THIS POST IS CONTINUED FROM PART 8, BELOW--
CAPT AJIT VADAKAYIL SAYS AI MUST MEAN “INTELLIGENCE AUGUMENTATION “ IN FUTURE ..
Let this be IA
Let this be IA
OBJECTIVE AI CANNOT HAVE A VISION,
IT CANNOT PRIORITIZE,
IT CANT GLEAN CONTEXT,
IT CANT TELL THE MORAL OF A STORY ,
IT CANT RECOGNIZE A JOKE, OR BE A JUDGE IN A JOKE CONTEST
IT CANT DRIVE CHANGE,
IT CANNOT INNOVATE,
IT CANNOT DO ROOT CAUSE ANALYSIS ,
IT CANNOT MULTI-TASK,
IT CANNOT DETECT SARCASM,
IT CANNOT DO DYNAMIC RISK ASSESSMENT ,
IT IS UNABLE TO REFINE OWN KNOWLEDGE TO WISDOM,
IT IS BLIND TO SUBJECTIVITY,
IT CANNOT EVALUATE POTENTIAL,
IT CANNOT SELF IMPROVE WITH EXPERIENCE,
IT CANNOT UNLEARN
IT IS PRONE TO CATASTROPHIC FORGETTING
IT DOES NOT UNDERSTAND BASICS OF CAUSE AND EFFECT,
IT CANNOT JUDGE SUBJECTIVELY TO VETO/ ABORT,
IT CANNOT FOSTER TEAMWORK DUE TO RESTRICTED SCOPE,
IT CANNOT MENTOR,
IT CANNOT BE CREATIVE,
IT CANNOT THINK FOR ITSELF,
IT CANNOT TEACH OR ANSWER STUDENTs QUESTIONS,
IT CANNOT PATENT AN INVENTION,
IT CANNOT SEE THE BIG PICTURE ,
IT CANNOT FIGURE OUT WHAT IS MORALLY WRONG,
IT CANNOT PROVIDE NATURAL JUSTICE,
IT CANNOT FORMULATE LAWS
IT CANNOT FIGURE OUT WHAT GOES AGAINST HUMAN DIGNITY
IT CAN BE FOOLED EASILY USING DECOYS WHICH CANT FOOL A CHILD,
IT CANNOT BE A SELF STARTER,
IT CANNOT UNDERSTAND APT TIMING,
IT CANNOT FEEL
IT CANNOT GET INSPIRED
IT CANNOT USE PAIN AS FEEDBACK,
IT CANNOT GET EXCITED BY ANYTHING
IT HAS NO SPONTANEITY TO MAKE THE BEST OUT OF SITUATION
IT CAN BE CONFOUNDED BY NEW SITUATIONS
IT CANNOT FIGURE OUT GREY AREAS,
IT CANNOT GLEAN WORTH OR VALUE
IT CANNOT UNDERSTAND TEAMWORK DYNAMICS
IT HAS NO INTENTION
IT HAS NO INTUITION,
IT HAS NO FREE WILL
IT HAS NO DESIRE
IT CANNOT SET A GOAL
IT CANNOT BE SUBJECTED TO THE LAWS OF KARMA
ON THE CONTRARY IT CAN SPAWN FOUL AND RUTHLESS GLOBAL FRAUD ( CLIMATE CHANGE DUE TO CO2 ) WITH DELIBERATE BLACK BOX ALGORITHMS, JUST FEW AMONG MORE THAN 60 CRITICAL INHERENT DEFICIENCIES.
HUMANS HAVE THINGS A COMPUTER CAN NEVER HAVE.. A SUBCONSCIOUS BRAIN LOBE, REM SLEEP WHICH BACKS UP BETWEEN RIGHT/ LEFT BRAIN LOBES AND FROM AAKASHA BANK, A GUT WHICH INTUITS, 30 TRILLION BODY CELLS WHICH HOLD MEMORY, A VAGUS NERVE , AN AMYGDALA , 73% WATER IN BRAIN FOR MEMORY, 10 BILLION MILES ORGANIC DNA MOBIUS WIRING ETC.
SINGULARITY , MY ASS !
DO AN EXPERIMENT –
COLLECT ALL AI MACHINES
AND LET THEM DECIDE ON BASIS OF DATA , IF THE HOLOCAUST REALLY TOOK PLACE
..
HOW MANY PEOPLE WERE
KILLED BY JEW EISENHOWER AND HOW MANY BY JEW HITLER ?.
Deliberate bias exists
in AI , but it’s not easy to detect them in the domain of technology, which
boils down to ones and zeroes.
As AI gains more and
more ground, we must deal with biases (
deliberate ) that may not be obvious in an algorithm’s outcome.
Whether used to improve
defenses or offload security tasks, it’s essential that we trust that the
outcome the AI is giving us is not biased.
In cyber security, AI bias is a form of risk—the
more information, context, and expertise you feed your AI, the more you’re able
to manage security risks and blind spots. Otherwise, various types of bias,
from racial and cultural prejudices to contextual, industry-related forms of
bias, can impact the AI.
When AI models are
based on false security assumptions or unconscious biases, they do more than
threaten a company’s security posture. They can also cause significant business
impact. AI that is tuned to qualify benign or malicious network traffic based
on non-security factors can miss threats, allowing them to waltz into an
organization’s network. It can also
overblock network traffic, barring what might be business-critical
communications.
As an example, imagine
that an AI developer views one region of the world as safe, because it’s an
ally nation, and another as malicious, because it’s an authoritarian regime.
The developer therefore allows all the network traffic from the former to
enter, while blocking all traffic from the latter.
This type of aggregate bias
can cause AI to overlook other security contexts that might be more important.
Mistrained AI-powered
security systems may fail to identify something that should be identified as a
fraud element, a vulnerability, or a breach. Biased rules within algorithms
inevitably generate biased outcomes.
Data itself can create
bias when the source materials aren’t diverse. AI that’s fed biased data is
going to understand only a partial view of the world and make decisions based
on that narrow understanding. In cybersecurity, that means threats will be
overlooked.
For instance, if a spam classifier wasn’t trained on a
representative set of benign emails, such as emails in various languages or
with linguistic idiosyncrasies like slang, it will inevitably produce false
positives, because English is a stupid language . Even common, intentional
misuse of grammar, spelling, or syntax can prompt a spam classifier to block
benign text.
AI models can suffer
from tunnel vision, too. As a cyber threat’s behavioral pattern varies based on
factors like geography or business size, it’s important to train AI on the
various environments that a threat operates in and the various forms it takes
on.
For instance, in a financial services environment, if you build AI to only
detect identity-based issues, it won’t recognize malicious elements outside
that setting. Lacking broad coverage, this Al model would be unable to identify
threats outside the niche threat pattern it was taught.
If businesses are going
to make AI an integral asset in their security arsenal, it’s essential they
understand that AI that is not fair and accurate cannot be effective. One way
to help prevent bias within AI is to make it cognitively diverse: The computer
scientists developing it, the data feeding it, and the security teams
influencing it should have multiple and diverse perspectives.
Through cognitive
diversity, the blind spot of one expert, one data point, or one approach can be
managed by the blind spot of another, getting as close to no blind spots—and no
bias—as possible.
In cyber security, you
have to look at the elements producing the outcome. That is where you monitor
for bias—and that is where you correct it.
The biggest problem
with machine learning systems is that we ourselves don't quite understand
everything they're supposedly learning, nor are we certain they're learning
everything they should or could be. We've created systems that draw mostly,
though never entirely, correct inferences from ordinary data, by way of logic
that is by no means obvious
One of the things that
human beings tend to spend a lot of their time doing is determining whether a
causal relationship or a correlation exists between two series of events. For
instance, the moon relative to Earth directly correlates with the level of the
ocean tides. If the relationship between these two series over time were
plotted on an x/y chart, the points would appear to fall on a sinusoidal curve.
It's not too difficult for someone to write a function that describes such a
curve.
The whole point of
machine learning is to infer the relationships between objects when, unlike the
tides, it isn't already clear to human beings what those relationships are.
Machine learning is put to use when linear regression or best-fit curves are
insufficient -- when math can't explain the relationship. But perhaps that
should have been our first clue: If no mathematical correlation exists, then
shouldn't any other kind of relationship we can extrapolate be naturally
weaker?
A convolutional neural
network, which carries the abbreviation CNN, is a type of learning system that
builds an image in memory that incorporates aspects of all the data it's been
given. So if a CNN is taught to recognize a printed or handwritten character of
text, it's because it's seen several examples of every such character, and has
built up a "learned" image of each one that has its basic features.
People have a tendency
to fear what they don't understand. Nothing amplifies those fears more
profoundly than the web, whose contributors have recently speculated that bias
may be imprinted upon machine learning algorithms by programmers ( payroll of
the deep state ) with nefarious motives.
The algorithms and
structures that govern AI will only be effective if they do not reflect the
subconscious biases of the programmers who create them
As algorithms are
trusted more often to make the same types of deductions or inferences that
humans would make, at some point, you might think they'd start making the same
types of errors. If an artificial intelligence can mimic the reasoning capacity
of human beings, perhaps it's inevitable it will adopt some of their mental
foibles as well. At the extreme, it could appear that an AI has a subconscious
motivation.
What most people are
worried about is, when they run the algorithm, some mysterious or unknown input
or stimulus changes the output to be something that's outside of the margin of
error, but you may or may not be aware of it,
At the root of what all
machine intelligence is about is, you're trying to predict decisions better. If
a decision gets distorted in some way, whatever process that decision is a part
of, potentially can lead to an incorrect answer or a sub-optimal path in the
decision tree.
If human biases truly
are imprinted upon AI algorithms, either subconsciously or through a phenomenon
we don't yet understand, then what's to stop that same phenomenon from
interfering with humans tasked with correcting that bias?
Yet at the highest
levels of public discussion today, the source of error in neural network
algorithms is being treated not as a mathematical factor but a subliminal
influence.
The human mind evolved
survival strategies over countless generations, all of which culminated in
people's capability to make snap-judgment, rash, risk-averse decisions. Humans
learned to leap to conclusions, in other words, when they didn't have time to
think about it.
Machine learning
systems are, by design, not rule-based. Indeed, their entire objective is to
determine what the rules are or might be, when we don't know them to begin
with. If human cognitive biases actually can imprint themselves upon machine
learning, their only way into the system is through the data.
In machine learning,
bias is a calculable estimate of the degree to which inferences made about a
set of data tend to be wrong. By "wrong" in this context, we don't
mean improper or unseemly, like the topic of a political argument on Twitter,
but rather inaccurate.
In the mathematical sense, there may be any number of
ways to calculate bias, but here is one methodology that has the broadest
bearing in the context of AI software: Quantitatively, bias in a new algorithm
is the difference between its determined rate of error and the error rate of an
existing, trusted algorithm in the same category. Put another way, when we get
down to 0s and 1s, all bias is relative.
ML models are opaque and
inherently biased
Machine learning
systems are "black boxes" -- devices with clear inputs and outputs,
but offering no insight into the connections between the two..
Indeed, neural networks
are, by design, non-deterministic. Like human minds, though on a much more
limited scale, they can make inferences, deductions, or predictions without
revealing how.
That's a problem for an institution whose algorithms determine
whether to approve an applicant's request for credit. Laws require credit
reporting agencies to be transparent about their processes.
That becomes almost
impossible if the financial institutions controlling the data on which they
report can't explain what's going on for themselves.
So if an individual's
credit application is turned down, it would seem the processes that led to that
decision belong to a mechanism that's opaque by design.
Machine learning
algorithms themselves may amplify bias if they make predictions that are more
skewed than the training data. Such amplification often occurs through two
mechanisms:----
1) incentives to predict observations as belonging to the majority
group and 2) runaway feedback loops.
In order to maximize
predictive accuracy when faced with an imbalanced dataset, machine learning
algorithms are incentivized to put more learning weight on the majority group,
thus disproportionately predicting observations to belong to that majority
group.
Feedback loops are
especially problematic when sub-groups in the training data exhibit large
statistical differences (e.g. one precinct has a much higher crime rate than
others); a model trained on such data will quickly “run away” and make
predictions that fall into the majority group only, thereby generating
ever-more lopsided data that are fed back into the model.
Even when sub-groups
are statistically similar, feedback loops can still lead to noisy and less
accurate predictions. Algorithms where the predictive outcome determines what
feedback the algorithm receives—e.g. recidivism prediction, language translation,
and social media news feeds—should always be diligently monitored for the
presence of feedback loops bias.
Bias in data and
algorithms are interrelated. When an algorithm is fed training data where one
group dominates the sample, it is incentivized to prioritize learning about the
dominant group and over-predict the number of observations that belong to the
dominant group.
This tendency is exacerbated when the model’s predictive
accuracy is relatively low. Conversely, if the data were balanced relative to
the predictive accuracy, the model would have nothing to gain by
over-predicting the dominant group.
Bias can also be
perpetuated through a feedback loop if the model’s own biased predictions are
repeatedly fed back into it, becoming its own biased source data for the next
round of predictions. In the machine learning context, we no longer just face
the risk of garbage in, garbage out—when there’s garbage in, more and more
garbage may be generated through the ML pipeline if one does not monitor and address
potential sources of bias.
One key to de-biasing
data is to ensure that a representative sample is collected in the first place.
Bias from sampling errors can be mitigated by collecting larger samples and
adopting data collection techniques such as stratified random sampling.
While
sampling errors won’t go away entirely, rapid data growth—2.5 quintillion bytes
per day and counting—and growing data collection capability have made it easier
than ever to mitigate sampling errors compared to the past.
Bias from non-sampling
errors are much more varied and harder to tackle, but one should still strive
to minimize these kinds of errors through means such as proper training,
establishing a clear purpose and procedure for data collection, and conducting
careful data validation. For example, in response to the image-classification
database that contained disproportionately few wedding images from India,
Google deliberately sought out contributions from India to make the database
more representative.
For algorithms that
make classification decisions among different groups, it is also important to
consider the performance of the model against metrics other than accuracy—for
example, the false positive rate or false negative rate.
For example, consider a
criminal-justice algorithm used to assign risk scores for recidivism to
defendants. Someone is labeled as “high risk” if they have a ⅔ predicted chance
of reoffending within two years. Suppose the training data only contain two
groups: Group A and Group B; each group has a different underlying profile for
recidivism. In this example, possible alternative model metrics would be:
False positive rate:
the probability of labeling someone as high risk, even though they did not
reoffend.
False negative rate:
the probability of labeling someone as low risk, even though they did reoffend.
One can then apply
model constraints to make the algorithm satisfy some fairness rule. Common
rules include1:--
.
Predictive parity: Let
algorithms make predictions without considering characteristics such as gender
and race. In the recidivism example, white and black defendants would be held
to the same risk scoring standards.
Well-calibrated: In
situations with more than one predicted outcome (for example, risk scores on a
scale of one to nine instead of simply high versus low risk), this would mean
the proportion predicted to reoffend is the same across groups for every
possible score value.
Error rate balance:
Requiring that certain performance measures be held equal across groups. In the
recidivism example, the algorithm would be required to achieve the same false
positive rate or the same false negative rate across groups A and B.
Collecting data that
perfectly represent all subgroups in a population, while certainly helpful, is
not a panacea. If the underlying systems being modeled are themselves unjust then
the model results will still end up reflecting these biased behaviors.
Conversely, removing bias from ML, though it may generate less ethically
troubling results, will not fix the underlying social injustices either.
Employees should be
trained on identifying their own biases in order to increase their awareness of
how their own assumptions and perceptions of the world influence their work. In
Israel Palestinians are getting screwed..
ML is not a magical
solution that will solve all of the world’s problems but, like any other tool,
has its limitations and weaknesses will help with maintaining a more realistic
perspective on what these models can (and cannot) achieve.
WE NEED ( LIKE ON A
CIGARETTE PACKET ) WARNINGS ABOUT THE RISKS OF USING AI IN SECURITIES AND
EXCHANGE COMMISSION FILINGS.
Machine learning is a
sub-field of AI.
Computer algorithms
that have the ability to “learn” or improve in performance over time on some
task
Essentially, it is a
machine that learns from data over time. This learning is through a statistical
process that starts with a body of data and tries to derive a rule or procedure
that explains the data or can predict future data.
The resulting output is
called a model.
This is different from
the traditional approach to artificial intelligence, which involved a programmer
trying to translate the way humans make decisions into software code. The vast
majority of artificial intelligence in the world today is powered by machine
learning.
Currently, many ML
systems are far more accurate than humans at a variety of tasks, from driving
to diagnosing certain diseases
Machine vision is a specific
ML approach that allows computers to recognize and evaluate images. It is used by Google to help you search
images and by Facebook to automatically tag people in photos.
Machine vision is the
use of a camera or multiple cameras to inspect and analyze objects
automatically, usually in an industrial or production environment. The data
acquired then can be used to control a process or manufacturing activity.
A machine vision system
uses a camera to view an image, computer vision algorithms then process and
interpret the image, before instructing other components in the system to act
upon that data. ... But a machine vision system doesn't work without a computer
and specific software at its core
Machine vision is the
ability of a computer to see; it employs one or more video cameras,
analog-to-digital conversion (ADC) and digital signal processing (DSP). The
resulting data goes to a computer or robot controller. Machine vision is similar
in complexity to voice recognition
Machine vision (MV) is
the technology and methods used to provide imaging-based automatic inspection
and analysis for such applications as automatic inspection, process control,
and robot guidance, usually in industry.
Machine vision refers
to many technologies, software and hardware products, integrated systems,
actions, methods and expertise. Machine vision as a systems engineering
discipline can be considered distinct from computer vision, a form of computer
science. It attempts to integrate existing technologies in new ways and apply
them to solve real world problems.
The term is the
prevalent one for these functions in industrial automation environments but is
also used for these functions in other environments such as security and
vehicle guidance.
The overall machine
vision process includes planning the details of the requirements and project,
and then creating a solution. During run-time, the process starts with imaging,
followed by automated analysis of the image and extraction of the required
information.
Both computer vision
and machine vision use image capture and analysis to perform tasks with speed
and accuracy human eyes can’t match
In the post below I
show a award winning computer vision project my son did at Cornell.
Both computer vision
and machine vision use image capture and analysis to perform tasks with speed
and accuracy human eyes can’t match. With this in mind, it’s probably more
productive to describe these closely related technologies by their
commonalities—distinguishing them by their specific use cases rather than their
differences.
Computer vision and
machine vision systems share most of the same components and requirements:--
An imaging device
containing an image sensor and a lens
An image capture board
or frame grabber may be used (in some digital cameras that use a modern
interface, a frame grabber is not required)
Application-appropriate
lighting
Software that processes
the images via a computer or an internal system, as in many “smart” cameras
So what’s the actual
difference?
Computer vision refers
to automation of the capture and processing of images, with an emphasis on
image analysis.
In other words, CV’s
goal is not only to see, but also to process and provide useful results based
on the observation.
Machine vision refers
to the use of computer vision in industrial environments, making it a
subcategory of computer vision.
Detecting defects and quickly
mitigating the cause of those defects is an essential aspect of any
manufacturing process. Companies have turned to machine vision solutions to
proactively address the occurrence and root cause of defects.
By installing
cameras on the production line and training a machine learning model to
identify the complex variables that define a good product vs. a bad product,
it’s possible to identify defects in real time and determine where in the
manufacturing process the defects are occurring so proactive steps can be
taken.
To achieve your
computer or machine vision goals, you first need to train the machine learning
models that make your vision system “intelligent.” And for your machine
learning models to be accurate, you need high volumes of annotated data,
specific to the solution you’re building.
There are free, public-use datasets
available that work well for testing algorithms or performing simple tasks, but
for most real-world projects to succeed, specialized datasets are required to
ensure they contain the right metadata.
For example, implementing computer
vision models within autonomous vehicles requires extensive image annotation to
label people, traffic signals, cars, and other objects. Anything less than
total precision is going to be a huge problem for a self-driving car.
Companies may choose to
deploy an in-house annotation team to perform this type of image annotation,
but it can be costly and divert valuable employees from working on core
technology
Annotation literally
means to label a given data like image, video etc.. for further references
purposes. This is done by assigning some sort of keywords on the particular
area of text, image etc.. ..
This is achieved by the annotations which can be
from image, text, video, or audio.
Image annotation is
done by humans manually using the image annotation tools to store the large
volume of data stored after annotation.
Although the line
between CV and MV has blurred, both are best defined by their use cases.
Computer vision is traditionally used to automate image processing, and machine
vision is the application of computer vision in real-world interfaces, such as
a factory line
Computer vision is a
form of artificial intelligence where computers can “see” the world, analyze
visual data and then make decisions from it or gain understanding about the
environment and situation. One of the driving factors behind the growth of
computer vision is the amount of data we generate today that is then used to
train and make computer vision better.
Our world has countless images and
videos from the built-in cameras of our mobile devices alone. But while images
can include photos and videos, it can also mean data from thermal or infrared
sensors and other sources. Along with a tremendous amount of visual data (more
than 3 billion images are shared online every day), the computing power
required to analyze the data is now accessible and more affordable.
As the
field of computer vision has grown with new hardware and algorithms so has the
accuracy rates for object identification. In less than a decade, today’s
systems have reached 99 percent accuracy from 50 percent making them more
accurate than humans at quickly reacting to visual inputs.
One of the critical
components to realizing all the capabilities of artificial intelligence is to
give machines the power of vision. To emulate human sight, machines need to
acquire, process and analyze and understand images. The tremendous growth in
achieving this milestone was made thanks to the iterative learning process made
possible with neural networks. It starts with a curated dataset with
information that helps the machine learn a specific topic.
Here are some of the
most examples of computer vision in practice today: --
Autonomous
vehicles
Computer vision is
necessary to enable self-driving cars. Manufacturers such as Tesla, BMW, Volvo,
and Audi use multiple cameras, lidar, radar, and ultrasonic sensors to acquire
images from the environment so that their self-driving cars can detect objects,
lane markings, signs and traffic signals to safely drive.
Google Translate
app
All you need to do to
read signs in a foreign language is to point your phone’s camera at the words
and let the Google Translate app tell you what it means in your preferred
language almost instantly. By using optical character recognition to see the
image and augmented reality to overlay an accurate translation, this is a
convenient tool that uses computer vision.
Facial
recognition
China is definitely on
the cutting edge of using facial recognition technology, and they use it for
police work, payment portals, security checkpoints at the airport and even to
dispense toilet paper and prevent theft of the paper at Tiantan Park in
Beijing, among many other applications.
Healthcare
Since 90 percent of all
medical data is image based there is a plethora of uses for computer vision in
medicine. From enabling new medical diagnostic methods to analyze X-rays,
mammography and other scans to monitoring patients to identify problems earlier
and assist with surgery, expect that our medical institutions and professionals
and patients will benefit from computer vision today and even more in the
future as its rolled out in healthcare.
Real-time sports
tracking
Ball and puck tracking
on televised sports has been common for a while now, but computer vision is
also helping play and strategy analysis, player performance and ratings, as
well as to track the brand sponsorship visibility in sports broadcasts.
Agriculture
There are semi-autonomous
combine harvester that uses artificial intelligence and computer vision to
analyze grain quality as it gets harvested and to find the optimal route
through the crops. There’s also great
potential for computer vision to identify weeds so that herbicides can be
sprayed directly on them instead of on the crops. This is expected to reduce
the amount of herbicides needed by 90 percent.
Manufacturing
Computer vision is
helping manufacturers run more safely, intelligently and effectively in a
variety of ways. Predictive maintenance is just one example where equipment is
monitored with computer vision to intervene before a breakdown would cause
expensive downtime. Packaging and
product quality are monitored, and defective products are also reduced with
computer vision.
There is already a tremendous amount of
real-world applications for computer vision, and the technology is still young.
As humans and machines continue to partner, the human workforce will be freed
up to focus on higher-value tasks because the machines will automate processes
that rely on image recognition.
I WAS THE FIRST TO INTRODUCE PREDICTIVE MAINTENANCE AT SEA
http://ajitvadakayil.blogspot.com/2010/12/predictive-maintenance-on-chemical.html
Predictive analytics is
the use of data, statistical algorithms and machine learning techniques to
identify the likelihood of future outcomes based on historical data. The goal
is to go beyond knowing what has happened to providing a best assessment of
what will happen in the future.
Predictive analytics
uses historical data to predict future events. Typically, historical data is
used to build a mathematical model that captures important trends. That
predictive model is then used on current data to predict what will happen next,
or to suggest actions to take for optimal outcomes.
Predictive algorithms is
used for text classification which involves high dimensional training data
sets. It is a simple algorithm and known for its effectiveness to quickly build
models and make predictions by using this algorithm. Naive Bayes algorithm is
primarily considered for solving text classification problem
The poetically named
“random forest” is one of data science’s most-loved prediction algorithms.
The random forest is a
classification algorithm consisting of many decisions trees. It uses bagging
and feature randomness when building each individual tree to try to create an
uncorrelated forest of trees whose prediction by committee is more accurate
than that of any individual tree.
Random Forest combines
hundreds of decisions trees together in order to arrive at a better prediction
than a single tree could make by itself.
A collective of
decision trees is called a Random Forest. To classify a new object based on its
attributes, each tree is classified, and the tree “votes” for that class. The
forest chooses the classification having the most votes (over all the trees in
the forest).
One big advantage of
random forest is that it can be used for both classification and regression
problems, which form the majority of current machine learning systems.
