Sunday 29 June 2008

Some Quotes on 'Change'

He who rejects change is the architect of decay.  The only human institution which rejects progress is the cemetery.  ~Harold Wilson
If you don't like something change it; if you can't change it, change the way you think about it.  ~Mary Engelbreit
It is not necessary to change.  Survival is not mandatory.  ~W. Edwards Deming  (Thank you, Michelle.)
All changes, even the most longed for, have their melancholy; for what we leave behind us is a part of ourselves; we must die to one life before we can enter another.  ~Anatole France
When we are no longer able to change a situation, we are challenged to change ourselves.  ~Victor Frankl
Without accepting the fact that everything changes, we cannot find perfect composure.  But unfortunately, although it is true, it is difficult for us to accept it.  Because we cannot accept the truth of transience, we suffer.  ~Shunryu Suzuki
The man who looks for security, even in the mind, is like a man who would chop off his limbs in order to have artificial ones which will give him no pain or trouble.  ~Henry Miller
Change is inevitable - except from a vending machine.  ~Robert C. Gallagher
If you're in a bad situation, don't worry it'll change.  If you're in a good situation, don't worry it'll change.  ~John A. Simone, Sr.
There is a certain relief in change, even though it be from bad to worse!  As I have often found in travelling in a stagecoach, that it is often a comfort to shift one's position, and be bruised in a new place.  ~Washington Irving
When you are through changing, you are through.  ~Bruce Barton
Faced with the choice between changing one's mind and proving that there is no need to do so, almost everyone gets busy on the proof.  ~John Kenneth Galbraith
What can we take on trust
in this uncertain life? Happiness, greatness,
pride - nothing is secure, nothing keeps.
~Euripides, Hecuba
They must often change, who would be constant in happiness or wisdom.  ~Confucius
Change always comes bearing gifts.  ~Price Pritchett
The only difference between a rut and a grave is their dimensions.  ~Ellen Glasgow
Life is its own journey, presupposes its own change and movement, and one tries to arrest them at one's eternal peril.  ~Laurens van der Post
Growth is the only evidence of life.  ~John Henry Newman, Apologia pro vita sua, 1864
Just because everything is different doesn't mean anything has changed.  ~Irene Peter
Time is a dressmaker specializing in alterations.  ~Faith Baldwin
The circumstances of the world are so variable that an irrevocable purpose or opinion is almost synonymous with a foolish one.  ~William H. Seward
The birds are molting.  If only man could molt also - his mind once a year its errors, his heart once a year its useless passions.  ~James Allen
The man who never alters his opinion is like standing water, and breeds reptiles of the mind.  ~William Blake
Man's yesterday may ne'er be like his morrow;
Nought may endure but Mutability.
~Percy Bysshe Shelley, "Mutability"
You can avoid having ulcers by adapting to the situation:  If you fall in the mud puddle, check your pockets for fish.  ~Author Unknown
Time, which changes people, does not alter the image we have retained of them.  ~Marcel Proust
Stubborness does have its helpful features.  You always know what you are going to be thinking tomorrow.  ~Glen Beaman
If nothing ever changed, there'd be no butterflies.  ~Author Unknown
Nowadays change is around every corner; in my day it was only around the expected ones.  ~V.L. Allineare

