Tele-Talk新鲜的花,深入分析和观点从受人尊敬的行业领导者

Atmanirbhar巴拉特:印度应该自己的移动数据

“我们必须检查的数据安全是最重要的在今天的世界开始从非常重要的智能设备连接,终点和旅行到主机的连接服务器农场。”

Bhawna Kumari
Bhawna Kumari 总统,移动协会

The most vital and important aspect of the smartphone is often ignored or overlooked; handling of data. Yes, the golden data which is an integral part of the smart device.

It is estimated that an average smartphone in Bharat generates data consisting of social interaction, posting, email, streaming, photos, home movies, messages, voice over IP, all personal and customized to that smartphone owner. This multitudes more than any part of the world in twenty-six regional languages, data all stacked behind in bits and bytes.

The most important vulnerable facts of handling customized data in today\u2019s devices remain hidden and difficult to access. One must be a super geek working in a manufacturer\u2019s forensic lab to get to it, using hard core proprietary third party tools to sniff out, that too very rarely with some luck. A layman citizen is far-far away from this geeky exercise and has no clue about it.

This brings few very critical and important questions to ponder below as it has vast national security implications:
  • Where is the personal data generated for Bharat citizens being distributed to? How is it distributed?<\/li>
  • Which transporting channels are being used?<\/li>
  • Are they secure and encrypted?<\/li>
  • If encrypted how many third-parties hold the encrypted keys?<\/li>
  • Are these third-parties\u2019 authorized to use them?<\/li>
  • Are the citizens explicitly aware of the third-party access to their personal data being generated in Bharat?<\/li>
  • Is the data locally warehoused in Bharat or are they being transported away briskly at the remote locations in far off remote country\u2019s cloud server farms?<\/li>
  • Are these server farms ruthlessly analyzing, studying, profiling, exploiting, manipulating and ingesting the collective Bharat\u2019s citizen\u2019s data?<\/li>
  • Why are the use of modern AI algorithms used to give shape for future coursing transformation while keeping it live in-sync with the host device thousands of miles away without the citizen\u2019s explicit knowledge?<\/li>
  • Why is the re-location or syncing of data pulled from the device\u2019s storage or built in-device cloud and its open integrated distribution to various third party apps is often deliberately done or overlooked to satisfy the hunger for data dominance and commercial exploitation?<\/li> <\/ul> These open practices of today\u2019s ruthless digital world result in compromised personal safety and security of an individual or a department even at times an organization, making it prone to oozing data which often ends up in dark webstore open for large scale exploits by bad actors.

    At times it is meant for an even bigger part of the jigsaw puzzle of creating detailed profiling values of every citizen of Bharat, dividing, them in various categories of race, colour, creed, origin, gender, religion, age, disability, sexual orientation, marital and family status, political beliefs, biometric, income, active servicemen or veteran etc. the attribute list goes on and on these are just to name a few which is crafted meticulously by AI algorithms using big data platforms which are readily available today to process various data points to support complex navigation and modeling.

    This deep data mining and its analysis does not stop here, it goes even farther to kick-start gene-mapping with more disease prone activities starting from our new born, loved ones, grown up children, parents, grandparents, the cluster of entire families. They are mapped to come up with predictable societal behaviors and controls for its manipulation.

    Another practiced malicious intent behind segregation of data is to create classic propaganda, influence, fake news, hostile social manipulation using multiple social media channels where these kinds of news are open game without having any control or regulator control to censor while scrutinizing through millions of postings a day.

    Todays modern AI driven tools have self-learned to create unique voices and videos and have even have created realistic voice and video profiles of prominent individual which then are used to create highly plausible audio and video feeds to reduce confidence in the reality or the absolute truth by mixing it with fake message to create and spread confusion at mass levels.

    The role of creating zero trust is a highly prized sought after attack towards a government body or an eminent person, or institution, spreading of rumors backed by manipulated audio & video and being tweeted and retweeted , or shared across multiple platforms make it consistent with the primary objective of the bad actors who are highbred to create coups or to topple the government by interfering in the elections or simply creating border tensions by showing false footage to incite rebellion or create communal hate crimes against one another.

    The customized buffet of data with news and current affairs are all surgically delivered based upon the input of the data preferences which has been secretly transported away at far labs to create customized vulnerable audience profiles.

    In order to organize and control the ever-growing digital data chaos and mismanagement, we have to examine that the data security which is paramount in today\u2019s connected world starts from the very crucial smart device, the end point and travels all the way to the connected server farms which are hosting them. Atmanirbhar Bharat\u2019s network of wisdom server farms if all interconnected can significantly play an important role to the core principles of safe and approved transportation channels , approved data warehousing standards, re-location standards without the data ever leaving the country yet provide an aggressive network CDN grade versatility, empowering citizens to be in total control on the ownership of the data with very crisp and simple rules which distinguish marketing vis a vie exploiting.

