Enterprise Architecture as practice 10 min presentation.

Enterprise Architecture As pratice

Have a look a t my presentation I made up quite quickly..sure there were many point but this was just 10 mins presentation.


Countries adopting e-learning University will win next war of education and competitiveness

This is my second of series of article:

As technology matures there would new actors which come up to stage to replace old one. Like amazon replaced many book store and De shaw  algorithmic trading replaced many manual high frequency trading company , similary netflix is doing on cable distribution same way New Online university offering everything online from under Graduate to post graduate to PHD are going to winner in next line..think of optimization 1. One brilliant professor can give a lecture to whole learners across continent.

2. University can run hunderds of creative course without thinking about enrollment…

more details https://sandyclassic.wordpress.com/2013/01/31/with-more-advances-in-technology-days-of-traditional-university-system-are-numbered/

Think about country competitiveness person can work at same time come at night work on this PHD he is not bothered whether its complete in 5 yrs or 10 yrs..because he is doing out of interest he want to do it better..that is reason even after job he is still enroll in Online PHD program run by professor and he is taking time out daily..think transformation its going to bring about in country instead of 10,000 PHD student there are 1,00,000 PHD student…let say 30% make it in 5 yrs.. still we have out of PHD got triple to 30,0000…

Leave PHD think a cook in local store learning cookery lesson online …10,00,000 new cook emerges every year…new car mechanics , new carpenters , new plumbers ….4

Can we stop the direction where is water is bound to hit … no we cannot … They say water will find its own level..Each individual in online university finds his own level..no restriction which course u can choose with lots of optional. Each person differentiating itself to market… people choosing courses like Artist build carpet…mixing colors like mixing courses… mystical spiritual experience.. Why I say so? remember when we entered into courses we used to say this is the course we want to do in life..? here we… the power to choose in hand of customer….

Country giving maximum choice in hand of customers are going to win the next battle of creating talents and competitiveness… What wastage would be eliminated

1. paper work..standing in line for forms.. coming and going to university.. sending ur child to university u can monitor anytime anywhere….

2. Surely once this openup..everyone will flood in to PHD online…graduate to masters to PHD…every year students with work graduating to next level…companies have flood of PHD.. to companies

3 if traditional university did not find enough enrollment then course is stopped..because professor will not teach 2 student..where as Online University 2 student from each country still become 360 students..so when these 360 student do PHD..

4 super specialized student cutting across subject for e.g and dental tooth making company is using nanotechnology+bio chemistry+ human tooth + anatomy + mechanics(company does not need doctor but need engineer) so when online university student chooses this courses right from under grads…and super specialize in post grad ..company cannot find better talent…… its going to be the next future…..either u ride it or be ridden by it…

It does not mean university will not exist. Only mean university will exist in different format..

Problem in india/china was never quantity its quality:

What I see and have experienced in past problem of unemployability comes due to commodatization of education..Also due to corruption is education systems..where many college just award internal marks to get student through make life of student enjoyable in college rather than hard work  What I mean by commoditization is everyone doing same thing…think for last 30 yrs we are all doing BE computer science but world have divided this into 30 subject likeBE in space computing, BE image processing..etc…there is no differentiation .when its not there person goes out in market is bound to be treated like like commodity an not a brand..this is what online education change..people can super specialize choosing there own subjects…

This unbranding or commoditization is valid to all countries in some respect. So Graduate /Post Graduate will be employable only when they differentiate themselves from the market. This where power of choice which rest n consumer to choose subject comes and play major role in future…

Information Technology laws provisions against port scanning.

Port scanning is used by mostly network and system administrators.port scan has many legitimate uses including network inventory and the verification of the security of a network. Port scanning can, however, also be used to compromise security. exploits rely upon port scans to find open ports and send specific data patterns in an attempt to trigger a condition known as a buffer overflow.

Country specific provisions in IT laws for open and decentralized architecture of the Internet, lawmakers have struggled since its creation to define legal boundaries that permit effective prosecution of cyber criminal Network scanning: Although network scanning  in legal but since its first step used by hackers boundary is blurred and there are implications for misuse. Also

German penal code :

The simple reason is that it is very difficult to establish the intent, failing which the provision will be available for misuse(by both parties ethical as well unethical person (it’s like whoever puts better legal argument). Just like 498 A of the Indian Penal Code relieves many but if you know of the current scenario, you know how brutally it has been misused in recent times.

