Government declares Minimum Support Prices (MSP) for Rabi Crops for marketing season 2021-22

The Cabinet Committee on Economic Affairs (CCEA) chaired by the Prime Minister Shri Narendra Modi has approved the increase in the Minimum Support Prices (MSPs) for all mandated Rabi crops for marketing season 2021-22. This increase in MSP is in line with the recommendations of Swaminathan Commission. Announcing this in the Lok Sabha today, Union Minister of Agriculture & Farmers Welfare Shri Narendra Singh Tomar said this is a very important day for farmers. The highest increase in MSP has been announced for lentil (Rs. 300 per quintal) followed by gram and rapeseed & mustard (Rs. 225 per quintal each) and safflower (Rs. 112 per quintal). For barley and wheat, an increase of Rs. 75 per quintal and Rs 50 per quintal respectively has been announced. The differential remuneration is aimed at encouraging crop diversification.

Shri Narendra Singh Tomar said that the Food Corporation of India (FCI) and other State agencies will continue to purchase farm produce at MSP as before. Hon’ble Prime Minister has always given assurance that procurement at MSP will continue, and the mandi system will also continue. The Union Agriculture Minister said that the announcement of the MSP before the start of the Rabi season will help the farmers in deciding on their crop structure. The MSP for pulses (lentil) and oilseeds has been increased to boost production of these crops so that import of these items can be reduced.

Shri Tomar said that during 2009-2014, 1.52 LMT pulses was procured by the government. During 2014-2019, 76.85 LMT pulses have been procured which is an increase of 4962 per cent. The payment made at MSP rates in the last 6 years is Rs. 7 lakh crore which is double that made by the previous government. He said that as assured by the Hon’ble PM and by the Government of India, new MSP rates have been announced today. This is proof that procurement at MSP and the APMC mandis will continue to function, however, the farmer will be free to sell his produce outside these systems anywhere throughout the country to get remunerative prices.

Indian Railways floats the revised tender of semi high speed 44 Vande Bharat trains sets.

Indian Railways has floated the revised Tender of semi high speed 44 Vande Bharat trains sets.

The Tender is for -3 phase Propulsion, Control and other Equipment  along with Bogies for Trains Sets.

Tender has been uploaded on http://www.ireps.gov.in

Pre bid meeting on 29.9.20

The Tender opening date is 17.11.20

The main features of the tender are as under:

          I.  Train sets shall be manufactured at ICF/Chennai, RCF/Kapurthala and MCF/Raebareli

            II.        It shall be local (indigenous) tender.

            III.       Two stage, reverse auction shall take place.

The revised Tender is In line with Government of India’s preference for Make In India policy, the minimum local content percentage has been revised to 75%.  . 

It is the first big tender under revised DPIIT norms of AtmaNirbhar Bharat. Having atleast 75 % domestic components .

This tender is now a Domestic Tender. Only the Companies registered in India can apply and will have to quote in Indian Rupee.

Conducting elections amid a pandemic – Democracies share valuable insights at ECI webinar

Chief Election Commissioner, Shri Sunil Arora, today underscored the commitment of Election Management Bodies (EMBs) across the world, for the conduct of timely, free, fair and participatory elections to foster democracy in the world. Herecalledformer US President Abraham Lincoln’s allusion to democracies as governments“of the people, by the people, and for the people.”

CEC also recalleda quote by Nelson Mandela: “Courage is not the absence of fear, but the triumph over it. The brave man is not he who does not feel afraid, but he who conquers that fear.”

Speaking at the conclusion of the International Webinar on “Issues, Challenges and Protocols for Conducting Elections during COVID-19: Sharing Country Experiences”, Shri Arora highlighted the common threads that emerged from the event.

CEC emphasized that today’s webinar brings out clearly the importance of training the officials involved with the conduct of elections.

During his intervention, Election Commissioner Shri Sushil Chandra emphasized that in the shadow of COVID-19, elections have not only to be free and fair, but also ensure safety for the electors as well as polling officials and security personnel on duty. He said that presentations from various countries show comprehensive preparedness required before, during and after elections. The ultimate concern is to ensure that voters feel safe while voting in covid times. He also emphasized effective communication with voters regarding safety protocols adopted by the Commission.

Union Home Minister, Shri Amit Shah expresses gratitude to Prime Minister

Union Home Minister Shri Amit Shah has welcomed the Union Cabinet decision to hike the Minimum Support Price (MSP) of six Rabi crops. Expressing gratitude to Prime Minister, Shri Narendra Modi, Shri Amit Shah, in a series of tweets, said, “Every day and every moment of Modi Government has been devoted towards welfare of farmers and the poor. Modi Government has once again reiterated its resolve towards welfare of farmers and the poor by raising the MSP of six rabi crops today. I express my heartfelt gratitude to Prime Minister Shri Narendra Modi ji and Union Agriculture Minister Shri Narendra Tomar ji for this.”

The Union Home Minister said, “Today, Prime Minister Narendra Modi has hiked MSP of Wheat by Rs. 50 per quintal, Gram – Rs. 225 per quintal, Barley – Rs. 75 per quintal, Lentils – Rs. 300 per quintal, Mustard and rapeseed – Rs. 225 per quintal and Safflower – Rs. 112 per quintal. This unprecedented hike in MSP by Modi Government is a pragmatic effort towards doubling farmers’ income.”

Shri Amit Shah said, “Those trying to gain lost political ground by provoking farmers, procured just 1.52 Lakh Metric Tonnes of pulses from farmers when they were in power between 2009-14, while Modi govt has procured 76.85 Lakh Metric Tonnes of pulses during 2014-19. This difference of 4,962% clearly exposes their hypocrisy & proves dedication of Prime Minister Narendra Modi ji.”

