Thursday, November 5, 2009
Thursday, October 8, 2009
Sunday, September 6, 2009
An Argument Worth Having
By GERALD GRAFF
Freshmen are often overwhelmed by the intellectual challenge of college — so many subjects to be covered, so many facts, methods and philosophical isms to sort out, so many big words to assimilate. As if that weren’t enough, what your different instructors tell you may be flatly contradictory.
Students understandably cope with this cognitive dissonance by giving each of their teachers in turn whatever he or she seems to want. Students learn to be free-market capitalists in one course and socialists in the next, universalists in the morning and relativists after lunch. This tactic has got many a student through college, but the trouble is that, even when each course is excellent in itself, jumping through a series of hoops doesn’t add up to a real socialization into the ways of intellectual culture.
What the most successful college students do, in my experience, is cut through the clutter of jargons, methods and ideological differences to locate the common practices of argument and analysis hidden behind it all. Contrary to the cliché that no “one size fits all” educational recipe is possible, successful academics of all fields and intellectual persuasions make some key moves that you can emulate:
1. Recognize that knowing a lot of stuff won’t do you much good unless you can do something with what you know by turning it into an argument.
2. Pay close attention to what others are saying and writing and then summarize their arguments and assumptions in a recognizable way. Work especially on summarizing the views that go most against your own.
3. As you summarize, look not only for the thesis of an argument, but for who or what provoked it — the points of controversy.
4. Use these summaries to motivate what you say and to indicate why it needs saying. Don’t be afraid to give your own opinion, especially if you can back it up with reasons and evidence, but don’t disagree with anything without carefully summarizing it first.
It’s too often a secret that only a minority of high achievers figure out, but the better you get at entering the conversation by summarizing it and putting in your own oar, the more you’ll get out of your college education.
Gerald Graff, the past president of the Modern Language Association and a professor of English and education at the
Monday, August 17, 2009
Saturday, August 8, 2009
Monday, July 13, 2009
What language should children be taught in?
Gandhi returned to India from South Africa in 1915 with strong views on this subject. At a reception in Karachi in March 1916, he said of those educated in English that “there is no continuity between school and home in India.”
In June that year Gandhi wrote, in a letter to a correspondent, details of how to reintroduce modern education in Indian languages: “Arithmetic will certainly include oral sums and Indian accountancy.” He was 46 then and on most matters his ideas were fully formed. He was clear that education in India should be in the mother tongue.
Concluding a speech in English at Benaras Hindu University in February 1916, he said if he had to examine those whom he had just lectured, most would fail. “And why? Because they have not been touched.” To be touched, to truly understand, he believed, we need to be communicated to in our own language. There was also the problem of efficiency: “We never master the English language; with some exceptions it has not been possible for us to do so; we can never express ourselves as clearly as we can in our own mother tongue.”
Gandhi had no problem with English also being taught at school; but not as the medium for schooling: “We do want the English language, but we do not want to destroy our own language.”
India’s greatest literary figure was the Nobel Prize-winner Rabindranath Tagore, and his views were similar to Gandhi’s. Tagore felt that the setting up of English-language institutions in India was confused with making and staffing buildings. In February 1919, he said at a lecture: “The mischief is that as soon as the idea of a university enters our mind, the idea of a Cambridge University or Oxford University... rushes in at the same time and fills the whole space. We forget that the European universities are living organic parts of the life of Europe, where each found its natural birth.” This organic growth of centuries could not be reproduced by raising buildings.
Tagore wrote each culture had something unique to contribute to the world, and that India would contribute nothing if it educated its young in English, because what that language held within was European. In 1921 Tagore set up Viswa Bharati University at Santi Niketan (Abode of Peace) “to approach the west from the standpoint of such a unity of the life and thought of Asia.”
His university aims to be a “centre of culture where research into and study of the religion, literature, history, science and art of Hindu, Buddhist, Jain, Islamic, Sikh, Christian and other civilisations may be pursued along with the culture of the west, with that simplicity in externals which is necessary for true spiritual realisation, in amity, good fellowship and co-operation between the thinkers and scholars of both eastern and western countries.” The Nobel Prize-winning economist and former Master of Trinity College, Amartya Sen, who was named by Tagore, attended Viswa Bharati University.
