Education - A duty or A business

There has been a great development in education sector and the development is of “privatization of education”.


Macaulay (a British official) had once said “we want Indians in colour, caste and creed but English in taste and opinion”. It was during the second half of nineteenth century when western education system was about to introduce in India. And this was what they had been successful in getting a group of pro-British Indians. At that time almost 98% of Indian population was deprived of to get education. Precisely the reason had been that majority of the Indian population couldn’t afford to avail the expenses because the condition of the Indians was so poor that they couldn’t afford manage two meals a day then, how could they manage to send their children to educational institutions. The Britishers too didn’t make such provision for this because they didn’t even want it. They considered the Indians belonging to an inferior race.

In post-independence India, several efforts have been made to educate the masses. Reservation system was brought up to uplift the socially and educationally backward classes of Indian society who have never given equal opportunities for employment and education. To a very extent, we have succeeded in this aim of educating the masses across the country. But in recent times, a new system of education has been brought up i.e., “a pro-profit education system”.
Since the beginning of 21st century there has been a huge development in educational sector. And this development is of “privatization of education”. Ever since, this system has been started, our education has taken a path downward to an extent. Now a days everyone is looking forward to take education institution as a professional business. I am not saying it is bad. But the way it is functioning having a clear aim to get considerable profit is not good. Therefore, the situation has become worse in the last couple of years as there has been a great competition of providing education. We can see it in our respective areas numerous educational institutions have been came into being. This is the scenario across the country.

As a result, the age old practice of depriving the people from their basic rights has been revised. A considerable amount of Indian population are being deprived of their basic fundamental right to get education because they do not have adequate resources to get into it. They either have the option to get admission to get good quality education in such institutions by hook or by crook or they can go to government run institutions which are already in shamble and also relatively less
in number with the population which is being left to get education. Due to this, a number of people possessing actual talent are not able to get exposed because they do not have adequate means to get that exposure.

In this situation, when education has turned out to be a good business to be taken up, it becomes the duty of the government to intervene in it and add it to the list pf priorities to provide justice to the deprived people. Without the government intervention the situation will continue to be the same. If the government would have taken such steps in the beginning of the century the shape of our education system would have been different. It would have not been possible to those who have made it as a business and but also the people have been denied of their basic fundamental rights.
In my opinion, this is the high time to take appropriate measures to get the system out of this situation and make education affordable to all citizens of India. There are two ways ahead. Firstly, the government must bring a resolution against this system of privatization and to bring some rules and regulation to those who are seeking to establish educational institutions. Secondly and most importantly, the condition of the public institutions must be taken care of and also must be increased in number so that the people instead of going into the private institutions become inclined towards public institutions if they are getting good quality education at a very affordable fee.

        To sum up, I would like mention that in a world fed up with,

  • Politics without principles,
  • Wealth without work,
  • Pleasure without conscience,
  • Knowledge without character,
  • Commerce without morality,
  • Science without humanity,
  • Worship without sacrifice,


Education is a beacon light which must be available for each and every citizen of a respective country that ensures the growth of the country with a much faster pace.

Internet of Things (IoT)


Internet of Things (IOT)
The internet of things, or IoT, is a system of interrelated computing devices, mechanical and digital machines, objects, animals or people that are provided with unique identifiers (UIDs) and the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction.
A thing in the internet of things can be a person with a heart monitor implant, a farm animal with a biochip transponder, an automobile that has built-in sensors to alert the driver when tire pressure is low or any other natural or man-made object that can be assigned an IP address and is able to transfer data over a network.

History of IoT

Kevin Ashton, co-founder of the Auto-ID Center at MIT, first mentioned the internet of things in a presentation he made to Procter & Gamble (P&G) in 1999. Wanting to bring radio frequency ID (RFID) to the attention of P&G's senior management, Ashton called his presentation "Internet of Things" to incorporate the cool new trend of 1999: the internet.
The first internet appliance, for example, was a Coke machine at Carnegie Mellon University in the early 1980s. Using the web, programmers could check the status of the machine and determine whether there would be a cold drink awaiting them, should they decide to make the trip to the machine.
IoT evolved from machine-to-machine (M2M) communication, i.e., machines connecting to each other via a network without human interaction. M2M refers to connecting a device to the cloud, managing it and collecting data.

How IoT works

An IoT ecosystem consists of web-enabled smart devices that use embedded processors, sensors and communication hardware to collect, send and act on data they acquire from their environments. IoT devices share the sensor data they collect by connecting to an IoT gateway or other edge device where data is either sent to the cloud to be analyzed or analyzed locally. Sometimes, these devices communicate with other related devices and act on the information they get from one another. The devices do most of the work without human intervention, although people can interact with the devices - for instance, to set them up, give them instructions or access the data.
The connectivity, networking and communication protocols used with these web-enabled devices largely depend on the specific IoT applications deployed.