The Union Home Minister said, “Those opposing Modi Government’s agricultural reforms bills are against the welfare of our farmers and policy of giving them the right value for their produce. These people do not want our hardworking farmer brothers who feed the country to ever be as rich and empowered as they themselves are. However, Modi Government will give farmers their rightful dues.”

Cybercrime

Cybercrime, also called computer crime, the use of a computer as an instrument to further illegal ends, such as committing fraud, trafficking in child pornography and intellectual property, stealing identities, or violating privacy. Cybercrime, especially through the Internet, has grown in importance as the computer has become central to commerce, entertainment, and government.It’s predicted that by 2021 cybercrime will cost the world a figure in excess of $6 trillion. It is the fastest growing crime in the US and as it grows the attacks are increasing in size, sophistication and cost, making them all the more terrifying for their targets.The cybersecurity industry is rapidly growing every day. Although more resources are being deployed to counter cyber attacks, the nature of the industry still has a long way to go before we can, as a whole, catch up with these threats. 

Most cybercrime is an attack on information about individuals, corporations, or governments. Although the attacks do not take place on a physical body, they do take place on the personal or corporate virtual body, which is the set of informational attributes that define people and institutions on the Internet. In other words, in the digital age our virtual identities are essential elements of everyday life: we are a bundle of numbers and identifiers in multiple computer databases owned by governments and corporations. Cybercrime highlights the centrality of networked computers in our lives, as well as the fragility of such seemingly solid facts as individual identity.

91% of attacks begin with email phishing Email phishing attacks are engineered to trick their unsuspecting targets into providing sensitive data and information. The majority of phishing attacks will be sent via spam which is why it’s so important that you implement effective anti-spam software such as MailCleaner for your business.

There is a hacker attack every 39 seconds A Clark School study at the University of Maryland is one of the first to quantify the near-constant rate of hacker attacks of computers with Internet access— every 39 seconds on average, affecting one in three Americans every year —and the non-secure usernames and passwords we use that give attackers more chance of success.

 Cybercrime, also called computer crime, the use of a computer as an instrument to further illegal ends, such as committing fraud, trafficking in child pornography and intellectual property, stealing identities, or violating privacy. Cybercrime, especially through the Internet, has grown in importance as the computer has become central to commerce, entertainment, and government.

The average cost of an American corporate data breach is almost $8 million. Because of the early and widespread adoption of computers and the Internet in the United States, most of the earliest victims and villains of cybercrime were Americans. By the 21st century, though, hardly a hamlet remained anywhere in the world that had not been touched by cybercrime of one sort or another.

New technologies create new criminal opportunities but few new types of crime. What distinguishes cybercrime from traditional criminal activity? Obviously, one difference is the use of the digital computer, but technology alone is insufficient for any distinction that might exist between different realms of criminal activity. Criminals do not need a computer to commit fraud, traffic in child pornography and intellectual property, steal an identity, or violate someone’s privacy. All those activities existed before the “cyber” prefix became ubiquitous. Cybercrime, especially involving the Internet, represents an extension of existing criminal behaviour alongside some novel illegal activities.

Most cybercrime is an attack on information about individuals, corporations, or governments. Although the attacks do not take place on a physical body, they do take place on the personal or corporate virtual body, which is the set of informational attributes that define people and institutions on the Internet. In other words, in the digital age our virtual identities are essential elements of everyday life: we are a bundle of numbers and identifiers in multiple computer databases owned by governments and corporations. Cybercrime highlights the centrality of networked computers in our lives, as well as the fragility of such seemingly solid facts as individual identity.

An important aspect of cybercrime is its nonlocal character: actions can occur in jurisdictions separated by vast distances. This poses severe problems for law enforcement since previously local or even national crimes now require international cooperation. For example, if a person accesses child pornography located on a computer in a country that does not ban child pornography, is that individual committing a crime in a nation where such materials are illegal? Where exactly does cybercrime take place? Cyberspace is simply a richer version of the space where a telephone conversation takes place, somewhere between the two people having the conversation. As a planet-spanning network, the Internet offers criminals multiple hiding places in the real world as well as in the network itself. However, just as individuals walking on the ground leave marks that a skilled tracker can follow, cybercriminals leave clues as to their identity and location, despite their best efforts to cover their tracks. In order to follow such clues across national boundaries, though, international cybercrime treaties must be ratified.

In 1996 the Council of Europe, together with government representatives from the United States, Canada, and Japan, drafted a preliminary international treaty covering computer crime. Around the world, civil libertarian groups immediately protested provisions in the treaty requiring Internet service providers (ISPs) to store information on their customers’ transactions and to turn this information over on demand. Work on the treaty proceeded nevertheless, and on November 23, 2001, the Council of Europe Convention on Cybercrime was signed by 30 states. The convention came into effect in 2004. Additional protocols, covering terrorist activities and racist and xenophobic cybercrimes, were proposed in 2002 and came into effect in 2006. In addition, various national laws, such as the USA PATRIOT Act of 2001, have expanded law enforcement’s power to monitor and protect computer networks.

Cybercrime ranges across a spectrum of activities. At one end are crimes that involve fundamental breaches of personal or corporate privacy, such as assaults on the integrity of information held in digital depositories and the use of illegally obtained digital information to blackmail a firm or individual. Also at this end of the spectrum is the growing crime of identity theft. Midway along the spectrum lie transaction-based crimes such as fraud, trafficking in child pornography, digital piracy, money laundering, and counterfeiting. These are specific crimes with specific victims, but the criminal hides in the relative anonymity provided by the Internet. Another part of this type of crime involves individuals within corporations or government bureaucracies deliberately altering data for either profit or political objectives. At the other end of the spectrum are those crimes that involve attempts to disrupt the actual workings of the Internet. These range from spam, hacking, and denial of service attacks against specific sites to acts of cyberterrorism—that is, the use of the Internet to cause public disturbances and even death. Cyberterrorism focuses upon the use of the Internet by nonstate actors to affect a nation’s economic and technological infrastructure. Since the September 11 attacks of 2001, public awareness of the threat of cyberterrorism has grown dramatically.

