India’s first semiconductor chips for 4G/LTE and 5G NR modems launched
Tags: IT, Mobile & Computers
Published on: 28 February 2019
TJ1400: India’s Tejas Networks launches World’s First Ultra-Converged Broadband Product
Tags: IT, Mobile & Computers
Published on: 27 February 2019
TRAI released white paper on Enabling 5G in India
Tags: IT, Mobile & Computers
Published on: 23 February 2019
India to have own public DNS for safe browsing
Tags: IT, Mobile & Computers
Published on: 23 February 2019
Google Doodle celebrates 30 years of World Wide Web
Tags: IT, Mobile & Computers
Published on: 12 March 2019
India’s first 1.3 Petaflop supercomputer to come at IIT-Kharagpur
Tags: IT, Mobile & Computers
Published on: 16 March 2019
World’s Largest e-waste Recycling Hub opened at Dubai
Tags: IT, Mobile & Computers
Published on: 27 March 2019
Facebook launches two new India-specific tools for election engagement
Tags: IT, Mobile & Computers
Published on: 27 March 2019
Shanghai becomes world's first district with 5G coverage
Tags: IT, Mobile & Computers
Published on: 30 March 2019
Facebook bans white nationalism and white separatism on its platforms
Tags: IT, Mobile & Computers
Published on: 30 March 2019
WhatsApp launches Checkpoint Tipline to curb fake news
Tags: IT, Mobile & Computers
Published on: 03 April 2019
UAE to host first Global Artificial Intelligence summit
Tags: IT, Mobile & Computers
Published on: 15 April 2019
IIT Madras develops easy OCR system for reading Bharti Script
Tags: IT, Mobile & Computers
Published on: 29 April 2019
Air Traffic Flow Management - Central Command Centre inaugurated at New Delhi
Tags: IT, Mobile & Computers
Published on: 24 June 2019
Govt inks SoI with IBM for study on using AI, weather tech in agriculture
Tags: IT, Mobile & Computers
Published on: 04 July 2019
Government identifies 9 missions for scientific innovation
Tags: IT, Mobile & Computers, Artificial Intelligence, Fourth Industrial Revolution
Published on: 07 March 2019
Internet Saathi programme extended to Punjab and Odisha
Tags: IT, Mobile & Computers
Published on: 17 July 2019
Medicine From the Sky: Telangana Govt, WEF ink MoU
Tags: IT, Mobile & Computers, Fourth Industrial Revolution
Published on: 20 July 2019
Brain-computer interface for stroke patients
Tags: IT, Mobile & Computers
Published on: 21 August 2019
Smartphone app to make eye screening affordable
Tags: IT, Mobile & Computers
Published on: 29 August 2019
Facial recognition for teacher’s attendence
Tags: IT, Mobile & Computers
Published on: 08 September 2019
Tamil Nadu to store patient data on cloud
Tags: IT, Mobile & Computers
Published on: 04 November 2019
Security design flaw in Bluetooth devices
Tags: IT, Mobile & Computers
Published on: 18 November 2019
Government to frame new norms to make social media accountable
Tags: IT, Mobile & Computers
Published on: 06 December 2019
Android vulnerable to ‘StrandHogg’ malware
Tags: IT, Mobile & Computers
Published on: 16 December 2019
totok-messaging-app-could-be-a-spying-tool-of-uae
Tags: IT, Mobile & Computers
Published on: 25 December 2019
TRAI issues consultation papers on net neutrality
Tags: IT, Mobile & Computers
Published on: 04 January 2020
Using data analytics to catch GST evaders
Tags: IT, Mobile & Computers
Published on: 14 January 2020
Card details of Indians up for sale on Dark Net
Tags: IT, Mobile & Computers
Published on: 08 February 2020
Xiaomi introduces NAVIC technology in phones
Tags: IT, Mobile & Computers
Published on: 26 February 2020
Swarm robots can help control self-driving cars
Tags: IT, Mobile & Computers
Published on: 26 February 2020
Fake vaccines and drugs up for sale on dark web
Tags: IT, Mobile & Computers
Published on: 22 April 2020
Spyware and stalkerware increasing during pandemic
Tags: IT, Mobile & Computers
Published on: 28 July 2020
Prefixing 0 mandatory for landline to mobile calls
Tags: IT, Mobile & Computers
Published on: 27 November 2020
Artificial Intelligence help predict mouth cancer risk
Tags: IT, Mobile & Computers
Published on: 06 November 2020
</div>
<input type="hidden" name="articlecount" id="articlecount" value="<?php echo $this->Paginator->params()['pageCount'];?>">
<?php if($this->Paginator->params()['pageCount']>1){?>
$viewFile = '/var/www/currentaffairs.studyiq.com/plugins/Studyiq/src/Template/Pages/tags.ctp' $dataForView = [ 'headertags' => [ (int) 0 => object(Cake\ORM\Entity) {}, (int) 1 => object(Cake\ORM\Entity) {}, (int) 2 => object(Cake\ORM\Entity) {}, (int) 3 => object(Cake\ORM\Entity) {}, (int) 4 => object(Cake\ORM\Entity) {}, (int) 5 => object(Cake\ORM\Entity) {}, (int) 6 => object(Cake\ORM\Entity) {}, (int) 7 => object(Cake\ORM\Entity) {}, (int) 8 => object(Cake\ORM\Entity) {}, (int) 9 => object(Cake\ORM\Entity) {}, (int) 10 => object(Cake\ORM\Entity) {}, (int) 11 => object(Cake\ORM\Entity) {}, (int) 12 => object(Cake\ORM\Entity) {} ], 'breadcrumb' => [ (int) 0 => [ 'name' => 'Home', 'link' => 'https://currentaffairs.studyiq.com/' ], (int) 1 => [ 'name' => 'IT, Mobile & Computers', 'link' => 'https://currentaffairs.studyiq.com/tags/IT-Mobile-Computers' ] ], 'currentaffairs' => [ (int) 0 => object(Cake\ORM\Entity) {}, (int) 1 => object(Cake\ORM\Entity) {}, (int) 2 => object(Cake\ORM\Entity) {}, (int) 3 => object(Cake\ORM\Entity) {}, (int) 4 => object(Cake\ORM\Entity) {}, (int) 5 => object(Cake\ORM\Entity) {}, (int) 6 => object(Cake\ORM\Entity) {}, (int) 7 => object(Cake\ORM\Entity) {}, (int) 8 => object(Cake\ORM\Entity) {}, (int) 9 => object(Cake\ORM\Entity) {}, (int) 10 => object(Cake\ORM\Entity) {}, (int) 11 => object(Cake\ORM\Entity) {}, (int) 12 => object(Cake\ORM\Entity) {}, (int) 13 => object(Cake\ORM\Entity) {}, (int) 14 => object(Cake\ORM\Entity) {}, (int) 15 => object(Cake\ORM\Entity) {}, (int) 16 => object(Cake\ORM\Entity) {}, (int) 17 => object(Cake\ORM\Entity) {}, (int) 18 => object(Cake\ORM\Entity) {}, (int) 19 => object(Cake\ORM\Entity) {}, (int) 20 => object(Cake\ORM\Entity) {}, (int) 21 => object(Cake\ORM\Entity) {}, (int) 22 => object(Cake\ORM\Entity) {}, (int) 23 => object(Cake\ORM\Entity) {}, (int) 24 => object(Cake\ORM\Entity) {}, (int) 25 => object(Cake\ORM\Entity) {}, (int) 26 => object(Cake\ORM\Entity) {}, (int) 27 => object(Cake\ORM\Entity) {}, (int) 28 => object(Cake\ORM\Entity) {}, (int) 29 => object(Cake\ORM\Entity) {}, (int) 30 => object(Cake\ORM\Entity) {}, (int) 31 => object(Cake\ORM\Entity) {}, (int) 32 => object(Cake\ORM\Entity) {}, (int) 33 => object(Cake\ORM\Entity) {}, (int) 34 => object(Cake\ORM\Entity) {}, (int) 35 => object(Cake\ORM\Entity) {}, (int) 36 => object(Cake\ORM\Entity) {}, (int) 37 => object(Cake\ORM\Entity) {}, (int) 38 => object(Cake\ORM\Entity) {}, (int) 39 => object(Cake\ORM\Entity) {}, (int) 40 => object(Cake\ORM\Entity) {}, (int) 41 => object(Cake\ORM\Entity) {}, (int) 42 => object(Cake\ORM\Entity) {}, (int) 43 => object(Cake\ORM\Entity) {}, (int) 44 => object(Cake\ORM\Entity) {}, (int) 45 => object(Cake\ORM\Entity) {}, (int) 46 => object(Cake\ORM\Entity) {}, (int) 47 => object(Cake\ORM\Entity) {}, (int) 48 => object(Cake\ORM\Entity) {}, (int) 49 => object(Cake\ORM\Entity) {}, (int) 50 => object(Cake\ORM\Entity) {}, (int) 51 => object(Cake\ORM\Entity) {}, (int) 52 => object(Cake\ORM\Entity) {}, (int) 53 => object(Cake\ORM\Entity) {}, (int) 54 => object(Cake\ORM\Entity) {}, (int) 55 => object(Cake\ORM\Entity) {}, (int) 56 => object(Cake\ORM\Entity) {}, (int) 57 => object(Cake\ORM\Entity) {}, (int) 58 => object(Cake\ORM\Entity) {}, (int) 59 => object(Cake\ORM\Entity) {}, (int) 60 => object(Cake\ORM\Entity) {}, (int) 61 => object(Cake\ORM\Entity) {}, (int) 62 => object(Cake\ORM\Entity) {}, (int) 63 => object(Cake\ORM\Entity) {}, (int) 64 => object(Cake\ORM\Entity) {}, (int) 65 => object(Cake\ORM\Entity) {}, (int) 66 => object(Cake\ORM\Entity) {}, (int) 67 => object(Cake\ORM\Entity) {}, (int) 68 => object(Cake\ORM\Entity) {}, (int) 69 => object(Cake\ORM\Entity) {}, (int) 70 => object(Cake\ORM\Entity) {}, (int) 71 => object(Cake\ORM\Entity) {}, (int) 72 => object(Cake\ORM\Entity) {}, (int) 73 => object(Cake\ORM\Entity) {}, (int) 74 => object(Cake\ORM\Entity) {}, (int) 75 => object(Cake\ORM\Entity) {}, (int) 76 => object(Cake\ORM\Entity) {}, (int) 77 => object(Cake\ORM\Entity) {}, (int) 78 => object(Cake\ORM\Entity) {}, (int) 79 => object(Cake\ORM\Entity) {} ], 'tagname' => 'IT, Mobile & Computers', 'metadescription' => 'IT, Mobile & Computers relative current affairs, Today GK, News, Burning issues, and know what science doing IT, Mobile & Computers fields with complete report', 'metakeyword' => 'IT, Mobile & Computers relative current affairs, Today GK, News', 'title' => 'IT, Mobile & Computers relative current affairs, Today GK, News', 'sbanners' => [ (int) 0 => object(Cake\ORM\Entity) {}, (int) 1 => object(Cake\ORM\Entity) {}, (int) 2 => object(Cake\ORM\Entity) {}, (int) 3 => object(Cake\ORM\Entity) {}, (int) 4 => object(Cake\ORM\Entity) {} ], 'params' => [ (int) 0 => 'IT-Mobile-Computers' ] ] $headertags = [ (int) 0 => object(Cake\ORM\Entity) { 'id' => (int) 3, 'name' => 'Art & Culture', 'parent_id' => (int) 2, 'description' => '', 'keyword' => 'art-culture', 'sortorder' => (int) 0, 'status' => (int) 1, 'metatitle' => 'Current Affairs Arts and Cultures Articles | Current Affairs', 'metakeyword' => 'Current Affairs Arts, Cultures Articles, Cultures Current Affairs Articles, Cultures Current Affairs, Current Affairs, Current Affair GK, General Knowledage', 'metadescription' => 'Current Affairs Arts and Cultures Articles complete current affairs details of Arts and cultures with complete depth analysis or full details of all current affair Articles', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'cacategories' }, (int) 1 => object(Cake\ORM\Entity) { 'id' => (int) 4, 'name' => 'Polity & Governance', 'parent_id' => (int) 2, 'description' => '', 'keyword' => 'polity-governance', 'sortorder' => (int) 0, 'status' => (int) 1, 'metatitle' => 'Polity Current Affairs | Governance Current Affair | Polity GK', 'metakeyword' => 'Polity Current Affairs, Governance Current Affair, Polity GK, Current Affairs of Polity, Current Affairs of Governance, Current affair Polity', 'metadescription' => 'Polity Current Affairs, Governance Current Affair, and current affairs of Polity and Governance and more get with Study IQ Education Articles and full details', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'cacategories' }, (int) 2 => object(Cake\ORM\Entity) { 'id' => (int) 5, 'name' => 'International Affairs', 'parent_id' => (int) 2, 'description' => '', 'keyword' => 'international-affairs', 'sortorder' => (int) 0, 'status' => (int) 1, 'metatitle' => 'International Affairs | International Current Affairs, GK, News', 'metakeyword' => 'International Affairs, International Current Affairs, International GK, International News, International burning Issues, International Today Affairs, International Current Affair, International current affairs 2019', 'metadescription' => 'International Affairs, International Current Affairs, GK, News, burning issues and all relative information of Internation you can get here for depth knowledge', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'cacategories' }, (int) 3 => object(Cake\ORM\Entity) { 'id' => (int) 6, 'name' => 'Economy', 'parent_id' => (int) 2, 'description' => '', 'keyword' => 'economy', 'sortorder' => (int) 0, 'status' => (int) 1, 'metatitle' => 'Economy Current Affairs | Economy Current Affair 2019 | Study IQ', 'metakeyword' => 'Economy Current Affairs, Economy Current Affair, Economy Current Affair 2019, Economy GK news, Economy Affairs, Current Affairs Economy, Current Affair Economy', 'metadescription' => 'Economy Current Affairs, Economy Current Affair 2019 and all the Economy Current Affair, GK, Burning Issues, News, get on study IQ education for exams preparation', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'cacategories' }, (int) 4 => object(Cake\ORM\Entity) { 'id' => (int) 7, 'name' => 'Banking Awareness', 'parent_id' => (int) 2, 'description' => '', 'keyword' => 'banking-awareness', 'sortorder' => (int) 0, 'status' => (int) 1, 'metatitle' => 'Banking Awareness Current Affairs, GK, News, Burning Issues', 'metakeyword' => 'Banking Awareness, Current Affairs, Current Affair, bANKING CURRENT AFFAIRS, Current affair of Banking, Current affair of Bank, Current affairs of Bank, BAnk current affairs', 'metadescription' => 'Banking Awareness Current Affairs, GK, News, Burning Issues, and all the latest current affairs of Banking Awareness or Banking for Govt exams preparation', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'cacategories' }, (int) 5 => object(Cake\ORM\Entity) { 'id' => (int) 8, 'name' => 'Defence & Security', 'parent_id' => (int) 2, 'description' => '', 'keyword' => 'defence-security', 'sortorder' => (int) 0, 'status' => (int) 1, 'metatitle' => 'Defence Current Affairs | Defence & Security Current Affairs', 'metakeyword' => 'Defence Current Affairs, Current Affairs, Current Affair, Current Affairs of Defence, Security Current Affairs, Security Current Affairs 2019, Security Current Affairs daily, Defence Current Affairs Daily', 'metadescription' => 'Defence Current Affairs, Defence & Security Current Affairs and complete details of Defence & Security current affairs, burning issues of Defence, Defence Today News ', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'cacategories' }, (int) 6 => object(Cake\ORM\Entity) { 'id' => (int) 9, 'name' => 'Environment', 'parent_id' => (int) 2, 'description' => '', 'keyword' => 'environment', 'sortorder' => (int) 0, 'status' => (int) 1, 'metatitle' => 'Environment Current Affairs, Current Affairs 2019- Study IQ', 'metakeyword' => 'Environment Current Affairs, Current Affairs Articles, Current Affairs of Environment, Current Affairs Environment', 'metadescription' => 'Environment Current Affairs, Current Affairs 2019, Study IQ provide complete information of Environment Current Affairs, GK, Bunrning Issues, latest news and more', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'cacategories' }, (int) 7 => object(Cake\ORM\Entity) { 'id' => (int) 10, 'name' => 'Science & Technology', 'parent_id' => (int) 2, 'description' => '', 'keyword' => 'science-technology', 'sortorder' => (int) 0, 'status' => (int) 1, 'metatitle' => 'Science & Technology Current Affairs | Science Current Affairs', 'metakeyword' => 'Science & Technology Current Affairs, Science & Technology Current Affair, Science Current Affairs, Science Current Affair, Technology Current Affair, Technology Current Affairs', 'metadescription' => 'Science & Technology Current Affairs, Science Current Affairs, Technology today affairs and more relative Science & Technology information get here free', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'cacategories' }, (int) 8 => object(Cake\ORM\Entity) { 'id' => (int) 11, 'name' => 'Miscellaneous', 'parent_id' => (int) 2, 'description' => '', 'keyword' => 'miscellaneous', 'sortorder' => (int) 0, 'status' => (int) 1, 'metatitle' => 'Miscellaneous Current Affairs Articles 2019, GK News | Study IQ', 'metakeyword' => 'Current Affairs Articles 2019, Miscellaneous Current Affairs, GK News, Current Affairs Articles', 'metadescription' => 'Current Affairs Articles, Current Affairs GK News analysis, and all topic relative information get here free and online so no need go anywhere that makes time saving ', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'cacategories' }, (int) 9 => object(Cake\ORM\Entity) { 'id' => (int) 12, 'name' => 'Government Schemes', 'parent_id' => (int) 2, 'description' => '', 'keyword' => 'government-schemes', 'sortorder' => (int) 0, 'status' => (int) 1, 'metatitle' => 'Government Schemes Current Affairs | Govt Current Affairs StudyIQ', 'metakeyword' => 'Government Schemes Current Affairs, Government Current Affairs, Current Affairs of government, ', 'metadescription' => 'Government Schemes Current Affairs, Government Current Affairs ad all government relative latest information, news, burning issues and more get here', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'cacategories' }, (int) 10 => object(Cake\ORM\Entity) { 'id' => (int) 13, 'name' => 'Persons in News', 'parent_id' => (int) 2, 'description' => '', 'keyword' => 'persons-in-news', 'sortorder' => (int) 0, 'status' => (int) 1, 'metatitle' => 'Persons in News | Current Affairs, Awards, Books, Obituaries News', 'metakeyword' => 'Persons in News, Current Affairs, Awards, Books, Obituaries News', 'metadescription' => 'Persons in News, Current Affairs, Awards, Books, Obituaries News, and all the daily current affairs news you will get here with complete information', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'cacategories' }, (int) 11 => object(Cake\ORM\Entity) { 'id' => (int) 14, 'name' => 'Constitution', 'parent_id' => (int) 2, 'description' => '', 'keyword' => 'constitution', 'sortorder' => (int) 0, 'status' => (int) 1, 'metatitle' => 'Constitution | Indian Constitution | World Constitution ', 'metakeyword' => 'constitution, Indian Constitution, World Constitution, Country Constitution ', 'metadescription' => 'Get the all the country constitution like Indian constitution, world constitution and more here you can get all the latest information relative to constitution', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'cacategories' }, (int) 12 => object(Cake\ORM\Entity) { 'id' => (int) 15, 'name' => 'Biodiversity', 'parent_id' => (int) 2, 'description' => '', 'keyword' => 'biodiversity', 'sortorder' => (int) 0, 'status' => (int) 1, 'metatitle' => 'Biodiversity | ??? ??????? | Biodiversity Current affairs', 'metakeyword' => 'Biodiversity, ??? ???????, Biodiversity Current affairs', 'metadescription' => 'Biodiversity, ??? ???????, Biodiversity Current affairs, Get the latest Biodiversity information with us where you get all the latest information about Biodiversity', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'cacategories' } ] $breadcrumb = [ (int) 0 => [ 'name' => 'Home', 'link' => 'https://currentaffairs.studyiq.com/' ], (int) 1 => [ 'name' => 'IT, Mobile & Computers', 'link' => 'https://currentaffairs.studyiq.com/tags/IT-Mobile-Computers' ] ] $currentaffairs = [ (int) 0 => object(Cake\ORM\Entity) { 'tag' => 'IT, Mobile & Computers', 'keyword' => 'IT-Mobile-Computers', 'id' => (int) 288, 'title' => 'India’s first semiconductor chips for 4G/LTE and 5G NR modems launched', 'description' => '<p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">Bengaluru-based fab-less semiconductor company, Signalchip has launched India’s first indigenous semiconductor chips for 4G/LTE and 5G NR modems. It has launched four chips as part of its SCBM34XX and SCRF34XX/45XX series, code-named ‘Agumbe’.</span></span></span></p> <p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-family:"Quicksand",serif">Four chips are</span></strong></span></span></p> <ul> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-family:"Quicksand",serif">SCBM3412:</span></strong><span style="font-family:"Quicksand",serif"> It is single chip 4G/LTE modem including baseband and transceiver sections in single device.</span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-family:"Quicksand",serif">SCBM3404:</span></strong><span style="font-family:"Quicksand",serif"> It is single chip 4X4 LTE baseband modem.</span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-family:"Quicksand",serif">SCRF3402:</span></strong><span style="font-family:"Quicksand",serif"> It is 2X2 transceiver for LTE.</span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-family:"Quicksand",serif">SCRF4502:</span></strong><span style="font-family:"Quicksand",serif"> It is 2X2 transceiver for 5G NR standards.</span></span></span></li> </ul> <p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-family:"Quicksand",serif">Significance</span></strong></span></span></p> <ul> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">This Agumbe series of chips builds up on SCRF1401: India’s first RF transceiver chip for high performance wireless standards like 3G/4G and WiFi, created by Signalchip in 2015. </span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">Its RF sections cover all LTE/5G-NR bands upto 6GHz. These are optimally designed to support evolving network architectures like Open RAN/CRAN with flexible interface configurations. </span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">These chips are significant step in direction of indigenousation of telecom sector as they have potential to cater to the growing digital connectivity needs of India’s more than 1.1 billion mobile phones currently in use, which is one of the highest in the world.</span></span></span></li> </ul> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'indias-first-semiconductor-chips-4g-lte-5g', 'image' => 'https://www.mediafire.com/convkey/ac25/m0hd8awuvdg3kj36g.jpg', 'fbimage' => 'https://www.mediafire.com/convkey/ac25/m0hd8awuvdg3kj36g.jpg', 'metatitle' => 'India’s first 4G/LTE, 5GNR modem semiconductor chips launched', 'metakeyword' => 'In Science and Technology Current Affairs, Signalchip, launches, India’s first, indigenous, semiconductor chips,r 4G/LTE and 5G NR modems.', 'metadescription' => 'Signalchip has launched India’s first indigenous semiconductor chips for 4G/LTE and 5G NR modems.', 'author' => 'Nikhil Paigude', 'downlaodpdf' => 'http://www.mediafire.com/file/rrhku3mid9773p6/28feb_India%25E2%2580%2599s_first_semiconductor_chips.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 1 => object(Cake\ORM\Entity) { 'tag' => 'IT, Mobile & Computers', 'keyword' => 'IT-Mobile-Computers', 'id' => (int) 343, 'title' => 'One Nation, One Card Model launched', 'description' => '<p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">Prime Minister Narendra Modi launched ‘One Nation, One Card’ Model from for seamless travel through different metros and other transport systems. Under this model, India’s first indigenously developed payment eco-system for transport mobility consists of:</span></span></span></p> <ul> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">National Common Mobility Card (NCMC) </span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">Swachalit Kiraya: Automatic Fare Collection System (SWEEKAR) </span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">Swachalit Gate (SWAGAT) based on NCMC Standards.</span></span></span></li> </ul> <p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">These three indigenously developed components of payment eco-system for transport mobility together will enable use of national mobility card across country without conflict with existing point-of-sale (PoS) machines.</span></span></span></p> <p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-family:"Quicksand",serif">One Nation, One Card Model</span></strong></span></span></p> <ul> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-family:"Quicksand",serif">NCMC:</span></strong><span style="font-family:"Quicksand",serif"> It is indigenous automatic fare collection system based on One Nation One Card Model in introduced by Union Ministry of Housing and Urban Affairs.</span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">It is the first of its kind indigenously developed inter-operable transport card/ payment platform in India. </span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">It can be issued by all public and private banks the same way credit, debit, and prepaid cards are issued</span></span></span></li> <li style="text-align:justify"><em><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">It will allow customers to use single card for payments across all segments including metro, bus, suburban railways, toll, parking, smart city across country besides retail shopping and purchases.</span></span></span></em></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-family:"Quicksand",serif">Benefits: </span></strong><span style="font-family:"Quicksand",serif">Its super-quick, contactless transaction feature will help to improve seamless travel experience. </span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">This card supports various service area features such as monthly passes, season tickets, etc.</span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">It also offers value proposition for customers as they need not to carry multiple cards for different usage</span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">Moreover, stored value in it supports offline transaction across all travel needs with minimal financial risk to involved stakeholders.</span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">It automates the fare collection system and eliminates need to carry change and cash while travelling in metro, bus or train, or for toll and parking.</span></span></span></li> </ul> <p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-family:"Quicksand",serif">Background</span></strong></span></span></p> <ul> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">NCMC was envisaged as part of National Urban Transport Policy (NUTP), 2006 by Union Ministry of Housing and Urban Affairs (MoUHA).</span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">MoUHA also had committee in 2014 with representatives from National Informatics Centre (NIC), National Payment Corporation of India (NPCI), Centre for Development of Advance Computing (C-DAC), Bureau of Indian Standards (BIS) and Ministry of finance to develop NCFC ecosystem.</span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">This committee had recommended an EMV-based (chip-based) Open Loop Card. These are bank-issued single card on Debit/Credit/Prepaid card product platform that can be used for payments across all segments.</span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">Later it January 2019, MoUHA had launched pilot project for the NCMC with Delhi Metro Rail Corporation (DMRC). The first-level trials were successfully completed in collaboration with CDAC, BEL, NPCI, and State Bank of India,</span></span></span></li> </ul> <p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-family:"Quicksand",serif">Role of other agencies </span></strong></span></span></p> <ul> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-family:"Quicksand",serif">NPCI:</span></strong><span style="font-family:"Quicksand",serif"> It has developed specifications for card to support NCMC ecosystem. </span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-family:"Quicksand",serif">C-DAC</span></strong><span style="font-family:"Quicksand",serif">: It has finalised NCMC specification for AFC system including interface with bank servers. It had worked in collaboration with NPCI for this. </span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-family:"Quicksand",serif">Bharat Electronics Limited (BEL):</span></strong><span style="font-family:"Quicksand",serif"> It had designed and developed gates and reader for these cards. It makes BEL first company in India to developed such gate and reader.</span></span></span></li> </ul> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'one-nation-one-card-model-launched', 'image' => 'https://www.mediafire.com/convkey/e4f8/u5k5nf6kfxfbosa6g.jpg', 'fbimage' => 'https://www.mediafire.com/convkey/e4f8/u5k5nf6kfxfbosa6g.jpg', 'metatitle' => 'One Nation, One Card Model launched | Current Affairs, GK, News', 'metakeyword' => 'In National Current Affairs, Prime Minister,Narendra Modi, One Nation, One Card Model,NCMC, SWEEKAR, Swachalit Gate, SWAGAT', 'metadescription' => 'Prime Minister Narendra Modi launched ‘One Nation, One Card’ Model from for seamless travel through different metros and other transport systems.', 'author' => 'Nikhil Paigude', 'downlaodpdf' => 'http://www.mediafire.com/file/c8ersr37g9101q4/5Mar_One_Nation%252C_One_Card_Model.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 2 => object(Cake\ORM\Entity) { 'tag' => 'IT, Mobile & Computers', 'keyword' => 'IT-Mobile-Computers', 'id' => (int) 271, 'title' => 'TJ1400: India’s Tejas Networks launches World’s First Ultra-Converged Broadband Product ', 'description' => '<p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">India’s Tejas Networks has launched world’s first ultra-converged broadband product family - TJ1400 that can deliver wireline as well as wireless broadband services from a single integrated platform. It was unveiled at Mobile World Congress (MWC) held in Barcelona, Italy.</span></span></span></p> <p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-family:"Quicksand",serif">TJ1400 ultra-converged broadband product family </span></strong></span></span></p> <ul> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">It provides unmatched integration of multiple broadband access technologies: fixed wireless broadband (4G/LTE eNodeB upgradable to 5G), gigabit fiber broadband (GPON/NG-PON) and GE/10GE/100GE Business Ethernet services (CE2.0 certified) in highly compact, modular and energy-efficient platforms. </span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">It also converges advanced packet transport technologies including OTN, Carrier Ethernet, PTN/MPLS-TP and IP to serve as unified delivery platform for wholesale, mobile backhaul, enterprise and residential broadband services.</span></span></span></li> </ul> <p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-family:"Quicksand",serif">Benefits</span></strong></span></span></p> <ul> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">It provides highest flexibility to any operator wanting to quickly and cost-effectively roll out broadband services on fibre as well as wireless. </span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">It efficiently packs unrivalled mix of broadband access and packet transmission features in smallest possible footprint.</span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">This efficient packing significantly helps in lowering the cost of rolling out high-speed broadband networks in terms of both capex and opex. </span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">It will help India to meet its stated objective of becoming global telecom equipment hub, especially in new 5G world.</span></span></span></li> </ul> <p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-family:"Quicksand",serif">Tejas Networks</span></strong></span></span></p> <p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">It is Bengaluru-based optical and data networking products company. It develops and sells high-performance, cost-competitive networking products to telecommunications service providers (TSPs), internet service providers (ISPs), utilities, defense and government entities in over 70 countries. It is ranked among top-10 suppliers in global optical aggregation segment.</span></span></span></p> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'tj1400-worlds-1st-ultra-converged-broadband-product ', 'image' => 'https://www.mediafire.com/convkey/6715/6vm6z0d0ixs2wu16g.jpg', 'fbimage' => 'https://www.mediafire.com/convkey/6715/6vm6z0d0ixs2wu16g.jpg', 'metatitle' => 'TJ1400: World’s First Ultra-Converged Broadband Product ', 'metakeyword' => 'In Science and Technology Current Affairs, India’s Tejas Networks,world’s first, ultra-converged broadband product family, TJ1400, deliver wireline as well as wireless broadband services, single integrated platform', 'metadescription' => 'India’s Tejas Networks has launched world’s first ultra-converged broadband product family - TJ1400 that can deliver wireline as well as wireless broadband services from a single integrated platform', 'author' => 'Nikhil Paigude', 'downlaodpdf' => 'https://www.mediafire.com/file/uvhs08dzt1bw9ir/27feb_TJ1400.pdf', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 3 => object(Cake\ORM\Entity) { 'tag' => 'IT, Mobile & Computers', 'keyword' => 'IT-Mobile-Computers', 'id' => (int) 243, 'title' => 'TRAI released white paper on Enabling 5G in India', 'description' => '<p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">Telecom Regulatory Authority of India (TRAI) has released white paper on ‘Enabling 5G in India’. It calls for combined effort by industry players and regulators for timely roll-out of 5G services in India.</span></span></span></p> <p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">Union Government is aiming to launch 5G in India by 2020. It is expected that cumulative economic impact of next generation technology would be about $1 trillion by 2035.</span></span></span></p> <p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-family:"Quicksand",serif">Highlights of white paper</span></strong></span></span></p> <ul> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">There should be no regulatory or licensing barrier on path of adoption of newer and better technologies, rather, licensing and regulation framework should be enabler in fostering newer technologies.</span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">5G will enable new capabilities and use cases, which were set to impact not only consumer services but also many industries.</span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">Operators with existing 4G footprints will be able to leverage their 4G infrastructure for providing 5G services and hence, their investment requirement would be relatively lower.</span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">The traditional offerings based on connection speed and volume of usage could see a shift as range of 5G use cases across industry verticals requiring different characteristics.</span></span></span></li> </ul> <p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-family:"Quicksand",serif">5G </span></strong></span></span></p> <ul> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">It is latest wireless communication technology based on third-generation partnership project (3GPP). It succeeds 4G (LTE-A, WiMax), 3G (UMTS, LTE) and 2G (GSM) systems.</span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">It will offer far greater upload and download speed i.e. 100 times faster internet data speed than current 4G networks.</span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">It unique feature are high data rate, reduced latency, energy saving, cost reduction, higher system capacity and massive device connectivity.</span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">It will expand broadband wireless services beyond mobile internet to IoT and critical communications segment and cater high speed network connectivity for augmented reality (AR)/virtual reality (VR).</span></span></span></li> </ul> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'trai-released-white-paper-enabling-5g-india', 'image' => 'https://www.mediafire.com/convkey/2658/nuhqr3g56ebn9jm6g.jpg', 'fbimage' => 'https://www.mediafire.com/convkey/2658/nuhqr3g56ebn9jm6g.jpg', 'metatitle' => 'TRAI white paper on Enabling 5G in India', 'metakeyword' => 'In Science and Technology Current Affairs, TRAI, releases, white paper, Enabling 5G in India, combined efforts, industry players, regulators,timely roll-out, 5G services, India', 'metadescription' => 'TRAI has released white paper on ‘Enabling 5G in India’. It calls for combined effort by industry players and regulators for timely roll-out of 5G services in India.', 'author' => 'Nikhil Paigude', 'downlaodpdf' => 'http://www.mediafire.com/file/imhcs3hekc5db47/23feb_TRAI_released_white_paper.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 4 => object(Cake\ORM\Entity) { 'tag' => 'IT, Mobile & Computers', 'keyword' => 'IT-Mobile-Computers', 'id' => (int) 244, 'title' => 'India to have own public DNS for safe browsing', 'description' => '<p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">Union Ministry of Electronics and Information Technology (MeitY) will soon roll out India’s own public Domain Name Server (DNS) for safe browsing. DNS servers as directory for Internet. It helps to convert domain names that are easy for people to remember into IP addresses, which are used by computers/machines to communicate. If DNS is either slow or fails to work, users will not be able to locate web addresses.</span></span></span></p> <p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-family:"Quicksand",serif">Government’s Public DNS</span></strong></span></span></p> <ul> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">It is aimed at providing faster and more secure browsing experience for Internet users in the country. It will prevent users from visiting malicious websites. It will ensure that citizens’ data is stored locally.</span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">It will also ensure availability, particularly for smaller Interest Service Providers (ISPs) who do not have credible DNS. Bigger ones usually have their own DNS.</span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">Its roll-out will be executed by National Informatics Centre (NIC) – the technology arm of the government. NIC is already using public DNS within government network.</span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">MeitY as part of its ongoing awareness campaign for safer Internet, is also planning to reach out to end-users to educate them on DNS and how they could shift to Indian public DNS if they desired.</span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">Under government’s public DNS, Indian users’ data will be stored within the country. It will not be compulsory for users. User is free to choose any DNS. </span></span></span></li> </ul> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'india-to-have-own-dns-for-safe-browsing', 'image' => 'https://www.mediafire.com/convkey/2508/ombo160c8ggb7fh6g.jpg', 'fbimage' => 'https://www.mediafire.com/convkey/2508/ombo160c8ggb7fh6g.jpg', 'metatitle' => 'India to have own public DNS for safe browsing', 'metakeyword' => 'In Science and Technology Current Affairs, Ministry of Electronics and Information Technology, MeitY, roll out, India’s own, public Domain Name Server (DNS) for safe browsing', 'metadescription' => 'Ministry of Electronics and Information Technology (MeitY) will soon roll out India’s own public Domain Name Server (DNS) for safe browsing', 'author' => 'Nikhil Paigude', 'downlaodpdf' => 'http://www.mediafire.com/file/8gxxhbpdj9uvig1/23feb_India_to_have_own_public_DNS.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 5 => object(Cake\ORM\Entity) { 'tag' => 'IT, Mobile & Computers', 'keyword' => 'IT-Mobile-Computers', 'id' => (int) 443, 'title' => 'Google Doodle celebrates 30 years of World Wide Web', 'description' => '<ul> <li><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">Google Doodle celebrated 30 years of World Wide Web (WWW), an invention of English Computer Scientists Sir Tim Berners-Lee.</span></span></span></li> <li><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">Tim Berners-Lee in 1989 had submitted paper titled 'Information Management: A Proposal' while working at large nuclear physics laboratory CERN in Switzerland. </span></span></span></li> <li><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">This paper had proposed and what came out as first web browser- World Wide Web (WWW).</span></span></span></li> <li><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">It was made public in April 1993 and first search engine ‘Mosaic’ was launched in November 1993 to accept pictures. Since then it has been replaced by many web browsers.</span></span></span></li> <li><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">WWW had opened up internet to everyone and connected world by way of sharing of information. </span></span></span></li> </ul> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'google-doodle-celebrates-30-years-world-wide-web', 'image' => 'https://www.mediafire.com/convkey/e91a/d5k0vjy7fjknndk6g.jpg', 'fbimage' => 'https://www.mediafire.com/convkey/e91a/d5k0vjy7fjknndk6g.jpg', 'metatitle' => 'Google Doodle celebrates 30 years of World Wide Web', 'metakeyword' => 'Google Doodle celebrates 30 years of World Wide Web', 'metadescription' => 'Google Doodle celebrates 30 years of World Wide Web, Google Doodle celebrated 30 years of World Wide Web (WWW), an invention of English Computer Scientists Sir Tim Berners-Lee.', 'author' => 'Nikhil Paigude', 'downlaodpdf' => 'https://www.mediafire.com/file/ac3kfuzp2bj2x25/12Mar_Google_Doodle_celebrates_30_years_of_World_Wide_Web.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 6 => object(Cake\ORM\Entity) { 'tag' => 'IT, Mobile & Computers', 'keyword' => 'IT-Mobile-Computers', 'id' => (int) 473, 'title' => 'India’s first 1.3 Petaflop supercomputer to come at IIT-Kharagpur', 'description' => '<p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">Indian Institutes of Technology (IIT)-Kharagpur has signed (MoU with Centre for Development of Advanced Computing (C-DAC) to set up India’s first 1.3 Petaflop high-performance computing (HPC) facility and data centre. This project will be under <strong>National Supercomputing Mission</strong>. C-DAC is an autonomous scientific society of Union Ministry of Electronics and Information Technology.</span></span></span></p> <p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-family:"Quicksand",serif">Uses of 1.3PF HPC facility</span></strong></span></span></p> <ul> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">It will provide large-scale computational support to researchers engaged in research activities in diverse areas of national importance.</span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">It will be used for specific challenge domains like cryptography, molecular dynamics, chemistry, drug discovery, artificial intelligence (AI) and data sciences.</span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">It will accelerate and evolve level of research currently being done with manifold improvement in output and efficiency.</span></span></span></li> </ul> <p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-family:"Quicksand",serif">National Supercomputing Mission</span></strong></span></span></p> <ul> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">It was launched in 2016 and is implemented jointly by Department of Science and Technology (DST) and Department of Electronics and Information Technology (DeitY). </span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">It envisages installing vast supercomputing grid comprising of over 70 high-performance computing (HPC) facilities spread across the county for empowering national academic and R&D institutions</span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">Supercomputers developed under it will also be networked on National Supercomputing grid over National Knowledge Network (NKN).</span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">It also includes development of highly professional HPC aware human resource for meeting challenges of development of these applications. </span></span></span></li> </ul> <p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-family:"Quicksand",serif">Objective</span></strong></span></span></p> <ul> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">Make India one of world leaders in Supercomputing and enhance India’s capability in solving grand challenge problems of national and global relevance.</span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">Empower scientists and researchers with state-of-the-art supercomputing facilities and enable them to carry out cutting-edge research.</span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">Minimize redundancies and duplication of efforts in the country and optimize investments in supercomputing.</span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">Attain global competitiveness and ensure self-reliance in strategic area of supercomputing technology.</span></span></span></li> </ul> <p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-family:"Quicksand",serif">Application areas of mission</span></strong></span></span></p> <p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">Climate modelling, weather prediction, aerospace engineering including, computational biology, atomic energy simulations, molecular dynamics, defence/ national security applications, disaster simulations and management, seismic analysis, computational chemistry, discoveries beyond earth (astrophysics), computational material science and nanomaterials, large complex systems simulations and cyber physical systems, big data analytics. Finance and government information systems/ information repositories.</span></span></span></p> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'indias-first-supercomputer-iit-kharagpur', 'image' => 'https://www.mediafire.com/convkey/00ee/4fdztay1ma7t6be6g.jpg', 'fbimage' => 'https://www.mediafire.com/convkey/00ee/4fdztay1ma7t6be6g.jpg', 'metatitle' => 'India’s first 1.3 Petaflop supercomputer to come at IIT-Kharagpur', 'metakeyword' => 'In Science and Technology Current Affairs, IIT Kharagpur, MoU, C-DAC, India’s first, 1.3 Petaflop, high-performance computing (HPC) facility, data centre', 'metadescription' => 'Indian Institutes of Technology (IIT)-Kharagpur has signed (MoU with Centre for Development of Advanced Computing (C-DAC) to set up India’s first 1.3 Petaflop high-performance computing (HPC) facility and data centre. ', 'author' => 'Nikhil Paigude', 'downlaodpdf' => 'https://www.mediafire.com/file/7ou9ga4m7391ic9/16_Mar_India_s_first_1.3_Petaflop_supercomputer.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 7 => object(Cake\ORM\Entity) { 'tag' => 'IT, Mobile & Computers', 'keyword' => 'IT-Mobile-Computers', 'id' => (int) 560, 'title' => 'World’s Largest e-waste Recycling Hub opened at Dubai', 'description' => '<p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">The world's largest e-waste recycling facility was opened in Dubai, United Arab Emirates (UAE). It is located at Dubai Industrial Park on area of 280,000 square feet. It has been set up by “Enviroserve’ company with support of Swiss Government Export Finance Agency. It will service international e-waste recycling efforts across Africa, Middle East and Caucasus region.</span></span></span></p> <p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-family:"Quicksand",serif">Dubai’s e-waste recycling facility</span></strong></span></span></p> <ul> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">It will recycle Waste Electrical and Electronic Equipment (WEEE), Information Technology asset disposition (ITAD), refrigerant gas and specialized waste.</span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">It has processing capacity of 100,000 tonnes of total integrated waste (per year), of which 39,000 tonnes is e-waste. </span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">It utilises state-of-the-art reclamation technology, which surpasses European Union's standards for e-waste.</span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">It can process the entire range of end-of-life WEEE ranging from consumer and industrial to commercial and military appliances,</span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">These include air conditioners, computers, batteries, household appliances, mobile phones, and even military avionics. </span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">It will also recycle specialised waste material such as aerosol cans, light bulbs and FMCG products. </span></span></span></li> </ul> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'worlds-largest-e-waste-recycling-hub-opened-dubai', 'image' => 'https://www.mediafire.com/convkey/c33d/x2b3a3hm8lzpsk36g.jpg', 'fbimage' => 'https://www.mediafire.com/convkey/c33d/x2b3a3hm8lzpsk36g.jpg', 'metatitle' => 'World’s Largest e-waste Recycling Hub opened at Dubai', 'metakeyword' => 'worlds largest,e-waste recycling facility, opened. Dubai, United Arab Emirates UAE. Dubai Industrial Park ', 'metadescription' => 'The world's largest e-waste recycling facility was opened in Dubai, United Arab Emirates (UAE). It is located at Dubai Industrial Park on area of 280,000 square feet.', 'author' => 'Nikhil Paigude', 'downlaodpdf' => 'https://www.mediafire.com/file/ign30wdq4gc6p71/World_s_Largest_e-waste.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 8 => object(Cake\ORM\Entity) { 'tag' => 'IT, Mobile & Computers', 'keyword' => 'IT-Mobile-Computers', 'id' => (int) 563, 'title' => 'Facebook launches two new India-specific tools for election engagement', 'description' => '<p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">Social-networking site Facebook launched two new India-specific tools-"Candidate Connect" and "Share You Voted" to boost civic engagement on its platform during the 2019 general (Lok Sabha) elections.<strong> </strong>Both new tools are available in 12 local languages across India.</span></span></span></p> <p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-family:"Quicksand",serif">Candidate Connect</span></strong></span></span></p> <p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">It will help people learn more about candidates. It will let contesting candidates upload 20 second videos to introduce themselves and highlight how they will address outstanding challenges in their constituencies if elected to office. It will help people learn more about candidates contesting for Lok Sabha elections from their constituency</span></span></span></p> <p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-family:"Quicksand",serif">Share You Voted</span></strong></span></span></p> <p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">It will provide people with polling information and enable them to announce and celebrate their vote. It will send out reminders to people on polling dates in their constituencies. It is aimed at amplifying the voting spirit. </span></span></span></p> <p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">It will also allow people to show that they voted on Election Day by uploading picture. These shared pictures from users will be aggregated and collage of friends will be prepared. This collage will be showed on the timelines of people connected to them in a video format. </span></span></span></p> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'facebook-launches-two-new-tools-for-election-engagement', 'image' => 'https://www.mediafire.com/convkey/7c3e/q114le0jb8fv6ky6g.jpg', 'fbimage' => 'https://www.mediafire.com/convkey/7c3e/q114le0jb8fv6ky6g.jpg', 'metatitle' => 'Facebook launches two new tools for election engagement', 'metakeyword' => 'Facebook launches two new India-specific tools Candidate Connect and Share You Voted to boost civic engagement on its platform during 2019 general elections', 'metadescription' => 'Social-networking site Facebook launched two new India-specific tools-"Candidate Connect" and "Share You Voted" to boost civic engagement on its platform during the 2019 general elections', 'author' => 'Nikhil Paigude', 'downlaodpdf' => 'https://www.mediafire.com/file/qcrchd3bcna9cme/Facebook_launches_two_new.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 9 => object(Cake\ORM\Entity) { 'tag' => 'IT, Mobile & Computers', 'keyword' => 'IT-Mobile-Computers', 'id' => (int) 593, 'title' => 'Shanghai becomes world's first district with 5G coverage', 'description' => '<p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">Shanghai claimed that it has become first district in the world using both 5G coverage and broadband gigabit network. Trial runs of 5G network service, backed by Chinese state-run telecom carrier China Mobile was officially started in Shanghai's Hongkou. To make 5G service available to people, 5G base stations have been deployed over the last three months across the district to ensure full coverage. When fully operational, subscribers will be able avail of 5G service without having to upgrade their SIM cards</span></span></span></p> <p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-family:"Quicksand",serif">5G</span></strong></span></span></p> <ul> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">5G is the next generation of cellular technology with download speeds that are 10 to 100 times faster than 4G LTE networks.</span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">It is latest wireless communication technology based on third-generation partnership project (3GPP). It succeeds 4G (LTE-A, WiMax), 3G (UMTS, LTE) and 2G (GSM) systems.</span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">It will offer far greater upload and download speed i.e. 100 times faster internet data speed than current 4G networks. </span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">It unique feature are high data rate, reduced latency, energy saving, cost reduction, higher system capacity and massive device connectivity. </span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">It will expand broadband wireless services beyond mobile internet to IoT and critical communications segment and cater high speed network connectivity for augmented reality (AR)/virtual reality (VR).</span></span></span></li> </ul> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'shanghai-worlds-first-district-5g-coverage', 'image' => 'https://www.mediafire.com/convkey/6ce3/5c4vph2siyw1x2u6g.jpg', 'fbimage' => 'https://www.mediafire.com/convkey/6ce3/5c4vph2siyw1x2u6g.jpg', 'metatitle' => 'Shanghai becomes world's first district with 5G coverage', 'metakeyword' => 'In Science and Technology Current Affairs, Shanghai, first district, in world, using, 5G coverage, broadband gigabit network', 'metadescription' => 'Shanghai claimed that it has become first district in the world using both 5G coverage and broadband gigabit network.', 'author' => 'Nikhil Paigude', 'downlaodpdf' => 'https://www.mediafire.com/file/ibrgvpuve9xre4x/Shanghai_becomes_world%27s_first.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 10 => object(Cake\ORM\Entity) { 'tag' => 'IT, Mobile & Computers', 'keyword' => 'IT-Mobile-Computers', 'id' => (int) 592, 'title' => 'Facebook bans white nationalism and white separatism on its platforms', 'description' => '<p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">Social media giant Facebook has banned praise, support and representation of white nationalism and white separatism on its platforms. This ban comes after recent Christchurch mosque shooting in New Zealand by white supremacist massacring 50 people in mosques by live streaming it on Facebook.</span></span></span></p> <p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">Facebook has long banned white supremacy under its rules on hateful content but did not previously consider white nationalist or separatist content to be explicitly racist. Now it is planning to start connecting people who search for terms associated with white supremacy and helping people leave hate groups.</span></span></span></p> <p style="margin-left:0in; margin-right:0in; text-align:justify"><strong><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">Background</span></span></span></strong></p> <p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">Social media giants Facebook, Twitter and YouTube have been under pressure to remove white supremacist and neo-Nazi content from their platforms, along with fake news and other types of abusive posts. Civil rights groups have also have criticized social media giants for failing to confront extremism on their platforms. Facebook initially was wary of infringing on broader concepts of nationalism and separatism, which it said are important part of people’s identity. But now it has change its policy and helds that white nationalism and separatism cannot be meaningfully separated from white supremacy and organized hate groups.</span></span></span></p> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'facebook-bans-white-nationalism-white-separatism', 'image' => 'https://www.mediafire.com/convkey/15a1/0b5b3vr6kb51xyu6g.jpg', 'fbimage' => 'https://www.mediafire.com/convkey/15a1/0b5b3vr6kb51xyu6g.jpg', 'metatitle' => 'Facebook bans white nationalism and white separatism', 'metakeyword' => 'In Science and Technology Current Affairs, Facebook, banned praise, support and representation, white nationalism, white separatism, Christchurch mosque shooting,New Zealand', 'metadescription' => 'Social media giant Facebook has banned praise, support and representation of white nationalism and white separatism on its platforms. ', 'author' => 'Nikhil Paigude', 'downlaodpdf' => 'http://www.mediafire.com/file/o8dkj899bjkjnkv/Facebook_bans_white_nationalism.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 11 => object(Cake\ORM\Entity) { 'tag' => 'IT, Mobile & Computers', 'keyword' => 'IT-Mobile-Computers', 'id' => (int) 671, 'title' => 'WhatsApp launches Checkpoint Tipline to curb fake news', 'description' => '<p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">Facebook owned messaging platform WhatsApp has launched Checkpoint Tipline, an India-focused fact-checking feature to combat fake news, rumours and misinformation. It has was unveiled starting with run-up to 2019 Lok Sabha elections.</span></span></span></p> <p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-family:"Quicksand",serif">Checkpoint Tipline</span></strong></span></span></p> <ul> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">It has been developed in collaboration with India-based media skilling startup PROTO. </span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">Using this feature, users can report uncertain information or rumours they have received to WhatsApp number (+91-9643-000-888) and check its authenticity.</span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">Once user shares suspicious message with tipline, Proto’s verification centre will respond and inform user if the claim made in message shared is verified or not.</span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">The response will indicate if information is classified as ‘true’, ‘false’, ‘disputed’, ‘misleading’ or ‘out of scope’ and include any other related information. </span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">Using it, WhatsApp will review pictures, video links or texts in Hindi, Telugu, Bengali, Malayalam and English.</span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">It will also help create database of rumours during elections to study misinformation during elections as part of Checkpoint, a research project commissioned and assisted by WhatsApp.</span></span></span></li> </ul> <p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-family:"Quicksand",serif">Background</span></strong></span></span></p> <ul> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">India is the biggest WhatsApp market in the world with over 200 million users. In recent times had faced criticism and notices from Government of India for not being able to check spread of fake news and helping in tracing the origin of such messages.</span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">Since then it has taken numerous inhouse measure to curb spread of fake news including restricting forwarding messages to five chats at once. It has also been putting out advertisements in newspapers and running television and radio campaigns offering tips to users on spotting misinformation.</span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">However, WhatsApp so far has resisted Government’s demand for identifying message originators, arguing that such move will undermine end-to-end encryption and private nature of the platform, creating potential for serious misuse.</span></span></span></li> </ul> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'whatsapp-launches-checkpoint-tipline-curb-fake-news', 'image' => 'https://www.mediafire.com/convkey/1e02/1vbo4wlyk45n63e6g.jpg', 'fbimage' => 'https://www.mediafire.com/convkey/1e02/1vbo4wlyk45n63e6g.jpg', 'metatitle' => 'WhatsApp launches Checkpoint Tipline to curb fake news', 'metakeyword' => 'In Science and Technology Current Affairs, WhatsApp, launches, Checkpoint Tipline, curb fake news', 'metadescription' => 'Facebook owned messaging platform WhatsApp has launched Checkpoint Tipline, an India-focused fact-checking feature to combat fake news, rumours and misinformation.', 'author' => 'Nikhil Paigude', 'downlaodpdf' => 'https://www.mediafire.com/file/6x5w6r2rkydrvvl/WhatsApp_launches_Checkpoint.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 12 => object(Cake\ORM\Entity) { 'tag' => 'IT, Mobile & Computers', 'keyword' => 'IT-Mobile-Computers', 'id' => (int) 765, 'title' => 'UAE to host first Global Artificial Intelligence summit', 'description' => '<p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">United Arab Emirates will host first 'Ai Everything', the world’s foremost artificial intelligence (AI) summit to empower global dialogue on future of government, business and society. It will be hosted by UAE National Programme for AI with support of International Telecommunication Union (ITU) and World Intellectual Property Organisation (WIPO) and in strategic partnership with Smart Dubai.</span></span></span></p> <p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-family:"Quicksand",serif">First 'Ai Everything'</span></strong></span></span></p> <ul> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">Its aims to empower global dialogue on the future of government, business and society. </span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">It will also serve as knowledge exchange platform for bringing those solutions into the mainstream.</span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">It will bring together world leaders to define the underlying pillars of governance, business and society - augmenting the world’s happiness.</span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">It will unravel real-world use cases across industries, and forge collaborations and partnerships, hosting over 130 influential speakers.</span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">It is in line with UAE AI Strategy 2031 with envision to make UAE as global test bed for AI innovation and look at ways to create new vital markets that unlock high economic value for sector. </span></span></span></li> </ul> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'uae-host-first-global-artificial-intelligence-summit', 'image' => 'https://www.mediafire.com/convkey/34e8/qz4rpoz1d5rmd766g.jpg', 'fbimage' => 'https://www.mediafire.com/convkey/34e8/qz4rpoz1d5rmd766g.jpg', 'metatitle' => 'UAE to host first Global Artificial Intelligence summit', 'metakeyword' => 'In Science and Technology Current Affairs, UAE to host first Global Artificial Intelligence summit, Ai Everything', 'metadescription' => 'UAE to host first Global Artificial Intelligence summit, Ai Everything, United Arab Emirates will host first 'Ai Everything', the world’s foremost artificial intelligence (AI)', 'author' => 'Nikhil Paigude', 'downlaodpdf' => 'https://www.mediafire.com/file/ym7vob739dsbrox/UAE_to_host_first_Global.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 13 => object(Cake\ORM\Entity) { 'tag' => 'IT, Mobile & Computers', 'keyword' => 'IT-Mobile-Computers', 'id' => (int) 937, 'title' => 'IIT Madras develops easy OCR system for reading Bharti Script', 'description' => '<p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand","serif"">Reaserchers from IIT Madras have developed easy multi-lingual optical character recognition (OCR) schemes for reading documents in Bharati script. They also have developed universal finger-spelling language (method) for the nine Indian languages It was developed in collaboration of TCS, Mumbai and can be used to generate sign language for hearing-impaired persons</span></span></span></p> <p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-family:"Quicksand","serif"">About Bharati script</span></strong></span></span></p> <ul> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand","serif"">It is unified script for <strong>nine Indian languages </strong>which is being proposed as a common script for India to bring down many communication barriers.</span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand","serif"">The nine languages are Devnagari, Bengali, Gurmukhi, Gujarati, Oriya, Telugu, Kannada, Malayalam and Tamil. <em>English and Urdu have not yet been integrated as they have a very different phonetic organisation</em>.