    The voices, images, favorite locations, home address, health, sleep time are being monitored, listened, analyzed, profiled to support the adoption of the next generation of analytics, even remotely listening in to the conversation to pick up key words and create customized flags to augment the enhancement of the profile in the database. This small yet powerful data collection activity gets bigger day by day minute by minute using the data snooping persistent algorithms built into our connected mobile devices which we have come to rely upon minute by minute for the ease of our day to day activities thanks by far to the abundant readily and cheaply available bandwidth which keeps us connected which in turn is exploited by the 24x7 customized integrated intelligence analytics.

    Unless the ambitious new experience of Atmanirbhar Bharat\u2019s network of wisdom server farms is rolled into play, and the warehousing, distribution, re-location, and importantly transportation is aligned as the standard constellation stars of Bharat\u2019s new data age innovation zones, it will not be a game changer and we will be chasing the foreign established actors for the data created by the Bharat of the Bharat and for the Bharat and it shall perish away from Bharat.

    ","blog_img":"","posted_date":"2020-10-13 12:20:44","modified_date":"2020-10-13 12:20:44","featured":"0","status":"Y","seo_title":"Atmanirbhar Bharat: India should own mobile data","seo_url":"atmanirbhar-bharat-india-should-own-mobile-data","url":"\/\/www.iser-br.com\/tele-talk\/atmanirbhar-bharat-india-should-own-mobile-data\/4573","url_seo":"atmanirbhar-bharat-india-should-own-mobile-data"}">
    在我们十亿加巴拉特,消费者已经开始收购智能移动设备快速甚至在农村。在选择设备时,他们的动机会影响新的和改进的功能,特性,颠覆性创新设计,内存,多个高分辨率相机、更好的触摸屏,5克准备就绪,流媒体功能,联系少经验,等等。他们往往深受明星和运动员的营销浮华推一个设备。有时只是一个设备的比较激烈的包装比竞争对手更多的功能以边际价格是一个转折。

    智能手机的最重要和重要的方面是经常被忽略或忽视;处理的数据。是的,金色的数据智能设备中不可或缺的组成部分。

    据估计,平均智能手机在巴拉特生成数据组成的社会互动,发布、电子邮件、流媒体、照片、家庭电影,消息,语音IP,所有个人和定制的智能手机的主人。这人比任何世界26个地方语言的一部分,全部堆放在比特和字节的数据。

    最重要的脆弱的事实处理定制的数据在今天的设备仍然隐藏和难以访问。我们必须是超级极客在制造商的法医实验室工作,使用核心专有的第三方工具来嗅出,也很少有一些运气。一个门外汉公民远远地离开这个令人讨厌的运动和毫无头绪。

    这会带来一些非常关键和重要的问题思考下面有巨大的国家安全意义:
    • 个人资料在哪里生成的巴拉特市民分发?它是如何分布的呢?
    • 运输通道被使用?
    • 他们是安全的加密吗?
    • 如果多少第三方持有加密密钥加密?
    • 这些第三方的授权使用它们?
    • 公民明确意识到第三方访问他们的个人数据产生在巴拉特吗?
    • 本地的数据储存在巴拉特还是在运输快步走在遥远的偏远地区偏远国家的云服务器农场吗?
    • 这些服务器农场无情地分析,研究,分析,开发,操纵和消化集体巴拉特的公民的数据?
    • 为什么现代人工智能算法的使用给未来追逐变换形状,同时保持它生活与主机同步设备数千英里之外没有公民的显性知识吗?
    • 为什么re-location或同步的数据从设备的存储或建立在设备云及其开放集成分布各种第三方应用程序通常是故意做的或忽视满足数据优势和商业开发的饥饿吗?
    这些开放实践今天的无情的数字世界导致损害个人或部门的个人安全甚至有时一个组织,使它容易渗出数据通常最终在黑暗webstore开放大规模利用的糟糕的演员。

    有时它意味着一个更大的拼图的一部分创建的详细分析每个公民的价值观巴拉特,分裂,他们在各种类别的种族、色彩、信条、起源、性别、宗教、年龄、残疾、性取向、婚姻和家庭地位、政治信仰、生物识别、收入、现役军人或退伍军人等属性列表继续和这些只是仅举几例精心制作的人工智能算法使用大数据平台今天可用来处理各种数据点来支持复杂的导航和建模。

    这个深度的数据挖掘和分析不停止在这里,它会更远启动基因图谱与更容易遭受疾病活动从我们的新出生的,所爱的人,长大的孩子,父母,祖父母,整个家庭的集群。他们被映射到想出可预见的社会行为的操纵和控制。