Identity theft and invasion of privacy

Cybercrime affects both a virtual and a real body, but the effects upon each are different. This phenomenon is clearest in the case of identity theft. In the United States, for example, individuals do not have an official identity card but a Social Security number that has long served as a de facto identification number. Taxes are collected on the basis of each citizen’s Social Security number, and many private institutions use the number to keep track of their employees, students, and patients. Access to an individual’s Social Security number affords the opportunity to gather all the documents related to that person’s citizenship—i.e., to steal his identity. Even stolen credit card information can be used to reconstruct an individual’s identity. When criminals steal a firm’s credit card records, they produce two distinct effects. First, they make off with digital information about individuals that is useful in many ways. For example, they might use the credit card information to run up huge bills, forcing the credit card firms to suffer large losses, or they might sell the information to others who can use it in a similar fashion. Second, they might use individual credit card names and numbers to create new identities for other criminals. For example, a criminal might contact the issuing bank of a stolen credit card and change the mailing address on the account. Next, the criminal may get a passport or driver’s license with his own picture but with the victim’s name. With a driver’s license, the criminal can easily acquire a new Social Security card; it is then possible to open bank accounts and receive loans—all with the victim’s credit record and background. The original cardholder might remain unaware of this until the debt is so great that the bank contacts the account holder. Only then does the identity theft become visible. Although identity theft takes places in many countries, researchers and law-enforcement officials are plagued by a lack of information and statistics about the crime worldwide. Cybercrime is clearly, however, an international problem.

In 2015 the U.S. Bureau of Justice Statistics (BJS) released a report on identity theft; in the previous year almost 1.1 million Americans had their identities fraudulently used to open bank, credit card, or utility accounts. The report also stated that another 16.4 million Americans were victimized by account theft, such as use of stolen credit cards and automatic teller machine (ATM) cards. The BJS report showed that while the total number of identity theft victims in the United States had grown by about 1 million since 2012, the total loss incurred by individuals had declined since 2012 by about $10 billion to $15.4 billion. Most of that decline was from a sharp drop in the number of people losing more than $2,000. Most identity theft involved small sums, with losses less than $300 accounting for 54 percent of the total.

Internet fraud

Schemes to defraud consumers abound on the Internet. Among the most famous is the Nigerian, or “419,” scam; the number is a reference to the section of Nigerian law that the scam violates. Although this con has been used with both fax and traditional mail, it has been given new life by the Internet. In the scheme, an individual receives an e-mail asserting that the sender requires help in transferring a large sum of money out of Nigeria or another distant country. Usually, this money is in the form of an asset that is going to be sold, such as oil, or a large amount of cash that requires “laundering” to conceal its source; the variations are endless, and new specifics are constantly being developed. The message asks the recipient to cover some cost of moving the funds out of the country in return for receiving a much larger sum of money in the near future. Should the recipient respond with a check or money order, he is told that complications have developed; more money is required. Over time, victims can lose thousands of dollars that are utterly unrecoverable.

In 2002 the newly formed U.S. Internet Crime Complaint Center (IC3) reported that more than $54 million dollars had been lost through a variety of fraud schemes; this represented a threefold increase over estimated losses of $17 million in 2001. The annual losses grew in subsequent years, reaching $125 million in 2003, about $200 million in 2006, close to $250 million in 2008, and over $1 billion in 2015. In the United States the largest source of fraud is what IC3 calls “non-payment/non-delivery,” in which goods and services either are delivered but not paid for or are paid for but not delivered. Unlike identity theft, where the theft occurs without the victim’s knowledge, these more traditional forms of fraud occur in plain sight. The victim willingly provides private information that enables the crime; hence, these are transactional crimes. Few people would believe someone who walked up to them on the street and promised them easy riches; however, receiving an unsolicited e-mail or visiting a random Web page is sufficiently different that many people easily open their wallets. Despite a vast amount of consumer education, Internet fraud remains a growth industry for criminals and prosecutors. Europe and the United States are far from the only sites of cybercrime. South Korea is among the most wired countries in the world, and its cybercrime fraud statistics are growing at an alarming rate. Japan has also experienced a rapid growth in similar crimes.

ATM fraud Computers also make more mundane types of fraud possible. Take the automated teller machine (ATM) through which many people now get cash. In order to access an account, a user supplies a card and personal identification number (PIN). Criminals have developed means to intercept both the data on the card’s magnetic strip as well as the user’s PIN. In turn, the information is used to create fake cards that are then used to withdraw funds from the unsuspecting individual’s account. For example, in 2002 the New York Times reported that more than 21,000 American bank accounts had been skimmed by a single group engaged in acquiring ATM information illegally. A particularly effective form of fraud has involved the use of ATMs in shopping centres and convenience stores. These machines are free-standing and not physically part of a bank. Criminals can easily set up a machine that looks like a legitimate machine; instead of dispensing money, however, the machine gathers information on users and only tells them that the machine is out of order after they have typed in their PINs. Given that ATMs are the preferred method for dispensing currency all over the world, ATM fraud has become an international problem.

Malware attack is the most costly cyber attack Malware is software that has been designed to gain access to or cause damage to a computer without the knowledge of the operator. It’s normally sent via email as a link or an attachment. With a $2.4 million dollar average cost for companies, this is the most costly form of cyber attack.

Since COVID-19, the US FBI reported a 300% increase in reported cybercrimes As if a pandemic wasn’t scary enough, hackers leveraged the opportunity to attack vulnerable networks as office work moved to personal homes.