</span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand","serif"">It was developed by team of researchers from IIT-Madras headed by Professor V. Srinivasa Chakravarthy.</span></span></span></li> </ul> <p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-family:"Quicksand","serif"">OCR schemes for Bharati script</span></strong></span></span></p> <p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand","serif"">It involve first separating (or segmenting) document into text and non-text. The text is then segmented into paragraphs, sentences words and letters. Each letter is then recognised as character in some recognisable format such as Unicode or ASCII. The letter has various components such as basic consonant, consonant modifiers, vowels etc.</span></span></span></p> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'itt-madras-ocr-system-for-reading-bharti-script', 'image' => 'https://www.mediafire.com/convkey/53aa/1u5lzcqh9e1vi096g.jpg', 'fbimage' => 'https://www.mediafire.com/convkey/53aa/1u5lzcqh9e1vi096g.jpg', 'metatitle' => 'IIT Madras develops easy OCR system for reading Bharti Script', 'metakeyword' => 'In Science and Technology Current Affairs, IIT Madras, easy multi-lingual optical character recognition, OCR schemes, reading documents, Bharati script', 'metadescription' => 'Reaserchers from IIT Madras have developed easy multi-lingual optical character recognition (OCR) schemes for reading documents in Bharati script', 'author' => 'Nikhil Paigude', 'downlaodpdf' => 'https://www.mediafire.com/file/wtccaac9kedzgaa/IIT_Madras.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 14 => object(Cake\ORM\Entity) { 'tag' => 'IT, Mobile & Computers', 'keyword' => 'IT-Mobile-Computers', 'id' => (int) 1341, 'title' => 'Nipah virus resurfaces in Kerala', 'description' => '<p style="margin-left:0in; margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-size:9.0pt"><span style="font-family:"Quicksand","serif"">The deadly brain-damaging Nipah virus has resurfaced in Kerala a year after it killed 17 people. In recent case 23-year-old student tested positive for the virus and four other people showed Nipah-like symptoms. Union Health Ministry has sent six-member team from various institutes for epidemiological investigation and to implement protocols for the containment of the disease. It also given permission to use the immunoglobulin – monocional antibody, if necessary. </span></span></span></span></p> <p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-size:9.0pt"><span style="font-family:"Quicksand","serif"">Nipah virus</span></span></strong></span></span></p> <ul> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-size:9.0pt"><span style="font-family:"Quicksand","serif"">It is zoonotic disease (disease transmitted to humans from animals) that causes severe disease in both animals and humans. It is caused RNA or Ribonucleic acid virus of family Paramyxoviridae, genus Henipavirus, and is closely related to Hendra virus.</span></span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-size:9.0pt"><span style="font-family:"Quicksand","serif"">Origin:</span></span></strong><span style="font-size:9.0pt"><span style="font-family:"Quicksand","serif""> It was first identified in Kampung Sungai Nipah, Malaysia in 1998 from where it derives its name. Its first outbreak in India was reported from Siliguri, West Bengal in 2001.</span></span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-size:9.0pt"><span style="font-family:"Quicksand","serif"">Natural host:</span></span></strong><span style="font-size:9.0pt"><span style="font-family:"Quicksand","serif""> Fruit bats of Pteropodidae Family, Pteropus genus. The virus is present in bat urine, faeces, saliva, and birthing fluids, which then transmits it to Humans climbing trees or drinking raw palm sap covered in it. It can also infect pigs or any domesticated animals.</span></span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-size:9.0pt"><span style="font-family:"Quicksand","serif"">Transmission: </span></span></strong><span style="font-size:9.0pt"><span style="font-family:"Quicksand","serif"">It is transmitted to humans through direct contact with infected bats, pigs, or contaminated foods. Human to Human transmission from other NiV-infected people is also possible. It spreads fast and is mostly fatal. However, it cannot be transmitted through air.</span></span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-size:9.0pt"><span style="font-family:"Quicksand","serif"">Signs & Symptoms:</span></span></strong><span style="font-size:9.0pt"><span style="font-family:"Quicksand","serif""> In infected humans, it shows range of clinical presentations i.e. from asymptomatic infection to acute respitatory syndrome and fatal encephalitis (inflammation of brain). It can also cause headache, followed by drowsiness, disorientation and mental confusion. Further without care, it can progress to coma. The mortality rate of patients infected Nipah virus is reportedly 70</span></span><span style="font-size:9.0pt"><span style="font-family:"Times New Roman","serif"">%</span></span><span style="font-size:9.0pt"><span style="font-family:"Quicksand","serif"">. It is capable of causing similar signs and symptoms in domestic animals too. </span></span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-size:9.0pt"><span style="font-family:"Quicksand","serif"">Treatment:</span></span></strong><span style="font-size:9.0pt"><span style="font-family:"Quicksand","serif""> There is no vaccine for curing Nipah virus either for humans or animals. The common treatment is intensive supportive care and supportive medicines. It can be prevented by avoiding exposure of infected people without protective gear. </span></span></span></span></li> </ul> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'nipah-virus-resurfaces-kerala', 'image' => 'https://www.mediafire.com/convkey/ef47/sykpc25nzpb93s06g.jpg', 'fbimage' => 'https://www.mediafire.com/convkey/ef47/sykpc25nzpb93s06g.jpg', 'metatitle' => 'Nipah virus resurfaces in Kerala | Nipah virus', 'metakeyword' => 'The deadly brain-damaging Nipah virus has resurfaced in Kerala a year after it killed 17 people', 'metadescription' => 'The deadly brain-damaging Nipah virus has resurfaced in Kerala a year after it killed 17 people', 'author' => 'Nikhil Paigude', 'downlaodpdf' => 'https://www.mediafire.com/file/aaz79y2b92vkywd/Nipah_virus.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 15 => object(Cake\ORM\Entity) { 'tag' => 'IT, Mobile & Computers', 'keyword' => 'IT-Mobile-Computers', 'id' => (int) 1512, 'title' => 'Air Traffic Flow Management - Central Command Centre inaugurated at New Delhi', 'description' => '<p style="margin-left:0in; margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-size:9.0pt"><span style="font-family:"Quicksand","serif"">Union Civil Aviation Minister Hardeep Singh Puri inaugurated world class Air Traffic Flow Management (ATFM) - Central Command Centre at Vasant Kunj in New Delhi. The central ATFM system integrates flight data from various subsystems like ATC Automation System, flight updates and flight update messages. With this, India became the seventh country in the world after the US, Europe, Australia, South Africa, Japan and Brazil to successfully implementAir Traffic Flow Management System.</span></span></span></span></p> <p style="margin-left:0in; margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-size:9.0pt"><span style="font-family:"Quicksand","serif"">About ATFM - Central Command Centre</span></span></strong></span></span></p> <p style="margin-left:0in; margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-size:9.0pt"><span style="font-family:"Quicksand","serif"">The system integrates flight data from various subsystems like ATC Automation System, flight updates and flight update messages. It is connected to all airports in India.</span></span></span></span></p> <p style="margin-left:0in; margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-size:9.0pt"><span style="font-family:"Quicksand","serif"">Function:</span></span></strong><span style="font-size:9.0pt"><span style="font-family:"Quicksand","serif""> It processes demand and capacity information and provides decision-making tools to ATFM Flow Manager for collaborative decision makin. It also ensures regulated flow of traffic at each airport in India. It also displays weather information along with static information about airports, airspaces and air routes. </span></span></span></span></p> <p style="margin-left:0in; margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-size:9.0pt"><span style="font-family:"Quicksand","serif"">Structure:</span></span></strong><span style="font-size:9.0pt"><span style="font-family:"Quicksand","serif""> It is supported by 36 Flow Management Positions (FMPs) at various airports including Mumbai, Delhi, Kolkata, Chennai, Bengaluru and Hyderabad among others. Eight defence airports are also part of this network which are provided with FMPs. </span></span></span></span></p> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'air-traffic-flow-management-new-delhi', 'image' => 'https://www.mediafire.com/convkey/71fe/2j72l51myjkdcf66g.jpg', 'fbimage' => 'https://www.mediafire.com/convkey/71fe/2j72l51myjkdcf66g.jpg', 'metatitle' => 'Air Traffic Flow Management - Central Command Centre ', 'metakeyword' => 'Union Civil Aviation Minister Hardeep Singh Puri inaugurated world class Air Traffic Flow Management (ATFM) - Central Command Centre at Vasant Kunj in New Delhi.', 'metadescription' => 'Union Civil Aviation Minister Hardeep Singh Puri inaugurated world class Air Traffic Flow Management (ATFM) - Central Command Centre at Vasant Kunj in New Delhi.', 'author' => 'Nikhil Paigude', 'downlaodpdf' => 'https://www.mediafire.com/file/34r8cr932zbww98/Air_Traffic_Flow_Management.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 16 => object(Cake\ORM\Entity) { 'tag' => 'IT, Mobile & Computers', 'keyword' => 'IT-Mobile-Computers', 'id' => (int) 1639, 'title' => 'Govt inks SoI with IBM for study on using AI, weather tech in agriculture', 'description' => '<p style="margin-left:0in; margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-size:9.0pt"><span style="font-family:"Quicksand","serif"">Union Ministry of Agriculture and Farmers Welfare has signed Statement of Intent (SoI) with IT giant IBM for conducting pilot study to utilize Artificial Intelligence (AI) & Weather Technology solutions in agriculture. As part of the collaboration, IBM’s Watson Decision Platform for Agriculture will be leveraged to obtain village level soil moisture and farm level weather forecast in three districts in Western and Central India. This pilot study will be conducted for 2019 Kharif crop season.</span></span></span></span></p> <p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-size:9.0pt"><span style="font-family:"Quicksand","serif"">Key Facts </span></span></strong></span></span></p> <ul> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-size:9.0pt"><span style="font-family:"Quicksand","serif"">Under this collaboration, pilot study will be conducted in 3 districts of Bhopal (Madhya Pradesh), Rajkot (Gujarat) and Nanded (Maharashtra) respectively, with IBM India Private Limited. </span></span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-size:9.0pt"><span style="font-family:"Quicksand","serif"">IBM’s Watson Decision Platform will provide solution in the field of agriculture through Artificial Intelligence (AI) and weather technology at village level/farm level.</span></span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-size:9.0pt"><span style="font-family:"Quicksand","serif"">It will provide soil moisture information and weather forecast on pro bono basis to help farmers for taking decisions regarding water and crop management for better production and productivity.</span></span></span></span></li> </ul> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'ibm-study-a-weather-tech-agriculture', 'image' => 'https://www.mediafire.com/convkey/4d57/3fhxe1aw0oodf9a6g.jpg', 'fbimage' => 'https://www.mediafire.com/convkey/4d57/3fhxe1aw0oodf9a6g.jpg', 'metatitle' => 'Govt inks SoI with IBM for study on using AI, weather', 'metakeyword' => 'Ministry of Agriculture and Farmers Welfare has signed Statement of Intent (SoI) with IT giant IBM for conducting pilot study to utilize Artificial Intelligence (AI) & Weather Technology solutions in agriculture', 'metadescription' => 'Ministry of Agriculture and Farmers Welfare has signed Statement of Intent (SoI) with IT giant IBM for conducting pilot study to utilize Artificial Intelligence (AI) ', 'author' => 'Nikhil Paigude', 'downlaodpdf' => 'https://www.mediafire.com/file/nsmvqs7781w17a4/Govt_inks_SoI_with_IBM.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 17 => object(Cake\ORM\Entity) { 'tag' => 'IT, Mobile & Computers', 'keyword' => 'IT-Mobile-Computers', 'id' => (int) 371, 'title' => 'Government identifies 9 missions for scientific innovation ', 'description' => '<p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">Government has identified nine missions and four key projects of national importance to address societal needs in areas such as health, education, data security, transportation, clean energy and agriculture. </span></span></span></p> <p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">These missions and key projects were identified by Prime Minister's Advisory Council on Science, Technology & Innovation. They are aimed at solving complex scientific problems in reasonable time-frame and bring fruits of scientific development to citizens' doorsteps through various innovations, </span></span></span></p> <p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">Each of these missions along with four projects will be led by nodal ministry which will implement it by engaging international and national institutional partners, scientists and industries.</span></span></span></p> <p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-family:"Quicksand",serif">Nine missions:</span></strong></span></span></p> <ul> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-family:"Quicksand",serif">Quantum Frontier:</span></strong><span style="font-family:"Quicksand",serif"> It will focus on network and data protection to enable robust cyber security system</span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-family:"Quicksand",serif">Natural Language Translation:</span></strong><span style="font-family:"Quicksand",serif"> It will provide access to scientific materials in native Indian language</span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-family:"Quicksand",serif">Artificial Intelligence:</span></strong><span style="font-family:"Quicksand",serif"> It will focus on use of intelligent computing system in areas such as healthcare, education, agriculture and transportation among others.</span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-family:"Quicksand",serif">National Biodiversity:</span></strong><span style="font-family:"Quicksand",serif"> It will include comprehensive documentation of India's biodiversity and mapping all lifeforms of the country.</span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-family:"Quicksand",serif">Electric Vehicles:</span></strong><span style="font-family:"Quicksand",serif"> It will aim to make EVs economically viable and scalable</span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-family:"Quicksand",serif">Bio-Science for Human Health:</span></strong><span style="font-family:"Quicksand",serif"> It aims at genomic study of humans to identify and unravel genetic basis and prevalence of rare and inherited diseases</span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-family:"Quicksand",serif">Waste to Wealth:</span></strong><span style="font-family:"Quicksand",serif"> It seeks to develop and deploy technology to treat waste to generate energy, recycle materials and extract wealth</span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-family:"Quicksand",serif">Deep Ocean Exploration</span></strong><span style="font-family:"Quicksand",serif">: It will aim at exploring deep oceans for resources, climate change advisory services, offshore based desalination techniques and renewable energy generation among others </span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-family:"Quicksand",serif">AGNIi-Accelerating Growth for New India's Innovations (AGNIi):</span></strong><span style="font-family:"Quicksand",serif"> It will be for taking technologies to commercialization. Under it, efforts will be made to boost innovation ecosystem.</span></span></span></li> </ul> <p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-family:"Quicksand",serif">Four Projects are</span></strong></span></span></p> <ul> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">Setting up research clusters</span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">Establishing state-of-the -art 'Earth Museum'.</span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">Conserving critical ecological lifeline of Brahmaputra river system.</span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">Developing comprehensive web portal linking researchers with resources.</span></span></span></li> </ul> <p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-family:"Quicksand",serif">Prime Minister's Advisory Council on Science, Technology & Innovation (PM-STIAC)</span></strong></span></span></p> <p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">It was constituted in August 2018 headed by Principal Scientific Advisor to government K Vijay Raghavan.</span></span></span></p> <p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-family:"Quicksand",serif">Mandate:</span></strong><span style="font-family:"Quicksand",serif"> (i) advise PM on science, technology, as well as innovation. (ii) coordinate implementation of PMs scientific vision. (iii) Aid in formulation and timely implementation of major science and technology missions and evolve interdisciplinary technology development programmes. (iv) advise government on developing ‘Clusters of Excellence’ in science including city-based R&D clusters. (vi) Bring together all science and technology partners from academia and institutes to industries near such centres or cities.</span></span></span></p> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => '9-missions-for-scientific-innovation', 'image' => 'https://www.mediafire.com/convkey/adf9/oscd7rj8co35v5u6g.jpg', 'fbimage' => 'https://www.mediafire.com/convkey/adf9/oscd7rj8co35v5u6g.jpg', 'metatitle' => 'Govt identifies 9 missions for scientific innovation ', 'metakeyword' => 'In Science and Technology Current Affairs, 9 missions , four projects, national importance, societal needs, health, education, data security, transportation, clean energy, agriculture', 'metadescription' => 'Nine missions and four key projects identified of national importance to address societal needs in areas such as health, education, data security, transportation, clean energy and agriculture.', 'author' => 'Nikhil Paigude', 'downlaodpdf' => 'http://www.mediafire.com/file/19y5kyqzx5iczze/7Mar_Government_identifies_9_missions.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 18 => object(Cake\ORM\Entity) { 'tag' => 'IT, Mobile & Computers', 'keyword' => 'IT-Mobile-Computers', 'id' => (int) 1725, 'title' => 'Internet Saathi programme extended to Punjab and Odisha', 'description' => '<p style="margin-left:0in; margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-size:9.0pt"><span style="font-family:"Quicksand","serif"">Google India and Tata Trusts’ digital literacy initiative- Internet Saathi programme has been extended to Punjab and Odisha. With addition of these new two states, the programme is now active in 20 states, reaching to around 2.6 lakh villages across the country. In Punjab, the programme will cover around 5,000 villages and in Odisha it will cover 16,000-plus villages.</span></span></span></span></p> <p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-size:9.0pt"><span style="font-family:"Quicksand","serif"">About Internet Saathi Programme</span></span></strong></span></span></p> <ul> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-size:9.0pt"><span style="font-family:"Quicksand","serif"">It was launched by Google India along with Tata Trusts as a pilot project in 2015 in Rajasthan. It was scaled up to cover 3 lakh villages across India in December 2015.</span></span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-size:9.0pt"><span style="font-family:"Quicksand","serif"">Objective:</span></span></strong><span style="font-size:9.0pt"><span style="font-family:"Quicksand","serif""> It is digital literacy initiative aimed to educate rural women on how to use Internet. These women, in turn, impart training to other women in their community and neighbouring villages. </span></span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-size:9.0pt"><span style="font-family:"Quicksand","serif"">Achievements:</span></span></strong><span style="font-size:9.0pt"><span style="font-family:"Quicksand","serif""> Since its launch, this programme has contributed towards bridging the digital gender divide in rural India (female to male ratio from 1 in 10 in 2015 to 4 in 10 in 2018). In the four-year journey, over 70,000 "Internet Saathis" are using Internet to drive positive change in their communities. About 70</span></span><span style="font-size:9.0pt"><span style="font-family:"Times New Roman","serif"">%</span></span><span style="font-size:9.0pt"><span style="font-family:"Quicksand","serif""> of Internet Saathis believe they are seen as source of information in their village. It has led to level of independence that creates financial opportunities for women to pursue their dreams. 30% of Saathis have set up some form of business. This, in turn, has provided economic growth, with business often earning between Rs3,000 and Rs5,000 every month while five in ten Saathis have seen positive impact on employability.</span></span></span></span></li> </ul> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'internet-saathi-programme', 'image' => 'https://www.mediafire.com/convkey/a0a9/kwokadmrcxsp4lm6g.jpg', 'fbimage' => 'https://www.mediafire.com/convkey/a0a9/kwokadmrcxsp4lm6g.jpg', 'metatitle' => 'Internet Saathi programme extended to Rajasthan', 'metakeyword' => 'Google India and Tata Trusts’ digital literacy initiative- Internet Saathi programme has been extended to Punjab and Odisha', 'metadescription' => 'Google India and Tata Trusts’ digital literacy initiative- Internet Saathi programme has been extended to Punjab and Odisha', 'author' => 'Nikhil Paigude', 'downlaodpdf' => 'https://www.mediafire.com/file/c27nu4tm7gzjg66/Internet_Saathi_programme_extended_to_Rajasthan_and_Odisha.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 19 => object(Cake\ORM\Entity) { 'tag' => 'IT, Mobile & Computers', 'keyword' => 'IT-Mobile-Computers', 'id' => (int) 1748, 'title' => 'Medicine From the Sky: Telangana Govt, WEF ink MoU', 'description' => '<p style="margin-left:0in; margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-size:9.0pt"><span style="font-family:"Quicksand","serif"">Telangana Government and World Economic Forum's Centre for Fourth Industrial Revolution Network signed MoU to launch ‘Medicine from the Sky’ project. It is innovative pilot project aimed at delivering emergency medical supplies such as blood and vaccines via drones.</span></span></span></span></p> <p style="margin-left:0in; margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-size:9.0pt"><span style="font-family:"Quicksand","serif"">About Medicine from the Sky Project</span></span></strong></span></span></p> <ul> <li><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-size:9.0pt"><span style="font-family:"Quicksand","serif"">Bodies involved in this pilot project:</span></span></strong><span style="font-size:9.0pt"><span style="font-family:"Quicksand","serif""> Telangana Government, World Economic Forum's Centre for the Fourth Industrial Revolution Network in partnership with the HealthNet Global Limited. </span></span></span></span></li> <li><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-size:9.0pt"><span style="font-family:"Quicksand","serif"">Features:</span></span></strong><span style="font-size:9.0pt"><span style="font-family:"Quicksand","serif""> It conduct comprehensive study of drone-based deliveries for blood, vaccines, medical samples and organs i.e. to study how delivery drones can be used to improve medical supply chains,.</span></span></span></span></li> <li><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-size:9.0pt"><span style="font-family:"Quicksand","serif"">Benefits: </span></span></strong><span style="font-size:9.0pt"><span style="font-family:"Quicksand","serif"">It will provide evidence-based approach for implementation of drones in healthcare, enabling emergency-care services to t patients in shortest time frame possible, thus saving their live. It will help to facilitate decision-making in healthcare supply chains, address issues that affect medical distribution system and focus on last-mile deliveries.</span></span></span></span></li> </ul> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'medicine-from-the-sky-telangana-govt-wef', 'image' => 'https://www.mediafire.com/convkey/041e/p6emt51sxhhfddv6g.jpg', 'fbimage' => 'https://www.mediafire.com/convkey/041e/p6emt51sxhhfddv6g.jpg', 'metatitle' => 'Medicine From the Sky: Telangana Govt,', 'metakeyword' => 'Telangana Government and World Economic Forum's Centre for Fourth Industrial Revolution Network signed MoU to launch ‘Medicine from the Sky’ project', 'metadescription' => 'Telangana Government and World Economic Forum's Centre for Fourth Industrial Revolution Network signed MoU to launch ‘Medicine from the Sky’ project', 'author' => 'Nikhil Paigude', 'downlaodpdf' => 'https://www.mediafire.com/file/vqikearebqzth18/Medicine_From_the_Sky.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 20 => object(Cake\ORM\Entity) { 'tag' => 'IT, Mobile & Computers', 'keyword' => 'IT-Mobile-Computers', 'id' => (int) 1785, 'title' => 'ICMR launches National Data Quality Forum', 'description' => '<h2 style="margin-left:0in; margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-size:9.0pt"><span style="font-family:"Quicksand","serif"">Indian Council of Medical Research (ICMR) has launched National Data Quality Forum (NDQF) to improve data collection and use. NDQF aims to generate meaningful dialogue around improvement of data quality in general, and for health and medical research in particular.</span></span></span></span></h2> <p style="margin-left:0in; margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-size:9.0pt"><span style="font-family:"Quicksand","serif"">About National Data Quality Forum (NDQF)</span></span></strong></span></span></p> <ul> <li><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-size:9.0pt"><span style="font-family:"Quicksand","serif"">It aims to serve an integrated national-level platform to improve quality of health and demographic data by generating meaningful dialogue around the improvement of data quality in general, and for health and medical research in particular.</span></span></span></span></li> <li><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-size:9.0pt"><span style="font-family:"Quicksand","serif"">Launched by:</span></span></strong><span style="font-size:9.0pt"><span style="font-family:"Quicksand","serif""> ICMR’s National Institute for Medical Statistics (ICMR-NIMS) in partnership with Population Council (an international non-profit NGO that conducts research in biomedicine and social science).</span></span></span></span></li> <li><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-size:9.0pt"><span style="font-family:"Quicksand","serif"">Purpose of NDQF:</span></span></strong><span style="font-size:9.0pt"><span style="font-family:"Quicksand","serif""> It will bring all relevant stakeholders, subject matter experts, industry leaders, decision makers, and data scientists/analysts on common platform for discussing improvements in the quality of data ecosystem in India. </span></span></span></span></li> <li><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-size:9.0pt"><span style="font-family:"Quicksand","serif"">It will integrate learnings from scientific and evidence-based initiatives and guide actions through periodic workshops and conferences. </span></span></span></span></li> <li><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-size:9.0pt"><span style="font-family:"Quicksand","serif"">Its activities will help to establish good practices and protocols of data collection, storage, use and dissemination that can be applied to health and demographic data, as well as can be replicated across other industries and sectors also.</span></span></span></span></li> <li><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-size:9.0pt"><span style="font-family:"Quicksand","serif"">It will also do brainstorming, piloting and employ advanced modeling techniques in artificial intelligence (AI), machine learning (ML) and big data analytics along with using technology-based solutions to improve data quality.</span></span></span></span></li> </ul> <p style="margin-left:0in; margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-size:9.0pt"><span style="font-family:"Quicksand","serif"">About National Institute for Medical Statistics</span></span></strong></span></span></p> <p style="margin-left:0in; margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-size:9.0pt"><span style="font-family:"Quicksand","serif"">It is one of the permanent institutes of Institutes of Indian Council of Medical Research (ICMR), New Delhi. It was established in 1977. It is India’s only institute to coordinate and standardize collection of medical and health statistics in the country. Its mandate is to provide technical expertise on research methodology, programme evaluation, mathematical modeling, data analysis etc.</span></span></span></span></p> <p style="margin-left:0in; margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-size:9.0pt"><span style="font-family:"Quicksand","serif"">NIMS’s Major Achievements: I</span></span></strong><span style="font-size:9.0pt"><span style="font-family:"Quicksand","serif"">t has established India's first Clinical Trials Registry, in collaboration with the Department of Science and Technology and World Health Organisation (WHO). It has been identified as national nodal agency for the implementation of Integrated Disease Surveillance Project (IDSP)-Non-Communicable Disease ( IDSP- NCD) risk factor survey. It has developed Integrated Behavioural and Biological Assessment on National Highways (IBBA-NH) among trackers for HIV epidemic in the country. </span></span></span></span></p> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'icmr-launches-national-data-quality-forum', 'image' => 'https://www.mediafire.com/convkey/4f9e/lhykcte32rwj92k6g.jpg', 'fbimage' => 'https://www.mediafire.com/convkey/4f9e/lhykcte32rwj92k6g.jpg', 'metatitle' => 'ICMR launches National Data Quality', 'metakeyword' => 'Indian Council of Medical Research (ICMR) has launched National Data Quality Forum (NDQF) to improve data collection and use.', 'metadescription' => 'Indian Council of Medical Research (ICMR) has launched National Data Quality Forum (NDQF) to improve data collection and use.', 'author' => 'Nikhil Paigude', 'downlaodpdf' => 'https://www.mediafire.com/file/h827kq202fy1l9k/ICMR_launches_National_Data_Quality_Forum.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 21 => object(Cake\ORM\Entity) { 'tag' => 'IT, Mobile & Computers', 'keyword' => 'IT-Mobile-Computers', 'id' => (int) 1959, 'title' => 'Brain-computer interface for stroke patients', 'description' => '<p style="margin-left:0in; margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-size:12.0pt"><span style="font-family:"Times New Roman","serif"">Issue</span></span></strong></span></span></p> <p style="margin-left:0in; margin-right:0in"> </p> <p style="margin-left:0in; margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Times New Roman","serif"">IIT Palakkad researchers have found a way to improve the functioning of the brain-computer interface when used by stroke patients.</span></span></span></p> <p style="margin-left:0in; margin-right:0in"> </p> <p style="margin-left:0in; margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-size:12.0pt"><span style="font-family:"Times New Roman","serif"">Background</span></span></strong></span></span></p> <p style="margin-left:0in; margin-right:0in"> </p> <p style="margin-left:0in; margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="background-color:white"><span style="font-family:"Times New Roman","serif""><span style="color:#222222">Stroke</span></span></span><span style="background-color:white"><span style="font-family:"Times New Roman","serif""><span style="color:#222222"> is a disease that affects the arteries leading to and within the brain. It is one of the major cause of death and a leading cause of disability.</span></span></span></span></span></p> <p style="margin-left:0in; margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="background-color:white"><span style="font-family:"Times New Roman","serif""><span style="color:#222222">A stroke occurs when a blood vessel that carries oxygen and nutrients to the brain is either blocked by a clot or bursts.</span></span></span></span></span></p> <p style="margin-left:0in; margin-right:0in"> </p> <p style="margin-left:0in; margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-size:12.0pt"><span style="font-family:"Times New Roman","serif"">Importance of Discovery</span></span></strong></span></span></p> <ul> <li><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="background-color:white"><span style="font-family:"Times New Roman","serif""><span style="color:#222222">Stroke patients undergo a passive rehabilitation therapy where the patient plays a passive role while the physiotherapist actively helps by moving the patient’s paralyzed limb.</span></span></span></span></span></li> <li><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="background-color:white"><span style="font-family:"Times New Roman","serif""><span style="color:#222222"> Development of the motor imagery brain-computer interface can help develop an active rehabilitation therapy where the patient can move his limb according to his own movement intention</span></span></span><span style="background-color:whitesmoke"><span style="font-family:"Times New Roman","serif"">.</span></span></span></span></li> </ul> <p style="margin-left:0in; margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-size:12.0pt"><span style="background-color:white"><span style="font-family:"Times New Roman","serif""><span style="color:#222222">Drawbacks</span></span></span></span></strong></span></span></p> <ul> <li><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="background-color:white"><span style="font-family:"Times New Roman","serif""><span style="color:#222222">Communication certainly improves as the number of channels electrodes attached to the brain region is increased. But the drawback is that increasing the channels makes computation more complex, increases preparation time and is inconvenient for the person.</span></span></span></span></span></li> </ul> <p style="margin-left:0in; margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-size:12.0pt"><span style="background-color:white"><span style="font-family:"Times New Roman","serif""><span style="color:#222222">Details</span></span></span></span></strong></span></span></p> <p style="margin-left:0in; margin-right:0in"> </p> <p style="margin-left:0in; margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="background-color:white"><span style="font-family:"Times New Roman","serif""><span style="color:#222222">Researchers have used a trained neural network, with inputs from neuroscience, to develop a new channel-selection method that makes the process more efficient and effective. The method employed is more efficient and works in most of the cases.</span></span></span></span></span></p> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'brain-computer-interface-for-stroke-patients', 'image' => 'https://www.mediafire.com/convkey/5d45/xd129igz8ex0egm6g.jpg', 'fbimage' => 'https://www.mediafire.com/convkey/5d45/xd129igz8ex0egm6g.jpg', 'metatitle' => 'Brain-computer interface for stroke patients', 'metakeyword' => 'Brain-computer interface for stroke patients', 'metadescription' => 'IIT Palakkad researchers have found a way to improve the functioning of the brain-computer interface when used by stroke patients.', 'author' => null, 'downlaodpdf' => 'https://www.mediafire.com/file/ehwmhd6h20mxbn5/Brain-computer_interface_for_stroke_patients.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 22 => object(Cake\ORM\Entity) { 'tag' => 'IT, Mobile & Computers', 'keyword' => 'IT-Mobile-Computers', 'id' => (int) 2037, 'title' => 'Smartphone app to make eye screening affordable', 'description' => '<p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-size:12.0pt"><span style="font-family:"Times New Roman","serif"">Issue</span></span></strong></span></span></p> <p style="margin-right:0in"> </p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="background-color:white"><span style="font-family:"Times New Roman","serif""><span style="color:#222222">Engineering students from a college affiliated to Jawaharlal Nehru Technological University (JNTU), Hyderabad, have developed a device and mobile app called <strong>iNethra</strong> to make vision screening easy, accessible and affordable.</span></span></span></span></span></p> <p style="margin-right:0in"> </p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-size:12.0pt"><span style="font-family:"Times New Roman","serif"">Background</span></span></strong></span></span></p> <p style="margin-right:0in"> </p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="background-color:white"><span style="font-family:"Times New Roman","serif""><span style="color:#222222">A vision screening, also called an eye test, is a brief exam that looks for potential vision problems and eye disorders. Vision screenings are often done by primary care providers.</span></span></span></span></span></p> <p style="margin-right:0in"> </p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-size:12.0pt"><span style="font-family:"Times New Roman","serif"">Details</span></span></strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-family:"Times New Roman","serif"">iNethra</span></strong><span style="font-family:"Times New Roman","serif"">, the product, comprises of a handy, stick-like device with a lens on one end and connected to a smart phone camera on the other side. </span></span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Times New Roman","serif"">While this helps in clicking the retinal image of the patients, the mobile app helps in sharing and receiving information related to the eye condition. </span></span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Times New Roman","serif"">The clicked images are uploaded to the app for the doctor to access and analyse them. </span></span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Times New Roman","serif"">There is a provision in the app for the doctor to note details about the eye condition, provide tips and if required refer them to hospitals. This will improvise the device and cut down the costs.</span></span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Times New Roman","serif""> Initially, the app will be based on B2B (business-to-business) model under which partner eye clinics would approach patients coming to public health centres.</span></span></span></p> </li> </ul> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-size:12.0pt"><span style="font-family:"Times New Roman","serif"">Eye related problems</span></span></strong></span></span></p> <p style="margin-right:0in"> </p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="background-color:white"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Times New Roman","serif"">Vision screening is most often used to check for possible vision problems in children. The most common eye disorders in children include:</span></span></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="background-color:white"><span style="font-family:Calibri,sans-serif"><strong><span style="font-family:"Times New Roman","serif"">Amblyopia,</span></strong><span style="font-family:"Times New Roman","serif""> also known as lazy eye. Children with amblyopia have blurry or reduced vision in one eye.</span></span></span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="background-color:white"><span style="font-family:Calibri,sans-serif"><strong><span style="font-family:"Times New Roman","serif"">Strabismus</span></strong><span style="font-family:"Times New Roman","serif"">, also known as crossed eyes. In this disorder, the eyes don't line up right and point in different directions.</span></span></span></span></p> </li> </ul> <p style="margin-right:0in"><strong><span style="font-size:11pt"><span style="background-color:white"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Times New Roman","serif"">Other eye problems:</span></span></span></span></strong></p> <ul> <li> <p><span style="font-size:11pt"><span style="background-color:white"><span style="font-family:Calibri,sans-serif"><strong><span style="font-family:"Times New Roman","serif"">Nearsightedness</span></strong><span style="font-family:"Times New Roman","serif""> (myopia), a condition that makes far away things look blurry</span></span></span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="background-color:white"><span style="font-family:Calibri,sans-serif"><strong><span style="font-family:"Times New Roman","serif"">Farsightedness</span></strong><span style="font-family:"Times New Roman","serif""> (hyperopia), a condition that makes close-up things look blurry</span></span></span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="background-color:white"><span style="font-family:Calibri,sans-serif"><strong><span style="font-family:"Times New Roman","serif"">Astigmatism</span></strong><span style="font-family:"Times New Roman","serif"">, a condition that makes both close-up and far-away things look blurry</span></span></span></span></p> </li> </ul> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'smartphone-app-to-make-eye-screening', 'image' => 'https://www.mediafire.com/convkey/4edd/03po1myuequfgqc6g.jpg', 'fbimage' => 'https://www.mediafire.com/convkey/4edd/03po1myuequfgqc6g.jpg', 'metatitle' => 'Smartphone app to make eye screening affordable', 'metakeyword' => 'Smartphone app to make eye screening affordable, Smartphone app', 'metadescription' => 'A vision screening, also called an eye test, is a brief exam that looks for potential vision problems and eye disorders. Vision screenings are often done by primary', 'author' => null, 'downlaodpdf' => 'https://www.mediafire.com/file/u4efenue2hpf8tm/Smartphone_app_to_make_eye_screening_affordable.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 23 => object(Cake\ORM\Entity) { 'tag' => 'IT, Mobile & Computers', 'keyword' => 'IT-Mobile-Computers', 'id' => (int) 2038, 'title' => 'QR code for women safety', 'description' => '<p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-size:12.0pt"><span style="font-family:"Times New Roman","serif"">Issue</span></span></strong></span></span></p> <p style="margin-right:0in"> </p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Times New Roman","serif"">Delhi Police have fitted atleat 1500 taxis and autos outside railway and metro stations, and airport with QR codes. This feature is meant to ensure only verified drivers ferry passengers.</span></span></span></p> <p style="margin-right:0in"> </p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-size:12.0pt"><span style="font-family:"Times New Roman","serif"">Background</span></span></strong></span></span></p> <p style="margin-right:0in"> </p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Times New Roman","serif"">Delhi Lieutenant Governor Anil Baijlal launched the “QR Code” scheme, which will be delivered through Delhi Police’s “Himmat Plus” app which is meant to ensure the safety of women. </span></span></span></p> <p style="margin-right:0in"> </p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-size:12.0pt"><span style="font-family:"Times New Roman","serif"">Details</span></span></strong></span></span></p> <ul> <li><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Times New Roman","serif"">The QR codes will be put on public transport vehicles such as auto-rickshaws and non-app (black-and-yellow) cabs. Passengers, especially women, will be able to verify the details of drivers, and send a distress signal in an emergency.</span></span></span></li> <li><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Times New Roman","serif"">The code can be scanned by using the Himmat Plus app. If a user chooses to report the journey using the ‘Report Journey’ button, the app will send the passenger’s location and the driver’s unique ID to the police.</span></span></span></li> <li><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Times New Roman","serif"">In case the driver is not registered, the passenger can call the police control room in case of an emergency, or tap the ‘SOS’ button on the app.</span></span></span></li> </ul> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-size:12.0pt"><span style="font-family:"Times New Roman","serif"">Himmat Plus app</span></span></strong></span></span></p> <ul> <li><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Times New Roman","serif"">The Himmat Plus app was launched in 2015 to allow users to make a distress call or send an emergency message to Delhi Police and the emergency contact.</span></span></span></li> <li><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Times New Roman","serif"">While the Himmat Plus app is targeted at women’s safety, both men and women can register themselves.</span></span></span></li> </ul> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'qr-code-for-women-safety', 'image' => 'https://www.mediafire.com/convkey/132d/ouxzaa3r8joi9kf6g.jpg', 'fbimage' => 'https://www.mediafire.com/convkey/132d/ouxzaa3r8joi9kf6g.jpg', 'metatitle' => 'QR code for women safety', 'metakeyword' => 'QR code for women safety', 'metadescription' => 'Delhi Police have fitted atleat 1500 taxis and autos outside railway and metro stations, and airport with QR codes. ', 'author' => null, 'downlaodpdf' => 'https://www.mediafire.com/file/aofvw8kgx9zat20/QR_code_for_women_safety.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 24 => object(Cake\ORM\Entity) { 'tag' => 'IT, Mobile & Computers', 'keyword' => 'IT-Mobile-Computers', 'id' => (int) 2063, 'title' => 'Regulating social media and Regulation', 'description' => '<p><span style="font-family:Calibri,sans-serif"><strong><span style="font-size:12.0pt"><span style="font-family:"Times New Roman","serif"">Issue</span></span></strong></span></p> <p> </p> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Times New Roman","serif"">The Supreme Court recently stressed the need to find a balance between the right to online privacy and the right of the state to detect people who use the web to spread panic and commit crimes.</span></span></span></p> <p> </p> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-size:12.0pt"><span style="font-family:"Times New Roman","serif"">Background</span></span></strong></span></span></p> <p> </p> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Times New Roman","serif"">There has been a surge in the use of messaging apps such as WhatsApp. At the same time, there has been an increase in fake news and rumour-mongering leading to lynchings. The relation between fake news and socila media usage is unprecidented.</span></span></span></p> <p> </p> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-size:12.0pt"><span style="font-family:"Times New Roman","serif"">Details</span></span></strong></span></span></p> <ul> <li style="list-style-type:none"> </li> <li><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Times New Roman","serif"">Fake news is not something that has been catalysed in the digital age alone instead it has been a long-standing problem.</span></span></span></li> <li><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Times New Roman","serif"">The problem has been not restricted to India alone instead it has been discovered in places like Hong Kong too. Instances where state-sponsored elements were perpetrating fake news and sophisticated disinformation campaigns against protesters in Hong Kong has been found.</span></span></span></li> <li><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Times New Roman","serif"">Companies like WhatsApp has been trying to resist this idea of message traceability, it is also trying to maintain the integrity of the platform.</span></span></span></li> </ul> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-size:12.0pt"><span style="font-family:"Times New Roman","serif"">Social Media and Fake news</span></span></strong></span></span></p> <ul> <li style="list-style-type:none"> </li> <li><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Times New Roman","serif"">WhatsApp has tried to limit forwards to five people and the norm has been tested. It has been piloted in other parts of the world as well.</span></span></span></li> <li><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Times New Roman","serif"">Fact propagators, fake news busters have been used to clear the myths by tracing origin of fake messages. Habitual and intentional acts are to be seriously punished.</span></span></span></li> <li><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Times New Roman","serif"">Explosive growth in regulatory guidelines have been initiated. These guidelines from the government have been trying to enhance the agency of the government over technology companies.</span></span></span></li> </ul> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-size:12.0pt"><span style="font-family:"Times New Roman","serif"">Social Media</span></span></strong></span></span></p> <p> </p> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Times New Roman","serif"">Social media are interactive computer-mediated technologies that facilitate the creation and sharing of information, ideas, career interests and other forms of expression via virtual communities and networks.</span></span></span></p> <p> </p> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-family:"Times New Roman","serif"">Importance of Social Media</span></strong></span></span></p> <ul> <li style="list-style-type:none"> </li> <li><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Times New Roman","serif"">Social media are not just used for the purpose of messaging. They are, for many people, information discovery platforms.</span></span></span></li> <li><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Times New Roman","serif"">Retailers who use social media as an integral part of their marketing strategy usually see measurable results.</span></span></span></li> </ul> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'regulating-social-media-and-regulation', 'image' => 'https://www.mediafire.com/convkey/e76b/3cy13q3arzj3b1u6g.jpg', 'fbimage' => 'https://www.mediafire.com/convkey/e76b/3cy13q3arzj3b1u6g.jpg', 'metatitle' => 'Regulating social media and Regulation', 'metakeyword' => 'Regulating social media and Regulation', 'metadescription' => 'Social media are interactive computer-mediated technologies that facilitate the creation and sharing of information, ideas, career interests and other forms ', 'author' => null, 'downlaodpdf' => 'https://www.mediafire.com/file/gzpb1s9iypezbge/Regulating_social_media_and_Regulation.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 25 => object(Cake\ORM\Entity) { 'tag' => 'IT, Mobile & Computers', 'keyword' => 'IT-Mobile-Computers', 'id' => (int) 2070, 'title' => 'Singapore’s autonomous cars', 'description' => '<p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-size:12.0pt"><span style="font-family:"Times New Roman","serif"">Issue</span></span></strong></span></span></p> <p> </p> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="background-color:white"><span style="font-family:"Times New Roman","serif""><span style="color:black">The first autonomous public bus service in Singapore will be launched in three districts of Singapore’s Innovation District where driver-less buses and shuttles will be used for off-peak and on-demand commuting by 2022. </span></span></span></span></span></p> <p> </p> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-size:12.0pt"><span style="font-family:"Times New Roman","serif"">Background</span></span></strong></span></span></p> <p> </p> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="background-color:white"><span style="font-family:"Times New Roman","serif""><span style="color:black">Autonomous vehicles are driver less vehicles and the ones being designed by ST Engineering are 100 percent electric. These buses will be equipped with a multi-sensor technology that will optimise navigation and safety features.</span></span></span></span></span></p> <p> </p> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-size:12.0pt"><span style="font-family:"Times New Roman","serif"">Details</span></span></strong></span></span></p> <ul> <li><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="background-color:white"><span style="font-family:"Times New Roman","serif""><span style="color:black">This will be the island nation’s first on-demand autonomous shuttle vehicle trial since autonomous testing of vehicles began in June 2018. </span></span></span></span></span></li> <li><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="background-color:white"><span style="font-family:"Times New Roman","serif""><span style="color:black">People visiting the area will be able to hail an autonomous shuttle using the “Ride Now Sentosa” mobile application free of charge.</span></span></span></span></span></li> <li><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="background-color:white"><span style="font-family:"Times New Roman","serif""><span style="color:black">As a precautionary measure, on every vehicle, a “safety driver” will be present who can take charge of the vehicle if the need arises. </span></span></span></span></span></li> <li><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="background-color:white"><span style="font-family:"Times New Roman","serif""><span style="color:black">The vehicle fault system will alert the safety driver if it detects any faults in the system. Road users and pedestrians will be intimated with electric signage telling them that the vehicles are driverless.</span></span></span></span></span></li> <li><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="background-color:white"><span style="font-family:"Times New Roman","serif""><span style="color:black">The AVs are equipped with collision & obstacle avoidance and overtaking features, remote control, radar, LiDAR (Light detection and ranging), odometry, computer vision and 360-degree sensors. They also have embedded cybersecurity features that protect the vehicles from intrusion and deter hacking.</span></span></span></span></span></li> <li><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="background-color:white"><span style="font-family:"Times New Roman","serif""><span style="color:black"> The AVs’ charge ranges from 50 km to 150 km per charge depending on the operating scenario.</span></span></span></span></span></li> </ul> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-size:12.0pt"><span style="background-color:white"><span style="font-family:"Times New Roman","serif""><span style="color:black">Autonomous vehicles readiness index</span></span></span></span></strong></span></span></p> <ul> <li><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="background-color:white"><span style="font-family:"Times New Roman","serif""><span style="color:black">The “Autonomous Vehicles Readiness Index”, prepared by KPMG, has ranked 25 countries based on their preparedness for autonomous vehicles.</span></span></span></span></span></li> <li><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="background-color:white"><span style="font-family:"Times New Roman","serif""><span style="color:black">The report assesses countries based on 25 variables. These four pillars are – policy and legislation, consumer acceptance, infrastructure and technology, and innovation.</span></span></span></span></span></li> </ul> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'singapores-autonomous-cars', 'image' => 'https://www.mediafire.com/convkey/4ef9/f805so060gvd4h66g.jpg', 'fbimage' => 'https://www.mediafire.com/convkey/4ef9/f805so060gvd4h66g.jpg', 'metatitle' => 'Singapore’s autonomous cars', 'metakeyword' => 'Singapore’s autonomous cars', 'metadescription' => 'The first autonomous public bus service in Singapore will be launched in three districts of Singapore’s Innovation District where driver-less buses', 'author' => null, 'downlaodpdf' => 'https://www.mediafire.com/file/69flxivqdu8dnmg/Singapore%C6s_autonomous_cars.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 26 => object(Cake\ORM\Entity) { 'tag' => 'IT, Mobile & Computers', 'keyword' => 'IT-Mobile-Computers', 'id' => (int) 2135, 'title' => 'Facial recognition for teacher’s attendence', 'description' => '<p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:"Calibri","sans-serif""><strong>Issue</strong></span></span></p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:"Calibri","sans-serif"">To curb absenteeism at government schools, the Gujarat government on September 5 launched a facial recognition-based biometric online attendance system across 40,000 primary schools.</span></span></p> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:"Calibri","sans-serif""><strong>Background</strong></span></span></p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:"Calibri","sans-serif""> Parents have complained of “proxy teachers”, especially in the interior rural areas where some teachers send unqualified individuals to teach in their place. The geo-fenced biometric attendance system is intended to stop such corruption.</span></span></p> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:"Calibri","sans-serif""><strong>Details</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:"Calibri","sans-serif"">The State Education Department will distribute tablets equipped with geo-tagging and biometrics software to all schools in the next two months.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:"Calibri","sans-serif"">The app is optimised with an intelligent algorithm that will record facial features of the teachers at the time of the registration, such that a minor variation will not be a hindrance in the recognition.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:"Calibri","sans-serif"">The use of this technology is on a pilot basis and hence has been installed only on the tablets already provided. There are also plans to extend this feature to all government departments.</span></span></p> </li> </ul> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:"Calibri","sans-serif""><strong>Concerns</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:"Calibri","sans-serif"">Section of teachers have protested against the introduction of the facial recognition-based attendance system, citing privacy concerns. </span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:"Calibri","sans-serif"">Teachers have demanded that the state government should provide at least one smartphone to each school with internet connectivity. This issue has now been resolved with the distribution of the tablets<span style="font-size:13.5pt"><span style="background-color:white"><span style="font-family:"Arial","sans-serif""><span style="color:black">.</span></span></span></span></span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:"Calibri","sans-serif""> <span style="background-color:white"><span style="color:black">The schools located in isolated locations face problem of network connectivity. This will hinder the successful implementation of the scheme.</span></span></span></span></p> </li> </ul> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'facial-recognition-teachers-attendence', 'image' => 'https://www.mediafire.com/convkey/b772/vq0dwkjpz9qqwmt6g.jpg', 'fbimage' => 'https://www.mediafire.com/convkey/b772/vq0dwkjpz9qqwmt6g.jpg', 'metatitle' => 'Facial recognition for teacher’s attendence', 'metakeyword' => 'Facial recognition for teacher’s attendence', 'metadescription' => 'Section of teachers have protested against the introduction of the facial recognition-based attendance system, citing privacy concerns. ', 'author' => null, 'downlaodpdf' => 'https://www.mediafire.com/file/v9ahp0ck80el9zn/Facial_recognition_for_teacher%C6s_attendence.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 27 => object(Cake\ORM\Entity) { 'tag' => 'IT, Mobile & Computers', 'keyword' => 'IT-Mobile-Computers', 'id' => (int) 2238, 'title' => 'Ecuador’s online data leak', 'description' => '<p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Issue</strong></span></span></p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Almost the entire population of <a href="https://www.thehindu.com/tag/297-244/ecuador/?utm=bodytag" target="_blank">Ecuador<strong> </strong></a>had their personal data leaked online due to a massive breach from a private unsecured server.</span></span></p> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Details</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">A security company <strong>vpnMentor </strong>has uncovered the breach on the server run by the firm <strong>Novaestrat</strong>, which included citizens' full names, dates and places of birth, education levels, phone numbers and national identity card numbers.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">It is said that there was even data on the country's president and on Julian Assange, the Wikileaks founder who had obtained asylum in Ecuador embassy.</span></span></p> </li> </ul> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Data Theft</strong></span></span></p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">A data breach, or data leak, is a security event in which protected data is accessed by or disclosed to unauthorized viewers.</span></span></p> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Methods of data theft</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Cyber attacks</strong> — Hackers use malware, phishing, social engineering, skimming and related techniques to gain access to protected information.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Theft or loss of devices</strong> — Laptops, smartphones, thumb drives and other data storage media can be lost, stolen or disposed of improperly. If they contain protected information and it ends up in the wrong hands, that’s a data breach.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Employee data theft or data leak</strong> — Employees, especially those who are departing soon, might deliberately access protected information without authorization with malicious intent.</span></span></p> </li> </ul> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Preventing data theft</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Protection- </strong>Protecting your data by implementing appropriate safeguards..</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Encryption- </strong>properly encrypted data will be useless for malicious actors; they won’t be able to sell it or use it against you or the individuals whose data they stole.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Employee training and awareness- </strong>Properly training employees to handle threats posed by data attacks so that they can prevent further mishaps<strong>.