Here are laws country wise with some case study how prosecution happened.
we had discussion about whether any law exist to prohibit scanning? here is list.
1. US:
In December 1999, Scott Moulton was arrested by the FBI and accused of attempted computer trespassing under Georgia’s Computer Systems Protection Act and Computer Fraud and Abuse Act of America. At this time, his IT service company had an ongoing contract with Cherokee County of Georgia to maintain and upgrade the 911 center security. He performed several port scans on Cherokee County servers to check their security and eventually port scanned a web server monitored by another IT company, provoking a tiff which ended up in a tribunal. He was acquitted in 2000, the judge ruling there was no damage impairing the integrity and availability of the network
2. In 2006, the UK Parliament
had voted an amendment to the Computer Misuse Act 1990 that proves guilty a person under cirtain conditon..its very blurred so can be misused or helpful prosecuting even when evidence is less.
3. Germany:
German penal code  Strafgesetzbuch § 202 a,b,c has also a similar law
4. EU also has similar law.
5. India has similar law.
At present the IT Act does provide penal provisions for hacking which is a matured and compounded form of port scanning as I have discussed earlier. Section 66 of the IT Act reads out :
66. (1) Whoever with the intent to cause or knowing that he is likely to cause wrongful loss or damage to the public or any person destroys or deletes or alters any information residing in a computer resource or diminishes its value or utility or affects it injurious by any means, commits hacking.
(2) Whoever commits hacking shall be punished with imprisonment up to three years, or with fine which may extend upto two lakh rupees, or with both.
Therefore the main elements of hacking is :
A) Intentional act
B) Wrongful loss to other
C) Alter/ delete/ destroy, diminish value of the data or utility.
The simple reason for misuse is that it is very difficult to establish the intent, failing which the provision will be available for misuse. Just like 498 A of the Indian Penal Code relieves many but if you know of the current scenario, you know how brutally it has been misused in recent times. Also there are cases where it use is justified.

Most watched Gini coefficient only show income distribution not low/high income distribution

For many years Gini coefficient has been the measure for showing distribution of wealth or divide between rich and poor or discrepancy of income.

From wikkipedia entry we define : The Gini coefficient (also known as the Gini index or Gini ratio) is a measure of statistical dispersion developed by the Italian statistician and sociologist Corrado Gini and published in his 1912 paper “Variability and Mutability”.

A Gini coefficient of zero expresses perfect equality, where all values are the same (for example, where everyone has an exactly equal income). A Gini coefficient of one (100 on the percentile scale) expresses maximal inequality among values (for example where only one person has all the income).

India has Gini coefficient has been 33.4 which is almost equal to ireland or belgium.So it does not show that economy is doing well it only show that india has low per capita income but distributed well among poor. Denmark has best figure good stable high income industry which is clean and and low gini coefficient of .26. Today as there was news China has gini coeffcient of .44 and trying to reduce it. I am sure they will as China willing and speed of implementation is like supersonic speed. While UK gini coefficient  has risen from 0.33 in 70’s to today 0.48 and  gini coefficient of US risen marginally from o.40 in 70’s  to .48 in 2000.

Improving gini coefficient does not reflect anything. If gini coeffient is getting lower means income disparity reducing ..but it can be true average income is reducing ..So combination of per capita income improvement with reducing gini coefficient reflects growth of economy to some extent there are other parameters as well

Authentication market segment and future

Electronic authentication (e-authentication) is the process of establishing confidence in user identities electronically presented to an information system.

Authentication provider Market size estimated by Gartner estimate stand at 2 billion dollar growing at average 30% year on year with about 150 vendors.

Authentication technologies companies can be segmented to 3 types :

  1. Client-side software or hardware, such as PC middleware, smart cards and biometric capture devices (sensors)
  2. Software, hardware or a service, such as access management or Web fraud detection (WFD), that makes a real-time access decision and may interact with discrete user authentication software, hardware or services (for example, to provide “step up” authentication)
  3. Credential management software, hardware or services, such as password management tools, card management (CM) tools and public-key infrastructure (PKI) certification authority (CA) and registration authority (RA) tools (including OCSP responders)
  4. Software, hardware or services in other markets, such as Web access management (WAM) or VPN, that embed native support for one or many authentication method.

Specialist vendor provide SDK,while commodity vendor provide one-time password (OTP) tokens (hardware or software) and out of band (OOB) authentication methods.

Shift is happening in industry from traditional hardware tokens to phone-based authentication methods or supporting knowledge-based authentication (KBA) methods or X.509 tokens (such as smart cards). NIST defines three types of authentication methods:

Trends in technology 2013

There are few trends which I discussed early here I just want to point best available site giving trend information.

1. Electronic signature will grow this point is very valid also came in market reserach.


2 Companies will focus on being remarkable: This point I found wonderful: I want to qualify this point further Leadership will be most important thing for next atleast 5 yrs..Every company will look out for Steave Jobs, bill gates,jack walsh and warren buffet.

As the competition increase it cycles becoming short..the effect of vision of visionary leader is seen in company in just 5 yrs span. Earlier it was 50 yrs then became 25 yrs..now its range is 5 yrs…i will say actually 3 yrs..So this point is very important.

3. Democratization of Education: increasingly educational resources are now available to everyone and poor through youtube, thorough other sites…Future even PHD student will be working and simultaneously doing PHD work at night..or free time…may take 7 -10 yrs but these PHD will change face of world as they will be more practical and dedicated.

Gartner Hype cycle for emerging technology predicts few unknown trends..










3. Biggest trend to me in authentication mechanism will open up new padora box as Iris technology is now considered unstable:


“Their research involved taking iris codes that had been created from real eye scans as well as synthetic iris images created wholly by computers and modifying the latter until the synthetic images matched real iris images. The researchers used a genetic algorithm to achieve their results.”

it takes about 5-10 minutes to produce an iris image that matches an iris code.

It will definitely change bio metric market since iris is considered most accurate technology. Will iris technology stand up to this technology only time will tell.. still its most secure technology but its broken..it need to adjust…if it cannot then with this attack its almost use less. anyone wear lens can fool technology then to impersonate another person.