File sharing and piracy Through the 1990s, sales of compact discs (CDs) were the major source of revenue for recording companies. Although piracy—that is, the illegal duplication of copyrighted materials—had always been a problem, especially in the Far East, the proliferation on college campuses of inexpensive personal computers capable of capturing music off CDs and sharing them over high-speed (“broadband”) Internet connections became the recording industry’s greatest nightmare. In the United States, the recording industry, represented by the Recording Industry Association of America (RIAA), attacked a single file-sharing service, Napster, which from 1999 to 2001 allowed users across the Internet access to music files, stored in the data-compression format known as MP3, on other users’ computers by way of Napster’s central computer. According to the RIAA, Napster users regularly violated the copyright of recording artists, and the service had to stop. For users, the issues were not so clear-cut. At the core of the Napster case was the issue of fair use. Individuals who had purchased a CD were clearly allowed to listen to the music, whether in their home stereo, automobile sound system, or personal computer. What they did not have the right to do, argued the RIAA, was to make the CD available to thousands of others who could make a perfect digital copy of the music and create their own CDs. Users rejoined that sharing their files was a fair use of copyrighted material for which they had paid a fair price. In the end, the RIAA argued that a whole new class of cybercriminal had been born—the digital pirate—that included just about anyone who had ever shared or downloaded an MP3 file. Although the RIAA successfully shuttered Napster, a new type of file-sharing service, known as peer-to-peer (P2P) networks, sprang up. These decentralized systems do not rely on a central facilitating computer; instead, they consist of millions of users who voluntarily open their own computers to others for file sharing.

Understanding the cyber terminology, threats and opportunities is critical for every person in every business across all industries. By providing advanced cyber training and education solutions in all departments of your business, from marketing and sales to IT and InfoSec, you are investing in your company’s protection against cyber threats.

Why we still lack in conquering over Colour discrimination

Recent times has been very horrifying for the world, not due to COVID-19 but because of some accidents happened based on colour discrimination. Peoples have been tortured due to their complexions. The crimes due to colour discrimination has seen a spike in recent years that too with some known personalities. Many has felt this issue at very high levels and have been vocal about this.

Black Lives Matter has been around since 2013, but there’s been a big shift in public opinion about the movement as well as broader support for recent protests. A deluge of public support from organizations like the N.F.L. and NASCAR for Black Lives Matter may have also encouraged supporters who typically would sit on the sidelines to get involved. On June 6, for example, at least 50,000 people turned out in Philadelphia, 20,000 in Chicago’s Union Park and up to 10,000 on the Golden Gate Bridge, according to estimates by Edwin Chow, an associate professor at Texas State University, and researchers at the Crowd Counting Consortium.

Setback

The problem they think is that they glorified the fair complex with another complex. But thing is not so simple. Also, problem is not with Bollywood instead this has been the impression of whole cinema across the globe. However, Things are getting simplified with better ways in other parts and countries of the world.

Recently after the incident of late George Floyd, whole world was shattered. Whole world stood united to trend and realise the fact that black lives does matters. Until now history has been suffering a lot due to such worst reasons. It is even disgusting to think the way those criminals that made them do such heinous crimes. In the 21st century, when we claim to be the most developed and progressive creature among all other species in universe.

Reasons

We have somehow been able to deal with racism and colour discrimination, but the crime rate has still not decreased. Crime has seen a surge; however general perception has definitely changed in peoples mind. There has been a notable change in the behaviour of public to such activities. Public has taken a brave step to reduce such happenings.

But the main perception still has been like #blackLivesmatter and quotes defining that they too are humans and they must be treated equally. They should get equalities in every manner all other complex peoples get.

But this idea has flaw because we have been taught to treat another complexion same as fair, but actually there should be point that colour does not matters at all. We should not just treat black peoples equally instead we should evolve to the thought of colours and complexion. We definitely have sense of that, but the idea has been restricted to give equal value. We have to stop judging the peoples on the basis of colour and also, we must realise that complex should not be criteria for anything. There should be the world where colour has no feature to be judged upon and it is person and personality that conquers everything in the world.

Chocolate Poisoning: Comfort For Us, Catastrophe For Our Pet Friends

Chocolate is one of the favourite foods of human beings. A gift, a comfort food, a truce, you name it, chocolate has everything covered. And it is unanimously favourite in almost all the age groups, but more in the younger ones. All and all, chocolates’ demand isn’t going down anytime in the near future. And speaking of tasty treats, we are taught to share it with friends. But are they good for our furry, pet friends too? Actually they aren’t! 

Animals, especially the commonly domesticated ones, are susceptible to chocolate poisoning. Chocolate contains a compound theobromine (C7H8N4O2), which is an alkaloid found in the cocoa trees. Apart from chocolate, this alkaloid is also found in tea leaves, kola nut, etc.  It has resemblance to the stimulants like caffeine and theophylline, and can be classified as xanthine alkaloid. For now, the median lethal doses for the cats, dogs, rats and mices are commonly known.

Alkaloids are organic compounds with a typically basic chemistry, but they also contain some compounds with neutral, or even slightly acidic properties. They all, uniformly, have a bitter taste. In nature, bitter taste is a danger indicator, and hence, are produced in several plants, like cocoa plant, as a response to the avoid predators. Animals, under the usual circumstances, do not consume the cocoa seeds. Even if some animals consume the cocoa pods, they dispose of the cocoa seed, despite their fat content, most likely due to the high amounts of theobromine.  

But, in chocolate, cocoa’s bitter flavour is partially or fully masked by the added sugar and fats. Hence the animals, especially the ones whose taste buds can detect sweetness, like dogs, have a tendency to consume them. Cats, on the other hand, due to absence of ability to detect sweetness, are not very prone to consuming chocolates accidently. 