</strong></span></span></p> </li> </ul> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'ecuadors-online-data-leak', 'image' => 'https://www.mediafire.com/convkey/9e7a/avfpg44y932v5mo6g.jpg', 'fbimage' => 'https://www.mediafire.com/convkey/9e7a/avfpg44y932v5mo6g.jpg', 'metatitle' => 'Ecuador’s online data leak', 'metakeyword' => 'Encryption- properly encrypted data will be useless for malicious ', 'metadescription' => 'Encryption- properly encrypted data will be useless for malicious actors; they won’t be able to sell it or use it against you or the individuals whose data they stole.', 'author' => null, 'downlaodpdf' => 'https://www.mediafire.com/file/def8xwczok3zv37/Ecuador%C6s_online_data_leak.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 28 => object(Cake\ORM\Entity) { 'tag' => 'IT, Mobile & Computers', 'keyword' => 'IT-Mobile-Computers', 'id' => (int) 2353, 'title' => 'Intelligent apps (I-apps)', 'description' => '<p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Issue</strong></span></span></p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"> Making use of historical and real-time datasets, I- app platforms are empowering the potential for hypotheses made by machines.</span></span></p> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Background</strong></span></span></p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Intelligent Apps are the applications which acquire real-time and historical data from user interactions and other sources in order to provide suggestions and make predictions.</span></span></p> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Details</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">These apps are capable of converging database and data warehouse workloads, operating with Artificial Intelligence and machine learning.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Today’s digital natives demand much more than simple mobile-enabled access to key business applications and data. They anticipate intelligent user experience and highly usable as offered by consumer apps. And, intelligent apps assure to provide the same.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Artificial intelligence is used in developing an intelligent application that is much sophisticated by having algorithms.It automates how much tasks to be performed.</span></span></p> </li> </ul> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Features of I-apps</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">I-apps work on a vast amount of data, it is able to read and store a vast array of human interactions.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">It provides higher returns on investment.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">It also allows users to do away with the need to use the business key.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">I-app contributes to enhancing output, boost up response time.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">apps have the ability to provide just the right information to do their current job in an effective manner.</span></span></p> </li> </ul> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Some examples of I-apps</strong></span></span></p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Cortana</strong>- Asssistant app developed by Microsoft.</span></span></p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Google Allo </strong>– Specch to text output</span></span></p> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'intelligent-apps-i-apps', 'image' => 'https://www.mediafire.com/convkey/c924/vilbo65kqshj1236g.jpg', 'fbimage' => 'https://www.mediafire.com/convkey/c924/vilbo65kqshj1236g.jpg', 'metatitle' => 'Intelligent apps (I-apps)', 'metakeyword' => 'Today’s digital natives demand much more than simple', 'metadescription' => 'Today’s digital natives demand much more than simple mobile-enabled access to key business applications and data. They anticipate intelligent user experience ', 'author' => null, 'downlaodpdf' => 'https://www.mediafire.com/file/5vezr5f2cuhit6l/Intelligent_apps_%28I-apps%29.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 29 => object(Cake\ORM\Entity) { 'tag' => 'IT, Mobile & Computers', 'keyword' => 'IT-Mobile-Computers', 'id' => (int) 2375, 'title' => 'Quantum supremacy', 'description' => '<p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Issue</strong></span></span></p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Google has claimed to have achieved ‘quantum supremacy’. That means that researchers at Google had solved a really difficult problem in seconds with the help of quantum computers which a supercomputer could not.</span></span></p> <p style="margin-right:0in"> </p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Background</strong></span></span></p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The research paper is yet to be formally approved by peers in the field and became public after having appeared briefly on the National Aeronautics and Space Administration (NASA) website as apparently some of its researchers were involved in the project.</span></span></p> <p style="margin-right:0in"> </p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Details</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Exploiting the principles of quantum mechanics, these computers can easily tackle computational problems that may be tough for the classical computer as the size of the numbers and number of inputs involved grows bigger.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Conventional computers process information in ‘bits’ or 1s and 0s, following classical physics under which our computers can process a ‘1’ or a ‘0’ at a time. </span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Quantum computers compute in ‘qubits’ (or quantum bits). They exploit the properties of quantum mechanics, the science that governs how matter behaves on the atomic scale. In this scheme of things, processors can be a 1 and a 0 simultaneously, a state called quantum superposition. </span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">While this accelerates the speed of computation, a machine with less than a 100 qubits can solve problems with a lot of data that are even theoretically beyond the capabilities of the most powerful supercomputers.</span></span></p> </li> </ul> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Benefits of Quantum Computers</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">A quantum computer can solve this problem rapidly because it can attack complex problems that are beyond the scope of a classical computer.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The basic advantage is speed, as it is able to simulate several classical computers working in parallel. </span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Several encryption systems used in banking and security applications are premised on computers being unable to handle mathematical problems that are computationally demanding beyond a limit. Quantum computers, in theory, can surpass those limits.</span></span></p> </li> </ul> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'quantum-supremacy', 'image' => 'https://www.mediafire.com/convkey/7592/cpwa60ps0jlm1hx6g.jpg', 'fbimage' => 'https://www.mediafire.com/convkey/7592/cpwa60ps0jlm1hx6g.jpg', 'metatitle' => 'Quantum supremacy', 'metakeyword' => 'Quantum supremacy', 'metadescription' => 'Google has claimed to have achieved ‘quantum supremacy’. That means that researchers at Google had solved a really difficult problem in seconds ', 'author' => null, 'downlaodpdf' => 'https://www.mediafire.com/file/xpmrz68pywws366/Quantum_supremacy.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 30 => object(Cake\ORM\Entity) { 'tag' => 'IT, Mobile & Computers', 'keyword' => 'IT-Mobile-Computers', 'id' => (int) 2421, 'title' => 'Access to encrypted messages', 'description' => '<p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Issue</strong></span></span></p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Facebook and WhatsApp will be forced to share the encrypted messages of users with the British police, thanks to a treaty between the US and UK.</span></span></p> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Background</strong></span></span></p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"> The data will be required to support investigations into suspects of serious criminal offenses such as terrorism and pedophilia. The treaty is due to be signed next month.</span></span></p> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Details</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The UK and the US will not investigate each other’s citizens under the accord.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Facebook opposed the move and said that the deal undermines privacy and security of its users everywhere.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Government policies like the Cloud Act will allow companies to provide available information when valid legal requests are made and do not require companies to ignore.</span></span></p> </li> </ul> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>CLOUD Act</strong></span></span></p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The CLOUD Act or Clarifying Lawful Overseas Use of Data Act, makes it easier for law enforcement agencies to demand online information.</span></span></p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Under the Act, the data stored in any country can be demanded by the agencies.</span></span></p> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Indian Context</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The ministry of home affairs (MHA) had issued a notification authorising 10 central agencies to intercept, monitor, or decrypt digital communications.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The government is seeking to propose amendments to the Information Technology (IT) Act. The new changes seek to trace and access “unlawful” online content<strong>.</strong></span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The government stipulates that an online platform must comply with any “lawful order” to provide information or assistance within 72 hours of receiving it from any government agencies.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The amendments also require that encryption be broken to trace the origins of messages.</span></span></p> </li> </ul> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Implications</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Asking companies to break end-to-end encryption would threaten user privacy and free speech.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">This may pave the way for iron fisted approach by the government towards free speech and can ultimately lead to state imposed censorship.</span></span></p> </li> </ul> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'access-to-encrypted-messages', 'image' => 'https://www.mediafire.com/convkey/55cc/bgw5ucnlo0o1ydk6g.jpg', 'fbimage' => 'https://www.mediafire.com/convkey/55cc/bgw5ucnlo0o1ydk6g.jpg', 'metatitle' => 'Access to encrypted messages', 'metakeyword' => ' The data will be required to support investigations into suspects', 'metadescription' => ' The data will be required to support investigations into suspects of serious criminal offenses such as terrorism and pedophilia. The treaty is due to be signed next month.', 'author' => null, 'downlaodpdf' => 'https://www.mediafire.com/file/q03sv986rh6pn01/Access_to_encrypted_messages.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 31 => object(Cake\ORM\Entity) { 'tag' => 'IT, Mobile & Computers', 'keyword' => 'IT-Mobile-Computers', 'id' => (int) 2486, 'title' => 'GEMINI system', 'description' => '<p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Issue</strong></span></span></p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The government departments, research agencies and private companies have developed GEMINI, a portable receiver linked to ISRO-satellites, that is fail-proof and warn fishermen of danger.</span></span></p> <p style="margin-right:0in"> </p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Background</strong></span></span></p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Fishermen away on fishing are cut off from communication services and face threats from disasters.</span></span></p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Mobile phone frequencies cannot be accessed 10-12 km beyond the coast and by using GEMINI this range can increase to 300 nautical miles.</span></span></p> <p style="margin-right:0in"> </p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Details</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">GEMINI is developed by The Indian National Centre for Ocean Information Services (INCOIS), along with Accord, a private company, to develop a box-shaped receiver that has an antenna and in-built battery that can last three to four days.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">GEMINI works on GAGAN, developed by ISRO and the Airports Authority of India and is an India-made global positioning system and relies on the positioning system by ISRO’s GSAT satellites.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">When GEMINI is connected to an app, it also lets fishermen know the probability of fish-catch in the surrounding seas and provides ocean forecast.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Ocean State Forecasts include the forecasts on winds, waves, ocean currents, water temperature, etc. at every 6 hrs on daily basis for next 5 days helping fishermen in maximizing their earnings, ensuring safety and in planning of fishing activities.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">With this device, fishermen outside the signal range of their phone companies can also access warnings and alerts.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The device only allows one-way communication as it can’t be used by fishermen to make calls, for instance.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The devices are also relatively expensive for the average fisherman but attempts are being made to subsidise it by as much as 90%.</span></span></p> </li> </ul> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'gemini-system', 'image' => 'https://www.mediafire.com/convkey/5179/knj8qdbhttpbpge6g.jpg', 'fbimage' => 'https://www.mediafire.com/convkey/5179/knj8qdbhttpbpge6g.jpg', 'metatitle' => 'GEMINI system | GEMINI', 'metakeyword' => 'GEMINI system, GEMINI', 'metadescription' => 'The government departments, research agencies and private companies have developed GEMINI, a portable receiver linked to ISRO-satellites', 'author' => null, 'downlaodpdf' => 'https://www.mediafire.com/file/hnz3gbw7z0mrsa2/GEMINI_system.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 32 => object(Cake\ORM\Entity) { 'tag' => 'IT, Mobile & Computers', 'keyword' => 'IT-Mobile-Computers', 'id' => (int) 2538, 'title' => 'FASTags', 'description' => '<p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Issue</strong></span></span></p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The government is planning to make FASTag the equivalent of Aadhaar for vehicles, which will allow the government to track their movement across the country.</span></span></p> <p style="margin-right:0in"> </p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Background</strong></span></span></p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Tracking and identifying vehicles is a tedious task with large resources needed for implementing. Lack of CCTV identification cameras across places makes the process even more difficult. FASTag is expected to perform this duty effectively.</span></span></p> <p style="margin-right:0in"> </p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Details</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">A FASTag is linked to a bank account. When a vehicle passes through a toll, an SMS with date, time and place of transaction will be sent to the owner of the vehicle.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The master data of all transactions will be with the owner of the toll booth concerned, along with the bank with which the owner has registered the FASTag and the National Payments Corporation of India.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">A FASTag uses Radio Frequency Identification (RFID) technology to make cashless payments through a prepaid account linked to it. </span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The tag is fixed to the windscreen of a vehicle and an RFID antenna in the canopy of the toll gate scans the QR code and the tag identification number, following which the boom barrier lifts to allow a vehicle to pass through it without the need for a vehicle to stop.</span></span></p> </li> </ul> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Advantages of FASTags</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">They are likely to reduce the nation’s GDP loss by bringing down loss of fuel while waiting at toll plazas.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">It reduces traffic jam and waiting period for travellers are toll gates, thereby making journeys free of hassles.</span></span></p> </li> </ul> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>RFID technology</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">RFID uses electromagnetic fields to automatically identify and track tags attached to objects. The tags contain electronically stored information.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Passive tags collect energy from a nearby RFID reader's interrogating radio waves.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Unlike a barcode, the tags don't need to be within the line of sight of the reader, so it may be embedded in the tracked object.</span></span></p> </li> </ul> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Applications</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">RFID tag attached to an automobile during production can be used to track its progress through the assembly line.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">RFID-tagged pharmaceuticals can be tracked through warehouses.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"> Implanting RFID microchips in livestock and pets enables positive identification of animals.</span></span></p> </li> </ul> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'fastags', 'image' => 'https://www.mediafire.com/convkey/63ce/fn66q1urtt1coib6g.jpg', 'fbimage' => 'https://www.mediafire.com/convkey/63ce/fn66q1urtt1coib6g.jpg', 'metatitle' => 'FASTags | Electronic Toll Collection on Toll Plazas on NH', 'metakeyword' => 'FASTags, Electronic Toll Collection on Toll Plazas on National Highways, Electronic Toll Collection', 'metadescription' => 'The government is planning to make FASTag the equivalent of Aadhaar for vehicles, which will allow the government to track their movement across the country.', 'author' => null, 'downlaodpdf' => 'https://www.mediafire.com/file/5kc41snm0dgxfja/FASTags.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 33 => object(Cake\ORM\Entity) { 'tag' => 'IT, Mobile & Computers', 'keyword' => 'IT-Mobile-Computers', 'id' => (int) 2588, 'title' => 'Crypto currencies', 'description' => '<p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Issue</strong></span></span></p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Finance minister Nirmala Sitharaman has cautioned aginst use of crypto currencies on an official basis, citing various threats posed by it.</span></span></p> <p style="margin-right:0in"> </p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Background</strong></span></span></p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The virtual currency came into spotlight after Facebook has planned to launch its virtual currency known as <strong><em>Libra</em></strong>.</span></span></p> <p style="margin-right:0in"> </p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Details</strong></span></span></p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Cryptocurrency</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">A cryptocurrency (or crypto currency) is a digital asset designed to work as a medium of exchange that uses strong cryptography to secure financial transactions, control the creation of additional units, and verify the transfer of assets.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The decentralized control of each cryptocurrency works through distributed ledger technology,known as blockchain, that serves as a public financial transaction database.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Bitcoin, first released as open-source software in 2009, is generally considered the first decentralized cryptocurrency.</span></span></p> </li> </ul> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Advantages of cryptocurrency</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>No Inflation</strong></span></span></p> </li> </ul> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">There is no possibility for development of inflation in the system</span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Peer-to-peer cryptocurrency network</strong></span></span></p> </li> </ul> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Transactions are made by hundreds of distributed servers. Neither banks or taxes, nor governments can control the exchange of money.</span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Unlimited possibilities of transaction </strong></span></span></p> </li> </ul> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Each of the wallet holders can pay to anyone, anywhere and any amount. The transaction can not be controlled or prevented.</span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Anonymity</strong></span></span></p> </li> </ul> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">It is completely anonymous and at the same time fully transparent.</span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Data secure</strong></span></span></p> </li> </ul> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">No chances to use some personal data for fraud.</span></span></p> <p style="margin-right:0in"> </p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Drawbacks of cryptocurrency</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Investment risks</strong></span></span></p> </li> </ul> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Large risks of investing in cryptocurrency that should be considered in the medium and long term.</span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Regulations</strong></span></span></p> </li> </ul> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">It is not considered a universal curency due to non-recognition by official sources.</span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Security</strong></span></span></p> </li> </ul> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">They can be used to finance illegal activities such as terrorism.</span></span></p> <p style="margin-right:0in"> </p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Block chain</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">A blockchain is a continuously growing list of records, called blocks, which are linked and secured using cryptography.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Each block typically contains a hash pointer as a link to a previous block, a timestamp and transaction data<span style="font-size:10.5pt"><span style="background-color:white"><span style="font-family:"Arial","sans-serif""><span style="color:#222222">.</span></span></span></span></span></span></p> </li> </ul> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'crypto-currencies', 'image' => 'https://www.mediafire.com/convkey/2b22/vinz2a1r4xa35iz6g.jpg', 'fbimage' => 'https://www.mediafire.com/convkey/2b22/vinz2a1r4xa35iz6g.jpg', 'metatitle' => 'Crypto currencies | cryptocurrency network', 'metakeyword' => 'Crypto currencies, cryptocurrency network', 'metadescription' => 'Finance minister Nirmala Sitharaman has cautioned aginst use of crypto currencies on an official basis, citing various threats posed by it.', 'author' => null, 'downlaodpdf' => 'https://www.mediafire.com/file/njmeedz7wqr9lqu/Cryptocurrencies.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 34 => object(Cake\ORM\Entity) { 'tag' => 'IT, Mobile & Computers', 'keyword' => 'IT-Mobile-Computers', 'id' => (int) 2605, 'title' => 'New rules to regulate social media', 'description' => '<p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Issue</strong></span></span></p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The Centre has informed the Supreme Court that the entire process of finalising the laws on regulating social media will be completed by January 2020.</span></span></p> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Background</strong></span></span></p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The Electronics and IT Ministry has drafted the Information Technology Intermediaries Guidelines (Amendment) Rules 2018, and published the entire draft for public comments on its website on 24 December 2018, requesting suggestions and objections from concerned stakeholders and the public.</span></span></p> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Details</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The government has said that various rounds of industry consultations and discussions involving various chambers of commerce, associations and social media companies have already taken place.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The inter-ministerial consultations were also initiated and undertaken to seek the views of other ministries, including Home Affairs, Information and Broadcasting, Health, Women and Child Development, and Commerce on the draft revised rules.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The updated draft rules are under discussion and as it has to be vetted by the Law and Justice Ministry, the entire process will be completed by January 2020.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">While lauding the role of social media for economic growth and societal development, the government also raised concerns over the exponential rise in hate speech, fake news, threat to public order, anti-national activities, defamatory postings, and other unlawful activities in these platforms.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The government has also said that it will initiate a number of measures, including amendment in the existing Intermediaries Guidelines Rules 2011, to make intermediaries more liable towards the content that is published and transmitted on their platform.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Recently pleas were made in three High Courts, which have sought a direction that Aadhaar or any other government-authorised identity proof should be made mandatory to authenticate social media accounts<span style="font-size:12.5pt"><span style="background-color:white"><span style="color:#212121">.</span></span></span></span></span></p> </li> </ul> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'new-rules-to-regulate-social-media', 'image' => 'https://www.mediafire.com/convkey/2a43/560jqfcxlj2ace76g.jpg', 'fbimage' => 'https://www.mediafire.com/convkey/2a43/560jqfcxlj2ace76g.jpg', 'metatitle' => 'New rules to regulate social media', 'metakeyword' => 'The government has also said that it will initiate a number ', 'metadescription' => 'The government has also said that it will initiate a number of measures, including amendment in the existing Intermediaries Guidelines Rules 2011, to make ', 'author' => null, 'downlaodpdf' => 'https://www.mediafire.com/file/p3frzycpu9effgn/New_rules_to_regulate_social_media.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 35 => object(Cake\ORM\Entity) { 'tag' => 'IT, Mobile & Computers', 'keyword' => 'IT-Mobile-Computers', 'id' => (int) 2678, 'title' => 'Tamil Nadu to store patient data on cloud', 'description' => '<p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Issue</strong></span></span></p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The Tamil Nadu government will digitise the patient data in all government hospitals and allied institutions in the State for future reference and research purposes by storing them on cloud.</span></span></p> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Background</strong></span></span></p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The government currently follows a decade-old policy by destroying records after three years, which deprived patients or their kin from seeking copies of the treatment protocol after the stipulated time frame.</span></span></p> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Details</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The storage of patient documents for more than three years was a problem owing to space constraints. However, in case of medico-legal cases, patient records were being maintained for eight years.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">With the government rolling out the e-office policy, the scope for automation has widened in the administration of government hospitals.</span></span></p> </li> </ul> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Cloud storage</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Cloud storage is a model of <a href="https://en.wikipedia.org/wiki/Computer_data_storage" title="Computer data storage">computer data storage</a> in which the <a href="https://en.wikipedia.org/wiki/Digital_data" title="Digital data">digital data</a> is stored in logical <a href="https://en.wikipedia.org/wiki/Pool_(computer_science)" title="Pool (computer science)">pools</a>. The <a href="https://en.wikipedia.org/wiki/Storage_virtualization" title="Storage virtualization">physical storage</a> spans multiple <a href="https://en.wikipedia.org/wiki/Server_(computing)" title="Server (computing)">servers</a> (sometimes in multiple locations), and the physical environment is typically owned and managed by a <a href="https://en.wikipedia.org/wiki/Internet_hosting_service" title="Internet hosting service">hosting</a> company.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">These cloud storage providers are responsible for keeping the data <a href="https://en.wikipedia.org/wiki/Availability" title="Availability">available</a> and <a href="https://en.wikipedia.org/wiki/Data_access" title="Data access">accessible</a>, and the physical environment protected and running.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">People and organizations buy or lease storage capacity from the providers to store user, organization, or application data.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Cloud storage services may be accessed through a <a href="https://en.wikipedia.org/wiki/Colocation_centre" title="Colocation centre">colocated</a> <a href="https://en.wikipedia.org/wiki/Cloud_computing" title="Cloud computing">cloud computing</a> service, a <a href="https://en.wikipedia.org/wiki/Web_service" title="Web service">web service</a> <a href="https://en.wikipedia.org/wiki/Application_programming_interface" title="Application programming interface">application programming interface</a> (API) or by applications that utilize the API, such as <a href="https://en.wikipedia.org/wiki/Cloud_desktop" title="Cloud desktop">cloud desktop</a> storage, a <a href="https://en.wikipedia.org/wiki/Cloud_storage_gateway" title="Cloud storage gateway">cloud storage gateway</a> or <a href="https://en.wikipedia.org/wiki/World_Wide_Web" title="World Wide Web">Web</a>-based <a href="https://en.wikipedia.org/wiki/Content_management_system" title="Content management system">content management systems</a>.</span></span></p> </li> </ul> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Benefits</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Reduction in Cost of Ownership</strong></span></span></p> </li> </ul> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">With cloud storage, there is no hardware to purchase, storage to provision, or capital being used for "someday" scenarios. You can add or remove capacity on demand, quickly change performance and retention characteristics, and only pay for storage that you actually use.</span></span></p> <p style="margin-right:0cm"> </p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Time to Deployment</strong></span></span></p> </li> </ul> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">When development teams are ready to execute, infrastructure should never slow them down. Cloud storage allows IT to quickly deliver the exact amount of storage needed, right when it's needed.</span></span></p> <p style="margin-right:0cm"> </p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Information Management</strong></span></span></p> </li> </ul> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Centralizing storage in the cloud creates a tremendous leverage point for new use cases. By using cloud storage lifecycle management policies, you can perform powerful information management tasks including automated tiering or locking down data in support of compliance requirements.</span></span></p> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Types of cloud storage</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><a href="https://aws.amazon.com/what-is-cloud-object-storage/"><strong>Object Storage</strong></a><strong> </strong></span></span></p> </li> </ul> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"> Applications developed in the cloud often take advantage of object storage's vast scalablity and metadata characteristics. Object storage are ideal for building modern applications from scratch that require scale and flexibility, and can also be used to import existing data stores for analytics, backup, or archive.</span></span></p> <p style="margin-right:0cm"> </p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><a href="https://aws.amazon.com/what-is-cloud-file-storage/" target="_blank"><strong>File Storage</strong></a></span></span></p> </li> </ul> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"> Some applications need to access shared files and require a file system. This type of storage is often supported with a Network Attached Storage (NAS) server. <a href="https://aws.amazon.com/what-is-cloud-file-storage/" target="_blank">File storage</a> solutions are ideal for use cases like large content repositories, development environments, media stores, or user home directories.</span></span></p> <p style="margin-right:0cm"> </p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Block Storage</strong> </span></span></p> </li> </ul> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Other enterprise applications like databases or ERP systems often require dedicated, low latency storage for each host. Block-based cloud storage are provisioned with each virtual server and offer the ultra low latency required for high performance workloads.</span></span></p> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'tamil-nadu-to-store-patient-data-on-cloud', 'image' => 'https://www.mediafire.com/convkey/6043/hnq5oczrtfn11026g.jpg', 'fbimage' => 'https://www.mediafire.com/convkey/6043/hnq5oczrtfn11026g.jpg', 'metatitle' => 'Tamil Nadu to store patient data on cloud', 'metakeyword' => 'storage needed, right when it's needed. When development ', 'metadescription' => 'When development teams are ready to execute, infrastructure should never slow them down. Cloud storage allows IT to quickly deliver the exact amount of ', 'author' => null, 'downlaodpdf' => 'https://www.mediafire.com/file/5yb4466tvgtxb12/Tamil_Nadu_to_store_patient_data_on_cloud.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 36 => object(Cake\ORM\Entity) { 'tag' => 'IT, Mobile & Computers', 'keyword' => 'IT-Mobile-Computers', 'id' => (int) 2679, 'title' => 'Astrosat and jellyfish galaxies', 'description' => '<p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Issue</strong></span></span></p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Observations of a jelly fish galaxy, JW100, by Astrosat using its Ultraviolet Imaging Telescope (UVIT) have shown up star formation in hostile environments containing X-ray-emitting hot plasma.</span></span></p> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Background</strong></span></span></p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>JW100</strong> is located far away in the galaxy cluster Abell 2626. The measurements made by the UVIT have been crucial for this work.</span></span></p> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Details</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Astrosat joins this effort by contributing data from its Ultraviolet Imaging Telescope (UVIT) instrument.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The jellyfish galaxies are being observed by various telescopes each sensitive to different parts of the electromagnetic spectrum.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The jellyfish galaxies’ tentacles contain a very hostile environment as they interact with the galaxy clusters that are rich in X-ray emitting hot plasma. What triggers star formation in these environments is a puzzle.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Jellyfish galaxies experience several mechanisms at the same time. Many of these happen over various timescales. The paper attempts to throw light on some of these mechanisms in JW100, using data which trace various components.</span></span></p> </li> </ul> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Jellyfish galaxy</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Jellyfish galaxies are called so because they are shaped like discs that have many tentacle-like arms streaming away from the disc.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">They are formed when a disc-shaped galaxy rams into a galaxy cluster, which is a dense region containing many hundreds or thousands of galaxies packed into a small region.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">This can happen when the galaxy is attracted by the gravitational attraction of the cluster. As the individual galaxy rams into the galaxy cluster, the cold gas in its disc interacts with the hot plasma in the cluster.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Acting like a strong wind, the plasma in the cluster strips away the cold molecular gas of the disc, causing it to stream behind like tentacles.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Unlike usual galaxies that have stars forming in the disc, the jellyfish galaxies have star formation in the tentacles also.</span></span></p> </li> </ul> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><img alt="jellyfish galaxy.jpg" src="data:image/jpeg;base64,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" style="float:left; height:187px; width:313px" /></span></span></p> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"> </p> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'astrosat-and-jellyfish-galaxies', 'image' => 'https://www.mediafire.com/convkey/53d4/3tary3873x821e06g.jpg', 'fbimage' => 'https://www.mediafire.com/convkey/53d4/3tary3873x821e06g.jpg', 'metatitle' => 'Astrosat and jellyfish galaxies', 'metakeyword' => 'containing X-ray-emitting hot plasma.', 'metadescription' => 'Observations of a jelly fish galaxy, JW100, by Astrosat using its Ultraviolet Imaging Telescope (UVIT) have shown up star formation in hostile environments ', 'author' => null, 'downlaodpdf' => 'https://www.mediafire.com/file/y1cyk2q7v4s4kq7/Astrosat_and_jellyfish_galaxies.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 37 => object(Cake\ORM\Entity) { 'tag' => 'IT, Mobile & Computers', 'keyword' => 'IT-Mobile-Computers', 'id' => (int) 2726, 'title' => 'Mastodon in India', 'description' => '<p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Issue</strong></span></span></p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Mastodon is seeing a considerable influx of Indian users, who have labelled the platform as a more egalitarian social network.</span></span></p> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Background</strong></span></span></p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Mastodon, founded on October 5, 2016 by Eugen Rochko, calls itself a ‘federation’ comprising thousands of communities, similar to Reddit and with timelines much like Twitter.</span></span></p> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Details</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Users can create profiles, post images, messages and videos, all while following other users in Mastodon.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">It has properties similar to Reddit, with the open-source properties. Expressing yourself works differently too , unlike Twitter’s 280-character count, Mastodon offers a 500-character space for users to express themselves.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Mastodon has undergone many changes over the years. The new version promises a “safer social media experience” equipped with effective anti-abuse tools to protect yourself and other users from harassment as well as servers with strict codes of conduct. There are also more moderators involved in the upkeep of the platform.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Its infrastructural features are also different from others. Twitter is centralised, meaning all interactions take place on a single server controlled by one company but Mastodon is decentralised, meaning it is a collection of many instances which communicate with each other to form a wider network.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Each instances have their own servers, which follow their own policies. This means that Mastodon works like a federation.</span></span></p> </li> </ul> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Working of Mastodon</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Mastodon is comprised of individual servers, called instances, as opposed to a centralised server, the model used by platforms like Twitter.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Instances are not readily visible to every other instance. A pair of instances will communicate with each other only if there is a connection between a user on one instance and a user on the target instance.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Since complete freedom is given to owners to moderate the kind of content that is available to users of an instance, it naturally follows that users of a particular instance are usually like-minded, or know what they are signing up for when they join a particular instance.</span></span></p> </li> </ul> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'mastodon-in-India', 'image' => 'https://www.mediafire.com/convkey/1f69/nc8voxi0woo2j6n6g.jpg', 'fbimage' => 'https://www.mediafire.com/convkey/1f69/nc8voxi0woo2j6n6g.jpg', 'metatitle' => 'Mastodon in India', 'metakeyword' => 'offers a 500-character space for users to express themselves.', 'metadescription' => 'It has properties similar to Reddit, with the open-source properties. Expressing yourself works differently too , unlike Twitter’s 280-character count, Mastodon ', 'author' => null, 'downlaodpdf' => 'https://www.mediafire.com/file/yrjdz86pi22pfms/Mastodon_in_India.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 38 => object(Cake\ORM\Entity) { 'tag' => 'IT, Mobile & Computers', 'keyword' => 'IT-Mobile-Computers', 'id' => (int) 2816, 'title' => 'Security design flaw in Bluetooth devices', 'description' => '<p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Issue</strong></span></span></p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">An inherent design flaw makes mobile apps that work with Bluetooth Low Energy devices vulnerable to hacking, according to a study at the Association for Computing Machinery.</span></span></p> <p style="margin-right:0in"> </p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Background</strong></span></span></p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Bluetooth is a wireless technology standard used for exchanging data between fixed and mobile devices over short distances using short-wavelength UHF radio waves in the industrial, scientific and medical radio bands and building personal area networks.</span></span></p> <p style="margin-right:0in"> </p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Details</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">There is a fundamental flaw that leaves these devices vulnerable, first when they are initially paired to a mobile app, and then again when they are operating.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The study found it to be a consistent problem among Bluetooth low energy devices when communicating with mobile apps.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Devices like wearable health and fitness tracker, smart thermostat, smart speaker or smart home assistant communicates with the apps on mobile device by broadcasting something called a UUID, a universally unique identifier.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The identifier allows the corresponding apps on the phone to recognise the Bluetooth device, creating a connection that allows the phone and device to talk to one another.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The identifier itself is also embedded into the mobile app code. Otherwise, mobile apps would not be able to recognise the device. However, such UUIDs in the mobile apps make the devices vulnerable to a fingerprinting attack.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Cases in which no encryption is involved or encryption is used improperly between mobile apps and devices, the attacker would be able to ‘listen in’ on your conversation and collect that data.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">In addition to building the databases directly from mobile apps of the Bluetooth devices in the market, the team’s evaluation also identified 1,434 vulnerable apps that allow unauthorised access.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The experts say that the problem should be relatively easy to fix if app developers tightened defences in that initial authentication.</span></span></p> </li> </ul> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'security-design-flaw-in-bluetooth-devices', 'image' => 'https://www.mediafire.com/convkey/2151/2q5415wphb3iilj6g.jpg', 'fbimage' => 'https://www.mediafire.com/convkey/2151/2q5415wphb3iilj6g.jpg', 'metatitle' => 'Security design flaw in Bluetooth devices', 'metakeyword' => 'Security design flaw in Bluetooth devices', 'metadescription' => 'An inherent design flaw makes mobile apps that work with Bluetooth Low Energy devices vulnerable to hacking, according to a study at the Association', 'author' => null, 'downlaodpdf' => 'https://www.mediafire.com/file/qsphwrbbh8u9csw/Security_design_flaw_in_Bluetooth_devices.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 39 => object(Cake\ORM\Entity) { 'tag' => 'IT, Mobile & Computers', 'keyword' => 'IT-Mobile-Computers', 'id' => (int) 2995, 'title' => 'Government to frame new norms to make social media accountable', 'description' => '<p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Issue</strong></span></span></p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The government said that it was working on rules to mandate social media companies to identify and remove child sexual abuse material, rape images and content promoting terrorism without affecting privacy.</span></span></p> <p style="margin-right:0in"> </p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Background</strong></span></span></p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The government has invited public comments on its draft of amendments to the Intermediary Rules 2011 and has received public inputs on the same.</span></span></p> <p style="margin-right:0in"> </p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Details</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The amendments propose that intermediaries should proactively identify and remove child sexual abuse material, rape/gang-rape imagery and contents promoting terrorism without compromising accuracy or privacy using technology-based tools and mechanism. The rules are presently being finalised.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The Section 69A of the IT Act, 2000, empowers the government to block any information generated, transmitted, received, stored or hosted in any computer resource in the interest of sovereignty and integrity of India, defence of India, security of the state, friendly relations with foreign states or public order or for preventing incitement to the commission of any cognisable offence relating to above.</span></span></p> </li> </ul> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'government-to-frame-new-norms', 'image' => 'https://www.mediafire.com/convkey/f63f/0z5s6mohtitc1566g.jpg', 'fbimage' => 'https://www.mediafire.com/convkey/f63f/0z5s6mohtitc1566g.jpg', 'metatitle' => 'Government to frame new norms to make social media', 'metakeyword' => 'Government to frame new norms to make social media accountable', 'metadescription' => 'The government said that it was working on rules to mandate social media companies to identify and remove child sexual abuse material, rape images', 'author' => null, 'downlaodpdf' => 'https://www.mediafire.com/file/lot5okhrk5xxqfv/Government_to_frame_new_norms_to_make_social_media_accountable.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 40 => object(Cake\ORM\Entity) { 'tag' => 'IT, Mobile & Computers', 'keyword' => 'IT-Mobile-Computers', 'id' => (int) 3076, 'title' => 'Kerala to train blockchain experts', 'description' => '<p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Issue</strong></span></span></p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The Kerala State Development and Innovation Strategic Council has launched the Accelerated Blockchain Competency Development Programme for students.</span></span></p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The idea is to provide them with an early advantage and position the State as the largest supplier of Blockchain technologists in the country.</span></span></p> <p style="margin-right:0in"> </p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Background</strong></span></span></p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The council has set a target of producing 25,000 Blockchain technologists in three years. It is expected that over 5,000 certified students can be trained in the first 12 months.</span></span></p> <p style="margin-right:0in"> </p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Details</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The programme is open for diploma holders, graduates and graduating students with engineering or science backgrounds. Through an online outreach, the programme has been extended to working professionals as well.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The Blockchain training programme has three modules – Blockchain Associate , Blockchain Developer and Blockchain Architect .</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The entrance test will be held in July and the classes will begin in August. Students will be required to complete the full-stack certification with certain grades to qualify for the training programme.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The programme offers two-part certification wherein participants obtain a foundation skills certificate in full-stack and intermediate level skills.</span></span></p> </li> </ul> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Blockchain technology</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Blockchain technology is defined as a decentralized, distributed ledger that records the provenance of a digital asset. A blockchain, is a growing list of records, called blocks, that are linked using cryptography.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Each block contains a cryptographic hash of the previous block, a timestamp, and transaction data. By design, a blockchain is resistant to modification of the data.</span></span></p> </li> </ul> <p style="margin-right:0in"> </p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Applications </strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Banking</strong></span></span></p> </li> </ul> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Avoid risk of payment losses involved in banking transactions by adopting secure distributed ledger platform. Reduces transactions fee across cross-borders, corporate payments and remittances.</span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Real Estate</strong></span></span></p> </li> </ul> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Decentralized ledger platform helps to connect potential buyers with sellers. Helps to analyse the authenticity of ownership transfers, rental agreements and smart contracting through land registry management system.</span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Insurance</strong></span></span></p> </li> </ul> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Transforms the way the insurance documents, claim settlements and fraud handling's are carried out. It allows the creation of transparent, secure, decentralized and immutable insurance network.</span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Healthcare</strong></span></span></p> </li> </ul> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Establishes a secure chain of network to handle patient records, consent forms, billings and public health monitoring.</span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Automotive</strong></span></span></p> </li> </ul> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Solves challenges in automotive manufacturing, car deliveries, billings and helps in the creation of an after sales support ecosystem to keep track of the maintenance record of vehicle owners.</span></span></p> <p style="margin-right:0in"> </p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Advantages</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The blockchain technology allows for verification without having to be dependent on third-parties.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The data structure in a blockchain is append-only. So, the data cannot be altered or deleted.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The transactions are recorded in chronological order. Thus, all the blocks in the blockchain are time stamped.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The ledger is distributed across every single node in the blockchain who are the participants. So, it is distributed.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The transactions that take place are transparent. The individuals who are provided authority can view the transaction.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The origin of any ledger can be tracked along the chain to its point of origin.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Since various consensus protocols are needed to validate the entry, it removes the risk of duplicate entry or fraud.</span></span></p> </li> </ul> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'kerala-to-train-blockchain-experts', 'image' => 'https://www.mediafire.com/convkey/9ce7/x6assl7mmlc4gkk6g.jpg', 'fbimage' => 'https://www.mediafire.com/convkey/9ce7/x6assl7mmlc4gkk6g.jpg', 'metatitle' => 'Kerala to train blockchain experts', 'metakeyword' => 'Kerala to train blockchain experts', 'metadescription' => 'The Kerala State Development and Innovation Strategic Council has launched the Accelerated Blockchain Competency Development Programme for students.', 'author' => null, 'downlaodpdf' => 'https://www.mediafire.com/file/1eyc8bexg204ht2/Kerala_to_train_blockchain_experts.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 41 => object(Cake\ORM\Entity) { 'tag' => 'IT, Mobile & Computers', 'keyword' => 'IT-Mobile-Computers', 'id' => (int) 3095, 'title' => 'Android vulnerable to ‘StrandHogg’ malware', 'description' => '<p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Issue</strong></span></span></p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The Union Home Ministry has sent an alert to all States warning them about the vulnerability of the Android operating system to a bug called ‘StrandHogg’ that allows real-time malware applications to pose as genuine applications and access user data of all kind.</span></span></p> <p style="margin-right:0in"> </p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Background</strong></span></span></p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">While all versions of Android, including Android 10, are vulnerable to this bug, it may not be apparent to the affected users that malware applications are already on board their device.</span></span></p> <p style="margin-right:0in"> </p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Details</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">These malware can then potentially listen to their conversations, access photo album, read/send messages, make calls, record conversations and get login credentials to various accounts.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">his apart, things that such malware can access include private images, files, contact details, call logs, and location information.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">At least 500 popular apps are at risk because of this malware that hackers can deploy to attack mobile phone users. </span></span></p> </li> </ul> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong> Threats</strong></span></span></p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">It can activate the microphone, allowing a hacker in a remote location to listen to live conversations. The camera can also be switched on to capture visuals.</span></span></p> <p style="margin-right:0in"> </p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Signs of attack</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Pop-ups asking for permission to send notifications, messages etc., are one of the main entry points for ‘StrandHogg’ to launch the attack. </span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">An app in which the user is already logged in asking him/her to login again is another anomaly pointing to the possibilities of a cyberattack. </span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Once users approve such requests, the malware would instantly access the mobile phone or tablet for specific purposes.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Links and buttons that become non-functional, apps asking for permissions that are not required are among the other warning signs.</span></span></p> </li> </ul> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Malware</strong></span></span></p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Malware is any software intentionally designed to cause damage to a computer, server, client, or computer network. A wide variety of types of malware exist, including computer viruses, worms, Trojan horses, ransomware, spyware, adware, and scareware.</span></span></p> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'android-vulnerable-to-strandhogg-malware', 'image' => 'https://www.mediafire.com/convkey/cb8b/bczmwitgi6aslsu6g.jpg', 'fbimage' => 'https://www.mediafire.com/convkey/cb8b/bczmwitgi6aslsu6g.jpg', 'metatitle' => 'Android vulnerable to ‘StrandHogg’ malware', 'metakeyword' => 'Android vulnerable to ‘StrandHogg’ malware', 'metadescription' => 'The Union Home Ministry has sent an alert to all States warning them about the vulnerability of the Android operating system to a bug called ‘StrandHogg’', 'author' => null, 'downlaodpdf' => 'https://www.mediafire.com/file/xy10xxx1betrv6m/Android_vulnerable_to_%E6StrandHogg%C6_malware.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 42 => object(Cake\ORM\Entity) { 'tag' => 'IT, Mobile & Computers', 'keyword' => 'IT-Mobile-Computers', 'id' => (int) 3180, 'title' => 'totok-messaging-app-could-be-a-spying-tool-of-uae', 'description' => '<p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Issue</strong></span></span></p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">ToTok, a chat and voice calling app that became available earlier this, is<strong> </strong>actually a spying tool, according to a United States intelligence assessment.</span></span></p> <p style="margin-right:0in"> </p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Background</strong></span></span></p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The UAE has restricted popular messaging services like WhatsApp and Skype, and ToTok was billed as a “fast, free, and secure” way to chat by video or text message.</span></span></p> <p style="margin-right:0in"> </p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Details</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">ToTok is used by the government of the United Arab Emirates (UAE) to try to track every conversation, movement, relationship, appointment, sound and image of those who install it on their phones.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">While the majority of its users are in the Emirates, the app has been downloaded throughout the Middle East, and in Europe, Asia, Africa, and North America.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">According to recent Google Play rankings quoted by the report, it was among the top 50 free apps in Saudi Arabia, the UK, India, Sweden, and other countries.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The firm behind ToTok is Breej Holding, most likely a front company affiliated with DarkMatter, an Abu Dhabi-based cyberintelligence and hacking firm.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Google removed the app from its Play store after determining ToTok violated unspecified policies. Apple has also removed ToTok from its App Store. But users who have it installed in their phones can still use it until they remove it from their phones.</span></span></p> </li> </ul> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'ToTok messaging app could be a spying tool of UAE', 'image' => 'https://www.mediafire.com/convkey/faa2/g1rjvrb2qpq25gz6g.jpg', 'fbimage' => 'https://www.mediafire.com/convkey/faa2/g1rjvrb2qpq25gz6g.jpg', 'metatitle' => 'ToTok messaging app could be a spying tool of UAE', 'metakeyword' => 'ToTok messaging app could be a spying tool of UAE', 'metadescription' => 'ToTok, a chat and voice calling app that became available earlier this, is actually a spying tool, according to a United States intelligence assessment.', 'author' => null, 'downlaodpdf' => 'https://www.mediafire.com/file/puehj41khku9uzx/ToTok_messaging_app_could_be_a_spying_tool_of_UAE.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 43 => object(Cake\ORM\Entity) { 'tag' => 'IT, Mobile & Computers', 'keyword' => 'IT-Mobile-Computers', 'id' => (int) 3267, 'title' => 'TRAI issues consultation papers on net neutrality', 'description' => '<p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Issue</strong></span></span></p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The Telecom Regulatory Authority of India (TRAI) has issued a consultation paper on issues related to traffic management practices and the multi-stakeholder body for ‘net neutrality’.</span></span></p> <p style="margin-right:0in"> </p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Background</strong></span></span></p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The paper discusses the various challenges in measurement of internet traffic and compilation of reasonable traffic management practices (TMP).</span></span></p> <p style="margin-right:0in"> </p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Details</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The consultation paper said that currently there might be a number of TMPs, which are developed and deployed in the networks for different requirements. </span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Some of these may be of a concern from the net neutrality perspective and required not to be applied in general, while some of the other TMPs might be necessary in specific situations.