ஹே, ஜய ஹே,
ஜய ஜய ஜய, ஜய ஹே!