Wednesday, April 01, 2015

Focus on Protection and Prevention, Not Punishment

Whenever we hear of a major crime that causes national outrage – a heinous rape or a terrorist attack , the only cries I hear, even from the sanest and most ‘educated’ of Indians are to mete out harshest of punishment to the perpetrators. The punishment methods usually suggested are chemical castration, flogging shooting dead, or hanging. They also want it to be meted out by swiftest possible means. Right Now! Nothing else would do. The criminals don’t have a right to defend their case. They don’t deserve to be heard. They are evil and inhuman and don’t deserve justice reserved for normal folk. They have already been judged.

There are massive moral and legal issues in meting out justice in the swiftest and sternest manner. Think of one innocent amongst the thousands of actual criminals, who didn’t get access to a decent lawyer, and who was not allowed to build his case due to the exigency to ‘carry out justice’. And the case was heard and then he was hanged. We all clapped and applauded, and 2 days later, we found out that he was actually innocent. Oh, well, we murdered an innocent man. Its ok, some collateral damage is fine!

By focussing on punishment, people also miss the real issue, which is of protection and prevention. By the time is crime is committed, the ship has already sailed, and capsized. Lives have been ruined – of the victims, their families, the criminals, their families. Whether they deserve it or not, is not the point. Damage has been done irreversibly.

By focussing on punishment, we have already the real perpetrators off scott-free. The real perpetrators who are the root cause are the State and its various components who have played in significant hand in the creation and development of the deviant individuals. In the case of social crimes, these factors that contributed to the crime are societal, cultural, and law enforcement failures. In case of terrorist attacks, these could be intelligence gathering, surveillance, and interception failures. Who can influence these factors in any significant way – it is the nation’s government and its constituent bodies.

You could argue that government doesn’t control society’s attitudes and cultural leanings. But I think it does. A liberal government allows all voices to be heard, all faiths to be practiced, all differences to be allowed. It allows dissent and disagreement, as long as there is no crime committed (i.e damage to property, physically hurting people you disagree with; causing offense and mental anguish are not crimes). If you give confidence to the people that radical or ultra conservative beliefs are not given state support over other beliefs, you get a more open and free society, not where you are watching what you say, and looking over your shoulder for being non-conformist. Such a society is fundamental to serve the needs of the minority – women, children, people practising non-majority religions, atheists, gays and disabled.

The government also controls society’s attitudes and cultural leanings through education. It can invest more in education of the weaker section of the societies – women, poor, Muslims – ensuring that they have better chance to move up socially, integrate more fully with the rest of the society, and be well-represented in all important spheres of life. It can also keep education ‘agnostic’ of all religious, philosophical, and economic dogma, and let the kids make up their own minds.

Through genuine freedom and openness, and education, government can not only shape social and cultural views, it also promotes citizens to be more responsible. Promoting genuine freedoms, education, and mobility are significant soft steps in protecting the people and preventing any major crimes.

The hard steps in protection and prevention are with respect to law enforcement, intelligence gathering, surveillance, and interception. Again, we have seen that there are persistent systemic failures in all of these areas. Crime is frequently under-reported, police stations are notoriously understaffed, police rely on informal khabaris for intelligence gathering, and survelliance is poor that oil tankers blown off course land within a kilometre of the sea-link without the army/navy/police knowing about it. No major overhaul has happened after 26/11 that will give us confidence that we are significantly stronger in any of these areas.

All these failures on the part of the state need significant step-by-step attention and remediation. They can’t be fixed in a day and there are no easy solutions. Sometimes the solutions may span different departments and jurisdictional areas. Perhaps that way, there isn’t a willingness to address these. However, the people, by not going after the real problems and instead just focussing on symptoms, allow the state to wash their hands off their sins. 

And that’s the real crime.

Monday, January 26, 2015

Pirate Birthday Party - Preparation

Last week, I celebrated my daughter’s 7th Birthday Party. She loves Swashbuckle, a BBC kids games show based on the premise of retrieving jewels from bad pirates. I like the show as well, so decided to give the theme a go. Arraagh!!