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">To monitor and enforce net neutrality in an objective and transparent manner, it might be required to list out the reasonable TMPs and conditions when these may be applied.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Keeping in view the challenges of monitoring and enforcing net neutrality principles, TRAI recommended that DoT may establish a multi-stakeholder body (MSB) with a framework for collaborative mechanism among the stakeholders.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The MSB would not be for profit and would be led by the industry, and may comprise members representing different categories of TSPs and ISPs, large and small content providers, representatives from research and academia, civil society organisations and consumer representatives.</span></span></p> </li> </ul> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Net</strong> <strong>Neutrality</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Network neutrality, or simply net neutrality, is the principle that Internet service providers (ISPs) must treat all Internet communications equally, and not discriminate or charge differently on user, content, website, platform, application, type of equipment, source address, destination address, or method of communication.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">With net neutrality, ISPs may not intentionally block, slow down, or charge money for specific online content. Without net neutrality, ISPs may prioritize certain types of traffic, meter others, or potentially block traffic from specific services, while charging consumers for various tiers of service.</span></span></p> </li> </ul> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Need for net neutrality</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Freedom of expression</strong></span></span></p> </li> </ul> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">As long as it's legal, any blog or website or news service is available online under the concept of net neutrality. Otherwise, internet service providers could in theory block access to content they don't want you to see.</span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Promotes innovation and competition</strong></span></span></p> </li> </ul> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">An open internet ensures that larger companies don't have yet another advantage over a tiny startup. It's a level playing field on the internet, where everything is delivered as fast as possible to the end user.</span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Uninterrupted access</strong></span></span></p> </li> </ul> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Net neutrality squashes the potential for internet fast lanes, where internet service providers can charge content creators for enough bandwidth to deliver their service properly.</span></span></p> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'trai-issues-consultation-papers-on-net-neutrality', 'image' => 'https://www.mediafire.com/convkey/f9db/xpkwbszag2a4gok6g.jpg', 'fbimage' => 'https://www.mediafire.com/convkey/f9db/xpkwbszag2a4gok6g.jpg', 'metatitle' => 'TRAI issues consultation papers on net neutrality', 'metakeyword' => 'TRAI issues consultation papers on net neutrality', 'metadescription' => 'The Telecom Regulatory Authority of India (TRAI) has issued a consultation paper on issues related to traffic management practices and the multi-stakeholder', 'author' => null, 'downlaodpdf' => 'https://www.mediafire.com/file/izeabqnd97ffu1k/TRAI_issues_consultation_papers_on_net_neutrality.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 44 => object(Cake\ORM\Entity) { 'tag' => 'IT, Mobile & Computers', 'keyword' => 'IT-Mobile-Computers', 'id' => (int) 3354, 'title' => 'Social media services and political ad', 'description' => '<p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Issue</strong></span></span></p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Online<strong> </strong>platforms, including Facebook and Alphabet Inc’s Google are facing growing pressure to stop carrying political ads that contain false or misleading claims ahead of the U.S. presidential election.</span></span></p> <p style="margin-right:0in"> </p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Details</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">In the United States, the Communications Act prevents broadcast stations from rejecting or censoring ads from candidates for federal office once they have accepted advertising<strong> </strong>for that political race.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Facebook exempts politicians from its third-party fact-checking program, allowing them to run ads with false claims.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The policy has been attacked by regulators and lawmakers who say it could spread misinformation and cause voter suppression.</span></span></p> </li> </ul> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Facebook</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Facebook does fact-check content from political groups. The company also says it fact-checks politicians if they share previously debunked content and does not allow this content in ads.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The company is making some changes to its approach to political ads, including allowing users to turn off certain ad-targeting tools. </span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Another change will be to allow users to choose to stop seeing ads based on an advertiser’s ‘Custom Audience’ and that will apply to all types of advertising, not only political ads.</span></span></p> </li> </ul> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Twitter</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Twitter Inc has banned political ads. Iit said this would include ads that reference a political candidate, party, election or legislation, among other limits.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The company also said it would not allow ads that advocate for a specific outcome on political or social causes.</span></span></p> </li> </ul> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Google</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Google said that it would limit audience targeting for election ads to age, gender and general location at a postal code level.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The change means political advertisers can no longer target ads using data such as public voter records and general political affiliations such as right-leaning, left-leaning or independent. </span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Advertisers can still do contextual targeting, such as showing ads to users watching a certain video.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Google and its video-streaming service YouTube prohibit certain kinds of ads, such as misinformation about public voting procedures, political candidate eligibility based on age or birthplace or incorrect claims that a public figure has died.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Google does not have a wholesale ban on politicians running false or misleading ads.</span></span></p> </li> </ul> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Snap</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Snap Inc allows political advertising unless the ads are misleading, deceptive or violate the terms of service on its disappearing message app Snapchat.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The company, which recently joined Facebook, Twitter and Google in launching a public database of its political ads, defines political ads as including election-related, advocacy and issue ads.</span></span></p> </li> </ul> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>TikTok</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The Chinese-owned video app popular with U.S. teenagers does not permit political advertising on the platform.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">TikTok said the company wants to make sure the platform continues to feel “light-hearted and irreverent.”</span></span></p> </li> </ul> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Reddit</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Social network Reddit allows ads related to political issues and ads from political candidates at the federal level, but not for State or local elections.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">It also does not allow ads about political issues, elections or candidates outside of the United States.</span></span></p> </li> </ul> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'social-media-services-and-political-ad', 'image' => 'https://www.mediafire.com/convkey/7c3d/k6b67xuyl09zud26g.jpg', 'fbimage' => 'https://www.mediafire.com/convkey/7c3d/k6b67xuyl09zud26g.jpg', 'metatitle' => 'Social media services and political ad', 'metakeyword' => 'Social media services and political ad', 'metadescription' => 'Online platforms, including Facebook and Alphabet Inc’s Google are facing growing pressure to stop carrying political ads that contain false or misleading claims', 'author' => null, 'downlaodpdf' => 'https://www.mediafire.com/file/83g7ttobfcn6kz0/Social_media_services_and_politicak_ad.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 45 => object(Cake\ORM\Entity) { 'tag' => 'IT, Mobile & Computers', 'keyword' => 'IT-Mobile-Computers', 'id' => (int) 3366, 'title' => 'Using data analytics to catch GST evaders', 'description' => '<p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Issue</strong></span></span></p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The Department of Revenue has identified as many as 931 cases of fraudulent GST (Goods and Services Tax) refund claims through data analytics.</span></span></p> <p style="margin-right:0in"> </p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Background</strong></span></span></p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Identified taxpayers, who had purchased goods from tax-evading, non-filers, would face verification and scrutiny as necessary.</span></span></p> <p style="margin-right:0in"> </p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Details</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">It was also through data analytics that recently, GST formations had identified a few exporters with ‘star’ status who were fraudulently availing IGST refund and were untraceable at their registered addresses.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The GST data analytics wing had been able to identify all such cases involving fake invoicing and fraudulent tax credits, which have been encashed through the facility of IGST refunds.</span></span></p> </li> </ul> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Data Analytics</strong></span></span></p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Data analysis is a process of inspecting, cleansing, transforming and modeling data with the goal of discovering useful information, informing conclusion and supporting decision-making. Data integration is a precursor to data analysis,[according to whom?] and data analysis is closely linked[how?] to data visualization and data dissemination.</span></span></p> <p style="margin-right:0in"> </p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Applications</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Policing/Security</strong></span></span></p> </li> </ul> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Several cities all over the world have employed predictive analysis in predicting areas that would likely witness a surge in crime with the use of geographical data and historical data.</span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Transportation</strong></span></span></p> </li> </ul> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Using thye past travel records to predict and analyse the most suitable and safe path for movement of people in a large area.</span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Fraud and Risk detection</strong></span></span></p> </li> </ul> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">banks learning to divide and conquer data from their customers’ profiles, recent expenditure and other significant information that were made available to them</span></span></p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">This made it easy for them to analyze and infer if there was any probability of customers defaulting.</span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Manage Risk</strong></span></span></p> </li> </ul> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">These days, analytical software is used for detecting the various forms of fraudulent claims. Risky claims are detected by red flag indicators which can be examined. It is very essential to bring such claims to the attention of administrators, due to the manner at which automation is improving claims processing efficiency.</span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Healthcare</strong></span></span></p> </li> </ul> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Machine and instrument data use has risen drastically so as to optimize and track treatment, patient flow as well as the use of equipment in hospitals. </span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Economic spending</strong></span></span></p> </li> </ul> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Data analytics applications would target where taxpayers’ money would have a major impact on and the kind of work that would be adequate for it.</span></span></p> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'using-data-analytics-to-catch-gst-evaders', 'image' => 'https://www.mediafire.com/convkey/b9d7/yzjun6cdr8ob3uw6g.jpg', 'fbimage' => 'https://www.mediafire.com/convkey/b9d7/yzjun6cdr8ob3uw6g.jpg', 'metatitle' => 'Using data analytics to catch GST evaders', 'metakeyword' => 'Using data analytics to catch GST evaders', 'metadescription' => 'The Department of Revenue has identified as many as 931 cases of fraudulent GST (Goods and Services Tax) refund claims through data analytics.', 'author' => null, 'downlaodpdf' => 'https://www.mediafire.com/file/o91r72vl8vv2wsp/Using_data_analytics_to_catch_GST_evaders.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 46 => object(Cake\ORM\Entity) { 'tag' => 'IT, Mobile & Computers', 'keyword' => 'IT-Mobile-Computers', 'id' => (int) 3457, 'title' => 'Saudi officials hack Jeff Bezos’ phone', 'description' => '<p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Issue</strong></span></span></p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">A malicious file attached to an encrypted video message sent on WhatsApp is believed to have been used in hacking Amazon founder and CEO Jeff Bezos’s iPhone. The sender of the message was Crown Prince of Saudi Arabia Mohammad bin Salman.</span></span></p> <p style="margin-right:0in"> </p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Background</strong></span></span></p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">A forensic analysis of Bezos’s phone showed that it was compromised via the WhatsApp message. </span></span></p> <p style="margin-right:0in"> </p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Details</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">A United Nations report confirmed the hacking and provided extensive forensic details. It said Bezos was subjected to intrusive surveillance via hacking of his phone as a result of actions attributable to the WhatsApp account used by Crown Prince Mohammed bin Salman.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The report linked the break-in to criticism of the Saudi regime and Prince Mohammad personally by The Washington Post, the media organisation that Bezos owns.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The report has concluded the Pegasus spyware developed by the Israeli firm NSO Group was most likely used in the hacking. </span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Pegasus was used last year to target some 1,400 devices in 20 countries across four continents, including at least two dozen academics, lawyers, Dalit activists, and journalists in India.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Bezos had written a blog post alleging he was being blackmailed by David Pecker, the CEO of American Media Inc (AMI), which owns the tabloid The National Enquirer.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">A security expert hired by Bezos to investigate the blackmail explained that the blackmailing data were likely obtained illegally from Bezos’s phone, and that the Saudis were responsible.</span></span></p> </li> </ul> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Pegasus spyware</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">It is a spyware that can infect both Android and iOS phones. It is usually deployed by sending a specially created link to the target device. Once deployed, the hacker has complete access to the data on the victim’s phone. </span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The spyware can be used to monitor the device, and even turn on the camera and microphone to eavesdrop on targets.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">All data collected from the device are sent back to the NSO Group’s Pegasus servers. NSO has in the past claimed its software is only licensed to law enforcement agencies, and not used to spy on users. </span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">It is believed that the cost of a license for Pegasus is exorbitant enough to ensure that only governments are customers.</span></span></p> </li> </ul> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'saudi-officials-hack-jeff-bezos-phone', 'image' => 'https://www.mediafire.com/convkey/50b0/qvfihu8a8kl1zau6g.jpg', 'fbimage' => 'https://www.mediafire.com/convkey/50b0/qvfihu8a8kl1zau6g.jpg', 'metatitle' => 'Saudi officials hack Jeff Bezos’ phone', 'metakeyword' => 'Saudi officials hack Jeff Bezos’ phone', 'metadescription' => 'A malicious file attached to an encrypted video message sent on WhatsApp is believed to have been used in hacking Amazon founder and CEO Jeff Bezos’s', 'author' => null, 'downlaodpdf' => 'https://www.mediafire.com/file/i4po5l6kgul1527/Saudi_officials_hack_Jeff_Bezos%C6_phone.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 47 => object(Cake\ORM\Entity) { 'tag' => 'IT, Mobile & Computers', 'keyword' => 'IT-Mobile-Computers', 'id' => (int) 3568, 'title' => 'Big Data to fight novel Coronavirus', 'description' => '<p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Issue</strong></span></span></p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Chinese mobile operators and technology firms are supporting the tracking and prevention of pneumonia caused by the novel coronavirus with the help of big data.</span></span></p> <p style="margin-right:0in"> </p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Background</strong></span></span></p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Telecom giant China Unicom has set up a group-wide team of more than 100 big data technicians and experts to provide data analysis and intelligent applications to the government using algorithm models.</span></span></p> <p style="margin-right:0in"> </p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Details</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">It provides big data analysis reports on epidemic-related population flow to 31 provincial traffic and health departments.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">GeTui, a smart data provider, has studied the number of people travelling from Wuhan, the hardest-hit city of the epidemic outbreak in central China, and released their distribution density in a heat map.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The travelers from Wuhan were distributed across a wide range of rural areas, especially in Henan, Hunan and Sichuan provinces, according to the heat map.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Yonyou, a software and cloud services company, has updated its cloud service platform, using the Internet of Things and big data technologies to connect the supply and demand of medical resources between medical enterprises and hospitals at the center of the epidemic.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The platform had released the demand for medical supplies of 30 hospitals, involving protective clothing, masks, goggles, surgical gowns and shoe covers.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">One can use the Baidu Map application to check the population density in business districts, hospitals and transportation hubs, in order to avoid crowded places, which is key to preventing and controlling the epidemic.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Epidemic information and protection knowledge collected with big data has been shared with nearly 80 million users every day through Toutiao, a popular news feed mobile app in China.</span></span></p> </li> </ul> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Big Data</strong></span></span></p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Big data is a field that treats ways to analyze, systematically extract information from, or otherwise deal with data sets that are too large or complex to be dealt with by traditional data-processing application software.</span></span></p> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'big-data-to-fight-novel-coronavirus', 'image' => 'https://www.mediafire.com/convkey/b8eb/5ro8se5f90r3cr36g.jpg', 'fbimage' => 'https://www.mediafire.com/convkey/b8eb/5ro8se5f90r3cr36g.jpg', 'metatitle' => 'Big Data to fight novel Coronavirus', 'metakeyword' => 'Big Data to fight novel Coronavirus', 'metadescription' => 'Chinese mobile operators and technology firms are supporting the tracking and prevention of pneumonia caused by the novel coronavirus with the help', 'author' => null, 'downlaodpdf' => 'https://www.mediafire.com/file/461cs5zihgj7paf/Big_Data_to_fight_novel_Coronavirus.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 48 => object(Cake\ORM\Entity) { 'tag' => 'IT, Mobile & Computers', 'keyword' => 'IT-Mobile-Computers', 'id' => (int) 3610, 'title' => 'Card details of Indians up for sale on Dark Net', 'description' => '<p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Issue</strong></span></span></p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"> A Singapore-based cybersecurity company has revealed that about 98% of credit card and debit card details that is being sold on Dark Net is that of Indians.</span></span></p> <p style="margin-right:0in"> </p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Background</strong></span></span></p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">In October 2019, Group-IB Threat Intelligence team had detected the first such database of over 1.3 million credit and debit card records, mostly of Indian customers.</span></span></p> <p style="margin-right:0in"> </p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Details</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The stash of 4,61,976 card payment details went up for sale on Joker’s Stash, one of the most secretive portals on the dark net for buying such information. </span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The company has also observed that the data is suspected to have been collected from phishing rackets, which are on the rise in India over the last few years.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The underground market value of the database is estimated at more than $4.2 million. The source of this batch currently remains unknown.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">In the current case is pertaining to so-called fullz, which have info on card number, expiration date, CVV/CVC, cardholder name as well as some extra personal info. Such type of data is likely to have been compromised online with the use of phishing, malware, or <strong>JS-sniffers</strong>.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">JavaScript or JS-Sniffers are programmes used for stealing credit and debit card information from e-commerce websites, and are among the latest concerns when it comes to cybersecurity and theft of sensitive card details.</span></span></p> </li> </ul> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Dark Net</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Dark Net (or Darknet, synonymous with dark web) is the part of the Internet below the private deep web[1] that uses custom software and hidden networks superimposed on the architecture of the Internet.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Types of dark webs include friend-to-friend networks (usually used for file sharing with a peer-to-peer connection) and privacy networks such as Tor.</span></span></p> </li> </ul> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'card-details-of-indians-up-for-sale-on-dark-net', 'image' => 'https://www.mediafire.com/convkey/bf3c/zwtthy66bq372of6g.jpg', 'fbimage' => 'https://www.mediafire.com/convkey/bf3c/zwtthy66bq372of6g.jpg', 'metatitle' => 'Card details of Indians up for sale on Dark Net', 'metakeyword' => 'Card details of Indians up for sale on Dark Net', 'metadescription' => 'A Singapore-based cybersecurity company has revealed that about 98% of credit card and debit card details that is being sold on Dark Net is that of Indians.', 'author' => null, 'downlaodpdf' => 'https://www.mediafire.com/file/0wuf2qwgv0tvg13/Card_details_of_Indians_up_for_sale_on_Dark_Net.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 49 => object(Cake\ORM\Entity) { 'tag' => 'IT, Mobile & Computers', 'keyword' => 'IT-Mobile-Computers', 'id' => (int) 3651, 'title' => 'Variants of Ransomware attacks', 'description' => '<p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Issue</strong></span></span></p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">There are three main modes of distribution for the major ransomware families that are set to increase their attacks this year, security researchers warned on the occasion of Safer Internet<strong> </strong>Day.</span></span></p> <p style="margin-right:0in"> </p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Background</strong></span></span></p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The research highlights how ransomware tries to slip unnoticed past security controls by abusing trusted and legitimate processes, and then harnesses internal systems to encrypt the maximum number of files and disable back-up and recovery processes before an IT security team catches up.</span></span></p> <p style="margin-right:0in"> </p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Details</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Ransomware that spread by replicating itself is called a ‘cryptoworm’. The WannaCry attack that caused damage worldwide in 2017 is an example of this kind of ransomware.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">These malware also spread as ransomware-as-a-service (RaaS), which are sold on the dark web as a distribution kit (for example, Sodinokibi).</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The third most common way of their spread is as automated active adversary attack, where attackers manually deploy the ransomware following an automated scan of networks for systems with weak protection.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Everything is designed to avoid detection while the malware encrypts as many documents as possible as quickly as possible and makes it hard to recover the data.</span></span></p> </li> </ul> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>How to protect our system from ransomware?</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Have a list of all devices connected to your network and that any security software you use on them is up to date to detect.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Keep regular back-ups of your most important and current data on an offline storage device as this is the best way to avoid having to pay a ransom when affected by ransomware.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Administrators should enable multi-factor authentication on all management systems that support it, to prevent attackers disabling security products during an attack.</span></span></p> </li> </ul> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'variants-of-ransomware-attacks', 'image' => 'https://www.mediafire.com/convkey/4485/pjxvcbroleyaxse6g.jpg', 'fbimage' => 'https://www.mediafire.com/convkey/4485/pjxvcbroleyaxse6g.jpg', 'metatitle' => 'Variants of Ransomware attacks | Ransomware attacks', 'metakeyword' => 'Variants of Ransomware attacks, Ransomware attacks', 'metadescription' => 'There are three main modes of distribution for the major ransomware families that are set to increase their attacks this year, security researchers warned', 'author' => null, 'downlaodpdf' => 'https://www.mediafire.com/file/kk3hkmz9wc3bwoj/Variants_of_Ransomware_attacks.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 50 => object(Cake\ORM\Entity) { 'tag' => 'IT, Mobile & Computers', 'keyword' => 'IT-Mobile-Computers', 'id' => (int) 3729, 'title' => 'EU’s data strategy', 'description' => '<p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Issue</strong></span></span></p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The European Commission has released a ‘European strategy for data to ensure the human-centric development of Artificial Intelligence’ and a white paper on artificial intelligence.</span></span></p> <p style="margin-right:0in"> </p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Background</strong></span></span></p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The new documents present a timeline for various projects, legislative frameworks, and initiatives by the European Union, and represent its recognition that it is slipping behind American and Chinese innovation.</span></span></p> <p style="margin-right:0in"> </p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Details</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The strategy lays out “why the EU should act now”. The blueprint hopes to strengthen Europe’s local technology market by creating a “data single market” by 2030 to allow the free flow of data within the EU.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">To aid a “data-agile economy”, the Commission hopes to implement an enabling legislative framework for the governance of common European data spaces by the latter half of the year.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Between 2021 and 2027, the Commission will invest in a High Impact Project to jump-start data infrastructure. Several other initiatives are laid out, including a cloud services marketplace.</span></span></p> </li> </ul> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Reason for the policy</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The EU has the potential to be successful in the data-agile economy. It has the technology, the know-how and a highly skilled workforce. However, competitors such as China and the US are already innovating quickly and projecting their concepts of data access and use across the globe.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">With American and Chinese companies taking the lead on technological innovation, Europe is keen to up its own competitiveness.</span></span></p> </li> </ul> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Indian context</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The Economic Survey of 2018 envisioned a similar use of non-personal data. Just as the EU’s strategy discusses “data for public good”, the chapter titled “Data ‘Of the People, By the People, For the People’” advocated that the government step in to sectors that private players ignore, marking the first time India’s Economic Survey has isolated “data” as a strategic focus.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Other data integration efforts have been announced or implemented by NITI Aayog (the National Data & Analytics Platform), the Smart Cities Mission (India Urban Data Exchange), and the Ministry of Rural Development (DISHA dashboard). </span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">In 2018, the National Informatics Centre worked with PwC and other vendors to create a Centre of Excellence for Data Analytics aimed at providing data analysis help to government departments.</span></span></p> </li> </ul> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'eu-data-strategy', 'image' => 'https://www.mediafire.com/convkey/adc6/5tyl4cg2f7huoxh6g.jpg', 'fbimage' => 'https://www.mediafire.com/convkey/adc6/5tyl4cg2f7huoxh6g.jpg', 'metatitle' => 'EU’s data strategy | European Commission', 'metakeyword' => 'EU’s data strategy, European Commission', 'metadescription' => 'The European Commission has released a ‘European strategy for data to ensure the human-centric development of Artificial Intelligence’ and a white paper on artificial intelligence.', 'author' => null, 'downlaodpdf' => 'https://www.mediafire.com/file/g21alucxf43l9ds/EU%C6s_data_strategy.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 51 => object(Cake\ORM\Entity) { 'tag' => 'IT, Mobile & Computers', 'keyword' => 'IT-Mobile-Computers', 'id' => (int) 3738, 'title' => 'Deepfakes enter Indian election', 'description' => '<p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Issue</strong></span></span></p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">A day before Delhi elections, two videos of a political party president of Delhi unit urging citizens to vote for the party, in english and haryanvi, were sent to 15 million voters via 5800 WhatsApp groups. The videos were deepfakes, digital media firm <em>Vice</em> reported.</span></span></p> <p style="margin-right:0in"> </p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Background</strong></span></span></p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Advances in Artificial Intelligence (AI) and Machine Learning (ML) have enabled computer systems to create synthetic videos, a.k.a. deepfakes.</span></span></p> <p style="margin-right:0in"> </p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Details</strong></span></span></p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Deepfakes</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">A deepfake video can show a person saying or doing something that they never said or did. An AI algorithm is taught, using deep learning, to manipulate actual video and audio to mislead viewers.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Deepfake online videos are burgeoning as tools and applications to make fictional content gets cheaper, lowering barriers for non-experts to make them.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">One of the ways to make deepfake videos involve encoding, decoding, and face-swapping. First, an AI encoder runs several face shots of two persons. </span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Then, the encoder learns of similarities in the faces and compresses the images.<br /> As the faces are different, one AI decoder picks the first person’s face, and another decoder picks the second person’s face. </span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Then, the encoded images are fed into the "wrong" decoder to perform the face swap. This process is done on every frame to make a convincing video.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">In certain other cases, the AI is trained to create new images and videos from scratch using Generative Adversarial Network (GAN).</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">GAN, with the help of Machine Learning, makes two neural networks to contest against each other in a game with a given training set. This helps generate new data and output related to the training set.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Previously, a deepfake video by Future Advocacy showed UK's Prime Minister Boris Johnson and Labour leader Jeremy Corbyn endorsing each other. The think-tank's video was posted in an attempt to show the potential of deepfakes in undermining democracy.</span></span></p> </li> </ul> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'deepfakes-enter-indian-election', 'image' => 'https://www.mediafire.com/convkey/fe97/v814lh1wqrdi9ql6g.jpg', 'fbimage' => 'https://www.mediafire.com/convkey/fe97/v814lh1wqrdi9ql6g.jpg', 'metatitle' => 'Deepfakes enter Indian election', 'metakeyword' => 'Deepfakes enter Indian election', 'metadescription' => 'A day before Delhi elections, two videos of a political party president of Delhi unit urging citizens to vote for the party, in english and haryanvi, were sent to 15 million voters via 5800', 'author' => null, 'downlaodpdf' => 'https://www.mediafire.com/file/m76riqef2wb1a3x/Deepfakes_enter_Indian_election.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 52 => object(Cake\ORM\Entity) { 'tag' => 'IT, Mobile & Computers', 'keyword' => 'IT-Mobile-Computers', 'id' => (int) 3768, 'title' => 'Bug that helps hackers to impersonate', 'description' => '<p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Issue</strong></span></span></p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Researchers have found a serious vulnerability in LTE/4G mobile communication standard that can help hackers impersonate other phone users like taking a streaming service subscription at your expense or publish secret company documents under someone else’s identity.</span></span></p> <p style="margin-right:0in"> </p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Background</strong></span></span></p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The vulnerability, which affects virtually all mobile phones, tablets and some connected household appliances, may also hamper investigations of law enforcement agencies because attackers can not only make purchases in the victim’s name but also access websites using the victim’s identity.</span></span></p> <p style="margin-right:0in"> </p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Details</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Mobile network operators would have to accept higher costs, as the additional protection generates more data during the transmission. In addition, all mobile phones would have to be replaced and the base station expanded.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The problem is the lack of integrity protection: data packets are transmitted encrypted between the mobile phone and the base station, which protects the data against eavesdropping.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">By provoking errors like changing bits from 0 to 1 or from 1 to 0 in the encrypted data packets, the researchers can make a mobile phone and the base station decrypt or encrypt messages.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">They not only can convert the encrypted data traffic between the mobile phone and the base station into plain text, but also send commands to the mobile phone, which are then encrypted and forwarded to the provider, such as a purchase command for a subscription.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The hackers trick the mobile phone to assume that the software-defined radio is the benign base station and to the real network, in turn, it looks as if the software-defined radio was the mobile phone.</span></span></p> </li> </ul> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'bug-that-helps-hackers-to-impersonate', 'image' => 'https://www.mediafire.com/convkey/5a54/c00kuxnq4pwo1006g.jpg', 'fbimage' => 'https://www.mediafire.com/convkey/5a54/c00kuxnq4pwo1006g.jpg', 'metatitle' => 'Bug that helps hackers to impersonate', 'metakeyword' => 'Bug that helps hackers to impersonate', 'metadescription' => 'Researchers have found a serious vulnerability in LTE/4G mobile communication standard that can help hackers impersonate other phone users like taking a streaming service subscription', 'author' => null, 'downlaodpdf' => 'https://www.mediafire.com/file/737tilejychb00i/Bug_that_helps_hackers_to_impersonate.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 53 => object(Cake\ORM\Entity) { 'tag' => 'IT, Mobile & Computers', 'keyword' => 'IT-Mobile-Computers', 'id' => (int) 3776, 'title' => 'Xiaomi introduces NAVIC technology in phones', 'description' => '<p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Issue</strong></span></span></p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Smartphone and smart TV brand Xiaomi has announced it would bring ISROs Indian Regional Navigation Satellite System NavIC technology to its smartphones.</span></span></p> <p style="margin-right:0in"> </p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Background</strong></span></span></p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Navigation with Indian Constellation (NavIC) is the regional geo-positioning system designed in the country by the city-headquartered Indian Space Research Organisation (ISRO) to provide accurate positioning in India and 1500 km around the Indian mainland.</span></span></p> <p style="margin-right:0in"> </p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Details</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The capability has been currently enabled by Qualcomm Technologies Inc on several of their Qualcomm Snapdragon Mobile Platforms and will be made available across multiple Xiaomi smartphones in India.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Some of the key consumer applications of NavIC for mobile include precise location mapping in remote, difficult to access areas, precise timing, along with visual and voice navigation for drivers among others.</span></span></p> </li> </ul> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>NAVIC</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The Indian Regional Navigation Satellite System (IRNSS), with an operational name of NAVIC<a href="https://en.wikipedia.org/wiki/Indian_Regional_Navigation_Satellite_System#cite_note-3">]</a> is an autonomous regional satellite navigation system that provides accurate real-time positioning and timing services. </span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">It covers India and a region extending <strong>1,500 km</strong> around it, with plans for further extension. The system currently consists of a constellation of <strong>seven</strong> <strong>satellites</strong>, with two additional satellites on ground as stand-by.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">NAVIC will provide two levels of service, the "standard positioning service", which will be open for civilian use, and a "restricted service" (an encrypted one) for authorised users (including the military).</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The constellation consists of 7 active satellites. <strong>Three</strong> of the seven satellites in constellation are located in <strong>geostationary orbit</strong> (GEO) and <strong>four</strong> in inclined <strong>geosynchronous orbit</strong> (IGSO).</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The system was developed partly because access to foreign government-controlled global navigation satellite systems is not guaranteed in hostile situations, as happened to the Indian military in 1999 when it was dependent on the American Global Positioning System (GPS) during the Kargil War.</span></span></p> </li> </ul> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Other navigational satellite systems</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Global Positioning System (GPS): USA</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Galileo: European Union</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">QZSS: Japan</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">BeiDou: China</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">GLONASS: Russia</span></span></p> </li> </ul> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'xiaomi-introduces-navic-technology-in-phones', 'image' => 'https://www.mediafire.com/convkey/0ee9/aidfszar58p35sx6g.jpg', 'fbimage' => 'https://www.mediafire.com/convkey/0ee9/aidfszar58p35sx6g.jpg', 'metatitle' => 'Xiaomi introduces NAVIC technology in phones', 'metakeyword' => 'Xiaomi introduces NAVIC technology in phones', 'metadescription' => 'Smartphone and smart TV brand Xiaomi has announced it would bring ISROs Indian Regional Navigation Satellite System NavIC technology to its smartphones.', 'author' => null, 'downlaodpdf' => 'https://www.mediafire.com/file/jw5f1b0czyrdnhb/Xiaomi_introduces_NAVIC_technology_in_phones.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 54 => object(Cake\ORM\Entity) { 'tag' => 'IT, Mobile & Computers', 'keyword' => 'IT-Mobile-Computers', 'id' => (int) 3779, 'title' => 'Swarm robots can help control self-driving cars', 'description' => '<p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Issue</strong></span></span></p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">To help make self-driving vehicles safer and more flawless, the researchers have developed a decentralised algorithm with a collision-free, deadlock-free guarantee.</span></span></p> <p style="margin-right:0in"> </p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Background</strong></span></span></p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The researchers at Northwestern University in the US, tested the algorithm in a simulation of 1,024 robots and on a swarm of 100 real robots in the laboratory.</span></span></p> <p style="margin-right:0in"> </p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Details</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">By understanding how to control swarm robots to form shapes, we can understand how to control fleets of autonomous vehicles as they interact with each other.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The advantage of a swarm of small robots versus one large robot or a swarm with one lead robot is the lack of a centralised control, which can quickly become a central point of failure. Rubenstein’s decentralised algorithm acts as a fail-safe.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">In a decentralised system, there is no leader telling all the other robots what to do. Each robot makes its own decisions. If one robot fails in a swarm, the swarm can still accomplish the task.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The robots need to coordinate in order to avoid collisions and deadlock. To do this, the algorithm views the ground beneath the robots as a grid. By using technology similar to GPS, each robot is aware of where it sits on the grid.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Before making a decision about where to move, each robot uses sensors to communicate with its neighbours, determining whether or not nearby spaces within the grid are vacant or occupied.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The robots refuse to move to a spot until that spot is free and until they know that no other robots are moving to that same spot, they are careful and reserve a space ahead of time.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">In Rubenstein’s swarm, for example, 100 robots can coordinate to form a shape within a minute. In some previous approaches, it could take a full hour.The algorithm could be used in fleets of driverless cars and in automated warehouse.</span></span></p> </li> </ul> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'swarm-robots-can-help-control-self-driving-cars', 'image' => 'https://www.mediafire.com/convkey/1e9c/vyv90n68wrdf60x6g.jpg', 'fbimage' => 'https://www.mediafire.com/convkey/1e9c/vyv90n68wrdf60x6g.jpg', 'metatitle' => 'Swarm robots can help control self-driving cars', 'metakeyword' => 'Swarm robots can help control self-driving cars', 'metadescription' => 'To help make self-driving vehicles safer and more flawless, the researchers have developed a decentralised algorithm with a collision-free, deadlock-free guarantee.', 'author' => null, 'downlaodpdf' => 'https://www.mediafire.com/file/3ihy1zemleqe1c4/Swarm_robots_can_help_control_self-driving_cars.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 55 => object(Cake\ORM\Entity) { 'tag' => 'IT, Mobile & Computers', 'keyword' => 'IT-Mobile-Computers', 'id' => (int) 3839, 'title' => 'Vulnerability in devices', 'description' => '<p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Issue</strong></span></span></p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">ESET, a Slovak cybersecurity firm, has for the last one year been working in collaboration with manufacturers of two specific WiFi chips, which were found to have been vulnerable to attack by hostile parties.</span></span></p> <p style="margin-right:0in"> </p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Background</strong></span></span></p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Users having certain devices such as Amazon kindle, Echo or other handsets are vulnerable to hack as there is a chance that their device has been accessed or taken over by hackers, thanks to a recently discovered vulnerability in the WiFi chips used in these devices.</span></span></p> <p style="margin-right:0in"> </p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Details</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The vulnerability named <strong>Kr00k</strong> was discovered while the firm was conducting research into KRACK, a series of attacks on WiFi devices that was detected last year. </span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">In subsequent investigations, ESET discovered that WiFI chips manufactured by Broadcom ad Cypress had the Kr00k vulnerability. </span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Chips from both these companies have a high market share and are used in a wide range of WiFi-enabled devices.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The devices that tested positive for the vulnerability include the Amazon Echo (2nd generation), Amazon Kindle (8th generation), Apple iPad mini 2, Apple iPhone 6, 6s, 8 and XR, Apple MacBook Air Retina 13-inch 2018, Google Nexus 5, 6, and 6s, Raspberry Pi 3, Samsung Galaxy S4 GT-19505, Samsung Galaxy S8 and Xiaomi Redmi 3s, as well as some WiFi access points by Huawei and Asus.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Any device with a WiFi chip manufactured by these two companies is vulnerable to attack, as long as the device is connected to a WiFi network and the hacker is within the range of the same network.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Once a hacker gets access to any device for even a short period of time, they can do anything, including planting a malware or intercepting sensitive information that is being sent or received via the internet.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The Slovak firm states that the Kr00k vulnerability is triggered when the device in question experiences a disconnection with the network, called a “dissociation” in technical terms. The more concerning factor is that a dissociation can also be triggered manually.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">It is only a matter of sending a high energy pulse to the server, which can cause a temporary dissociation, while the user thinks that this happened due to a weak signal.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">A suitably designed malware can easily find its way to the user’s online storage space, like the Cloud, after which multiple possibilities, including data theft and financial crimes open up.</span></span></p> </li> </ul> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'vulnerability-in-devices', 'image' => 'https://www.mediafire.com/convkey/7226/gm22ey6mhoqbcfb6g.jpg', 'fbimage' => 'https://www.mediafire.com/convkey/7226/gm22ey6mhoqbcfb6g.jpg', 'metatitle' => 'Vulnerability in devices', 'metakeyword' => 'Vulnerability in devices', 'metadescription' => 'ESET, a Slovak cybersecurity firm, has for the last one year been working in collaboration with manufacturers of two specific WiFi chips, which were found to have been vulnerable', 'author' => null, 'downlaodpdf' => 'https://www.mediafire.com/file/2ar7chy5weajym7/Vulnerability_in_devices.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 56 => object(Cake\ORM\Entity) { 'tag' => 'IT, Mobile & Computers', 'keyword' => 'IT-Mobile-Computers', 'id' => (int) 3859, 'title' => 'Mac-binding', 'description' => '<p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Issue</strong></span></span></p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">After seven months, the use of social media was allowed in Jammu and Kashmir with rules for the use of Internet. Among various conditions, internet connectivity will be made available with “mac-binding”.</span></span></p> <p style="margin-right:0in"> </p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Background</strong></span></span></p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The easing of restrictions came after the Supreme Court on January 10 asked for a review of all orders suspending Internet services forthwith.</span></span></p> <p style="margin-right:0in"> </p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Details</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Every device has a Media Access Control (MAC) address, a hardware identification number that is unique to it. While accessing the Internet, every device is assigned an IP address.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Mac-binding essentially means binding together the MAC and IP addresses, so that all requests from that IP address are served only by the computer having that particular MAC address.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">In effect, it means that if the IP address or the MAC address changes, the device can no longer access the Internet. Also, monitoring authorities can trace the specific system from which a particular online activity was carried out.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Internet speed in Jammu and Kashmir is still restricted to 2G. This means very slow services, pictures will take a long time to be sent or downloaded, videos will be nearly impossible to share, and there will be a long loading time for most websites.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The Internet can be accessed on all postpaid devices, and those using Local Area Networks (LAN). While the postpaid SIM card holders shall continue to be provided access to the Internet, these services shall not be made available on prepaid SIM cards unless verified as per the norms applicable for postpaid connections.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">It also means that although in theory, the “whitelist system”, where people could only access some websites pre-approved by the government, has been removed, some sites designed for a 4G Internet experience will hardly work.</span></span></p> </li> </ul> <p style="margin-right:0in"> </p> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'mac-binding', 'image' => 'https://www.mediafire.com/convkey/0a6e/ldfnxo0x24h602j6g.jpg', 'fbimage' => 'https://www.mediafire.com/convkey/0a6e/ldfnxo0x24h602j6g.jpg', 'metatitle' => 'Mac-binding | MAC and IP addresses', 'metakeyword' => 'Mac-binding | MAC and IP addresses', 'metadescription' => 'After seven months, the use of social media was allowed in Jammu and Kashmir with rules for the use of Internet. Among various conditions, internet connectivity will be made available ', 'author' => null, 'downlaodpdf' => 'https://www.mediafire.com/file/enk1hntprk1iakn/Mac-binding.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 57 => object(Cake\ORM\Entity) { 'tag' => 'IT, Mobile & Computers', 'keyword' => 'IT-Mobile-Computers', 'id' => (int) 3903, 'title' => 'Cars vulnerable to hackers', 'description' => '<p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Issue</strong></span></span></p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">A joint study conducted by a group of researchers describes how electronic key-fobs used to lock and unlock cars can be hacked by cyber criminals with surprising ease, and how millions of cars are at risk.</span></span></p> <p style="margin-right:0in"> </p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Background</strong></span></span></p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Over the past few years, owners of cars with keyless start systems have learned to worry about so-called relay attacks, in which hackers exploit radio-enabled keys to <a href="https://www.wired.com/2017/04/just-pair-11-radio-gadgets-can-steal-car/">steal vehicles without leaving a trace</a>.</span></span></p> <p style="margin-right:0in"> </p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Details</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The key-fob, or immobiliser, enables the user of a vehicle to lock or unlock their car with the touch of a button. The system was invented to control car thefts, which are traditionally executed by touching certain wires in the ignition together, known as “hot-wiring” a car, which starts the ignition without a key.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">All a hacker has to do is to use a Radio Frequency Identification device within close range of a key-fob, which exploits the vulnerability in the immobiliser system and downloads its secret code to the hacker’s device. </span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Using this information, the hackers can clone the target’s key-fob, use it to unlock the car and drive away without raising any alarm. </span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The only challenge that remains after hacking the key-fob is to override the ignition, but car thieves had surpassed that hurdle way back when they invented hot-wiring.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The car models named in the report include Auris, Camry, Corolla, FJ Cruiser, Fortuner, Hiace, highlander, hilux, Land Cruiser, RAV4, Urban Cruiser and Yaris by Toyota and I-10, I-20, Veloster, IX20 and I-40 by Hyundai.</span></span></p> </li> </ul> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'cars-vulnerable-to-hackers', 'image' => 'https://www.mediafire.com/convkey/a961/y6mnsc77wq1e0lr6g.jpg', 'fbimage' => 'https://www.mediafire.com/convkey/a961/y6mnsc77wq1e0lr6g.jpg', 'metatitle' => 'Cars vulnerable to hackers', 'metakeyword' => 'Cars vulnerable to hackers', 'metadescription' => 'A joint study conducted by a group of researchers describes how electronic key-fobs used to lock and unlock cars can be hacked by cyber criminals with surprising ease,', 'author' => null, 'downlaodpdf' => 'https://www.mediafire.com/file/0zx4cqlujo1ip46/Cars_vulnerable_to_hackers.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 58 => object(Cake\ORM\Entity) { 'tag' => 'IT, Mobile & Computers', 'keyword' => 'IT-Mobile-Computers', 'id' => (int) 4156, 'title' => 'Tracker to track tiny animals', 'description' => '<p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Issue</strong></span></span></p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Researchers have created a tracker that will record the activities of tiny or small animals that fly around and crowd together in caves and hollow trees.</span></span></p> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Background</strong></span></span></p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The wireless network developed by researchers contains functions similar to what we find in our smartphones - such as motion detection and Bluetooth-style connectivity - at a fraction of the weight and energy consumption.</span></span></p> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Details</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">This observation is made possible by attaching little backpacks to the animals with glue. These high-tech backpacks, which can communicate with each other and ground-based receivers, provided data for the popular study published in 2019 showing that vampire bats developed social bonds in captivity that they also maintained in the wild.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Keeping the system automated and lightweight was critical to the success of the network to track adult vampire bats, which weigh between 1 and 1.5 ounces and grow to 3 and half inches in length.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Using devices that can track larger animals, such as those incorporated into harnesses or necklaces, wouldn’t work for bats or other small species.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The sensors often get scratched off in the bats’ roost in about two weeks. The researchers retrieve them if they can to recycle the backpacks and recharge and reuse the batteries.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Though the study describes the complexity of constructing the network and testing its effectiveness on bats, the system would work for other animals, such as birds, rodents, reptiles and amphibians.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The network consists of the tiny computers - accelerometers producing data when the bats are moving and proximity sensors to show when they are close to each other - all encased in each 3D-printed plastic backpack that weighs less than a penny.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">A series of base stations on the ground pick up signals and record data on bats’ social activities and flight trajectories. The components are asleep most of the time, waking up when they receive a signal from another bat and then broadcasting every two seconds.</span></span></p> </li> <li> <p><span style="font-size:11.0pt"><span style="font-family:"Calibri","sans-serif"">Despite the low power, the network produced robust results in various studies of different species of bats. A two-week test in which 50 vampire bats were tagged produced data on almost 400,000 individual meetings.</span></span></p> </li> </ul> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'tracker-to-track-tiny-animals', 'image' => 'https://www.mediafire.com/convkey/6307/ng77qdvwum3u9y46g.jpg', 'fbimage' => 'https://www.mediafire.com/convkey/6307/ng77qdvwum3u9y46g.jpg', 'metatitle' => 'Tracker to track tiny animals', 'metakeyword' => 'Tracker to track tiny animals', 'metadescription' => 'Researchers have created a tracker that will record the activities of tiny or small animals that fly around and crowd together in caves and hollow trees.', 'author' => null, 'downlaodpdf' => 'http://www.mediafire.com/file/7h3pnwjdgxc2dva/5.Tracker_to_track_tiny_animals.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 59 => object(Cake\ORM\Entity) { 'tag' => 'IT, Mobile & Computers', 'keyword' => 'IT-Mobile-Computers', 'id' => (int) 4226, 'title' => 'Contact tracing technology', 'description' => '<p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Issue</strong></span></span></p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Global technology giants Apple and Google have announced that they are partnering on developing contact tracing technology to help governments and health authorities tackle the novel coronavirus pandemic.</span></span></p> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Background</strong></span></span></p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The tech companies announced that they would build a comprehensive solution that includes application programming interfaces (APIs) and operating system-level technology to assist in enabling contact tracing.</span></span></p> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Details</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Contact tracing is considered essential for bringing epidemics under control, and is expected to help governments in relaxing lockdown orders. Via contact tracing, people who have come into contact with a person carrying a disease are alerted and identified.