Everything you need to know about Nirbhaya Documentary :The Good,The Bad and The Ugly


India’s daughter is directed by an award winning filmmaker Leslee Udwin. Its not just a film for her. Its 2 years of her life. It is initially scheduled to be aired for Women’s day on 8th March 2015. As Indian government has banned the telecast, BBC was stunned and hurried to telecast the film on UK. More than 3 lakh people has viewed the show. More interestingly ,they made the video public through YouTube. Initially YouTube is hesitant to not remove the video. After several requests, Youtube blocked access to several videos. At the time of writing this article, more than dozens of copy of the video is available in the YouTube. This clearly shows that no one likes the ban on the documentary. I am going to dissect the documentary. Let’s start.

The good:

While watching this documentary, you can literally go through some of the sickest and filthiest ever born on the earth . Lets introduce Mukesh, one of the convicts in this brutal rape. He was saying some nonsense and creepy before foreign television. He has completely no respect for law and women. At one point , he even admitted that this brother, Ram sigh, another convict, had already done in similar things in past. He does not have any guilty feeling for committing such a horrific  thing even at this time. Mukesh, one of the rape convict, is the guy in the following image.vlcsnap-2015-03-06-11h31m48s229vlcsnap-2015-03-06-11h31m53s25

We would have never known this filthiest person mentality without this documentary. This is not just about a single case and they are thousands of cases like this and its the time to change everything from the grass root level. According to NCRB , a women is raped in India for every 20 minutes and most of the rapes are under reported. Either the police fails to file FIR or victim does not have interest to go to police station. Even if the victim goes to the police station, victim is accused and has to overcome lots of embarrassing questions on the manner of rape. It is the bitter truth that you have to take it. The average delay in disposing a rape case is 2 years. If accused goes for an appeal, vicious cycle begins again. At one point, most of the victim turns hostile. Lets take an example, if some person was raped in 1992 and if she has been questioned about the manner of rape in 2015, how could she answer? Its after all the bad dream of her life and no one has the right to force her to re live the horrific moment.

At one point in this documentary,  psychologist said that most of the rapist had done more than single rape and some of them even confessed to rape more than 200 people. By this point, you would known the level of under reporting of rape. By this documentary, we came to know that there are many filthy people like him and they have no feeling for their mistake and most importantly they attribute that mistakes to victims.


The Bad

By revealing the name of the identity, BBC has condemned the court’s order. In any rape case, no media has the right to reveal the victim’s name even after the permission of their parents. Its not fair and good. While the case is still in the super court, this documentary may be considered as the interference to the supreme court justice because no foreign personal has the power to investigate a case of this nature.

The ugly 

The most embarrassing part of this documentary will be the speech of two defense lawyer. I literally don’t know how they became a lawyer without having a little respect for a women. Defense lawyer is one of the essential thing of judicial system but these two guys are definitely crazy. At point, a defense lawyer said that Indian culture has no place for a women. What do this lawyer know about Indian culture? Why is this lawyer blabbering some nonsense over a foreign television channel? All British people who had watched this show would have an ugly perception on Indian culture. I do expect such a creepy thing from a horrific rapist but such a statement from a lawyer is unjustifiable. Bar council should revoke his licence to practice. Another defense lawyer gave a extreme statement that he would kill his daughter, if she had went with any boy. B_U3ewjUwAAJ-5w

 Anyway, thank you BBC for showing the real color of some of the filthy lawyers.


Basic computing terms part 2

Read previous part of this article in following link(Basic computing terms part 1) before reading this article.

Handshake: It is the process of transmitting information between two devices in order to make connection between two devices. Information transmitted before connection are request to make connection and Acknowledgement to make connection.

Host: It is the device connected to the network while server controls and monitors the network.

Identity theft: It is the illegal way of stealing someone else identity by the use of Information and technology. When you hack your friend’s Facebook password, it is called  identity theft.

Internet: It is the network of networks. It is the biggest network in the world. It uses HTTP and IP protocol. (For more information, please refer Internet and network basics).

Intranet: It is the network of computers in a particular organisation. Intranet is established in order to facilitate transmission of information within the organisation.

Mail: It is the electronic message which can be sent to any computer that is connected to the internet instantly.

Microprocessor: It is the combination of millions of integrated chips. It is integral part of the computer as it processes the data. With the advent of VLSI technology, semiconductor devices are becoming more and more smaller in size.