C Rajagopalachari, who took over as governor-general from Mountbatten, was an intellectual of the highest calibre. He thought English caused damage at school: “The language becomes almost the main aim of all effort and the instruction in science and other subjects will suffer in efficiency.” His solution for keeping up with science was that its terminology could remain in European languages, without translating the terms.
M S Golwalkar, the second leader of the RSS and its most influential ideologue, said English should be sacrificed in schools and three languages ought to be taught: mother tongue, Hindi and Sanskrit. He acknowledged, however, that Sanskrit had died in India for a reason: that it was too complex to be a mass language. Asked if English wasn’t the language of international commerce and diplomacy, he said: “Not quite. English is the predominant language of only one power bloc. Why should every schoolboy — who will have nothing to do either with high finance or high diplomacy — learn it?”
In February 1964, he pointed out in an interview that English was the medium in all universities, but standards were yet poor. This remains true in 2009.
If there was this consensus against English, how was it able to prevail in India? Because of Nehru, who led the country for 17 years after independence. All the higher education institutions he built, and he has no peer in developing nations in this regard and few in Europe, assumed students who were grounded in English: the institutes of management, of technology, and of design. Having attended Harrow and Trinity College, Cambridge, Nehru benefited from a classical European education. His best biographer, Walter Crocker, wrote that he was fluent in Hindustani, of course, but if he had a third language, it was French.
All three of Nehru’s books, Autobiography, Glimpses of World History and Discovery of India, were written in English. Nehru told a meeting of the Sanskrit Commission in 1957: “If the medium of instruction was Sanskrit, or even if it was any other Indian language, nobody could make any progress in the technological and scientific field without having a good knowledge of some of the foreign languages.”
But he puzzled over the fact that his countrymen received an English education in India’s towns and cities but were not quite modern in their outlook.
He said at All India Radio’s literary forum the same year that despite India’s progress in science “strangely enough, the thinking of the people lags behind.” Science “has not changed the thinking of the common man. So there is a danger that while we grasp the ideas of modernity superficially, we do not imbibe them fully and we will fall between two stools.”
Read more here: http://www.thenews.com.pk/print1.asp?id=187656
Taken from other mailing lists.
Wednesday, June 10, 2009
'Are we educational institutions or placement agencies?'
Ajit Rangnekar, the Indian School of Business's new dean, is angry.
"What is the purpose of educational institutions? Are we placement
agencies or are we educational institutions?" he asks angrily when asked
how the ISB, Hyderabad, will place its students given the grim global
economic conditions.
He believes an institution should not be judged on the basis of
placements it provides its students, but by its ability to do social
good even as it adds economic value to society.
He strongly feels the process of education has been killed in the mad
race to find a lucrative job no sooner students graduate from university.
In an interview with Prasanna D Zore, the ISB dean discusses the Indian
education system, the difficulties graduates face in the economic
slowdown and why Indian business must be bold, but different.
What are your challenges given the way your predecessor resigned?
As a human being I feel sorry that Professor Rao (M B M Rao who resigned
as the dean after the Satyam fallout; he was an independent director on
Satyam's board) had to step down. I had and continue to have enormous
respect for him.
But as a school it has had no impact on the ISB. We are continuing to
grow exactly as planned three months ago or six months ago. Our plans,
intentions and achievements are still the same. So we will go with the
Mohali campus, expansion of students and creating new centres of excellence.
How soon will the Mohali campus come up?
We are aiming for 2011, but it could be in 2012.
The ISB has increased its class to 560 students this year. How will you
overcome the challenge of giving placements to so many students given
the current economic scenario?
This is one thing we really need to start moving away from. Educational
institutions and society at large need to have a very strong debate on this.
What is the purpose of educational institutions? Are we placement
agencies or are we educational institutions?
I very strongly and passionately believe that we should not be
considered as placement agencies. Unfortunately, the only thing the
media reports about educational institutions are the salaries that our
students get. So you (the media) are using a very wrong parameter to
judge an institution.
You people emphasise the salary that one student gets from whatever
company. Is that the criteria?
Instead, the focus should be on the contribution of that educational
institution to knowledge, what is the contribution of the alumni of that
educational institution not to industry but to society at large.
Unless we don't move into those spheres we are going to get into these
wrong choices.
The job of the educational institutions is to create high quality people
who will contribute enormously to society. And that is what even we (the
educational institutions) have to start focusing on.