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The World Health Organization (WHO) defines contact tracing as the process of identifying, assessing, and managing people who have been exposed to a disease to prevent onward transmission.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Identifying people at the onset of symptoms and promptly isolating them reduces exposure to other persons, preventing subsequent infections. </span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Additionally, prompt isolation and admission of the symptomatic person to a treatment facility decreases the delay to supportive treatment, which improves the likelihood of survival.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">By May, both companies will release application programming interfaces (APIs) that would enable interoperability between Android and iOS devices using apps from public health authorities.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">When this step is realised, phone-based matching via official apps will help alert people if they have come in contact with someone diagnosed with COVID-19.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">For this to work, COVID-19 patients would have to declare their status to the respective apps voluntarily. Following this, all people whose Android/iOS smartphones were detected nearby such patients, would get notified. This means, you will be notified even if you were around a stranger who has tested positive for the disease.</span></span></p> </li> <li> <p><span style="font-size:11.0pt"><span style="font-family:"Calibri","sans-serif"">In the second step, Bluetooth-based contact tracing will be built into the Android and iOS platforms, and users would be able to use the feature without downloading an app.</span></span></p> </li> </ul> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'contact-tracing-technology', 'image' => 'https://www.mediafire.com/convkey/4555/97smzh50e6tklxt6g.jpg', 'fbimage' => 'https://www.mediafire.com/convkey/4555/97smzh50e6tklxt6g.jpg', 'metatitle' => 'Contact tracing technology', 'metakeyword' => 'Contact tracing technology', 'metadescription' => 'Global technology giants Apple and Google have announced that they are partnering on developing contact tracing technology to help governments and health authorities tackle', 'author' => null, 'downlaodpdf' => 'http://www.mediafire.com/file/xn0fvp0m383yvwx/4.Contact_tracing_technology.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 60 => object(Cake\ORM\Entity) { 'tag' => 'IT, Mobile & Computers', 'keyword' => 'IT-Mobile-Computers', 'id' => (int) 4315, 'title' => 'Fake vaccines and drugs up for sale on dark web', 'description' => '<p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Issue</strong></span></span></p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Cybersecurity researchers have discovered several marketplaces on the dark web where some of the so-called cures, including fake covid-19 vaccines, are up for sale.</span></span></p> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Background</strong></span></span></p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The covid-19 pandemic has created a gold mine for cybercriminals trying to woo unsuspecting buyers with so-called cures and preventive medicines that actually are just anything from amphetamines to marijuana.</span></span></p> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Details</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Most of these scams are done through social media platforms and blogs, and were initially targeted at European internet users.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Users who visit these platforms either end up spending on a product that will never be delivered or, worse, download malicious software that can track their activities and steal personal information such as passwords.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Experts have also found instances of covid-19 home testing kits being sold illegally. Some marketplaces on the dark web have restricted the sale of fake vaccines for covid-19 on their platforms and disabled malicious users.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The new internet population of users is particularly vulnerable to these requests especially as they come embedded in authentic stories.</span></span></p> </li> </ul> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Dark web</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The dark web is the World Wide Web content that exists on darknets, overlay networks that use the internet but require specific software, configurations, or authorization to access, making it easier for users to hide their identities. As such, these become an ideal hunting ground for criminals.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The darknets which constitute the dark web include small, friend-to-friend peer-to-peer networks, as well as large, popular networks such as Tor, Freenet, I2P, and Riffle operated by public organizations and individuals.</span></span></p> </li> <li> <p><span style="font-size:11.0pt"><span style="font-family:"Calibri","sans-serif"">Due to the high level of encryption, websites are not able to track geolocation and IP of their users, and users are not able to get this information about the host. Thus, communication between darknet users is highly encrypted allowing users to talk, blog, and share files confidentially.</span></span></p> </li> </ul> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'fake-vaccines-and-drugs-up-for-sale-on-dark-web', 'image' => 'https://www.mediafire.com/convkey/ee93/zq38tpnwguqy3y16g.jpg', 'fbimage' => 'https://www.mediafire.com/convkey/ee93/zq38tpnwguqy3y16g.jpg', 'metatitle' => 'Fake vaccines and drugs up for sale on dark web', 'metakeyword' => 'Fake vaccines and drugs up for sale on dark web', 'metadescription' => 'Cybersecurity researchers have discovered several marketplaces on the dark web where some of the so-called cures, including fake covid-19 vaccines, are up for sale.', 'author' => null, 'downlaodpdf' => 'http://www.mediafire.com/file/w4l6zd4vcphwj4x/3.Fake_vaccines_and.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 61 => object(Cake\ORM\Entity) { 'tag' => 'IT, Mobile & Computers', 'keyword' => 'IT-Mobile-Computers', 'id' => (int) 4505, 'title' => 'Mobile app to predict COVID-19', 'description' => '<p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Issue</strong></span></span></p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"> A multinational collaboration, the Coronavirus Pandemic Epidemiology (COPE), has developed a COVID-19 Symptom Tracker mobile app. The mobile app allows for epidemiologic data collection and analysis.</span></span></p> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Background</strong></span></span></p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Not only do incidence, disease severity and outcomes vary with age, sex and underlying conditions, even symptoms vary widely. Even as <a href="https://www.thehindu.com/coronavirus/">COVID-19</a> has spread to over 200 countries and infected over 3.5 million people, the full spectrum of clinical presentation is yet to be characterised in the general patient population, leave alone patient subgroups.</span></span></p> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Details</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The COVID-19 Symptom Tracker enables people to self-report data related to novel coronavirus exposure, symptoms and infections.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Over the first five days of use has confirmed the variability of symptoms in people with suspected infection. The most common symptoms were found to be fatigue and cough, followed by diarrhoea, fever and loss of smell. Shortness of breath was relatively rarely reported.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The researchers subsequently developed a weighted prediction model based on the symptoms of more than two million individuals who used the app. </span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">They found that the app can predict the dynamics of COVID-19 incidence a few days in advance of traditional measures, such as positive tests, hospitalisations or mortality.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Based on the predictive value of the app, the researchers are planning to validate the symptom-based modelling of COVID-19 incidence by carrying out additional studies using representative sample of individuals who will undergo uniform COVID-19 testing.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Among those who got themselves tested, it became possible to know which symptoms commonly lead to testing, and which symptoms better correlated with a positive test result.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">For instance, while cough and fatigue did lead people to get themselves tested, the symptoms do not seem to be particularly suggestive of an infection as revealed by the test results. Similarly, nobody who had diarrhoea alone tested positive.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">But people who had cough and/or fatigue and at least one additional symptom, including diarrhoea and loss of smell, were more likely to test positive, the researchers found.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">They found that loss of smell was a more sensitive symptom that even fever. But a greater number of people with a fever tested positive when fever was accompanied by other symptoms.</span></span></p> </li> <li> <p><span style="font-size:11.0pt"><span style="font-family:"Calibri","sans-serif"">These findings suggest that individuals with complex or multiple (three or more) symptomatic presentation perhaps should be prioritised for testing.</span></span></p> </li> </ul> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'mobile-app-to-predict-covid-19', 'image' => 'https://www.mediafire.com/convkey/8b85/binyzwrs23mlccj6g.jpg', 'fbimage' => 'https://www.mediafire.com/convkey/8b85/binyzwrs23mlccj6g.jpg', 'metatitle' => 'Mobile app to predict COVID-19', 'metakeyword' => 'Mobile app to predict COVID-19', 'metadescription' => ' A multinational collaboration, the Coronavirus Pandemic Epidemiology (COPE), has developed a COVID-19 Symptom Tracker mobile app. The mobile app allows for epidemiologic data', 'author' => null, 'downlaodpdf' => 'http://www.mediafire.com/file/yqfj80jffoy8ijr/3.Mobile_app_to_predict_COVID-19.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 62 => object(Cake\ORM\Entity) { 'tag' => 'IT, Mobile & Computers', 'keyword' => 'IT-Mobile-Computers', 'id' => (int) 5114, 'title' => 'Google to invest $10 billion in India', 'description' => '<p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Issue</strong></span></span></p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Tech-giant Google has announced plans to invest $10 billion in India over the next 5-7 years by way of equity investments, partnerships and other arrangements to “accelerate digitisation” in the country.</span></span></p> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Background</strong></span></span></p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The announcement assumes particular significance given the gap in the country’s tech investment ecosystem following the government’s clampdown on Chinese technology firms.</span></span></p> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Details</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Google said its $10-billion fund would focus on areas such as enabling affordable access to the Internet and to information for every Indian in their own language.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">It will also include building new products and services in segments like consumer tech, education, health, and agriculture; empowering businesses, especially small and medium ones, to transform digitally; leveraging technology and artificial intelligence for digital literacy, outbreak predictions, and support for rural economies.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">These investments will be made through a mix of equity investments, partnerships, operations, infrastructure, and ecosystem investments. </span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">These include Google’s existing projects such as Internet Saathi for spreading awareness of the Internet in rural villages and an artificial intelligence-based flood forecasting system, among others.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Big technology companies like Google, Facebook, Netflix and Twitter are, in any case, prohibited from doing business in China. </span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Potential hurdles for Chinese companies investing in India could provide better prospects for American giants to strengthen their position in a market which has the second-most Internet users in the world.</span></span></p> </li> </ul> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>International investment scenario in India</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Google’s investment plan is in line with big-tech’s bullish outlook on India. Earlier this year, Amazon said it would invest an additional $1 billion in India. </span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">This was followed by a marquee investment announcement of $5.7 billion by Facebook in the country’s largest telecom company Reliance Jio. </span></span></p> </li> <li> <p><span style="font-size:11.0pt"><span style="font-family:"Calibri","sans-serif"">Last month, Microsoft’s venture fund M12 said it would open an office in India to pursue investment opportunities focusing on B2B software start-ups.</span></span></p> </li> </ul> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'google-to-invest-10-billion-dollar-in-india', 'image' => 'https://www.mediafire.com/convkey/c245/32b6b7owpbmnvmx6g.jpg', 'fbimage' => 'https://www.mediafire.com/convkey/c245/32b6b7owpbmnvmx6g.jpg', 'metatitle' => 'Google to invest $10 billion in India', 'metakeyword' => 'Google to invest $10 billion in India', 'metadescription' => 'Tech-giant Google has announced plans to invest $10 billion in India over the next 5-7 years by way of equity investments, partnerships and other arrangements', 'author' => null, 'downlaodpdf' => 'http://www.mediafire.com/file/q1h0uvxkma137h6/4.Google_to_invest_%252410_billion_in_India.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 63 => object(Cake\ORM\Entity) { 'tag' => 'IT, Mobile & Computers', 'keyword' => 'IT-Mobile-Computers', 'id' => (int) 5121, 'title' => 'Non-personal data', 'description' => '<p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Issue</strong></span></span></p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">A government committee headed by Infosys co-founder <strong>Kris Gopalakrishnan </strong>has suggested that non-personal data generated in the country be allowed to be harnessed by various domestic companies and entities. </span></span></p> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Background</strong></span></span></p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">It has also suggested setting up of a new authority that would be empowered to monitor the use and mining of such non-personal data.</span></span></p> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Details</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Non-personal data is any set of data which does not contain personally identifiable information. This in essence means that no individual or living person can be identified by looking at such data.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">For example, while order details collected by a food delivery service will have the name, age, gender, and other contact information of an individual, it will become non-personal data if the identifiers such as name and contact information are taken out.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The government committee has classified non-personal data into three main categories, namely public non-personal data, community non-personal data and private non-personal data.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Depending on the source of the data and whether it is anonymised in a way that no individual can be re-identified from the data set, the three categories have been divided.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">All the data collected by the government and its agencies such as census, data collected by municipal corporations on the total tax receipts in a particular period or any information collected during execution of all publicly funded works has been kept under the umbrella of public non-personal data.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Any data identifiers about a set of people who have either the same geographic location, religion, job, or other common social interests will form the community non-personal data. </span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Private non-personal data can be defined as those which are produced by individuals which can be derived from the application of proprietary software or knowledge.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">However, in certain categories such as data related to national security or strategic interests such as locations of government laboratories or research facilities, even if provided in anonymised form can be dangerous.</span></span></p> </li> </ul> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Way ahead</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Though the non-personal data draft is a pioneer in identifying the power, role, and usage of anonymised data, there are certain aspects such as community non-personal data, where the draft could have been clearer.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Experts also believe that the final draft of the non-personal data governance framework must clearly define the roles for all participants, such as the data principal, the data custodian, and data trustees.</span></span></p> </li> <li> <p><span style="font-size:11.0pt"><span style="font-family:"Calibri","sans-serif"">Regulation must be clear, and concise to provide certainty to its market participants, and must demarcate roles and responsibilities of participants in the regulatory framework.</span></span></p> </li> </ul> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'non-personal-data', 'image' => '', 'fbimage' => '', 'metatitle' => 'Non-personal data', 'metakeyword' => 'Non-personal data', 'metadescription' => 'A government committee headed by Infosys co-founder Kris Gopalakrishnan has suggested that non-personal data generated in the country be allowed to be harnessed', 'author' => null, 'downlaodpdf' => '', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 64 => object(Cake\ORM\Entity) { 'tag' => 'IT, Mobile & Computers', 'keyword' => 'IT-Mobile-Computers', 'id' => (int) 5164, 'title' => 'BlackRock Android malware', 'description' => '<p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Issue</strong></span></span></p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Security firm ThreatFabric has alerted about a new malware, called BlackRock, which can steal information like passwords and credit card information from smartphone applications, including Amazon, Facebook, Gmail and Tinder.</span></span></p> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Background</strong></span></span></p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">BlackRock isn’t a new malware. In fact, it is based on the leaked source code of the Xeres malware, itself derived from a malware called LokiBot. The only big difference between BlackRock and other Android banking trojans is that it can target more apps than previous malware.</span></span></p> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Details</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">BlackRock works like most Android malware. Once installed on a phone, it monitors the targeted app. When the user enters the login and/or credit card details, the malware sends the information to a server. </span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">BlackRock uses the phone’s Accessibility feature and then uses an Android DPC (device policy controller) to provide access to other permissions.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">When the malware is first launched on the device, it hides its icon from the app drawer, making it invisible to the end-user. It then asks for accessibility service privileges. </span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Once this privilege is granted, BlackRock grants itself additional permissions required to fully function without having to interact any further with the victim.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">BlackRock isn’t limited to online banking apps and targets general-purpose apps across various categories of Books & Reference, Business, Communication, Dating, Entertainment, Lifestyle, Music & Audio, News & Magazine, Tools, and Video Players & Editors.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">ThreatFabric says the malware can be used to send and steal SMS messages, hide notifications, keylogging, AV detection, and much more.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The new malware is so powerful that it makes antivirus applications useless. The Trojan will redirect the victim to the HOME screen of the device if the victim tries to start or use antivirus software as per a specific list including Avast, AVG, Bitdefender, ESET, Symantec, Trend Micro, Kaspersky, McAfee, Avira etc.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Right now, the trojan is yet to be spotted on Google Play Store and is distributed as a fake Google Update on third-party stores.</span></span></p> </li> <li> <p><span style="font-size:11.0pt"><span style="font-family:"Calibri","sans-serif"">Best way to protect is to download apps only from the Google Play Stores, use strong passwords, beware of spam and phishing emails, use an antivirus app if possible, and check app permissions.</span></span></p> </li> </ul> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'blackRock-android-malware', 'image' => 'https://www.mediafire.com/convkey/7b10/2c4io9jxnkarj0b6g.jpg', 'fbimage' => 'https://www.mediafire.com/convkey/7b10/2c4io9jxnkarj0b6g.jpg', 'metatitle' => 'BlackRock Android malware', 'metakeyword' => 'BlackRock Android malware', 'metadescription' => 'Security firm ThreatFabric has alerted about a new malware, called BlackRock, which can steal information like passwords and credit card information from', 'author' => null, 'downlaodpdf' => 'http://www.mediafire.com/file/6kni995hnkznuff/4.BlackRock_Android_malware.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 65 => object(Cake\ORM\Entity) { 'tag' => 'IT, Mobile & Computers', 'keyword' => 'IT-Mobile-Computers', 'id' => (int) 5241, 'title' => 'Spyware and stalkerware increasing during pandemic', 'description' => '<p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Issue</strong></span></span></p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Global cyber-security leader Avast has warned that there was a 51 percent increase in the use of spyware and stalkerware during the lockdown period from March to June. </span></span></p> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Details</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Spy and stalkerware apps, like viruses and other malware, infect devices that are connected to the internet. While viruses and malware can be detected by anti-virus software, spyware and stalkerware apps disguise themselves as useful and send out stolen data to central servers without the knowledge of the users.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Ironically, most spyware and stalkerware apps disguise themselves as anti-theft applications that can be used to track in case the device is stolen or gets lost, cyber-security experts warn.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">A spyware app, which can also be installed remotely, accesses the data usage pattern of the device, gains access to photos and videos as well as other personal information of the user, and then passes it off to a central server.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">On the other hand, a stalkerware app can be installed only when someone has physical access to the digitally connected device. </span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Though the app works in a manner similar to spyware apps, it goes a step ahead and also gives out the location of the device to a master device which controls the stalkerware app.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Most stalkerware apps work in stealth mode with no trace of the app having ever been installed. Once installed, such apps can allow the master device to control, intercept, and even change your emails, text messages and your communication on social media platforms.</span></span></p> </li> <li> <p><span style="font-size:11.0pt"><span style="font-family:"Calibri","sans-serif"">Stalkerware apps seek explicit permissions at the time of their installation. Once the app is installed in the phone, it can be hidden from the apps menu into the background, from where they continue functioning.</span></span></p> </li> </ul> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'spyware-and-stalkerware-increasing-during-pandemic', 'image' => 'https://www.mediafire.com/convkey/4499/e8rock8h4omd7e46g.jpg', 'fbimage' => 'https://www.mediafire.com/convkey/4499/e8rock8h4omd7e46g.jpg', 'metatitle' => 'Spyware and stalkerware increasing during pandemic', 'metakeyword' => 'Spyware and stalkerware increasing during pandemic', 'metadescription' => 'Global cyber-security leader Avast has warned that there was a 51 percent increase in the use of spyware and stalkerware during the lockdown period from March', 'author' => null, 'downlaodpdf' => 'https://www.mediafire.com/file/9ibyxunyaa7dh6j/1.Spyware+and+stalkerware+increasing+during+pandemic.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 66 => object(Cake\ORM\Entity) { 'tag' => 'IT, Mobile & Computers', 'keyword' => 'IT-Mobile-Computers', 'id' => (int) 5155, 'title' => 'Fake social media accounts business', 'description' => '<p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Issue</strong></span></span></p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The Mumbai Police earlier this week arrested a 20-year-old man for allegedly creating a fake profile of Bollywood playback singer Bhoomi Trivedi. </span></span></p> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Background</strong></span></span></p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The interrogation of the accused revealed that there are several such companies that sell followers and ‘likes’ on social media.</span></span></p> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Details</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Purported chat logs of a fake Instagram account created under the name of Bhoomi Trivedi that purported to show her in apparent negotiations for purchasing fake followers to lure more people to purchase followers.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">It has revealed during investigation that there is a racket to create crores of fake identities on various social media platforms, and thereby produce fake performance statistics such as followers, comments, and views — all fake. </span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Accused had created more than 5 lakh fake followers for a total of 176 profiles on Instagram, TikTok, and Facebook, etc., in order to fraudulently project these profiles as those of ‘influencers’.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">A research had found that the top three markets with the largest numbers of fake accounts were the United States (49 million), Brazil (27 million), and India (16 million). </span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The researchers spoke to around 400 influencers, 60 percent of whom confirmed that they had bought followers, likes, or comments at some point.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Apart from just social media influencers whose high follower count could make them hot property for brand promotions online, services of these fake accounts or bots (software application that imitates human behaviour) are suspected to be used by political parties, celebrities, and in film promotions.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">These companies use fake accounts to start trending a particular hashtag, for example, a movie’s name before the release date. </span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">This is going to be a challenge for the police since the use of these services is so widespread. Police have estimated that there are more than 100 such as Social Media Marketing (SMM) portals that provide fake followers.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">In the absence of a specific law, police can take recourse to Section 468 of the Indian Penal Code, which deals with committing forgery of a document or electronic record for the purposes of cheating.</span></span></p> </li> <li> <p><span style="font-size:11.0pt"><span style="font-family:"Calibri","sans-serif"">Social media platforms like Instagram have in the past deleted accounts that they suspected were using third-party apps to increase their follower count.</span></span></p> </li> </ul> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'fake-social-media-accounts-business', 'image' => 'https://www.mediafire.com/convkey/1dc9/i9kaax6texc5qbz6g.jpg', 'fbimage' => 'https://www.mediafire.com/convkey/1dc9/i9kaax6texc5qbz6g.jpg', 'metatitle' => 'Fake social media accounts business', 'metakeyword' => 'Fake social media accounts business', 'metadescription' => 'The Mumbai Police earlier this week arrested a 20-year-old man for allegedly creating a fake profile of Bollywood playback singer Bhoomi Trivedi. ', 'author' => null, 'downlaodpdf' => 'https://www.mediafire.com/file/pyfv031ysd11fps/5.Fake+social+media+accounts+business.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 67 => object(Cake\ORM\Entity) { 'tag' => 'IT, Mobile & Computers', 'keyword' => 'IT-Mobile-Computers', 'id' => (int) 5499, 'title' => 'Super apps', 'description' => '<p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Issue</strong></span></span></p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Conglomerate Tata Group is planning to launch an all-in-one super app by the end of this year or early next year.</span></span></p> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Background</strong></span></span></p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The digital platform is expected to bring together all the consumer-facing businesses of the group and is likely to be developed by the newly formed entity Tata Digital.</span></span></p> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Details</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">A super app is a platform developed by a company offering various services under one umbrella. For example, China’s WeChat, which started out as a messaging app, expanded into payments, cabs, shopping, food ordering, cab services to become a super app. </span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">A physical world comparison of a super app would be a mall, which allows retail space to various brands and shops across businesses and verticals.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The concept first emerged in China and Southeast Asia where internet companies like WeChat, GoJek, Grab leveraged the opportunity of customer traffic on their platforms that originally came for social media and communication.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The plan of Tatas to get into aggregating its consumer offerings aligns more with firms in the Gulf region than the technology companies in China and Southeast Asia.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Currently, Reliance Industries, under its Jio umbrella, is consolidated various services and offerings such as shopping, content streaming, groceries, payments, cloud storage services, ticket bookings, etc.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Further, Alibaba Group investee Paytm has also brought together services like payments, ticket bookings, games, online shopping, banking, consumer finance, etc into one app. </span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Flipkart Group-owned payments app PhonePe has tied up with companies such as Ola Cabs, Swiggy, Grofers, AJio, Decathlon, Delhi Metro, booking.com, etc to offer these services from within its own app.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">A country or a region becomes super app-ready when its large base of the population use smartphone first instead of desktop and the ecosystem of apps customised to local needs is not evolved.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">India has already become a market where a majority of those experiencing the internet for the first time are doing so on their mobile phones. This is one of the main reasons why Indian companies are looking at building super apps.</span></span></p> </li> <li> <p><span style="font-size:11.0pt"><span style="font-family:"Calibri","sans-serif"">The very concept of a conglomerate trying to keep a customer within its own ecosystem for most services they might require increases the possibility of a monopoly.</span></span></p> </li> </ul> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'super-apps', 'image' => 'https://www.mediafire.com/convkey/b349/fqpbl174avu54py6g.jpg', 'fbimage' => 'https://www.mediafire.com/convkey/b349/fqpbl174avu54py6g.jpg', 'metatitle' => 'Super apps', 'metakeyword' => 'Super apps', 'metadescription' => 'The digital platform is expected to bring together all the consumer-facing businesses of the group and is likely to be developed by the newly formed entity Tata', 'author' => null, 'downlaodpdf' => 'http://www.mediafire.com/file/kxtkoidyst50yne/1.Super+apps.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 68 => object(Cake\ORM\Entity) { 'tag' => 'IT, Mobile & Computers', 'keyword' => 'IT-Mobile-Computers', 'id' => (int) 5780, 'title' => 'IBM to build qubit system', 'description' => '<p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Issue</strong></span></span></p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">IBM has said it will build Quantum Condor, a 1121 qubit quantum computer, by the end of 2023. The company claims the system can control behaviour of atoms to run applications, and generate world-changing materials to transform industries. </span></span></p> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Background</strong></span></span></p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Quantum computers will likely deliver tremendous speed, and will help in solving problems related to optimisation in defence, finance, and other industries.</span></span></p> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Details</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">IBM says its full-stack quantum computer can be deployed via cloud, and that it can be programmed from any part of the world.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The technology company is developing a “super-fridge,” internally codenamed “Goldeneye,” to house the computer. The 10-foot-tall and 6-foot-wide refrigerator is being designed for a million-qubit system.</span></span></p> </li> </ul> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Quantum Computing</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Quantum computers process data exponentially faster than personal computers do. They deploy non-intuitive methods, coupled with lots of computing, to solve intractable problems. These machines operate using qubits, similar to bits in personal computers.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">A classical computer tries solving a problem intuitively. If they are given a command, they attempt every possible move, one after another, turning back at dead ends, until they find a solution.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Quantum computers deploy ‘superposition’ to solve problems. This allows them to exist in multiple states, and test all possible ways at once. And qubits, the fundamental units of data in quantum computing, enables these machines to compute this way.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">In regular computers, bits have either 0 or 1 value, and they come in four possible combinations - - 00, 01, 10, 11. Only one combination can exist at a single point of time, which limits processing speed.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">But, in quantum machines, two qubits can represent same values, and all four can exist at the same time. This helps these systems to run faster.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">An ordinary 64-bit computer would take hundred years to cycle through these combinations. And that’s exactly why quantum computers are being built: to solve intractable problems and break-down theories that are practically impossible for classical computers.</span></span></p> </li> </ul> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Challenges in Quantum computing</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">One of the key challenges for processing in qubits is the possibility of losing data during transition. Additionally, assembling qubits, writing and reading information from them is a difficult task.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The fundamental units demand special attention, including a perfect isolation and a thermostat set of one hundredth of a degree above absolute zero. </span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Despite strict monitoring, due to their highly sensitive nature, they can lose superposition even from a slightest variation. This makes programming very tricky.</span></span></p> </li> <li> <p><span style="font-size:11.0pt"><span style="font-family:"Calibri","sans-serif"">Since quantum computers are programmed using a sequence of logic gates of various kinds, programmes need to run quickly before qubits lose coherence. The combination of superposition and entanglement makes this process a whole lot harder.</span></span></p> </li> </ul> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'ibm-to-build-qubit-system', 'image' => 'https://www.mediafire.com/convkey/9515/dv4ghykgfpihde96g.jpg', 'fbimage' => 'https://www.mediafire.com/convkey/9515/dv4ghykgfpihde96g.jpg', 'metatitle' => 'IBM to build qubit system', 'metakeyword' => 'IBM to build qubit system', 'metadescription' => 'IBM has said it will build Quantum Condor, a 1121 qubit quantum computer, by the end of 2023. The company claims the system can control behaviour of atoms', 'author' => null, 'downlaodpdf' => 'http://www.mediafire.com/file/sv6iibtoda9oibi/IBM_to_build_qubit_system.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 69 => object(Cake\ORM\Entity) { 'tag' => 'IT, Mobile & Computers', 'keyword' => 'IT-Mobile-Computers', 'id' => (int) 6392, 'title' => 'Prefixing 0 mandatory for landline to mobile calls', 'description' => '<p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Issue</strong></span></span></p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The department of telecommunications (DoT) has made it mandatory to prefix 0 for all calls made from fixed lines to mobiles, effective 15 January.</span></span></p> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Background</strong></span></span></p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The Telecom Regulatory Authority of India’s (TRAI) had in May recommended a '0' prefix for all such calls to create sufficient numbering space for telecom service providers.</span></span></p> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Details</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Dialling “0” mobile phone numbers was a practice followed by outstation callers. This was avoided after government allowed inter-circle mobile number portability.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">India has 10 digits mobile numbering plan with “0” and “1” reserved for special purposes. This means that effectively 800 crore combination of mobile numbers are possible.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The numbers in “9” series have all been used. To distinguish these mobile numbers from certain landline numbers having 10 digits code, prefixing has been made compulsory.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">TRAI has also recommended that all 10 digit numbering code to be shifted to 13 digit code for M2M communication.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The decision to add prefix will not only clear the overlap between landline and mobile number carrying the same series but also free up numbering resources for mobile phones in future.</span></span></p> </li> </ul> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>TRAI</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The Telecom Regulatory Authority of India (TRAI) is a statutory body set up by the Government of India under section 3 of the Telecom Regulatory Authority of India Act, 1997. It is the regulator of the telecommunications sector in India.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">It consists of a Chairperson and not more than two full-time members and not more than two part-time members. </span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The TRAI Act was amended by an ordinance, effective from 24 January 2000, establishing a Telecom Disputes Settlement and Appellate Tribunal (TDSAT) to take over the adjudicatory and disputes functions from TRAI.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">One of its main objectives is to provide a fair and transparent environment that promotes a level playing field and facilitates fair competition in the market. </span></span></p> </li> <li> <p><span style="font-size:11.0pt"><span style="font-family:"Calibri","sans-serif"">TRAI regularly issues orders and directions on various subjects such as tariffs, interconnections, quality of service, Direct To Home (DTH) services, and mobile number portability.</span></span></p> </li> </ul> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'prefixing-0-mandatory-for-landline-to-mobile-calls', 'image' => 'http://www.mediafire.com/convkey/0a30/djgul4dhjtbxhsn6g.jpg', 'fbimage' => 'http://www.mediafire.com/convkey/0a30/djgul4dhjtbxhsn6g.jpg', 'metatitle' => 'Prefixing 0 mandatory for landline to mobile calls', 'metakeyword' => 'Prefixing 0 mandatory for landline to mobile calls', 'metadescription' => 'The Telecom Regulatory Authority of India’s (TRAI) had in May recommended a '0' prefix for all such calls to create sufficient numbering space for telecom service', 'author' => null, 'downlaodpdf' => 'http://www.mediafire.com/file/tzgt8tx1i91kocc/5.Prefixing_0_mandatory_for_landline_to_mobile_calls_%25281%2529.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 70 => object(Cake\ORM\Entity) { 'tag' => 'IT, Mobile & Computers', 'keyword' => 'IT-Mobile-Computers', 'id' => (int) 6182, 'title' => 'Artificial Intelligence help predict mouth cancer risk', 'description' => '<p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Issue</strong></span></span></p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Artificial intelligence (AI) and machine learning may help doctors better predict the risk of patients developing oral cancer by ensuring accuracy, consistency, and objectivity.</span></span></p> <p style="margin-right:0in"> </p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Background</strong></span></span></p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Oral cancer is often detected late which means that the patient survival rates are poor. The new development seeks to reverse the trend.</span></span></p> <p style="margin-right:0in"> </p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Details</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The rate of people being diagnosed with oral cancers including mouth, tongue, tonsil, and oropharyngeal cancer, has increased by almost 60% in the last 10 years.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Evidence suggests tobacco and alcohol consumption, viruses, old age as well as not eating enough fruit and vegetables can increase the risk of developing the disease.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Currently, doctors must predict the likelihood of pre-cancerous changes, known as oral epithelial dysplasia (OED), developing into cancer by assessing a patient’s biopsy on 15 different criteria to establish a score. </span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">This score then determines whether action is needed and what treatment pathway should be taken. However, this score is subjective, which means there are often huge variations in how patients with similar biopsy results are treated.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Correct grading is vital in early oral cancer detection to inform treatment decisions, enabling a surgeon to determine whether a lesion should be monitored or surgically removed.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Machine learning and AI can aid tissue diagnostics by removing subjectivity, using automation, and quantification to guide diagnosis and treatment.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">These algorithms will aid pathologists in their assessment of biopsies helping them to make a more informed and unbiased decision about the grading of the cells and the patient’s treatment pathway.</span></span></p> </li> </ul> <p style="margin-right:0in"> </p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Artificial Intelligence (AI)</strong></span></span></p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Artificial intelligence (AI) refers to the simulation of human intelligence in machines that are programmed to think like humans and mimic their actions.</span></span></p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The ideal characteristic of artificial intelligence is its ability to rationalize and take actions that have the best chance of achieving a specific goal.</span></span></p> <p style="margin-right:0in"> </p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Applications of AI</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">AI is being tested and used in the healthcare industry for dosing drugs and different treatment in patients, and for surgical procedures in the operating room.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Examples of machines with artificial intelligence include computers that play chess and self-driving cars. Each of these machines must weigh the consequences of any action they take, as each action will impact the end result. </span></span></p> </li> <li> <p><span style="font-size:11.0pt"><span style="font-family:"Calibri","sans-serif"">Artificial intelligence also has applications in the financial industry, where it is used to detect and flag activity in banking and finance such as unusual debit card usage and large account deposits.</span></span></p> </li> </ul> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'artificial-intelligence-help-predict-mouth-cancer-risk', 'image' => 'http://www.mediafire.com/convkey/1e26/px9rstiwqad0bms6g.jpg', 'fbimage' => 'http://www.mediafire.com/convkey/1e26/px9rstiwqad0bms6g.jpg', 'metatitle' => 'Artificial Intelligence help predict mouth cancer risk', 'metakeyword' => 'Artificial Intelligence help predict mouth cancer risk', 'metadescription' => 'Artificial intelligence (AI) and machine learning may help doctors better predict the risk of patients developing oral cancer by ensuring accuracy, consistency,', 'author' => null, 'downlaodpdf' => 'http://www.mediafire.com/file/jky0b9nnc9pp0xf/1.Artificial_Intelligence_help_predict_mouth_cancer_risk.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 71 => object(Cake\ORM\Entity) { 'tag' => 'IT, Mobile & Computers', 'keyword' => 'IT-Mobile-Computers', 'id' => (int) 6605, 'title' => 'Bitcoin', 'description' => '<p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Issue</strong></span></span></p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Bitcoin has passed the $20,000 mark against the US dollar after increase in its demand surged the prices to all time high in international markets.</span></span></p> <p style="margin-right:0in"> </p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Details</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Bitcoin from a user’s perspective is nothing more than a mobile app or computer program that provides a personal Bitcoin wallet and allows a user to send and receive Bitcoins with them.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">A person or a group of people, known by the identity of Satoshi Nakamoto are said to have conceptualised an accounting system in the aftermath of the 2008 financial crisis.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Bitcoins are generally identified with a Bitcoin address, which comprises 26-35 alphanumeric characters starting with either “1” or “3”. This address, which remains anonymous, represents the destination of a Bitcoin.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Originally, the Bitcoin was intended to provide an alternative to fiat money and become a universally accepted medium of exchange directly between two involved parties.</span></span></p> </li> </ul> <p style="margin-right:0in"> </p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Acquiring bitcoin</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">One can either mine a new Bitcoin if they have the computing capacity, purchase them via exchanges, or acquire them in over-the-counter, person-to-person transactions.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Miners are the people who validate a Bitcoin transaction and secure the network with their hardware. The Bitcoin protocol is designed in such a way that new bitcoins are created at a fixed rate.</span></span></p> </li> </ul> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Reasons for rise in prices</strong></span></span></p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The prices have been driven by various factors, including increased acceptance during the pandemic. Globally, large players like payments firm PayPal, and Indian lenders like State Bank of India, ICICI Bank, HDFC Bank and Yes Bank, have given legitimacy to cryptocurrency through some of their decisions.</span></span></p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Regulating bitcoin</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">If the cryptocurrency is regulated, it could result in the reduction in volatality, and its acceptability and monetisation needs easing up.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">However, given that Bitcoin was intended to come across as a global decentralised currency, any central authority regulating it would effectively defeat that purpose.</span></span></p> </li> </ul> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'bitcoin', 'image' => 'https://www.mediafire.com/convkey/c970/50r7enmasdly6bz6g.jpg', 'fbimage' => 'https://www.mediafire.com/convkey/c970/50r7enmasdly6bz6g.jpg', 'metatitle' => 'Bitcoin | Acquiring bitcoin | Regulating bitcoin ', 'metakeyword' => 'Bitcoin | Regulating bitcoin , Acquiring bitcoin', 'metadescription' => 'Bitcoin has passed the $20,000 mark against the US dollar after increase in its demand surged the prices to all time high in international markets.', 'author' => null, 'downlaodpdf' => 'https://www.mediafire.com/file/5iw88qlc1203j17/3.Bitcoin.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 72 => object(Cake\ORM\Entity) { 'tag' => 'IT, Mobile & Computers', 'keyword' => 'IT-Mobile-Computers', 'id' => (int) 6882, 'title' => '5G technology', 'description' => '<p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Issue</strong></span></span></p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The Department of Telecommunications (DoT) has sought inputs from telcos and other industry experts on the sale and use of radio frequency spectrum over the next 10 years, including the 5G bands.</span></span></p> <p style="margin-right:0in"> </p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Background</strong></span></span></p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">5G or fifth generation is the latest upgrade in the long-term evolution (LTE) mobile broadband networks.</span></span></p> <p style="margin-right:0in"> </p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Details</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">5G mainly works in 3 bands, namely low, mid and high frequency spectrum — all of which have their own uses as well as limitations.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">While the low band spectrum has shown great promise in terms of coverage and speed of internet and data exchange, the maximum speed is limited to 100 Mbps (Megabits per second). </span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The mid-band spectrum, on the other hand, offers higher speeds compared to the low band, but has limitations in terms of coverage area and penetration of signals. </span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Telcos and companies have indicated that this band may be used by industries and specialised factory units for building captive networks that can be moulded into the needs of that particular industry.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The high-band spectrum offers the highest speed of all the three bands, but has extremely limited coverage and signal penetration strength. Internet speeds in the high-band spectrum of 5G has been tested to be as high as 20 Gbps.</span></span></p> </li> </ul> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Advantages of 5G technology</strong></span></span></p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The main advantages of the 5G are a greater speed in the transmissions, a lower latency and therefore greater capacity of remote execution, a greater number of connected devices and the possibility of implementing virtual networks (network slicing).</span></span></p> <p style="margin-right:0in"> </p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>India’s 5G progress</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">India had planned to start 5G services with an aim to capitalise on the better network speeds and strength that the technology promised.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">One big hurdle is the lack of flow of cash and adequate capital with at least two of the three players, namely Bharti Airtel and Vodafone Idea.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Reliance Jio plans to launch an indigenously built 5G network for the country as early as the second half of this year. </span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The company is said to have a complete end-to-end 5G solution prepared by the company itself that is ready for deployment once the networks are in place. </span></span></p> </li> </ul> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Global 5G rollout</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Global telecom companies have started building 5G networks and rolling it out to their customers on a trial basis.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">In countries such as China, some of the telcos had started 5G trials as early as 2018, and have since rolled out the commercial services for users.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">South Korean giant Samsung has taken the lead when it comes to building the hardware for 5G networks for several companies.</span></span></p> </li> </ul> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => '5g-technology', 'image' => 'https://www.mediafire.com/convkey/358f/7e3oo7mse3urc7f6g.jpg', 'fbimage' => 'https://www.mediafire.com/convkey/358f/7e3oo7mse3urc7f6g.jpg', 'metatitle' => '5G technology | Global 5G rollout', 'metakeyword' => '5G technology, Global 5G rollout', 'metadescription' => 'The Department of Telecommunications (DoT) has sought inputs from telcos and other industry experts on the sale and use of radio frequency spectrum over the next 10 years, including the 5G bands.', 'author' => null, 'downlaodpdf' => 'https://www.mediafire.com/file/d2q7a9r7p9epvnw/3.5G+technology.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 73 => object(Cake\ORM\Entity) { 'tag' => 'IT, Mobile & Computers', 'keyword' => 'IT-Mobile-Computers', 'id' => (int) 6910, 'title' => 'Blue tick verification', 'description' => '<p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Issue</strong></span></span></p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Twitter accounts to get the coveted blue tick verification will be based on three factors--Authentic, notable and active.</span></span></p> <p style="margin-right:0in"> </p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Background</strong></span></span></p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The process of blue tick verification will reopen January 22, 2021. It was paused since November 2017.</span></span></p> <p style="margin-right:0in"> </p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Details</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Twitter stopped verifications on November 16, 2017, stating that the blue badge had caused a perception problem for them. </span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The verification mark was seen as an endorsement of some individuals by Twitter, which was not necessarily the case.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Twitter will have a new self-serve application process, available on the web and in-app. Users will be able to apply themselves to get verified. </span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">They will have to choose a category for their verification status. They will have to share some links and other supporting materials to boost their cause in order to get the tick.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Twitter will use both automated and human review to handle the applications for verifications. It also said it will give users the option to share demographic information after completing the new verification application.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">As part of the new policy, Twitter will begin automatically removing the verified badge from inactive and incomplete accounts.</span></span></p> </li> </ul> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Criteria for blue-tick verification</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Twitter uses a mix of internal signals to evaluate the authenticity of a given account’s followers and engagement count.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">They also assess a range of signals associated with third-party public resources submitted in support of applications for verification to detect fraudulent submissions.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">They still have the right to deny or revoke verification to any accounts, which met the criteria through artificial or inauthentic activity.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">For an account to be considered active and complete, the user must have a profile name, a profile image. The earlier criterion of the header photo has been done away with.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">A user should have logged into the account in the last six months showing active use in order to qualify for verification. The account must also be secure with a confirmed email address or phone number.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The account must have not have had a 12-hour or 7-day lockout for violating the Twitter Rules in the past six months.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Parody, newsfeed, commentary and fan accounts are not eligible for the blue badge. Twitter also does not verify pet accounts.</span></span></p> </li> </ul> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Category of users to be verified</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Those working in the government, including heads of state, elected officials, ministers, etc.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Well-known companies, brands and organisations</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">News organisations and journalists</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Entertainment</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Sports</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Activists, organisers, and other influential individuals.</span></span></p> </li> </ul> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'blue-tick-verification', 'image' => 'https://www.mediafire.com/convkey/f9bf/zvzpmqvupyw4cgj6g.jpg', 'fbimage' => 'https://www.mediafire.com/convkey/f9bf/zvzpmqvupyw4cgj6g.jpg', 'metatitle' => 'Blue tick verification | Blue tick', 'metakeyword' => 'Blue tick verification', 'metadescription' => 'Twitter accounts to get the coveted blue tick verification will be based on three factors--Authentic, notable and active.', 'author' => null, 'downlaodpdf' => 'https://www.mediafire.com/file/svi0foesyopndna/2.Blue+tick+verification.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 74 => object(Cake\ORM\Entity) { 'tag' => 'IT, Mobile & Computers', 'keyword' => 'IT-Mobile-Computers', 'id' => (int) 6789, 'title' => 'African elephants surveyed using AI', 'description' => '<p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Issue</strong></span></span></p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">A new approach for surveying African elephants using satellite imagery and artificial intelligence (AI) could help in conservation of the unique species.</span></span></p> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Details</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">A satellite orbiting in space is capable of capturing more than 5,000 square kilometre of imagery in a single run, within minutes. </span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">It not only eliminates the risk of double counting, but also makes it possible to conduct repeat surveys at short intervals.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The captured imagery is processed through a deep learning model to detect elephants. The team used a customised dataset of over 1000 elephants in South Africa, to train the model.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The current techniques used for surveying the elephants like using manned aircraft for aerial counts can be costly, hindered by poor visibility, and logistically challenging.</span></span></p> </li> </ul> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Advantages</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Machines are less prone to error, false negatives, and false positives in deep learning algorithms.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Elephants can be detected in satellite imagery with accuracy as high as human detection capabilities. </span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The model was able to spot elephants in places away from the training data location, and also identify calves even though it was only trained on adults.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The remote detection method makes it possible to monitor cross-border areas without terrestrial permits. These areas are usually important to conservation planning.