Invitation card

a.       Template
I thought the invitation card should look old, worn-out, possibly like a scroll. Here is a template I created.  I used pirate-y language with specially downloaded fonts (‘Rapscallion’, ‘Freebooter’, ‘JLS Smiles’- all are free). Pre-loaded windows fonts should also work alright. I made the template in visio as it was create and move text boxes and images around easily. I converted this into pdf and jpeg.


Visio to edit the above template (download this as it wont open within browser)
Blank background for you to insert your own words and fonts


I wanted the venue location to be shown on a treasure map, so I used http://www.yarrmaps.com/. This is how the final product looked like.


b.      Aging
After printing the main invitation and map on normal paper, I used some aging techniques to make the paper look old. I primarily used wikihow - http://www.wikihow.com/Age-Paper-Using-Tea, but then experimented with the time, and ingredients. First I crumbled the paper in a ball and then uncrumbled it, I mixed unused as well as used tea and soya sauce in water, soaked for about 1-2 hours in the solution, and then hung the papers overnight for drying on a make-shift clothesline on top of the kitchen sink. Sometimes, I dried quicker by putting the papers on a heater. The effect was pretty good.

c.       Presenting
We rolled up the paper like a scroll and tied with a thick plastic thread. I folded the map along the folds printed using yarrmaps, and inserted into the map folded along the fold lines created using yarrmaps. I ensured that the roll was tight enough for the map not to slip through.

Pirate Ship

I created the pirate ship in two parts – front and back. This was driven by the size of the card board available, and also allowing kids to go in and out without damaging the ship or hurting themselves. The two parts were kept independent of each other in order to not affect each other’s stability. It also gave the ship a bigger scale compared to the size of the actual pieces.
The material used was cardboard. I have found cardboard to be great material for house hold crafts and creative work. It holds its shape, easy to cut, easy to flex. Any mistakes in cutting can be corrected when you glue paper on top of it. E.g. if you cut a hole too big, you can correct it when you put a covering paper over it. Then you can cut the hole the right size.
Ensure that you keep the cardboard folds on the smaller sides. This is incredibly useful for stability ensuring the rest of the cardboard holds its shape.
e.g. you may not need the bottom part of the cardboard (in the picture above), but instead of cutting it out, just keep it, as it will stabilise the vertical face of the cardboard, also you can stick the bottom part on the floor to ensure that the structure stands up on its own.

a.       Front part of the ship
The front part of the ship was made of two pieces – The main base(bow) and the ornamental part on top. I used a 40 inch LED TV box. I cut bottom part in a curve without cutting off the joint between the two largest cardboard pieces. I just shaved off the bottom part such that it doesn’t destabilise the box and it stood. I sliced the bottom horizontal face from the middle (without cutting the face off entirely) for reasons given above.  I cut of the top horizontal face entirely. This allowed me to open the front up.



Just around 1/3 the length from the front, I gave two incisions from the inside. I kept the front looking like a triangle, and along the incisions, straightened the top vertical fronts (highlighted part) such that they were almost parallel to each other. This made the front look like a typical ship
I cut off three gunports on either side


Now for the ornamental part – I cut two parts from another smaller cardboard box -  I joined the two pieces around the pointed  edge. The stuck the pieces straight up on the inside of the large pieces.

I stuck brown paper all over including the insides. This allowed to cover all the sticky tapes. I cut the gunport holes again through it, and used to brown paper to adjust any mistakes in cutting.
Note – If you cut the top horizontal edge slanting down from the front, it will look even more like a ship. I did not cut the as didn’t have a cardboard piece that was high enough; it would have made the ship look much smaller (almost a boat).

b.      Back of the ship (Stern)
For the back, I took another box. This was slightly taller than the first box, but it didn’t matter, as frequently, the back of ships are taller than front.  I used an entire card board, slicing it along on edge, and flattening the rest such that I had two equal sized faces joined along an edge. I cut this edge at the bottom in a curve. This stern curve was  less sharper than the bow’s.

For the top part, I cut a cardboard of the shape shown. Again, I used two faces of a box, which were already joined together on the spine, and cut out the rest. When inserted in the bigger piece, it imparted strength and shape (in a manner of ‘>’ sign) to the whole back part.