Thursday, June 4, 2009
Saturday, May 16, 2009
Friday, May 15, 2009
Thursday, May 14, 2009
MSIT Poster and Leafhead 2009
MSIT Poster
MSIT Folder:
Msit pomp letter
Application Form, print and fill it for offline applications:
MSIT admissions form
Wednesday, May 6, 2009
Surviving the IT Job Market: How Soft Skills Give You an Edge
Surviving the IT Job Market: How Soft Skills Give You an Edge
– Dave Willmer, Computerworld
April 21, 2009
Competition for IT jobs has intensified, so companies that are hiring expect to find candidates who can exceed the technical requirements of a position. While soft skills have long been touted by IT employers, today's harsh economic realities have made those abilities more valuable than ever. IT professionals who know which soft skills are currently the most important and why—nd who are willing to work to improve those abilities—can find that they have a distinct advantage over similarly qualified peers.
Skills such as public speaking, negotiation and persuasion are among the most valuable in the current economic environment. What do these skills have in common? They're all based on the ability to communicate effectively. As budget restrictions create tension for managers and staffers alike, workplace relationships can easily become strained, leading to morale and productivity problems. Effective communication can help prevent or alleviate these situations.
Under such conditions, difficult projects are likely to fail without buy-in from all team members. That's why IT professionals who are skilled at building consensus have become especially valuable. Those who have both listening skills and the ability to help others see the big picture can help keep a department or project team focused on a common goal.
In addition, now that companies are more likely to scrutinize every expense, the ability to justify support for a project has also become more important. Professionals who can clearly communicate the value of a certain project to executives and other stakeholders are better positioned to thrive.
Beyond the Job Description
Don't overlook leadership as a key soft skill just because you aren't occupying or seeking a management-level position. Stepping up to assume extra responsibility—such as taking the lead on a challenging project—is another ability that current economic conditions have made valuable. Hiring managers no longer have the luxury of bringing on board employees who can't go above and beyond their usual duties as needed.
So, how do you go about improving your soft skills? One option is to look for classes that can help you develop these abilities. For example, if you hope to improve your public speaking skills, consider Toastmasters or a similar organization designed to help people overcome discomfort in presenting their ideas to groups. A writing course from a local college or online university can improve your writing skills. Keeping in touch with members of your network and attending industry events can also keep your interpersonal skills sharp.
One of the most powerful ways to develop your soft skills is to teach. In almost any form, teaching puts your diplomacy, persuasion and communication skills to the test. Look to local continuing education programs, community colleges and mentor organizations for opportunities to share your knowledge of the IT profession—and build your interpersonal abilities at the same time.
Show, Don't Just Tell
While your résumé and cover letter should reflect your efforts to grow beyond your technical proficiency, keep in mind that an interviewer's first impressions of your soft skills might carry the most weight. Try practicing your interviewing skills with a friend or trusted colleague whose interpersonal skills you admire, asking for constructive criticism. He or she may point out mannerisms or habits (such as interrupting the speaker) that you might not be aware of.
If all these suggestions are outside your comfort zone, don't be discouraged. After all, if soft skills could be comfortably acquired by all IT professionals, they wouldn't be at such a premium. Ultimately, all soft skills are partly a matter of attitude. By demonstrating your willingness to improve in areas that aren't your greatest strengths, you take a step toward becoming the kind of well-rounded IT professional today's companies need.
Dave Willmer is executive director of Robert Half Technology, a leading provider of IT professionals on a project and full-time basis. Robert Half Technology has more than 100 locations worldwide and offers online job search services at www.rht.com.
Tuesday, May 5, 2009
MSIT beckons students
The word IT no more fascinates students, rather it is being dreaded. But IT just cannot be done away with, though one has to live to the ups and downs of the industry and its demands. So those with the best IT skills will always be in demand rather than those who just possess an IT degree.
The Master of Science in Information Technology (MSIT) offered by the Consortium of Institutions of Higher Learning (CHIL) formed by the AP Universities in collaboration with the Carnegie Mellon University (CMU), USA is one programme that promises to send out IT professionals who can deal with any situation than just giving an IT degree.
It has been designed to provide industry specialists who have hands-on experience, understand business needs, work patterns and deadline pressures of the corporate environment.
“The key differentiating factor is its unique pedagogy ‘learning by doing’. Evolved through eight years of relentless pursuit of excellence the programme has an extensive support of CMU in terms of course content and faculty training,” says M. Sreenivas Rao, Dean, MSIT.