</span></span></p> </li> </ul> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Deep learning</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Deep learning is an AI function that mimics the workings of the human brain in processing data for use in detecting objects, recognizing speech, translating languages, and making decisions. </span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Deep learning AI is able to learn without human supervision, drawing from data that is both unstructured and unlabeled.</span></span></p> </li> </ul> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Working</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Digital era has brought about an explosion of data in all forms and from every region of the world. This data, known simply as big data, is drawn from sources like social media, internet search engines, e-commerce platforms etc.</span></span></p> </li> <li> <p><span style="font-size:11.0pt"><span style="font-family:"Calibri","sans-serif"">Using the data effectively and identifying the trend shown by the data is very important in analytics. This method is called big data analytics and has become very important in recent times.</span></span></p> </li> </ul> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'african-elephants-surveyed-using-ai', 'image' => 'https://www.mediafire.com/convkey/68ca/xs38stalv1t5ltm6g.jpg', 'fbimage' => 'https://www.mediafire.com/convkey/68ca/xs38stalv1t5ltm6g.jpg', 'metatitle' => 'African elephants surveyed using AI', 'metakeyword' => 'African elephants surveyed using AI', 'metadescription' => 'A new approach for surveying African elephants using satellite imagery and artificial intelligence (AI) could help in conservation of the unique species.', 'author' => null, 'downlaodpdf' => '', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 75 => object(Cake\ORM\Entity) { 'tag' => 'IT, Mobile & Computers', 'keyword' => 'IT-Mobile-Computers', 'id' => (int) 6744, 'title' => 'SolarWinds cyberattacks', 'description' => '<p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Issue</strong></span></span></p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Microsoft has revealed that its internal source code was likely accessed by the attackers during investigation into SolarWinds cyberattack.</span></span></p> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Background</strong></span></span></p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The attack primarily targeted the United States (US) government and several other private organisations. The SolarWinds cyberattack was first revealed in December by cyber-security firm FireEye.</span></span></p> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Details</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Microsoft’s internal security research team has found evidence that the attackers accessed some internal source code in the company’s systems. </span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Microsoft has not confirmed what source code was accessed by the hackers. However, the fact that the hackers got in so deep is quite worrying, given the importance of source code in any piece of software.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Source code is the key to how a software product is built and if compromised could leave it open to new, unknown risks. Hackers could use this information to exploit any potential weakness in the programmes.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Microsoft has said that the attack has not put any risk on its users or customer data. They believe that the act was performed by a powerful state actor.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The company notes that its threat models work on the belief that attackers have knowledge of their source code. </span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Microsoft is downplaying the risk saying just viewing the source code should not cause any new elevated risks.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The problem with this cyberattack is that it has been going on for so long that the full scale remains unknown. </span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">FireEye has revealed new details about the Sunburst malware. The malware exploited the SolarWinds Orion software, which is used by thousands of companies, including several US government agencies.</span></span></p> </li> </ul> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Sunburst</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Sunburst is a malicious version of a digitally signed SolarWinds Orion plugin that contains a backdoor that communicates via HTTP to third-party servers.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">It appears that the plugin remains dormant period of up to two weeks, after which it starts executing commands and carrying out tasks such as transfer of files, execute files, profile the system, reboot the system, and disable system services.</span></span></p> </li> <li> <p><span style="font-size:11.0pt"><span style="font-family:"Calibri","sans-serif"">The malware performs numerous checks to ensure no analysis tools are present. This cautious approach is what helped the malware evade detection by anti-virus software and forensic investigators for seven months after its introduction to the SolarWinds Orion supply chain.</span></span></p> </li> </ul> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'solarwinds-cyberattacks', 'image' => 'https://www.mediafire.com/convkey/cd6a/3g7wq43dl5r02o16g.jpg', 'fbimage' => 'https://www.mediafire.com/convkey/cd6a/3g7wq43dl5r02o16g.jpg', 'metatitle' => 'SolarWinds cyberattacks', 'metakeyword' => 'SolarWinds cyberattacks', 'metadescription' => 'The attack primarily targeted the United States (US) government and several other private organisations. The SolarWinds cyberattack was first revealed', 'author' => null, 'downlaodpdf' => 'https://www.mediafire.com/file/a11lqdyjozhup7i/3._SolarWinds_cyberattacks.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 76 => object(Cake\ORM\Entity) { 'tag' => 'IT, Mobile & Computers', 'keyword' => 'IT-Mobile-Computers', 'id' => (int) 6819, 'title' => 'Parler social network', 'description' => '<p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Issue</strong></span></span></p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Apple, Amazon, and Google have suspended the social network called Parler, saying that the platform has not taken enough measures to make sure that content inciting violence remains in check.</span></span></p> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Background</strong></span></span></p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The move has come following the events of January 6 when an armed mob of Trump supporters stormed Capitol Hill.</span></span></p> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Details</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Parler is a social media platform that is considered to be an alternative to Twitter and is popular with conservatives.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The platform is favoured by right-leaning users and as per media reports was actively used by supporters of US President Donald Trump, including several of those who participated in the Capitol Hill siege.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The suspension means that users can no longer download the app from the Apple app store or the Google play store. Amazon, on the other hand, has suspended the platform from its web-hosting service called Amazon Web Services.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Tech companies such as twitter, facebook, and instagram have suspended US President Trump from their platform.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The moves taken by the tech giants in the last one week have reignited the debate on the power that tech companies have in censoring content.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Others worry that the moves demonstrate how much political power has been built up by a handful of private companies.</span></span></p> </li> </ul> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Web hosting service</strong></span></span></p> <p><span style="font-size:11.0pt"><span style="font-family:"Calibri","sans-serif"">A web hosting service is a mechanism through which companies provide space to websites on a physical server where they can store data and other information necessary for their websites to function.</span></span></p> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'parler-social-network', 'image' => 'https://www.mediafire.com/convkey/b8fc/7t9zat3v1prszhi6g.jpg', 'fbimage' => 'https://www.mediafire.com/convkey/b8fc/7t9zat3v1prszhi6g.jpg', 'metatitle' => 'Parler social network', 'metakeyword' => 'Parler social network | What is Parler social network that Apple, Amazon and Google have suspended | Parler social network sues Amazon for pulling support', 'metadescription' => 'Apple, Amazon, and Google have suspended the social network called Parler, saying that the platform has not taken enough measures to make sure that content', 'author' => null, 'downlaodpdf' => 'https://www.mediafire.com/file/7btl8yme4zvqp7y/3.Parler_social_network.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 77 => object(Cake\ORM\Entity) { 'tag' => 'IT, Mobile & Computers', 'keyword' => 'IT-Mobile-Computers', 'id' => (int) 7051, 'title' => 'Global chipset shortage', 'description' => '<p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Issue</strong></span></span></p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">A global chipset shortage has created panic among the world’s leading automakers, so much so that the companies have been forced to either halt or slow vehicle production.</span></span></p> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Background</strong></span></span></p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">If the ongoing global semiconductor shortage will continue for a few more months, it will hit the carmakers who are already under pressure from regulators to pump more resources into electric vehicles.</span></span></p> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Details</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">All top carmakers from Toyota to Volkswagen, Daimler, and GM are reeling from this global shortage of semiconductors. </span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Like a smartphone, a modern car also uses semiconductors. Analysis suggests that electronics make for 40 percent of a new car’s total cost. </span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Over the past few years, automakers have increasingly become dependent on semiconductors and electronic components. </span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">More cars now have a power steering, tablet-like display, Wi-Fi connectivity and cellular connectivity. </span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">A delay in getting the chips will halt production lines and automakers can’t keep up with a boom in demand.</span></span></p> </li> </ul> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Why shortage?</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Silicon chips are the backbone of the consumer electronics industry. Demand for these sophisticated chips have soared during the pandemic, as consumers bought up laptops, next-gen game consoles like the PlayStation 5 and Xbox Series X, smartphones, and TVs. </span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">When the Covid-19 was its peak, carmakers slashed orders for the chip due to lower than expected sales. </span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">At the same time, chipmakers started diverting attention to meet the growing demand for chips used in the consumer technology space.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Experts have blame automakers and their lack of farsightedness and poor planning for the current situation.</span></span></p> </li> <li> <p><span style="font-size:11.0pt"><span style="font-family:"Calibri","sans-serif"">Global carmakers have been badly affected by the aftermaths of the Covid-19 pandemics, but this continuing critical shortage of semiconductors could potentially derail the chances of them recovering fast.</span></span></p> </li> </ul> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'global-chipset-shortage', 'image' => 'http://www.mediafire.com/convkey/42f2/0spnmhsv6v9kvm36g.jpg', 'fbimage' => 'http://www.mediafire.com/convkey/42f2/0spnmhsv6v9kvm36g.jpg', 'metatitle' => 'Global chipset shortage', 'metakeyword' => 'Global chipset shortage | Why a global chipset shortage is choking top carmakers | Carmakers have been hit hard by a global chip shortage — here’s why', 'metadescription' => 'A global chipset shortage has created panic among the world’s leading automakers, so much so that the companies have been forced to either halt or slow vehicle', 'author' => null, 'downlaodpdf' => 'http://www.mediafire.com/file/199isf6lx8b611q/3._Global_chipset_shortage.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 78 => object(Cake\ORM\Entity) { 'tag' => 'IT, Mobile & Computers', 'keyword' => 'IT-Mobile-Computers', 'id' => (int) 6669, 'title' => 'Instant loan apps case', 'description' => '<p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Issue</strong></span></span></p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">A woman employee of Telangana Agriculture Department and a software engineer died by<strong> </strong>suicide after they were humiliated and blackmailed by tele-callers and recovery agents of a mobile app instant loan company. </span></span></p> <p style="margin-right:0in"> </p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Background</strong></span></span></p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Their personal details were posted by the company on social media and labelled them defaulters and used abusive language.</span></span></p> <p style="margin-right:0in"> </p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Details</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">It is a racket in which instant personal loans are offered through mobile apps at exorbitant interest rates by unauthorised lenders. </span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Of the numerous apps that are available on <a href="https://indianexpress.com/about/google/" style="color:blue; text-decoration:underline">Google</a> PlayStore, most do not have any tie-up with any bank or Non-Banking Financial Institution. </span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">A customer can avail a loan within a few minutes after uploading personal details, three months’ bank statement, Aadhar card copy and PAN card copy on the app. Loans from as less as Rs 1,000 to Rs 50,000 can be availed for seven days.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The lending companies have call centres in Hyderabad and Gurugram from tele-callers and recovery agents interact with burrowers. </span></span></p> </li> </ul> <p style="margin-right:0in"> </p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Mode of operation</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">After a customer downloads an app and uploads the documents demanded, the loan amount is credited into the bank account. </span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The phone numbers of the customer as well as numbers of his family members are shared by the app company with others. </span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">After a customer avails one loan, tele-callers and agents of about 20-30 similar apps call the customers and lure them into availing more loans, saying they are eligible because their credentials have been verified by the company from which they borrowed the first loan.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">While the interest rate is 35 per cent, after the due date, a flat Rs 3,000 penalty per day is levied on the customer. </span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Apart from levying hefty penalties for failure or delay in repayment of loan, the agents use a combination of coercion, blackmail, and threats. </span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The treatment of a customer depends on which bucket the customer is in. Immediately after the due date, a customer will be harassed with dozens of calls. </span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Later abusive calls will be made to family members and threats and blackmail start. Finally, they access the contacts of relatives and friends of the customers and send them WhatsApp messages defaming the defaulter.</span></span></p> </li> </ul> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'instant-loan-apps-case', 'image' => 'http://www.mediafire.com/convkey/eb15/8f3eoz244ke90or6g.jpg', 'fbimage' => 'http://www.mediafire.com/convkey/eb15/8f3eoz244ke90or6g.jpg', 'metatitle' => 'Instant loan apps case | A woman employee of Telangana', 'metakeyword' => 'Instant loan apps case, woman employee of Telangana ', 'metadescription' => 'A woman employee of Telangana Agriculture Department and a software engineer died by suicide after they were humiliated and blackmailed by tele-callers and recovery agents of a mobile app instant loan company. ', 'author' => null, 'downlaodpdf' => 'http://www.mediafire.com/file/2ovzhiuax19swak/2._Instant_loan_apps_case.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 79 => object(Cake\ORM\Entity) { 'tag' => 'IT, Mobile & Computers', 'keyword' => 'IT-Mobile-Computers', 'id' => (int) 6563, 'title' => 'Google outage', 'description' => '<p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Issue</strong></span></span></p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Most Google services, including gmail and Youtube, across the globe suffered a mass outage lasting over an hour on Monday.</span></span></p> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Background</strong></span></span></p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The issue is critical as across the world, businesses and other critical services use free and paid Google products for a host of reasons. </span></span></p> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Details</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Google has attributed the outage to an internal storage quota issue. Services requiring users to log in experienced high error rates during this period.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Google first acknowledged there was an issue in relation to Gmail, and for some time, the status page showed red for most services.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">It is increasingly rare to see an outage that affects all services and users. This is because users, even from a single geography, are hosted over multiple servers across the world. And even on these servers, there are backups that activate quickly if something goes wrong.</span></span></p> </li> </ul> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Significance of such events</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The outage gains importance given that there has been a surge in users across all online services, and certainly in those offered by Google. </span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">There will be questions asked on whether the backend infrastructure of these companies are strong enough to withstand this spike in load, that too over a large period of time. </span></span></p> </li> <li> <p><span style="font-size:11.0pt"><span style="font-family:"Calibri","sans-serif"">Companies that depend on Google for backend services will be worried about the impact of such outage, especially a longer one.</span></span></p> </li> </ul> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'google-outage', 'image' => 'http://www.mediafire.com/convkey/c904/nlk2al5gsemwh9y6g.jpg', 'fbimage' => 'http://www.mediafire.com/convkey/c904/nlk2al5gsemwh9y6g.jpg', 'metatitle' => 'Google outage | Gmail, YouTube Suffer Outages', 'metakeyword' => 'Google outage | Is Google Down | Gmail, YouTube Suffer Outages | Reason behind 45-minute global outage for Gmail, YouTube and other Google services', 'metadescription' => 'Google has attributed the outage to an internal storage quota issue. Services requiring users to log in experienced high error rates during this period.', 'author' => null, 'downlaodpdf' => 'http://www.mediafire.com/file/vsspgmvduns22oj/2.Google_outage.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' } ] $tagname = 'IT, Mobile & Computers' $metadescription = 'IT, Mobile & Computers relative current affairs, Today GK, News, Burning issues, and know what science doing IT, Mobile & Computers fields with complete report' $metakeyword = 'IT, Mobile & Computers relative current affairs, Today GK, News' $title = 'IT, Mobile & Computers relative current affairs, Today GK, News' $sbanners = [ (int) 0 => object(Cake\ORM\Entity) { 'id' => (int) 61, 'bannername' => 'http://www.mediafire.com/convkey/5f54/lodkrbkhwk5lg1q6g.jpg', 'bannerlink' => 'https://studyiq.com/course-details/ssc-bank-combo', 'isright' => (int) 0, 'status' => (int) 1, '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'sitebanners' }, (int) 1 => object(Cake\ORM\Entity) { 'id' => (int) 62, 'bannername' => 'http://www.mediafire.com/convkey/0552/k9b1o467l8edtbc6g.jpg', 'bannerlink' => 'https://studyiq.com/courses/state-exams', 'isright' => (int) 0, 'status' => (int) 1, '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'sitebanners' }, (int) 2 => object(Cake\ORM\Entity) { 'id' => (int) 63, 'bannername' => 'http://www.mediafire.com/convkey/154a/6y1qvv7v118759h6g.jpg', 'bannerlink' => 'https://studyiq.com/course-details/upsc-ias-pre-mains', 'isright' => (int) 0, 'status' => (int) 1, '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'sitebanners' }, (int) 3 => object(Cake\ORM\Entity) { 'id' => (int) 64, 'bannername' => 'http://www.mediafire.com/convkey/563c/o65x6jso51flz886g.jpg', 'bannerlink' => 'https://studyiq.com/courses/upsc/optional-subjects', 'isright' => (int) 0, 'status' => (int) 1, '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'sitebanners' }, (int) 4 => object(Cake\ORM\Entity) { 'id' => (int) 70, 'bannername' => 'http://www.mediafire.com/convkey/23f5/ymfxsytttaix1ls6g.jpg', 'bannerlink' => 'https://www.studyiq.com/mock-test-series-ssc-bank-upsc-clat-kvs-rbi-dsssb-aao/upsc-ias-prelims-test-series-2021', 'isright' => (int) 0, 'status' => (int) 1, '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'sitebanners' } ] $params = [ (int) 0 => 'IT-Mobile-Computers' ] $b = [ 'name' => 'IT, Mobile & Computers', 'link' => 'https://currentaffairs.studyiq.com/tags/IT-Mobile-Computers' ] $currentaffair = object(Cake\ORM\Entity) { 'tag' => 'IT, Mobile & Computers', 'keyword' => 'IT-Mobile-Computers', 'id' => (int) 6563, 'title' => 'Google outage', 'description' => '<p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Issue</strong></span></span></p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Most Google services, including gmail and Youtube, across the globe suffered a mass outage lasting over an hour on Monday.</span></span></p> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Background</strong></span></span></p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The issue is critical as across the world, businesses and other critical services use free and paid Google products for a host of reasons. </span></span></p> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Details</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Google has attributed the outage to an internal storage quota issue. Services requiring users to log in experienced high error rates during this period.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Google first acknowledged there was an issue in relation to Gmail, and for some time, the status page showed red for most services.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">It is increasingly rare to see an outage that affects all services and users. This is because users, even from a single geography, are hosted over multiple servers across the world. And even on these servers, there are backups that activate quickly if something goes wrong.</span></span></p> </li> </ul> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Significance of such events</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The outage gains importance given that there has been a surge in users across all online services, and certainly in those offered by Google. </span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">There will be questions asked on whether the backend infrastructure of these companies are strong enough to withstand this spike in load, that too over a large period of time. </span></span></p> </li> <li> <p><span style="font-size:11.0pt"><span style="font-family:"Calibri","sans-serif"">Companies that depend on Google for backend services will be worried about the impact of such outage, especially a longer one.</span></span></p> </li> </ul> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'google-outage', 'image' => 'http://www.mediafire.com/convkey/c904/nlk2al5gsemwh9y6g.jpg', 'fbimage' => 'http://www.mediafire.com/convkey/c904/nlk2al5gsemwh9y6g.jpg', 'metatitle' => 'Google outage | Gmail, YouTube Suffer Outages', 'metakeyword' => 'Google outage | Is Google Down | Gmail, YouTube Suffer Outages | Reason behind 45-minute global outage for Gmail, YouTube and other Google services', 'metadescription' => 'Google has attributed the outage to an internal storage quota issue. Services requiring users to log in experienced high error rates during this period.', 'author' => null, 'downlaodpdf' => 'http://www.mediafire.com/file/vsspgmvduns22oj/2.Google_outage.pdf/file', '[new]' => false, '[accessible]' => [ '*' => true ], '[dirty]' => [], '[original]' => [], '[virtual]' => [], '[errors]' => [], '[invalid]' => [], '[repository]' => 'currentaffairs' } $tags = '<a href="https://currentaffairs.studyiq.com/tags/IT-Mobile-Computers">IT, Mobile & Computers</a>'
include - ROOT/plugins/Studyiq/src/Template/Pages/tags.ctp, line 64 Cake\View\View::_evaluate() - CORE/src/View/View.php, line 1196 Cake\View\View::_render() - CORE/src/View/View.php, line 1157 Cake\View\View::render() - CORE/src/View/View.php, line 765 Cake\Controller\Controller::render() - CORE/src/Controller/Controller.php, line 623 Cake\Http\ActionDispatcher::_invoke() - CORE/src/Http/ActionDispatcher.php, line 125 Cake\Http\ActionDispatcher::dispatch() - CORE/src/Http/ActionDispatcher.php, line 93 Cake\Http\BaseApplication::__invoke() - CORE/src/Http/BaseApplication.php, line 108 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Routing\Middleware\RoutingMiddleware::__invoke() - CORE/src/Routing/Middleware/RoutingMiddleware.php, line 104 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Routing\Middleware\AssetMiddleware::__invoke() - CORE/src/Routing/Middleware/AssetMiddleware.php, line 88 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Error\Middleware\ErrorHandlerMiddleware::__invoke() - CORE/src/Error/Middleware/ErrorHandlerMiddleware.php, line 98 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Http\Runner::run() - CORE/src/Http/Runner.php, line 51 Cake\Http\Server::run() - CORE/src/Http/Server.php, line 81
Notice (8): Undefined index: pageCount [ROOT/plugins/Studyiq/src/Template/Pages/tags.ctp, line 65]Code Context<input type="hidden" name="articlecount" id="articlecount" value="<?php echo $this->Paginator->params()['pageCount'];?>">
<?php if($this->Paginator->params()['pageCount']>1){?>
<div class="show-more">
$viewFile = '/var/www/currentaffairs.studyiq.com/plugins/Studyiq/src/Template/Pages/tags.ctp' $dataForView = [ 'headertags' => [ (int) 0 => object(Cake\ORM\Entity) {}, (int) 1 => object(Cake\ORM\Entity) {}, (int) 2 => object(Cake\ORM\Entity) {}, (int) 3 => object(Cake\ORM\Entity) {}, (int) 4 => object(Cake\ORM\Entity) {}, (int) 5 => object(Cake\ORM\Entity) {}, (int) 6 => object(Cake\ORM\Entity) {}, (int) 7 => object(Cake\ORM\Entity) {}, (int) 8 => object(Cake\ORM\Entity) {}, (int) 9 => object(Cake\ORM\Entity) {}, (int) 10 => object(Cake\ORM\Entity) {}, (int) 11 => object(Cake\ORM\Entity) {}, (int) 12 => object(Cake\ORM\Entity) {} ], 'breadcrumb' => [ (int) 0 => [ 'name' => 'Home', 'link' => 'https://currentaffairs.studyiq.com/' ], (int) 1 => [ 'name' => 'IT, Mobile & Computers', 'link' => 'https://currentaffairs.studyiq.com/tags/IT-Mobile-Computers' ] ], 'currentaffairs' => [ (int) 0 => object(Cake\ORM\Entity) {}, (int) 1 => object(Cake\ORM\Entity) {}, (int) 2 => object(Cake\ORM\Entity) {}, (int) 3 => object(Cake\ORM\Entity) {}, (int) 4 => object(Cake\ORM\Entity) {}, (int) 5 => object(Cake\ORM\Entity) {}, (int) 6 => object(Cake\ORM\Entity) {}, (int) 7 => object(Cake\ORM\Entity) {}, (int) 8 => object(Cake\ORM\Entity) {}, (int) 9 => object(Cake\ORM\Entity) {}, (int) 10 => object(Cake\ORM\Entity) {}, (int) 11 => object(Cake\ORM\Entity) {}, (int) 12 => object(Cake\ORM\Entity) {}, (int) 13 => object(Cake\ORM\Entity) {}, (int) 14 => object(Cake\ORM\Entity) {}, (int) 15 => object(Cake\ORM\Entity) {}, (int) 16 => object(Cake\ORM\Entity) {}, (int) 17 => object(Cake\ORM\Entity) {}, (int) 18 => object(Cake\ORM\Entity) {}, (int) 19 => object(Cake\ORM\Entity) {}, (int) 20 => object(Cake\ORM\Entity) {}, (int) 21 => object(Cake\ORM\Entity) {}, (int) 22 => object(Cake\ORM\Entity) {}, (int) 23 => object(Cake\ORM\Entity) {}, (int) 24 => object(Cake\ORM\Entity) {}, (int) 25 => object(Cake\ORM\Entity) {}, (int) 26 => object(Cake\ORM\Entity) {}, (int) 27 => object(Cake\ORM\Entity) {}, (int) 28 => object(Cake\ORM\Entity) {}, (int) 29 => object(Cake\ORM\Entity) {}, (int) 30 => object(Cake\ORM\Entity) {}, (int) 31 => object(Cake\ORM\Entity) {}, (int) 32 => object(Cake\ORM\Entity) {}, (int) 33 => object(Cake\ORM\Entity) {}, (int) 34 => object(Cake\ORM\Entity) {}, (int) 35 => object(Cake\ORM\Entity) {}, (int) 36 => object(Cake\ORM\Entity) {}, (int) 37 => object(Cake\ORM\Entity) {}, (int) 38 => object(Cake\ORM\Entity) {}, (int) 39 => object(Cake\ORM\Entity) {}, (int) 40 => object(Cake\ORM\Entity) {}, (int) 41 => object(Cake\ORM\Entity) {}, (int) 42 => object(Cake\ORM\Entity) {}, (int) 43 => object(Cake\ORM\Entity) {}, (int) 44 => object(Cake\ORM\Entity) {}, (int) 45 => object(Cake\ORM\Entity) {}, (int) 46 => object(Cake\ORM\Entity) {}, (int) 47 => object(Cake\ORM\Entity) {}, (int) 48 => object(Cake\ORM\Entity) {}, (int) 49 => object(Cake\ORM\Entity) {}, (int) 50 => object(Cake\ORM\Entity) {}, (int) 51 => object(Cake\ORM\Entity) {}, (int) 52 => object(Cake\ORM\Entity) {}, (int) 53 => object(Cake\ORM\Entity) {}, (int) 54 => object(Cake\ORM\Entity) {}, (int) 55 => object(Cake\ORM\Entity) {}, (int) 56 => object(Cake\ORM\Entity) {}, (int) 57 => object(Cake\ORM\Entity) {}, (int) 58 => object(Cake\ORM\Entity) {}, (int) 59 => object(Cake\ORM\Entity) {}, (int) 60 => object(Cake\ORM\Entity) {}, (int) 61 => object(Cake\ORM\Entity) {}, (int) 62 => object(Cake\ORM\Entity) {}, (int) 63 => object(Cake\ORM\Entity) {}, (int) 64 => object(Cake\ORM\Entity) {}, (int) 65 => object(Cake\ORM\Entity) {}, (int) 66 => object(Cake\ORM\Entity) {}, (int) 67 => object(Cake\ORM\Entity) {}, (int) 68 => object(Cake\ORM\Entity) {}, (int) 69 => object(Cake\ORM\Entity) {}, (int) 70 => object(Cake\ORM\Entity) {}, (int) 71 => object(Cake\ORM\Entity) {}, (int) 72 => object(Cake\ORM\Entity) {}, (int) 73 => object(Cake\ORM\Entity) {}, (int) 74 => object(Cake\ORM\Entity) {}, (int) 75 => object(Cake\ORM\Entity) {}, (int) 76 => object(Cake\ORM\Entity) {}, (int) 77 => object(Cake\ORM\Entity) {}, (int) 78 => object(Cake\ORM\Entity) {}, (int) 79 => object(Cake\ORM\Entity) {} ], 'tagname' => 'IT, Mobile & Computers', 'metadescription' => 'IT, Mobile & Computers relative current affairs, Today GK, News, Burning issues, and know what science doing IT, Mobile & Computers fields with complete report', 'metakeyword' => 'IT, Mobile & Computers relative current affairs, Today GK, News', 'title' => 'IT, Mobile & Computers relative current affairs, Today GK, News', 'sbanners' => [ (int) 0 => object(Cake\ORM\Entity) {}, (int) 1 => object(Cake\ORM\Entity) {}, (int) 2 => object(Cake\ORM\Entity) {}, (int) 3 => object(Cake\ORM\Entity) {}, (int) 4 => object(Cake\ORM\Entity) {} ], 'params' => [ (int) 0 => 'IT-Mobile-Computers' ] ] $headertags = [ (int) 0 => object(Cake\ORM\Entity) { 'id' => (int) 3, 'name' => 'Art & Culture', 'parent_id' => (int) 2, 'description' => '', 'keyword' => 'art-culture', 'sortorder' => (int) 0, 'status' => (int) 1, 'metatitle' => 'Current Affairs Arts and Cultures Articles | Current Affairs', 'metakeyword' => 'Current Affairs Arts, Cultures Articles, Cultures Current Affairs Articles, Cultures Current Affairs, Current Affairs, Current Affair GK, General Knowledage', 'metadescription' => 'Current Affairs Arts and Cultures Articles complete current affairs details of Arts and cultures with complete depth analysis or full details of all current affair Articles', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'cacategories' }, (int) 1 => object(Cake\ORM\Entity) { 'id' => (int) 4, 'name' => 'Polity & Governance', 'parent_id' => (int) 2, 'description' => '', 'keyword' => 'polity-governance', 'sortorder' => (int) 0, 'status' => (int) 1, 'metatitle' => 'Polity Current Affairs | Governance Current Affair | Polity GK', 'metakeyword' => 'Polity Current Affairs, Governance Current Affair, Polity GK, Current Affairs of Polity, Current Affairs of Governance, Current affair Polity', 'metadescription' => 'Polity Current Affairs, Governance Current Affair, and current affairs of Polity and Governance and more get with Study IQ Education Articles and full details', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'cacategories' }, (int) 2 => object(Cake\ORM\Entity) { 'id' => (int) 5, 'name' => 'International Affairs', 'parent_id' => (int) 2, 'description' => '', 'keyword' => 'international-affairs', 'sortorder' => (int) 0, 'status' => (int) 1, 'metatitle' => 'International Affairs | International Current Affairs, GK, News', 'metakeyword' => 'International Affairs, International Current Affairs, International GK, International News, International burning Issues, International Today Affairs, International Current Affair, International current affairs 2019', 'metadescription' => 'International Affairs, International Current Affairs, GK, News, burning issues and all relative information of Internation you can get here for depth knowledge', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'cacategories' }, (int) 3 => object(Cake\ORM\Entity) { 'id' => (int) 6, 'name' => 'Economy', 'parent_id' => (int) 2, 'description' => '', 'keyword' => 'economy', 'sortorder' => (int) 0, 'status' => (int) 1, 'metatitle' => 'Economy Current Affairs | Economy Current Affair 2019 | Study IQ', 'metakeyword' => 'Economy Current Affairs, Economy Current Affair, Economy Current Affair 2019, Economy GK news, Economy Affairs, Current Affairs Economy, Current Affair Economy', 'metadescription' => 'Economy Current Affairs, Economy Current Affair 2019 and all the Economy Current Affair, GK, Burning Issues, News, get on study IQ education for exams preparation', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'cacategories' }, (int) 4 => object(Cake\ORM\Entity) { 'id' => (int) 7, 'name' => 'Banking Awareness', 'parent_id' => (int) 2, 'description' => '', 'keyword' => 'banking-awareness', 'sortorder' => (int) 0, 'status' => (int) 1, 'metatitle' => 'Banking Awareness Current Affairs, GK, News, Burning Issues', 'metakeyword' => 'Banking Awareness, Current Affairs, Current Affair, bANKING CURRENT AFFAIRS, Current affair of Banking, Current affair of Bank, Current affairs of Bank, BAnk current affairs', 'metadescription' => 'Banking Awareness Current Affairs, GK, News, Burning Issues, and all the latest current affairs of Banking Awareness or Banking for Govt exams preparation', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'cacategories' }, (int) 5 => object(Cake\ORM\Entity) { 'id' => (int) 8, 'name' => 'Defence & Security', 'parent_id' => (int) 2, 'description' => '', 'keyword' => 'defence-security', 'sortorder' => (int) 0, 'status' => (int) 1, 'metatitle' => 'Defence Current Affairs | Defence & Security Current Affairs', 'metakeyword' => 'Defence Current Affairs, Current Affairs, Current Affair, Current Affairs of Defence, Security Current Affairs, Security Current Affairs 2019, Security Current Affairs daily, Defence Current Affairs Daily', 'metadescription' => 'Defence Current Affairs, Defence & Security Current Affairs and complete details of Defence & Security current affairs, burning issues of Defence, Defence Today News ', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'cacategories' }, (int) 6 => object(Cake\ORM\Entity) { 'id' => (int) 9, 'name' => 'Environment', 'parent_id' => (int) 2, 'description' => '', 'keyword' => 'environment', 'sortorder' => (int) 0, 'status' => (int) 1, 'metatitle' => 'Environment Current Affairs, Current Affairs 2019- Study IQ', 'metakeyword' => 'Environment Current Affairs, Current Affairs Articles, Current Affairs of Environment, Current Affairs Environment', 'metadescription' => 'Environment Current Affairs, Current Affairs 2019, Study IQ provide complete information of Environment Current Affairs, GK, Bunrning Issues, latest news and more', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'cacategories' }, (int) 7 => object(Cake\ORM\Entity) { 'id' => (int) 10, 'name' => 'Science & Technology', 'parent_id' => (int) 2, 'description' => '', 'keyword' => 'science-technology', 'sortorder' => (int) 0, 'status' => (int) 1, 'metatitle' => 'Science & Technology Current Affairs | Science Current Affairs', 'metakeyword' => 'Science & Technology Current Affairs, Science & Technology Current Affair, Science Current Affairs, Science Current Affair, Technology Current Affair, Technology Current Affairs', 'metadescription' => 'Science & Technology Current Affairs, Science Current Affairs, Technology today affairs and more relative Science & Technology information get here free', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'cacategories' }, (int) 8 => object(Cake\ORM\Entity) { 'id' => (int) 11, 'name' => 'Miscellaneous', 'parent_id' => (int) 2, 'description' => '', 'keyword' => 'miscellaneous', 'sortorder' => (int) 0, 'status' => (int) 1, 'metatitle' => 'Miscellaneous Current Affairs Articles 2019, GK News | Study IQ', 'metakeyword' => 'Current Affairs Articles 2019, Miscellaneous Current Affairs, GK News, Current Affairs Articles', 'metadescription' => 'Current Affairs Articles, Current Affairs GK News analysis, and all topic relative information get here free and online so no need go anywhere that makes time saving ', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'cacategories' }, (int) 9 => object(Cake\ORM\Entity) { 'id' => (int) 12, 'name' => 'Government Schemes', 'parent_id' => (int) 2, 'description' => '', 'keyword' => 'government-schemes', 'sortorder' => (int) 0, 'status' => (int) 1, 'metatitle' => 'Government Schemes Current Affairs | Govt Current Affairs StudyIQ', 'metakeyword' => 'Government Schemes Current Affairs, Government Current Affairs, Current Affairs of government, ', 'metadescription' => 'Government Schemes Current Affairs, Government Current Affairs ad all government relative latest information, news, burning issues and more get here', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'cacategories' }, (int) 10 => object(Cake\ORM\Entity) { 'id' => (int) 13, 'name' => 'Persons in News', 'parent_id' => (int) 2, 'description' => '', 'keyword' => 'persons-in-news', 'sortorder' => (int) 0, 'status' => (int) 1, 'metatitle' => 'Persons in News | Current Affairs, Awards, Books, Obituaries News', 'metakeyword' => 'Persons in News, Current Affairs, Awards, Books, Obituaries News', 'metadescription' => 'Persons in News, Current Affairs, Awards, Books, Obituaries News, and all the daily current affairs news you will get here with complete information', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'cacategories' }, (int) 11 => object(Cake\ORM\Entity) { 'id' => (int) 14, 'name' => 'Constitution', 'parent_id' => (int) 2, 'description' => '', 'keyword' => 'constitution', 'sortorder' => (int) 0, 'status' => (int) 1, 'metatitle' => 'Constitution | Indian Constitution | World Constitution ', 'metakeyword' => 'constitution, Indian Constitution, World Constitution, Country Constitution ', 'metadescription' => 'Get the all the country constitution like Indian constitution, world constitution and more here you can get all the latest information relative to constitution', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'cacategories' }, (int) 12 => object(Cake\ORM\Entity) { 'id' => (int) 15, 'name' => 'Biodiversity', 'parent_id' => (int) 2, 'description' => '', 'keyword' => 'biodiversity', 'sortorder' => (int) 0, 'status' => (int) 1, 'metatitle' => 'Biodiversity | ??? ??????? | Biodiversity Current affairs', 'metakeyword' => 'Biodiversity, ??? ???????, Biodiversity Current affairs', 'metadescription' => 'Biodiversity, ??? ???????, Biodiversity Current affairs, Get the latest Biodiversity information with us where you get all the latest information about Biodiversity', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'cacategories' } ] $breadcrumb = [ (int) 0 => [ 'name' => 'Home', 'link' => 'https://currentaffairs.studyiq.com/' ], (int) 1 => [ 'name' => 'IT, Mobile & Computers', 'link' => 'https://currentaffairs.studyiq.com/tags/IT-Mobile-Computers' ] ] $currentaffairs = [ (int) 0 => object(Cake\ORM\Entity) { 'tag' => 'IT, Mobile & Computers', 'keyword' => 'IT-Mobile-Computers', 'id' => (int) 288, 'title' => 'India’s first semiconductor chips for 4G/LTE and 5G NR modems launched', 'description' => '<p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">Bengaluru-based fab-less semiconductor company, Signalchip has launched India’s first indigenous semiconductor chips for 4G/LTE and 5G NR modems. It has launched four chips as part of its SCBM34XX and SCRF34XX/45XX series, code-named ‘Agumbe’.</span></span></span></p> <p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-family:"Quicksand",serif">Four chips are</span></strong></span></span></p> <ul> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-family:"Quicksand",serif">SCBM3412:</span></strong><span style="font-family:"Quicksand",serif"> It is single chip 4G/LTE modem including baseband and transceiver sections in single device.</span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-family:"Quicksand",serif">SCBM3404:</span></strong><span style="font-family:"Quicksand",serif"> It is single chip 4X4 LTE baseband modem.</span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-family:"Quicksand",serif">SCRF3402:</span></strong><span style="font-family:"Quicksand",serif"> It is 2X2 transceiver for LTE.</span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-family:"Quicksand",serif">SCRF4502:</span></strong><span style="font-family:"Quicksand",serif"> It is 2X2 transceiver for 5G NR standards.</span></span></span></li> </ul> <p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-family:"Quicksand",serif">Significance</span></strong></span></span></p> <ul> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">This Agumbe series of chips builds up on SCRF1401: India’s first RF transceiver chip for high performance wireless standards like 3G/4G and WiFi, created by Signalchip in 2015. </span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">Its RF sections cover all LTE/5G-NR bands upto 6GHz. These are optimally designed to support evolving network architectures like Open RAN/CRAN with flexible interface configurations. </span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">These chips are significant step in direction of indigenousation of telecom sector as they have potential to cater to the growing digital connectivity needs of India’s more than 1.1 billion mobile phones currently in use, which is one of the highest in the world.</span></span></span></li> </ul> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'indias-first-semiconductor-chips-4g-lte-5g', 'image' => 'https://www.mediafire.com/convkey/ac25/m0hd8awuvdg3kj36g.jpg', 'fbimage' => 'https://www.mediafire.com/convkey/ac25/m0hd8awuvdg3kj36g.jpg', 'metatitle' => 'India’s first 4G/LTE, 5GNR modem semiconductor chips launched', 'metakeyword' => 'In Science and Technology Current Affairs, Signalchip, launches, India’s first, indigenous, semiconductor chips,r 4G/LTE and 5G NR modems.', 'metadescription' => 'Signalchip has launched India’s first indigenous semiconductor chips for 4G/LTE and 5G NR modems.', 'author' => 'Nikhil Paigude', 'downlaodpdf' => 'http://www.mediafire.com/file/rrhku3mid9773p6/28feb_India%25E2%2580%2599s_first_semiconductor_chips.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 1 => object(Cake\ORM\Entity) { 'tag' => 'IT, Mobile & Computers', 'keyword' => 'IT-Mobile-Computers', 'id' => (int) 343, 'title' => 'One Nation, One Card Model launched', 'description' => '<p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">Prime Minister Narendra Modi launched ‘One Nation, One Card’ Model from for seamless travel through different metros and other transport systems. Under this model, India’s first indigenously developed payment eco-system for transport mobility consists of:</span></span></span></p> <ul> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">National Common Mobility Card (NCMC) </span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">Swachalit Kiraya: Automatic Fare Collection System (SWEEKAR) </span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">Swachalit Gate (SWAGAT) based on NCMC Standards.</span></span></span></li> </ul> <p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">These three indigenously developed components of payment eco-system for transport mobility together will enable use of national mobility card across country without conflict with existing point-of-sale (PoS) machines.</span></span></span></p> <p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-family:"Quicksand",serif">One Nation, One Card Model</span></strong></span></span></p> <ul> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-family:"Quicksand",serif">NCMC:</span></strong><span style="font-family:"Quicksand",serif"> It is indigenous automatic fare collection system based on One Nation One Card Model in introduced by Union Ministry of Housing and Urban Affairs.</span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">It is the first of its kind indigenously developed inter-operable transport card/ payment platform in India. </span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">It can be issued by all public and private banks the same way credit, debit, and prepaid cards are issued</span></span></span></li> <li style="text-align:justify"><em><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">It will allow customers to use single card for payments across all segments including metro, bus, suburban railways, toll, parking, smart city across country besides retail shopping and purchases.</span></span></span></em></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-family:"Quicksand",serif">Benefits: </span></strong><span style="font-family:"Quicksand",serif">Its super-quick, contactless transaction feature will help to improve seamless travel experience. </span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">This card supports various service area features such as monthly passes, season tickets, etc.</span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">It also offers value proposition for customers as they need not to carry multiple cards for different usage</span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">Moreover, stored value in it supports offline transaction across all travel needs with minimal financial risk to involved stakeholders.</span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">It automates the fare collection system and eliminates need to carry change and cash while travelling in metro, bus or train, or for toll and parking.</span></span></span></li> </ul> <p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-family:"Quicksand",serif">Background</span></strong></span></span></p> <ul> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">NCMC was envisaged as part of National Urban Transport Policy (NUTP), 2006 by Union Ministry of Housing and Urban Affairs (MoUHA).</span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">MoUHA also had committee in 2014 with representatives from National Informatics Centre (NIC), National Payment Corporation of India (NPCI), Centre for Development of Advance Computing (C-DAC), Bureau of Indian Standards (BIS) and Ministry of finance to develop NCFC ecosystem.</span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">This committee had recommended an EMV-based (chip-based) Open Loop Card. These are bank-issued single card on Debit/Credit/Prepaid card product platform that can be used for payments across all segments.</span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">Later it January 2019, MoUHA had launched pilot project for the NCMC with Delhi Metro Rail Corporation (DMRC). The first-level trials were successfully completed in collaboration with CDAC, BEL, NPCI, and State Bank of India,</span></span></span></li> </ul> <p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-family:"Quicksand",serif">Role of other agencies </span></strong></span></span></p> <ul> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-family:"Quicksand",serif">NPCI:</span></strong><span style="font-family:"Quicksand",serif"> It has developed specifications for card to support NCMC ecosystem. </span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-family:"Quicksand",serif">C-DAC</span></strong><span style="font-family:"Quicksand",serif">: It has finalised NCMC specification for AFC system including interface with bank servers. It had worked in collaboration with NPCI for this. </span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-family:"Quicksand",serif">Bharat Electronics Limited (BEL):</span></strong><span style="font-family:"Quicksand",serif"> It had designed and developed gates and reader for these cards. It makes BEL first company in India to developed such gate and reader.</span></span></span></li> </ul> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'one-nation-one-card-model-launched', 'image' => 'https://www.mediafire.com/convkey/e4f8/u5k5nf6kfxfbosa6g.jpg', 'fbimage' => 'https://www.mediafire.com/convkey/e4f8/u5k5nf6kfxfbosa6g.jpg', 'metatitle' => 'One Nation, One Card Model launched | Current Affairs, GK, News', 'metakeyword' => 'In National Current Affairs, Prime Minister,Narendra Modi, One Nation, One Card Model,NCMC, SWEEKAR, Swachalit Gate, SWAGAT', 'metadescription' => 'Prime Minister Narendra Modi launched ‘One Nation, One Card’ Model from for seamless travel through different metros and other transport systems.', 'author' => 'Nikhil Paigude', 'downlaodpdf' => 'http://www.mediafire.com/file/c8ersr37g9101q4/5Mar_One_Nation%252C_One_Card_Model.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 2 => object(Cake\ORM\Entity) { 'tag' => 'IT, Mobile & Computers', 'keyword' => 'IT-Mobile-Computers', 'id' => (int) 271, 'title' => 'TJ1400: India’s Tejas Networks launches World’s First Ultra-Converged Broadband Product ', 'description' => '<p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">India’s Tejas Networks has launched world’s first ultra-converged broadband product family - TJ1400 that can deliver wireline as well as wireless broadband services from a single integrated platform. It was unveiled at Mobile World Congress (MWC) held in Barcelona, Italy.</span></span></span></p> <p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-family:"Quicksand",serif">TJ1400 ultra-converged broadband product family </span></strong></span></span></p> <ul> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">It provides unmatched integration of multiple broadband access technologies: fixed wireless broadband (4G/LTE eNodeB upgradable to 5G), gigabit fiber broadband (GPON/NG-PON) and GE/10GE/100GE Business Ethernet services (CE2.0 certified) in highly compact, modular and energy-efficient platforms. </span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">It also converges advanced packet transport technologies including OTN, Carrier Ethernet, PTN/MPLS-TP and IP to serve as unified delivery platform for wholesale, mobile backhaul, enterprise and residential broadband services.</span></span></span></li> </ul> <p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-family:"Quicksand",serif">Benefits</span></strong></span></span></p> <ul> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">It provides highest flexibility to any operator wanting to quickly and cost-effectively roll out broadband services on fibre as well as wireless. </span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">It efficiently packs unrivalled mix of broadband access and packet transmission features in smallest possible footprint.</span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">This efficient packing significantly helps in lowering the cost of rolling out high-speed broadband networks in terms of both capex and opex. </span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">It will help India to meet its stated objective of becoming global telecom equipment hub, especially in new 5G world.</span></span></span></li> </ul> <p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-family:"Quicksand",serif">Tejas Networks</span></strong></span></span></p> <p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">It is Bengaluru-based optical and data networking products company. It develops and sells high-performance, cost-competitive networking products to telecommunications service providers (TSPs), internet service providers (ISPs), utilities, defense and government entities in over 70 countries. It is ranked among top-10 suppliers in global optical aggregation segment.</span></span></span></p> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'tj1400-worlds-1st-ultra-converged-broadband-product ', 'image' => 'https://www.mediafire.com/convkey/6715/6vm6z0d0ixs2wu16g.jpg', 'fbimage' => 'https://www.mediafire.com/convkey/6715/6vm6z0d0ixs2wu16g.jpg', 'metatitle' => 'TJ1400: World’s First Ultra-Converged Broadband Product ', 'metakeyword' => 'In Science and Technology Current Affairs, India’s Tejas Networks,world’s first, ultra-converged broadband product family, TJ1400, deliver wireline as well as wireless broadband services, single integrated platform', 'metadescription' => 'India’s Tejas Networks has launched world’s first ultra-converged broadband product family - TJ1400 that can deliver wireline as well as wireless broadband services from a single integrated platform', 'author' => 'Nikhil Paigude', 'downlaodpdf' => 'https://www.mediafire.com/file/uvhs08dzt1bw9ir/27feb_TJ1400.pdf', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 3 => object(Cake\ORM\Entity) { 'tag' => 'IT, Mobile & Computers', 'keyword' => 'IT-Mobile-Computers', 'id' => (int) 243, 'title' => 'TRAI released white paper on Enabling 5G in India', 'description' => '<p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">Telecom Regulatory Authority of India (TRAI) has released white paper on ‘Enabling 5G in India’. It calls for combined effort by industry players and regulators for timely roll-out of 5G services in India.</span></span></span></p> <p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">Union Government is aiming to launch 5G in India by 2020. It is expected that cumulative economic impact of next generation technology would be about $1 trillion by 2035.</span></span></span></p> <p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-family:"Quicksand",serif">Highlights of white paper</span></strong></span></span></p> <ul> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">There should be no regulatory or licensing barrier on path of adoption of newer and better technologies, rather, licensing and regulation framework should be enabler in fostering newer technologies.</span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">5G will enable new capabilities and use cases, which were set to impact not only consumer services but also many industries.</span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">Operators with existing 4G footprints will be able to leverage their 4G infrastructure for providing 5G services and hence, their investment requirement would be relatively lower.</span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">The traditional offerings based on connection speed and volume of usage could see a shift as range of 5G use cases across industry verticals requiring different characteristics.</span></span></span></li> </ul> <p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-family:"Quicksand",serif">5G </span></strong></span></span></p> <ul> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">It is latest wireless communication technology based on third-generation partnership project (3GPP). It succeeds 4G (LTE-A, WiMax), 3G (UMTS, LTE) and 2G (GSM) systems.</span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">It will offer far greater upload and download speed i.e. 100 times faster internet data speed than current 4G networks.</span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">It unique feature are high data rate, reduced latency, energy saving, cost reduction, higher system capacity and massive device connectivity.</span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">It will expand broadband wireless services beyond mobile internet to IoT and critical communications segment and cater high speed network connectivity for augmented reality (AR)/virtual reality (VR).</span></span></span></li> </ul> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'trai-released-white-paper-enabling-5g-india', 'image' => 'https://www.mediafire.com/convkey/2658/nuhqr3g56ebn9jm6g.jpg', 'fbimage' => 'https://www.mediafire.com/convkey/2658/nuhqr3g56ebn9jm6g.jpg', 'metatitle' => 'TRAI white paper on Enabling 5G in India', 'metakeyword' => 'In Science and Technology Current Affairs, TRAI, releases, white paper, Enabling 5G in India, combined efforts, industry players, regulators,timely roll-out, 5G services, India', 'metadescription' => 'TRAI has released white paper on ‘Enabling 5G in India’. It calls for combined effort by industry players and regulators for timely roll-out of 5G services in India.', 'author' => 'Nikhil Paigude', 'downlaodpdf' => 'http://www.mediafire.com/file/imhcs3hekc5db47/23feb_TRAI_released_white_paper.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 4 => object(Cake\ORM\Entity) { 'tag' => 'IT, Mobile & Computers', 'keyword' => 'IT-Mobile-Computers', 'id' => (int) 244, 'title' => 'India to have own public DNS for safe browsing', 'description' => '<p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">Union Ministry of Electronics and Information Technology (MeitY) will soon roll out India’s own public Domain Name Server (DNS) for safe browsing. DNS servers as directory for Internet. It helps to convert domain names that are easy for people to remember into IP addresses, which are used by computers/machines to communicate. If DNS is either slow or fails to work, users will not be able to locate web addresses.</span></span></span></p> <p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-family:"Quicksand",serif">Government’s Public DNS</span></strong></span></span></p> <ul> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">It is aimed at providing faster and more secure browsing experience for Internet users in the country. It will prevent users from visiting malicious websites. It will ensure that citizens’ data is stored locally.</span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">It will also ensure availability, particularly for smaller Interest Service Providers (ISPs) who do not have credible DNS. Bigger ones usually have their own DNS.</span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">Its roll-out will be executed by National Informatics Centre (NIC) – the technology arm of the government. NIC is already using public DNS within government network.</span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">MeitY as part of its ongoing awareness campaign for safer Internet, is also planning to reach out to end-users to educate them on DNS and how they could shift to Indian public DNS if they desired.</span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">Under government’s public DNS, Indian users’ data will be stored within the country. It will not be compulsory for users. User is free to choose any DNS. </span></span></span></li> </ul> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'india-to-have-own-dns-for-safe-browsing', 'image' => 'https://www.mediafire.com/convkey/2508/ombo160c8ggb7fh6g.jpg', 'fbimage' => 'https://www.mediafire.com/convkey/2508/ombo160c8ggb7fh6g.jpg', 'metatitle' => 'India to have own public DNS for safe browsing', 'metakeyword' => 'In Science and Technology Current Affairs, Ministry of Electronics and Information Technology, MeitY, roll out, India’s own, public Domain Name Server (DNS) for safe browsing', 'metadescription' => 'Ministry of Electronics and Information Technology (MeitY) will soon roll out India’s own public Domain Name Server (DNS) for safe browsing', 'author' => 'Nikhil Paigude', 'downlaodpdf' => 'http://www.mediafire.com/file/8gxxhbpdj9uvig1/23feb_India_to_have_own_public_DNS.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 5 => object(Cake\ORM\Entity) { 'tag' => 'IT, Mobile & Computers', 'keyword' => 'IT-Mobile-Computers', 'id' => (int) 443, 'title' => 'Google Doodle celebrates 30 years of World Wide Web', 'description' => '<ul> <li><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">Google Doodle celebrated 30 years of World Wide Web (WWW), an invention of English Computer Scientists Sir Tim Berners-Lee.</span></span></span></li> <li><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">Tim Berners-Lee in 1989 had submitted paper titled 'Information Management: A Proposal' while working at large nuclear physics laboratory CERN in Switzerland. </span></span></span></li> <li><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">This paper had proposed and what came out as first web browser- World Wide Web (WWW).</span></span></span></li> <li><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">It was made public in April 1993 and first search engine ‘Mosaic’ was launched in November 1993 to accept pictures. Since then it has been replaced by many web browsers.</span></span></span></li> <li><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">WWW had opened up internet to everyone and connected world by way of sharing of information. </span></span></span></li> </ul> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'google-doodle-celebrates-30-years-world-wide-web', 'image' => 'https://www.mediafire.com/convkey/e91a/d5k0vjy7fjknndk6g.jpg', 'fbimage' => 'https://www.mediafire.com/convkey/e91a/d5k0vjy7fjknndk6g.jpg', 'metatitle' => 'Google Doodle celebrates 30 years of World Wide Web', 'metakeyword' => 'Google Doodle celebrates 30 years of World Wide Web', 'metadescription' => 'Google Doodle celebrates 30 years of World Wide Web, Google Doodle celebrated 30 years of World Wide Web (WWW), an invention of English Computer Scientists Sir Tim Berners-Lee.', 'author' => 'Nikhil Paigude', 'downlaodpdf' => 'https://www.mediafire.com/file/ac3kfuzp2bj2x25/12Mar_Google_Doodle_celebrates_30_years_of_World_Wide_Web.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 6 => object(Cake\ORM\Entity) { 'tag' => 'IT, Mobile & Computers', 'keyword' => 'IT-Mobile-Computers', 'id' => (int) 473, 'title' => 'India’s first 1.3 Petaflop supercomputer to come at IIT-Kharagpur', 'description' => '<p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">Indian Institutes of Technology (IIT)-Kharagpur has signed (MoU with Centre for Development of Advanced Computing (C-DAC) to set up India’s first 1.3 Petaflop high-performance computing (HPC) facility and data centre. This project will be under <strong>National Supercomputing Mission</strong>. C-DAC is an autonomous scientific society of Union Ministry of Electronics and Information Technology.