Even in human beings, it can cause effects on consumption above a limit. The lethal dosage 50% (LD50), which happens to be the quantity that can kill 50% of the individuals of a particular species, in humans happens to be 1000mg/kg. At a consumption level of 0.8-1.5g/day, symptoms like sweating, headaches and trembling are observed. At 250mg/day, limited effects on the mood is observed. Along with human beings, rats and mices also have a good tolerance to theobromine, with the LD50 levels being 837 mg/kg and 1265 mg/kg respectively.

But, cats and dogs have comparatively lower quantities for LD50. The dogs drop down at the 300mg/kg level, while cats are at 200mg/kg. Hence, even a small amount of cocoa consumption can be harmful for them, especially for the smaller sized individuals. Also, the type of chocolate consumed is an important factor in the theobromine poisoning cases. The dark chocolate items contain a very high amount of theobromine concentration. In comparison to that, milk chocolate contains relatively smaller concentrations (10 times lesser than dark chocolate). Unsweetened cocoa powder is the most concentrated. 

The early symptoms of chocolate poisoning include vomiting, nausea, diarrhea, increased urination and mood swings.Dogs and cats digest theobromine slower than the human beings, and hence, are susceptible to succumbing to chocolate poisoning. Clinical symptoms of poisoning can last upto 72 hours. More severe symptoms include epilrptic seizures, internal bleeding and cardiac arrests. All these can lead to an eventual death.

If identified early, chocolate poisoning is treatable. Veterinarians treat these cases by inducing vomiting within two hours of ingestion, and by administering benzodiazepines for seizures. 

But whatever be the treatment, the ordeal is painful for the animals. And as the old saying goes around, “ Prevention is better than cure”. So, the least we can do for our beloved pets is to keep them safe from accidental consumption of harmful items.

Website Reference:

https://en.wikipedia.org/wiki/Theobromine_poisoning

https://en.wikipedia.org/wiki/Theobromine

Tolerance

                       

 Tolerance is the quality to accept and show proper respect to the opinion, beliefs & customs & habits of others. It’s akin to the motto to “Live & let live.” In a society & in a country where people are speaking in different languages, professing different religions & faiths, and clinging to different political views the necessity of tolerance is very high. They may not take the opinion of others but they should tolerate them. In a world, tolerance is based on proper adjustment, understanding, fellow feeling & cooperation among people of different castes and creeds, faiths, opinions & customs. 

 Tolerance is of utmost importance in all walks of life. Peace and prosperity of a family, of society, and even of a country or nation depends on it. All members of a family or society may be divided in their opinions but they must be sympathetic to the opinions and views of others. If a person cannot respect the opinion of the other & vice versa, then this may result in strain in relations causing it to be an unhealthy one. Again in a family, if the son & daughter don’t respect their parents & vice versa the family may turn into hell. Similarly, if the democracy is shattered to pieces if the members of a political party do not respect & tolerate each other’s views, then this may lead to unnecessary fighting, bloodshed & killing.

  While India is famous for its democracy. The lack of tolerance of the opinions of other political parties leads to the dismemberment of Pakistan in the past. It has lead to the separation of sacred ties between many husbands & wives in Western countries. The system of divorce among husbands & wives is quite a common practice for intolerance. Marriage is a matter of pride of Indian religions, Aryan culture & civilization. But this concept is not appreciated in India. Even though ironically it is much criticized, the count is increasing with time. 

FRANCHISE OR OWN SETUP.

When it comes to expanding a business geographically the first question comes in mind is whether to go with franchise or set up own infrastructure. First thing, do you really need geographical expansion, if you are a digital marketing firm or IT company or a BPO you don’t have to do geographically initially. Geographical expansion is more important in restraunt or cafe business or other like that. If you also want to expand your business make sure you are stable enough and having regular source of income. Sustainability is a must need requirement for scalability. Scaling without sustaining is a complete suicide. First of all be sure that you are ready for expanding and it is the right time now. Once you are confirmed that you are now ready to expand then look out some options you have. Whether your marketing is good enough to attract a franchisee what will be the terms and conditions between you and franchisee. If you don’t high amount of working capital and want have less stress and don’t have hire too many employees you can go with franchise model but if you have enough working capital and you areready to invest it and your organisation is having good leadership then you must go with setting up your own infrastructure.

The significance of Hobbies!

In a world full of chaos you need to find things that call for some ME time. As an individual we find even the 24 hours of the day less to meet our targets and in the race of being on top we tend to forget that it is important to spare some time out of our busy schedule for our own self. Here is when hobbies come in the picture. A hobby can be anything that sets your soul free and makes you happy. Anything that distracts you from a busy life can be turned into a hobby. A lot of people like dancing when free, many love singing , many love painting, few play Casio or guitar or any other musical instrument of their choice.Some love poetry and are great poets. Hobbies can also turn into your careers and that is probably one of the best combination, when you enjoy your work, it always keeps you engaged and never gets you boring.

We have often heard “Khaali dimag, shaitaan ka ghar” so to avoid your khaali dimaag you must engage in a hobby. To be productive,instead of gossiping and bitching around and about people we must adapt habits which are useful. In today’s world where mobile phones have become an addiction it keeps you away from it for atleast a particular time, you forget about it and focus on your self. Mental health is one of the major issues people are facing today and having a hobby can be the purest form of cure for that.

As a person you become more interesting, innovative and creative. You have more ideas to share and more knowledge to gain. Hobbies help you become more patient. In order to develop a new hobby, you have to learn how to do something that is brand new to you. The odds are there will be a learning curve, and you will need to be patient in order to build your skills. It increases your self confidence and boosts your self esteem. It enriches your life and gives you a different perspective on things. No matter what type of hobby you choose, you will definitely be exposed to new ideas. Hobbies help you grow in various ways, including exposing you to new opinions and to new ways to look at life. Your perception about life can change, you can be more optimistic.

