The UIDAI publishes figures on how many characters are getting added to its database daily, and one of my less technologically challenged friends has worked out how to review those figures (on Twitter: @uidstatus). It makes for interesting reading, watching how many times that ‘mission-critical’ database link goes down, how days go by when it adds nobody (not counting fake IDs, about which the agency hasn’t a clue, apparently, putting it on par with all the other clueless adnumbering exercises that have plagued this country for years), and even the days the actual count goes down, as though people are vanishing like smoke.
Tag Archives: Security
At the very tag-end of 2008, an extraordinary event took place. India’s Parliament met for a stormy Winter Session, during which little of note was discussed, and little value was added to the fabric of society. And then, as the Session was drawing to a close, a number of Bills were brought up for voting, and within a few minutes, with little or no words exchanged, they were passed in toto.
The utter disregard of the country and its people implicit in this kind of facile performance is stunning and salutary, especially in light of the public agitation that has spread across northern Africa and parts of Asia, with citizens of many countries taking to the streets to express their disgust at the way that they have been taken for granted, by governments and leaders that claim to have their best interests at heart. Some of the perpetrators of such callousness now find themselves scrabbling to escape, together with untold amounts of wealth stolen from their hapless countries.
That the Indian public has so far been a little more forgiving of such small degradations is a current feature, not a guarantee.
Today, February 28, 2011, I am trying to be equally forgiving. Continue reading →
Reading over my shoulder?
People who do a lot of email (I don’t do a lot, not by corporate standards, but I’m not exactly an online recluse), are increasingly concerned by the lack of privacy in this area of communication.
Some of us are keen to see the modes of communication used on the Internet become commonplace for all (hence the title of this blog, in case you just landed up here and are still wondering), and now it is necessary to study how best to handle questions of privacy, when setting up email services on wide area intranets.
Intranets are more or less the same thing as local area networks, but the term refers more to the services running on the network, rather than to its physical infrastructure. The terrific advantage of such services is that they can be set up in a manner that avoids centralised control. In fact, they need not have a centralised structure to begin with.
So what can one do with a decentralised network? The sky’s the limit, almost, and new applications and services emerge almost every day.