</span></span></span></p> <p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-family:"Quicksand",serif">Uses of 1.3PF HPC facility</span></strong></span></span></p> <ul> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">It will provide large-scale computational support to researchers engaged in research activities in diverse areas of national importance.</span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">It will be used for specific challenge domains like cryptography, molecular dynamics, chemistry, drug discovery, artificial intelligence (AI) and data sciences.</span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">It will accelerate and evolve level of research currently being done with manifold improvement in output and efficiency.</span></span></span></li> </ul> <p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-family:"Quicksand",serif">National Supercomputing Mission</span></strong></span></span></p> <ul> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">It was launched in 2016 and is implemented jointly by Department of Science and Technology (DST) and Department of Electronics and Information Technology (DeitY). </span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">It envisages installing vast supercomputing grid comprising of over 70 high-performance computing (HPC) facilities spread across the county for empowering national academic and R&D institutions</span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">Supercomputers developed under it will also be networked on National Supercomputing grid over National Knowledge Network (NKN).</span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">It also includes development of highly professional HPC aware human resource for meeting challenges of development of these applications. </span></span></span></li> </ul> <p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-family:"Quicksand",serif">Objective</span></strong></span></span></p> <ul> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">Make India one of world leaders in Supercomputing and enhance India’s capability in solving grand challenge problems of national and global relevance.</span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">Empower scientists and researchers with state-of-the-art supercomputing facilities and enable them to carry out cutting-edge research.</span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">Minimize redundancies and duplication of efforts in the country and optimize investments in supercomputing.</span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">Attain global competitiveness and ensure self-reliance in strategic area of supercomputing technology.</span></span></span></li> </ul> <p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-family:"Quicksand",serif">Application areas of mission</span></strong></span></span></p> <p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">Climate modelling, weather prediction, aerospace engineering including, computational biology, atomic energy simulations, molecular dynamics, defence/ national security applications, disaster simulations and management, seismic analysis, computational chemistry, discoveries beyond earth (astrophysics), computational material science and nanomaterials, large complex systems simulations and cyber physical systems, big data analytics. Finance and government information systems/ information repositories.</span></span></span></p> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'indias-first-supercomputer-iit-kharagpur', 'image' => 'https://www.mediafire.com/convkey/00ee/4fdztay1ma7t6be6g.jpg', 'fbimage' => 'https://www.mediafire.com/convkey/00ee/4fdztay1ma7t6be6g.jpg', 'metatitle' => 'India’s first 1.3 Petaflop supercomputer to come at IIT-Kharagpur', 'metakeyword' => 'In Science and Technology Current Affairs, IIT Kharagpur, MoU, C-DAC, India’s first, 1.3 Petaflop, high-performance computing (HPC) facility, data centre', 'metadescription' => 'Indian Institutes of Technology (IIT)-Kharagpur has signed (MoU with Centre for Development of Advanced Computing (C-DAC) to set up India’s first 1.3 Petaflop high-performance computing (HPC) facility and data centre. ', 'author' => 'Nikhil Paigude', 'downlaodpdf' => 'https://www.mediafire.com/file/7ou9ga4m7391ic9/16_Mar_India_s_first_1.3_Petaflop_supercomputer.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 7 => object(Cake\ORM\Entity) { 'tag' => 'IT, Mobile & Computers', 'keyword' => 'IT-Mobile-Computers', 'id' => (int) 560, 'title' => 'World’s Largest e-waste Recycling Hub opened at Dubai', 'description' => '<p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">The world's largest e-waste recycling facility was opened in Dubai, United Arab Emirates (UAE). It is located at Dubai Industrial Park on area of 280,000 square feet. It has been set up by “Enviroserve’ company with support of Swiss Government Export Finance Agency. It will service international e-waste recycling efforts across Africa, Middle East and Caucasus region.</span></span></span></p> <p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-family:"Quicksand",serif">Dubai’s e-waste recycling facility</span></strong></span></span></p> <ul> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">It will recycle Waste Electrical and Electronic Equipment (WEEE), Information Technology asset disposition (ITAD), refrigerant gas and specialized waste.</span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">It has processing capacity of 100,000 tonnes of total integrated waste (per year), of which 39,000 tonnes is e-waste. </span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">It utilises state-of-the-art reclamation technology, which surpasses European Union's standards for e-waste.</span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">It can process the entire range of end-of-life WEEE ranging from consumer and industrial to commercial and military appliances,</span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">These include air conditioners, computers, batteries, household appliances, mobile phones, and even military avionics. </span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">It will also recycle specialised waste material such as aerosol cans, light bulbs and FMCG products. </span></span></span></li> </ul> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'worlds-largest-e-waste-recycling-hub-opened-dubai', 'image' => 'https://www.mediafire.com/convkey/c33d/x2b3a3hm8lzpsk36g.jpg', 'fbimage' => 'https://www.mediafire.com/convkey/c33d/x2b3a3hm8lzpsk36g.jpg', 'metatitle' => 'World’s Largest e-waste Recycling Hub opened at Dubai', 'metakeyword' => 'worlds largest,e-waste recycling facility, opened. Dubai, United Arab Emirates UAE. Dubai Industrial Park ', 'metadescription' => 'The world's largest e-waste recycling facility was opened in Dubai, United Arab Emirates (UAE). It is located at Dubai Industrial Park on area of 280,000 square feet.', 'author' => 'Nikhil Paigude', 'downlaodpdf' => 'https://www.mediafire.com/file/ign30wdq4gc6p71/World_s_Largest_e-waste.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 8 => object(Cake\ORM\Entity) { 'tag' => 'IT, Mobile & Computers', 'keyword' => 'IT-Mobile-Computers', 'id' => (int) 563, 'title' => 'Facebook launches two new India-specific tools for election engagement', 'description' => '<p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">Social-networking site Facebook launched two new India-specific tools-"Candidate Connect" and "Share You Voted" to boost civic engagement on its platform during the 2019 general (Lok Sabha) elections.<strong> </strong>Both new tools are available in 12 local languages across India.</span></span></span></p> <p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-family:"Quicksand",serif">Candidate Connect</span></strong></span></span></p> <p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">It will help people learn more about candidates. It will let contesting candidates upload 20 second videos to introduce themselves and highlight how they will address outstanding challenges in their constituencies if elected to office. It will help people learn more about candidates contesting for Lok Sabha elections from their constituency</span></span></span></p> <p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-family:"Quicksand",serif">Share You Voted</span></strong></span></span></p> <p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">It will provide people with polling information and enable them to announce and celebrate their vote. It will send out reminders to people on polling dates in their constituencies. It is aimed at amplifying the voting spirit. </span></span></span></p> <p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">It will also allow people to show that they voted on Election Day by uploading picture. These shared pictures from users will be aggregated and collage of friends will be prepared. This collage will be showed on the timelines of people connected to them in a video format. </span></span></span></p> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'facebook-launches-two-new-tools-for-election-engagement', 'image' => 'https://www.mediafire.com/convkey/7c3e/q114le0jb8fv6ky6g.jpg', 'fbimage' => 'https://www.mediafire.com/convkey/7c3e/q114le0jb8fv6ky6g.jpg', 'metatitle' => 'Facebook launches two new tools for election engagement', 'metakeyword' => 'Facebook launches two new India-specific tools Candidate Connect and Share You Voted to boost civic engagement on its platform during 2019 general elections', 'metadescription' => 'Social-networking site Facebook launched two new India-specific tools-"Candidate Connect" and "Share You Voted" to boost civic engagement on its platform during the 2019 general elections', 'author' => 'Nikhil Paigude', 'downlaodpdf' => 'https://www.mediafire.com/file/qcrchd3bcna9cme/Facebook_launches_two_new.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 9 => object(Cake\ORM\Entity) { 'tag' => 'IT, Mobile & Computers', 'keyword' => 'IT-Mobile-Computers', 'id' => (int) 593, 'title' => 'Shanghai becomes world's first district with 5G coverage', 'description' => '<p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">Shanghai claimed that it has become first district in the world using both 5G coverage and broadband gigabit network. Trial runs of 5G network service, backed by Chinese state-run telecom carrier China Mobile was officially started in Shanghai's Hongkou. To make 5G service available to people, 5G base stations have been deployed over the last three months across the district to ensure full coverage. When fully operational, subscribers will be able avail of 5G service without having to upgrade their SIM cards</span></span></span></p> <p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-family:"Quicksand",serif">5G</span></strong></span></span></p> <ul> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">5G is the next generation of cellular technology with download speeds that are 10 to 100 times faster than 4G LTE networks.</span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">It is latest wireless communication technology based on third-generation partnership project (3GPP). It succeeds 4G (LTE-A, WiMax), 3G (UMTS, LTE) and 2G (GSM) systems.</span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">It will offer far greater upload and download speed i.e. 100 times faster internet data speed than current 4G networks. </span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">It unique feature are high data rate, reduced latency, energy saving, cost reduction, higher system capacity and massive device connectivity. </span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">It will expand broadband wireless services beyond mobile internet to IoT and critical communications segment and cater high speed network connectivity for augmented reality (AR)/virtual reality (VR).</span></span></span></li> </ul> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'shanghai-worlds-first-district-5g-coverage', 'image' => 'https://www.mediafire.com/convkey/6ce3/5c4vph2siyw1x2u6g.jpg', 'fbimage' => 'https://www.mediafire.com/convkey/6ce3/5c4vph2siyw1x2u6g.jpg', 'metatitle' => 'Shanghai becomes world's first district with 5G coverage', 'metakeyword' => 'In Science and Technology Current Affairs, Shanghai, first district, in world, using, 5G coverage, broadband gigabit network', 'metadescription' => 'Shanghai claimed that it has become first district in the world using both 5G coverage and broadband gigabit network.', 'author' => 'Nikhil Paigude', 'downlaodpdf' => 'https://www.mediafire.com/file/ibrgvpuve9xre4x/Shanghai_becomes_world%27s_first.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 10 => object(Cake\ORM\Entity) { 'tag' => 'IT, Mobile & Computers', 'keyword' => 'IT-Mobile-Computers', 'id' => (int) 592, 'title' => 'Facebook bans white nationalism and white separatism on its platforms', 'description' => '<p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">Social media giant Facebook has banned praise, support and representation of white nationalism and white separatism on its platforms. This ban comes after recent Christchurch mosque shooting in New Zealand by white supremacist massacring 50 people in mosques by live streaming it on Facebook.</span></span></span></p> <p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">Facebook has long banned white supremacy under its rules on hateful content but did not previously consider white nationalist or separatist content to be explicitly racist. Now it is planning to start connecting people who search for terms associated with white supremacy and helping people leave hate groups.</span></span></span></p> <p style="margin-left:0in; margin-right:0in; text-align:justify"><strong><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">Background</span></span></span></strong></p> <p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">Social media giants Facebook, Twitter and YouTube have been under pressure to remove white supremacist and neo-Nazi content from their platforms, along with fake news and other types of abusive posts. Civil rights groups have also have criticized social media giants for failing to confront extremism on their platforms. Facebook initially was wary of infringing on broader concepts of nationalism and separatism, which it said are important part of people’s identity. But now it has change its policy and helds that white nationalism and separatism cannot be meaningfully separated from white supremacy and organized hate groups.</span></span></span></p> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'facebook-bans-white-nationalism-white-separatism', 'image' => 'https://www.mediafire.com/convkey/15a1/0b5b3vr6kb51xyu6g.jpg', 'fbimage' => 'https://www.mediafire.com/convkey/15a1/0b5b3vr6kb51xyu6g.jpg', 'metatitle' => 'Facebook bans white nationalism and white separatism', 'metakeyword' => 'In Science and Technology Current Affairs, Facebook, banned praise, support and representation, white nationalism, white separatism, Christchurch mosque shooting,New Zealand', 'metadescription' => 'Social media giant Facebook has banned praise, support and representation of white nationalism and white separatism on its platforms. ', 'author' => 'Nikhil Paigude', 'downlaodpdf' => 'http://www.mediafire.com/file/o8dkj899bjkjnkv/Facebook_bans_white_nationalism.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 11 => object(Cake\ORM\Entity) { 'tag' => 'IT, Mobile & Computers', 'keyword' => 'IT-Mobile-Computers', 'id' => (int) 671, 'title' => 'WhatsApp launches Checkpoint Tipline to curb fake news', 'description' => '<p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">Facebook owned messaging platform WhatsApp has launched Checkpoint Tipline, an India-focused fact-checking feature to combat fake news, rumours and misinformation. It has was unveiled starting with run-up to 2019 Lok Sabha elections.</span></span></span></p> <p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-family:"Quicksand",serif">Checkpoint Tipline</span></strong></span></span></p> <ul> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">It has been developed in collaboration with India-based media skilling startup PROTO. </span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">Using this feature, users can report uncertain information or rumours they have received to WhatsApp number (+91-9643-000-888) and check its authenticity.</span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">Once user shares suspicious message with tipline, Proto’s verification centre will respond and inform user if the claim made in message shared is verified or not.</span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">The response will indicate if information is classified as ‘true’, ‘false’, ‘disputed’, ‘misleading’ or ‘out of scope’ and include any other related information. </span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">Using it, WhatsApp will review pictures, video links or texts in Hindi, Telugu, Bengali, Malayalam and English.</span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">It will also help create database of rumours during elections to study misinformation during elections as part of Checkpoint, a research project commissioned and assisted by WhatsApp.</span></span></span></li> </ul> <p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-family:"Quicksand",serif">Background</span></strong></span></span></p> <ul> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">India is the biggest WhatsApp market in the world with over 200 million users. In recent times had faced criticism and notices from Government of India for not being able to check spread of fake news and helping in tracing the origin of such messages.</span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">Since then it has taken numerous inhouse measure to curb spread of fake news including restricting forwarding messages to five chats at once. It has also been putting out advertisements in newspapers and running television and radio campaigns offering tips to users on spotting misinformation.</span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">However, WhatsApp so far has resisted Government’s demand for identifying message originators, arguing that such move will undermine end-to-end encryption and private nature of the platform, creating potential for serious misuse.</span></span></span></li> </ul> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'whatsapp-launches-checkpoint-tipline-curb-fake-news', 'image' => 'https://www.mediafire.com/convkey/1e02/1vbo4wlyk45n63e6g.jpg', 'fbimage' => 'https://www.mediafire.com/convkey/1e02/1vbo4wlyk45n63e6g.jpg', 'metatitle' => 'WhatsApp launches Checkpoint Tipline to curb fake news', 'metakeyword' => 'In Science and Technology Current Affairs, WhatsApp, launches, Checkpoint Tipline, curb fake news', 'metadescription' => 'Facebook owned messaging platform WhatsApp has launched Checkpoint Tipline, an India-focused fact-checking feature to combat fake news, rumours and misinformation.', 'author' => 'Nikhil Paigude', 'downlaodpdf' => 'https://www.mediafire.com/file/6x5w6r2rkydrvvl/WhatsApp_launches_Checkpoint.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 12 => object(Cake\ORM\Entity) { 'tag' => 'IT, Mobile & Computers', 'keyword' => 'IT-Mobile-Computers', 'id' => (int) 765, 'title' => 'UAE to host first Global Artificial Intelligence summit', 'description' => '<p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">United Arab Emirates will host first 'Ai Everything', the world’s foremost artificial intelligence (AI) summit to empower global dialogue on future of government, business and society. It will be hosted by UAE National Programme for AI with support of International Telecommunication Union (ITU) and World Intellectual Property Organisation (WIPO) and in strategic partnership with Smart Dubai.</span></span></span></p> <p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-family:"Quicksand",serif">First 'Ai Everything'</span></strong></span></span></p> <ul> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">Its aims to empower global dialogue on the future of government, business and society. </span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">It will also serve as knowledge exchange platform for bringing those solutions into the mainstream.</span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">It will bring together world leaders to define the underlying pillars of governance, business and society - augmenting the world’s happiness.</span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">It will unravel real-world use cases across industries, and forge collaborations and partnerships, hosting over 130 influential speakers.</span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">It is in line with UAE AI Strategy 2031 with envision to make UAE as global test bed for AI innovation and look at ways to create new vital markets that unlock high economic value for sector. </span></span></span></li> </ul> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'uae-host-first-global-artificial-intelligence-summit', 'image' => 'https://www.mediafire.com/convkey/34e8/qz4rpoz1d5rmd766g.jpg', 'fbimage' => 'https://www.mediafire.com/convkey/34e8/qz4rpoz1d5rmd766g.jpg', 'metatitle' => 'UAE to host first Global Artificial Intelligence summit', 'metakeyword' => 'In Science and Technology Current Affairs, UAE to host first Global Artificial Intelligence summit, Ai Everything', 'metadescription' => 'UAE to host first Global Artificial Intelligence summit, Ai Everything, United Arab Emirates will host first 'Ai Everything', the world’s foremost artificial intelligence (AI)', 'author' => 'Nikhil Paigude', 'downlaodpdf' => 'https://www.mediafire.com/file/ym7vob739dsbrox/UAE_to_host_first_Global.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 13 => object(Cake\ORM\Entity) { 'tag' => 'IT, Mobile & Computers', 'keyword' => 'IT-Mobile-Computers', 'id' => (int) 937, 'title' => 'IIT Madras develops easy OCR system for reading Bharti Script', 'description' => '<p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand","serif"">Reaserchers from IIT Madras have developed easy multi-lingual optical character recognition (OCR) schemes for reading documents in Bharati script. They also have developed universal finger-spelling language (method) for the nine Indian languages It was developed in collaboration of TCS, Mumbai and can be used to generate sign language for hearing-impaired persons</span></span></span></p> <p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-family:"Quicksand","serif"">About Bharati script</span></strong></span></span></p> <ul> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand","serif"">It is unified script for <strong>nine Indian languages </strong>which is being proposed as a common script for India to bring down many communication barriers.</span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand","serif"">The nine languages are Devnagari, Bengali, Gurmukhi, Gujarati, Oriya, Telugu, Kannada, Malayalam and Tamil. <em>English and Urdu have not yet been integrated as they have a very different phonetic organisation</em>.</span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand","serif"">It was developed by team of researchers from IIT-Madras headed by Professor V. Srinivasa Chakravarthy.</span></span></span></li> </ul> <p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-family:"Quicksand","serif"">OCR schemes for Bharati script</span></strong></span></span></p> <p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand","serif"">It involve first separating (or segmenting) document into text and non-text. The text is then segmented into paragraphs, sentences words and letters. Each letter is then recognised as character in some recognisable format such as Unicode or ASCII. The letter has various components such as basic consonant, consonant modifiers, vowels etc.</span></span></span></p> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'itt-madras-ocr-system-for-reading-bharti-script', 'image' => 'https://www.mediafire.com/convkey/53aa/1u5lzcqh9e1vi096g.jpg', 'fbimage' => 'https://www.mediafire.com/convkey/53aa/1u5lzcqh9e1vi096g.jpg', 'metatitle' => 'IIT Madras develops easy OCR system for reading Bharti Script', 'metakeyword' => 'In Science and Technology Current Affairs, IIT Madras, easy multi-lingual optical character recognition, OCR schemes, reading documents, Bharati script', 'metadescription' => 'Reaserchers from IIT Madras have developed easy multi-lingual optical character recognition (OCR) schemes for reading documents in Bharati script', 'author' => 'Nikhil Paigude', 'downlaodpdf' => 'https://www.mediafire.com/file/wtccaac9kedzgaa/IIT_Madras.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 14 => object(Cake\ORM\Entity) { 'tag' => 'IT, Mobile & Computers', 'keyword' => 'IT-Mobile-Computers', 'id' => (int) 1341, 'title' => 'Nipah virus resurfaces in Kerala', 'description' => '<p style="margin-left:0in; margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-size:9.0pt"><span style="font-family:"Quicksand","serif"">The deadly brain-damaging Nipah virus has resurfaced in Kerala a year after it killed 17 people. In recent case 23-year-old student tested positive for the virus and four other people showed Nipah-like symptoms. Union Health Ministry has sent six-member team from various institutes for epidemiological investigation and to implement protocols for the containment of the disease. It also given permission to use the immunoglobulin – monocional antibody, if necessary. </span></span></span></span></p> <p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-size:9.0pt"><span style="font-family:"Quicksand","serif"">Nipah virus</span></span></strong></span></span></p> <ul> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-size:9.0pt"><span style="font-family:"Quicksand","serif"">It is zoonotic disease (disease transmitted to humans from animals) that causes severe disease in both animals and humans. It is caused RNA or Ribonucleic acid virus of family Paramyxoviridae, genus Henipavirus, and is closely related to Hendra virus.</span></span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-size:9.0pt"><span style="font-family:"Quicksand","serif"">Origin:</span></span></strong><span style="font-size:9.0pt"><span style="font-family:"Quicksand","serif""> It was first identified in Kampung Sungai Nipah, Malaysia in 1998 from where it derives its name. Its first outbreak in India was reported from Siliguri, West Bengal in 2001.</span></span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-size:9.0pt"><span style="font-family:"Quicksand","serif"">Natural host:</span></span></strong><span style="font-size:9.0pt"><span style="font-family:"Quicksand","serif""> Fruit bats of Pteropodidae Family, Pteropus genus. The virus is present in bat urine, faeces, saliva, and birthing fluids, which then transmits it to Humans climbing trees or drinking raw palm sap covered in it. It can also infect pigs or any domesticated animals.</span></span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-size:9.0pt"><span style="font-family:"Quicksand","serif"">Transmission: </span></span></strong><span style="font-size:9.0pt"><span style="font-family:"Quicksand","serif"">It is transmitted to humans through direct contact with infected bats, pigs, or contaminated foods. Human to Human transmission from other NiV-infected people is also possible. It spreads fast and is mostly fatal. However, it cannot be transmitted through air.</span></span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-size:9.0pt"><span style="font-family:"Quicksand","serif"">Signs & Symptoms:</span></span></strong><span style="font-size:9.0pt"><span style="font-family:"Quicksand","serif""> In infected humans, it shows range of clinical presentations i.e. from asymptomatic infection to acute respitatory syndrome and fatal encephalitis (inflammation of brain). It can also cause headache, followed by drowsiness, disorientation and mental confusion. Further without care, it can progress to coma. The mortality rate of patients infected Nipah virus is reportedly 70</span></span><span style="font-size:9.0pt"><span style="font-family:"Times New Roman","serif"">%</span></span><span style="font-size:9.0pt"><span style="font-family:"Quicksand","serif"">. It is capable of causing similar signs and symptoms in domestic animals too. </span></span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-size:9.0pt"><span style="font-family:"Quicksand","serif"">Treatment:</span></span></strong><span style="font-size:9.0pt"><span style="font-family:"Quicksand","serif""> There is no vaccine for curing Nipah virus either for humans or animals. The common treatment is intensive supportive care and supportive medicines. It can be prevented by avoiding exposure of infected people without protective gear. </span></span></span></span></li> </ul> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'nipah-virus-resurfaces-kerala', 'image' => 'https://www.mediafire.com/convkey/ef47/sykpc25nzpb93s06g.jpg', 'fbimage' => 'https://www.mediafire.com/convkey/ef47/sykpc25nzpb93s06g.jpg', 'metatitle' => 'Nipah virus resurfaces in Kerala | Nipah virus', 'metakeyword' => 'The deadly brain-damaging Nipah virus has resurfaced in Kerala a year after it killed 17 people', 'metadescription' => 'The deadly brain-damaging Nipah virus has resurfaced in Kerala a year after it killed 17 people', 'author' => 'Nikhil Paigude', 'downlaodpdf' => 'https://www.mediafire.com/file/aaz79y2b92vkywd/Nipah_virus.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 15 => object(Cake\ORM\Entity) { 'tag' => 'IT, Mobile & Computers', 'keyword' => 'IT-Mobile-Computers', 'id' => (int) 1512, 'title' => 'Air Traffic Flow Management - Central Command Centre inaugurated at New Delhi', 'description' => '<p style="margin-left:0in; margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-size:9.0pt"><span style="font-family:"Quicksand","serif"">Union Civil Aviation Minister Hardeep Singh Puri inaugurated world class Air Traffic Flow Management (ATFM) - Central Command Centre at Vasant Kunj in New Delhi. The central ATFM system integrates flight data from various subsystems like ATC Automation System, flight updates and flight update messages. With this, India became the seventh country in the world after the US, Europe, Australia, South Africa, Japan and Brazil to successfully implementAir Traffic Flow Management System.</span></span></span></span></p> <p style="margin-left:0in; margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-size:9.0pt"><span style="font-family:"Quicksand","serif"">About ATFM - Central Command Centre</span></span></strong></span></span></p> <p style="margin-left:0in; margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-size:9.0pt"><span style="font-family:"Quicksand","serif"">The system integrates flight data from various subsystems like ATC Automation System, flight updates and flight update messages. It is connected to all airports in India.</span></span></span></span></p> <p style="margin-left:0in; margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-size:9.0pt"><span style="font-family:"Quicksand","serif"">Function:</span></span></strong><span style="font-size:9.0pt"><span style="font-family:"Quicksand","serif""> It processes demand and capacity information and provides decision-making tools to ATFM Flow Manager for collaborative decision makin. It also ensures regulated flow of traffic at each airport in India. It also displays weather information along with static information about airports, airspaces and air routes. </span></span></span></span></p> <p style="margin-left:0in; margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-size:9.0pt"><span style="font-family:"Quicksand","serif"">Structure:</span></span></strong><span style="font-size:9.0pt"><span style="font-family:"Quicksand","serif""> It is supported by 36 Flow Management Positions (FMPs) at various airports including Mumbai, Delhi, Kolkata, Chennai, Bengaluru and Hyderabad among others. Eight defence airports are also part of this network which are provided with FMPs. </span></span></span></span></p> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'air-traffic-flow-management-new-delhi', 'image' => 'https://www.mediafire.com/convkey/71fe/2j72l51myjkdcf66g.jpg', 'fbimage' => 'https://www.mediafire.com/convkey/71fe/2j72l51myjkdcf66g.jpg', 'metatitle' => 'Air Traffic Flow Management - Central Command Centre ', 'metakeyword' => 'Union Civil Aviation Minister Hardeep Singh Puri inaugurated world class Air Traffic Flow Management (ATFM) - Central Command Centre at Vasant Kunj in New Delhi.', 'metadescription' => 'Union Civil Aviation Minister Hardeep Singh Puri inaugurated world class Air Traffic Flow Management (ATFM) - Central Command Centre at Vasant Kunj in New Delhi.', 'author' => 'Nikhil Paigude', 'downlaodpdf' => 'https://www.mediafire.com/file/34r8cr932zbww98/Air_Traffic_Flow_Management.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 16 => object(Cake\ORM\Entity) { 'tag' => 'IT, Mobile & Computers', 'keyword' => 'IT-Mobile-Computers', 'id' => (int) 1639, 'title' => 'Govt inks SoI with IBM for study on using AI, weather tech in agriculture', 'description' => '<p style="margin-left:0in; margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-size:9.0pt"><span style="font-family:"Quicksand","serif"">Union Ministry of Agriculture and Farmers Welfare has signed Statement of Intent (SoI) with IT giant IBM for conducting pilot study to utilize Artificial Intelligence (AI) & Weather Technology solutions in agriculture. As part of the collaboration, IBM’s Watson Decision Platform for Agriculture will be leveraged to obtain village level soil moisture and farm level weather forecast in three districts in Western and Central India. This pilot study will be conducted for 2019 Kharif crop season.</span></span></span></span></p> <p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-size:9.0pt"><span style="font-family:"Quicksand","serif"">Key Facts </span></span></strong></span></span></p> <ul> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-size:9.0pt"><span style="font-family:"Quicksand","serif"">Under this collaboration, pilot study will be conducted in 3 districts of Bhopal (Madhya Pradesh), Rajkot (Gujarat) and Nanded (Maharashtra) respectively, with IBM India Private Limited. </span></span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-size:9.0pt"><span style="font-family:"Quicksand","serif"">IBM’s Watson Decision Platform will provide solution in the field of agriculture through Artificial Intelligence (AI) and weather technology at village level/farm level.</span></span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-size:9.0pt"><span style="font-family:"Quicksand","serif"">It will provide soil moisture information and weather forecast on pro bono basis to help farmers for taking decisions regarding water and crop management for better production and productivity.</span></span></span></span></li> </ul> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'ibm-study-a-weather-tech-agriculture', 'image' => 'https://www.mediafire.com/convkey/4d57/3fhxe1aw0oodf9a6g.jpg', 'fbimage' => 'https://www.mediafire.com/convkey/4d57/3fhxe1aw0oodf9a6g.jpg', 'metatitle' => 'Govt inks SoI with IBM for study on using AI, weather', 'metakeyword' => 'Ministry of Agriculture and Farmers Welfare has signed Statement of Intent (SoI) with IT giant IBM for conducting pilot study to utilize Artificial Intelligence (AI) & Weather Technology solutions in agriculture', 'metadescription' => 'Ministry of Agriculture and Farmers Welfare has signed Statement of Intent (SoI) with IT giant IBM for conducting pilot study to utilize Artificial Intelligence (AI) ', 'author' => 'Nikhil Paigude', 'downlaodpdf' => 'https://www.mediafire.com/file/nsmvqs7781w17a4/Govt_inks_SoI_with_IBM.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 17 => object(Cake\ORM\Entity) { 'tag' => 'IT, Mobile & Computers', 'keyword' => 'IT-Mobile-Computers', 'id' => (int) 371, 'title' => 'Government identifies 9 missions for scientific innovation ', 'description' => '<p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">Government has identified nine missions and four key projects of national importance to address societal needs in areas such as health, education, data security, transportation, clean energy and agriculture. </span></span></span></p> <p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">These missions and key projects were identified by Prime Minister's Advisory Council on Science, Technology & Innovation. They are aimed at solving complex scientific problems in reasonable time-frame and bring fruits of scientific development to citizens' doorsteps through various innovations, </span></span></span></p> <p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">Each of these missions along with four projects will be led by nodal ministry which will implement it by engaging international and national institutional partners, scientists and industries.</span></span></span></p> <p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-family:"Quicksand",serif">Nine missions:</span></strong></span></span></p> <ul> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-family:"Quicksand",serif">Quantum Frontier:</span></strong><span style="font-family:"Quicksand",serif"> It will focus on network and data protection to enable robust cyber security system</span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-family:"Quicksand",serif">Natural Language Translation:</span></strong><span style="font-family:"Quicksand",serif"> It will provide access to scientific materials in native Indian language</span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-family:"Quicksand",serif">Artificial Intelligence:</span></strong><span style="font-family:"Quicksand",serif"> It will focus on use of intelligent computing system in areas such as healthcare, education, agriculture and transportation among others.</span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-family:"Quicksand",serif">National Biodiversity:</span></strong><span style="font-family:"Quicksand",serif"> It will include comprehensive documentation of India's biodiversity and mapping all lifeforms of the country.</span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-family:"Quicksand",serif">Electric Vehicles:</span></strong><span style="font-family:"Quicksand",serif"> It will aim to make EVs economically viable and scalable</span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-family:"Quicksand",serif">Bio-Science for Human Health:</span></strong><span style="font-family:"Quicksand",serif"> It aims at genomic study of humans to identify and unravel genetic basis and prevalence of rare and inherited diseases</span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-family:"Quicksand",serif">Waste to Wealth:</span></strong><span style="font-family:"Quicksand",serif"> It seeks to develop and deploy technology to treat waste to generate energy, recycle materials and extract wealth</span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-family:"Quicksand",serif">Deep Ocean Exploration</span></strong><span style="font-family:"Quicksand",serif">: It will aim at exploring deep oceans for resources, climate change advisory services, offshore based desalination techniques and renewable energy generation among others </span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-family:"Quicksand",serif">AGNIi-Accelerating Growth for New India's Innovations (AGNIi):</span></strong><span style="font-family:"Quicksand",serif"> It will be for taking technologies to commercialization. Under it, efforts will be made to boost innovation ecosystem.</span></span></span></li> </ul> <p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-family:"Quicksand",serif">Four Projects are</span></strong></span></span></p> <ul> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">Setting up research clusters</span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">Establishing state-of-the -art 'Earth Museum'.</span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">Conserving critical ecological lifeline of Brahmaputra river system.</span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">Developing comprehensive web portal linking researchers with resources.</span></span></span></li> </ul> <p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-family:"Quicksand",serif">Prime Minister's Advisory Council on Science, Technology & Innovation (PM-STIAC)</span></strong></span></span></p> <p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">It was constituted in August 2018 headed by Principal Scientific Advisor to government K Vijay Raghavan.</span></span></span></p> <p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-family:"Quicksand",serif">Mandate:</span></strong><span style="font-family:"Quicksand",serif"> (i) advise PM on science, technology, as well as innovation. (ii) coordinate implementation of PMs scientific vision. (iii) Aid in formulation and timely implementation of major science and technology missions and evolve interdisciplinary technology development programmes. (iv) advise government on developing ‘Clusters of Excellence’ in science including city-based R&D clusters. (vi) Bring together all science and technology partners from academia and institutes to industries near such centres or cities.</span></span></span></p> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => '9-missions-for-scientific-innovation', 'image' => 'https://www.mediafire.com/convkey/adf9/oscd7rj8co35v5u6g.jpg', 'fbimage' => 'https://www.mediafire.com/convkey/adf9/oscd7rj8co35v5u6g.jpg', 'metatitle' => 'Govt identifies 9 missions for scientific innovation ', 'metakeyword' => 'In Science and Technology Current Affairs, 9 missions , four projects, national importance, societal needs, health, education, data security, transportation, clean energy, agriculture', 'metadescription' => 'Nine missions and four key projects identified of national importance to address societal needs in areas such as health, education, data security, transportation, clean energy and agriculture.', 'author' => 'Nikhil Paigude', 'downlaodpdf' => 'http://www.mediafire.com/file/19y5kyqzx5iczze/7Mar_Government_identifies_9_missions.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 18 => object(Cake\ORM\Entity) { 'tag' => 'IT, Mobile & Computers', 'keyword' => 'IT-Mobile-Computers', 'id' => (int) 1725, 'title' => 'Internet Saathi programme extended to Punjab and Odisha', 'description' => '<p style="margin-left:0in; margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-size:9.0pt"><span style="font-family:"Quicksand","serif"">Google India and Tata Trusts’ digital literacy initiative- Internet Saathi programme has been extended to Punjab and Odisha. With addition of these new two states, the programme is now active in 20 states, reaching to around 2.6 lakh villages across the country. In Punjab, the programme will cover around 5,000 villages and in Odisha it will cover 16,000-plus villages.</span></span></span></span></p> <p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-size:9.0pt"><span style="font-family:"Quicksand","serif"">About Internet Saathi Programme</span></span></strong></span></span></p> <ul> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-size:9.0pt"><span style="font-family:"Quicksand","serif"">It was launched by Google India along with Tata Trusts as a pilot project in 2015 in Rajasthan. It was scaled up to cover 3 lakh villages across India in December 2015.</span></span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-size:9.0pt"><span style="font-family:"Quicksand","serif"">Objective:</span></span></strong><span style="font-size:9.0pt"><span style="font-family:"Quicksand","serif""> It is digital literacy initiative aimed to educate rural women on how to use Internet. These women, in turn, impart training to other women in their community and neighbouring villages. </span></span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-size:9.0pt"><span style="font-family:"Quicksand","serif"">Achievements:</span></span></strong><span style="font-size:9.0pt"><span style="font-family:"Quicksand","serif""> Since its launch, this programme has contributed towards bridging the digital gender divide in rural India (female to male ratio from 1 in 10 in 2015 to 4 in 10 in 2018). In the four-year journey, over 70,000 "Internet Saathis" are using Internet to drive positive change in their communities. About 70</span></span><span style="font-size:9.0pt"><span style="font-family:"Times New Roman","serif"">%</span></span><span style="font-size:9.0pt"><span style="font-family:"Quicksand","serif""> of Internet Saathis believe they are seen as source of information in their village. It has led to level of independence that creates financial opportunities for women to pursue their dreams. 30% of Saathis have set up some form of business. This, in turn, has provided economic growth, with business often earning between Rs3,000 and Rs5,000 every month while five in ten Saathis have seen positive impact on employability.</span></span></span></span></li> </ul> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'internet-saathi-programme', 'image' => 'https://www.mediafire.com/convkey/a0a9/kwokadmrcxsp4lm6g.jpg', 'fbimage' => 'https://www.mediafire.com/convkey/a0a9/kwokadmrcxsp4lm6g.jpg', 'metatitle' => 'Internet Saathi programme extended to Rajasthan', 'metakeyword' => 'Google India and Tata Trusts’ digital literacy initiative- Internet Saathi programme has been extended to Punjab and Odisha', 'metadescription' => 'Google India and Tata Trusts’ digital literacy initiative- Internet Saathi programme has been extended to Punjab and Odisha', 'author' => 'Nikhil Paigude', 'downlaodpdf' => 'https://www.mediafire.com/file/c27nu4tm7gzjg66/Internet_Saathi_programme_extended_to_Rajasthan_and_Odisha.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 19 => object(Cake\ORM\Entity) { 'tag' => 'IT, Mobile & Computers', 'keyword' => 'IT-Mobile-Computers', 'id' => (int) 1748, 'title' => 'Medicine From the Sky: Telangana Govt, WEF ink MoU', 'description' => '<p style="margin-left:0in; margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-size:9.0pt"><span style="font-family:"Quicksand","serif"">Telangana Government and World Economic Forum's Centre for Fourth Industrial Revolution Network signed MoU to launch ‘Medicine from the Sky’ project. It is innovative pilot project aimed at delivering emergency medical supplies such as blood and vaccines via drones.</span></span></span></span></p> <p style="margin-left:0in; margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-size:9.0pt"><span style="font-family:"Quicksand","serif"">About Medicine from the Sky Project</span></span></strong></span></span></p> <ul> <li><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-size:9.0pt"><span style="font-family:"Quicksand","serif"">Bodies involved in this pilot project:</span></span></strong><span style="font-size:9.0pt"><span style="font-family:"Quicksand","serif""> Telangana Government, World Economic Forum's Centre for the Fourth Industrial Revolution Network in partnership with the HealthNet Global Limited. </span></span></span></span></li> <li><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-size:9.0pt"><span style="font-family:"Quicksand","serif"">Features:</span></span></strong><span style="font-size:9.0pt"><span style="font-family:"Quicksand","serif""> It conduct comprehensive study of drone-based deliveries for blood, vaccines, medical samples and organs i.e. to study how delivery drones can be used to improve medical supply chains,.</span></span></span></span></li> <li><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-size:9.0pt"><span style="font-family:"Quicksand","serif"">Benefits: </span></span></strong><span style="font-size:9.0pt"><span style="font-family:"Quicksand","serif"">It will provide evidence-based approach for implementation of drones in healthcare, enabling emergency-care services to t patients in shortest time frame possible, thus saving their live. It will help to facilitate decision-making in healthcare supply chains, address issues that affect medical distribution system and focus on last-mile deliveries.</span></span></span></span></li> </ul> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'medicine-from-the-sky-telangana-govt-wef', 'image' => 'https://www.mediafire.com/convkey/041e/p6emt51sxhhfddv6g.jpg', 'fbimage' => 'https://www.mediafire.com/convkey/041e/p6emt51sxhhfddv6g.jpg', 'metatitle' => 'Medicine From the Sky: Telangana Govt,', 'metakeyword' => 'Telangana Government and World Economic Forum's Centre for Fourth Industrial Revolution Network signed MoU to launch ‘Medicine from the Sky’ project', 'metadescription' => 'Telangana Government and World Economic Forum's Centre for Fourth Industrial Revolution Network signed MoU to launch ‘Medicine from the Sky’ project', 'author' => 'Nikhil Paigude', 'downlaodpdf' => 'https://www.mediafire.com/file/vqikearebqzth18/Medicine_From_the_Sky.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 20 => object(Cake\ORM\Entity) { 'tag' => 'IT, Mobile & Computers', 'keyword' => 'IT-Mobile-Computers', 'id' => (int) 1785, 'title' => 'ICMR launches National Data Quality Forum', 'description' => '<h2 style="margin-left:0in; margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-size:9.0pt"><span style="font-family:"Quicksand","serif"">Indian Council of Medical Research (ICMR) has launched National Data Quality Forum (NDQF) to improve data collection and use. NDQF aims to generate meaningful dialogue around improvement of data quality in general, and for health and medical research in particular.</span></span></span></span></h2> <p style="margin-left:0in; margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-size:9.0pt"><span style="font-family:"Quicksand","serif"">About National Data Quality Forum (NDQF)</span></span></strong></span></span></p> <ul> <li><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-size:9.0pt"><span style="font-family:"Quicksand","serif"">It aims to serve an integrated national-level platform to improve quality of health and demographic data by generating meaningful dialogue around the improvement of data quality in general, and for health and medical research in particular.</span></span></span></span></li> <li><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-size:9.0pt"><span style="font-family:"Quicksand","serif"">Launched by:</span></span></strong><span style="font-size:9.0pt"><span style="font-family:"Quicksand","serif""> ICMR’s National Institute for Medical Statistics (ICMR-NIMS) in partnership with Population Council (an international non-profit NGO that conducts research in biomedicine and social science).</span></span></span></span></li> <li><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-size:9.0pt"><span style="font-family:"Quicksand","serif"">Purpose of NDQF:</span></span></strong><span style="font-size:9.0pt"><span style="font-family:"Quicksand","serif""> It will bring all relevant stakeholders, subject matter experts, industry leaders, decision makers, and data scientists/analysts on common platform for discussing improvements in the quality of data ecosystem in India. </span></span></span></span></li> <li><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-size:9.0pt"><span style="font-family:"Quicksand","serif"">It will integrate learnings from scientific and evidence-based initiatives and guide actions through periodic workshops and conferences. </span></span></span></span></li> <li><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-size:9.0pt"><span style="font-family:"Quicksand","serif"">Its activities will help to establish good practices and protocols of data collection, storage, use and dissemination that can be applied to health and demographic data, as well as can be replicated across other industries and sectors also.</span></span></span></span></li> <li><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-size:9.0pt"><span style="font-family:"Quicksand","serif"">It will also do brainstorming, piloting and employ advanced modeling techniques in artificial intelligence (AI), machine learning (ML) and big data analytics along with using technology-based solutions to improve data quality.</span></span></span></span></li> </ul> <p style="margin-left:0in; margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-size:9.0pt"><span style="font-family:"Quicksand","serif"">About National Institute for Medical Statistics</span></span></strong></span></span></p> <p style="margin-left:0in; margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-size:9.0pt"><span style="font-family:"Quicksand","serif"">It is one of the permanent institutes of Institutes of Indian Council of Medical Research (ICMR), New Delhi. It was established in 1977. It is India’s only institute to coordinate and standardize collection of medical and health statistics in the country. Its mandate is to provide technical expertise on research methodology, programme evaluation, mathematical modeling, data analysis etc.</span></span></span></span></p> <p style="margin-left:0in; margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-size:9.0pt"><span style="font-family:"Quicksand","serif"">NIMS’s Major Achievements: I</span></span></strong><span style="font-size:9.0pt"><span style="font-family:"Quicksand","serif"">t has established India's first Clinical Trials Registry, in collaboration with the Department of Science and Technology and World Health Organisation (WHO). It has been identified as national nodal agency for the implementation of Integrated Disease Surveillance Project (IDSP)-Non-Communicable Disease ( IDSP- NCD) risk factor survey. It has developed Integrated Behavioural and Biological Assessment on National Highways (IBBA-NH) among trackers for HIV epidemic in the country. </span></span></span></span></p> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'icmr-launches-national-data-quality-forum', 'image' => 'https://www.mediafire.com/convkey/4f9e/lhykcte32rwj92k6g.jpg', 'fbimage' => 'https://www.mediafire.com/convkey/4f9e/lhykcte32rwj92k6g.jpg', 'metatitle' => 'ICMR launches National Data Quality', 'metakeyword' => 'Indian Council of Medical Research (ICMR) has launched National Data Quality Forum (NDQF) to improve data collection and use.', 'metadescription' => 'Indian Council of Medical Research (ICMR) has launched National Data Quality Forum (NDQF) to improve data collection and use.', 'author' => 'Nikhil Paigude', 'downlaodpdf' => 'https://www.mediafire.com/file/h827kq202fy1l9k/ICMR_launches_National_Data_Quality_Forum.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 21 => object(Cake\ORM\Entity) { 'tag' => 'IT, Mobile & Computers', 'keyword' => 'IT-Mobile-Computers', 'id' => (int) 1959, 'title' => 'Brain-computer interface for stroke patients', 'description' => '<p style="margin-left:0in; margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-size:12.0pt"><span style="font-family:"Times New Roman","serif"">Issue</span></span></strong></span></span></p> <p style="margin-left:0in; margin-right:0in"> </p> <p style="margin-left:0in; margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Times New Roman","serif"">IIT Palakkad researchers have found a way to improve the functioning of the brain-computer interface when used by stroke patients.</span></span></span></p> <p style="margin-left:0in; margin-right:0in"> </p> <p style="margin-left:0in; margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-size:12.0pt"><span style="font-family:"Times New Roman","serif"">Background</span></span></strong></span></span></p> <p style="margin-left:0in; margin-right:0in"> </p> <p style="margin-left:0in; margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="background-color:white"><span style="font-family:"Times New Roman","serif""><span style="color:#222222">Stroke</span></span></span><span style="background-color:white"><span style="font-family:"Times New Roman","serif""><span style="color:#222222"> is a disease that affects the arteries leading to and within the brain. It is one of the major cause of death and a leading cause of disability.</span></span></span></span></span></p> <p style="margin-left:0in; margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="background-color:white"><span style="font-family:"Times New Roman","serif""><span style="color:#222222">A stroke occurs when a blood vessel that carries oxygen and nutrients to the brain is either blocked by a clot or bursts.</span></span></span></span></span></p> <p style="margin-left:0in; margin-right:0in"> </p> <p style="margin-left:0in; margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-size:12.0pt"><span style="font-family:"Times New Roman","serif"">Importance of Discovery</span></span></strong></span></span></p> <ul> <li><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="background-color:white"><span style="font-family:"Times New Roman","serif""><span style="color:#222222">Stroke patients undergo a passive rehabilitation therapy where the patient plays a passive role while the physiotherapist actively helps by moving the patient’s paralyzed limb.</span></span></span></span></span></li> <li><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="background-color:white"><span style="font-family:"Times New Roman","serif""><span style="color:#222222"> Development of the motor imagery brain-computer interface can help develop an active rehabilitation therapy where the patient can move his limb according to his own movement intention</span></span></span><span style="background-color:whitesmoke"><span style="font-family:"Times New Roman","serif"">.</span></span></span></span></li> </ul> <p style="margin-left:0in; margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-size:12.0pt"><span style="background-color:white"><span style="font-family:"Times New Roman","serif""><span style="color:#222222">Drawbacks</span></span></span></span></strong></span></span></p> <ul> <li><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="background-color:white"><span style="font-family:"Times New Roman","serif""><span style="color:#222222">Communication certainly improves as the number of channels electrodes attached to the brain region is increased. But the drawback is that increasing the channels makes computation more complex, increases preparation time and is inconvenient for the person.</span></span></span></span></span></li> </ul> <p style="margin-left:0in; margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-size:12.0pt"><span style="background-color:white"><span style="font-family:"Times New Roman","serif""><span style="color:#222222">Details</span></span></span></span></strong></span></span></p> <p style="margin-left:0in; margin-right:0in"> </p> <p style="margin-left:0in; margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="background-color:white"><span style="font-family:"Times New Roman","serif""><span style="color:#222222">Researchers have used a trained neural network, with inputs from neuroscience, to develop a new channel-selection method that makes the process more efficient and effective. The method employed is more efficient and works in most of the cases.</span></span></span></span></span></p> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'brain-computer-interface-for-stroke-patients', 'image' => 'https://www.mediafire.com/convkey/5d45/xd129igz8ex0egm6g.jpg', 'fbimage' => 'https://www.mediafire.com/convkey/5d45/xd129igz8ex0egm6g.jpg', 'metatitle' => 'Brain-computer interface for stroke patients', 'metakeyword' => 'Brain-computer interface for stroke patients', 'metadescription' => 'IIT Palakkad researchers have found a way to improve the functioning of the brain-computer interface when used by stroke patients.', 'author' => null, 'downlaodpdf' => 'https://www.mediafire.com/file/ehwmhd6h20mxbn5/Brain-computer_interface_for_stroke_patients.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 22 => object(Cake\ORM\Entity) { 'tag' => 'IT, Mobile & Computers', 'keyword' => 'IT-Mobile-Computers', 'id' => (int) 2037, 'title' => 'Smartphone app to make eye screening affordable', 'description' => '<p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-size:12.0pt"><span style="font-family:"Times New Roman","serif"">Issue</span></span></strong></span></span></p> <p style="margin-right:0in"> </p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="background-color:white"><span style="font-family:"Times New Roman","serif""><span style="color:#222222">Engineering students from a college affiliated to Jawaharlal Nehru Technological University (JNTU), Hyderabad, have developed a device and mobile app called <strong>iNethra</strong> to make vision screening easy, accessible and affordable.</span></span></span></span></span></p> <p style="margin-right:0in"> </p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-size:12.0pt"><span style="font-family:"Times New Roman","serif"">Background</span></span></strong></span></span></p> <p style="margin-right:0in"> </p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="background-color:white"><span style="font-family:"Times New Roman","serif""><span style="color:#222222">A vision screening, also called an eye test, is a brief exam that looks for potential vision problems and eye disorders. Vision screenings are often done by primary care providers.</span></span></span></span></span></p> <p style="margin-right:0in"> </p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-size:12.0pt"><span style="font-family:"Times New Roman","serif"">Details</span></span></strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-family:"Times New Roman","serif"">iNethra</span></strong><span style="font-family:"Times New Roman","serif"">, the product, comprises of a handy, stick-like device with a lens on one end and connected to a smart phone camera on the other side. </span></span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Times New Roman","serif"">While this helps in clicking the retinal image of the patients, the mobile app helps in sharing and receiving information related to the eye condition. </span></span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Times New Roman","serif"">The clicked images are uploaded to the app for the doctor to access and analyse them. </span></span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Times New Roman","serif"">There is a provision in the app for the doctor to note details about the eye condition, provide tips and if required refer them to hospitals. This will improvise the device and cut down the costs.</span></span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Times New Roman","serif""> Initially, the app will be based on B2B (business-to-business) model under which partner eye clinics would approach patients coming to public health centres.</span></span></span></p> </li> </ul> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-size:12.0pt"><span style="font-family:"Times New Roman","serif"">Eye related problems</span></span></strong></span></span></p> <p style="margin-right:0in"> </p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="background-color:white"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Times New Roman","serif"">Vision screening is most often used to check for possible vision problems in children. The most common eye disorders in children include:</span></span></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="background-color:white"><span style="font-family:Calibri,sans-serif"><strong><span style="font-family:"Times New Roman","serif"">Amblyopia,</span></strong><span style="font-family:"Times New Roman","serif""> also known as lazy eye. Children with amblyopia have blurry or reduced vision in one eye.