In today’s digitally progressive world if you post anything you are skilled at and if for once you get viral, you never know you can be the next “Rasode mei kaun tha ” sensation and in a day you would be a public figure. you post your dance,singing,cooking videos on youtube and earn likes .You have a collection of your hobbies at a particular place and it keeps you moving. you feel accomplished. You feel good. Even eating is a habit people enjoy, it may sound vague but it actually is a hobby. A hobby can be anything unless it is unethical or hurts somebody’s sentiments.

So discover new hobbies and develop existing ones. Create an impact. Get going!

“If you are losing your leisure, look out! — It may be you are losing your soul.”
― Virginia Woolf

Allergies and Our blood

Ever heard someone asking about the things you added into the food which you prepared?  Feel a bit annoyed by that remark? Well, don’t be,cause even a small mistake may result as fatal for them..

What exactly are allergies?

The etymology of Allergy i.e ‘Allergie’ which was actually invented by a doctor who actually combined two Greek words, allow,meaning ‘strange’ and ergon which means ‘activity’.  Which means that an allergy,if roughly explained,is any ‘strange activities in your body is an allergy. 

  • Mechanism

So,your body contains some antibodies. What are antibodies? Well,whenever your body has any foreign organism inside it,your body starts to release something called antigens. These antigens have antibodies present on them which will bind the foreign material in order to destroys it. The difference? 1. Antigens are the substance which ‘induce’ the immune response of the body whereas antibodies are the proteins which actually recognise and bind them to the antigens. 

2. Antigens maybe within the bodies of be added externally and the antibodies are always present in the bodies. Suppose you take a Red Blood Cell(RBCs),every blood cell has an antigen on them. Let’s imagine the blood cell to be of A+ve person and the antigen which is present on the cell be of a triangular shape.

O>. 

How will the antigen be of that cell? The antibody which the body will produce will be exactly opposite,let’s imagine the antibody like a circular or anything which is not triangular intially the antibodies of ‘B’ blood group. Why is it so? So that they don’t fit together! So will the ‘B’ blood group cells make the antibodies of A blood group. What happens if they fit together? The cells die. Which is why people from blood banks are really specific about the ‘blood group’ which the patient belong to. But then..what happens in the case of ‘O’ blood group? The cells  from ‘O’ blood group do not have antigens at  all! So what kind of antibodies will the body produce? The perish  with ‘O’ positive blood produces antibodies of both  ‘A’ and ‘B’ blood group. Wait….this is all  getting very confusing. How am I exactly supposed to know which blood group produces which antibody or whatever it is?!? Well,let’s see below.

Human blood is made of several groups. Not all blood groups are same. What is different  in blood group is usually the antibodies. How are they divided? Let’s see!

  1. A blood group- Has antigens of A blood group-But has antibodies of B blood group
  2. B blood group- Has antigens of B blood group-But has antibodies of A blood group
  3. AB blood group-Has antigens of both A and B blood group-but has no antibodies
  4. O blood group- has no antigens-but has antibodies of both A and B blood groups

Now,you might have many questions regarding the above explanations. Don’t worry,every question will be cleared!

O blood group has both that antigens.Supposing,if  we are to transfuse the  blood to a person with A blood group,why doesn’t the antibody not kill the cell?

The answer can be derived with two possibilities. Firstly,whenever there is a transfusion of blood,it is very rare that antibodies get transfused. So, normally it is quite safe. Secondly,even if the antibody did manage to get inside,the antibody will die soon due to the difference,maybe from the environment of the other factors affecting it.

Photo by Amornthep Srina from Pexels

How is the blood group negative or positive determined? Whether the blood group is positive or negative is determined through something called the Antigen D. The presence of this antigen D means that the blood is positive and if the presence is not seen,then the blood is said to be negative. Hematology (the study of blood) is quite complicated and even today,many mysteries are yet to be disclosed. Why so? Did you think that only 8 blood groups exist?( A+ve,A-ve,B+ve,B-ve,AB+ve,AB-ve,O+ve,O-ve)

Then you are quite wrong,because according to a research,around 400 types of blood groups have been found till today,and the hematologists,are still studying very hard about the various properties of our blood and the various elements it contains.

Now,how does this affect  allergies?

Antibodies,also known as Immunoglobulins are the ones which are sent when there is an foreign material identified by the body. It is very helpful due to its immunological memory which remembers the foreign organism for a long time,and when the same material again comes in contact with the material,the body knows how to kill it. This is extremely smart in the cases of pathogens(disease causing microbes). The problem arises when a micro organism is repaired by,let’s take pollen grain for example. Pollen grains are freely present in the atmosphere. When the pollen is inhaled through respiration,the body thinks the pollen to be a foreign material and produces large amounts of antibodies. This antibodies rush towards,where the pollen is present. Its main motive is to  either destroy or remove the foreign material form the body. So the antibodies bind the pollen,and during this process,many side effects take place for eg. rashes,runny nose, constant sneezing(because the body wants the pollen out of the it’s system) etc. These are just minor allergies,some may develop some major effects which may be drastic enough to make one hospitalized. It may also be the case when an object,which was previously in contact with the body may suddenly be recognised as a foreign body and again,the process repeats. Some allergies may even turn out to be hereditary.

One is always advise to consult a doctor if suffering through any unusual reactions after the contact of anything. If not,one must make a note about what exactly is the factor which is causing the body to react as such,and try to avoid it

The concept which was written over here are usually temporary and soon the body adapts itself. But if you experience constant trouble with any material,try to avoid the contact with it and consult a doctor to prevent any further consequences

The research is still going on about what exactly does our body heal ourself,or why our brain releases certain fluids at certain situations,but these are are speculations and theories and are believed to make and define things in an easier way. There might be a time in future when we crack the code and get to know what exactly happens inside our bodies. Till then,to wonder is all we can do!!