    另一个实行种族隔离的数据背后恶意是创造经典的宣传,影响,假新闻,恶意操纵使用多个社会媒体渠道,这些新闻是开放的游戏没有任何控制或监管机构控制审查,而审查通过每天数以百万计的帖子。乐动扑克

    今天现代人工智能驱动的工具有self-learned创建独特的声音和视频,甚至创造了现实的语音和视频资料突出个人然后用于创建高度可信的音频和视频,以减少现实或绝对真理的信心通过混合创建和传播假消息混乱在质量水平。

    的角色创建零信任是一个推崇追求攻击向政府机构或一个杰出的人,或机构,操纵音频和视频支持的谣言蔓延,在推特上转发,或共享跨多个平台使其符合坏演员的主要目标是纯种的创建政变或推翻政府干涉选举或简单的创建边境紧张局势通过展示错误的画面煽动叛乱或创建公共仇恨犯罪。

    数据的定制的自助餐与新闻和时事都是手术交付基于输入数据的偏好已秘密运送乐动扑克了观众的脆弱得实验室创建定制的概要文件。

    为了组织和控制日益增长的数字数据混乱和管理不善,我们必须检查的数据安全是最重要的在今天的世界开始从非常重要的智能设备连接,终点和旅行到主机的连接服务器农场。Atmanirbhar巴拉特智慧的网络服务器农场如果所有互联可以极大地发挥重要作用的核心原则批准安全、运输渠道,通过数据仓库的标准,re-location标准没有数据永远离开这个国家还提供一个积极的CDN网络级通用性,赋予公民在总控制数据和非常清晰和简单的所有权规则区分营销竞争上的利用。

    声音,图像,最喜欢的地点,家庭住址,健康,睡眠时间被监控,侧耳细听,分析异形支持采用新一代的分析,甚至远程监听谈话去接关键词和创建自定义旗帜增加数据库中的配置文件的增强。这个小而强大的数据收集活动变大一天每一分钟的使用数据窥探持久算法内置连接移动设备,我们已经开始依赖于每一分钟的缓解我们的日常活动到目前为止由于丰富的容易和廉价的可用带宽,使我们连接进而利用24 x7定制的集成智能分析。

    除非Atmanirbhar巴拉特的雄心勃勃的新经验智慧的网络服务器农场,滚和仓储、分布、re-location,和重要的是运输对齐的标准星座明星巴拉特的新数据时代创新区,这将不会改变游戏规则,我们将追逐外国演员为数据建立由巴拉特的巴拉特和巴拉特和应当灭亡远离巴拉特。

    免责声明:作者的观点仅和ETTelecom.com不一定订阅它。乐动体育1002乐动体育乐动娱乐招聘乐动娱乐招聘乐动体育1002乐动体育ETTelecom.com不得负责任何损害任何个人/组织直接或间接造成的。


The most vital and important aspect of the smartphone is often ignored or overlooked; handling of data. Yes, the golden data which is an integral part of the smart device.

It is estimated that an average smartphone in Bharat generates data consisting of social interaction, posting, email, streaming, photos, home movies, messages, voice over IP, all personal and customized to that smartphone owner. This multitudes more than any part of the world in twenty-six regional languages, data all stacked behind in bits and bytes.

The most important vulnerable facts of handling customized data in today\u2019s devices remain hidden and difficult to access. One must be a super geek working in a manufacturer\u2019s forensic lab to get to it, using hard core proprietary third party tools to sniff out, that too very rarely with some luck. A layman citizen is far-far away from this geeky exercise and has no clue about it.

This brings few very critical and important questions to ponder below as it has vast national security implications:
  • Where is the personal data generated for Bharat citizens being distributed to? How is it distributed?<\/li>
  • Which transporting channels are being used?<\/li>
  • Are they secure and encrypted?<\/li>
  • If encrypted how many third-parties hold the encrypted keys?<\/li>
  • Are these third-parties\u2019 authorized to use them?<\/li>
  • Are the citizens explicitly aware of the third-party access to their personal data being generated in Bharat?<\/li>
  • Is the data locally warehoused in Bharat or are they being transported away briskly at the remote locations in far off remote country\u2019s cloud server farms?<\/li>
  • Are these server farms ruthlessly analyzing, studying, profiling, exploiting, manipulating and ingesting the collective Bharat\u2019s citizen\u2019s data?<\/li>
  • Why are the use of modern AI algorithms used to give shape for future coursing transformation while keeping it live in-sync with the host device thousands of miles away without the citizen\u2019s explicit knowledge?<\/li>
  • Why is the re-location or syncing of data pulled from the device\u2019s storage or built in-device cloud and its open integrated distribution to various third party apps is often deliberately done or overlooked to satisfy the hunger for data dominance and commercial exploitation?<\/li> <\/ul> These open practices of today\u2019s ruthless digital world result in compromised personal safety and security of an individual or a department even at times an organization, making it prone to oozing data which often ends up in dark webstore open for large scale exploits by bad actors.