Random forest adds
additional randomness to the model, while growing the trees. Instead of
searching for the most important feature while splitting a node, it searches
for the best feature among a random subset of features. This results in a wide
diversity that generally results in a better model.
Therefore, in random
forest, only a random subset of the features is taken into consideration by the
algorithm for splitting a node. You can even make trees more random by
additionally using random thresholds for each feature rather than searching for
the best possible thresholds (like a normal decision tree does).
While random forest is
a collection of decision trees, there are some differences.
If you input a training
dataset with features and labels into a decision tree, it will formulate some
set of rules, which will be used to make the predictions.
"Deep"
decision trees might suffer from overfitting. Most of the time, random forest
prevents this by creating random subsets of the features and building smaller
trees using those subsets. Afterwards, it combines the subtrees. It's important
to note this doesn’t work every time and it also makes the computation slower,
depending on how many trees the random forest builds.
One of the biggest
advantages of random forest is its versatility. It can be used for both
regression and classification tasks, and it’s also easy to view the relative
importance it assigns to the input features.
Random forest is also a
very handy algorithm because the default hyperparameters it uses often produce
a good prediction result. Understanding the hyperparameters is pretty
straightforward, and there's also not that many of them.
One of the biggest
problems in machine learning is overfitting, but most of the time this won’t
happen thanks to the random forest classifier. If there are enough trees in the
forest, the classifier won’t overfit the model.
The main limitation of
random forest is that a large number of trees can make the algorithm too slow
and ineffective for real-time predictions. In general, these algorithms are
fast to train, but quite slow to create predictions once they are trained.
A
more accurate prediction requires more trees, which results in a slower model.
In most real-world applications, the random forest algorithm is fast enough but
there can certainly be situations where run-time performance is important and
other approaches would be preferred.
And, of course, random
forest is a predictive modeling tool and not a descriptive tool, meaning if
you're looking for a description of the relationships in your data, other
approaches would be better.
The random forest
algorithm is used in a lot of different fields, like banking, the stock market,
medicine and e-commerce.
In finance, for
example, it is used to detect customers more likely to repay their debt on
time, or use a bank's services more frequently. In this domain it is also used
to detect fraudsters out to scam the bank. In trading, the algorithm can be
used to determine a stock's future behavior.
In the healthcare
domain it is used to identify the correct combination of components in medicine
and to analyze a patient’s medical history to identify diseases.
Random forest is used
in e-commerce to determine whether a customer will actually like the product or
not.
Random forest is a
great algorithm to train early in the model development process, to see how it
performs. Its simplicity makes building a “bad” random forest a tough
proposition.
The algorithm is also a
great choice for anyone who needs to develop a model quickly. On top of that,
it provides a pretty good indicator of the importance it assigns to your
features.
Random forests are also
very hard to beat performance wise. Of course, you can probably always find a
model that can perform better, like a neural network for example, but these
usually take more time to develop, though they can handle a lot of different
feature types, like binary, categorical and numerical.
Overall, random forest
is a (mostly) fast, simple and flexible tool, but not without some limitations.
Cloud infrastructure
has to do with the hardware and software components required to ensure proper
implementation of a cloud computing model. Critical examples of what makes up
this infrastructure include a network and virtualization software, storage,
servers.
Before discussing what
makes up cloud infrastructure, we would first have to define what cloud computing
is.
Cloud Computing in
Simple Terms
Cloud computing is
defined as a process through which computing power, e.g., RAM, Network Speed,
CPU; is delivered as a service over a network as opposed to physically
providing them to an individual’s location.
Common examples of such
cloud computing systems are Azure, Amazon Web Services (AWS), IBM, Google Cloud
An excellent example of
how cloud computing works can be depicted by you traveling by bus. Each
passenger (alighting at different stop-points) is given a ticket which keeps
them seated in a position until they reach their destinations. Cloud computing
is quite like the bus, which takes different people (i.e., data) to different
places (i.e., users), allowing each person to use its service at a minimal fixed
cost.
Cloud computing has
become essential in today’s world, as data storage has become one of the top
priorities in each field. This is because lots of businesses spend hefty
amounts getting and protecting their data, requiring a reliable IT support structure.
Since most companies, e.g., small and medium scale businesses cannot afford
in-house infrastructures, which cost a lot, cloud computing serves as the
middle point. As a matter of fact, because of how efficient this form of data
storage is, as well as the low cost of maintenance, big businesses are rapidly
being attracted to it as well!
With an in-house IT
server, lots of attention has to be paid to ensure there are no glitches in the
system. Should there be any faults, you risk losing a lot. It is merely
cost-effective to go with cloud computing and the infrastructure that comes
with it.
Cloud computing offers
three major types of services, and they are:---
Software as a Service
(SaaS)
Platform as a Service
(PaaS)
Infrastructure as a
Service (IaaS)
Depending on business
requirements, one or more of these cloud computing offers are utilized by
companies. Data integrity is the
basis to provide cloud computing service such as SaaS, PaaS, and IaaS.
SaaS (Software as a
Service)
SaaS allows people to
use cloud-based web applications.
Software, as a service
has to do with a software distribution model whereby applications hosted by a
service provider or vendor via the cloud, is made available through the same
means.
This is becoming a
trendy delivery model, as opposed to buying a software application and
installing it on your computer as obtainable in the past. Using SaaS, you make
use of the software as a subscriber, monthly.
Through this service,
you get all of your regular duties done, such as sales, accounting, planning,
and invoicing.
Software as a Service
(SaaS) uses applications (such as word processors or spreadsheets) based on the
cloud. This service offers greater data security (in the event of a hardware
crash) and keeps information readily accessible from any connected computer.
One major advantage of
the public model is its relative simplicity, especially when considering the
prospect of a business’s entire staff using a variety of SaaS applications to
perform their daily work.
SaaS services enable
rapid development and implementation of applications to increase productivity,
open new markets for information technology development service industries,
increase use of these SaaS services will increase the use of internet bandwidth,
and also integrate applications with various devices. .
SaaS software is owned, delivered and managed
remotely by one or more providers. To start, Software-as-a-Service, or SaaS, is
a popular way of accessing and paying for software. Instead of installing software on your own
servers, SaaS companies enable you to rent software that’s hosted, this is
typically the case for a monthly or yearly subscription fee.
To ensure your
organization’s privacy and security is intact, verify the SaaS provider has
secure user identity management, authentication, and access control mechanisms
in place. Also, check which database privacy and security laws they are subject
to.
SaaS is like going by
bus. Buses have assigned routes, and you share the ride with other passengers.
Email services such as
Gmail and Hotmail are examples of cloud-based SaaS services. Other examples of
SaaS services are office tools (Office 365 and Google Docs), customer relationship
management software (Salesforce), event management software (Planning Pod), and
so on.
SaaS services are
usually available with a pay-as-you-go (which means subscription) pricing
model. All software and hardware are provided and managed by a vendor, so you
don’t need to install or configure anything. The application is ready to go as
soon as you get your login and password
SaaS solutions can be
used for:--
Personal purposes.
Millions of individuals all over the world use email services (Gmail, Hotmail,
Yahoo), cloud storage services (Dropbox, Microsoft OneDrive), cloud-based file
management services (Google Docs), and so on. People may not realize it, but
all of these cloud services are actually SaaS services.
Business. Companies of
various sizes may use SaaS solutions such as corporate email services (Gmail is
available for businesses, for example), collaboration tools (Trello), customer
relationship management software (Salesforce, Zoho), event management software
(EventPro, Cvent), and enterprise resource planning software (SAP S/4HANA Cloud
ERP).
SaaS services offer plenty
of advantages to individuals and businesses:--
Access to applications
from anywhere. Unlike on-premises software, which can be accessed only from a
computer (or a network) it’s installed on, SaaS solutions are cloud-based.
Thus, you can access them from anywhere there’s internet access, be it your
company’s office or a hotel room.
Can be used from any
device. Cloud-based SaaS services can be accessed from any computer. You only
need to sign in. Many SaaS solutions have mobile apps, so they can be accessed
from mobile devices as well.
Automatic software
updates. You don’t need to bother updating your SaaS software, as updates are
carried out by a cloud service vendor. If there are any bugs or technical
troubles, the vendor will fix them while you focus on your work instead of on
software maintenance.
Low cost. Compared to
on-premises software, SaaS services are rather affordable. There’s no need to
pay for the whole IT infrastructure; you pay only for the service at the scale
you need. If you need extra functionality, you can always update your
subscription.
Simple adoption. SaaS
services are available out-of-the-box, so adopting them is a piece of cake.
We’ve already mentioned what you need to do: just sign up. It’s as simple as
that. There’s no need to install anything.
SaaS solutions have
certain disadvantages as well, so let’s mention a couple of them:--
You have no control
over the hardware that handles your data.
Only a vendor can
manage the parameters of the software you’re using.
PaaS (Platform as a
Service)
Using Platform as a
service, developers can build services and applications, hosted by the cloud
and accessible to users via the Internet.
Benefiting from PaaS requires constant
updating and addition of new features.
Such benefits include
being able to ensure adequate software support and management services,
networking, storage, testing, and collaborations.
PaaS is the broad
collection of application infrastructure (middleware) services. These services
include application platform, integration, business process management and
database services.
PaaS is like taking a
taxi. You don’t drive a taxi yourself, but simply tell the driver where you
need to go and relax in the back seat.
Thanks to PaaS
solutions, software developers can deploy applications, from simple to
sophisticated, without needing all the related infrastructure (servers,
databases, operating systems, development tools, etc). Examples of PaaS
services are Heroku and Google App Engine.
PaaS vendors supply a
complete infrastructure for application development, while developers are in
charge of the code.
Just like SaaS,
Platform as a Service solutions are available with a pay-as-you-go pricing
model.
PaaS solutions are used
mostly by software developers. PaaS provides an environment for developing,
testing, and managing applications. PaaS is therefore the perfect choice for
software development companies.
PaaS provides a number
of benefits to developers:--
Reduced development
time. PaaS services allow software developers to significantly reduce
development time. Server-side components of the computing infrastructure (web
servers, storage, networking resources, etc.) are provided by a vendor, so
development teams don’t need to configure, maintain, or update them. Instead,
developers can focus on delivering projects with top speed and quality.
Support for different
programming languages. PaaS cloud services usually support multiple programming
languages, giving developers an opportunity to deliver various projects, from
startup MVPs to enterprise solutions, on the same platform.
Easy collaboration for
remote and distributed teams. PaaS gives enormous collaboration capabilities to
remote and distributed teams. Outsourcing and freelancing are common today, and
many software development teams are comprised of specialists who live in
different parts of the world. PaaS services allow them to access the same
software architecture from anywhere and at any time.
High development
capabilities without additional staff. PaaS provides development companies with
everything they need to create applications without the necessity of hiring
additional staff. All hardware and middleware is provided, maintained, and
upgraded by a PaaS vendor, which means businesses don’t need staff to configure
servers and databases or deploy operating systems.
PaaS cloud services
have certain disadvantages:--
You have no control
over the virtual machine that’s processing your data. PaaS solutions are less
flexible than IaaS. For example, you can’t create and delete several virtual
machines at a time.
Platform as a Service
(PaaS): a cloud computing service that offers users an online environment for
application development, deployment, and updating.
IaaS (Infrastructure as
a Service)
IaaS is also a
significant service model of cloud computing. Through Infrastructure as a
Service, access is provided to computing resources over a virtualized
environment, i.e., the cloud. IaaS is a virtual data
center.
The infrastructure
provided here includes virtual server space, network connections, bandwidth, IP
addresses, and load balancers. Here, a pool of hardware resources is extracted
out of several servers and subsequently delivered over several data centers.
Hence, there is a sense of reliability to IaaS.
IaaS serves as a complete
computing package. If small scale businesses are looking to cut out the cost on
IT infrastructure, this is one proven, viable means of doing so. Every year,
lots of cash would otherwise be put into purchasing and buying new components
such as hard drives, network connections, external storage devices; etc. when
utilizing IaaS, all of this is bypassed!
IaaS is cloud computing
in its most basic form, IaaS offers the fundamentals of one’s computing
infrastructure, including data storage, networking, and server space.
IaaS gives compute
resources, complemented by storage and networking capabilities are owned and
hosted by providers and available to customers on-demand.
Cybercriminals’ most
effective weapon in a ransomware attack is the network itself, which enables
the malicious encryption of shared files on network servers, especially files
stored in infrastructure-as-a-service (IaaS) cloud providers,
Cloud computing isn’t
one monolithic type of offering, but an assortment of services aimed at meeting
the various IT needs of an organization.
In the IaaS model,
third-party service providers host hardware equipment, operating systems and
other software, servers, storage systems, and various other IT components for
customers in a highly automated delivery model. In some cases, IaaS providers also handle
tasks such as ongoing systems maintenance, data backup, and business
continuity.
Organizations that use
IaaS can self-provision the infrastructure services and pay for them on a
per-use basis. Fees are typically paid by the hour, week, or month, depending
on the service contract. In some cases, providers charge clients for
infrastructure services based on the amount of virtual machine (VM) capacity
they’re using over a period of time.
Similar to other cloud
computing services, IaaS provides access to IT resources in a virtualized
environment, across a public connection that’s typically the internet. But with
IaaS, you are provided access to virtualized components so that you can create
your own IT platforms on it—rather than in your own data center.
IaaS is not to be
confused with PaaS, a cloud-based offering in which service providers deliver
platforms to clients that allow them to develop, run, and manage business
applications without the need to build and maintain the infrastructure such
software development processes typically require.
IaaS also differs from
SaaS, a software distribution model in which a service provider hosts
applications for customers and makes them available to these customers via the
internet.
The pool of IaaS
services offered to clients is pulled from multiple servers and networks that
are generally distributed across numerous data centers that are owned,
operated, and maintained by cloud providers.
IaaS resources can be
either single-tenant or multitenant, and they are hosted in the service
provider’s data center.
“Multitenant” means
multiple clients share those resources, even though their systems are kept
separate. This is the most common way to deliver IaaS because it is both highly
efficient and scalable, allowing cloud computing’s generally lower costs.
A cloud-based
IaaS provider typically offers greater scalability, greater selection of
technology options, on-demand availability, and usually much better security
because it has created its IaaS platform to support hundreds or thousands of
customers.
IaaS is like leasing a
car. When you lease a car, you choose the car you want and drive it wherever
you wish, but the car isn’t yours. Want an upgrade? Just lease a different car!
IaaS services can be
used for a variety of purposes, from hosting websites to analyzing big data.
Clients can install and use whatever operating systems and tools they like on
the infrastructure they get. Major IaaS providers include Amazon Web Services,
Microsoft Azure, and Google Compute Engine.
As with SaaS and PaaS,
IaaS services are available on a pay-for-what-you-use model.
As you can see, each
cloud service (IaaS, PaaS, and SaaS) is tailored to the business needs of its
target audience. From the technical point of view, IaaS gives you the most
control but requires extensive expertise to manage the computing infrastructure,
while SaaS allows you to use cloud-based applications without needing to manage
the underlying infrastructure. Cloud services, thus, can be depicted as a
pyramid:
IaaS solutions can be
used for multiple purposes. Unlike SaaS and PaaS, IaaS provides hardware
infrastructure that you can use in a variety of ways. It’s like having a set of
tools that you can use for constructing the item you need.
Here are several
scenarios when you can use IaaS:--
Website or application
hosting. You can run your website or application with the help of IaaS (for
example, using Elastic Compute Cloud from Amazon Web Services).
Virtual data centers.
IaaS is the best solution for building virtual data centers for large-scale
enterprises that need an effective, scalable, and safe server environment.
No expenses on hardware
infrastructure. IaaS vendors provide and maintain hardware infrastructure:
servers, storage, and networking resources. This means that businesses don’t
need to invest in expensive hardware, which is a substantial cost savings as IT
hardware infrastructure is rather pricey.
Perfect scalability.
Though all cloud-based solutions are scalable, this is particularly true of
Infrastructure as a Service, as additional resources are available to your
application in case of higher demand. Apps can also be scaled down if demand is
low.
Reliability and
security. Ensuring the safety of your data is a IaaS vendor’s responsibility.
Hardware infrastructure is usually kept in specially designed data centers, and
a cloud provider guarantees security of your data.
Finally, let’s specify
the disadvantages of IaaS cloud solutions:--
IaaS is more expensive
than SaaS or PaaS, as you in fact lease hardware infrastructure. All issues related to
the management of a virtual machine are your responsibility.
Cloud-based is a term
that refers to applications, services or resources made available to users on
demand via the Internet from a cloud computing provider's servers. cloud
computing is becoming increasingly linked to artificial intelligence (AI).
That
relationship is permanently and substantially changing the relationship between
cloud computing and AI. Google and Amazon are among the big-name companies
offering cloud computing options for customers. The links between cloud
computing and AI are so substantial that they spurred a new cloud computing
option called AIaaS, or AI-as-a-service.
AIaaS allows everyone, independent of
their knowledge, to utilize Artificial Intelligence. For developers simple APIs
are provided, for users without coding skills graphical user interfaces along
with detailed instructions are made available by which means a data processing
pipeline can be clicked together.
Artificial Intelligence
as a Service (AIaaS) is basically third-party offering of artificial
intelligence outsourcing. ... There are some Cloud AI service providers which
provide specialized hardware required for few AI tasks, such as GPU based
processing for intensive workloads etc.
In traditional
programming you hard code the behavior of the program. In machine learning, you
leave a lot of that to the machine to learn from data.
AIaaS is perfect for
testing fast and without a big investment in hardware or software new approaches
to your problems. The performance of several different AI algorithms are
typically compared to each other in these so called proof of concepts which can
be easily done with AIaaS.
Artificial Intelligence
As a Service (AIaaS) allows enterprises to leverage AI for specific use cases
and lower the risk and cost at the same time. This can include a sampling of
multiple public cloud platforms to test different machine learning algorithms.
The applicability of AIaaS cuts across all sectors and since the features
associated with each service providers are different, customers, namely
enterprises can opt from a plethora of options.
One of the biggest
advantage associated with AIaaS has been the reduced cost and time in deploying
the solution. By providing a ready infrastructure and pre-trained algorithms,
it saves businesses from setting up their own applications. While earlier
business solutions had to develop their own application, in this case, all that
companies need to do is contact a service provider.
Since AIaaS is built on
existing cloud framework by training the machine learning models and then
deploying to VMs and containers for inference. Without creating custom machine
learning models, service providers make use of the underlying infrastructure
which would have otherwise built on IaaS (Infrastructure as a Service) and SaaS
(Software as a Service). This is another key advantage as it reduces investment
risk and increases strategic flexibility.
Usability: With AWS,
Microsoft and Google dominating the sector, in an attempt to be more than just
service providers, companies are also competing with each other to build tools
for data scientist and developers. Added to this is the move to open-source their
platforms like TensorFlow, Caffe and AutoML enabling developers to build a
custom AI model.
Scalability: It will
allow enterprises to grow by starting small and allowing them to increase their
AI operations gradually with time.
Types of AIaaS--
Machine learning
framework: This tool enables developers to build their own model and learn from
an existing pool of data. It will allow building machine learning tasks without
the requirement of the big data environment.
Third party APIs: These
are created to increase the functionalities in an existing application. NLP,
computer vision, translation, knowledge mapping, emotion detections are some of
the common options for APIs.
AI-powered bots:
Chatbots that uses natural language processing (NLP) capabilities to imitate
the language patterns by learning from human conversations are a common type of
AIaaS.
Fully-managed ML
services: This uses drag-and-drop tools, cognitive analytics and custom-created
data models to generate richer machine learning values.
Without virtualization,
cloud computing might be a scam. Virtualization has to do with apportioning
single physical servers to multiple logical servers. As soon as the physical
server is divided, each valid server can then act like a physical server,
running independent operating system and applications.
Since virtualization is
a critical part of cloud infrastructure, several popular companies provide this
service to the vast number of people who need it. These services are both
cost-effective and time respect.
Especially for software
developers and testers, virtualization is pretty essential; giving developers a
solid platform on which to write code, which can then run in several different
environments and scenarios. They are also able to test the code.
The three significant
purposes of virtualization are network virtualization, server virtualization,
and storage virtualization.
Network virtualization
refers to a method of combining available network resources by dividing the
available bandwidth into channels, each of which is independent of the other
channels, and each of which can be assigned to a particular server or device.
Storage virtualization
deals with the pooling of physical storage from several network storage devices
into a single storage device managed from a central console. This form of
virtualization is commonly used in storage area networks.
As for server virtualization,
it involves the masking of server resources such as processors, RAM, operating
systems; from server users. This form of virtualization aims to ensure an
increase in resource sharing while reducing the burden of computation on users.
Unlocking cloud
infrastructure needs a steady input of virtualization; as it decouples software
from hardware. This makes personal computers, for example, able to borrow extra
memory from the hard disk through the use of virtual memory
Cloud infrastructure is
beyond helpful and has come to stay. If you would be utilizing cloud platforms,
then you need to be on top of your knowledge game about the infrastructure
you’d be using!
In the simplest terms,
cloud computing means storing and accessing data and programs over the Internet
instead of your computer's hard drive. The cloud is just a metaphor for the
Internet.
Normal servers, refers to the regular physical technology
you're installing somewhere in the room, while cloud server is perceived as an
online system able to store a large amount of data, deliver software services,
balance loading time, automate business process and operations, and allow
enough customization
Cloud storage involves
at least one data server that a user connects to via the internet. The user
sends files manually or in an automated fashion over the Internet to the data
server which forwards the information to multiple servers. The stored data is
then accessible through a web-based interface.
Cloud Storage (e.g.
Backblaze B2, Amazon S3, Microsoft Azure, Google Cloud)--
These services are
where many online backup, syncing, and sharing services store their data. Cloud
storage providers typically serve as the endpoint for data storage. These services
usually provide APIs (application program interfaces), CLIs (command line
interfaces), and access points for individuals and developers to tie in their
cloud storage offerings directly.
This allows developers
to create programs that use the cloud storage solution in any way they see fit.
A good way to think about cloud storage is as a building block for whatever
tool or service you want to create.
Cloud storage services
are priced per unit stored, meaning you pay for the amount of storage that you
use and access. Since these services are designed for high availability and
durability, data can live solely on these services, though we still recommend
having multiple copies of your data, just in case.
Cloud storage allows
you to save data and files in an off-site location that you access either
through the public internet or a dedicated private network connection. Data
that you transfer off-site for storage becomes the responsibility of a
third-party cloud provider. The provider hosts, secures, manages, and maintains
the servers and associated infrastructure and ensures you have access to the
data whenever you need it.
Cloud storage delivers
a cost-effective, scalable alternative to storing files on on-premise hard
drives or storage networks. Computer hard drives can only store a finite amount
of data. When users run out of storage, they need to transfer files to an
external storage device.
Traditionally,
organizations built and maintained storage area networks (SANs) to archive data
and files. SANs are expensive to maintain, however, because as stored data
grows, companies have to invest in adding servers and infrastructure to
accommodate increased demand.
Cloud storage services
provide elasticity, which means you can scale capacity as your data volumes increase
or dial down capacity if necessary. By storing data in a cloud, your
organization save by paying for storage technology and capacity as a service,
rather than investing in the capital costs of building and maintaining in-house
storage networks.
You pay for only
exactly the capacity you use. While your costs might increase over time to
account for higher data volumes, you don’t have to overprovision storage
networks in anticipation of increased data volume.
How does it work?
Like on-premise storage
networks, cloud storage uses servers to save data; however, the data is sent to
servers at an off-site location. Most of the servers you use are virtual
machines hosted on a physical server. As your storage needs increase, the provider
creates new virtual servers to meet demand.
Cloud computing is when
entities share a network of remotely accessible servers. The servers are hosted
on the Internet, allowing businesses to manage data “in the cloud” instead of
on a local server. It’s a shared space in which devices in the network can
access data from anywhere.
The basic idea of cloud
computing is that your information is stored online, available for you to
access it whenever you want and from any computer or Internet-ready device.
Cloud Computing lets us
deploy the service quickly in fewer clicks. This quick deployment lets us get
the resources required for our system within minutes.
Cloud computing is
ideal for businesses that have to carry out database management in remote
locations., with everything being readily available over the cloud, businesses
can enhance their efficiency and increase their productivity, simultaneously.
Cloud computing
requires no hefty machinery or equipment to run. That makes it the most
cost-effective method to maintain and use. Cloud computing eliminates the cost
of setting up data centers and looking after them.
Cloud computing has
become an integral part of the digital ecosystem. Ever since its introduction
in 2006 by the Amazon Web Services, it has come a long way . Cloud has come to
resonate with the hearts of millions of professionals and businesses who look at
it as the ultimate solution to the data storage issues.
Small and large
businesses all over the world are switching to Cloud-based solutions, and it
has been predicted that by 2020, enterprises will shift 83% of their workload
to cloud-computing platforms. Amazon Web Services, Google Cloud Platform,
Microsoft Azure and IBM Bluemix are a few of the front-runners of the cloud
computing realm.
There are three major
players in the public cloud platforms arena - Amazon Web Services (AWS),
Microsoft's Azure, and Google Cloud Platform. The top cloud computing companies
are addressing a large and growing market
Global data will touch
175 Zettabytes by 2025. Now if you want
to imagine it in real terms, 1 Zettabyte equals 1 trillion Gigabytes. Digitization of the world is unstoppable. Today,
77 percent of businesses have one or more applications or part of their
infrastructure in the cloud.
Pandora’s box is open.
This form of storage
has become a popular way for people to store their music, movies and other
media. For businesses, the cloud presents a way to store data securely online.