I put a dollar in one of those change machines.  Nothing changed.  ~George Carlin
We did not change as we grew older; we just became more clearly ourselves.  ~Lynn Hall
It is not the strongest of the species that survive, nor the most intelligent, but the one most responsive to change.  ~Author unknown, commonly misattributed to Charles Darwin
The wheel of change moves on, and those who were down go up and those who were up go down.  ~Jawaharlal Nehru
We would rather be ruined than changed;
We would rather die in our dread
Than climb the cross of the moment
And let our illusions die.
~W.H. Auden
What you have become is the price you paid to get what you used to want.  ~Mignon McLaughlin, The Neurotic's Notebook, 1960
Those who expect moments of change to be comfortable and free of conflict have not learned their history.  ~Joan Wallach Scott
All change is not growth, as all movement is not forward.  ~Ellen Glasgow
Oh, would that my mind could let fall its dead ideas, as the tree does its withered leaves!  ~Andre Gide
If you want to make enemies, try to change something.  ~Woodrow Wilson
After you've done a thing the same way for two years, look it over carefully.  After five years, look at it with suspicion.  And after ten years, throw it away and start all over.  ~Alfred Edward Perlman, New York Times, 3 July 1958
Continuity gives us roots; change gives us branches, letting us stretch and grow and reach new heights.  ~Pauline R. Kezer
If you would attain to what you are not yet, you must always be displeased by what you are.  For where you are pleased with yourself there you have remained.  Keep adding, keep walking, keep advancing.  ~Saint Augustine
We spend our time searching for security and hate it when we get it.  ~John Steinbeck, America and Americans
A good question is never answered.  It is not a bolt to be tightened into place but a seed to be planted and to bear more seed toward the hope of greening the landscape of idea.  ~John Ciardi
There is no reason why the same man should like the same books at eighteen and forty-eight.  ~Ezra Pound
Every beginning is a consequence - every beginning ends some thing.  ~Paul Valery
It's the most unhappy people who most fear change.  ~Mignon McLaughlin, The Second Neurotic's Notebook, 1966
People don't change.  Only their costumes do.  ~Gene Moore
God grant me the serenity to accept the people I cannot change, the courage to change the one I can, and the wisdom to know it's me.  ~Author Unknown
We all have big changes in our lives that are more or less a second chance.  ~Harrison Ford
Neither a wise man nor a brave man lies down on the tracks of history to wait for the train of the future to run over him.  ~Dwight D. Eisenhower
No two men ever judged alike of the same thing, and it is impossible to find two opinions exactly similar, not only in different men but in the same men at different times.  ~Michel Montaigne
If you want to truly understand something, try to change it.  ~Kurt Lewin
Things do not change; we change.  ~Henry David Thoreau
Our only security is our ability to change.  ~John Lilly
Because things are the way they are, things will not stay the way they are.  ~Bertold Brecht
He that will not apply new remedies must expect new evils; for time is the greatest innovator.  ~Francis Bacon, "On Innovation," Essays, 1597
Things alter for the worse spontaneously, if they be not altered for the better designedly.  ~Francis Bacon
A scholar who loves comfort is not fit to be called a scholar.  ~Confucius, Analects
Sudden resolutions, like the sudden rise of the mercury in the barometer, indicates nothing but the changeableness of the weather.  ~Augustus William Hare and Julius Charles Hare, Guesses at Truth, by Two Brothers, 1827
Every possession and every happiness is but lent by chance for an uncertain time, and may therefore be demanded back the next hour.  ~Arthur Schopenhauer
When you jump for joy, beware that no one moves the ground from beneath your feet.  ~Stanislaw Lec
The only man I know who behaves sensibly is my tailor; he takes my measurements anew each time he sees me.  The rest go on with their old measurements and expect me to fit them.  ~George Bernard Shaw

Sunday 22 June 2008

CamSpace

Camspace!!!!

The coolest gaming app i've ever come across!!. You can play most of the games using any object as input. All you need is a game which runs on your computer hardware and a Web Cam. It uses realtime motion detection from predefined shapes like square,rectange,2 points etc( i made this up after seeing the video and reading their blog and commerical website) . It detects changes in pitch,yaw and roll in real time. Now, if you intend to play a game like counter strike with CamSpace, You can throw away your mouse,keyboard and joystick..Imagine fragging with shear fingers!!, Firing with the ak47 and m16's with fingers!!

Now, the best part is, the input device can be anything, a beer can for example!!! :D, believe me, it's POSSIBLE with CamSpace!!!. I'm wondering if this app has just opened up the door of possibilities for GUI interaction and game playing. Watch the video to get blown away!!!

Saturday 21 June 2008

Programming in the age of Concurrency!!

 

Enter parallel extensions for .Net (PFX), Microsoft’s new take on parallel programming and concurrency in the .net world. I saw an extensive 34 minute video on channel 8 from the man himself – Anders Hejlsberg.

In summary, the PFX set of libraries can be used to leverage true multi-core programming which are becoming common these days.