Repeat the cycle with brown paper, gunports. The entire piece looked like this.


c.       Finishing
I put papers on the edges and (corners, gunports). I also covers the full ornamental pieces and front thin face with the same paper. I put horizontal stripes in brown paper (Doc link) along the length of the ship for additional ironwork detail. I inserted a bamboo stick through the bow and made it stand and hung a A4 printed pirate flag (‘Jolly Roger’) from it. (See the link)

Face in a Hole

Here is the link to the image. Open in mspaint. Hopefully, the settings are intact that will make the picture split on multiple pages. Take printouts and join the pages together like a puzzle, stick it on a cardboard. Cut out the hole. 



Treasure Chest

a.       Base
Take a cardboard box, and cut one of the top flaps. The other flap will go under the lid


a.       Lid
Then, take another cardboard/s, and cut them in two semicircles. Now get a cardboard that is length of the curved part of semi-circle (circumference) and as wide as the front face. Give it incisions every 4 cms or so from the inside to allow it to bend and hug the semi-circle snugly. Now wrap it on the curved edge, and stick it with strong tapes. Cover it with inside face of the semi-circle with brown paper.

Before you stick the chest lid give the flap as well incisions on the inside, so it touches the underside of the lid closely. Use glue and strong tape to bring the two together.
c. Decoration
Brown paper for iron work, highlight the nails, stick on a latch and lock. Here is the final product



Jolly Roger (Pirate Flag)

Here is the visio for the Jolly Roger flag. Visio viewer is freely downloadable

Money Notes

I wanted some money to be put in the treasure chest (we also ran a game around team stealing most from the chest wins. I copied note images using created British currency notes in word and put them in tables, to ensure that the images don’t resize in case they are big. Also you need back to back printouts. Attached is the document that you can use for printout.

Note that the margins need to be adjusted so that the back and front face line up exactly. They are slightly skewed, and I ended up cutting the corners slightly in to remove white in each side.


Here is the link to the doc.


Costumes, Games, Props etc.

We ended up making the jacket ourselves. Rest we bought, stripy, black and white, lose frilly stuff and co-ordinated the pieces with each other to make a complete costume.



Decorations, plates, glasses, table covers and other clothing accessories – Amazon, ebay, poundland, 99p shop

Games planned and props for the day are here

Names Badges

On Birthday day, kids were asked to pick a pirate names from the list, write it on the badge, and pin it on their costume/dress. The template for the badge is in the doc.

Ship Names/Team Names

Kids were put together in teams, and asked to pick a ship name to represent their team.

Sea Shanties/Pirate Songs

I downloaded stuff from youtube (using http://www.clipconverter.cc/), and torrents. These, I played in the background during games, eating.

Song that my daughter liked the best (she doesn't understand the naughty lyrics yet)




Monday, October 27, 2014

Diwali Play for Kids

We performed a play at Park Hill School Croydon, UK, to explain the stories behind the five days of Diwali and the various traditions and rituals undertaken on each of the five days across various parts of India. The audience was kids from the age of 5 to 7 years. Possibly, can be used as it for still older kids (and even some adults) with minor changes :-)


The full script is here http://goo.gl/BPJQD2
Here is the presentation used (download and view in powerpoint for correct view) - http://goo.gl/TlDLFo

You are free to use with proper attribution. More importantly, do share your videos and photos of performances.

Here is a link to the Ramayana Play for Kids as well




Monday, September 08, 2014

Intolerance and Ignorance in India

Recently, a committee, headed by retired high court judge Chandrashekhar Dharmadhikari published a report to outline measures to to curbattacks on women and reduce crime rate in Maharashtra. Instead of presenting findings in an objective and evidence backed manner, and putting the accountability on the responsible parties (police, government, judiciary) to provide active policing, improved crime prevention, better criminal investigations, and swifter prosecution process, it finds easy, but wrong scapegoats, and recommends curtailment of human rights and free speech. 

these relics of the past who sit in our government and such committee force their own prejudices and opinions, without actually bothering to study the evidence on the effectiveness of the measures they propose. 