Cloud computing offers significant benefits over regular storage and makes data
available to everyone who needs it
In-house data storage
costs companies a significant amount of money. There’s the up-front price tag
of purchasing each new server as well as the cost of installing them. Then you
need to ensure the equipment is maintained properly and backed up regularly.
With cloud computing,
the headache associated with maintaining in-house systems disappears as you
have the support of your service provider. Because the cost of infrastructure
is included in your plan and split among all the service provider’s clients,
you save money.
Cloud is available via
internet and allows the users to access the data from any location. Users pay
for the services they use. Dedicated servers are physical servers and you have
the entire server for your own websites. They are more secure and perform
better.
Virtual servers allow
multiple servers to run on one physical host and share the resources which can
be way more efficient and cost effective. ... Each virtual server would have
its own IP address, which would allow remote access to the server through the
Local Area Network.
A cloud server is a
logical server that is built, hosted and delivered through a cloud computing
platform over the Internet. Cloud servers possess and exhibit similar
capabilities and functionality to a typical server but are accessed remotely
from a cloud service provider
Cloud hosting involves
a network of servers (possibly hundreds) joined together to act as one ‘mega
server’. Cloud hosting enables you to handle large volumes of unexpected
traffic because you are not relying on a single server, but rather a network
(or ‘cloud’) of servers.
If one server
malfunctions, your data will be backed up by other servers in the cloud network
and your users will experience no downtime. The ability to scale quickly and
inherent redundancy are the key benefits of cloud hosting.
With cloud hosting
platforms you can monitor your usage and seemlessly scale when you need more
storage space, bandwidth or processing power. Alternatively, during times when
you’re facing low volumes of traffic, it allows you to scale back your plan
allowing you to reduce hosting costs.
Generally speaking,
companies that opt for cloud hosting don’t own any of the servers. In fact,
they may not even know what sort of hardware their websites are hosted on or
where the server is located. Users of
cloud hosting services don’t have to understand how to set up and maintain a
complex and scalable hosting infrastructure because that is all handled by the
cloud hosting company.
Any regular shared or
VPS hosting provider will host several websites (sometimes 100’s) on a single
server. This means your website will have to share the resources (such as
processing power and storage space) with other websites on the same physical
server. This places obvious limitations to the performance of any one site.
Cloud hosting, on the
other hand, utilizes many servers instead of a single server so that there is
technically no limit to performance. If any site on the cloud experiences
unexpected traffic spikes, the cloud as a whole is able to handle the increase
in demand without impacting the other sites. Since cloud hosting is more robust
and dynamic compared to regular web hosting, it gives you better overall
performance and is inherently more scalable than regular web hosting services.
The hundreds of
regulations that govern different types of data are complex to understand,
time-consuming to apply and laborious to maintain. Why not let a cloud storage
service provider do the heavy lifting when it comes to compliance? A good
provider operates in full compliance with all applicable regulations so you
don’t have to worry about incurring violations.
Cloud platforms don’t
require your employees to be tethered to their desks all day every day. Since
they access these services via the Internet, they can use desktop computers,
smartphones, and other devices to connect to your cloud platform.
Moreover,
your team will have access to all your files and software even if they don’t
have a physical presence in the office. Whether they’re traveling or working
remotely, they will be able to log in to their cloud accounts and get their
work done.
Once an individual or a
company registers itself to the cloud, they can access it from anywhere in the
world just in a matter of seconds. Files in the cloud can be accessed from
anywhere with an Internet connection. This allows you to move beyond time zone
and geographic location issues.
If your business is not
investing in cloud-computing technology, then all of your valuable data is
unfortunately tied to the office computer it resides in. This may not look like
the actual problem, but the reality is that if your local hardware faces a
problem, you might end up permanently losing all your data.
This is one of the
most common issues as computers can malfunction for a lot of reasons, from
viral infections, to age-related hardware deterioration, to simple user error,
or they can even be misplaced or stolen
The accessibility of
the cloud also fosters better collaboration among your workforce. Team members
can access and share files through your cloud platform, which allows them to
work on documents together and see others’ updates as they happen.
Make sure to work with
a reliable ISP when you’re looking to implement cloud services. It’s also
crucial to ensure that you have sufficient Internet speeds and bandwidth to
support your cloud needs.
With virtualization,
software called a hypervisor sits on top of physical hardware and abstracts the
machine's resources, which are then made available to virtual environments
called virtual machines. These resources can be raw processing power, storage,
or cloud-based applications containing all the runtime code and resources
required to deploy it.
If the process stops
here, it's not cloud—it's just virtualization.
Virtual resources need
to be allocated into centralized pools before they're called clouds. Adding a
layer of management software gives administrative control over the
infrastructure, platforms, applications, and data that will be used in the
cloud. An automation layer is added to replace or reduce human interaction with
repeatable instructions and processes, which provides the self-service
component of the cloud.
Clouds deliver the
added benefits of self-service access, automated infrastructure scaling, and
dynamic resource pools, which most clearly distinguish it from traditional
virtualization.
There are three main
types of cloud hosting: public cloud, private cloud, and hybrid cloud.
A public cloud is what
you would use to host your website. It is built on a standard cloud computing
model which handles files, apps, disk storage, and services made available to
the general public through the web.
Amazon Web Services,
Microsoft Azure, and Google Cloud are examples of public clouds. Some of the
most common real-world examples of public cloud services include services like
cloud-based server hosting, storage services, webmail, and online office
applications.
Public clouds are
usually multitenant, i.e., there are many organizations sharing space on the
same cloud.
A private cloud, handles files, apps, storage space, and
services that are present behind a safe corporate firewall that is controlled
by a corporate IT manager or the IT department. You might use a private cloud
to maintain your corporate intranet for example, with access limited to
employees who can access it using a secure VPN connection.
Private cloud is infrastructure
dedicated entirely to your business that’s hosted either on-site or in a service
provider’s data center. Private clouds offer a lot of benefits, which can come
at a cost.
A hybrid cloud is a mix
of the two (private and public) that stay distinct but still work together
allowing you to make use of a multiple deployment model.
Some form of hybrid
option is obviously the best solution given the Public vs. Private debate. Keep all important corporate data secure
behind some Private Cloud-based service on stored securely using an array of
on-premise servers, while access to that data remains tightly controlled and
accessed through a combination of SaaS and DBaaS services.
This provides the
best of both worlds: mobile and web-based access to corporate applications with
high usability, while important data remains secure.
Cloud hosting enables
websites owners to stay flexible with their budget and site resources. With
cloud hosting, you only pay for what you use. You can sign up for a standard
level pricing plan while, at the same time, have the ability to scale these
resources as your website continues to grow.
This is achieved via
close resource usage tracking. You can track and allocate additional computing
power and storage space to your website by using an intuitive resource
management portal. This will also allow you to view your website’s usage
whenever you want while being able to keep a close eye on your billing.
Cloud infrastructure
can include a variety of bare-metal, virtualization, or container software that
can be used to abstract, pool, and share scalable resources across a network to
create a cloud. At the base of cloud computing is a stable operating system
(like Linux). This is the layer that gives users independence across public,
private, and hybrid environments.
Alibaba is the leading
cloud provider in China and an option for multi-national companies building
infrastructure there. In its December quarter, Alibaba delivered cloud revenue
growth of 84 percent to $962 million.
To keep data secure,
the front line of defense for any cloud system is encryption. ... Yes, the only
way to keep your data safe for certain is to lock it up in a safe beneath the
ground. That being said, your cloud-stored data is generally safer than your
locally stored data.
The cloud may be fine
for your pictures and music, but when you start thinking about personal
information, such as passwords, that a business keeps on their clients and
customers, the stakes go way up. For one thing, you don’t really know where the
data is being stored, so you don’t have the first idea of the level of data
security
An equally important
concern, particularly for government agencies and military, isn’t just the
security of the servers themselves; it’s the people who have access to them as
part of their job.
A lot of people already
make use of a wide array of cloud computing services without even realizing it.
Gmail, Facebook, Google Drive, One Drive, and even Instagram are all
cloud-based applications. For all of these services, users are sending their
personal data to the cloud-hosted server that accumulates the data for later
access.
Because the
infrastructure of the cloud is owned and managed by the service provider,
businesses may worry about not having enough control over the service. This is
where the provider’s end-user license agreement (EULA) can help you out.
It
explains what limits the provider can place on your use of the deployment. All
legitimate cloud comuting providers allow your organization to exert control
over your applications and data, even if it doesn’t allow you to alter the
infrastructure in any way.
When a provider
presents you with a service level agreement (SLA), it helps to make sure you
understand every word of it. This will help you confirm what you can and can’t
do with the service.
You will be charged a
very nominal fee for your data to be stored on the cloud. This is one of the
major advantages of cloud computing which was a critical issue in conventional
computing and storage systems. Storage capacity can be expanded to many
terabytes (TB) for much less amount than storing in the local storage devices.
With cloud storage, you
only pay for the amount of storage you require. If your business experiences
growth, then the cloud operator can help accommodate your corresponding growth
in data storage needs.
All you will have to do is vary how much you pay to extend
the storage you have. This also works in the same way if your business shrinks
and you require less storage space at a reduced rate.
Cloud storage is a plus
if a business’s IT infrastructure is damaged or destroyed by a natural disaster
or stolen in a ransomware attack.
With cloud storage, you
will be able to create multiple copies of the same file and house them in
off-site servers that won’t succumb to the same disasters as your own facility.
In many cases, you can set up your cloud to create automatic backups so your
information will always be up to date. Having these backups in the cloud will
allow you to restore any lost information in a matter of minutes.
Cloud services
aggregate data from thousands of small businesses. The small businesses believe
they are pushing security risks to a larger organization more capable of
protecting their data.
For startups and small
to medium-sized businesses (SMEs), that can’t afford costly server maintenance,
but also may have to scale overnight, the benefits of utilizing the cloud are
especially great.
Data stored on cloud servers
can be lost through a natural disaster, malicious attacks, or a data wipe by
the service provider. Losing sensitive data is devastating to firms, especially
if they have no recovery plan. Google is an example of the big tech firms that
have suffered permanent data loss after being struck by lightning four times in
its power supply lines.
Amazon was another firm
that lost its essential customer data back in 2011.
Manageability: Cloud
Computing eliminates the need for IT infrastructure updates and maintenance
since the service provider ensures timely, guaranteed, and seamless delivery of
our services and also takes care of all the maintenance and management of our
IT services according to the service-level agreement (SLA).
Sporadic batch
processing: Cloud Computing lets us add or subtract resources and services
according to our needs. So, if the workload is not 24/7, we need not worry
about the resources and services getting wasted and we won’t end up stuck with
unused services.
Strategic edge: Cloud
Computing provides a company with a competitive edge over its competitors when
it comes to accessing the latest and mission-critical applications that it
needs without having to invest its time and money on their installations. It
lets the company focus on keeping up with the business competition by offering
access to the most trending and in-demand applications and doing all the manual
work of installing and maintaining the applications for the company.
Downtime: Downtime is
considered as one of the biggest potential downsides of using Cloud Computing.
The cloud providers may sometimes face technical outages that can happen due to
various reasons, such as loss of power, low Internet connectivity, data centers
going out of service for maintenance, etc. This can lead to a temporary
downtime in the cloud service.
Vendor lock-in: When in
need to migrate from one cloud platform to another, a company might face some
serious challenges because of the differences between vendor platforms. Hosting
and running the applications of the current cloud platform on some other
platform may cause support issues, configuration complexities, and additional
expenses. The company data might also be left vulnerable to security attacks
due to compromises that might have been made during migrations.
Limited control: Cloud
customers may face limited control over their deployments. Cloud services run
on remote servers that are completely owned and managed by service providers,
which makes it hard for the companies to have the level of control that they
would want over their back-end infrastructure.
Distributed cloud is
the application of cloud computing technologies to interconnect data and
applications served from multiple geographic locations. Distributed, in an
information technology (IT) context, means that something is shared among
multiple systems which may also be in different locations.
A distributed cloud
refers to having computation, storage, and networking in a micro-cloud located
outside the centralized cloud. Examples of a distributed cloud include both fog
computing and edge computing
By 2025, will generate
and process more than 75% of their data outside of traditional centralised data
centres — that is, at the “edge” of the cloud.
Edge computing enables
data to be analysed, processed, and transferred at the edge of a network. The
idea is to analyse data locally, closer to where it is stored, in real-time
without latency, rather than send it far away to a centralised data centre. So
whether you are streaming a video on Netflix or accessing a library of video
games in the cloud, edge computing allows for quicker data processing and
content delivery.
The basic difference
between edge computing and cloud computing lies in where the data processing
takes place.
At the moment, the
existing Internet of Things (IoT) systems perform all of their computations in
the cloud using data centres. Edge computing, on the other hand, essentially
manages the massive amounts of data generated by IoT devices by storing and
processing data locally. That data doesn’t need to be sent over a network as
soon as it processed; only important data is sent — therefore, an edge
computing network reduces the amount of data that travels over the network.
The true potential of
edge computing will become apparent when 5G networks go mainstream in a year
from now. Users will be able to enjoy consistent connectivity without even
realising it.
Edge computing does not
need contact with any centralized cloud, although it may interact with one. In
contrast to cloud computing, edge computing refers to decentralized data
processing at the edge of the network
Edge computing refers
to data processing power at the edge of a network instead of holding that
processing power in a cloud or a central data warehouse. ... Edge computing
does not replace cloud computing, however. In reality, an analytic model or
rules might be created in a cloud then pushed out to edge devices.
Azure IoT Edge is a
fully managed service built on Azure IoT Hub. ... By moving certain workloads
to the edge of the network, your devices spend less time communicating with the
cloud, react more quickly to local changes and operate reliably even in
extended offline periods.
The edge of the IoT is
where the action is. It includes a wide array of sensors, actuators, and
devices—those system end-points that interact with and communicate real-time
data from smart products and services.
Edge
infrastructure takes advantage of cloud
infrastructure but keeps assets at the edge of the network
Edge computing can reduce data transport requirements, thereby
saving network bandwidth costs and avoiding data storage proliferation. A
Content Distribution Network (CDN) is one example of how performance and efficiency
can be improved by storing content closer to its users.
Edge processing refers
to the execution of aggregation, data manipulation, bandwidth reduction and
other logic directly on an IoT sensor or device. ... The more work the device
can do to prepare the data for the cloud, the less work the cloud needs to do
Edge computing is a
distributed, open IT architecture that features decentralized processing power,
enabling mobile computing and Internet of Things (IoT) technologies. In edge
computing, data is processed by the device itself or by a local computer or
server, rather than being transmitted to a data center.
At the Edge, the latest
microcontrollers are combing with a vast array of sensors to permit a
relatively high level of processing to occur and decisions to be made
locally—all without going back to the Cloud. That has some obvious advantages;
namely, it allows for real-time decisions as the latencies associated with
Cloud-based decision making go away.
Nvidia, one of the
biggest players in the design and manufacture of graphics and AI acceleration
hardware, has just announced its EGX edge computing platform to help telecom
operators adopt 5G networks capable of supporting edge workloads. The new
Nvidia Aerial software developer kit will help telecom companies build
virtualised radio access networks that will let them support smart factories,
AR/VR and cloud gaming.
Internet for Things focuses
on the Internet while the IoT focuses on the devices (Things). When we enable
machines or non-computing devices to connect with the world of the Internet and
generate useful data with the help of sensors or other techniques applicable on
non-computing devices, the Internet of Things application happens.
The Internet of Things
is simply "A network of Internet connected objects able to collect and
exchange data." It is commonly abbreviated as IoT. ... In a simple way to
put it, You have "things" that sense and collect data and send it to
the internet. This data can be accessible by other "things" too.
The Internet of things
(IoT) is the extension of Internet connectivity into physical devices and
everyday objects. ... Traditional fields of embedded systems, wireless sensor
networks, control systems, automation (including home and building automation),
and others all contribute to enabling the Internet of things.
Consumer connected
devices include smart TVs, smart speakers, toys, wearables and smart appliances.
Smart meters, commercial security systems and smart city technologies -- such
as those used to monitor traffic and weather conditions -- are examples of
industrial and enterprise IoT devices.
IoT Cloud is a platform
from Salesforce.com that is designed to store and process Internet of Things
(IoT) data. IoT devices are becoming a part of the mainstream electronics
culture and people are adopting smart devices into their homes faster than
ever. ... The more data that IoT devices collect, the smarter they will become.
Cities will transform
into smart cities through the use of IoT connected devices Cloud computing
provides necessary tools and services to create IoT applications. Cloud helps
in achieving efficiency, accuracy, speed in implementing IoT applications.
Cloud helps IoT application development but IoT is not a cloud computing
IoT allows flow of data
between devices and AI can help to make sense of this data. AI is expected to
be the key propellant to the growth of the IoT revolution and take it to a new
level.
An Internet of Things
(IoT) gateway is a physical device or software program that serves as the
connection point between the cloud and controllers, sensors and intelligent
devices. ... A gateway provides a place to preprocess that data locally at the
edge before sending it on to the cloud.
The IoT is getting
smarter. Companies are incorporating artificial intelligence—in particular,
machine learning—into their Internet of Things applications and seeing
capabilities grow, including improving operational efficiency and helping avoid
unplanned downtime. The key: finding insights in data.
Dubbed AIoT, the
convergence of AI and IoT is a powerful tool, either at the Edge or in the
Cloud. The goal for the technology, which is sometimes referred to as
Artificial Intelligence of Things, is to achieve more efficient IoT operations,
improve human-machine interactions, and enhance data management and analytics.
If implemented properly, those AI analytics can transform IoT data into useful
information for an improved decision-making process.
The Artificial
Intelligence of Things (AIoT) is the combination of artificial intelligence
(AI) technologies with the Internet of Things (IoT) infrastructure to achieve
more efficient IoT operations, improve human-machine interactions and enhance
data management and analytics.
AI can be used to transform IoT data into useful
information for improved decision making processes, thus creating a foundation
for newer technology such as IoT Data as a Service (IoTDaaS).
AIoT is
transformational and mutually beneficial for both types of technology as AI
adds value to IoT through machine learning capabilities and IoT adds value to
AI through connectivity, signaling and data exchange.
As IoT networks spread
throughout major industries, there will be an increasingly large amount of
human-oriented and machine-generated unstructured data. AIoT can provide
support for data analytics solutions that can create value out of this
IoT-generated data.
With AIoT, AI is
embedded into infrastructure components, such as programs, chipsets and edge
computing, all interconnected with IoT networks. APIs are then used to extend
interoperability between components at the device level, software level and
platform level. These units will focus primarily on optimizing system and
network operations as well as extracting value from data.
While the concept of
AIoT is still relatively new, many possibilities exist to improve industry
verticals, such as enterprise, industrial and consumer product and service
sectors, and will continue to arise with its growth.
AIoT could be a viable
solution to solve existing operational problems, such as the expense associated
with effective human capital management (HCM) or the complexity of supply
chains and delivery models.
Many AIoT applications
are currently retail product oriented and often focus on the implementation of
cognitive computing in consumer appliances. For example, smart home technology
would be considered a part of AIoT as smart appliances learn through human
interaction and response.
In terms of data
analytics, AIoT technology combines machine learning with IoT networks and
systems in order to create data "learning machines." This can then be
applied to enterprise and industrial data use cases to harness IoT data, such
as at the edge of networks, to automate tasks in a connected workplace. Real
time data is a key value of all AIoT use cases and solutions.
In one specific use
case example, AIoT solutions could also be integrated with social media and
human resources-related platforms to create an AI Decision as a Service
function for HR professionals.
The convergence of
Artificial Intelligence (AI) and Internet of Things (IoT) technologies and
solutions (AIoT) is leading to thinking networks and systems that are becoming
increasingly more capable of solving a wide range of problems across a diverse
number of industry verticals. AI adds value to IoT through machine learning and
improved decision making. IoT adds value to AI through connectivity, signaling,
and data exchange.
The intelligent cloud
is ubiquitous computing, enabled by the public cloud and artificial
intelligence (AI) technology, for every type of intelligent application and
system you can envision. ... Users get real-time insights and experiences,
delivered by highly responsive and contextually aware apps.
Enterprises are
embracing the cloud to run their mission-critical workloads.
The number of
connected devices on and off-premises, and the data they generate continue to
increase requiring new enterprise network edge architectures. We call this the
intelligent edge – compute closer to the data sources and users to reduce
latency.
The intelligent cloud,
with its massive compute power, storage and variety of services works in
concert with the intelligent edge using similar programming models to enable
innovative scenarios and ubiquitous compute. Networking is the crucial enabler
integrating the intelligent cloud with the intelligent edge.
Ubiquitous computing
(or "ubicomp") is a concept in software engineering and computer
science where computing is made to appear anytime and everywhere. In contrast
to desktop computing, ubiquitous computing can occur using any device, in any
location, and in any format. A user interacts with the computer, which can
exist in many different forms, including laptop computers, tablets and
terminals in everyday objects such as a refrigerator or a pair of glasses.
The
underlying technologies to support ubiquitous computing include Internet,
advanced middleware, operating system, mobile code, sensors, microprocessors,
new I/O and user interfaces, computer networks, mobile protocols, location and
positioning, and new materials.
Most of the Internet of
Things (IOT) devices are based on Ubiquitous Computing. Some of the examples
are: Apple Watch. Amazon Echo Speaker.
The fact that most
communication in ubiquitous computing is wireless makes the role of security
all the more important because radio communication can be manipulated more
easily.
Ubiquitous computing is a paradigm in which the processing of information is linked with each activity or object as encountered. It involves connecting electronic devices, including embedding microprocessors to communicate information.
Ubiquitous means everywhere. Pervasive means "diffused throughout every part of." In computing terms, those seem like somewhat similar concepts. Ubiquitous computing would be everywhere, and pervasive computing would be in all parts of your life
Intelligent Cloud Sync
has been introduced in 2018 to enable a cloud companion tenant to on-prem
implementations so that they can make use of the great advantages of artificial
intelligence and other SaaS tools to enhance business insights as well
Put simply, the cloud
is a set of computers that someone else is managing. When talking about syncing
and sharing services like Dropbox, Box, Google Drive, OneDrive, or any of the
others, people often assume they are acting as a cloud backup solution as well.
Adding to the confusion, cloud storage services are often the backend for
backup and sync services as well as standalone services, meaning some of your
favorite apps are built in the cloud, sometimes using third party cloud
storage. To
Cloud Sync (e.g.
Dropbox, iCloud Drive, OneDrive, Box, Google Drive)
These services sync
folders on your computer or mobile device to folders on other machines or into
the cloud, allowing users to work from a folder or directory across devices.
Typically these services have tiered pricing, meaning you pay for the amount of
data you store with the service, or for tiers of data that you are allowed to
use.
If there is data loss, sometimes these services even have a version
history feature. Of course, only files that are in the synced folders are
available to be recovered, resulting in sync services not being able to get
back files that were never synced.
Cloud file syncing is
an application that keeps files in different locations up to date through the
cloud. For cloud file syncing, a user sets up a cloud-based folder, to which
the desired files are copied. This folder makes the files accessible via a web
interface for multiple users, on whatever device they are using.
Cloud backup saves a
copy of data on remote storage to protect it from undesired events, at the same
time cloud storage is designed for getting access to data from anywhere. Cloud
sync lets multiple users work with data remotely using any number of devices
and synchronize changes across all the users involved.
Cloud Sync is a way to
keep the same updated files in different locations through cloud storage
services. No matter where they were geographically edited or changed, the file
will be the same from where ever it is accessed. This is a great way to keep
files current, consistent, and accessible to users across multiple locations
and platforms.
For instance, when a user edits or updates a file, the changes
are automatically synchronized with the corresponding folder(s). This can save
organizations real time and money, because it enables users to spend less time hunting
for documents and more time doing their day-to-day business operations.
How do I connect cloud
storage platforms?
Most cloud storage
platforms offer what is commonly known as a “sync folder” in your file system.
These sync folders automatically copy files in their most up-to-date versions
to all devices connected to the corresponding cloud account. For example, a
Dropbox sync folder on your device will automatically sync content to your
Dropbox cloud storage account. To connect and sync various cloud storage
platforms with one another, you will need an application that is able to
integrate and synchronize content among your multiple cloud services.
How does Cloud Sync
work?
There is no one right
answer, as it will all depend on your personal cloud syncing and cloud
migration needs. Do you need a one-way sync? Possibly a bi-directional sync (or
two-way sync), or to manage a multi or hybrid-cloud environment? Whatever your
cloud migration needs may be, consider synchronizing your content using a hosted
system or third-party tool. On the other
hand, you could even try to create your very own DIY sync system. Either way,
setting up a cloud sync system can create platform freedom among users.
Typically, you connect
to the storage cloud either through the internet or a dedicated private
connection, using a web portal, website, or a mobile app. The server with which
you connect forwards your data to a pool of servers located in one or more data
centers, depending on the size of the cloud provider’s operation.
As part of the service,
providers typically store the same data on multiple machines for redundancy.
This way, if a server is taken down for maintenance or suffers an outage, you
can still access your data.
Cloud storage is
available in private, public and hybrid clouds.
Public storage clouds:
In this model, you connect over the internet to a storage cloud that’s
maintained by a cloud provider and used by other companies. Providers typically
make services accessible from just about any device, including smartphones and
desktops and let you scale up and down as needed.