Here is the link

Friday 20 June 2008

Rob Miles's Very Silly Interview

Our Professor Rob Miles speaks to Microsoft's Dan Fernandez. The interview can be found on Channel 9 here. The jovial Rob is as usual articulate and yet funny at the same time..:) Also check out his blog www.robmiles.com and his silly games site www.verysillygames.com.

And if you're wondering why it's called 'Very Silly Interview', That what they call it on Channel 9. I've not given any names..To find out more watch the interview..

Verisign's Extended Validation SSL Certificate

What is Extended Validation SSL ?

Extended Validation SSL Certificates give high-security Web browsers information to clearly identify a Web site’s organizational identity. For example, if you use Microsoft® Internet Explorer 7 to go to a Web site secured with an SSL Certificate that meets the Extended Validation Standard, IE7 will cause the URL address bar to turn green. A display next to the green bar will toggle between the organization name listed in the certificate and the Certificate Authority (VeriSign, for example). Firefox 3 also supports Extended Validation SSL. Other browsers are expected to offer Extended Validation visibility in upcoming releases. Older browsers will display Extended Validation SSL Certificates with the same security symbols as existing SSL Certificates.

- Source of the above can be found here

This can be clearly noticed in IE 7 and 8 Beta when an SSL Encrypted transfer is going on. Eg. a user signing into hotmail, a user sending his credit card information to a website. etc..(transactions/sessions which use SSL)

Also, check out the Verisign EV SSL Demo

Thursday 19 June 2008

Programming the Thread Pool in .Net

I discovered this excellent article on Thread Pooling in .Net on MSDN, It can be found here. If you are interested in understanding why thread pooling made it to the .Net Platform, read this article here. Also, check out this article on CodeProject which discusses some behind the scenes issues with .Net ThreadPool Class.

Wednesday 18 June 2008

Windows Developer Power Tools

Great software tools make developers more productive!!, Above all it makes life much simpler!!

If you have missed out on reading this book titled 'Windows Developer Power Tools', click on Link no. 1 to get a view of this book. If you want to quickly look at what kind of power tools are out there, which can make your life simpler, Click on Link no. 2.

Some Links.
1. Windows Developer Power Tools
2. Scott Hanslemen's ultimate developers and power users tool list

Tuesday 17 June 2008

AVG 8: Home Users Friend,Webmasters envy

If you think, your website is getting more hits than usual, don't every jump into a conclusion that there are more users visiting..For all you know it will be a bot program scanning links on your site , checking if it's malware free, completely imitating a human searching for information on a website..

This is a new feature added into the AVG 8 Engine called the 'linkscanner'. It scans the links for malware before a user visits them. AVG acquired a company off-late called Exploit Prevention Labs, developer of link scanner safe surfing technology.

Now, Although Exploit Prevention Labs experience says that, in the world of web 2.0 attacks, dynamic link scanning would be the safest prevention from malware. For a minute consider the amount of traffic usage. Assume your favourite search engine gives you 10 results for a keyword. Now, if you have AVG 8 installed, it scans all the 10 links pre-hand to check if the content is malware free.

Good ?, Now, according to 'TheRegister', 20 million machines have upgraded to AVG 8. Think about the traffic increase, disk space wasted in logging link scans. IT IS HUMONGOUS..

Web Analytics will be severely impacted, Marketing team would get false data about the no.of hits to their website.. Now, the value of link scanner as an USP to AVG may be considered neat, may also be acceptable by the user, due to it's shear dynamic malware protection capabilities.

But the question which remains at large ,

Is link scanning really worth it at the cost of web traffic, web analytics, disk space etc..?, when the whole world is thinking about energy saving!! , Is there a smart way out ?

Monday 16 June 2008

Talk to me ( ಹರಟೆ ಹೊದಿಯೋಣ ? )

Starting from today, You can talk to me directly from within my blog.. Scroll down to the 'About Me' section, which is on the bottom left of this page to find the 'Talk to me' widget. Start typing your message into the box to chat. However, you cannot type a message, if the status is set to busy..
Google's Chatback Badge Rocks!

Happy Father's Day

Sunday 15 June 2008

Asynchrounous Programming Introduction

Coming soon..
Just reminding myself that i have a pending post on asynchronous programming in .net tonight..Just working on some samples at the moment. :D It's exciting!!

Saturday 14 June 2008

Elvis Presley - My Favourite Song..