</span></span></span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="background-color:white"><span style="font-family:Calibri,sans-serif"><strong><span style="font-family:"Times New Roman","serif"">Strabismus</span></strong><span style="font-family:"Times New Roman","serif"">, also known as crossed eyes. In this disorder, the eyes don't line up right and point in different directions.</span></span></span></span></p> </li> </ul> <p style="margin-right:0in"><strong><span style="font-size:11pt"><span style="background-color:white"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Times New Roman","serif"">Other eye problems:</span></span></span></span></strong></p> <ul> <li> <p><span style="font-size:11pt"><span style="background-color:white"><span style="font-family:Calibri,sans-serif"><strong><span style="font-family:"Times New Roman","serif"">Nearsightedness</span></strong><span style="font-family:"Times New Roman","serif""> (myopia), a condition that makes far away things look blurry</span></span></span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="background-color:white"><span style="font-family:Calibri,sans-serif"><strong><span style="font-family:"Times New Roman","serif"">Farsightedness</span></strong><span style="font-family:"Times New Roman","serif""> (hyperopia), a condition that makes close-up things look blurry</span></span></span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="background-color:white"><span style="font-family:Calibri,sans-serif"><strong><span style="font-family:"Times New Roman","serif"">Astigmatism</span></strong><span style="font-family:"Times New Roman","serif"">, a condition that makes both close-up and far-away things look blurry</span></span></span></span></p> </li> </ul> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'smartphone-app-to-make-eye-screening', 'image' => 'https://www.mediafire.com/convkey/4edd/03po1myuequfgqc6g.jpg', 'fbimage' => 'https://www.mediafire.com/convkey/4edd/03po1myuequfgqc6g.jpg', 'metatitle' => 'Smartphone app to make eye screening affordable', 'metakeyword' => 'Smartphone app to make eye screening affordable, Smartphone app', 'metadescription' => 'A vision screening, also called an eye test, is a brief exam that looks for potential vision problems and eye disorders. Vision screenings are often done by primary', 'author' => null, 'downlaodpdf' => 'https://www.mediafire.com/file/u4efenue2hpf8tm/Smartphone_app_to_make_eye_screening_affordable.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 23 => object(Cake\ORM\Entity) { 'tag' => 'IT, Mobile & Computers', 'keyword' => 'IT-Mobile-Computers', 'id' => (int) 2038, 'title' => 'QR code for women safety', 'description' => '<p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-size:12.0pt"><span style="font-family:"Times New Roman","serif"">Issue</span></span></strong></span></span></p> <p style="margin-right:0in"> </p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Times New Roman","serif"">Delhi Police have fitted atleat 1500 taxis and autos outside railway and metro stations, and airport with QR codes. This feature is meant to ensure only verified drivers ferry passengers.</span></span></span></p> <p style="margin-right:0in"> </p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-size:12.0pt"><span style="font-family:"Times New Roman","serif"">Background</span></span></strong></span></span></p> <p style="margin-right:0in"> </p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Times New Roman","serif"">Delhi Lieutenant Governor Anil Baijlal launched the “QR Code” scheme, which will be delivered through Delhi Police’s “Himmat Plus” app which is meant to ensure the safety of women. </span></span></span></p> <p style="margin-right:0in"> </p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-size:12.0pt"><span style="font-family:"Times New Roman","serif"">Details</span></span></strong></span></span></p> <ul> <li><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Times New Roman","serif"">The QR codes will be put on public transport vehicles such as auto-rickshaws and non-app (black-and-yellow) cabs. Passengers, especially women, will be able to verify the details of drivers, and send a distress signal in an emergency.</span></span></span></li> <li><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Times New Roman","serif"">The code can be scanned by using the Himmat Plus app. If a user chooses to report the journey using the ‘Report Journey’ button, the app will send the passenger’s location and the driver’s unique ID to the police.</span></span></span></li> <li><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Times New Roman","serif"">In case the driver is not registered, the passenger can call the police control room in case of an emergency, or tap the ‘SOS’ button on the app.</span></span></span></li> </ul> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-size:12.0pt"><span style="font-family:"Times New Roman","serif"">Himmat Plus app</span></span></strong></span></span></p> <ul> <li><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Times New Roman","serif"">The Himmat Plus app was launched in 2015 to allow users to make a distress call or send an emergency message to Delhi Police and the emergency contact.</span></span></span></li> <li><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Times New Roman","serif"">While the Himmat Plus app is targeted at women’s safety, both men and women can register themselves.</span></span></span></li> </ul> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'qr-code-for-women-safety', 'image' => 'https://www.mediafire.com/convkey/132d/ouxzaa3r8joi9kf6g.jpg', 'fbimage' => 'https://www.mediafire.com/convkey/132d/ouxzaa3r8joi9kf6g.jpg', 'metatitle' => 'QR code for women safety', 'metakeyword' => 'QR code for women safety', 'metadescription' => 'Delhi Police have fitted atleat 1500 taxis and autos outside railway and metro stations, and airport with QR codes. ', 'author' => null, 'downlaodpdf' => 'https://www.mediafire.com/file/aofvw8kgx9zat20/QR_code_for_women_safety.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 24 => object(Cake\ORM\Entity) { 'tag' => 'IT, Mobile & Computers', 'keyword' => 'IT-Mobile-Computers', 'id' => (int) 2063, 'title' => 'Regulating social media and Regulation', 'description' => '<p><span style="font-family:Calibri,sans-serif"><strong><span style="font-size:12.0pt"><span style="font-family:"Times New Roman","serif"">Issue</span></span></strong></span></p> <p> </p> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Times New Roman","serif"">The Supreme Court recently stressed the need to find a balance between the right to online privacy and the right of the state to detect people who use the web to spread panic and commit crimes.</span></span></span></p> <p> </p> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-size:12.0pt"><span style="font-family:"Times New Roman","serif"">Background</span></span></strong></span></span></p> <p> </p> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Times New Roman","serif"">There has been a surge in the use of messaging apps such as WhatsApp. At the same time, there has been an increase in fake news and rumour-mongering leading to lynchings. The relation between fake news and socila media usage is unprecidented.</span></span></span></p> <p> </p> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-size:12.0pt"><span style="font-family:"Times New Roman","serif"">Details</span></span></strong></span></span></p> <ul> <li style="list-style-type:none"> </li> <li><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Times New Roman","serif"">Fake news is not something that has been catalysed in the digital age alone instead it has been a long-standing problem.</span></span></span></li> <li><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Times New Roman","serif"">The problem has been not restricted to India alone instead it has been discovered in places like Hong Kong too. Instances where state-sponsored elements were perpetrating fake news and sophisticated disinformation campaigns against protesters in Hong Kong has been found.</span></span></span></li> <li><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Times New Roman","serif"">Companies like WhatsApp has been trying to resist this idea of message traceability, it is also trying to maintain the integrity of the platform.</span></span></span></li> </ul> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-size:12.0pt"><span style="font-family:"Times New Roman","serif"">Social Media and Fake news</span></span></strong></span></span></p> <ul> <li style="list-style-type:none"> </li> <li><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Times New Roman","serif"">WhatsApp has tried to limit forwards to five people and the norm has been tested. It has been piloted in other parts of the world as well.</span></span></span></li> <li><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Times New Roman","serif"">Fact propagators, fake news busters have been used to clear the myths by tracing origin of fake messages. Habitual and intentional acts are to be seriously punished.</span></span></span></li> <li><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Times New Roman","serif"">Explosive growth in regulatory guidelines have been initiated. These guidelines from the government have been trying to enhance the agency of the government over technology companies.</span></span></span></li> </ul> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-size:12.0pt"><span style="font-family:"Times New Roman","serif"">Social Media</span></span></strong></span></span></p> <p> </p> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Times New Roman","serif"">Social media are interactive computer-mediated technologies that facilitate the creation and sharing of information, ideas, career interests and other forms of expression via virtual communities and networks.</span></span></span></p> <p> </p> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-family:"Times New Roman","serif"">Importance of Social Media</span></strong></span></span></p> <ul> <li style="list-style-type:none"> </li> <li><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Times New Roman","serif"">Social media are not just used for the purpose of messaging. They are, for many people, information discovery platforms.</span></span></span></li> <li><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Times New Roman","serif"">Retailers who use social media as an integral part of their marketing strategy usually see measurable results.</span></span></span></li> </ul> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'regulating-social-media-and-regulation', 'image' => 'https://www.mediafire.com/convkey/e76b/3cy13q3arzj3b1u6g.jpg', 'fbimage' => 'https://www.mediafire.com/convkey/e76b/3cy13q3arzj3b1u6g.jpg', 'metatitle' => 'Regulating social media and Regulation', 'metakeyword' => 'Regulating social media and Regulation', 'metadescription' => 'Social media are interactive computer-mediated technologies that facilitate the creation and sharing of information, ideas, career interests and other forms ', 'author' => null, 'downlaodpdf' => 'https://www.mediafire.com/file/gzpb1s9iypezbge/Regulating_social_media_and_Regulation.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 25 => object(Cake\ORM\Entity) { 'tag' => 'IT, Mobile & Computers', 'keyword' => 'IT-Mobile-Computers', 'id' => (int) 2070, 'title' => 'Singapore’s autonomous cars', 'description' => '<p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-size:12.0pt"><span style="font-family:"Times New Roman","serif"">Issue</span></span></strong></span></span></p> <p> </p> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="background-color:white"><span style="font-family:"Times New Roman","serif""><span style="color:black">The first autonomous public bus service in Singapore will be launched in three districts of Singapore’s Innovation District where driver-less buses and shuttles will be used for off-peak and on-demand commuting by 2022. </span></span></span></span></span></p> <p> </p> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-size:12.0pt"><span style="font-family:"Times New Roman","serif"">Background</span></span></strong></span></span></p> <p> </p> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="background-color:white"><span style="font-family:"Times New Roman","serif""><span style="color:black">Autonomous vehicles are driver less vehicles and the ones being designed by ST Engineering are 100 percent electric. These buses will be equipped with a multi-sensor technology that will optimise navigation and safety features.</span></span></span></span></span></p> <p> </p> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-size:12.0pt"><span style="font-family:"Times New Roman","serif"">Details</span></span></strong></span></span></p> <ul> <li><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="background-color:white"><span style="font-family:"Times New Roman","serif""><span style="color:black">This will be the island nation’s first on-demand autonomous shuttle vehicle trial since autonomous testing of vehicles began in June 2018. </span></span></span></span></span></li> <li><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="background-color:white"><span style="font-family:"Times New Roman","serif""><span style="color:black">People visiting the area will be able to hail an autonomous shuttle using the “Ride Now Sentosa” mobile application free of charge.</span></span></span></span></span></li> <li><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="background-color:white"><span style="font-family:"Times New Roman","serif""><span style="color:black">As a precautionary measure, on every vehicle, a “safety driver” will be present who can take charge of the vehicle if the need arises. </span></span></span></span></span></li> <li><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="background-color:white"><span style="font-family:"Times New Roman","serif""><span style="color:black">The vehicle fault system will alert the safety driver if it detects any faults in the system. Road users and pedestrians will be intimated with electric signage telling them that the vehicles are driverless.</span></span></span></span></span></li> <li><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="background-color:white"><span style="font-family:"Times New Roman","serif""><span style="color:black">The AVs are equipped with collision & obstacle avoidance and overtaking features, remote control, radar, LiDAR (Light detection and ranging), odometry, computer vision and 360-degree sensors. They also have embedded cybersecurity features that protect the vehicles from intrusion and deter hacking.</span></span></span></span></span></li> <li><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="background-color:white"><span style="font-family:"Times New Roman","serif""><span style="color:black"> The AVs’ charge ranges from 50 km to 150 km per charge depending on the operating scenario.</span></span></span></span></span></li> </ul> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-size:12.0pt"><span style="background-color:white"><span style="font-family:"Times New Roman","serif""><span style="color:black">Autonomous vehicles readiness index</span></span></span></span></strong></span></span></p> <ul> <li><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="background-color:white"><span style="font-family:"Times New Roman","serif""><span style="color:black">The “Autonomous Vehicles Readiness Index”, prepared by KPMG, has ranked 25 countries based on their preparedness for autonomous vehicles.</span></span></span></span></span></li> <li><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="background-color:white"><span style="font-family:"Times New Roman","serif""><span style="color:black">The report assesses countries based on 25 variables. These four pillars are – policy and legislation, consumer acceptance, infrastructure and technology, and innovation.</span></span></span></span></span></li> </ul> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'singapores-autonomous-cars', 'image' => 'https://www.mediafire.com/convkey/4ef9/f805so060gvd4h66g.jpg', 'fbimage' => 'https://www.mediafire.com/convkey/4ef9/f805so060gvd4h66g.jpg', 'metatitle' => 'Singapore’s autonomous cars', 'metakeyword' => 'Singapore’s autonomous cars', 'metadescription' => 'The first autonomous public bus service in Singapore will be launched in three districts of Singapore’s Innovation District where driver-less buses', 'author' => null, 'downlaodpdf' => 'https://www.mediafire.com/file/69flxivqdu8dnmg/Singapore%C6s_autonomous_cars.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 26 => object(Cake\ORM\Entity) { 'tag' => 'IT, Mobile & Computers', 'keyword' => 'IT-Mobile-Computers', 'id' => (int) 2135, 'title' => 'Facial recognition for teacher’s attendence', 'description' => '<p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:"Calibri","sans-serif""><strong>Issue</strong></span></span></p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:"Calibri","sans-serif"">To curb absenteeism at government schools, the Gujarat government on September 5 launched a facial recognition-based biometric online attendance system across 40,000 primary schools.</span></span></p> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:"Calibri","sans-serif""><strong>Background</strong></span></span></p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:"Calibri","sans-serif""> Parents have complained of “proxy teachers”, especially in the interior rural areas where some teachers send unqualified individuals to teach in their place. The geo-fenced biometric attendance system is intended to stop such corruption.</span></span></p> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:"Calibri","sans-serif""><strong>Details</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:"Calibri","sans-serif"">The State Education Department will distribute tablets equipped with geo-tagging and biometrics software to all schools in the next two months.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:"Calibri","sans-serif"">The app is optimised with an intelligent algorithm that will record facial features of the teachers at the time of the registration, such that a minor variation will not be a hindrance in the recognition.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:"Calibri","sans-serif"">The use of this technology is on a pilot basis and hence has been installed only on the tablets already provided. There are also plans to extend this feature to all government departments.</span></span></p> </li> </ul> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:"Calibri","sans-serif""><strong>Concerns</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:"Calibri","sans-serif"">Section of teachers have protested against the introduction of the facial recognition-based attendance system, citing privacy concerns. </span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:"Calibri","sans-serif"">Teachers have demanded that the state government should provide at least one smartphone to each school with internet connectivity. This issue has now been resolved with the distribution of the tablets<span style="font-size:13.5pt"><span style="background-color:white"><span style="font-family:"Arial","sans-serif""><span style="color:black">.</span></span></span></span></span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:"Calibri","sans-serif""> <span style="background-color:white"><span style="color:black">The schools located in isolated locations face problem of network connectivity. This will hinder the successful implementation of the scheme.</span></span></span></span></p> </li> </ul> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'facial-recognition-teachers-attendence', 'image' => 'https://www.mediafire.com/convkey/b772/vq0dwkjpz9qqwmt6g.jpg', 'fbimage' => 'https://www.mediafire.com/convkey/b772/vq0dwkjpz9qqwmt6g.jpg', 'metatitle' => 'Facial recognition for teacher’s attendence', 'metakeyword' => 'Facial recognition for teacher’s attendence', 'metadescription' => 'Section of teachers have protested against the introduction of the facial recognition-based attendance system, citing privacy concerns. ', 'author' => null, 'downlaodpdf' => 'https://www.mediafire.com/file/v9ahp0ck80el9zn/Facial_recognition_for_teacher%C6s_attendence.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 27 => object(Cake\ORM\Entity) { 'tag' => 'IT, Mobile & Computers', 'keyword' => 'IT-Mobile-Computers', 'id' => (int) 2238, 'title' => 'Ecuador’s online data leak', 'description' => '<p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Issue</strong></span></span></p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Almost the entire population of <a href="https://www.thehindu.com/tag/297-244/ecuador/?utm=bodytag" target="_blank">Ecuador<strong> </strong></a>had their personal data leaked online due to a massive breach from a private unsecured server.</span></span></p> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Details</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">A security company <strong>vpnMentor </strong>has uncovered the breach on the server run by the firm <strong>Novaestrat</strong>, which included citizens' full names, dates and places of birth, education levels, phone numbers and national identity card numbers.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">It is said that there was even data on the country's president and on Julian Assange, the Wikileaks founder who had obtained asylum in Ecuador embassy.</span></span></p> </li> </ul> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Data Theft</strong></span></span></p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">A data breach, or data leak, is a security event in which protected data is accessed by or disclosed to unauthorized viewers.</span></span></p> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Methods of data theft</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Cyber attacks</strong> — Hackers use malware, phishing, social engineering, skimming and related techniques to gain access to protected information.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Theft or loss of devices</strong> — Laptops, smartphones, thumb drives and other data storage media can be lost, stolen or disposed of improperly. If they contain protected information and it ends up in the wrong hands, that’s a data breach.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Employee data theft or data leak</strong> — Employees, especially those who are departing soon, might deliberately access protected information without authorization with malicious intent.</span></span></p> </li> </ul> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Preventing data theft</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Protection- </strong>Protecting your data by implementing appropriate safeguards..</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Encryption- </strong>properly encrypted data will be useless for malicious actors; they won’t be able to sell it or use it against you or the individuals whose data they stole.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Employee training and awareness- </strong>Properly training employees to handle threats posed by data attacks so that they can prevent further mishaps<strong>.</strong></span></span></p> </li> </ul> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'ecuadors-online-data-leak', 'image' => 'https://www.mediafire.com/convkey/9e7a/avfpg44y932v5mo6g.jpg', 'fbimage' => 'https://www.mediafire.com/convkey/9e7a/avfpg44y932v5mo6g.jpg', 'metatitle' => 'Ecuador’s online data leak', 'metakeyword' => 'Encryption- properly encrypted data will be useless for malicious ', 'metadescription' => 'Encryption- properly encrypted data will be useless for malicious actors; they won’t be able to sell it or use it against you or the individuals whose data they stole.', 'author' => null, 'downlaodpdf' => 'https://www.mediafire.com/file/def8xwczok3zv37/Ecuador%C6s_online_data_leak.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 28 => object(Cake\ORM\Entity) { 'tag' => 'IT, Mobile & Computers', 'keyword' => 'IT-Mobile-Computers', 'id' => (int) 2353, 'title' => 'Intelligent apps (I-apps)', 'description' => '<p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Issue</strong></span></span></p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"> Making use of historical and real-time datasets, I- app platforms are empowering the potential for hypotheses made by machines.</span></span></p> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Background</strong></span></span></p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Intelligent Apps are the applications which acquire real-time and historical data from user interactions and other sources in order to provide suggestions and make predictions.</span></span></p> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Details</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">These apps are capable of converging database and data warehouse workloads, operating with Artificial Intelligence and machine learning.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Today’s digital natives demand much more than simple mobile-enabled access to key business applications and data. They anticipate intelligent user experience and highly usable as offered by consumer apps. And, intelligent apps assure to provide the same.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Artificial intelligence is used in developing an intelligent application that is much sophisticated by having algorithms.It automates how much tasks to be performed.</span></span></p> </li> </ul> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Features of I-apps</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">I-apps work on a vast amount of data, it is able to read and store a vast array of human interactions.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">It provides higher returns on investment.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">It also allows users to do away with the need to use the business key.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">I-app contributes to enhancing output, boost up response time.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">apps have the ability to provide just the right information to do their current job in an effective manner.</span></span></p> </li> </ul> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Some examples of I-apps</strong></span></span></p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Cortana</strong>- Asssistant app developed by Microsoft.</span></span></p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Google Allo </strong>– Specch to text output</span></span></p> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'intelligent-apps-i-apps', 'image' => 'https://www.mediafire.com/convkey/c924/vilbo65kqshj1236g.jpg', 'fbimage' => 'https://www.mediafire.com/convkey/c924/vilbo65kqshj1236g.jpg', 'metatitle' => 'Intelligent apps (I-apps)', 'metakeyword' => 'Today’s digital natives demand much more than simple', 'metadescription' => 'Today’s digital natives demand much more than simple mobile-enabled access to key business applications and data. They anticipate intelligent user experience ', 'author' => null, 'downlaodpdf' => 'https://www.mediafire.com/file/5vezr5f2cuhit6l/Intelligent_apps_%28I-apps%29.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 29 => object(Cake\ORM\Entity) { 'tag' => 'IT, Mobile & Computers', 'keyword' => 'IT-Mobile-Computers', 'id' => (int) 2375, 'title' => 'Quantum supremacy', 'description' => '<p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Issue</strong></span></span></p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Google has claimed to have achieved ‘quantum supremacy’. That means that researchers at Google had solved a really difficult problem in seconds with the help of quantum computers which a supercomputer could not.</span></span></p> <p style="margin-right:0in"> </p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Background</strong></span></span></p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The research paper is yet to be formally approved by peers in the field and became public after having appeared briefly on the National Aeronautics and Space Administration (NASA) website as apparently some of its researchers were involved in the project.</span></span></p> <p style="margin-right:0in"> </p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Details</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Exploiting the principles of quantum mechanics, these computers can easily tackle computational problems that may be tough for the classical computer as the size of the numbers and number of inputs involved grows bigger.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Conventional computers process information in ‘bits’ or 1s and 0s, following classical physics under which our computers can process a ‘1’ or a ‘0’ at a time. </span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Quantum computers compute in ‘qubits’ (or quantum bits). They exploit the properties of quantum mechanics, the science that governs how matter behaves on the atomic scale. In this scheme of things, processors can be a 1 and a 0 simultaneously, a state called quantum superposition. </span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">While this accelerates the speed of computation, a machine with less than a 100 qubits can solve problems with a lot of data that are even theoretically beyond the capabilities of the most powerful supercomputers.</span></span></p> </li> </ul> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Benefits of Quantum Computers</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">A quantum computer can solve this problem rapidly because it can attack complex problems that are beyond the scope of a classical computer.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The basic advantage is speed, as it is able to simulate several classical computers working in parallel. </span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Several encryption systems used in banking and security applications are premised on computers being unable to handle mathematical problems that are computationally demanding beyond a limit. Quantum computers, in theory, can surpass those limits.</span></span></p> </li> </ul> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'quantum-supremacy', 'image' => 'https://www.mediafire.com/convkey/7592/cpwa60ps0jlm1hx6g.jpg', 'fbimage' => 'https://www.mediafire.com/convkey/7592/cpwa60ps0jlm1hx6g.jpg', 'metatitle' => 'Quantum supremacy', 'metakeyword' => 'Quantum supremacy', 'metadescription' => 'Google has claimed to have achieved ‘quantum supremacy’. That means that researchers at Google had solved a really difficult problem in seconds ', 'author' => null, 'downlaodpdf' => 'https://www.mediafire.com/file/xpmrz68pywws366/Quantum_supremacy.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 30 => object(Cake\ORM\Entity) { 'tag' => 'IT, Mobile & Computers', 'keyword' => 'IT-Mobile-Computers', 'id' => (int) 2421, 'title' => 'Access to encrypted messages', 'description' => '<p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Issue</strong></span></span></p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Facebook and WhatsApp will be forced to share the encrypted messages of users with the British police, thanks to a treaty between the US and UK.</span></span></p> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Background</strong></span></span></p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"> The data will be required to support investigations into suspects of serious criminal offenses such as terrorism and pedophilia. The treaty is due to be signed next month.</span></span></p> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Details</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The UK and the US will not investigate each other’s citizens under the accord.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Facebook opposed the move and said that the deal undermines privacy and security of its users everywhere.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Government policies like the Cloud Act will allow companies to provide available information when valid legal requests are made and do not require companies to ignore.</span></span></p> </li> </ul> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>CLOUD Act</strong></span></span></p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The CLOUD Act or Clarifying Lawful Overseas Use of Data Act, makes it easier for law enforcement agencies to demand online information.</span></span></p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Under the Act, the data stored in any country can be demanded by the agencies.</span></span></p> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Indian Context</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The ministry of home affairs (MHA) had issued a notification authorising 10 central agencies to intercept, monitor, or decrypt digital communications.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The government is seeking to propose amendments to the Information Technology (IT) Act. The new changes seek to trace and access “unlawful” online content<strong>.</strong></span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The government stipulates that an online platform must comply with any “lawful order” to provide information or assistance within 72 hours of receiving it from any government agencies.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The amendments also require that encryption be broken to trace the origins of messages.</span></span></p> </li> </ul> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Implications</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Asking companies to break end-to-end encryption would threaten user privacy and free speech.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">This may pave the way for iron fisted approach by the government towards free speech and can ultimately lead to state imposed censorship.</span></span></p> </li> </ul> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'access-to-encrypted-messages', 'image' => 'https://www.mediafire.com/convkey/55cc/bgw5ucnlo0o1ydk6g.jpg', 'fbimage' => 'https://www.mediafire.com/convkey/55cc/bgw5ucnlo0o1ydk6g.jpg', 'metatitle' => 'Access to encrypted messages', 'metakeyword' => ' The data will be required to support investigations into suspects', 'metadescription' => ' The data will be required to support investigations into suspects of serious criminal offenses such as terrorism and pedophilia. The treaty is due to be signed next month.', 'author' => null, 'downlaodpdf' => 'https://www.mediafire.com/file/q03sv986rh6pn01/Access_to_encrypted_messages.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 31 => object(Cake\ORM\Entity) { 'tag' => 'IT, Mobile & Computers', 'keyword' => 'IT-Mobile-Computers', 'id' => (int) 2486, 'title' => 'GEMINI system', 'description' => '<p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Issue</strong></span></span></p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The government departments, research agencies and private companies have developed GEMINI, a portable receiver linked to ISRO-satellites, that is fail-proof and warn fishermen of danger.</span></span></p> <p style="margin-right:0in"> </p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Background</strong></span></span></p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Fishermen away on fishing are cut off from communication services and face threats from disasters.</span></span></p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Mobile phone frequencies cannot be accessed 10-12 km beyond the coast and by using GEMINI this range can increase to 300 nautical miles.</span></span></p> <p style="margin-right:0in"> </p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Details</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">GEMINI is developed by The Indian National Centre for Ocean Information Services (INCOIS), along with Accord, a private company, to develop a box-shaped receiver that has an antenna and in-built battery that can last three to four days.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">GEMINI works on GAGAN, developed by ISRO and the Airports Authority of India and is an India-made global positioning system and relies on the positioning system by ISRO’s GSAT satellites.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">When GEMINI is connected to an app, it also lets fishermen know the probability of fish-catch in the surrounding seas and provides ocean forecast.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Ocean State Forecasts include the forecasts on winds, waves, ocean currents, water temperature, etc. at every 6 hrs on daily basis for next 5 days helping fishermen in maximizing their earnings, ensuring safety and in planning of fishing activities.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">With this device, fishermen outside the signal range of their phone companies can also access warnings and alerts.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The device only allows one-way communication as it can’t be used by fishermen to make calls, for instance.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The devices are also relatively expensive for the average fisherman but attempts are being made to subsidise it by as much as 90%.</span></span></p> </li> </ul> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'gemini-system', 'image' => 'https://www.mediafire.com/convkey/5179/knj8qdbhttpbpge6g.jpg', 'fbimage' => 'https://www.mediafire.com/convkey/5179/knj8qdbhttpbpge6g.jpg', 'metatitle' => 'GEMINI system | GEMINI', 'metakeyword' => 'GEMINI system, GEMINI', 'metadescription' => 'The government departments, research agencies and private companies have developed GEMINI, a portable receiver linked to ISRO-satellites', 'author' => null, 'downlaodpdf' => 'https://www.mediafire.com/file/hnz3gbw7z0mrsa2/GEMINI_system.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 32 => object(Cake\ORM\Entity) { 'tag' => 'IT, Mobile & Computers', 'keyword' => 'IT-Mobile-Computers', 'id' => (int) 2538, 'title' => 'FASTags', 'description' => '<p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Issue</strong></span></span></p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The government is planning to make FASTag the equivalent of Aadhaar for vehicles, which will allow the government to track their movement across the country.</span></span></p> <p style="margin-right:0in"> </p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Background</strong></span></span></p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Tracking and identifying vehicles is a tedious task with large resources needed for implementing. Lack of CCTV identification cameras across places makes the process even more difficult. FASTag is expected to perform this duty effectively.</span></span></p> <p style="margin-right:0in"> </p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Details</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">A FASTag is linked to a bank account. When a vehicle passes through a toll, an SMS with date, time and place of transaction will be sent to the owner of the vehicle.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The master data of all transactions will be with the owner of the toll booth concerned, along with the bank with which the owner has registered the FASTag and the National Payments Corporation of India.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">A FASTag uses Radio Frequency Identification (RFID) technology to make cashless payments through a prepaid account linked to it. </span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The tag is fixed to the windscreen of a vehicle and an RFID antenna in the canopy of the toll gate scans the QR code and the tag identification number, following which the boom barrier lifts to allow a vehicle to pass through it without the need for a vehicle to stop.</span></span></p> </li> </ul> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Advantages of FASTags</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">They are likely to reduce the nation’s GDP loss by bringing down loss of fuel while waiting at toll plazas.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">It reduces traffic jam and waiting period for travellers are toll gates, thereby making journeys free of hassles.</span></span></p> </li> </ul> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>RFID technology</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">RFID uses electromagnetic fields to automatically identify and track tags attached to objects. The tags contain electronically stored information.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Passive tags collect energy from a nearby RFID reader's interrogating radio waves.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Unlike a barcode, the tags don't need to be within the line of sight of the reader, so it may be embedded in the tracked object.</span></span></p> </li> </ul> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Applications</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">RFID tag attached to an automobile during production can be used to track its progress through the assembly line.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">RFID-tagged pharmaceuticals can be tracked through warehouses.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"> Implanting RFID microchips in livestock and pets enables positive identification of animals.</span></span></p> </li> </ul> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'fastags', 'image' => 'https://www.mediafire.com/convkey/63ce/fn66q1urtt1coib6g.jpg', 'fbimage' => 'https://www.mediafire.com/convkey/63ce/fn66q1urtt1coib6g.jpg', 'metatitle' => 'FASTags | Electronic Toll Collection on Toll Plazas on NH', 'metakeyword' => 'FASTags, Electronic Toll Collection on Toll Plazas on National Highways, Electronic Toll Collection', 'metadescription' => 'The government is planning to make FASTag the equivalent of Aadhaar for vehicles, which will allow the government to track their movement across the country.', 'author' => null, 'downlaodpdf' => 'https://www.mediafire.com/file/5kc41snm0dgxfja/FASTags.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 33 => object(Cake\ORM\Entity) { 'tag' => 'IT, Mobile & Computers', 'keyword' => 'IT-Mobile-Computers', 'id' => (int) 2588, 'title' => 'Crypto currencies', 'description' => '<p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Issue</strong></span></span></p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Finance minister Nirmala Sitharaman has cautioned aginst use of crypto currencies on an official basis, citing various threats posed by it.</span></span></p> <p style="margin-right:0in"> </p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Background</strong></span></span></p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The virtual currency came into spotlight after Facebook has planned to launch its virtual currency known as <strong><em>Libra</em></strong>.</span></span></p> <p style="margin-right:0in"> </p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Details</strong></span></span></p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Cryptocurrency</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">A cryptocurrency (or crypto currency) is a digital asset designed to work as a medium of exchange that uses strong cryptography to secure financial transactions, control the creation of additional units, and verify the transfer of assets.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The decentralized control of each cryptocurrency works through distributed ledger technology,known as blockchain, that serves as a public financial transaction database.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Bitcoin, first released as open-source software in 2009, is generally considered the first decentralized cryptocurrency.</span></span></p> </li> </ul> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Advantages of cryptocurrency</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>No Inflation</strong></span></span></p> </li> </ul> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">There is no possibility for development of inflation in the system</span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Peer-to-peer cryptocurrency network</strong></span></span></p> </li> </ul> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Transactions are made by hundreds of distributed servers. Neither banks or taxes, nor governments can control the exchange of money.</span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Unlimited possibilities of transaction </strong></span></span></p> </li> </ul> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Each of the wallet holders can pay to anyone, anywhere and any amount. The transaction can not be controlled or prevented.</span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Anonymity</strong></span></span></p> </li> </ul> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">It is completely anonymous and at the same time fully transparent.</span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Data secure</strong></span></span></p> </li> </ul> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">No chances to use some personal data for fraud.</span></span></p> <p style="margin-right:0in"> </p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Drawbacks of cryptocurrency</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Investment risks</strong></span></span></p> </li> </ul> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Large risks of investing in cryptocurrency that should be considered in the medium and long term.</span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Regulations</strong></span></span></p> </li> </ul> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">It is not considered a universal curency due to non-recognition by official sources.</span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Security</strong></span></span></p> </li> </ul> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">They can be used to finance illegal activities such as terrorism.</span></span></p> <p style="margin-right:0in"> </p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Block chain</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">A blockchain is a continuously growing list of records, called blocks, which are linked and secured using cryptography.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Each block typically contains a hash pointer as a link to a previous block, a timestamp and transaction data<span style="font-size:10.5pt"><span style="background-color:white"><span style="font-family:"Arial","sans-serif""><span style="color:#222222">.</span></span></span></span></span></span></p> </li> </ul> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'crypto-currencies', 'image' => 'https://www.mediafire.com/convkey/2b22/vinz2a1r4xa35iz6g.jpg', 'fbimage' => 'https://www.mediafire.com/convkey/2b22/vinz2a1r4xa35iz6g.jpg', 'metatitle' => 'Crypto currencies | cryptocurrency network', 'metakeyword' => 'Crypto currencies, cryptocurrency network', 'metadescription' => 'Finance minister Nirmala Sitharaman has cautioned aginst use of crypto currencies on an official basis, citing various threats posed by it.', 'author' => null, 'downlaodpdf' => 'https://www.mediafire.com/file/njmeedz7wqr9lqu/Cryptocurrencies.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 34 => object(Cake\ORM\Entity) { 'tag' => 'IT, Mobile & Computers', 'keyword' => 'IT-Mobile-Computers', 'id' => (int) 2605, 'title' => 'New rules to regulate social media', 'description' => '<p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Issue</strong></span></span></p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The Centre has informed the Supreme Court that the entire process of finalising the laws on regulating social media will be completed by January 2020.</span></span></p> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Background</strong></span></span></p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The Electronics and IT Ministry has drafted the Information Technology Intermediaries Guidelines (Amendment) Rules 2018, and published the entire draft for public comments on its website on 24 December 2018, requesting suggestions and objections from concerned stakeholders and the public.</span></span></p> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Details</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The government has said that various rounds of industry consultations and discussions involving various chambers of commerce, associations and social media companies have already taken place.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The inter-ministerial consultations were also initiated and undertaken to seek the views of other ministries, including Home Affairs, Information and Broadcasting, Health, Women and Child Development, and Commerce on the draft revised rules.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The updated draft rules are under discussion and as it has to be vetted by the Law and Justice Ministry, the entire process will be completed by January 2020.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">While lauding the role of social media for economic growth and societal development, the government also raised concerns over the exponential rise in hate speech, fake news, threat to public order, anti-national activities, defamatory postings, and other unlawful activities in these platforms.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The government has also said that it will initiate a number of measures, including amendment in the existing Intermediaries Guidelines Rules 2011, to make intermediaries more liable towards the content that is published and transmitted on their platform.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Recently pleas were made in three High Courts, which have sought a direction that Aadhaar or any other government-authorised identity proof should be made mandatory to authenticate social media accounts<span style="font-size:12.5pt"><span style="background-color:white"><span style="color:#212121">.</span></span></span></span></span></p> </li> </ul> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'new-rules-to-regulate-social-media', 'image' => 'https://www.mediafire.com/convkey/2a43/560jqfcxlj2ace76g.jpg', 'fbimage' => 'https://www.mediafire.com/convkey/2a43/560jqfcxlj2ace76g.jpg', 'metatitle' => 'New rules to regulate social media', 'metakeyword' => 'The government has also said that it will initiate a number ', 'metadescription' => 'The government has also said that it will initiate a number of measures, including amendment in the existing Intermediaries Guidelines Rules 2011, to make ', 'author' => null, 'downlaodpdf' => 'https://www.mediafire.com/file/p3frzycpu9effgn/New_rules_to_regulate_social_media.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 35 => object(Cake\ORM\Entity) { 'tag' => 'IT, Mobile & Computers', 'keyword' => 'IT-Mobile-Computers', 'id' => (int) 2678, 'title' => 'Tamil Nadu to store patient data on cloud', 'description' => '<p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Issue</strong></span></span></p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The Tamil Nadu government will digitise the patient data in all government hospitals and allied institutions in the State for future reference and research purposes by storing them on cloud.</span></span></p> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Background</strong></span></span></p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The government currently follows a decade-old policy by destroying records after three years, which deprived patients or their kin from seeking copies of the treatment protocol after the stipulated time frame.</span></span></p> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Details</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The storage of patient documents for more than three years was a problem owing to space constraints. However, in case of medico-legal cases, patient records were being maintained for eight years.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">With the government rolling out the e-office policy, the scope for automation has widened in the administration of government hospitals.</span></span></p> </li> </ul> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Cloud storage</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Cloud storage is a model of <a href="https://en.wikipedia.org/wiki/Computer_data_storage" title="Computer data storage">computer data storage</a> in which the <a href="https://en.wikipedia.org/wiki/Digital_data" title="Digital data">digital data</a> is stored in logical <a href="https://en.wikipedia.org/wiki/Pool_(computer_science)" title="Pool (computer science)">pools</a>. The <a href="https://en.wikipedia.org/wiki/Storage_virtualization" title="Storage virtualization">physical storage</a> spans multiple <a href="https://en.wikipedia.org/wiki/Server_(computing)" title="Server (computing)">servers</a> (sometimes in multiple locations), and the physical environment is typically owned and managed by a <a href="https://en.wikipedia.org/wiki/Internet_hosting_service" title="Internet hosting service">hosting</a> company.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">These cloud storage providers are responsible for keeping the data <a href="https://en.wikipedia.org/wiki/Availability" title="Availability">available</a> and <a href="https://en.wikipedia.org/wiki/Data_access" title="Data access">accessible</a>, and the physical environment protected and running.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">People and organizations buy or lease storage capacity from the providers to store user, organization, or application data.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Cloud storage services may be accessed through a <a href="https://en.wikipedia.org/wiki/Colocation_centre" title="Colocation centre">colocated</a> <a href="https://en.wikipedia.org/wiki/Cloud_computing" title="Cloud computing">cloud computing</a> service, a <a href="https://en.wikipedia.org/wiki/Web_service" title="Web service">web service</a> <a href="https://en.wikipedia.org/wiki/Application_programming_interface" title="Application programming interface">application programming interface</a> (API) or by applications that utilize the API, such as <a href="https://en.wikipedia.org/wiki/Cloud_desktop" title="Cloud desktop">cloud desktop</a> storage, a <a href="https://en.wikipedia.org/wiki/Cloud_storage_gateway" title="Cloud storage gateway">cloud storage gateway</a> or <a href="https://en.wikipedia.org/wiki/World_Wide_Web" title="World Wide Web">Web</a>-based <a href="https://en.wikipedia.org/wiki/Content_management_system" title="Content management system">content management systems</a>.</span></span></p> </li> </ul> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Benefits</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Reduction in Cost of Ownership</strong></span></span></p> </li> </ul> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">With cloud storage, there is no hardware to purchase, storage to provision, or capital being used for "someday" scenarios. You can add or remove capacity on demand, quickly change performance and retention characteristics, and only pay for storage that you actually use.</span></span></p> <p style="margin-right:0cm"> </p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Time to Deployment</strong></span></span></p> </li> </ul> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">When development teams are ready to execute, infrastructure should never slow them down. Cloud storage allows IT to quickly deliver the exact amount of storage needed, right when it's needed.</span></span></p> <p style="margin-right:0cm"> </p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Information Management</strong></span></span></p> </li> </ul> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Centralizing storage in the cloud creates a tremendous leverage point for new use cases. By using cloud storage lifecycle management policies, you can perform powerful information management tasks including automated tiering or locking down data in support of compliance requirements.</span></span></p> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Types of cloud storage</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><a href="https://aws.amazon.com/what-is-cloud-object-storage/"><strong>Object Storage</strong></a><strong> </strong></span></span></p> </li> </ul> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"> Applications developed in the cloud often take advantage of object storage's vast scalablity and metadata characteristics. Object storage are ideal for building modern applications from scratch that require scale and flexibility, and can also be used to import existing data stores for analytics, backup, or archive.</span></span></p> <p style="margin-right:0cm"> </p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><a href="https://aws.amazon.com/what-is-cloud-file-storage/" target="_blank"><strong>File Storage</strong></a></span></span></p> </li> </ul> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"> Some applications need to access shared files and require a file system. This type of storage is often supported with a Network Attached Storage (NAS) server. <a href="https://aws.amazon.com/what-is-cloud-file-storage/" target="_blank">File storage</a> solutions are ideal for use cases like large content repositories, development environments, media stores, or user home directories.</span></span></p> <p style="margin-right:0cm"> </p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Block Storage</strong> </span></span></p> </li> </ul> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Other enterprise applications like databases or ERP systems often require dedicated, low latency storage for each host. Block-based cloud storage are provisioned with each virtual server and offer the ultra low latency required for high performance workloads.</span></span></p> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'tamil-nadu-to-store-patient-data-on-cloud', 'image' => 'https://www.mediafire.com/convkey/6043/hnq5oczrtfn11026g.jpg', 'fbimage' => 'https://www.mediafire.com/convkey/6043/hnq5oczrtfn11026g.jpg', 'metatitle' => 'Tamil Nadu to store patient data on cloud', 'metakeyword' => 'storage needed, right when it's needed. When development ', 'metadescription' => 'When development teams are ready to execute, infrastructure should never slow them down. Cloud storage allows IT to quickly deliver the exact amount of ', 'author' => null, 'downlaodpdf' => 'https://www.mediafire.com/file/5yb4466tvgtxb12/Tamil_Nadu_to_store_patient_data_on_cloud.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 36 => object(Cake\ORM\Entity) { 'tag' => 'IT, Mobile & Computers', 'keyword' => 'IT-Mobile-Computers', 'id' => (int) 2679, 'title' => 'Astrosat and jellyfish galaxies', 'description' => '<p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Issue</strong></span></span></p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Observations of a jelly fish galaxy, JW100, by Astrosat using its Ultraviolet Imaging Telescope (UVIT) have shown up star formation in hostile environments containing X-ray-emitting hot plasma.</span></span></p> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Background</strong></span></span></p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>JW100</strong> is located far away in the galaxy cluster Abell 2626. The measurements made by the UVIT have been crucial for this work.</span></span></p> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Details</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Astrosat joins this effort by contributing data from its Ultraviolet Imaging Telescope (UVIT) instrument.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The jellyfish galaxies are being observed by various telescopes each sensitive to different parts of the electromagnetic spectrum.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The jellyfish galaxies’ tentacles contain a very hostile environment as they interact with the galaxy clusters that are rich in X-ray emitting hot plasma. What triggers star formation in these environments is a puzzle.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Jellyfish galaxies experience several mechanisms at the same time. Many of these happen over various timescales. The paper attempts to throw light on some of these mechanisms in JW100, using data which trace various components.</span></span></p> </li> </ul> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Jellyfish galaxy</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Jellyfish galaxies are called so because they are shaped like discs that have many tentacle-like arms streaming away from the disc.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">They are formed when a disc-shaped galaxy rams into a galaxy cluster, which is a dense region containing many hundreds or thousands of galaxies packed into a small region.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">This can happen when the galaxy is attracted by the gravitational attraction of the cluster. As the individual galaxy rams into the galaxy cluster, the cold gas in its disc interacts with the hot plasma in the cluster.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Acting like a strong wind, the plasma in the cluster strips away the cold molecular gas of the disc, causing it to stream behind like tentacles.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Unlike usual galaxies that have stars forming in the disc, the jellyfish galaxies have star formation in the tentacles also.</span></span></p> </li> </ul> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><img alt="jellyfish galaxy.jpg" src="data:image/jpeg;base64,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" style="float:left; height:187px; width:313px" /></span></span></p> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"> </p> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'astrosat-and-jellyfish-galaxies', 'image' => 'https://www.mediafire.com/convkey/53d4/3tary3873x821e06g.jpg', 'fbimage' => 'https://www.mediafire.com/convkey/53d4/3tary3873x821e06g.jpg', 'metatitle' => 'Astrosat and jellyfish galaxies', 'metakeyword' => 'containing X-ray-emitting hot plasma.', 'metadescription' => 'Observations of a jelly fish galaxy, JW100, by Astrosat using its Ultraviolet Imaging Telescope (UVIT) have shown up star formation in hostile environments ', 'author' => null, 'downlaodpdf' => 'https://www.mediafire.com/file/y1cyk2q7v4s4kq7/Astrosat_and_jellyfish_galaxies.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 37 => object(Cake\ORM\Entity) { 'tag' => 'IT, Mobile & Computers', 'keyword' => 'IT-Mobile-Computers', 'id' => (int) 2726, 'title' => 'Mastodon in India', 'description' => '<p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Issue</strong></span></span></p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Mastodon is seeing a considerable influx of Indian users, who have labelled the platform as a more egalitarian social network.</span></span></p> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Background</strong></span></span></p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Mastodon, founded on October 5, 2016 by Eugen Rochko, calls itself a ‘federation’ comprising thousands of communities, similar to Reddit and with timelines much like Twitter.</span></span></p> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Details</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Users can create profiles, post images, messages and videos, all while following other users in Mastodon.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">It has properties similar to Reddit, with the open-source properties. Expressing yourself works differen