Skip to main content

3 and 23

"It was always such a shame to read about these topics since then", he made his statement for the first time this morning. He was reading the news on his mobile phone, as he loved reading, atleast for the sake of a show off. But he had gathered enough information about almost anything much enough to hold for five minutes in a debate.
"What?", I added to the moment. "Curriculum and educational policies and syllabus." 

"Aha?"

 "I study engineering and you too. How illogical are their curriculum designs, to me in all ways and atlest to the two thirds, I suppose, counting to the thoughts and realisations, I add. Not just a few statements I am making to greet you a good morning, it is a need to speak, I think."

 My smile followed by a silence made him continue...  "We are here to learn CS and what we are doing now is learning Physics, Chemistry, Mechanics and many other stuffs that will never ever add to the benefit in the life of a programmer. And I do not really think that some one learned CS will ever go for a Masters in Physics or Chemistry, and is it possible, I donot know. And the one and only answer that anyone has when asked about this foolish method of waisting time is, 'You are leaning Computer Science and Engineering and not just CS',and that inappropriate answer puts ends to the question and the students like us are forced to learn things which are not worth learning and the time spent for it. If this method of studying and teaching unwanted and hated, by students, are taken away from the curriculm design, it will be much enough to save almost one year of a student, isn' it?" 

"Continue.." 

"Does it seem silly Mr Comment?" 

"No. But these words spoken are going to count to the nothing. Doubt?"

 "There was..", he thought for a while and began, "a clock whose second hand moved once in three seconds and twenty three minutes. It was hosted in public in the great city of Wall Street. People saw it, there were criticizms, mokes, but the thing continued to be there as no one was strong enough and willing to take it off as they respected time. There were appreciators, who them appeared, describing and proclaming the great beauty of the newly developed pattern changing the existing grid. Not much time was counted for it to happen; the grid of practice and exercise was then adapted to the newly hosted time stamp, eventhough the biological clocks never stoped and the existance of closeness to the natural symmetry and the polygons framed by joining the dots continued to exist.."

 I broke the un-uderstood bluff, "Can you please.."

 "If a thing made so as to satisfying the desired form and function of another thing is relacing the existance of the original thing so as to bring out a new thing, as the business tricks and tac-tics used to say, can we call the second thing a good thing?"

 "Not clear.." 

"I can not make it. Sorry. Okay.. Suppose the University is following a pattern which teaches the students only the core subjects and its supporting subjects and the students can choose the topics in which they wish to specialise, how would that be.?" 

"Not possible, I would say." 

"Then how is it possible in Cambridge University and in Oxford University? If it is possible there, why cannot it be made possible here? Questioning the current existing policies is found no use. We will just go on cursing the hated subjets and the un-interested topics and swallowing and vomiting them and going on till the time comes to meet the cores. That difference between the time stamps of the point when we began this journey and the other when we enter a stage where we begin to embrace the wished is a huge difference, divided by hundreds will be almost twelve months. If this is a case which all of us encounter, then why cannot we think bout a change? Why cannot that twelve months be made useful, when there are thousands existing in this million opportunity world?"

 I clapped, for I was a person who kept silence to the voices which I knew the world would never hear. But I asked, "Need a coffee? Today morning seems unpleasent!"

 "Nope. I need you not to call it a clock.", he rubbed his nose. 

"Thank you." 

Comments

Popular posts from this blog

SNIFF GSM USING HACKRFX

​TOOLS  USED: •  ha ckrf_kali • brategnuradio-companion • gr-gsmgqrx • wireshark INSTALL REQUIREMENTS: First thing, you want to make sure you have all the required software installed, you can install most of them and their dependencies using your distribution package manager. Let’s start with the libraries and tools for the hackrf itself, on a Debian/Ubuntu distro you’ll install them like so: sudo  apt-get install  hackrf   libhackrf -dev libhackrf0 Once these libraries are installed, you can plug your hackrf into one of your USB ports and execute the  hackrf_info  command, at this point you should see something like the following: # hackrf_info Found  HackRF  board. Board ID Number: 2 ( HackRF  One) Firmware Version: 2014.08.1 Part ID Number: 0x00574746 0x00574746 Serial Number: 0x00000000 0x00000000 0x14d463dc 0x2f4339e1 You will now install  gnuradio  which is the software we’ll use to decode the RF signals,  gqrx  a tool to visualize signal power on certain frequencies

MORE ABOUT RANSOMWARES. PART 1

 Not long ago, a man committed suicide after an automatically generated notice from a computer virus threatened him with jail unless he paid a ransom thousands of dollars. The year was 2014. As incredible as the story seems, it marked the first known time a computer virus actually killed somebody. The next generations stole cash from users around the globe, and Cryptolocker raised the stakes – holding data of hundreds of thousands of users hostage. Despite successive short-lived take downs, the malware has made a comeback as CTB (Curve-Tor-Bitcoin) Locker. This challenging breed of malware is continuously improving, reaching new levels of complexity as smartphones and tablets are increasingly used to store crucial personal and enterprise-level documents. Bitdefender, the anti-malware solutions provider, zooms in on the subject to show how this type of virus works and to tell users how to prevent being locked out and extorted. What is ransomware? Ransomware is a type of malware th

TERMINAL ON ANDROID- TERMUX

Let Termux be our topic today. It is an Android application which is a Terminal Emulator distributed by Fredrik Fornwall. It creates exactly the same working environment of Linux Terminal on Android. Take a try. It can be installed from Google Play Store. Navigate from here . After the environment is set, go to App settings from the System Settings and give the App Storage permission.  Basic linux command like cd, ls, pwd, cat, touch and many more or almost all can be made here on this prompt. To install packages like Python or Pip type in packages install <packageName> It's that simple.  Similarly, to execute a program or a package, type <packageName> then, the corresponding help will be appear. Rest is with you. This is how an installation screen appears to be.. Now, about storage. As the initial step, type in termux-setup-storage Typing pwd gives the current working directory and it will be something like /data/data/com.termux/files/