 

A little less conversation.. The following video is from the movie in which he has acted. (Live a little,Love a little). Funny video though..

Thursday 12 June 2008

Vedic Metal - The beginning of a new era...

Agni - Mrityunjaya Tandav. I've always admired this song in the context of Vedic Metal. It's beautifully composed..

Below is a composition of mine called "Rudra Tandava".

This song interprets the dance of Lord Shiva..The depiction of cosmic energy being transmitted from the sun to a particle , from this particle to another particle and so on, as the sun rises...As a result , all particles which transmit the light energy start vibrating..This was an inspiration from the book called 'The Tao of Physics'.. I do not want to add more..I've probably described 2 percent of what Rudra Tandava stands for...it's for the viewer to experience and find out..

Software Engineering with VSTS


 

 

 


I'm reading this book called 'Software Engineering with Visual Studio Team System' by Sam Guckenheimer. To say the least, It's not letting me sleep. This book looks tiny though but is humongous in it's content and specifically the application lifecycle management automation through VSTS. VSTS is the best thing to happen to MS technology developers for a long time.. The best part is how the book guides you with Agile methodologies and CMMI practises using VSTS.

Some Links..


The interesting thing which caught my attention was security testing through VSTS. Sam talks about using a fault model base on vulnerabilites observed on other systems, and a series of attacks to exploit the vulnerabilites. He also gives references to published attack patterns which are helpful in identifying the vast majority of vulnerabilites. His reference includes James A. Whittaker and Herbert H. Thompson's book, 'How to break software security: Effective Techniques for Security Testing (Boston: Addison-Wesley,2004). (which has around 19 attack patterns that are standard approaches to hacking systems).
Now, There's a lot of stuff for security from microsoft, for instance the trustworthy computing initiative, SD3 and SDL , Security best practises etc..
I'm wondering if there was an SDL approach inside Visual Studio Team System.. (may be as a part of ALM), What an invaluable feature it would have been..!!

RuleML The Standard for Rule Representation

RuleML The Rule Markup Initiative..

The Mission Statement of RuleML

"The goal of the Rule Markup Initiative is to develop RuleML as the canonical Web language for rules using XML markup, formal semantics, and efficient implementations.

RuleML covers the entire rule spectrum, from derivation rules to transformation rules to reaction rules. RuleML can thus specify queries and inferences in Web ontologies, mappings between Web ontologies, and dynamic Web behaviors of workflows, services, and agents."

RuleML Mission Approach

"Rather than focusing on academic research prototypes, RuleML is about rule interoperation between industry standards (such as JSR 94, SQL'99, OCL, BPMI, WSFL, XLang, XQuery, RQL, OWL, DAML-S, and ISO Prolog) as well as established systems (CLIPS, Jess, ILOG JRules, Blaze Advisor, Versata, MQWorkFlow, BizTalk, Savvion, etc.)."

I feel that a standardization for representing knowledge through rules is very essential for the semantic web for applications ranging from distributed e-commerce to Engineering like AI agents etc. Simply because of the need for a widely acceptable industry standard rule engine..(JSR94 vs BizTalk). This will increase interoperability between systems and makes life much much simpler... This can be achieved with RULEML, the mark up initiative for Rules.. (way forward..) If you are an academician or a company interested in the idea of  standardization for Rules through Rule Markup, Join the RuleML initiative today.!!     :-)

Tuesday 10 June 2008

Discovering Patterns in .Net BCL and ASP.Net

Patterns behind the scenes in .Net and ASP.Net

I just found this great article on MSDN which enlightens the .Net programmer about the patterns used in .Net BCL and ASP.Net. The link to this great article can be found here.

The Decorator Pattern Part I

The Need for the Decorator Pattern:

Decorators can be used to decorate classes at runtime using a form of object composition.This is a good pattern which helps to minimize overuse of inheritance for adding special behaviours to classes. Decorators are primarily used to add flexibility to design. They are used to add more behaviours to existing classes by adding a wrapper around them,without changing the existing code. One needs to be careful in writing a decorator. Too much decoration can make the code lousy,difficult to read,modify and maintain. For instance, consider Java's I/O libraries. They are notoriously difficult for people to understand at first. But if they just saw the classes as a set of wrappers around the abstract class InputStream, life would be simpler..