Benefits of IoT

The internet of things offers a number of benefits to organizations, enabling them to:
·         monitor their overall business processes;
·         improve the customer experience;
·         save time and money;
·         enhance employee productivity;
·         integrate and adapt business models;
·         make better business decisions; and
·         generate more revenue.

Consumer and enterprise IoT applications

There are numerous real-world applications of the internet of things, ranging from consumer IoT and enterprise IoT to manufacturing and industrial IoT (IoT). IoT applications span numerous verticals, including automotive, telecom, energy and more.
In the consumer segment, for example, smart homes that are equipped with smart thermostats, smart appliances and connected heating, lighting and electronic devices can be controlled remotely via computers, smart phones or other mobile devices.
Wearable devices with sensors and software can collect and analyze user data, sending messages to other technologies about the users with the aim of making users' lives easier and more comfortable. Wearable devices are also used for public safety -- for example, improving first responders' response times during emergencies by providing optimized routes to a location or by tracking construction workers' or firefighters' vital signs at life-threatening sites.
Common Cyber Attacks in the IoT
Many types of attacks have been around for a very long time. What’s new is the scale and relative simplicity of attacks in the Internet of Things (IoT) – the millions of devices that are a potential victim to traditional style cyber attacks, but on a much larger scale and often with limited, if any protection. At its core, IoT is all about connecting and networking devices that up until now have not necessarily been connected. This means that all of those devices, whether it is your brand new connected refrigerator or your connected vehicle, are creating a new entry point to the network and therefore posing an increasing security and privacy risk.

Ø Botnets

A botnet is a network of systems combined together with the purpose of remotely taking control and distributing malware. Controlled by botnet operators via Command-and-Control-Servers (C&C Server), they are used by criminals on a grand scale for many things: stealing private information, exploiting online-banking data, DDos-attacks or for spam and phishing emails.

Ø  Man-In-The-Middle Concept

The man-in-the-middle-concept is where an attacker or hacker is looking to interrupt and breach communications between two separate systems. It can be a dangerous attack because it is one where the attacker secretly intercepts and transmits messages between two parties when they are under the belief that they are communicating directly with each other. As the attacker has the original communication, they can trick the recipient into thinking they are still getting a legitimate message. Many cases have already been reported within this threat area, cases of hacked vehicles and hacked "smart refrigerators".

Ø  Data & Identity Theft

While the news is full of scary and unpredictable hackers accessing data and money with all types of impressive hacks, we are often also our own biggest security enemy. Careless safekeeping of internet connected devices (e.g. mobile phone, iPad, Kindle, smartwatch, etc.) are playing into the hands of malicious thieves and opportunistic finders.

IoT security and privacy issues

The internet of things connects billions of devices to the internet and involves the use of billions of data points, all of which need to be secured. Due to its expanded attack surface, IoT Security and IoT Privacy are cited as major concerns.
One of the most notorious recent IoT attacks was Mirai, a botnet that infiltrated domain name server provider Dyn and took down many websites for an extended period of time in one of the biggest distributed denial-of-service (DDoS) attacks ever seen. Attackers gained access to the network by exploiting poorly secured IoT devices.
Beyond leaking personal data, IoT poses a risk to critical infrastructure, including electricity, transportation and financial services.
Internet of Things Investigations
Any investigator will tell you that digital evidence is good as long as you can associate a user behind the information. The user profile created with the application, as well as the historical data from the device’s purchase record, could be used to strengthen the identity of the user of the wearable. Hypothetically, a gold mine of digital evidence, in this case, would be found in the legal collection of the iOS or Android device associated with the user.
Should an investigator have access to the app, it would be easy for him/her to identify your items’ last locations and potentially your current or last location. Other real-time GPS locators are also available in the form of a ring that will display text messages, phone numbers and contact names.
For an investigator, the ultimate properties of IoT devices are their interconnectivity and sometimes a distinctive connection to the Internet. To achieve this type of communication between IoT devices, an investigator will have to become familiar with the IFTTT (“If This Than That”) platform, which is a free web-based service allowing users to create chains of simple conditional statements called “recipes” that are small programming “IF” statements controlling your IOT devices.
Simple Steps To Protect Yourself From IoT Security Threats
One factor which is often overlooked by tech and gadget enthusiasts frothing at the mouth with excitement over the incoming surge of intelligent, connected home devices is security.
Ø  Users should always change the default password on connected devices. Always, and with no exceptions.
Ø  Read the terms and conditions. Yes, its painful, but these should help you understand what data is being collected and what therefore what threats might exist.
Ø  This might sound like it defeats the purpose of a smart home… but think about how connected you need to be. The more devices you have connected, the more ways there are for hackers to get into your home.
Ø  Keep the software updated on all your connected devices. It’s the only way to make sure the vendor is providing bug fixes. If your device hasn’t been updated in several months this could be a red flag – is the vendor still in business? Who is making sure the device is still secure?



Education - A duty or A business

There has been a great development in education sector and the development is of “privatization of education”. Macaulay (a British offic...