IIT JEE ADVANCED 2020 ADMIT CARD RELEASED

The Indian Institute of Technology (IIT) Delhi on Monday (September 21) released the admit cards for Joint Entrance Examination (Advanced) 2020 – the entrance exam for admission to undergraduate courses across IITs and IISc. The admit cards were released on official website of the board. 

Candidates who have registered for the JEE (Advanced) 2020 will be able to download their admit card online at jeeadv.ac.in. This year, a total of 1,60,864 students have registered to appear for the exam. These are the top-ranking students from the JEE Main. 
AdvertisingnullAdvertising

Around 2.5 lakh students were eligible to apply, however, the number of candidates choosing to appear for IIT entrance test declined massively this year due to the pandemic.

The JEE Advanced 2020 admit cards can be downloaded from Monday (September 21) 10:00 am to September 27 (9:00 pm). Candidates will have to visit jeeadv.ac.in to login and download your JEE Advanced admit card 2020.

The JEE Advanced 2020 admit cards will bear the candidate’s name, Roll Number for JEE Advanced 2020, photograph, signature, date of birth, address for correspondence and category. In addition, it will also bear the name and address of the examination centre allotted to the candidate. 

The JEE Advanced 2020 examination is scheduled to be conducted on September 27, 2020, at various centres spread across the state

JUDICIARY AND TECHNOLOGICAL ADVANCEMENT

 

The flow of technology is as strong as a flooded river that no court can embark on such a vast flow of technology but still seeks to prevent damage by making proper dams by actively participating in the electronic maintenance of court records, allowing or even requiring electronic filing of pleadings and orders, and building high-tech court.

Good technology in our courts will make it more efficient to proceed. Electronic displays provide for adequate visualization and analysis of the exhibits. Technology can boost procedural control capabilities, identify deadlines and decide on matters quickly. Judges can place more time constraints on attorneys, provided that technology is more ready to present. You can access, analyze and use technology to inquire into previous cases for lawyers. Lawyers can complete openings, closings, direct questions and cross-examinations in less time than is needed to use paperwork with stable additions or diagrams. The technology in court halls helps lawyers clarify and synthesize courtroom information to increase the jury’s curiosity, comprehension and memory retention. online application and consultation can make their court experience smooth, quick and hazel free. It would also create transparency.

E-justice is seen and performed as an e-government agency. The Indian judiciary consisted of 15,000 judges in 2,500 districts. Since 1990, computerisation has taken place. Under the National EGP, the Mission Mode Project (MMP) was established for court computerization, and the introduction of IT and communication technology in three phases over a period of five years..

The MMP’s key goals are to:

1. To help court judicial administration streamline their day-to-day operations.

2. To support the courts in raising number of pending cases.

3. Providing litigants with accuracy of the facts.

4. Providing Judges with access to legal and judicial resources.

The project was launched in December 2004 and an e-committee was created to oversee its implementation. The E-Committee formulated a regional strategy and action plan. 700 courts in metro cities and 900 courts in capital cities with the exception of North East, Ahmedabad and Patna have been protected to this day.

The NIC has been extremely associated to the Indian judge for the past eleven years. Back in 1990, the task of NIC was initiated to support the legal community through IT.

Through NICNET satellite-based electronic communication network, all the High Courts were computerised and interconnected. Curtis project was commissioned to streamline the different court records. NIC took COURTIS on behalf of all legal system stakeholders, including judges, prosecutors, litigants, legal firms, government departments, researchers and the general public. Forensic and cyber tracing Forensic and cyber tracking data has played a major role in judicial investigation and enquiry. These made investigation smoother and allowing police and judiciary to pin down violator easily.

It requires the use of IT infrastructure in the judicial administration sector. It requires the use of satellite technology, video or intranet technology to communicate. Today, many judicial officers use video conferencing every day and it is connected to prisons. The accused can now be present by tele-justice through a video connection installed on ISDN lines between the prison and the trial. Indian states today have already adopted tele-justice, including Maharashtra, Andhra Pradesh, Tamil Nadu, Gujarat, and Bihar. In Maharashtra, for example, by video conferencing, more than 40 prisons in and around Mumbai are linked to district courts.

Over many years now, courts in the United States have been using Information Technology extensively.

Throughout the United Kingdom, computer software production at the subordinate court level was developed extensively. The Local County Court Management System (LOCCS) for example used in England

In Australia, “Cyber Tribunals” have extensively utilized the technology in the legal arena at all phases, thereby significantly reducing delays.

In Singapore, the courts use their time and resources to ensure that cases are handled effectively and effectively. The use of technology goes beyond computer use for Singapore courts. The use of video cameras in prisons and court premises dramatically decreases the chances of moving the accused and witnesses in criminal trials within the country and from outside.

While we have come a long way in advancing technology, we still have scope for improvement. On-line database program with precedents, citations, rules, laws and case statistics. Word processing with standard templates including notification/process creation. Lack of professional support expertise and a non-flexible budget in the modernisation process

There is no question that technology will profoundly affect future courtroom and litigation procedures, but the degree to which change will occur is subject to an unprecedented amount of problem anticipation and convenience due to what is now referred to as disruptive technologies, that is, innovations that are yet to be developed that will reshape our lives and alter our way of living. However, there are a large number of barriers that need to be addressed in order for the judiciary to operate to its full potential by using information and communication technology. If our judiciary is completely efficient in using new technologies, justice for everyone can be achieved easily and efficiently. It should be our primary objective to give justice quickly and correctly.

How To Deal With Resistance In Geriatric Care

The task of caring for the elderly can be daunting, especially when they’re resisting help. In order to make them more receptive to help, we need to delve deeper into the cause behind their hostility. Senior citizens often find it difficult to be vulnerable in front of people, especially when the latter do not seem very empathetic. There is also the additional hurdle of getting used to new people and a new environment. A cautious approach goes a long way in dealing with resistance, one which gives the elderly enough time to adjust to their surroundings, and to a new routine.