Private cloud storage:
Private cloud storage setups typically replicate the cloud model, but they
reside within your network, leveraging a physical server to create instances of
virtual servers to increase capacity. You can choose to take full control of an
on-premise private cloud or engage a cloud storage provider to build a dedicated
private cloud that you can access with a private connection.
Organizations that
might prefer private cloud storage include banks or retail companies due to the
private nature of the data they process and store.
Hybrid cloud storage:
This model combines elements of private and public clouds, giving organizations
a choice of which data to store in which cloud. For instance, highly regulated
data subject to strict archiving and replication requirements is usually more
suited to a private cloud environment, whereas less sensitive data (such as
email that doesn’t contain business secrets) can be stored in the public cloud.
Some organizations use hybrid clouds to supplement their internal storage
networks with public cloud storage.
Pros and cons
As with any other
cloud-based technology, cloud storage offers some distinct advantages. But it
also raises some concerns for companies, primarily over security and
administrative control
Examples
There are three main
types of cloud storage: block, file, and object. Each comes with its set of
advantages:
Block storage
Traditionally employed
in SANs, block storage is also common in cloud storage environments. In this
storage model, data is organized into large volumes called “blocks." Each
block represents a separate hard drive. Cloud storage providers use blocks to
split large amounts of data among multiple storage nodes. Block storage
resources provide better performance over a network thanks to low IO latency
(the time it takes to complete a connection between the system and client) and
are especially suited to large databases and applications.
Used in the cloud,
block storage scales easily to support the growth of your organization’s
databases and applications. Block storage would be useful if your website
captures large amounts of visitor data that needs to be stored.
File storage
The file storage method
saves data in the hierarchical file and folder structure with which most of us
are familiar. The data retains its format, whether residing in the storage
system or in the client where it originates, and the hierarchy makes it easier
and more intuitive to find and retrieve files when needed. File storage is
commonly used for development platforms, home directories, and repositories for
video, audio, and other files.
Object storage
Object storage differs
from file and block storage in that it manages data as objects. Each object
includes the data in a file, its associated metadata, and an identifier.
Objects store data in the format it arrives in and makes it possible to
customize metadata in ways that make the data easier to access and analyze.
Instead of being organized in files or folder hierarchies, objects are kept in
repositories that deliver virtually unlimited scalability. Since there is no
filing hierarchy and the metadata is customizable, object storage allows you to
optimize storage resources in a cost-effective way.
Cloud storage for
business
A variety of cloud
storage services is available for just about every kind of business— anything
from sole proprietor to large enterprises.
If you run a small
business, cloud storage could make sense, particularly if you don’t have the
resources or skills to manage storage yourself.
Cloud storage can also help with budget planning by making storage costs
predictable, and it gives you the ability to scale as the business grows.
If you work at a larger
enterprise (e.g., a manufacturing company, financial services, or a retail
chain with dozens of locations), you might need to transfer hundreds of
gigabytes of data for storage on a regular basis. In these cases, you should
work with an established cloud storage provider that can handle your volumes.
In some cases, you may be able to negotiate custom deals with providers to get
the best value.
Security
Cloud storage security
is a serious concern, especially if your organization handles sensitive data
like credit card information and medical records. You want assurances your data
is protected from cyber threats with the most up-to-date methods available. You
will want layered security solutions that include endpoint protection, content
and email filtering and threat analysis, as well as best practices that
comprise regular updates and patches. And you need well-defined access and
authentication policies.
Most cloud storage
providers offer baseline security measures that include access control, user
authentication, and data encryption. Ensuring these measures are in place is
especially important when the data in question involves confidential business
files, personnel records, and intellectual property. Data subject to regulatory
compliance may require added protection, so you need to check that your
provider of choice complies with all applicable regulations.
Whenever data travels,
it is vulnerable to security risks. You share the responsibility for securing
data headed for a storage cloud. Companies can minimize risks by encrypting
data in motion and using dedicated private connections (instead of the public
internet) to connect with the cloud storage provider.
Backup
Data backup is as important
as security. Businesses need to back up their data so they can access copies of
files and applications— and prevent interruptions to business—if data is lost
due to cyberattack, natural disaster, or human error.
Cloud-based data backup
and recovery services have been popular from the early days of cloud-based
solutions. Much like cloud storage itself, you access the service through the
public internet or a private connection. Cloud backup and recovery services
free organizations from the tasks involved in regularly replicating critical
business data to make it readily available should you ever need it in the wake
of data loss caused by a natural disaster, cyber attack or unintentional user
error.
Cloud backup offers the
same advantages to businesses as storage—cost-effectiveness, scalability, and
easy access. One of the most attractive features of cloud backup is automation.
Asking users to continually back up their own data produces mixed results since
some users always put it off or forget to do it. This creates a situation where
data loss is inevitable. With automated backups, you can decide how often to
back up your data, be it daily, hourly or whenever new data is introduced to
your network.
Backing up data
off-premise in a cloud offers an added advantage: distance. A building struck
by a natural disaster, terror attack, or some other calamity could lose its
on-premise backup systems, making it impossible to recover lost data.
Off-premise backup provides insurance against such an event.
Servers
Cloud storage servers
are virtual servers—software-defined servers that emulate physical servers. A
physical server can host multiple virtual servers, making it easier to provide
cloud-based storage solutions to multiple customers. The use of virtual servers
boosts efficiency because physical servers otherwise typically operate below
capacity, which means some of their processing power is wasted.
This approach is what
enables cloud storage providers to offer pay-as-you-go cloud storage, and to
charge only for the storage capacity you consume. When your cloud storage
servers are about to reach capacity, the cloud provider spins up another server
to add capacity—or makes it possible for you to spin up an additional virtual
machine on your own.
Open source
If you have the
expertise to build your own virtual cloud servers, one of the options available
to you is open source cloud storage. Open source means the software used in the
service is available to users and developers to study, inspect, change and
distribute.
Open source cloud
storage is typically associated with Linux and other open source platforms that
provide the option to build your own storage server. Advantages of this
approach include control over administrative tasks and security.
Cost-effectiveness is
another plus. While cloud-based storage providers give you virtually unlimited
capacity, it comes at a price. The more storage capacity you use, the higher
the price gets. With open source, you can continue to scale capacity as long as
you have the coding and engineering expertise to develop and maintain a storage
cloud.
Different open source
cloud storage providers offer varying levels of functionality, so you should
compare features before deciding which service to use. Some of the functions
available from open source cloud storage services include the following:
Syncing files between
devices in multiple locations
Two-factor
authentication
Auditing tools
Data transfer
encryption
Password-protected
sharing
Pricing
As mentioned, cloud
storage helps companies cut costs by eliminating in-house storage
infrastructure. But cloud storage pricing models vary. Some cloud storage
providers charge monthly the cost per gigabyte, while others charge fees based
on stored capacity. Fees vary widely; you may pay $1.99 or $10 for 100 GB of
storage monthly, based on the provider you choose. Additional fees for
transferring data from your network to the fees based on storage cloud are
usually included in the overall service price.
Providers may charge
additional fees on top of the basic cost of storage and data transfer. For
instance, you may incur an extra fee every time you access data in the cloud to
make changes or deletions, or to move data from one place to another. The more
of these actions you perform on a monthly basis, the higher your costs will be.
Even if the provider includes some base level of activity in the overall price,
you will incur extra charges if you exceed the allowable limit.
Providers may also
factor the number of users accessing the data, how often users access data, and
how far the data has to travel into their charges. They may charge differently
based on the types of data stored and whether the data requires added levels of
security for privacy purposes and regulatory compliance.
Examples
Cloud storage services
are available from dozens of providers to suit all needs, from those of
individual users to multinational organizations with thousands of locations.
For instance, you can store emails and passwords in the cloud, as well as files
like spreadsheets and Word documents for sharing and collaborating with other
users. This capability makes it easier for users to work together on a project,
which explains while file transfer and sharing are among the most common uses
of cloud storage services.
Some services provide
file management and syncing, ensuring that versions of the same files in
multiple locations are updated whenever someone changes them. You can also get
file management capability through cloud storage services. With it, you can
organize documents, spreadsheets, and other files as you see fit and make them
accessible to other users. Cloud storage services also can handle media files,
such as video and audio, as well as large volumes of database records that
would otherwise take up too much room inside your network.
Whatever your storage
needs, you should have no trouble finding a cloud storage service to deliver
the capacity and functionality you need.
Cloud storage and IBM
IBM Cloud Storage
offers a comprehensive suite of cloud storage services, including
out-of-the-box solutions, components to create your own storage solution, and
standalone and secondary storage.
Benefits of IBM Cloud
solutions include:--
Global reach
Scalability
Flexibility
Simplicity
You also can take
advantage of IBM’s automated data backup and recovery system, which is managed
through the IBM Cloud Backup WebCC browser utility. The system allows you to
securely back up data in one or more IBM cloud data centers around the world.
Storage software is
predicted to overtake storage hardware by 2020, by which time it will need to
manage 40 zettabytes (40 sextillion bytes) of data.
As you’re moving apps
and workloads to the cloud, you’ll have new options for data storage. It’s just
as important to keep your data safe in the cloud as it was on-premises, though.
Google Cloud meets
these needs with a variety of Persistent Disk features. Persistent Disk is our
high-performance block storage option that you can use with either Compute Engine
or Google Kubernetes Engine (GKE).
Note that disks and
snapshots are always encrypted, and data is replicated multiple times to
provide extraordinarily high durability. Here, we’ll dive into three generally
available features that help you meet backup and recovery needs in the way that
works best for your business data.
Google Kubernetes
Engine (GKE) is a management and orchestration system for Docker container and
container clusters that run within Google's public cloud services. Google
Kubernetes Engine is based on Kubernetes, Google's open source container
management system
GKE gives you complete
control over every aspect of container orchestration, from networking, to
storage, to how you set up observability—in addition to supporting stateful
application use cases. However, if your application does not need that level of
cluster configuration and monitoring, then fully managed Cloud Run might be the
right solution for you.
Fully managed Cloud Run
is an ideal serverless platform for stateless containerized microservices that
don’t require Kubernetes features like namespaces, co-location of containers in
pods (sidecars) or node allocation and management.
Data Recovery
Beyond just where and
how your data is stored, it’s important to consider how easy it is to get your
data back from all of these services. With sync and share services, retrieving
a lot of data, especially if you are in a high-data tier, can be cumbersome and
take a while. Generally, the sync and share services only allow customers to
download files over the internet.
If you are trying to download more than a
couple gigabytes of data, the process can take time and can be fraught with
errors. If the process of downloading from your sync/share service will take
three days, one thing to consider is having to keep the computer online the
entire time or risk an error if the download were to get interrupted.
One thing
to be wary of with syncing and sharing services is that if you are sharing your
folders or directories with others, if they add or remove files from shared
directories, they will also be added or removed from your computer as well.
With cloud storage
services, you can usually only retrieve data over the internet as well, and you
pay for both the storage and the egress of the data, so retrieving a large
amount of data can be both expensive and time consuming.
With cloud storage,
data is distributed amongst bi-costal data centers. Syncing technology makes it
possible to link up and update data quickly, but storing data in the cloud
makes syncing unnecessary. When all your data is stored in the cloud, you know
exactly where every piece of information is at any given time.
Cloud file
syncing is an application that keeps files in different locations up to date
through the cloud. For cloud file syncing, a user sets up a cloud-based folder,
to which the desired files are copied. This folder makes the files accessible
via a web interface for multiple users, on whatever device they are using
Tech-giants like Amazon
(AWS), Microsoft (Azure) or Google (Compute Engine) today give the possibility
to create virtual machines in their cloud networks to support or even replace
physical servers.
Desktop as a service
(DaaS) is a cloud computing solution in which virtual desktop infrastructure is
outsourced to a third-party provider. ... Desktop as a service is also known as
a virtual desktop or hosted desktop services
Containers as a service
(CaaS) is a cloud service that allows software developers and IT departments to
upload, organize, run, scale, manage and stop containers by using
container-based virtualization.
If your business needs
a virtual machine, opt for Infrastructure as a Service.
Cloud servers have all
the software they require to run and can function as independent units. A
virtual server is a server that shares hardware and software resources with
other operating systems (OS), versus dedicated servers. Because they are
cost-effective and provide faster resource control, virtual servers are popular
in Web hosting environments.. Why virtual servers are better?
It’s easy to confuse
virtualization and cloud, particularly because they both revolve around
creating useful environments from abstract resources. However, virtualization
is a technology that allows you to create multiple simulated environments or
dedicated resources from a single, physical hardware system, and clouds are IT
environments that abstract, pool, and share scalable resources across a
network.
To put it simply, virtualization is a technology, where cloud is an
environment.
Pros of Virtual Servers--
You’ve created a cloud
if you’ve set up an IT system that:--
Can be accessed by
other computers through a network.
Contains a repository
of IT resources.
Can be provisioned and
scaled quickly.
Virtualization has its
own benefits, such as server consolidation and improved hardware utilization,
which reduces the need for power, space, and cooling in a datacenter. Virtual
machines are also isolated environments, so they are a good option for testing
new applications or setting up a production environment.
Choice between cloud
and virtual private server (VPS) hosting-
A VPS, or virtual
private server, is a form of multi-tenant cloud hosting in which virtualized
server resources are made available to an end user over the internet via a
cloud or hosting provider.
Each VPS is installed
on a physical machine, operated by the cloud or hosting provider, that runs
multiple VPSs. But while the VPSs share a hypervisor and underlying hardware,
each VPS runs its own operating system (OS) and applications and reserves its
own portion of the machine's resources (memory, compute, etc.).
A VPS offers levels of
performance, flexibility, and control somewhere between those offered by
multi-tenant shared hosting and single-tenant dedicated hosting.
While it might
seem counterintuitive that the multi-tenant VPS arrangement would be called
‘private’—especially when single-tenant options are available—the term ‘VPS’ is
most commonly used by traditional hosting providers to distinguish it from
shared hosting, a hosting model where all the hardware and software resources
of a physical machine are shared equally across multiple users.
VPS hosting is a partition
of a dedicated server machine. It acts like an autonomous server, but is
actually a self-contained folder on a powerful physical host system that also
hosts other virtual servers for other clients. Although you share space on the
physical host, your virtual server is independent of the others.
The security of VPS
hosting is almost on par with that of a dedicated physical server. The VPS is
independent of any other VPSes on the same physical host, as if it were a
separate machine, but poor security measures taken by the owner of one VPS
could affect others on the same physical server.
However, this possibility is
much less likely than with shared hosting. The centralized location of the
physical host offers added security to those operations with critical data
whose location must be known and restricted to comply with data security
regulations.
The security of cloud
hosting is also quite high. Your server is completely separated from other
clients, as with a VPS. However, the web-based nature of the infrastructure
might make it vulnerable to attacks since it is physically distributed and thus
harder to secure. In addition, since the data is housed in many locations, it
may not be possible to comply with some regulations on data security.
Cloud servers
ordinarily have a lower entry cost than dedicated servers. However, cloud
servers tend to lose this advantage as a company scales and requires more
resources. There are also features that can increase the cost of both
solutions. ... Cloud servers are typically billed on a monthly OpEx model..
The term ‘managed cloud
hosting’ is sometimes also used to refer to the managed hosting of a specific
application such as WordPress or some other content or commerce application in
the cloud. In such cases the provider does a fully managed installation of the
application on their cloud infrastructure which is specially tuned to run that
particular application at the best possible performance.
In this way you know
you have the best possible hosting set up for high performance of that
particular application.
This type of managed
cloud hosting provider often also add application specific services as well
such as:--
Managed backups
Application specific
security optimizations
Managed content
distribution networks (CDN)
Managed application
caching and application specific performance optimizations
Many smaller firms
simply leverage public backup services to gain an added layer of security for
important documents and media, while larger enterprises take advantage of a
growing number of SaaS, IaaS, PaaS, and DBaaS providers
Database as a service
(DBaaS) is a cloud computing service model that provides users with some form
of access to a database without the need for setting up physical hardware,
installing software or configuring for performance. Think of it as a more
focused form of PaaS.. DBaaS instance provides customers with a fully managed
and dedicated SQL Server environment, capable of running multiple databases.
In
database systems, SQL statements are used to generate queries from a client
program to the database. This can allow the users to execute a wide range of
fast data manipulation. So to basically put it, SQL is the main language that
allows your database servers to store and edit the data on it
Here are the 15 most
popular DBaaS brands.---
Microsoft Azure SQL
Database
Amazon RDS
Amazon DynamoDB
Microsoft Azure Table
Storage
Microsoft DocumentDB
MongoDB Atlas
Google Cloud SQL
Google Cloud Datastore
Amazon Aurora
Oracle Database Cloud
Service
Amazon SimpleDB
Google Cloud Bigtable
IBM Cloudant
Compose (IBM)
Google Cloud Spanner
SQL Server is a
relational database management system (RDBMS) developed by Microsoft. It is
primarily designed and developed to compete with MySQL and Oracle database.
Microsoft SQL Server
Express is a version of Microsoft's SQL Server relational database management
system that is free to download, distribute and use. It comprises a database
specifically targeted for embedded and smaller-scale applications.
SQL Server allows you
to run multiple services at a go, with each service having separate logins,
ports, databases, etc. Critical components of SQL Server are Database Engine,
SQL Server, SQL Server Agent, SQL Server Browser, SQL Server Full-Text Search,
etc.
The term "Network-as-a-Service"
(NaaS) is often used along with other marketing terms like cloud computing,
along with acronyms such as Infrastructure-as-a-Service (IaaS),
Platform-as-a-Service (PaaS), Software-as-a-Service (SaaS), and
Communication-as-a-Service (CaaS).
Anything-as-a-service,
or XaaS, refers to the growing diversity of services available over the
Internet via cloud computing as opposed to being provided locally, or on
premises.
Monitoring as a service
(MaaS) is one of many cloud delivery models under anything as a service (XaaS).
It is a framework that facilitates the deployment of monitoring functionalities
for various other services and applications within the cloud.
Companies that serve
the medical industry must abide by HIPAA regulations stating that data must be
stored in two separate locations. Law firms may need permission from clients
before storing personal client data on a cloud server. Furthermore, the fact
that an on-premise server does not require an internet connection is a benefit
for certain types of companies.
Some companies will
need both on-premise and cloud storage. Others may prefer to manage their own
customized storage solution without outside help.
In June 2019 Google experienced a five-hour
outage that took down many of its other services. Apple iCloud had a similar
outage in 2015, but it lasted seven hours. Unexpected outages like these can
bring your entire business to a grinding halt until they are fixed.
When a firm is unaware
of the risk posed by workers using cloud services, the employees could be
sharing just about anything without raising eyebrows. Insider threats have
become common in the modern market. For instance, if a salesman is about to
resign from one firm to join a competitor firm, they could upload customer contacts
to cloud storage services and access them later.
The example above is
only one of the more common insider threats today. Many more risks are involved
with exposing private data to public servers.
An IT system audit must
check the compliance of IT system vendors and data in the cloud servers. These
are the three crucial areas that need to be frequently audited by cloud service
customers:--
i. Security in the
cloud service facility,
ii. Access to the audit
trail, and
iii. the internal
control environment of the cloud service provider.
A cloud auditor is a
party that can perform an independent examination of cloud service controls
with the intent to express an opinion thereon. ... A cloud auditor can evaluate
the services provided by a cloud provider in terms of security controls,
privacy impact, performance, etc.
Cloud storage services
do not guarantee the integrity of the data that users store in the cloud. Thus,
public auditing is necessary, in which a third-party auditor (TPA) is delegated
to audit the integrity of the outsourced data. This system allows users to
enjoy on-demand cloud storage services without the burden of continually
auditing their data integrity.
However, certain TPAs might deviate from the
public auditing protocol and/or collude with the cloud servers. In this
article, we propose an identity-based public auditing (IBPA) scheme for cloud
storage systems. In IBPA, the nonces in a blockchain are employed to construct
unpredictable and easily verified challenge messages, thereby preventing the
forging of auditing results by malicious TPAs to deceive users.
Users need only
to verify the TPAs’ auditing results in batches to ensure the integrity of
their data that are stored in the cloud. A detailed security analysis shows
that IBPA can preserve data integrity against various attacks.
Escrow as a Service (or
EaaS) is a simple Cloud Resilience solution for managing the risks associated
with cloud-hosted software. It provides access to your unique application and
data when your software supplier is no longer around to support you.
An EaaS solution begins
with a contractual agreement between your organization and your software
supplier. After this is drawn up, your technology, data and associated
materials will be held and secured by NCC Group as a trusted, independent third
party.
Depending on the level
of assurance required by your organization, you can then choose between two
solutions.
An EaaS Access solution
gives you fast access to the live cloud environment where your supplier is
hosting your software if they can no longer support you.
Alternatively, EaaS
Replicate provides a separately hosted and mirrored instance of your unique cloud
environment stored in NCC Group’s secure cloud vault.
Distributed system is a
system whose components are located on different networked computers, which
communicate and coordinate their actions by passing messages to one another.
The components interact with one another in order to achieve a common goal.
The
goal of distributed computing is to make such a network work as a single
computer. Distributed systems offer many benefits over centralized systems,
including the following: Scalability. The system can easily be expanded by
adding more machines as needed..
Hadoop is a framework
which uses simple programming models to process large data sets across clusters
of computers. ... On the other hand, cloud computing is a model where
processing and storage resources can be accessed from any location via the
internet. Hadoop is an open source distributed processing framework that
manages data processing and storage for big data applications running in
clustered systems.
Hadoop is an open-source software framework for storing data
and running applications on clusters of commodity hardware. It provides massive
storage for any kind of data, enormous processing power and the ability to
handle virtually limitless concurrent tasks or jobs All the modules in Hadoop are
designed with a fundamental assumption that hardware failures are common
occurrences and should be automatically handled by the framework
Cloud computing
provides the ability to store and correlate relevant pieces of data, and update
at regular intervals based on new incoming data streams. Artificial
intelligence provides that nice cherry on top – now you have a place to store
data, what do you do with it?
Technology like knowledge catalogs and cognitive
search platforms would allow institutions and investors to define collections
from which they can create connections and search based on context rather than
just keywords. This is incredibly important as there are petabytes of data that
are processed and transmitted through the public internet on a daily basis.
The idea of a computer
is really just an abstract model for systems that store and manipulate data
according to a set of instructions called algorithms. The implementation of
this model can take many forms. We are used to thinking of it as the personal
computer on our desktop, but with the rise of mobile computing, the internet
and cloud computing this computing is becoming pervasive but also integrated
through these cloud platforms.
Cloud computing platforms have been a key
innovation over the past decade, although a relatively straightforward idea –
of centralizing computing resources within a datacenter and then delivering
them as a service over a network – the outcomes of doing this are though
extremely impactful.
The demand for computation resources does not scale
linearly with the size of the data but scales quadratically or cubically with
the size of the data and when you are talking about billions of data points
that causes problems and we need new computing platforms to mitigate that.
Throughout human
history, computing power was a scarce resource, and until the past few years,
high-end computer processing and storage offerings were out of the reach of all
except the largest of organizations and then at the cost of millions of
dollars.
However, with the advent of global scale cloud computing, high-end
computing is now available to organizations of almost all size at low cost and
on-demand. The arrays of billion-dollar scale data centers owned and operated
by Amazon, Google, and Microsoft, are now at the fingertips of many. Many of
the largest applications on the internet today run on cloud computing
infrastructure.
Take for example Airbnb, that now coordinates an average of
half a million people’s accommodation each night in 65,000 cities with their
platform running almost entirely on Amazon Web Services. Likewise, each month
Netflix delivers a dillion hours of video streaming globally by running on
Amazon cloud. Indeed Amazon’s AWS is so widely used that when it doesn’t work
right, the entire internet is in jeopardy.
A basic driver behind
many of the recent business disruptions in a wide range of industries is the
transformation of computing resources from a scarce to an abundant resource.
Combining cloud computing, with advances in algorithms and mobile computing we
get machine learning platforms that are able to coordinates and run ever large
and more complex service systems.
This allows an increasing swath of human
activity to be captured by algorithms, which allows it to be split apart,
transformed, altered, and recombined. These platforms bring about an ever
growing integration between technology and services.
As data and information
processing become more pervasive and computation becomes embed within virtually
all systems, traditional divides are going to become ever more blurred,
information technology and socio-economic organization will become ever more
integrated and inseparable. As the saying goes, every company will become a
technology company and this will fundamentally change the structure and nature
of those organizations.
What is happening today
is a convergence of these cloud computing platforms, new algorithms and the
rise of the services economy. Recent years have seen the emergence of physical
products that are digitally networked with other products and with information
systems to enable the creation of smart service systems which are coordinated
via algorithms.
What is happening as we move into the services economy is that
products become commoditized, people stop wanting to own things, what they want
is to be able to push a button on their smartphone and the thing delivered
as-a-service. An app for food services, an app for transport services, an app
for accommodation, etc. and of course all these services are delivered on
demand via cloud platforms that are coordinated via advanced algorithms.
Services are not like
products, whereas products were mass produced, services have to be
personalized; products were static once-off purchases, services are processes;
products were about things, services are about functionality and value.
Service
systems are all about the coordination of different components around the end
user’s specific needs, to do that you need lots of data, advanced analytics,
and cloud computing. We can already see the data-driven services organization
in the form of Uber, Alibaba or DiDi Chuxing, which don’t own anything they
just use data and advanced analytics within their platform to coordinate
resources toward delivering a service. Service companies like DiDi would be
impossible without data.
What will differentiate
one company from another is not how fancy their product is, but how seamless
and integrated their service system is and this is done through their capacity
to master data and analytics.