Learning by example..

1. Recognising the decorators from the Java.IO classes

Decorator1

The InputStream is the abstract component. The FilterInputStream, ByteArrayInputStream, StringBufferInputStream and the FileInputStream are abstract decorators.

Now, PushbackInputStream, BufferedInputStream, DataInputStream and LineNumberInputStream are all concrete decorators.

Now, think about the decorators and the flexibility it adds to the design of Java.IO in the following sentences..(Classes are open for extension but closed for modification)

InputStream in = new BufferedInputStream(new FileInputStream("aFile.txt"));

BufferedInputStream bis =  new BufferedInputStream ( new DataInputStream ( new FileInputStream ( "aFile.txt" )  )  ) ;

 

2. An example of decorating our beverage component by using an abstract decorator 'CondimentDecorator' and a single concrete decorator 'Mocha'. The concrete components add specialized classes (HouseBlend, Espreso). We will see this in more detail in Part II. Consider the following class diagram.

 

image

The Beverage is the component which we are interested in decorating here. The CondimentDecorator is the abstract decorator. The Classes Expresso and HouseBlend are concrete components. The Mocha class is a concrete decorator.

Now, look at the following code to understand the power of concrete decorators and the Decorator Pattern itself.

Beverage b1 = new Espresso();      // A type of Beverage, Concrete component

Beverage b2 = new HouseBlend(); //A type of Beverage, Concrete component

b2 = new Mocha(b2); //wrap the beverage with Mocha

 

Decorators Rule!, More reasons and justifications in Part II..

Monday 9 June 2008

Generating RSA Key Pair Programmatically using OpenSSL

#include "stdafx.h"
#include <conio.h>
#include <openssl/rsa.h>
#include <openssl/bio.h>
#include <openssl/x509.h>
#include <stdlib.h>
#include <stdio.h>


int _tmain(int argc, _TCHAR* argv[])
{
RSA *myrsa;
unsigned long e = RSA_3;
BIO* out = NULL
FILE* fp;
myrsa = RSA_generate_key(2048,e,NULL,NULL);

out=BIO_new(BIO_s_file());


if(myrsa==NULL){
printf("error in generating keypair..");
printf("press any key to exit..");
_getch();
}

fp=fopen("rsakeypair.txt","wb");
out = BIO_new_fp(fp,BIO_CLOSE);
BIO_printf(out,"\n");
RSA_print(out,myrsa,0);
fclose(fp); _getch(); return(0);
}




The above example program generates a 2048 bit RSA Key pair. It also generates the p,q,n,e and d sections into the text file. In order to build this sample using Visual C++, you will need to build OpenSSL first. After you build OpenSSL, you can then include the generated headers to your VC/Include folder. You will also need to include the the lib files generated by OpenSSL onto VC/Lib. The above example program is written in VS05. OpenSSL simply rocks!



Code + Demo + ReadmeFile : Here

Friday 6 June 2008

Wednesday 4 June 2008

Best Practises for rule based application development

"Takes a high level view of knowledge and looks at different types of knowledge and their mappings to executable computer code to gain insights into when and why rule engines provide advantages over conventional software development tools." - Dennis MerrittAmzi! Inc. January 2004
Superb article, worth a read..

Microsoft Imagine Cup 08

I am participating in the Microsoft Imagine Cup 08. We have made it to the UK Semifinals at the moment and the grand UK finale is on the 5th of June at London. We have been officially invited to the Finals [ MS is bearing the travel fair, Hotel and Food bills!! :-) ]. I'm really looking forward to it.This is my first trip to London, haven't seen it before...So, I'm a bit nervous and excited at the moment..

My team comprises of myself and my only other teammate, David Wilson. We are hoping to win this based on a solid idea and extensively equipped skills to develop the app further.

rot26

The Microsoft UK Semifinalists listing can be found here. The University of HULL has been bagging the UK Finals from last 2 years. We are hoping to keep up the spirit alive and kicking from our university..

2 days to go, fingers crossed..

 

 

Neither prejudiced by the past nor in fear of the future,the moment, only the moment....