They especially detest and are opposed to things that they don't understand. Facebook/Whatsapp can be very easily made scapegoats as they are popular channels which the old fogies don't understand or have used. Both are used for productive or even entertainment purposes far far more than they are used to harass people. They may be used to share pornography, but so is a lot of the internet. Does the government need to frame a policy on the internet. What point is framing is a policy, if the government has rats chance
in hell of actually implementing the policy.


The bias demonstrated here is the interpretation that pornography and morality has anything to do with sexual crimes. There is no causation or even correlation. In fact, if at all, there is inverse correlation

between the two. http://goo.gl/CfzJ8Y If at all, these ancient creatures should recommend we encourage pornography (just kidding!).



Another confirmation bias is the interpretation that dance bars led to drop in cases of crimes against women. Even if we assume there was a drop in crimes against women, just considering the insignificant number of
dance bars within the state and their concentration is parts of cities only, it is highly improbable that there was any causative association between the two.

The only way to substantively confirm the committee view is check the crime statistics in areas near to dance bars and check where the bar dancers are now (probably plying their trade underground where it is very difficult for them to report any crimes due to the nature of their trade).



Another bias - "the committee held social networking websites responsible for rising divorce cases" – where is the evidence Sir. Your report should cite studies/surveys undertaken either in India or elsewhere to justify your claims. Probably, when TV came about, the dogmatic folks probably said they were leading to infidelity and divorce.



“Vulgar activities carried out through Facebook, mobile and computer, social networking sites need to be tackled urgently, because it has been observed on a global scale that divorces are on the rise in marriages taking place through Facebook" - This statement is utterly meaningless and incoherent. Marriage taking place based on meeting/connections established to facebook have NO relation to vulgar activities. Just because you put a BECAUSE between the two doesn't make them related. If marriages happening by virtue of people meeting through facebook are failing, are you going to stop people marrying if they meet on facebook? Are you in charge of Hindu arm of Taliban?


Wednesday, November 21, 2012

Scotland 3 day trip Itinerary


Following is our 3 full day itinerary -
Some notes
1. Itinerary was planned keeping in mind family needs - 2 adults and a kid of 3 years.
2. Wanted to do a bit of walking as well, which we did in an unplanned way at Luss.
3. Though it was May, it was still fairly cold in some places

Day 1 (landed at Glasgow from Gatwick, hired a car from the airport)

  1. Loch Lomond Luss, Argyll and Bute G83
  2. Oban PA34
  3. Kinlochleaven PH50 - nice drive
  4. Glen Coe A82 - must visit.
  5. Fort William PH33  - can be avoided
This was the view from Luss

Day 2

  1. Ben Nevis - must visit.
  2. Fort augustus
  3. Loch Ness
  4. Inverness - Stayed here. Did the Dolphin cruise. No dolphins. The season is Aug onwards.


Day 3

  1. Cairncorm-fenicular railway not done
  2. St Andrews not done
  3. Pitloclry - beautiful views. must visit.
  4. Killicrankie - nice Scottish town
  5. Sterling - lovely castle. great views, easy stopover. Did not enter the castle. Don't really think there is a need
Dropped the car off at the airport, flight at 7 pm.

Saturday, November 17, 2012

CBIP - questions

Just took my CBIP exam in data management. It was my last exam and guess what, got a 69%. Again, it was tough. The questions are generally tricky with the NOT IN category. e.g. Which of the following is not a relevant for data integrity.

There was another question, which was one of the following do we don't consider while defining a primary key
1. whether the key is dependent on non-key elements
2. key values are unique
3. the same primary key is not defined in another entity
4. some other criterion

Here, the question is not what conditions are SATISFIED when defining a primary key, but what conditions are CONSIDERED. Meaning we can consider the conditions and arrive on the conclusion that the primary is not a primary key. So, that makes it a valid condition (hence 1, which will tell you that the key is not a primary key). We need to find out a condition which is invalid for primary key definition (hence 3).