    At times it is meant for an even bigger part of the jigsaw puzzle of creating detailed profiling values of every citizen of Bharat, dividing, them in various categories of race, colour, creed, origin, gender, religion, age, disability, sexual orientation, marital and family status, political beliefs, biometric, income, active servicemen or veteran etc. the attribute list goes on and on these are just to name a few which is crafted meticulously by AI algorithms using big data platforms which are readily available today to process various data points to support complex navigation and modeling.

    This deep data mining and its analysis does not stop here, it goes even farther to kick-start gene-mapping with more disease prone activities starting from our new born, loved ones, grown up children, parents, grandparents, the cluster of entire families. They are mapped to come up with predictable societal behaviors and controls for its manipulation.

    Another practiced malicious intent behind segregation of data is to create classic propaganda, influence, fake news, hostile social manipulation using multiple social media channels where these kinds of news are open game without having any control or regulator control to censor while scrutinizing through millions of postings a day.

    Todays modern AI driven tools have self-learned to create unique voices and videos and have even have created realistic voice and video profiles of prominent individual which then are used to create highly plausible audio and video feeds to reduce confidence in the reality or the absolute truth by mixing it with fake message to create and spread confusion at mass levels.

    The role of creating zero trust is a highly prized sought after attack towards a government body or an eminent person, or institution, spreading of rumors backed by manipulated audio & video and being tweeted and retweeted , or shared across multiple platforms make it consistent with the primary objective of the bad actors who are highbred to create coups or to topple the government by interfering in the elections or simply creating border tensions by showing false footage to incite rebellion or create communal hate crimes against one another.

    The customized buffet of data with news and current affairs are all surgically delivered based upon the input of the data preferences which has been secretly transported away at far labs to create customized vulnerable audience profiles.

    In order to organize and control the ever-growing digital data chaos and mismanagement, we have to examine that the data security which is paramount in today\u2019s connected world starts from the very crucial smart device, the end point and travels all the way to the connected server farms which are hosting them. Atmanirbhar Bharat\u2019s network of wisdom server farms if all interconnected can significantly play an important role to the core principles of safe and approved transportation channels , approved data warehousing standards, re-location standards without the data ever leaving the country yet provide an aggressive network CDN grade versatility, empowering citizens to be in total control on the ownership of the data with very crisp and simple rules which distinguish marketing vis a vie exploiting.

    The voices, images, favorite locations, home address, health, sleep time are being monitored, listened, analyzed, profiled to support the adoption of the next generation of analytics, even remotely listening in to the conversation to pick up key words and create customized flags to augment the enhancement of the profile in the database. This small yet powerful data collection activity gets bigger day by day minute by minute using the data snooping persistent algorithms built into our connected mobile devices which we have come to rely upon minute by minute for the ease of our day to day activities thanks by far to the abundant readily and cheaply available bandwidth which keeps us connected which in turn is exploited by the 24x7 customized integrated intelligence analytics.

    Unless the ambitious new experience of Atmanirbhar Bharat\u2019s network of wisdom server farms is rolled into play, and the warehousing, distribution, re-location, and importantly transportation is aligned as the standard constellation stars of Bharat\u2019s new data age innovation zones, it will not be a game changer and we will be chasing the foreign established actors for the data created by the Bharat of the Bharat and for the Bharat and it shall perish away from Bharat.

    ","blog_img":"","posted_date":"2020-10-13 12:20:44","modified_date":"2020-10-13 12:20:44","featured":"0","status":"Y","seo_title":"Atmanirbhar Bharat: India should own mobile data","seo_url":"atmanirbhar-bharat-india-should-own-mobile-data","url":"\/\/www.iser-br.com\/tele-talk\/atmanirbhar-bharat-india-should-own-mobile-data\/4573","url_seo":"atmanirbhar-bharat-india-should-own-mobile-data"},img_object:["","retail_files/author_1605157979_91901.jpg"],fromNewsletter:"",newsletterDate:"",ajaxParams:{action:"get_more_blogs"},pageTrackingKey:"Blog",author_list:"Bhawna Kumari",complete_cat_name:"Blogs"});" data-jsinvoker_init="_override_history_url = "//www.iser-br.com/tele-talk/atmanirbhar-bharat-india-should-own-mobile-data/4573";">