Organizations will become platforms and will
compete based on their intelligence, which will be contained in their
algorithms and people. In short, the physical technologies of the industrial
age are being converted into services and connected to cloud platforms wherein advanced
algorithms coordinate them.
Everything becomes data, your physical activity, traffic, purchases, and the
data gets moved to the cloud, but it gets processed and compared with other
devices, it is no longer just what you do but what everyone else also does,
which keeps making the system smarter and smarter.
This is the essence of the
process we are going through today; datafication converting everything into
data, cloud platforms for aggregating and running the machine learning for
processing it and iterating on that.
Through servitization and
dematerialization organizations become differentiated based on their data and
algorithms as algorithmic systems extend to coordinate more and more spheres of
human activity as we move further into the unknown world of the information
age.
Best free cloud storage
in 2019--
Google Drive.
pCloud.
Microsoft OneDrive.
Dropbox.
MediaFire.
Cloud Backup (e.g.
Backblaze Computer Backup and Carbonite)
These services should
typically work automatically in the background. The user does not usually need
to take any action like setting up and working out of specific folders like
with sync services (though some online services do differ and you may want to
make sure there are no gotchas, like common directories being excluded by
default).
Backup services typically back up new or changed data that is on your
computer to another location. Before the cloud became an available and popular
destination, that location was primarily a CD or an external hard drive, but as
cloud storage became more readily available and affordable, quickly it became
the most popular offsite storage medium.
Typically cloud backup services have
fixed pricing, and if there is a system crash or data loss, all backed up data
is available for restore. In addition, these services have version history and
rollback features in case there is data loss or accidental file deletion.
Cloud backup, also
known as online backup or remote backup, is a strategy for sending a copy of a
physical or virtual file or database to a secondary, off-site location for
preservation in case of equipment failure or catastrophe. The secondary server
and storage systems are usually hosted by a third-party service provider, who
charges the backup customer a fee based on storage space or capacity used, data
transmission bandwidth, number of users, number of servers or number of times
data is accessed.
Implementing cloud data
backup can help bolster an organization's data protection strategy without increasing
the workload of information technology (IT) staff. The labor-saving benefit may
be significant and enough of a consideration to offset some of the additional
costs associated with cloud backup, such as data transmission charges.
How cloud backup works
In an organization’s
data center, a backup application copies data and stores it on a different
media or another storage system for easy access in the event of a recovery
situation. While there are multiple options and approaches to off-site backup, cloud
backup serves as the off-site facility for many organizations. In an
enterprise, the company might own the off-site server if it hosts its own cloud
service, but the chargeback method would be similar if the company uses a
service provider to manage the cloud backup environment.
Basic steps of cloud
backup
While the amount of
steps may vary based on backup method or type, this is the basic process
involved with cloud backup, also known as online backup or remote backup.
There are a variety of
approaches to cloud backup, with available services that can easily fit into an
organization's existing data protection process. Varieties of cloud backup
include:
Backing up directly to
the public cloud. One way to store organizational resources is by duplicating
resources in the public cloud. This method entails writing data directly to
cloud providers, such as AWS or Microsoft Azure. The organization uses its own
backup software to create the data copy to send to the cloud storage service.
The cloud storage service then provides the destination and safekeeping for the
data, but it does not specifically provide a backup application. In this
scenario, it is important that the backup software is capable of interfacing
with the cloud's storage service. Additionally, with public cloud options, IT
professionals may need to look into supplemental data protection procedures.
Backing up to a service
provider. In this scenario, an organization writes data to a cloud service
provider that offers backup services in a managed data center. The backup
software that the company uses to send its data to the service may be provided
as part of the service, or the service may support specific
commercially-available backup applications.
Choosing a cloud-to-cloud
(C2C) backup. These services are among the newest offerings in the cloud backup
arena. They specialize in backing up data that already lives in the cloud,
either as data created using a software as a service (SaaS) application or as
data stored in a cloud backup service. As its name suggests, a cloud-to-cloud
backup service copies data from one cloud to another cloud. The cloud-to-cloud
backup service typically hosts the software that handles this process.
Using online cloud
backup systems. There are also hardware alternatives that facilitate backing up
data to a cloud backup service. These appliances are all-in-one backup machines
that include backup software and disk capacity along with the backup server.
The appliances are about as close to plug-and-play as backup gets, and most of
them also provide a seamless (or nearly so) link to one or more cloud backup
services or cloud providers.
The list of vendors that offer backup appliances
that include cloud interfaces is long, with Quantum, Unitrends, Arcserve,
Rubrik, Cohesity, Dell EMC, StorageCraft and Asigra active in this arena. These
appliances typically retain the most recent backup locally, in addition to
shipping it to the cloud backup provider, so that any required recoveries can
be made from the local backup copy, saving time and transmission costs.
When an organization
engages a cloud backup service, the first step is to complete a full backup of
the data that needs to be protected. This initial backup can sometimes take
days to finish uploading over a network as a result of the large volume of data
that is being transferred. In a 3-2-1 backup strategy, where an organization
has three copies of data on two different media, at least one copy of the
backed up data should be sent to an off-site backup facility so that it is
accessible even if on-site systems are unavailable.
Using a technique
called cloud seeding, a cloud backup vendor sends a storage device -- such as a
disk drive or tape cartridge -- to its new customer, which then backs up the
data locally onto the device and returns it to the provider. This process
removes the need to send the initial data over the network to the backup
provider.
If the amount of data
in the initial backup is substantial, the cloud backup service may provide a
full storage array for the seeding process. These arrays are typically small
network-attached storage (NAS) devices that can be shipped back and forth
relatively easily. After the initial seeding, only changed data is backed up
over the network.
Cloud backup services
are typically built around a client software application that runs on a
schedule determined by the purchased level of service and the customer's
requirements. For example, if the customer has contracted for daily backups,
the application collects, compresses, encrypts and transfers data to the cloud
service provider's servers every 24 hours.
To reduce the amount of bandwidth
consumed and the time it takes to transfer files, the service provider might
only provide incremental backups after the initial full backup.
Cloud backup services
often include the software and hardware necessary to protect an organization's
data, including applications for Exchange and SQL Server. Whether a customer
uses its own backup application or the software the cloud backup service
provides, the organization uses that same application to restore backed up
data. Restorations could be on a file-by-file basis, by volume or a full
restoration of the complete backup.
If the volume of data
to be restored is very large, the cloud backup service may ship the data on a
complete storage array that the customer can hook up to its servers to recover
its data. This is, in effect, a reverse seeding process. Restoring a large
amount of data over a network can take a long time.
A key feature of cloud
backup restorations is that they can be done anywhere from nearly any kind of
computer. For example, an organization could recover its data directly to a
disaster recovery site in a different location if its data center is
unavailable.
Types of backup
In addition to the
various approaches to cloud backup, there are also multiple backup methods to
consider. While cloud backup providers give customers the option to choose the
backup method that best fits their needs and applications, it is important to
understand the differences among the three main types.
Full backups copy the
entire data set every time a backup is initiated. As a result, they provide the
highest level of protection. However, most organizations cannot perform full
backups frequently because they can be time-consuming and take up too much
storage capacity.
Incremental backups
only back up the data that has been changed or updated since the last backup.
This method saves time and storage space, but can make it more difficult to
perform a complete restore. Incremental is a common form of cloud backup
because it tends to use fewer resources.
Differential backups
are similar to incremental backups because they only contain data that has been
altered. However, differential backups back up data that has changed since the
last full backup, rather than the last backup in general. This method solves
the problem of difficult restores that can arise with incremental backups.
Pros and cons
Before choosing cloud
backup as a backup strategy, it is important to weigh the potential pros and
cons that are associated with using a third-party to store data. The advantages
of cloud backup include:
Generally, it is
cheaper to back up data using a cloud backup service compared to building and
maintaining an in-house backup operation. The associated cloud backup costs
will rise as the volume of backup data rises, but the economies are likely to
continue to make cloud backup an attractive choice.
Some providers may offer
free cloud backup, but the amount of backup capacity is typically limited which
makes free backup appropriate for some home users and only the smallest of
companies.
The cloud is scalable,
so even as a company's data grows, it can still be easily backed up to a cloud
backup service. But organizations need to be wary of escalating costs as data
volume grows. By weeding out dormant data and sending it to an archive, a
company can better manage the amount of data it backs up to the cloud.
Managing cloud backups
is simpler because service providers take care of many of the management tasks
that are required with other forms of backup.
Backups are generally
more secure against ransomware attacks because they are performed outside of
the office network. Backup data is typically encrypted before it is transmitted
from the customer's site to the cloud backup service, and usually remains
encrypted on the service's storage systems.
Cloud backups help
lower the risk of common data backup failures caused by improper storage,
physical media damage or accidental overwrites.
A cloud backup service
can help to consolidate a company's backup data because the service can back up
main data center storage systems, remote office servers and storage devices,
and end-user devices such as laptops and tablets.
Backed up data is
accessible from anywhere.
Despite its many
benefits, there are some disadvantages and challenges to using a cloud backup
service, including:--
The backup speed
depends on bandwidth and latency. For example, when many organizations are
using the internet connection, the backup could be slower. This could be
bothersome when backing data up, but could be an even greater issue when it is
necessary to recover data from the service.
Costs can escalate when
backing up large amounts of data to the cloud.
As with any use of
cloud storage, data is moved outside of an organization's buildings and
equipment and into the control of an outside provider. Therefore, it is
incumbent to learn as much as possible about the cloud backup provider's
equipment, physical security procedures, data protection process and fiscal
viability.
Best practices
While strategies,
technologies and providers widely vary, there are several agreed upon best
practices when it comes to implementing cloud backup in the enterprise. In
general, a few guidelines are:
Understand all aspects
of the cloud backup provider service-level agreement (SLA) such as how data is
backed up and protected, where vendor offices are located and how costs
accumulate over time.
Do not rely on any one
method or storage medium for backup.
Test backup strategies
and data recovery checklists to ensure they are sufficient in the case of a
disaster.
Have administrators
routinely monitor cloud backups to make sure processes are successful and
uncorrupted.
Choose a data restore
destination that is easily accessible and does not overwrite existing data.
Make decisions about
specific data or files to back up based on the criticality of the information
to business operations.
Use metadata properly
to enable the quick location and restoration of specific files.
Consider using
encryption for data that must stay confidential.
Special considerations
When choosing a cloud
backup service provider, there are a few additional considerations to weigh.
Some companies have special needs related to data protection, but not all cloud
backup providers are able to meet those needs.
For example, if a company must
comply with a specific regulation such as HIPAA or GDPR, the cloud backup
service needs to be certified as compliant with data handling procedures as
defined by that regulation. While an outside firm provides the backup, the
customer is still responsible for the data, and could face serious consequences
-- including steep fines -- if the cloud backup provider does not maintain the
data appropriately.
Data archiving is
another special consideration when selecting a cloud backup service. Archiving
is different from routine data backup. Archived data is data that is not
currently needed but still needs to be retained. Ideally, that data should be
removed from the daily backup stream because it is likely unchanged and it
unnecessarily increases the volume of backup data transmissions.
Some cloud
backup providers offer archiving services to complement their backup products.
Archive data is generally stored on equipment geared to longer retentions and
infrequent access, such as tape or low-performing disk systems. That type of
storage is generally less expensive than storage used for active backups.
Cloud backup vs. cloud
DR
Cloud backup and cloud
disaster recovery are not the same, but they are connected. While cloud backup
services can be tapped to recover data and resume operations after a disruptive
event, it should be noted that they are not necessarily specifically oriented
to provide all the features and services that a true DRaaS offering would
provide.
For example, to use the
data that was saved to a cloud backup service to recover from a disaster, it
would have to include much more than just data files, such as operating
systems, application software, drivers and utilities. Users would have to set
up their backup routines to include those elements specifically, such as by
mirroring entire servers to the cloud backup service.
THIS POST IN NOW CONTINUED TO PART 10 , BELOW-
CAPT AJIT VADAKAYIL
..
SOME ONE ASKED ME FOR A BEER TIP.. SINCE I HAVE DRUNK BEER FOR 4 DECADES ALL AROUND THE PLANET
ReplyDeletehttp://ajitvadakayil.blogspot.com/2013/03/beer-moderate-drinking-for-good-health.html
BEER MUST NOT BE SIPPED
BEER MUST BE CHILLED AND IT MUST BE GULPED FROM A LARGE MUG-- BY TAKING AT LEAST TWO GULPS AT A TIME..
WHEN YOU DRINK STRAIGHT OFF A CAN OR BOTTLE GULPING WILL NOT HAPPEN
IT IS ALL ABOUT ACTIVATING TASTE BUDS ON YOUR TONGUE WHILE ALLOWING THE FLAVOUR OUT FROM THE NOSE..
A GOOD BEER IS BITTER -LIKE GERMAN BEER
AMERICAN BEER IS THE MOST USELESS BEER-- HORSE PISS I CALL IT
Among indian brands(KF,RC,BUD,TUBORG ETC) which is the best option/brand???
DeleteGerman beer (Heineken)?
Does it help gain weight? muscle wise
Deletehttps://twitter.com/ANI/status/1203253619493093376
ReplyDeleteTELL THIS STUPID CJI BOBDE THAT POLICE PREEMPTED "WE THE PEOPLE" FROM TAKING LAW INTO OUR OWN HANDS.
WHERE IS IT WRITTEN THAT POLICE / CRPF/ ARMY REQUIRES JUDICIAL SANCTION BEFORE KILLING TERRORISTS / SEPARATISTS/ TRAITORS/ EXTREME CRIMINALS WHO HAVE BEEN IDENTIFIED BY HIDDEN CAMS ?..
GUNS GIVEN TO THESE UNIFORMED MEN ARE FOR SHOW?..
POLICE / ARMY ARE NOT THE SLAVES OF THE JUDICIARY..THEY HAVE SWORN OATHS TO PROTECT THE WATAN AND GOOD CITIZENS ..
WE THE PEOPLE DO NOT TRUST " LAWYERS TURNED JUDGES" THE LOWEST SCUM BORN IN THIS WATAN AND THEIR USELESS "JUDICIAL LENS" WHICH CREATED THE NAXAL RED CORRIDOR IN INDIA AND ETHNICALLY CLEANSED KASHMIRI PANDITS..
EVERY UBER RICH LAWYER IN INDIA MUST BE INVESTIGATED FOR HIDDEN LINKS WITH CORRUPT JUDGES , WHO MYSTERIOUSLY SIT IN THE RULING BENCH.. MOST OF THESE CORRUPT JUDGES ARE IN FOREIGN PAYROLL-- INCLUDING PAKISTANI ISI PAYROLL..
IF PAKISTANI ISI WANTS TO FIX A CASE IN INDIA THEY USE A NGO, WHO WILL FILE PIL..
THIS PIL IS GIVEN TOP PRIORITY .
HOW WAS HOME MINISTER AMIT SHAH THROWN INTO JAIL FOR ISI PAYROLL TERRORIST SOHRABUDDIN?
OUR COLLEGIUM JUDICIARY BURNT MIDNIGHT OIL TO OPEN CHAMIYA BARS ( WH0RE HOUSES IN MUMBAI ) BY PIL ROUTE …..
BREAD WINNERS OF ENTIRE FAMILIES HAVE BEEN ROTTING IN JAIL WITHOUT A TRIAL FOR THREE DECADES .. .
ARE WE TO BELIEVE THAT A COUPLE OF DOZEN ATTRACTIVE YOUNG GIRLS WITH GOOD FIGURE CANT GET A DECENT JOB?
WE WANT IMMEDIATE POLICE AND JUDICIAL REFORMS..
WE DONT WANT A STUPID SYSTEM WHERE ONLY A JUDGE CAN ELIMINATE A TERRORIST OR CHILD RAPIST..
WHAT IS THE MEANING OF EXTRA-JUDICIAL KILLING?
AMIT SHAH , HOME MINISTER WAS PUT IN JAIL FOR DREADED ISI PAYROLL TERRORIST SOHRABUDDIN , WHO WAS SPONSORED BY NAC MEMBER TEESTA SETALVAD....
WE TRUST THE POLICE NOT THE JUDGES ..
A LOT OF COLLEGIUM JUDGES ARE IN DEEP STATE PAYROLL..….
WE THE PEOPLE DEMAND IMMEDIATE REFORMS IN JUDICIARY-- WHICH IS THE MOST ROTTEN ENTITY IN INDIA...
WHAT MAJESTY OF JUDICIARY IS CJI TALKING ABOUT..
BOTTOM DREGS OF THE SCHOOL CEREBRAL BARREL AND BOTTOM DREGS OF THE LAWYER POOL BECOME JUDGES..
THESE BRAIN DEAD JUDGES CANNOT EVEN APPLY BODMAS TO THE CONSTITUTION, WHILE A 12 YEAR OLD SCHOOL BY CAN ..
AND THESE JUDGES PLAY GOD.....
MODI ALLOWED LAW MINISTER PRASAD A NEW TERM AFTER 5 YEARS OF DOING NOTHING.. ALL PRASAD DID WAS TO BE SERVILE TO MODI....
CITIZENS HAVE RIGHT OF FREE SPEECH AGAINST JUDICIARY ....
READ ALL 12 PARTS OF THE POST BELOW ( ONLY 55% COMPLETE )
https://ajitvadakayil.blogspot.com/2017/07/police-reforms-in-india-much-more-with.html
read all 8 parts of the post below ( 60% complete )--
http://ajitvadakayil.blogspot.com/2019/01/justice-be-damned-enforce-law-not-any.html
capt ajit vadakayil
..
SEND ABOVE COMMENT TO--
DeletePMO
PM MODI
LAW MINISTER/ MINISTRY
AJIT DOVAL
RAW
IB
NIA
ED
CBI
AMIT SHAH
HOME MINISTRY
DEFENCE MINISTER/ MINISTRY
ALL 3 ARMED FORCE CHIEFS
CJI BOBDE
ATTORNEY GENERAL
ALL SUPREME COURT JUDGES
ALL STATE HIGH COURT CHIEF JUSTICES
ENTIRE INDIAN MAIN STREAM MEDIA EDITORS
SWAMY
RAJIV MALHOTRA
I&B MINISTER/ MINISTRY
NCERT
EDUCATION MINISTER/ MINISTRY
CMs OF ALL INDIAN STATES
DGPs OF ALL STATES
GOVERNORS OF ALL STATES
PRESIDENT OF INDIA
VP OF INDIA
SPEAKER LOK SABHA
SPEAKER RAJYA SABHA
DAVID FRAWLEY
STEPHEN KNAPP
WILLIAM DALRYMPLE
KONRAED ELST
FRANCOIS GAUTIER
PIYUSH GOEL
NITI AYOG
AMITABH KANT
THE QUINT
THE SCROLL
THE WIRE
THE PRINT
MK VENU
MADHU TREHAN
RAJDEEP SARDESAI
PAAGALIKA GHOSE
NAVIKA KUMAR
ANAND NARASIMHAN
SRINIVASAN JAIN
SONAL MEHROTRA KAPOOR
VIKRAM CHANDRA
NIDHI RAZDAN
FAYE DSOUZA
ZAKKA JACOB
RAVISH KUMAR
PRANNOY JAMES ROY
AROON PURIE
VINEET JAIN
RAGHAV BAHL
SEEMA CHISTI
DILEEP PADGOANKAR
VIR SANGHVI
KARAN THAPAR
PRITISH NANDI
SHEKHAR GUPTA
SIDHARTH VARADARAJAN
ARUN SHOURIE
N RAM
ALL MPs OF INDIA
WEBSITES OF DESH BHAKTS
SPREAD ON SOCIAL MEDIA EVERY WHICH WAY.
Delete
Capt. Ajit VadakayilDecember 7, 2019 at 5:55 PM
I ASK MY READERS
SHOW THE MIRROR TO THE JUDICIARY
IT IS NOW OR NEVER
Captain sir I have sent to websites.. And in Facebook.. But Facebook said 'ajit vadakayil blog' goes against our community standards.. I have taken a screenshot
DeleteBut I deleted ur links that u have mentioned.. And then the comment went through..
PRAYER BREAKFAST PARTY IS SPONSORED BY THE DEEP STATE AND THEIR AGENCIES LIKE FACEBOOK/ QUORA/ TWITTER
DeleteCorruption is rampant in judiciary.There is no specific mechanism to deal with misconduct of judges in higher judiciary.They can be dealt only by judges enquiry act,which is a very cumbersome process.In 2011 L.S passed judicial accountability bill to bring about accountability in judiciary.But due to the adjournment of house it was not introduced in the R.S and the bill got lapsed.This government should revive it and the judiciary should be made accountable to the people of the land.How long will they enjoy immunity?They have struck down NJAC citing it as unconstitutional. So these people are immune and they can't be touched?
Deletehttps://twitter.com/rakeshsivan/status/1203365006928011264
Deletehttps://twitter.com/rakeshsivan/status/1203365095729811456
Tweeted sir
DeleteRegistration Number : MINHA/E/2019/09274
DeleteYour Registration Number is : PMOPG/E/2019/0701321
HE WHOLE WORLD ACCEPTS THAT LAWYERS ARE THE MOST CORRUPT GROUP IN ANY NATION ON THE PLANET..
DeleteNOW WE GENERATE JUDGES OUT OF THIS CORRUPT GROUP..
THE RICHEST LAWYERS ARE THE ONES WHO ARE ABLE TO MANIPULATE AND FIX THE BENCH-- AND PRODUCE FAKE EVIDENCE AND PRODUCE FALSE EYE WITNESSES OUT OF THIN AIR..
TAAREQ PEH TAREEQ PEH PAREEQ SYSTEM EXISTS ONLY IN INDIA, WHERE LAWYERS PUT ON THE HOOKS ON THEIR CUSTOMERS AND BLEED THEM FOR 20 YEARS ..
JUDGES ARE EX-LAWYERS WHO MADE MONEY THIS WAY..
NOTHING WILL HAPPEN IN INDIA AS LONG AS THIS USELESS KAYATHA FELLOW RAVI SHANKAR PRASAD IS LAW MINISTER..
HE MOVES HIS BLACK BIHARI ASS ONLY TO GIVE EGO MASSAGE TO MODI ON TV, WITH DILATED NOSTRILS..
Guruji,FB is not allowing mesaages to be passed to the Deshbhakht organizations
Deletehttps://twitter.com/shree1082002/status/1203613662839107585
DeleteAll comments with your name on my facebook page have been barred from publishing citing the reason as the comments go against community standards.
DeleteDear Guruji,
ReplyDeleteToday is my younger daughter's birthday. Her name is Eshita.
Please bless her.
Nand Gavali
GODSPEED
Delete657685
Your Registration Number is : PMOPG/E/2019/0701013
ReplyDeleteREF: TELL THIS STUPID CJI BOBDE THAT POLICE PREEMPTED "WE THE PEOPLE" FROM TAKING LAW INTO OUR OWN HANDS ....
THERE ARE STORIES FLOATING AROUND THAT PRIYANKA REDDY WAS RAPPED AND MURDERED BECAUSE SHE DID A STING OPERATION AGAINST ABATTOIR ISLAMIC MAFIA OWNED BY A POWERFUL POLITICIAN..
ReplyDeleteMUST BE INVESTIGATED
capt ajit vadakayil
..
PUT ABOVE COMMNENT IN WEBSITES OF--
AJIT DOVAL
RAW
IN
NIA
ED
CBI
AMIT SHAH
HOME MINISTER
PMO
PM MODI
GOVERNOR TELENGANA
CM TELENGANA
DGP TELENGANA
HGH COURT CHIEF JUSTICE TELENGANA
If the stories floating around are true, then what Telangana police did was just the destruction of all available evidences. Must be investigated.
DeleteHi Captain
DeleteThis article says slaughterhouse needs certificate from a veterinary doctor on every animal they slaughter.
https://www.change.org/p/narendra-modi-al-kabeer-and-allana-abbatoir-in-hyderabad-break-several-rules-ban-cattle-slaughter
https://twitter.com/rakeshsivan/status/1203361163020398593
DeleteDone
DeleteDear captain,
DeleteIf the above is true...then the encounter was made to save the islamic mafia...?
Without telangana cm approval encounter can be initiated...?
Many times you used to say " deadman tells no tales"
Confused..��
Andhra and Telangana are known for murder politics. That is the reason why communist Jihadi Evangelist mafias are having a field day in both states even after 72 years of independence. Late YSR Reddy was the man who had nakedly promoted the goonda raj. He along with Janardhan Reddy were responsible for the communal riots in old Hyderabad city during 1980s. The purpose was to remove Channa Raddy from CMs chair. The truck load of goondas imported from other places did the job for the mafia dons.
DeleteBefore 1947, both Razakars and communists were against Indian independence. The communists openly aligned with the Razakars in Hyderabad. It was said in Warangal and Nalgonda that "the Razakars rule by day and the Communists at night". After the Operation Polo, the communists quickly adapted to the reality, became turncoats and fought against Razakars.
On 6 June 1993, six deaths happened in the controversial Sai Baba's ashram, Prashanthi Nilayam, at Puttaparthi. Four devotees, aged between 25 and 40 years, all resident in the ashram and long-time devotees of Sai Baba, were shot down by the police in cold blood. The four assailants were locked in room and afterwards shot dead. Justifying the police action, Janakiram, Sai Baba's brother, told the news media : "If we allowed them (the assailants) to live, some Ram Jethmalani-like lawyer would have come and rescued them."
https://www.indiatoday.in/magazine/special-report/story/19930715-sai-baba-assassination-attempt-by-disciples-remains-mystery-811306-1993-07-15
http://exposedsaibaba.blogspot.com/2009/05/cold-blooded-murder.html
http://ajitvadakayil.blogspot.com/2013/04/razakers-of-mim-operation-polo-to-annex.html
DeleteOWAISI MUST FIND OUT WHY SEVERAL POWERFUL WHITE JEWS ATTENDED HIS FATHERs FUNERAL..