In the initial stages of the program, getting family members to participate in some of the activities might help in making the elderly more receptive to care and support, and would also encourage them to socialise with their contemporaries more freely. Making program objectives clear to them from the beginning, by explaining the benefits of the enlisted activities and setting up a concrete timeline, would go a long way in breaking their resistance down, and making them more receptive to change. Differential needs assessment is also crucial as a preliminary step to prevent resistance in later stages, as every senior citizen has different requirements when it comes to specialised care. Their cognitive, behavioural, emotional, and physical capabilities are not equal, and so, every individual would be in need of customisation of the program for it to benefit him or her in the best possible way.

If the individual is persistently resistant to help, a trial run of the actual program could be suggested. The program administrators could propose a short activity, assuring the elderly that their enthusiastic consent is something that they would need to start the program. This is known as the foot-in-the-door technique, which would make it more likely for them to say yes to the requests of the administrator in the future. Resistance is also more likely to be overcome when the message aimed at bringing about a change in the attitude is framed positively. Appeals that contain positive consequences of the program, without highlighting the negative consequences of not participating in it, have a higher chance of persuading the elderly. It would be even more effective ifthe message came from a credible source, like a healthcare professional, or a close friend.

When a senior citizen acts out and is consistently uncooperative, it gets frustrating for the program administrator and other members of the program. In such a situation, it is imperative that we maintain our composure, and try to empathise with them. A significant number of senior citizens are neglected and abused by their family members. They fear that they are losing control over their lives, and this drives them to act in a hostile manner. Reflective listening, which is the reconstruction of what the client is thinking tomake the client understand his or her thoughts better, is a communication strategy that can be deployed to bring the elderly to ease as well as win their cooperation. A compassionate and diligent effort to provide assistance would be sure to succeed in the long run.

Author: Diya Pant (dpant2002@gmail.com)

Veerapandiya Kattabomman-Bravery part-2

For better understanding I recommend you to read the part-1

The Commission of Enquiry that went into the incident fixed the blame on Jackson and relieved him of his post, thinking the Company’s plan to take over the entire country gradually could be marred by Jackson’s fight with Veerapandiya Kattabomman.

The new Collector of Tirunelveli wrote to Kattabomman calling him for a meeting on 16 March, 1799. Kattabomman wrote back citing the extreme drought conditions for the delay in the payment of dues and also demanded that all that was robbed off him at Ramanathapuram be restored to him. The Collector wanted the ruling house of Sethupathis to prevent Kattabomman from aligning himself with the enemies of the Company and decided to attack Kattabomman.

The British also instigated his long time feuding neighbor Ettayapuram Poligar to make provocative wars over Kattabomman on their long pending territorial disputes.

Kattabomman refused to meet the Collector and a fight broke out. Under Major Bannerman, the army stood at all the four entrances of Panchalankurichi’s fort. At the southern end, Lieutenant Collins was on the attack. When the fort’s southern doors opened, Kattabomman and his forces audaciously attacked the corps stationed at the back of his fort, and slew their commander Lt. Collins.

The British after suffering heavy losses, decided to wait for reinforcements and heavy artillery from Palayamkottai. Sensing that his fort could not survive a barrage from heavy cannons, Kattabomman left the fort that night.

A price was set on Kattabomman’s head. Thanapathi Pillai and 16 others were taken prisoners. Thanapathi Pillai was executed and his head perched on a bamboo pole was displayed at Panchalankurichi to demoralise the resisters. Soundra Pandian Nayak, another rebel leader, was brutally done to death by having his brains dashed against a village wall.

Veerapandiya Kattabomman hid in so many places including thirumayam, virachilai and finally stayed at Kolarpatti at Rajagopala Naicker’s house where the forces surrounded the house. Kattabomman and his aides fled from there and took refuge in the Thirukalambur forests close to Pudu-k-kottai. Bannerman ordered the Raja of Pudukkottai to arrest Kattabomman. Accordingly, Kattabomman was captured and on October 16, 1799 the case was taken up (nearly three weeks after his arrest near Pudukkottai).

After a summary trial, Kattabomman was hanged unceremoniously on a Tamarind tree in Kayathar (near Thirunelveli).

Some of the other noteworthy persons who were hanged along with Kattabomman were Veeraghechayan Naicker, Dali Ethalappa Naicker and Palayakarrars of Kaadalkudi, Nagalapuram Puthur, Vripachy, Sivagangai, to death by hanging on charges of treason.

The Fort of Panchalankurichi was razed to the ground and all of Kattabomman’s wealth was looted by the English soldiers. Few years later, after the second Polygar war, the site of the captured fort was ploughed up and sowed with castor oil and salt so that it should never again be inhabited by the orders of the colonial government.

In subsequent years, a good deal of legend and folklore developed around Kattabomman and the Marudu Brothers. Kayatharu, where Kattabomman was executed has remained a place of political pilgrimage.

In his Tinnevelly Gazetteer of 1917, H. R. Pate notes the presence, in Kayatharu, of “a great pile of stones of all sizes, which represents the accumulated offerings by wayfarers of the past hundred years. Folk songs recalling the heroism of the Poligar leaders remain alive in Tamil Nadu to this day…”

The popular Tamil slang for a traitor or committing treason is Ettapa or Ettapan, courtesy the Ettayapuram Polygar whom the British later conferred the title of Raja. But it is disputed that Ettapan committed treason Kattabomman was arrested by King of Pudukottai. The Campa Cola ground in Chennai belongs/belonged to Ettappan family. Lately there is cry that unfair portrayal of Ettappan in the film Kattabomman in which actor Sivaji Ganesan gave a great performance, is the main cause for this. It seems that Ma.Po.Si(Ma.Po.Sivanyanam) who wrote the dialogues for the film had some misunderstanding with the Ettappan family.