Tuesday 3 June 2008

The Raghu Dixit Project - Antaragini

The Indian Dave Mathews!!!! Genius Music Making!!!

The above videos can be found Here and Here . (Just in case, if the buffering acts up..)

The Observer Pattern

Before we understand what an observer does, we need to define and understand the following.

The Subject     :  An object which does something...(verb) like publishing an Event, changing it's state etc. This object is the subject object. The observers are interested in getting a notification when The Subject 'does something'

The Observers :   Objects which are to be kept notified when the Subject Object's Event,State has Changed. Examples of Subject Object 'doing something' :

                - Subject Object publishes an event

                - Subject Object's State changed etc.

The publisher and the subscriber model is a good example to understand an observer pattern. (Check out Java's Action Listeners) The publisher publishes the event. Now, Let's say, a set of objects are interested in this Event and they need to perform an action based on this Event. Therefore they subscribe to this event to get a notification (callback) from the Publisher, which notifies them when the event occurs or about the event  itself.

To Give a real-life example, Consider a File Reader (program written in C# of course), which reads a file line by line to EOF. Now, let's say a list of Observers/Listeners should be notified after every line is read by the File Reader. Therefore, they register with the Subscriber (File Reader in our case), After which, they get notifications from the Subscriber whenever the File Reader finishes reading a line from the file. Let's say it also gives them the line which it has currently read in the notification mechanism.

The Observer Design

Observer

 

 

 

 

 

 

 

( really don't like the way the class designer associations behave in visual studio, MS please do something about it yaar! )

FileReader associated to IFileListener by the ListIFileListners property in the above figure. FileReader has a List<IFileListeners> field, which is used to maintain the list of registered listeners.

Now, the Code..

public interface IFileListener
{
//callback after every line is read.
void ILineRead(string LineRead);
}


public class FileReader
{
private List<IFileListener> listeners;

public FileReader()
{
listeners = new List<IFileListener>();
}

public List<IFileListener> ListIFileListener
{
get
{
return listeners;
}
set
{
listeners = value;
}
}

public void Register(IFileListener lis)
{
if (listeners.Contains(lis)) {
throw new Exception("Listener already registered..");
}
else {
listeners.Add(lis);
}
}

public void Unregister(IFileListener lis)
{
if(listeners.Contains(lis)){
listeners.Remove(lis);
}
else{
throw new Exception("Listener not registered..");
}
}
/// <summary>
///
Reads a line of text from the input file and
/// sends a callback to all registered listeners.
/// </summary>
/// <param name="filename"></param>

public void ReadFile(string filename)
{
if (File.Exists(filename)) {
TextReader txtReader = File.OpenText(filename);
string line = "";
while ((line=txtReader.ReadLine())!=null) {
foreach (IFileListener lis in listeners) {
//send callbacks to registered listeners
lis.ILineRead(line);
}
}
}
else {
throw new Exception("Input file does not exist..");
}
}

}



The Usage:



class Program:IFileListener
{
public Program()
{
FileReader reader = new FileReader();
reader.Register(this);
reader.ReadFile("textfile.txt");
}

static void Main(string[] args)
{
Console.WriteLine("testing observers..");
Program pgm = new Program();
Console.WriteLine("\npress any key to exit..");
Console.ReadKey();
}


#region IFileListener Members
/// <summary>
///
This method gets automatic call back with
/// the string line which is currently read.
/// </summary>
/// <param name="LineRead"></param>
public void ILineRead(string LineRead)
{
Console.WriteLine("Read Line: " + LineRead);
}

#endregion
}



The Text File Contents..



AAVARANA AND DA VINCI CODE: A COMPARISON

N.S. Rajaram


http://rajeev2004.blogspot.com/2007/02/literary-phenomenon-historical-novel.html


Like Dan Brown's Da Vinci Code, S.L. Bhyrappa's Aavarana is likely to have far-reaching social and political fallout that goes beyond its literary niche. In reading S.L. Bhyrappa's latest Kannada novel Aavarana, Dan Brown's best selling novel Da Vinci Code springs naturally to mind. Both have as their subject the suppression of true history and the propagation of a myth by powerful interests. In Da Vinci Code, the villain is the Catholic Church and its modern secret and sinister arm the Opus Dei. In Bhyrappa's novel, the villain is the collective of politically correct historians and 'intellectuals' who out a combination of greed and fear have suppressed the truth about Islam and its record in India. While these intellectuals—called dhimmis by the Egypt-born scholar Bat Ye'or—can boast of no Vatican or Opus Dei, they do form a powerful clique enjoying the support of successive governments who find it politically expedient to appease Islam and conceal the truth about its record and teachings. As this phenomenon is by no means limited to India, Bhyrappa's Aavarana, and the public reaction to it should be of interest far beyond its intended readership..