Modem: It is an acronym of Modulator and demodulator. As the name implies, it modulates the outgoing data and demodulates the incoming data.  Modulation is the process of converting digital signal into analog signal and demodulation does the reverse process.(For more information on digital and audio signal, please refer Internet and network basics).

Multimedia: It is a representation of a digital information in a attractive way such as video, audio, image , graphics ,animation, etc.

Neural networks or Artificial Neural Network(ANN):Neural networks are sophisticated learning algorithms which are inspired from the biological neural system. They are used in pattern recognition, computer vision and facial recognition. ANN uses parallel processing.  ANN will be extremely useful in realizing artificial intelligence.

Open source software: It is freely available software and usually its source code is also available to all people. Sometimes , creator may allow anyone to edit source code redistribute it for any reason.

Operating system: It is the vital program that coordinates system’s hardware and software. It controls all other programs installed in the system(For more info, refer Basics of computing)

Parallel processing: It is the simultaneous use of more the one processors to solve a complex problem. Processes such as data mining, big data analysis, remote sensing needs lot of processors and hence parallel processing is used for above applications. Following picture shows a picture of a super computer named Blue genie which uses parallel processing.


Image credits: Argonne National Lab License: CC-2.0

Pixel: It is the smallest unit of the picture. Quality of the picture is represented by its resolution. Resolution is nothing but the matrix of pixels.

Program: It is the set of instructions that is intended to do a specif task on its execution.

Peer to peer network(P2P): It is a network in which all hosts have equal preference and permission and they usually share the same work. Following image illustrates P2P network. Image credits:


Protocol or Standards: It is the set of rules to be followed by a device while doing specific task.

Basic Marketing series part 2 (Types of marketing)


Marketing is basically classified into 2 types: 1. Direct marketing 2.Indirect marketing. Direct marketing is the strategy of marketing goods and services directly to the customer such as contacting him via email, social media ,message and phone call .Marketing done through email is called email marketing and Marketing done through phone call is called Telemarketing. Database marketing is done by sending message about new products and services to the customer database.

Indirect marketing is the strategy of marketing goods and services indirectly. Advertisements done by the celebrities are the example of indirect marketing. Simply, the celebrities are promoting the products indirectly.Indirect marketing is taking place almost everywhere in the internet. When you search for best medicine, best school or best coaching center in internet, many blogs ,websites promote something indirectly.

Alliance marketing: Two or more companies join hands in order to promote a specific product.

Affinity marketing: Two companies with similar interest works together for the mutual gain and for the betterment of the customers of both the company. This type of work promotes the product among the loyal customers of both the company.

Digital marketing: It is the marketing strategy which uses latest digital technology such as advertising in television, radio, ,smart phone etc .Internet marketing is the vital tool of digital marketing. It uses websites, social media,blog,forums for promoting goods and services.

Behavioral Marketing: It is the extremely targeted marketing strategy.Internet marketing company such as Google ad words is using advanced data mining software. What is data mining? It is the process of extracting useful information such as behavior and interest of the user by extracting data from cookies and browsing history. Hence data mining is the advanced tool which can be used to target goods and services to only the person who needs them.

Buzz Marketing: It is the strategy of promoting goods by creating buzz. Last year SpiceJet created Buzz by announcing air rate fare at Rs.1 .As a result of this buzz, 2.2 lakhs of tickets were sold within a day.

Brand Marketing: It is the process of getting more loyal customers and getting trust over the brand quality and service.Some brands such as BMW,Audi don’t need marketing since the brand them-self markets their products.It may take lot of time for company to do this type of marketing but this marketing is found to be most efficient.

Bench Marketing: It is the marketing strategy in which the company promotes the product by comparing it to the competitor product.

Freebie Marketing or Razor and Blade Business model:It is the marketing strategy in which the products are given to customers at very low rate or for free in order to improve the brand awareness.

Personalized or customized marketing: Many top companies gives lot of importance to customer’s changing taste. They offer customized goods and services to meet the taste of every customer.  Customized cars,bikes are more common this days. So it is the marketing strategy in which goods and services are on par with the customer’s interest.

Diversity Marketing:It is the marketing strategy in which more choices are given to customers in order to satisfy every customer. Less choice or no choice will result in the customer dissatisfaction.