Thank You very much Ajit Sir for posting this.
DeleteAjit Sir, Everyone of us (Indians and People around the world) are forever indebted to You for letting us know True happenings of critical situations.
Thank You
UNDERTRIALS ARE KEPT IN JAIL FOR TEN TO 20 YEARS.. DELIBERATELY..
DeleteTHERE IS A NEXUS BETWEEN POLITICIANS/ JUDICIARY/ POLICE..
MANY TOP COPS OF DGP/ IG RANK HAVE GOT PROMOTED BY ARRESTING INNOCENT PEOPLE AND KEEPING THEM IN JAIL WITHOUT TRIAL..
http://ajitvadakayil.blogspot.com/2014/09/undertrial-prisoners-in-indian-remand.html
http://ajitvadakayil.blogspot.com/2014/09/undertrial-prisoners-in-indian-remand.html
DeleteTHE LINK ABOVE WAS SENT TO RAVI SHANKAR PRASAD MORE THAN 40 TIMES.. HE HAS MOVED HIS BLACK BIHARI ASS ONLY NOW..
https://www.ndtv.com/india-news/release-undertrials-completing-half-their-sentence-law-minister-ravi-shankar-prasads-appeal-to-high--2144113
WE THE PEOPLE SPIT ON OUR ILLEGAL COLLEGIUM JUDICIARY
arrested on suspicion
incarcerated for sins not committed
victim of moral absence
apathetic robot, heartless mannequin.
the judge would not look at him
he the bane of human existence
he the liability to society
while rich lawbreakers run rampant
no hearts bleed for poor men
medals secured , promotions wrangled
no money for bail or lawyer
ephemeral expulsion excommunicates
disowned by loved ones for a bond surety
heart dragged through a cactus field of memories
hope breathes the final sigh.
callousness arrive in torrential flood.
dumped into a feral world of bleeding hearts
every moment , a minute past eternity
endless nights pass, will there ever be a dawn?
life churned on by iron gears
mind wrenched in morbid pain
heart bruised by callousness
love, once fluid, now brittle and dry
regard for human life spirals down the drain
frightened into dark corners
fear of more degradation awaiting
vision blurred, speech slurred
too numb to feel anything
our rulers indifferent to this blight
this unknown world, rotting in its grave
in pestilence of saturation.
daily effort to ebulliate in remand,
threats to torch an empty body
truth must lie buried
more promotions for uniformed men
society’s unadorned ignorance
can we deliver him from the chains?
Pranaam CaptainSri,
DeleteBranding Hederabad police as hero is too early. Stage managed encounter is not a healthy practice. Rape and murder accused were in police custody since 5 days, were they really capable of snatching guns from police and trained/expert enough to operate the same against the police.
If i am having gun in my hand ...even strong men like captain cannot snatch it from me. But the photos of dead accused holding pistals in hand and lying dead seems fake than real. I have seen encountered terrorist's bodies who had pistals but after getting shot it was never in hand grip as shown in dead accused's hands in hyderabad case.
The way police takes suspects into custody...
the way they are stage managing in this case...
the way police beats the suspects and many times makes them to confess for the crime which they never did, gives clear picture to the arrested suspects that they have to die.....both ways...whether they accept it or not.
Shooting the suspects at the time of initial chase & arrest still gives clue that a normal innocent person will not runaway if police goes to arrest him, but only suspect will try to runaway.
But after taking into custody if police stage manages this type of encounter.....it proves that
police is napunshak....how come a suspect who is in police custody for 5 days can snatch arms from the police man...if the suspects can snatch arms from policemen....it is enough to prove that the policeman was a chakka. Remember Police does not treat the arrested suspects like Daamaad.
How come all 4 snatched or tried to snatch the arms at the same time... all succeeded and tried to runaway...got shot by police and all 4 dead. were they better trained than police ?
How come police say that the suspects snatched guns and tried to run away...run away is still possible...but snathing gun and running away. were the suspects expert in arms handling which police carried that day. 99% untrained people cannot operate even a loaded gun if it is in safety position.
Were the guns loaded ? How come accused came to know whether the gun is loaded or not ?
Unloaded gun is of no immediate use even if someone snatches it away..
Encounter means MUTHBHED...
How can some accused in police custody do Muthbhed...
I never expected such comment, praising police, from a learned man as Captain.
Killing of gulty is welcome but how come we be so sure that they were the real culprits who did the crime.?
Mailed
ReplyDeleteconnect@mygov.nic.in
AP and Telangana Governor • tsapgovernor@gmail.com
info.nia@gov.in
information@cbi.gov.in
ed-del-rev@nic.in
contact@amitshah.co.in
jscpg-mha@nic.in
cm@telangana.gov.in
cp@cyb.tspolice.gov.in
dgp@tspolice.gov.in
reg.gen-tshc@aij.gov.in ----> registrar of high court
PMOPG/E/2019/0701148
MINHA/E/2019/09270
https://timesofindia.indiatimes.com/business/india-business/government-working-on-more-measures-to-boost-economy-nirmala-sitharaman/articleshow/72413134.cms
ReplyDeleteABOLISH INCOME TAX...
GO FOR BTT ...
GET RID OF THE PARASITE WORM IN BHARATMATAs GUT ..
http://ajitvadakayil.blogspot.com/2014/11/abolish-income-tax-in-india-have.html
capt ajit vadakayil
..
PUT ABOVE COMMENT IN WEBSITES OF--
PMO
PM MODI
NIRMALA SITARAMAN
FINANCE MINISTRY
RBI
RBI GOVERNOR
NITI AYOG
AMITABH KANT
Mailed to-
Deletefmo@nic.in
mphamirpur@gmail.com
shaktikanta.das@nic.in
contact@amitshah.co.in
governor@rbi.org.in
mosfinance@nic.in
appointment.fm@gov.in
amitabh.kant@nic.in
vch-niti@nic.in
jsrev@nic.in
jsinv-dea@nic.in
wim-dfs@nic.in
ambuj.sharma38@nic.in
https://twitter.com/rakeshsivan/status/1203360073960935424
DeleteRegistration Number : DORVU/E/2019/02872
Deletehttps://twitter.com/kkarthikeyan09/status/1203518884805873665
DeleteThis message to the following email was blcoked, "Message blocked"
Deleteshaktikanta.das@nic.in
governor@rbi.org.in
fmo@nic.in
mphamirpur@gmail.com
mosfinance@nic.in
appointment.fm@gov.in
contact@amitshah.co.in
I do not care to "See technical details below for more information"
But why have your emails available to the public if you are not going to be interested in correspondence?
Charishma whenever I copy email addresses from you or debdoot.. They all turn red and Gmail says they are invalid.. Should I type them one by one..
Delete@chadhag
DeleteI guess you are pasting the whole mail ids in bulk.after pasting them separate each mailid by coma.
https://twitter.com/shree1082002/status/1203622535427788800
Delete@chadhag yes, you got to copy paste the id's one by one or it gets all messed up
DeleteDear Captain
ReplyDeleteComment on judiciary - PMOPG/E/2019/0701149
Facebook blocking comment on judiciary and link http://ajitvadakayil.blogspot.com/2019/12/what-artificial-intelligence-cannot-do_94.html
Ravi
KL
ILLEGAL COLLEGIUM JUDICIARY WAS CREATED BY THE JEWISH DEEP STATE..
DeleteDear Captain
DeleteComment on judiciary without links gets through Facebook.
Cheers
Ravi
KL
Hi Ravi,
DeleteTry pasting only - ajitvadakayil.blogspot.com/2019/12/what-artificial-intelligence-cannot-do_94.html
dont paste http://
Thanks, Mohit.
DeleteThis is fb post in group by African
ReplyDeleteAkachukwu Postmodernism ▶ Great Philosophical Problems
EUROPEANS ARE THE CAUSE OF AFRICANS PERENNIAL PROBLEMS 😈👿😈👿👿👿
The concept of HEAVEN and HELL, which are false idea, are the reason why Africans are not making any contribution to world civilization!!!
Before the arrival of the Europeans in African land, Africans have technological knowledge that was passed down orally from generation to generation!!!
The Europeans Epistemicided the Africans by killing so many of them ,and brainwashing them through the Missionaries (religious people) who declared the Africans way of worship, which is the true divine worship to be "Demonic, Diabolical, Evil ,and barbaric. Thus, replaced it with their God, Heaven, and mendacious concept of Hell fire...!!!
From then till now, Africans have been with such debilitating, and enervating mind set ,which make the Africans instead to build industries, they keep on building churches, and mosque that can take about one thousand worshipers
I REPLIED-
Africans have technological knowledge that was passed down orally from generation to generation?? . This line seems to be copied from ajit vadakayil blog Hinduism. Where it has been said already Hindus 'vedas' were orally transmitted before penning down 5000 years ago. And same Hindus had no heaven or hell. THEY HAVE 7 ASTRAL LAYER BY SOUL FREQUENCY. The 7th is brahman. Once got there you are free from birth and death cycle. Google ajit vadakayil Hinduism. Please do not wait for replyOr make comment.
captain, facebook is preventing us from posting your links
ReplyDeleteCOMPLAIN TO I&B MINISTER/ MINISTRY WITH COPY TO LAW MIINISTER/ MINISTERY, PM MODI/ PMO
DeletePLACE IT ON RECORD THAT FACEBOOK IS STONE WALLING COMMS WHICH INVOLVES PROTECTING PBARATMATA AGAINST DESH DROHIS FROM ABROAD AND WITHIN .. ASK FOR ACK..
Grievance Status for registration number : MINHA/E/2018/04511
ReplyDeleteGrievance Concerns To
Name Of Complainant
Vikramaditya
Date of Receipt
29/07/2018
Received By Ministry/Department
Home Affairs
Grievance Description
SINCE PAST SEVERAL YEARS I HAVE COMMENTED IN NEWS PAPERS ON THE MOTHER OF ALL SCAMS THE THORIUM SCAM IN TAMIL NADU CONDUCTED BY THE MANNARGUDI MAFIA.
WHEN MGR WAS BREAN DEAD HE WAS KEPT AS A PUPPET CM FOR NEARLY A YEAR ( APOLLO ) DURING WHICH TIME THE ENTIRE COASTAL BELT OF TAMIL NADU WAS CONVERTED TO CHRISTIANITY ALONG WITH LTTE NY DESH DROHI FOREIGN FORCES
THE MINING OF PRICELESS THORIUM WENT ON AT NIGHT WITH THE ACTIVE CONNIVANCE OF FISHERMEN, LTTE, MANNARGUDI MAFIA ,POLICE, JUDGES , POLITICIANS ETC
http://ajitvadakayil.blogspot.in/2010/03/gold-finger-ajit-vadakayil.html
THE SETHUSAMUDRAM CANAL PROJECT WAS CONCEIVED AND ABETTED BY DESH DROHIS-- THE MOOT POINT WAS THORIUM
http://ajitvadakayil.blogspot.in/2012/07/scrap-sethusamudram-project-now-capt.html
THERE ARE SEVERAL SHELL COMPANIES FLOATED BY MANNARGUDI MAFIA JUST FOR THRORUIM SAND MINING ( PART OF MONAZITE SAND )
this comment is taken from ajit vadakayil.blogspot.
The greatest and most clandestine smuggling has been going on since decades and no media or govt official has put it in public notice.
We ask why a precious resource like monazite which can be fuel for generations to come is being whisked away to foreign shores. Why is the nation bled like this by all and sundry. We need the centre to intervene in a strong manner.
Jai bharat matha.
Current Status
Under process
Date of Action
02/08/2018
Officer Concerns To
Officer Name
S C L DAS
Officer Designation
Joint Secretary
Contact Address
NORTH BLOCK New Delhi
Email Address
Contact Number
23092548
Reminder(s) / Clarification(s)
Reminder Date
Remarks
27/08/2018
Why is this grievance not being acknowledged and forwarded to higher ups.. This scam is happening in plain sight and centre is mum on this. We want action .
16/10/2018
Why us this crucial issue being ignored and brushed under the carpet. We need an acknowledgement of this ongoing theft which has grave consequences on fortunes of our nation.
22/02/2019
The lack of acknowledgement and apathy to act over this grievance of critical importance conveys the administrations apathy in taking the matters most crucial for nation to task.
21/08/2019
Could the concerned ministry give clarification regarding the illegal mining of sands across the shores .. we are losing precious resource for the future .
17/09/2019
IT LOOKS LIKE CENTRE IS BEREFT OF ANY RESPONSIBILITY TOWARDS MAFIASO GOVTS IN STATES. THIS GRIEVANCE HAS BEEN LYING HERE WITH SO MANY REMINDERS. WE DEMAND ACTION.
Guruji,
Look at the reminders sent and this is the oldest grievance lying without any action or acknowledgement. SLC DAS babu will sit on it like a brooding hen...
Hello Sir,
ReplyDeletelook at this manipulative article, how they have twisted the facts and tryingto sneek A1 milk back into popularity.
https://indianexpress.com/article/india/unnecessary-controversy-decoding-the-truth-and-myths-about-a1-and-a2-milk-types-5143163/lite/
This is the height of deception. Slowly but steadily they want to get back in.
People have started knowing the difference between A1 and A2. So either this or they try to make people vegan where u don't consume honey or any milk product.
IMAGINE THAT DESH DROHI NASTARD MS SWAMINATHAN WAS IN NAC..
Deletehttps://en.wikipedia.org/wiki/Panguna_mine in the region where indian soldiers were cannibalized ...... now aussies are complaining about china investing in the region
ReplyDeletehttps://www.change.org/p/narendra-modi-al-kabeer-and-allana-abbatoir-in-hyderabad-break-several-rules-ban-cattle-slaughter
ReplyDeleteTHERE ARE RUMBLINGS THAT THE VETERINARY DOCTOR PRIYANKA REDDY WAS MURDERED , RAPED AND BURNT ALIVE FOR A STING OPERATION SHE MADE ON THE ABATTOIR OF A POWERFUL MUSLIM POLICTICIAN.
WE THE PEOPLE WANT AN INQUIRY...
DEAD MEN TELL NO TALES..
HALAL CERTIFICATE --IS NOT A RELIGIOUS THINGY-- IT IS TO KEEP THE MEAT BUSINESS IN THE HANDS OF MUSLIMS..
INDIA IS THE LARGEST EXPORTER OF BEEF.. THE WHOLE WORLD WANTS THE MEAT OF HUMPED INDIAN COWS, WHICH DO NOT HAVE DISEASES..
HUMPLESS WESTERN COW MEAT IS LADEN WITH BRAIN DISEASE PRIONS.
http://ajitvadakayil.blogspot.com/2013/12/shocking-legacy-of-mad-cow-disease-capt.html
capt ajit vadakayil
..
PUT ABOVE COMMNENT IN WEBSITES OF--
AJIT DOVAL
RAW
IB
NIA
ED
CBI
AMIT SHAH
HOME MINISTER
PMO
PM MODI
GOVERNOR TELENGANA
CM TELENGANA
DGP TELENGANA
HIGH COURT CHIEF JUSTICE TELENGANA
LAW MINISTER/ MINISTRY
CJI BOBDE
ATTORNEY GENERAL
ALL SUPREME COURT JUDGES
ALL STATE HIGH COURT CHIEF JUSTICES
ENTIRE INDIAN MAIN STREAM MEDIA EDITORS
SWAMY
RAJIV MALHOTRA
I&B MINISTER/ MINISTRY
CMs OF ALL INDIAN STATES
DGPs OF ALL STATES
GOVERNORS OF ALL STATES
PRESIDENT OF INDIA
VP OF INDIA
SPEAKER LOK SABHA
SPEAKER RAJYA SABHA
DAVID FRAWLEY
STEPHEN KNAPP
WILLIAM DALRYMPLE
KONRAED ELST
FRANCOIS GAUTIER
PIYUSH GOEL
NITI AYOG
AMITABH KANT
THE QUINT
THE SCROLL
THE WIRE
THE PRINT
MK VENU
MADHU TREHAN
RAJDEEP SARDESAI
PAAGALIKA GHOSE
NAVIKA KUMAR
ANAND NARASIMHAN
SRINIVASAN JAIN
SONAL MEHROTRA KAPOOR
VIKRAM CHANDRA
NIDHI RAZDAN
FAYE DSOUZA
ZAKKA JACOB
RAVISH KUMAR
PRANNOY JAMES ROY
AROON PURIE
VINEET JAIN
RAGHAV BAHL
SEEMA CHISTI
DILEEP PADGOANKAR
VIR SANGHVI
KARAN THAPAR
PRITISH NANDI
SHEKHAR GUPTA
SIDHARTH VARADARAJAN
ARUN SHOURIE
N RAM
ALL MPs OF INDIA
WEBSITES OF DESH BHAKTS
SPREAD ON SOCIAL MEDIA EVERY WHICH WAY.
Your Registration Number is : PMOPG/E/2019/0701359
Deletemaximum business seems to be done by muslims in mumbai if u go from masjid bandar to lohar chaal with their green flags flying around.
u name the product and their wholesale is there. All the intellectual products like chemicals n stuff seem to be taken by parsis kind of people.
all the cryptos seem to be controlling rest of the market. The hindu just seems to be the menial labour there.
when u talk to the wholesalers they are super arrogant, i guess crypto thingy.
https://twitter.com/rakeshsivan/status/1203486375535792130
Deletehttps://twitter.com/rakeshsivan/status/1203486500991553536
https://twitter.com/kkarthikeyan09/status/1203527820841906177
DeleteSent emails to Telangana authorities, courts, DGPs and central Ministries.
DeleteWho owns Al Kabeer? They are strong there.
DeleteThere were rumours circulating about vets working full time in their abattoirs toeing the company line or else.....
every time we use this ajitvadakayil's link in twitter...they ask for our mobile numbers.
Deletehttps://www.youtube.com/watch?v=7m2AumufJfw A Conversation with Anand Giridharadas around 54 mins he talks about his experience at mckinsey india as a consultant
ReplyDeleteNumber of rape incidents per 100,000 citizens in different countries. Figures do not take into account rape incidents that go unreported to the police.
ReplyDeleteCSV
JSON
Country
Rate
Population 2019
South Africa 132.4 58,558,270
Botswana 92.9 2,303,697
Lesotho 82.7 2,125,268
Bermuda 67.3 62,506
Sweden 63.5 10,036,379
Suriname 45.2 581,372
Costa Rica 36.7 5,047,561
Nicaragua 31.6 6,545,502
Grenada 30.6 112,003
Saint Kitts And Nevis 28.6 52,823
Australia 28.6 25,203,198
Belgium 27.9 11,539,328
United States 27.3 329,064,917
Bolivia 26.1 11,513,100
New Zealand 25.8 4,783,063
Zimbabwe 25.6 14,645,468
Saint Vincent And The Grenadines 25.6 110,589
Barbados 24.9 287,025
Iceland 24.7 339,031
Jamaica 24.4 2,948,279
Peru 23.5 32,510,453
Norway 19.2 5,378,857
Trinidad And Tobago 18.5 1,394,973
Israel 17.6 8,519,377
France 16.2 65,129,728
Guyana 15.5 782,766
Finland 15.2 5,532,156
South Korea 13.5 51,225,308
Chile 13.3 18,952,038
Mexico 13.2 127,575,529
Mongolia 12.4 3,225,167
Luxembourg 11.9 615,729
Solomon Islands 11 669,823
El Salvador 11 6,453,553
Ecuador 10.9 17,373,662
Ireland 10.7 4,882,495
Austria 10.4 8,955,102
Moldova 10.3 4,043,263
Bangladesh 9.82 163,046,161
Uruguay 9.8 3,461,734
Germany 9.4 83,517,045
Netherlands 9.2 17,097,130
Argentina 8.5 44,780,677
Kazakhstan 8.4 18,551,427
Brunei 7.6 433,285
Italy 7.6 60,550,075
Sri Lanka 7.3 21,323,733
Colombia 6.8 50,339,443
Belize 6.7 390,353
Thailand 6.7 69,625,582
Oman 6.6 4,974,986
Denmark 6.4 5,771,876
Philippines 6.3 108,116,615
Lithuania 6.3 2,759,627
Paraguay 6 7,044,636
Estonia 6 1,325,648
Kyrgyzstan 5.9 6,415,850
Monaco 5.7 38,964
Senegal 5.6 16,296,364
Morocco 4.8 36,471,769
Romania 4.7 19,364,557
Malta 4.7 440,372
Bahrain 4.6 1,641,172
Czech Republic 4.6 10,689,209
Kuwait 4.5 4,207,083
Poland 4.1 37,887,768
Portugal 4 10,226,187
Mauritius 3.9 1,269,668
Latvia 3.5 1,906,743
Spain 3.4 46,736,776
Russia 3.4 145,872,256
Croatia 3.2 4,130,304
Slovenia 3.1 2,078,654
Maldives 3 530,953
Palestine 3 4,981,420
Sudan 2.9 42,813,238
Guatemala 2.9 17,581,472
Bulgaria 2.8 7,000,119
Singapore 2.7 5,804,337
Slovakia 2.6 5,457,013
Hungary 2.5 9,684,679
Cyprus 2.5 1,198,575
Cameroon 2.4 25,876,380
Algeria 2.4 43,053,054
Belarus 2.3 9,452,411
Uganda 2.1 44,269,594
Kenya 2.1 52,573,973
Jordan 2 10,101,694
Greece 1.9 10,473,455
Georgia 1.9 3,996,765
Qatar 1.8 2,832,067
Montenegro 1.8 627,987
India 1.8 1,366,417,754
Canada 1.7 37,411,047
Hong Kong 1.6 7,436,154
Turkey 1.5 83,429,615
United Arab Emirates 1.5 9,770,529
Ukraine 1.4 43,993,638
Sierra Leone 1.4 7,813,215
Bosnia And Herzegovina 1.2 3,301,000
Andorra 1.2 77,142
Japan 1 126,860,301
Guinea 1 12,771,246
Yemen 0.8 29,161,922
Syria 0.8 17,070,135
Nepal 0.8 28,608,710
Albania 0.7 2,880,917
Serbia 0.7 8,772,235
Turkmenistan 0.6 5,942,089
Tajikistan 0.5 9,321,018
Lebanon 0.5 6,855,713
Armenia 0.4 2,957,731
Mozambique 0.2 30,366,036
Azerbaijan 0.2 10,047,718
Egypt 0.1 100,388,073
Liechtenstein 0 38,019
Rape Statistics By Country by Population 2019
Source:
Crime > Rape rate: Countries Compared
Crime > Rape rate: Countries Compared
Sources
© 2019 World Population Review Privacy PolicyTermsContactAbout
http://worldpopulationreview.com/countries/rape-statistics-by-country/
DO NOT TRUST THIS JEWISH SURVEY..
DeleteINDIA HS THE LEAST AMOUNT OF RAPES/ SEXUAL MOLESTATIONS / DIVORCES/ LOSS OF VIRGINITY BEFORE MARRIAGE ON THE PLANET BY PERCENTAGE -- REPEAT-- PERCENTAGE..WE HAVE 1320 MILLION PEOPLE..
I HAVE SAILED FOR 40 YEARS AND SEEN THE BACK YARDS OF THIS PLANET..
WHY IS TWITTER ( JACK DORSEY )/ FACEBOOK/ ( MARK ZUCKERBERG )/ QUORA ( ADAM D ANGELO )/ YOUTUBE ( GOOGLE ) BLOCKING THE NAME VADAKAYIL???.. AND THAT TOO FOR ADVISING BHARATMATA ???.
IT IS EXTREME RACISM..
THE WHITE MAN HAS BURIED CERTAIN CRITICAL TRUTHS.. HE WILL NOT ALLOW A BROWN BLOGGER TO EXHUME IT.. TILL I WROTE NOBODY KNEW THAT A GERMAN JEW ROTHSCHILD RULED INDIA..
http://ajitvadakayil.blogspot.com/2019/07/how-gandhi-converted-opium-to-indigo-in.html
NSA AJIT DOVAL IS SUPPOSED TO PROTECT BHARATMATA..
INSTEAD WHAT DOES HE DO? HE PROTECTS THE JEWISH DEEP STATE.. ARE MODI/ JAVEDEKAR/ PRASAD ETC REALLY DESH BHAKTS ?
I HAVE SEEN EXTREME RACISM..
IN 1977 MY SHIP WENT TO CAPETOWN .. WE WERE THERE FOR A MONTH.. I WAS SECOND MATE..
SINCE WE WERE THE LARGEST SHIP TO EVER ENTER CAPETOWN ( WITH 3 LAKH TONNES OF OIL ) WE CAME IN THE NEWSPAPERS DAILY.. THOSE WERE THE DAYS OF APARTHEID..
I HAVE SEEN LARGE BOARDS DECLARING A BRIDGE ONLY FOR WHITES.. A BEACH ONLY FOR WHITES ..ETC..
CAPTAIN WENT TO A WHITE RESTAURANT AND GOT KICKED OUT.. A BLACK WAITER WEARING WHITE GLOVES CAME TO HIM AND TOLD " SIR, BLACKS ARE NOT ALLOWED HERE "..