Some other questions.
1. Importance of information is measured by which 2 parameters
...
2. An temp(there was another word used, I forget) employee and contractor employee are entities in a org, but an employee can be a temp or a contractor, not both. While modeling subtype, supertype relationship, what is not true.
a. Some data belongs to temp entity only and some data belongs to contractor employee entity only
b. employee is a supertype
c. temp entity and contractor entity are exclusive subtypes
d. ...

3. domain type is the same as
a. ...
b...
c...
d. class word

4. Who is a data intemediary

5. What is the full form of PDCA

6. what is data definition commonly referred to as
a...
b...
c. metadata
d...

7. What is the first training activity for a new joinee to a DM team
a. data stewardship
b. enterprise model
c. system appreciation
d. data model

8. what is the difference between data administrator and database administrator

9. What is the most time consuming activity during data modeling
a. defining attributes, entities, relationships
b. determining stakeholders and business smes
c. defining scope
d. ...

9. In which notation is relationship represented as diamond
a. chen notation
b. idefx1
c. NIAM

10. What is data accuracy

11. Data accuracy is measured in
a. %correct
b. %complete
c... d...

11. What is not a domain type
a. city
b. code
c. name
d. quantity

12. What is the format for attribute naming convention
a. business term + domain + class word (not sure if this the right answer)

13. What should not be done for naming entities
a. use underscore
b. use complete business term
d. use plurals

14. What is not the benefit of Joint Application design/development
a. Project planning
b. for programmers during system development
c. for system compatibility while preparing for a dbms upgrade

15. What is on the columns of Zachmann Framework

16. Parent child relationship is representation of which database
a. relational
b. heirarchical
c. network
d...

17. How is RDBMS more flexible than network and heirarchical database

18. Marketing of data management should be done to
a. business team
b. it team
c. all the organization
d...

19. Authorization is required for
a. for allowing people to access systems
b. determining the level and type of access to be given
c.

20. How are the reponsibilities of user captured in Policy document
a. verb
b. adjective
c. noun
d...

21 conceptual model helps to
a. show things in real world scenarios
b...
c. capture model in abstract ideas

22. difference between enterprise model and logical model

23. What should not be the approach while presenting a data model to the management
a. show all attributes, entities, relationships
b. hide the complexity to present a simple understable view of the organization

24. Derived data is redundant because
a. it is calculated
b. it is transformed from one or more primitive attributes
c. it has the same name as primitive attribute
d. it is represented multiple times

25. an entity referring to one or more instances of itself is called
a. recursive
b... c... d...

26. which of the following is a likely entity
a. vendor
b. employee_id
c. customername
d. order_no

27. Employee name, dept id and name is present in a table. it is a violation of
a. 1 normal
b. 2 norm
c. 3 norm
d. boyce codd norm

28. meta data is defined as
a. data dictionary
b. data about data

29. state transition diagrams

Ramayana play in 15 minutes for kids

This is a Ramayana script I and a few others wrote to explain the mythology behind Diwali to school kids in UK. The play runs for 15 minutes and is supported by audio visuals projected on a screen. The play ends with a dance performance with Ram, Sita and people of Ayodhya dancing with lights celebrating Ram's return on Diwali.

The videos are here (first 5 minutes lost)



Saturday, September 08, 2012

Great North Run - running for Kids in need of Education


This is my 6th 1/2 marathon and 2nd Great North Run. The training this time has been lot better than that on previous runs, so really looking forward to the big race day, 16th September.
I am running for "Kids In Need of Education" which is a charity that supports education for kids in the Indian subcontinent. I have worked with Akansha, their partner in Mumbai and seen first hand the fantastic work they do for underprivileged kids.
With your support, we can not only put some deserving kids through school, but I can also take on the 5k and 10k Olympics champion, Mo Farah, who is running the race (and quaking in his boots right now).

Here is the link to donate.

http://www.justgiving.com/abhitoraskar/eurl.axd/905a8cfcb82df94f831971d181ab3250


Please dig deep and donate now. Donating through JustGiving is simple, fast and totally secure. Once you donate, they’ll send your money directly to the charity and make sure Gift Aid is reclaimed on every eligible donation by a UK taxpayer. So it’s the most efficient way to donate - I raise more, whilst saving time and cutting costs for the charity.
Posts on my previous runs are here.