A few other domain specialisations like bio-informatics are in the pipeline. MSIT Spree has been an initiative to network and celebrate togetherness of belonging to MIST fraternity while MSIT Journeys, a speaker series, has successfully got students in touch with professionals from industry giving them the required inputs and exposure.
The programme also provides teaching assistantships to the second year students.
Despite slow down 80 per cent students are placed this year while all were absorbed in the earlier batches.
The course is offered at the International Institute of Information Technology (IIIT) (100 seats) and JNTU Hyderabad (150 seats) and is open to B.Tech or B.E graduates or those with a P.G. degree in Computer Science, Mathematics or Statistics.
Last date
Admission is based on entrance test to be conducted online from May 24. The last date for submitting application forms is May 18 and one can apply online also at ‘ www.msitprogram.net.’
Candidates can directly walk-in to the testing centre at the Eduquity Career Technologies Pvt Ltd at My Home Sarovar Plaza, Secretariat Road in Hyderabad from Thursday to Sunday before May 23. Entrance test is waived off for candidates with GRE scores above 1100/3.5 and it should have been taken after July 2006.Details can be had on www.msitprogram.net.
Article in Hindu: http://www.hinduonnet.com/edu/2009/05/04/stories/2009050450480400.htm
It is offered by CHIL in collaboration with CMU, writes R. RAVIKANTH REDDY
Friday, April 17, 2009
GSC Cyber Security Challenge 2009 - Now accepting applications
Cyber security has become the new frontier in the security and defence world.
Therefore, we seek the world's most creative innovators and start-ups to help responding to these mounting challenges in cyber security. We recognize that many disruptive innovations are not ready for mass commercialization and we encourage researchers and infant companies to apply for this year'sCyber Security Challenge. The judging for this award will focus mainly on the disruptive potential of the technology, focusing less on the idea's maturity.
BAE Systems are sponsoring the Cyber Security Challenge through their Investment in Innovation team:"Cyber Security is a key area for us to further invest in both because of the wide range of issues currently faced and the breadth of work being done in the space. We seek to uncover the creative capabilities of innovators in universities and SMEs that apply to information assurance and cyber security needs."
Targeted Technologies: Examples of our areas of interest include data protection, user authentication, penetration testing, network protection, spam-prevention, anti-malware, identification of data theft, detection of dormant threats on corporate servers, tackling of identity theft on the internet and defences for virtualised computing resources.The winners of this year's Cyber Security Challenge will receive:
- £5,000 GBP cash award for the 1st place winner, sponsored by BAE Systems
- £4,000 GBP cash award to be split among the two runner-ups, sponsored by BAE Systems
- Mentorship by Nick Kingsbury (Venture Capitalist, former partner at 3i)
Who can Apply: Individuals & Companies
Deadline for Submissions: May 15, 2009
How to Apply: Enter by using our online submission system
The Global Security Challenge LLP (GSC) is a central hub for security innovators, start-ups and investors. It is a valuable launching pad for security innovation and each year over $500,000 USD is awarded in its world leading competitions to start-ups, entrepreneurs and researchers within the security technology field. The top contenders from previous competitions have subsequently raised over $52 million in new capital.
Thursday, April 16, 2009
Solutions for Rural Communities and The Geo Tourism Challenge
Here are announcements of two opportunities to enter global online competitions and to be showcased to a network of like-minded community members, funders, CSOs, thought leaders, universities, governments, and enthusiasts!
Ashoka is a global non-profit network and support system for social entrepreneurs—people who devise innovative solutions to the social problems that plague society. To further this goal, Ashoka's Changemakers (www.changemakers.net) provides an online, interactive forum that encourages collaboration and discussion, along with theme-based competitions, to draw out the most effective ideas.
ENTER ONLINE GLOBAL COMPETITION: "The Geotourism Challenge: Power of Place."
Entry Deadline: May 20, 2009.
Prizes: Three top winners get $5,000 each.