THEN MY SHIP WENT AGAIN TO SOUTH AFRICA--THIS TIME I WAS CAPTAIN ON A AHRENKEIL LINER SERVICE .. THE WHITES WERE STILL RULING..
THERE WERE 7 SHIPS UNDER WHITE CAPTAINS AND CREW.. MY SHIP PERFORMED THE BEST.. NEVER HAD ANY HEAVY WEATHER DAMAGE.. WE TRANSPORTED NISSAN CARS IN WOODEN CRATES FROM JAPAN TO DURBAN..
I USED TO TAUNT THE WHITE RACIST BASTARDS.. AND THEY COULD DO NOTHING ABOUT IT.. THE COMPANY WAS CLASSY.. THEY WERE JET SET PARTY AND SPLURGED MONEY.
WHEN A LETTER CAME ON A COMPANY LETTERHEAD--IT WAS RACIST.. AT THE BOTTOM THEY WOULD PROUDLY DECLARE THE NAMES OF DIRECTORS DUTCH/ GERMAN/ BRITISH ETC.. SO I RECIPROCATED BY PROUDLY DEECLARING MY OWN NAME , FROM ANCIENT LAND OF INDIA..
AHRENKEIL USED TO THROW LAVISH PARTIES WHERE ONLY I AND MY CHIEF ENGINEER WERE BLACK SKINNED..
THEN I WENT AGAIN ON SAME SHIP , AFTER BLACKS TOOK OVER POWER..
ALL OLD WHITES OF THE COMPANY HAD DISAPPEARED EXCEPT FOR A FEW.. THEY WERE REPLACED BY INDIANS ..
ONE OF THE WHITE BOSSES CAME ON BOARD TO SEE ME .. HE HAD MY OLD LETTER IN HIS POCKET, WHERE I HAD DECLARED THAT I AM FROM THE ANCIENT LAND OF INDIA.. IN THAT LETTER I HAD WARNED " SHUN CKD WOODEN CRATES.. EMBRACE CONTAINERS.. OR YOUR COMPANY WILL COME DOWN"..
THE WHITE DIRECTOR ( POLISH JEW ) CRIED.. CAPTAIN, YOU ARE THE ONLY MAN WITH VISION WHO HAS SERVED AHRENKEIL.. THE COMPANY HAS INDEED COME DOWN.. WE ARE NOW SCRIMPING AND SCROUNGING..OUR WAGES HAVE COME DOWN BY 70% EVERYBODY HAS OVERTAKEN US LEAVING US FAR BEHIND..
THIS IS WHAT HAPPENS TO WHITE RACISTS..
TODAY WHITE RACISTS LIKE MARK ZUCKERBERG ( WHO STOLE AN INDIAN DIVYA NAREDRAs INTELLECTUAL RIGHTS ) AND VERY WORRIED. IN 14 YEARS INDIA WILL BE THIS PLANET NO 1 SUPERPOWER..
AND THEY HAVE JEWISH DEEP STATE DARLINGS LIKE AJIT DOVAL / MODI/ PRASAD/ JAVEDEKAR --DOING EVERYTHING TO THROW GLASS PIECES AND BLEEDING BHARATMATAs LEGS..
IF I COULD HAVE BLOGGED BEFORE ON INTERNET-- RAJIV GANDHI WOULD NEVER HAVE BEEN MURDERED BY LTTE PRABHAKARAN WHO USED TO HAVE SECRET MEETINGS WITH DOUG COE OF THE "PRAYER BREAKFAST FAMILY"..
https://ajitvadakayil.blogspot.com/2019/12/national-prayer-breakfast-where-jesus.html
capt ajit vadakayil
..
PUT ABOVE COMMNENT IN WEBSITES OF--
DeleteAJIT DOVAL
RAW
IB
NIA
ED
CBI
AMIT SHAH
HOME MINISTER
PMO
PM MODI
LAW MINISTER/ MINISTRY
CJI BOBDE
ATTORNEY GENERAL
ALL SUPREME COURT JUDGES
ALL STATE HIGH COURT CHIEF JUSTICES
ENTIRE INDIAN MAIN STREAM MEDIA EDITORS
SWAMY
RAJIV MALHOTRA
I&B MINISTER/ MINISTRY
CMs OF ALL INDIAN STATES
DGPs OF ALL STATES
GOVERNORS OF ALL STATES
PRESIDENT OF INDIA
VP OF INDIA
SPEAKER LOK SABHA
SPEAKER RAJYA SABHA
DAVID FRAWLEY
STEPHEN KNAPP
WILLIAM DALRYMPLE
KONRAED ELST
FRANCOIS GAUTIER
JACK DORSEY
MARK ZUCKERBERG
THAMBI SUNDAR PICHAI
CEO OF WIKIPEDIA
QUORA CEO ANGELO D ADAMS
QUORA MODERATION TEAM
KURT OF QUORA
GAUTAM SHEWAKRAMANI
PIYUSH GOEL
NITI AYOG
AMITABH KANT
THE QUINT
THE SCROLL
THE WIRE
THE PRINT
MK VENU
MADHU TREHAN
RAJDEEP SARDESAI
PAAGALIKA GHOSE
NAVIKA KUMAR
ANAND NARASIMHAN
SRINIVASAN JAIN
SONAL MEHROTRA KAPOOR
VIKRAM CHANDRA
NIDHI RAZDAN
FAYE DSOUZA
ZAKKA JACOB
RAVISH KUMAR
PRANNOY JAMES ROY
AROON PURIE
VINEET JAIN
RAGHAV BAHL
SEEMA CHISTI
DILEEP PADGOANKAR
VIR SANGHVI
KARAN THAPAR
PRITISH NANDI
SHEKHAR GUPTA
SIDHARTH VARADARAJAN
ARUN SHOURIE
N RAM
ALL MPs OF INDIA
WEBSITES OF DESH BHAKTS
SPREAD ON SOCIAL MEDIA EVERY WHICH WAY.
70% OF JAPENESE SCHOOL GIRLS IN UNIFORM GET RAPED IN BUSES AND TRAINS.. AND JAPAN HAS LESSER RAPES THAN INDIA..
DeleteAPPIDIYAAAAA ?
https://en.wikipedia.org/wiki/Burusera
I HAD A JAPANESE BOSS --A YOUNG GORGEOUS WOMAN OF 28, WHO SPOKE EXCELLENT ENGLISH..
SHE LOVED TO COME ON MY SHIP .. ALL ON THE SHIP THOUGHT THAT I WAS FUCKING HER..
SHE TOLD ME THAT WHILE ON THE TRAIN TO HER SCHOOL, SHE LOST HER PANTIES ALMOST EVERY SINGLE DAY.. DIFFERENT MEN ..
SHE TOLD ME SHE WOULD NEVER MARRY..THAT WAS HOW MUCH SHE HATED THE MALE GENDER..
Some people, eg. Sonia Gandhi and not for this instance, have automated reply messages stating "..the recipient email account has been deactivated blah blah". Then it should be updated on the online portal. Otherwise it is misleading to the general public.
DeleteSir, Sent emails..
DeleteOYO says its ok to bunk classes and book a room.
ReplyDeleteMovie date| Raho Mast with OYO
https://www.youtube.com/watch?v=ERBijva0fI4
book OYO to play X zero and private space for couples to fight. Who are they fooling ?
after right to privacy laws all this has become rampant.
Welcome To Our Couple-Friendly OYOs | OYO Rooms | OYO
https://www.youtube.com/watch?v=gNVflR9nP2Y
https://timesofindia.indiatimes.com/india/we-will-bury-her-shes-already-burnt-says-unnao-girls-father/articleshow/72421163.cms
ReplyDeleteHER SKULL HAS NOT BURST..
HER SOUL WILL BE TRAPPED ON EARTH-- UNHAPPY AND MISERABLE FOREVER..
http://ajitvadakayil.blogspot.com/2012/11/rip-impossible-with-burial-world-is.html
God has his own way of punishment.
DeleteSeeing is believing.
No one can escape Bad Karma even if he/she has whole world's sympathy with him/her.
Those who want to live let them fight and those who do not want to fight in this world of eternal struggle do not deserve to live. Life doesn't forgive weakness.
ReplyDeleteRahul Gandhi says India is Rape Capital of the World. But the TRUTH is that his original motherland Europa is now the Rape Capital of the World. The real Rape of Europa has started by rapefugees from Africa and Arabia. Civil War has already started in many parts of Europe between Muslims and Christians.
ReplyDeleteA LARGE PERCENTAGE OF ITALIAN WHORES ARE MEN IN WOMENs DRESS..
DeleteONCE IN I WAS ASHORE WITH A COUPLE OF MY FRIENDS -- AS A JUNIOR OFFICER
WE SAW A ATTRACTIVE WHORE..
ONE IN OUR GROUP TRIED TO PRESS HER TITS WHICH WAS TOO LARGE..
IN A GRUFFF FUCKIN' VOICE SHE ( HE ) SHOUTED " NOOOOOOOOOO !"
BELIEVE ME-- WE ALL NEARLY SHAT IN OUR PANTS..
AMIGO
ANTONIO
BAMBINO
COLCOTRONI
BAMBINO
SPAGHETTI
WHENEVER I WRITE THIS IN TIMES OF INDIA COMMENTS COLUMN --THEY SPAM IT..
PROBABLY THEY THINK THAT COLCOTRONI IS A NICK NAME FOR A PURULENT ITALIAN ASSHOLE
TEE HEEEEEEEE
ReplyDeletenami December 8, 2019 at 9:41 AM
There seems to be immense job satisfaction in betraying ones motherland .
Their employer generously promotes the future generations as long as they are cut from the same cloth.
Jobs scholarships positions of power and influence and a membership of that exclusive club of power brokers is a given.
No worries about government increasing reservation etc etc ...
But ones conscience must agree or be brain washed into believing it's for the better . There is loyalty amongst thieves. Apna ich aadmi hai.....
ReplyDelete
Replies
Capt. Ajit Vadakayil December 8, 2019 at 9:58 AM
95% OF PEOPLE IN RAW/ IB/ BIA/ ED/ CBI/ COLLEGIUM JUDICIARY/ THINK TANKS/ BABUS OF VARIOUS CRITICAL MINISTRIES/ IIT PROFESSORS/ SOCIAL SCIENCE PROFESSORS/ ECONOMICS PROFESSORS OF ELITE BUSINESS SCHOOLS NEED TO BE SACKED FOR INCOMPETENCE..
OUT OF THE 95% , A LOT OF THEM ARE IN FOREIGN PAYROLL .. FOR A FEW PIECES OF SILVER THESE TRAITORS BLEED BHARATMATA..
WHY DOES IT TAKE A BLOGGER TO EXPOSE THE " PRAYER BREAKFAST" MAFIA WHO WERE INSTRUMENTAL IN CREATING NAC AND CVB ?
AN ITALIAN MAINO JEWESS WAITRESS BECAME EMPRESS VIA NAC !
https://ajitvadakayil.blogspot.com/2019/12/national-prayer-breakfast-where-jesus.html
MODI ALLOWED THE FOREIGN FRENCH CONTINGENT TO LEAD OUR REPUBLIC DAY PARADE.. YOU SEE HE WAS HELL BENT TO MOTHBALL INDIAs COAL WITH THE JEWISH FRENCH PRESIDENT AND ALSO BUY USELESS JEWISH RAFALE JET FIGHTERS
WE KNOW THE FOREIGN PAYROLL OFFICERS OF INDIAN AIRFORCE WHO PRAISED RAFALE TO THE SKIES
CHINA IS SECRETLY BUYING SU 57 RUSSIAN JET FIGHTERS.. JUST 4 OF THESE SUPER PLANES WITH BATTLE MANAGEMENT SYSTEM CAN KILL ALL 36 RAFALE PLANES..
AND SUBRAMANIAN SWAMY WHO WORE A MOSSAD SPONSORED SIKH TURBAN IN 1976 WANTS INDIA TO BUT JEWISH DASSAULT WHO PRODUCES THESE USELESS RAFALE JET FIGHTERS..
https://twitter.com/swamy39/status/1171250468166619136
WHEN RAJIV GANDHI WAS MURDERED THERE WAS A CALL THE VERY NEXT MINUTE FROM CHANDRASWAMI AT SINDHURI HOTEL CHENNAI AND A TAMIL BRAHMIN POLITICIAN..
MOSSAD DARLING SWAMY EVEN WANTED INDIA TO CANCEL THE S400 RUSSIAN MISSILES.. S400 HAS 100% STRIKE RATE.. THE BEST NATO ANTI-MISSILE SYSTEMS HAVE ZERO PERCENTAGE STRIKE RATE AGAINST INCOMING HYPER SONIC MISSILES
https://twitter.com/swamy39/status/1124814793762717697?lang=en
https://twitter.com/Swamy39/status/1126701367119060993
DASSAULT WAS SINKING WITH ORDERS ONLY FROM CRYPTO JEW RULERS OF EGYPT AND QATAR ( FOR MASSIVE KICKBACKS ). MODI SAVED RAFALE..
https://timesofindia.indiatimes.com/india/rafales-must-fly-in-with-meteor-air-to-air-missiles-india-tells-france/articleshow/72375495.cms
CAPT AJIT VADAKAYIL WILL NOT ALLOW SWAMY TO BE INDIAs FINANCE MINISTER.. I WILL WRITE THIS TAMILIAN FELLOWs LEGACY..
capt ajit vadakayil
..
Saw, the movie Frozen 2 based on the concept of Water holds memory raised by Olaf the snowman. The first thing that came to my mind was you. .Slowly it will come to mainstream with some white jew getting all the credit. .
ReplyDeleteThe character in frozen is named after a porn star Elsa Jean who has worked in over more than 130 adult movies. Even, the cartoon is derived based on the looks of Elsa Jean. My daughter(8 years old) wanted to watch the Frozen II movie on her birthday. But, I denied.
DeleteYes. Disney movies which are meant to children are filled with indirect sexual symbols.
DeleteYou can see this compilation in youtube.
TRUTH fears no investigation. But today in this modern world of Internet truth fears investigation. Anybody telling the TRUTH is a conspiracy theorist or worst a Liar.
ReplyDeletehttps://www.youtube.com/watch?v=S6r1wpMzZzU
ReplyDeleteASK KHANUM ARFA SHERANI IF SHE KNOWS SIR SYED AHMAD KHAN WAS A JEW..
https://twitter.com/khanumarfa/status/1202965656372686848?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Etweet
AMU WAS STARTED BY JEW ROTHSCHILD IN 1875 USING HIS AGENT AND BUSINESS PARTNER ( GHAZIPUR OPIUM ) CRYPTO JEW SIR SYED AHMAD KHAN.. .
ROTHSCHILDs CARETAKER OF OPIUM FACTORY IN GHAZIPUR WAS SIR SYED AHMAD KHANs FATHER CRYPTO JEW MIR SAYYID MUHAMMAD MUTTAQI, WHO WAS IN THE INNER COURT OF EMPEROR AKBAR SHAH II ( THE PENILTIMATE MUGHAL EMPEROR ) AS HIS PERSONAL ADVISOR . ..
ROTHSCHILD DID PROPAGANDA THAT HE IS A SAYYID AND CREATED A FAKE LINEAGE ( 36th ) TO MOHAMMAD THE PROPHET..
SIR SYED AHMAD KHAN WAS USED EXACTLY LIKE PIR ALI MULSIM RAJA RAM MOHAN ROY—ANOTHER OPIUM AGENT AND BUSINESS PARTNER OF JEW ROTHSCHILD OF THE OPIUM FACTORY AT RANGPUR..
ONE WAS A JEW PRETENDING TO BE MUSLIM, THE OTHER WAS A MUSLIM PRETENDING TO BE HINDU..
ROTHSCHILD PLANTED HIS CRYPTO JEW FOREFATHER IN MOGHUL COURTS, FROM THE TIME OF HUMAYAUN..
JEW ROTHSCHILD ASKED JEW SIR SYED AHMAD KHAN TO START MADRASSAS IN INDIA . .. ALL WERE FUNDED BY JEW ROTHCHILD. ..
EVEN TODAY MADRASSAS IN INDIA/ PAKISTAN/ BANGLADESH GET JEWISH WAHABI/ SALAFI FUNDS FROM CRYPTO JEW AL SAUD ROYAL DYNASTY INSTALLED BY ROTHSCHILD
ROTHSCHILD SELECTED CRYPTO JEW MIRZA GHULAM AHMAD AS A MESSIAH OF ISLAM AFTER MOHAMMAD-LIKE HOW PROTESTANTS WERE WEDGED AWAY FROM CATHOLIC CHRISTIANITY BY JEWS .. ……
THE AHMADIYYA SECT WERE ALL CRYPTO JEWS INITIALLY…… JEW ROTHSCHILD GOT CRYPTO JEW SIR SYED AHMED KHAN TO PRAISE GHULAM AHMED GHADI GHADI …..
YOU CANT GET A PASSPORT OF ID IN PAKISTAN UNLESS YOU DENIGRATE GHULAM AHMAD AS AN IMPOSTOR AND HIS AHMADIYYA FOLLOWERS AS NON-MUSLIMS…..
AHMADIYYAS BELIEVE JESUS CHRIST ( WHO NEVER EXISTED AND WAS COOKED UP AT THE FIRST COUNCIL OF NICE IN 325 AD BY THE ROMAN EMPEROR ) WAS THE TRUE JEWISH MESSIAH…
SIR SYED AHMAD KHAN WAS A CRYPTO JEW PRETENDING TO BE A MUSLIM. ……. HE WAS ROTHSCHILD’S BUSINESS PARTNER AND WAS THE FOUNDER OF THE ALIGARH MUSLIM UNIVERSITY. …
JEW ROTHSCHILD USED THIS MAN SIR SYED AHMAD KHAN AS A COLLEGIUM JUDGE AND DURING THE INDIAN REBELLION OF 1857, HE WAS 100% LOYAL TO THE WHITE INVADER. …..
SIR SYED AHMAD KHAN HUNG ALL DESH BHAKT INDIANS-INCLUDING HUNDREDS OF MUSLIMS …… JEW ROTHSCHILD USED JEW SYED AHMAD KHAN, JEW JINNAH AND JEW IQBAL ( POET ) TO PROPOUND THE TWO NATION THEORY…….
JEW ROTHSCHILD ASKED JEW SIR SYED AHMAD KHAN TO START MADRASSAS IN INDIA . ……. ALL WERE FUNDED BY JEW ROTHCHILD. …..
SIR SYED AHMAD KHAN WAS NOMINATED TO THE VICEROY'S LEGISLATIVE COUNCIL BY ROTHSCHILD……..
SIR SYED AHMAD KHAN IS BURIED INSIDE ALIGARH UNIVERSITY CAMPUS—A ROTHSCHILD FIAT !.......
ALIGARH UNIVERSITY WAS USED LIKE JNU…….. AU PRODUCED CRYPTO JEW MUSLIM LEADERS……. THE FIRST TWO PRIME MINISTERS OF PAKISTAN, LIAQUAT ALI KHAN AND KHAWAJA NAZIMUDDIN WERE BOTH CRYPTO JEWS FROM AU . …..
CRYPTO JEW SIR SYED AHMAD KHAN OPENLY WROTE THAT MUSLIMS MUST LOYALLY SERVE THE BRITISH EMPIRE, WHICH SHOCKED ALL MUSLIMS IN INDIA… JEW ROTHSCHILD USED SIR SYED AHMAD KHAN TO PROPAGATE URDU TO DIVIDE MUSLIMS…
AS PER ROTHSCHILD HISTORIANS CRYPTO JEW AIR SYED AHMAD KHAN , CRYPTO JEW MOHAMMAD ALI JINNAH,CRYPTO JEW ALLAMA IQBAL ( POET ) AND CRYPTO JEW MOHAMMAD ALI JAUHAR ARE RESPONSIBLE FOR WEDGING AWAY PAKISTAN…
PAKISTANIS CALL SIR SYED PAAJI AS ONE OF THEIR FOUNDING FATHERS… MOST OF THE MALWA OPIUM WAS PROCESSED IN GHAZIPUR OPIUM DEN..
THE FIRST MADRASSA AND MOSQUE WAS STARTED BY SIR SYED FOR MUSLIM WORKETS IN GHAZIPUR OPIUM FACTORY..
POOR KHANUM BABY ! USKO KUCHCH NAHIN PATHA !
capt ajit vadakayil
..
PUT ABOVE COMMENT IN WEBSITES OF--
DeleteKHANUM ARFA SHERWANI
RANA AYYUB
SHEHLA RASHID
ILTIJAMUFTI
IRFAN HABIB
AYESHA KIDWAI
ROMILA THAPAR
SHOBHAA DE
ARUNDHATI ROY
BARKHA DUTTA
AMIT SHAH
HOME MINISTRY
NCERT EDUCATION MINISTER/ MINISTRY
AJIT DOVAL
RAW
CBI
IB
NIA
ED
PMO
PM MODI
Comment Sent To
Deletearfakhanum@gmail.com
shehla.shora@gmail.com
Ayesha Kidwai • ayesha.kidwai@gmail.com
Romila Thapar • romilathapar@gmail.com
Shobhaa De • de.shobhaa@gmail.com
barkha Dutt • barkha.dutt@gmail.com
contact@amitshah.co.in
jscpg-mha@nic.in
pd.ncert@nic.in
secy.ncert@nic.in
minister.hrd@gov.in
info.nia@gov.in
information@cbi.gov.in
ed-del-rev@nic.in
connect@mygov.nic.in
PMOPG/E/2019/0701592
MINHA/E/2019/09279
DOSEL/E/2019/05294
DSEHE/E/2019/07614
7 December Attack on Pearl Harbour by Japanese provoked by President Roosevelt. Millions of Americans died for Stalin and the Murderous Communist Regime. At Yalta Conference in 1945 Eastern Europe, China and North Korea was gifted to Stalin by Roosevelt and Churchill. The Second World War was the worst war in Human History. 80 million people died in this atrocious war. The Court Historians call it a Good War. Yes it was a good war for the Jews who already declared war on Germany in 1933. They also made lot of money in the War by selling weapons to both sides. THE BAD WAR.
ReplyDeleteTHEY DID NOT HANG THE JAP EMPEROR--WHY?
Deletehttp://ajitvadakayil.blogspot.com/2012/10/the-lie-of-pearl-harbour-revealed-capt.html
https://en.wikipedia.org/wiki/Unda_(film)
ReplyDeleteI SAW MALAYALAM MOVIE UNDA ON NETFLIX-- IT HAS SUBTITLES..
THE RED CORRIDOR WAS CREATED BY THE COLLEGIUM JUDICIARY OF INDIA -- TRAITORS IN FOREIGN PAYROLL.
NATIONAL PRAYER BREAKFAST PARTY WAS INVOLVED IN THIS
https://ajitvadakayil.blogspot.com/2019/12/national-prayer-breakfast-where-jesus.html
20% OF INDIA IS RULED BY NAXALS..
http://ajitvadakayil.blogspot.com/2012/09/bauxite-mining-naxalite-menace-joshua.html
ReplyDeletenami December 8, 2019 at 10:39 AM
I have often wondered ,if you could turn the time back like that jelly fish keeping your experience intact, would you join the same profession all over again?
Would you do something else?
ReplyDelete
Replies
Capt. Ajit Vadakayil December 8, 2019 at 12:56 PM
AS AN INDIVIDUAL I LEFT THE SEA A BETTER AND SAFER PLACE..
I KEPT MY HEAD ON THE CHOPPING BLOCK - DARING POWERS THAT BE TO CHOP IT OFF.
I MARVEL TODAY-- HOW IS IT THAT AFTER 30 YEARS IN COMMAND OF SHIPS -KICKING THE COLLECTIVE BALLS OF MY SHORE BOSSES, I AM STILL IN ONE PIECE..
Meenakshi Lekhi using your words in Parliament.. After translating to hindi.
Delete"Police ko hatiyar sajane ke liye nahi mile hai"
You wrote " Guns given to policmen are for show ? "
All are feeding off your intellect
Respected Sir,
DeleteI believe you are in one piece because of Ma'm s prayers!!
Thank you
Respected Sir,
DeleteI believe you are in one piece because of Ma'm s prayers!!
Thank you
Captain, a different question:
ReplyDeleteWhat do newborns dream about?
NEW BORN BABIES NEED REM SLEEP..
DeleteTHE DOWNLOAD INFORMATION FROM AAKASHA..
A BABY DEPRIVED OF REM SLEEP GROWS UP TO BE DUFFER..
Ego less souls do that
DeleteWHEN EVER DOUGLAS COE CAME TO INDIA HE COMPULSORILY MET REV. M.A. THOMAS A CHRISTIAN MALAYALI FROM KERALA.. BOTH THESE KINGPINS FOUNDED THE VIGIL INDIA MOVEMENT
ReplyDeleteVIGIL INDIA MOVEMENT GIVES A HUMAN RIGHTS AWARD EVERY YEAR – WHICH INCLUDES TEESTA SETALVAD, HARDH MANDER, SWAMI AGNIVESH ETC..
WE KNOW WHO HARSH MANDAR IS , WHOM THE ITALIAN WAITRESS USED FOR HER NAC TO SCREW HINDUS..
WE KNOW WHY HARDH MANDAR IS SUCH A DARLING OF DESH DROHI FOREIGN FORCES.
https://ajitvadakayil.blogspot.com/2019/12/national-prayer-breakfast-where-jesus.html
WE WATCH !
Capt ajit vadakayil
..