Internal Marketing: It is the marketing strategy in which vision and mission statements are explained clearly to every employee of the company, Hence it is termed as internal marketing. While external marketing promotes goods and service of the company to other people.

Guerrilla marketing: It is the marketing strategy in which goods and services are promoted with different method. Guerrilla marketing is usually low cost tactic and it is done to attract more people.It is similar to buzz marketing. Viral videos about a company may promote their products quickly and cheaply.

Viral Marketing:It is the marketing strategy in which goods are services are promoted by creating buzz in the social media and video sharing sites.

Drip Marketing:It is the marketing strategy in which messages about  goods and services are sent to customers regularly. In addition to sending messages ,Companies also posts messages regularly in social media and on blogs to increase brand awareness.

Basic computing series part 4 (Application software)

Application software performs a specific task.Data processing software are important classification of Application software and it converts data into information. Thus the information obtained using data processing software can be useful for analysis,decision making and presentation. Some of the important data processing software are MS WORD,MS excel  and MS power point.

Any software that is used to write,edit,format and delete text document is called word processing software. Commonly used word processing software are MS Word, Libreoffice Writer, Lotus Word pro and Quick office(For MAC OS).

Spreadsheet is a data processing software to analyse, organize data and process data in tabular form. Any formula can be applied to the values in the cells(Intersection of rows and columns is called cells).  Charts and Graphs can be generated to interpret changes in the data and that information will be useful for decision making. Commonly used spreadsheet software are MS Excel, Libreoffice Calc and Mariner Calc(For MAC OS).

Presentation Software is used to display content in the form of slide show. As the name implies, they are used for presentation of data.Commonly used spreadsheet software are MS Power point and Libreoffice Impress.

Database management software(DBMS): As we have already discussed, database is collection of related data. DBMS is used to create,analyse  and filter the database. Commonly used DBMS are MySQL,Oracle and MS access.

MS outlook is used as a email application and used to manage personal information of a user. Note:This article gives brief introduction of application software and more information regarding data processing software will be given in future articles.

Basic Computing series part 3 (Basic Computing concepts)

Data: It is a raw input. It can anything ranging from name to age. It is a mere fact arranged in random order.

Database: It is collection of related data. Example Name register of a company is collection of names of employees of a company.

Information: It is a processed data. Hence it is a organised data. It is useful in decision making process. Information regarding number of students failed in certain subject may be useful for planning future course of action while unorganized data cannot be useful in decision making process.

Units Of Information/Data:

All data in computer is stored in binary format. Binary format consists of only 1 and 0. Bit is the basic unit of memory. It can hold one binary value that is either 1 or 0. All the other units of memory is discussed below.

1 Nibble=4 bits

1 byte= 8 bits

1 Kilobyte(KB)=1024 bytes

1 Megabyte(MB)=1024 KB

1 Gigabyte(GB)=1024 MB

1 Terabyte(TB)=1024 GB

1 Pettabyte(PB)=1024 TB

1 Exabyte(EB)=1024 PB

1 Zettabyte(ZB)=1024 EB

ASCII system:

I have already mentioned in this article that computer only handles the data in binary format. So all characters,symbols and numbers are converted into 7 binary integers by ASCII system(American Standard Code for Information Interchange) so that computer can understand the word,letter and symbol typed by the user. ASCII can convert 128 characters,numbers and symbols to equivalent 7 digit binary integer.

Program is the set of instructions to computer to do a specific task. Programming language acts as a interface between the user and computer. Since the invention of computer, this interfacing method has evolved a lot. Advanced programming languages has made the interface between computer and human as a easier and interactive. In early days of computing ,coding was needed to do any task. The command prompt that you use in the windows were actually acted as a interface. Graphical User Interface(GUI) made interface as an interactive one through the use of icons and dialog boxes.

Types of programming Language:

As i have said earlier, every computer needs program to do any task. First generation computers use low level programming language or machine level programming language. Programs are written in binary format so that computer can understand  it without any problem. Low level programming languages are very hard since they are binary format. Debugging (correcting the error) is also very difficult in case of low level programming language. Assembler level language were used in second generation computers. Mnemonic codes were used to write programs. Mnemonic code is a simple translation of complex binary code. Example 12 is used in program  instead of “001100” to represent any operation. Since computer cannot understand the this codes, a translator is needed in assembly language. High level language is an advanced programming language in which program is written as instructions that are easy to remember.COBOL(Common Business Oriented Language),FORTAN(Formula Translation) and C are examples of High level language.