Dr.S.L.Byrappa is a living legend of Kannada litereature. Dr.S.L.Byrappa is one of the most popular writer and Kannada novelist. He has a Phd in Philosophy; his doctoral dissertation entitled “Satya Mattu Soundarya” (Truth and Beauty) explores complex relationships between truth, ethics, beauty, art, existence, and philosophy. He has written some of the celebrated novels like “Vamsha Vruksha”, “Daatu”, most notably his magnum opus,“Parva”.



The present novel “Avarana” meaning “veil” or “truth masking”, is his second historical novel covering the time period between 8th - 14th centuries of India. His first historical novel 'SArTa' covered the time up to 8th century. The latest novel Avarana is already going for its 10th edition2. The novel has seen nine editions

in four months after it was first published in February last. The conflict of truth v/s untruth is the topic explored in his previous novel Sakshi at individual level. AvaraNa explores the same problem at the global level. The twin objectives of the novel- explore history and expose historians, who are distorting it. In the book


Byrappa tries to show the real history of India under Moghuls. The Marxists and Seculars have created the myth that Muslim rulers were tolerant. They deny that there was mass temple destruction and mass Killing of Hindus. But, Dr.Koenraad Elst in his book “Negationism in India Concealing the record of Islam”3 writes- “The Muslim conquests,down to the 16th century, were for the Hindus a pure struggle of life and death. Entire cities were burnt down and the populations massacred, with hundreds of thousands killed in every campaign, and similar numbers deported


as slaves. Every new invader made (often literally) his hills of Hindus skulls. Thus, the conquest of Afghanistan in the year 1000 was followed by the annihilation of the Hindu population; the region is still called the Hindu Kush,i.e. Hindu slaughter. The Bahmani sultans (1347-1480) in central India made it a rule to kill 100,000 captives in a single day, and many more on other occasions. The conquest of the Vijayanagar empire in 1564 left the capital plus large areas of Karnataka depopulated. And so on.”



The Output of Program



testing observers..

Read Line: AAVARANA AND DA VINCI CODE: A COMPARISON


Read Line: N.S. Rajaram


Read Line: http://rajeev2004.blogspot.com/2007/02/literary-phenomenon-historical-novel.html


Read Line: Like Dan Brown's Da Vinci Code, S.L. Bhyrappa's Aavarana is likely to


have far-reaching



.



.



.

Read Line: large areas of Karnataka depopulated. And so on.?



press any key to exit..

Monday 2 June 2008

Hashing - Using C# and .Net Framework

A Cryptographic one-way hash function is used to generate a fixed length hash value as a transformation from a specific input. It should be computationally feasible in that it should

  • Not have the Avalanche Effect in producing the hash value
  • Given h it should be hard to find any m such that h = hash(m)
  • It should be collision resistant, i.e given an input m1, It should be hard to find another input, m2 (not equal to m1) such that  hash(m1) = hash(m2)
  • Resistant to Birthday attacks

.Net Framework BCL provides solid support to some cryptographic hash functions like MD5,SHA1,SHA128,SHA384 and SHA512. I've written a small demo program to compute hash and verify them using the listed cryptographic hash algorithms.

Class Diagram

Hashing_CS

 

 

 

 

 

 

 

 

 HashSHA 

HashSHA512 

TestHarness

Output

TestHarness_Output

Sunday 1 June 2008

System.Security.Cryptography

Complete .Net Cryptography Classes,Interfaces and Enumerations listing from MSDN. Wanted to keep this live on my blog for future references.. Also Check out this article on MSDN [Protecting Private Data with Cryptography Namespaces of the .Net Framework]

intro
1
2
3
4
5
6