Competition focus: In partnership with National Geographic Society, Ashoka's Changemakers is looking for examples of sustainable management of tourism, or geotourism, as it is widely known. NatGeo defines geotourism as ''tourism that sustains or enhances the geographical character of a place--its environment, culture, aesthetics, heritage, and the well-being of its residents.'' We're looking at people and organizations -- including the government, and corporations -- that are are initiating responsible innovations that use tourism to help sustain, enhance, or preserve local culture, build heritage, and natural habitats. For more details on the competition, please visit: http://www.changemakers.net/
ENTER ONLINE GLOBAL COMPETITION, "Cultivating Innovation: Solutions for Rural Communities"
Entry Deadline: May 13, 2009.
Prizes: a) Three top winners get $5,000 each; b) Early Bird Prize: If you enter by April 13, 2009, you could win a cell phone and digital camera (equal value of USD $1000); c) Nominator Prize: If you nominate people/organizations who could enter the competition, you stand to win a special prize!
Competition focus: In partnership with the Bill & Melinda Gates Foundation, Ashoka's Changemakers is looking for innovative solutions that span the entire agricultural value chain – from seeds to sales. Three-quarters of the world’s poorest people—the 1 billion who live on $1 a day or less—rely on agriculture to feed themselves and their families, yet many cannot grow enough to sell or even eat. If you've come up with strategies, tools and opportunites for small farmers to boost their productivity, increase their incomes, and build better lives for themselves and their families, enter now! For more details on the competition, please visit http://www.changemakers.com/
For more information or media queries, please contact Ms. Kalpana Kaul, Asia Director & Managing Editor, Ashoka's Changemakers. Tel. No. 033-2417-2587; 6535-8647 (Kolkata, India). Email:changemakers@vsnl.com; kkaul@ashoka.org
Monday, April 6, 2009
Sunday, March 22, 2009
The importance of stupidity in scientific research
Tuesday, February 3, 2009
Instinctive Computing
Saturday, January 10, 2009
MD5 considered harmful today, Creating a rogue CA certificate
We have identified a vulnerability in the Internet Public Key Infrastructure (PKI) used to issue digital certificates for secure websites. As a proof of concept we executed a practical attack scenario and successfully created a rogue Certification Authority (CA) certificate trusted by all common web browsers. This certificate allows us to impersonate any website on the Internet, including banking and e-commerce sites secured using the HTTPS protocol.
Our attack takes advantage of a weakness in the MD5 cryptographic hash function that allows the construction of different messages with the same MD5 hash. This is known as an MD5 "collision". Previous work on MD5 collisions between 2004 and 2007 showed that the use of this hash function in digital signatures can lead to theoretical attack scenarios. Our current work proves that at least one attack scenario can be exploited in practice, thus exposing the security infrastructure of the web to realistic threats.
As a result of this successfull attack, we are currently in possession of a rogue Certification Authority certificate. This certificate will be accepted as valid and trusted by all common browsers, because it appears to be signed by one of the root CAs that browsers trust by default. In turn, any website certificate signed by our rogue CA will be trusted as well. If an unsuspecting user is a victim of a man-in-the-middle attack using such a certificate,they will be assured that the connection is secure through all common security indicators:a "https://" url in the address bar, a closed padlock and messages such as "This certificate is OK" if they chose to inspect the certificate.
This successful proof of concept shows that the certificate validation performed by browsers can be subverted and malicious attackers might be able to monitor or tamper with data sent to secure websites. Banking and e-commerce sites are particularly at risk because of the high value of the information secured with HTTPS on those sites. With a rogue CA certificate, attackers would be able to execute practically undetectable phishing attacks against such sites.
The infrastructure of Certification Authorities is meant to prevent exactly this type of attack. Our work shows that known weaknesses in the MD5 hash function can be exploited in realistic attack, due to the fact that even after years of warnings about the lack of security of MD5, some root CAs are still using this broken hash function.
The vulnerability we expose is not in the SSL protocol or the web servers and browsers that implement it, but in the Public Key Infrastructure. This infrastructure has applications in other areas than the web, but we have not investigated all other possible attack scenarios. So other attack scenarios beyond the web are conceivable, such as in the areas of code signing, e-mail security, and in other areas that use certificates for enabling digital signatures or public key encryption.
The rest of this document will explain our work and its implications in a fair amount of detail. In the interest of protecting the Internet against malicious attacks using our technique, we have omitted the critical details of our sophisticated and highly optimized method for computing MD5 collisions. A scientific paper about our method is in preparation and will be released after a few months, so that the affected Certification Authorities have had some time to remedy this vulnerability.
Read full article here if interested