Compiler and Interpreter:

In order to understand instructions given by programmer, computer needs compiler or Interpreter. Compiler translates entire program into machine level language. It also shows syntax(the way the instructions are written) error and executes program after typing the whole program. Interpreter translates every line of program into machine language as they are entered. It will show syntax error and executes instructions after typing every line of the program.C,C++ uses compiler while basic,Perl and Python uses Interpreter.

System software: It is critical information necessary for the operation of the computer. It is fed into the ROM of the computer. It does booting processing. Booting initiates the computer by checking whether all the necessary software and hardware working properly. Operating System(OS) is a system software that interfaces computer hardware and software and they are necessary to run other application which are called as application software. Commonly used OS in computers are Microsoft’s Windows, UNIX, Linux, DOS and MAC OS. More information regarding application software will be discussed in next part of this series,

Basic Computing Series Part 1 (History of Computers and Types of Computers )

First Generation Computers:

Year: 1946-59

Primary Device used: Vacuum Tubes

Famous computers at the time: Electronic Numerical Integrator and Calculator(ENIAC) and Electronic Discrete Variable Automatic Computer(EDVAC)

Type of Programming Language: Machine Level. (Programming was done in binary form)

Cons: They were very bulky in weight. They were very big in size.  Their speed is very low.They consume more electricity hence, they dissipate more heat. Difficult to remember codes.

Second Generation Computers:

Year: 1959-64

Primary Device used: Transistor

Famous computers at the time: IBM 1920 and IBM 1401

Type of Programming Language: Assembly Level. (Short codes were used to in program)

Pros: Better than first generation computers in terms of speed and consumption of energy.They are smaller in size and weight than first generation computers.

Cons: They still dissipate heat.Hence, coolers were needed. Maintenance cost of the computer were high.

Features developed: Programming language such as FORTAN and COBOL were developed during this generation.

Third Generation Computers:

Year: 1964-71

Primary Device used: Integrated Circuit

Famous computers at the time: IBM 370 and VAX 750

Type of Programming Language: High Level.

Pros: Better than second generation computers in terms of speed and consumption of energy.They are smaller in size and weight than second generation computers.

Cons: Maintenance cost of computer were still high. It cannot do complicated operations.

Features developed: OS was used for the first time to interface the software and Hardware.

Fourth Generation Computers or Modern Computers:

Year: 1964-71

Primary Device used: Microprocessor

Type of Programming Language: High Level.

Pros: Computer became small in size due to emergence of VLSI (very large scale integration) Technology. A microprocessor can have millions of integrated circuits in it. Thus Computer became extremely small. Due to fabrication millions of integrated circuits in single microprocessor, It can do advanced operations within seconds.

Cons: It cannot take a decision. In other words computers does not have Intelligence.

Features developed: Graphic Interface was developed. Mini and micro computer were developed during this period.

Fifth Generation Computers

Year: Future

Features to be developed: Artificial Intelligence. Computers to possess intelligence.

Types of computers:

Computers are classified into three types based on the type of data they handle: 1.Analog 2.Digital 3.Hybrid

Analog computer handles the analog data. Analog data means data that are continuously available over a time.Examples of analog data are ECG, Weather reports, etc

Digital computer handles the digital data. Analog data means data that are constant.Examples of digital data are temperature at particular time, number of messages received in particular day, etc .In computer terms, Digital computers handles only two data:1,0.

Hybrid Computer handles both the analog and digital data.

Computers can also be classified into 4 types based on their memory capacity and speed

Microcomputers: They are also called as personal computers intended for single person use. Microcomputers includes desktop, laptop, palmtop ,Tablets, PDA and Smartphones

Minicomputers: They have more memory and speed than that of Minicomputer. They are intended for the use of computer by more than person at the same time.

Mainframe computers: They are used by research organisation and big corporate to handle vast amount of data at the same time. They can handle millions of instrucion per second

Super Computers: They are the fastest class of computers. They are used in critical research areas such as remote sensing ,Nuclear reactor and satellite launching. PARAM is a series of supercomputers developed by India. Prithivi is India’s fastest supercomputer capable of doing 790 trillion floating point calculations per second.

Embedded computers is a special type of computer that are included in a machine to do specific task. Examples of Embedded computers are  electronic voting machine, Traffic signal and Washing machine.