PUT ABOVE COMMENT IN WEBSITES OF-
HARDH MANDAR
TEESTA SETALVAD
SWAMI AGNIVESH
RAVI NAIR ( PUCL )
AMIT SHAH
HOME MINISTRY
AJIT DOVAL
RAW
CBI
IB
NIA
ED
PMO
PM MODI
https://twitter.com/rakeshsivan/status/1203623349835857922
DeleteMailed
Deletecentreforequitystudies@gmail.com----> Harsh Mander
teestateesta@gmail.com
agnivesh70@gmail.com
ravinairsahrdc@gmail.com
contact@amitshah.co.in
jscpg-mha@nic.in
info.nia@gov.in
information@cbi.gov.in
ed-del-rev@nic.in
connect@mygov.nic.in
---------------------
PMOPG/E/2019/0701989
MINHA/E/2019/09285
DM on FB -https://www.facebook.com/teestasetalvad/
Deletesent email to-
centreforequitystudies@gmail.com
agnivesh70@gmail.com
information@cbi.gov.in
contact@amitshah.co.in
narendramodi1234@gmail.com
info.nia@gov.in
connect@mygov.nic.in
Have sent to pmo and shared on twitter
DeleteSent to email shared by mr. Hegde.
NOWADAYS I WATCH RAJEEV MASAND DISHING OUT HIS CORNY MOVIE REVIEWS IN HIS SQUEAKY VOICE..
ReplyDeleteIT MAKES MY DAY..
YOU MUST LISTEN TO DIMWITS WHO HAVE THE GIFT OF GAB.. I LOVE LISTENING TO DEREK O BRIEN TOO.
MIND YOU-- THIS JOKER RAJEEV MASAND IS TOUTED AS INDIAs BEST MOVIE CRITIC..
https://ajitvadakayil.blogspot.com/2019/10/joker-movie-2019-ban-this-sick-movie-in.html
THIS SHAMELESS FELLOW ( ?? ) WAS ON THE STAGE OF AIB ROAST. OUR ANAL SEX RECEIVING BOLLYWOOD DIRECTOR SPONSORS HIM..
SQUEAK SQUEAK..
capt ajit vadakayil
..
PUT THIS COMMENT IN WEBSITES OF-
RAJEEV MASAND
CNN NEWS
Captainji - your review of Interstellar was one of the funniest things I had ever read - you kept mocking this squeaky voiced weirdo.
Deletehttps://twitter.com/rakeshsivan/status/1203621849629806603
Deletehello@rajeevmasand.com
DeleteComments@cnn.com
Sent to -
Deletehttps://www.facebook.com/rajeevmasandthemovieguy/
hello@rajeevmasand.com
mailings@mail.cnn.com,
cnn.feedback@cnn.com,
community@cnn.com
Sent to both of them.
DeleteAll high level members of secret societies. Strong cultures are the enemy of the Zionists hence Germans and Japanese. They have tried multiple times to destroy India and China and are definitely making inroads via media, judiciary etc.
ReplyDeletePlease expose this Suhel Seth character. He is trying to claw his way back into mainstream media. He has started tweeting again. His good friend Jaitley is no more but he is well connected and has clout. Just look what his younger brother is up to.
ReplyDeletehttps://twitter.com/swapanseth/status/1203498556021043202?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Etweet
These guys got their start from Jew advertising mogul Martin Sorrell. I don't trust how they look or their last name SETH. They claim to be Punjabis from Kolkata.
I have a personal experience with Suhel Seth. I was the coolest bartender of the discotheq in Noida. There is one smart female business TV news anchor ( i now know she too is Jewsish with brown eyes and brown hair, she is beautiful though ).
DeleteShe used to come with Suhel. She would keep on dancing to techno music right in front of me, while Suhel would be sitting a little far away. This girl ( she is still active on TV, specialising in interviewing top shots outdoors ).
She would never buy a drink. She would be constantly calling me out by my name and asking for free beer, loudly for everyone to hear. I could give out free drinks and usually gave to not too rich types. In the girls case i felt that it would show me as weak in spirit.
Usually the manager stepped in asked me to give her what she wanted. I felt she wanted interaction with me.
Suhel in the mean time would be giving me non stop mean looks. I always ignored it as besides being busy there were many other things of interest ( elites of delhi, designers ,models , tv and even bollywood ).
These incidents happened around 7 to 8 times on differenrt ocassions.
The last time when it happened, after the girl exited the club, Suhel walked to the exit , turned around and stared at me.
The staredown went of for nearly a minute. I dont get in to statedowns usually but whwn i do i dont look down. He finally moved on. This happened around 15 years ago.
At that time you were not blogging and i was not at all aware of Crypto Jews existence and their characteristcs.
Delhi elite circle is really jewish deep state i now realise.
How queer indeed!
DeleteThe reasons to expose Suhel Seth is because he is a known predator and molestor. I have met two women, both educated and working professionals - Suhel forced himself onto one. She stayed silent because of the social pressures and back then he was quite powerful and there was no social media. The other lady was 'hit' on by his married younger brother. If only to prevent these incidents should this man be put away.
DeleteI think Captain mentioned Khan market is jew area.
DeleteCaptain, For your interest https://www.youtube.com/watch?v=1w0_kazbb_U
ReplyDeleteROB-
DeleteI MUST NOW EXHUME ROYAL RAYMOND RIFE, A GENIUS BURIED BY JEWISH EVIL PHARMA
capt ajit vadakayil
..
Captain, Watched El Chapo Netflix serial as recommended by you. Chapo's life is an example for extreme dedication to become a boss and to prove his drunken father wrong. His laser focus, commitment, dedication to achieve his desire in more than humane. His determination to rise form the ashes when he got arrested is too inspiring. It is no less inspiration for a poor child to become an IAS with this kind of burning desire. In the process, he bribed several officials but not even once he smoked or cheated any one which shows his character. Thank you for recommending.
ReplyDeletePS: Chiddu after release from Tihar on bail, repeated the same dialogue that he became stronger than ever (Chapo said the same thing when he come out of padded room after 4 months).
@Paadi You got it all wrong.
DeleteEl Chapo is not Pablo Eschobar (Captain has compared the two in a previous blog). Chapo killed a father in front of his children. He did not feel any guilt or remorse.
The burning desire should be directed to serve the country, not oneself.
@VS, Thanks for the comment. My comment is with reference to raw human spirit he possess. Circumstances drive ones life and there by builds his character. Has he born in India, he sure will become a good politician bu he born in drug cartel environment.
DeleteIf you study his character, he reacts to a situation and at times is very bad. He is a family man, no one should copy his business model but his spirit towards a goal. One should not emulate him if one cannot sees his spirit but not his empire. I just finished S02 and not seen Narcos yet.
Captain and readers, Comments against Prasad are being censored. look at this inept minster that he wanted to write letters when whole country is asking for Judicial reforms.
ReplyDeletehttps://timesofindia.indiatimes.com/india/rape-pocso-case-probes-should-be-completed-in-2-months-prasad-to-write-to-cms-cjs/articleshow/72427423.cms
The Healing Power Of Sound Baths
ReplyDeletehttps://www.shondaland.com/live/body/a29995794/the-healing-power-of-sound-baths/
https://www.google.com/amp/s/www.news18.com/amp/news/movies/filmmaker-srijit-mukherji-marries-bangladeshi-actress-mithila-2415171.html
ReplyDeleteP.Chidambaram is breaking coconut to Kaal bhairavar temple.
ReplyDeleteI think jail time has became a leveller to him.
https://twitter.com/rvaidya2000/status/1203690577860022273?s=19
Dear Captain
ReplyDeleteFYI, Heartbeat Recognition - is this also be part of Artificial Intelligence series of yours
Thanks
https://www.engadget.com/2019/06/27/the-pentagon-has-a-laser-that-identifies-people-by-their-heartbe/
dear captain, with reference to this video titled 'Shattering cancer with resonant frequencies: Anthony Holland at TEDxSkidmoreCollege', the composer mentioned frequency variations can destroy cancerous cells selectively. i remember you used the same word 'selectively killing cancerous cells' while describing benefits of urine from our desi cow breeds with hump on back. is there any connection here.. one being a sound vibration and the other a liquid, while both benefits the purpose ?
ReplyDeletehttps://timesofindia.indiatimes.com/india/over-7000-exit-btech-in-iit-in-last-5-years-lose-coveted-tag/articleshow/72431217.cms
ReplyDeleteINDIAN IITs ARE PACKED WITH USELESS PROFESSORS..
IIT CHURNS OUT KOTA TYPE "CRAM AND VOMIT" STUDENTS EVERY YEAR WHO ARE UNFIT TO BE EMPLOYED .
IIT MTECHS ARE A DISGRACE TO INDIA.. THESE STUDENTS ARE FIT ONLY TO BE SALESMEN AND DRIVE AUTO RICKSHAWS.. MIND YOU THESE BANDHA BUDDHIS ( UNABLE TO GET A JOB ) TAKE TUITIONS FOR STUDENTS WANTING TO WRITE IIT ENTRANCE EXAMS..
MY SON WHO DID HIS COMPUTER SCIENCE MASTERS IN CORNELL, RECRUITS FOR HIS COMPANY.. HE SAYS INDIAN STUDENTS WHO PASS OUT OF NORMAL COLLEGES IS BETTER THAT ELITE IIT PRODUCTS WHO JUST CANT THINK CLEARLY..
capt ajit vadakayil
..
WHAT IS ALL THIS HOOO HAAA ABOUT SALMAN KHAN SHOOTING A DEER?..
ReplyDeleteWELL THIS DEER HAS ROTHSCHILD BLESSINGS .. GERMAN JEW ROTHSCHILD RULED INDIA NOT THE QUEEN OR BRITISH PARLIAMENT.. ROTHSCHILD GREW OPIUM IN INDIA AND SOLD IT IN CHINA..
THE BISHNOI NEW BORN BABIES COULD NOT DRINK MOTHERs MILK FOR A FULL MONTH.. THE CRUCIAL BREAST MILK WENT TO THESE DEERS WHO SUCKED OFF THE TIT .. BISHNOI GANGS WERE IN THE OPIUM DRUG RETAIL BUSINESS ..
http://ajitvadakayil.blogspot.com/2018/04/salman-khan-chinkara-poaching-jail-term.html
SO WHAT IS THIS TAREEQ PEH TAREEQ PEH TAREEQ , BECAUSE OF WHICH WE THE PEOPLE OF INDIA SPIT ON THE FACES OF OUR ILLEGAL COLLEGIUM JUDICIARY??
SALMAN KHAN ALLEGEDLY SHOT A DEER IN 1998.. 21 YEARS PAST AND THE CASE IS MILKED BY LAWYERS WHO REPRESENT HIM.. EVERY THREE MONTHS SALMAN KHAN HAS TO PAY A FULL DAY APPEARANCE FEE TO HIS LAWYER FOR GETTING THE NEXT DATE OF HEARING ..
ASK SALMAN KHAN HOW MANY CRORES HAS BEEN MILKED OFF HIM..
OUR INDIAN JUDGES ARE USELESS BOTTOM DREGS OF THE SCHOOL CEREBRAL BARREL AND BOTTOM DISCARD DREGS OF THE LOSER LAWYER POOL.. ONCE UPON A TIME THESE FOOT SLOGGING LAWYERS WEARING CHEAP PLASTIC CHAPPALS , ALSO MILKED THE TAREEQ PEH TAREEQ PEH TAREEQ SYSTEM..
IN THE BBC TV SERIAL "PEAKY BLINDERS" THE GYPSY MAFIA DON THOMAS SHELBY TRANSPORTS CHINESE OPIUM TO USA..
SORRY .. IT WAS INDIAN OPIUM -NOT CHINESE OR AFGHAN OPIUM GROWN BY JEW ROTHSCHILD IN INDIA AND SOLD IN CHINA..
DONALD THE TRUMP WANTS TO DRAIN THE SWAMP-- POOR GUY DOES NOT KNOW THAT THE DENIZENS OF THIS SWAMP ARE DESCENDANTS OF ROTHSCHILDs OPIUM DRUG RUNNERS.
http://ajitvadakayil.blogspot.com/2010/12/dirty-secrets-of-boston-tea-party-capt.html
IN INDIA WE DO NOT KNOW THAT THE RICHEST PEOPLE AT THE TIME OF INDEPENDENCE IN 1947 WERE PARSIS AND CRYPO JEW MARWARIS WHO WERE OPIUM DRUG RUNNING AGENTS OF JEW ROTHSCHILD ..
http://ajitvadakayil.blogspot.com/2010/11/drug-runners-of-india-capt-ajit.html
BBC KING PIN MARK TULLYs ANCESTORS WRITER GEORGE ORWELLs FATHER AND WERE OPIUM DRUG "EMPLOYEES" OF ROTHSCHILD IN INDIA..
KATHIAWARI JEW GANDHI WAS ROTHSCHILDs AGENT..HE RECRUITED SOLDIERS FOR JEW ROTHSCHILD FOR WW1 AND WW2 TO CARVE OUT THE STATE OF ISRAEL..
http://ajitvadakayil.blogspot.com/2019/07/how-gandhi-converted-opium-to-indigo-in.html
IN "PEAKY BLINDERS" THOMAS SHELBY DRINKS LAUDANUM.. IT IS OPIUM LACED ALCOHOL..
USING LAUDANUM AND HONEY TRAPS ROTHSCHILD CONVERTED ROYAL BLOODLINES FROM ISLAM/ CHRISTIANITY TO JEWISH-- EXAMPLE BRITISH / OTTOMAN / MOGHUL ...
http://ajitvadakayil.blogspot.com/2016/01/of-honey-traps-and-pots-capt-ajit.html
QUEEN VICTORIA NEEDED LAUDANUM AND VIOLENT ANAL SEX FROM HER INDIAN SERVANT ABDUL KARIM .. SHE WAS ADDICTED.. STUD KARIM WITH A LARGE DONG WOULD BE POISONED AND KILLED OFF TO PRESERVE ROYAL SECRETS..
https://www.telegraph.co.uk/films/2017/09/02/queen-victoria-always-liked-sex-judi-dench-stephen-frears-making/
QUEEN ELIZABETHs MOTHER AND ABRAHAM LINCOLNs WIFE WERE ADDICTED TO LAUDANUM..
NATIONAL POET TAGOREs GRANDFATHER, A PIR ALI MUSLIM DWARAKNATH, WAS ROTHSCHILDs OPIUM PARTNER..
http://ajitvadakayil.blogspot.com/2011/08/opium-drug-running-tagore-family-capt.html
PIR ALI MUSLIM RAJA RAM MOHAN ROY WAS ROTHSCHILDs OPIUM FACTORY EMPLOYEE..
http://ajitvadakayil.blogspot.com/2011/07/opium-raja-british-stooge-ram-mohan-roy.html
CAPT AJIT VADAKAYIL WILL NOT ALLOW NETFLIX OR HISTORY TV CHANNEL TO BURY HISTORICAL TRUTHS..
capt ajit vadakayil
..
PUT ABOVE COMMENT IN WEBSITES OF--
DeleteSALMAN KHAN
NEELAM
SONALI BENDRE
TABU
SAIF ALI KHAN
SHARMILA TAGORE
TRUMP
PUTIN
PM OF UK
AMBASSADORS TO FROM USA/ RUSSIA/ UK
ENTIRE BBC GANG
MARK TULLY
PMO
PM MODI
LAW MINISTER/ MINISTRY
AJIT DOVAL
RAW
IB
NIA
ED
CBI
AMIT SHAH
HOME MINISTRY
DEFENCE MINISTER/ MINISTRY
ALL 3 ARMED FORCE CHIEFS
CJI BOBDE
ATTORNEY GENERAL
ALL SUPREME COURT JUDGES
ALL STATE HIGH COURT CHIEF JUSTICES
ENTIRE INDIAN MAIN STREAM MEDIA EDITORS
SWAMY
RAJIV MALHOTRA
I&B MINISTER/ MINISTRY
NCERT
EDUCATION MINISTER/ MINISTRY
CMs OF ALL INDIAN STATES
DGPs OF ALL STATES
GOVERNORS OF ALL STATES
PRESIDENT OF INDIA
VP OF INDIA
SPEAKER LOK SABHA
SPEAKER RAJYA SABHA
DAVID FRAWLEY
STEPHEN KNAPP
WILLIAM DALRYMPLE
KONRAED ELST
FRANCOIS GAUTIER
PIYUSH GOEL
NITI AYOG
AMITABH KANT
THE QUINT
THE SCROLL
THE WIRE
THE PRINT
MK VENU
MADHU TREHAN
RAJDEEP SARDESAI
PAAGALIKA GHOSE
NAVIKA KUMAR
ANAND NARASIMHAN
SRINIVASAN JAIN
SONAL MEHROTRA KAPOOR
VIKRAM CHANDRA
NIDHI RAZDAN
FAYE DSOUZA
ZAKKA JACOB
RAVISH KUMAR
PRANNOY JAMES ROY
AROON PURIE
VINEET JAIN
RAGHAV BAHL
SEEMA CHISTI
DILEEP PADGOANKAR
VIR SANGHVI
KARAN THAPAR
PRITISH NANDI
SHEKHAR GUPTA
SIDHARTH VARADARAJAN
ARUN SHOURIE
N RAM
ALL MPs OF INDIA
SUHEL SETH
JACK DORSEY
MARK ZUCKERBERG
THAMBI SUNDAR PICHAI
CEO OF WIKIPEDIA
QUORA CEO ANGELO D ADAMS
QUORA MODERATION TEAM
KURT OF QUORA
GAUTAM SHEWAKRAMANI
WEBSITES OF DESH BHAKTS
SPREAD ON SOCIAL MEDIA EVERY WHICH WAY.
ALSO IN WEBSITES OF--
DeleteSRI SRI RAVISHANKAR
SADGURU JAGGI VASUDEV
MATA AMRITANANDA MAYI
BABA RAMDEV
RSS
AVBP
VHP
MOHAN BHAGWAT
RAM MADHAV
MUKESH AMBANI
RATA TATA
ANAND MAHINDRA
KUMARAMANGALAMBIRLA
LAXMI MNARAYAN MITTAL
AZIM PREMJI
KAANIYA MURTHY
RAHUL BAJAJ
RAJAN RAHEJA
NAVEEN JINDAL
GOPICHAND HINDUJA
DILIP SHANGHVI
GAUTAM ADANI
AMISH TRIPATHI
DEVDUTT PATTANAIK
CHETAN BHAGAT
PAVAN VARMA
RAMACHANDRA GUHA
ROMILA THAPAR
IRFAN HABIB
NIVEDITA MENON
UDDHAV THACKREY
RAJ THACKREY
SONIA GANDHI
PRIYANKA VADRA
RAHUL GANDHI
VIVEK OBEROI
GAUTAM GAMBHIR
ASHOK PANDIT
ANUPAM KHER
KANGANA RANAUT
VIVEK AGNIHOTRI
KIRON KHER
MEENAKSHI LEKHI
SMRITI IRANI
PRASOON JOSHI
MADHUR BHANDARKAR
SWAPAN DASGUPTA
SONAL MANSINGH
MADHU KISHWAR
SUDHIR CHAUDHARY
GEN GD BAKSHI
SAMBIT PATRA
RSN SINGH
GVL NARASIMHA RAO
JAVED AKHTAR
ASDDUDDIN OWAISI
FAZAL GHAFOOL ( MES)
E SREEDHARAN
MOHANLAL
SURESH GOPI
MAMMOOTTY
SOLI BABY
FALI BABY
KATJU BABY
SALVE BABY
PGURUS
PRAKASH KARAT
SITARAM YECHURY
D RAJA
RANA AYYUB
SHEHLA RASHID
FATHER CEDRIC PRAKASH
ANNA VETTICKAD
ANNIE RAJA
JOHN BRITTAS
FINANCE MINISTER OF KERALA THOMAS ISAAC
JULIO REBEIRO
AK ANTONY
OOMMEN CHANDY
PC GEORGE
JOHN ABRAHAM
ReplyDeletePaadiDecember 8, 2019 at 11:06 PM
Thank you captain for revealing this to mankind. The beej mantra's that Hindu sages devised several millenniums ago have the potential to cleanse the body. Every evolved white citizen is now practicing these mantras while brain washed Indians, chutney maries and pickle johns are ridiculing. Daily chanting of these mantra keep the natural state of the body by destroying maligned cells. I wish the evolved souls will further propagate this secret benefit.
Best Regards..
https://www.thebaghdadpost.com/en/Story/44990/Netanyahu-It-seems-Baghdad-attack-carried-out-by-Iraqi-Shi-ite-militias
ReplyDeleteFALSE FLAG ATTACK BY JEWS !
https://en.wikipedia.org/wiki/Oswald_Mosley
ReplyDeletehttps://www.bbc.com/news/stories-49405924
OSWALD MOSLEY WAS A MAJOR CHARACTER IN THE BBC TV SERIAL "PEAKY BLINDERS"
MOSLEY WAS RABIDLY ANTI-JEW.. BUT POOR MOSLEY BABY DID NOT KNOW THAT HITLER WAS A JEW..
THROW A BREAD CRUMB IN HIS GENERAL DIRECTION..
http://ajitvadakayil.blogspot.com/2015/10/if-zionist-jews-created-isis-who.html
Yes sir, I felt the depth of his character too.. When Tommy shelby was outfoxed , Mosley was in the dark even after his assasination attempt..
Deletehttps://twitter.com/rvaidya2000/status/1203690577860022273
ReplyDeleteCHIDs ANTI-HINDU RHETORIC HAS FLOWED DOWN HIS CHRONS LADEN ASSHIOLE..
EVERY SABARIMALA PILGRIM BREAKS A COCONUT -YOU THINK THEY ARE FOOLS?
http://ajitvadakayil.blogspot.com/2018/11/5900-year-old-sabarimala-this-planets.html
ATHEIST COMMIE SUPREMO KODIYERI BALAKRISHNANs SON BINOY WAS PHOTOGRAPHED BREAKING COCONUT IN SABARIMALA..
WHEN YOU ARE UP SHIT FUCKIN' CREEK WITHOUT A PADDLE--THIS IS WHAT HAPPENS..
TEE HEEEEEEEEEEEE
Respected Captain,
ReplyDeleteDo you think Nations also have Karma? I mean to say do people of a particular nationality get Karma by what their ancestors have done in the past as a collective responsibility?
It is interesting to see the ruckus over the citizenship bill it is no wonder we were enslaved.
ReplyDeleteSometimes I wish we could hang these lot from the nearest lamp post.
But they all have votebanks and are duly elected.
Grievance Status for registration number : DOSAT/E/2019/00624
ReplyDeleteGrievance Concerns To
Name Of Complainant
Vikramaditya
Date of Receipt
05/12/2019
Received By Ministry/Department
Science and Technology
Grievance Description
THE LINK BELOW HAS BEEN SENT TO PMO AND MODI DOZENS OF TIME.. INDIA WASTED 40 OF OUR VEGGIES/ FRUITS/ FOOD GRAINS IN OUR STORAGE GODOWNS.
ON SHIPS WE HAVE VEG ROOM ( 4 DEG C ) , MEAT ROOM ( -15 DEG C ) AND FISH ROOM ( - 20 DEG C ) ... THESE ARE LARGE ROOMS .. THE VEG ROOM IS EQUIPPED WITH A OZONATOR DESPITE REFRIGERATION..
http://ajitvadakayil.blogspot.com/2013/06/unsung-ozone-for-instant-prevention-and.html
HAVING OZONE GENERATOR IS NOT EXPENSIVE..
http://ajitvadakayil.blogspot.com/2011/08/nitrogen-plant-with-stencher-and.html
WE ASK.. WHY DO WE HAVE USELESS IITs WITH USELESS PROFESSORS WHO CHURN OUT USELESS STUDENTS --WITH KOTA CRAM AND VOMIT MINDSET..
STOP THIS KOTA NONSENSE ..CHANGE THE PATTERN OF IIT ENTRANCE EXAM QUESTIONS, SO THAT CRAM AND VOMIT DIMWITS CANNOT PASS.
MY ELDER SON WHO RECRUITS SOFTWARE ENGINEERS IN USA, SAYS IIT PRODUCTS ARE USELESS -- CHILDREN COMING FROM LOW GRADE ENGINEERING COLLEGES IN INDIA ARE BETTER WHEN IT COMES TO THINKING OUTSIDE THE BOX ..
WE NEED A TOTAL REVAMP OF OUR EDUCATION SYSTEM.. AND PLEASE DONT USE USELESS PRAKASH JAVEDEKAR TO DO THIS.
http://ajitvadakayil.blogspot.com/2010/11/my-son-at-cornell-university-capt-ajit_25.html
capt ajit vadakayil
The link for using ozone technology has been sent before to many authorities but has been ignored. The food preservation by ozone is used by many western countries. The wastage of food stocks can be prevented thereby avoiding such price explosion.
Jai bharat matha
Current Status
Case closed
Date of Action
09/12/2019
Reason
Others
Remarks
The statements and the comments made by you may not be considered as grievance relating to Department of Science and Technology.
Officer Concerns To
Officer Name
Smt. Anju Bhalla
Officer Designation
Joint Secretary PG
Contact Address
Email Address
anju_bhalla@nic.in
Contact Number
01126516077
This is the response of science and technology...
95% OF BABUS IN OUR MINISTRIES DESERVE TO BE SACKED WITHOUT PENSION.. A LOT OF THEM ARE IN FOREIGN PAYROLL.
DeleteTHE FACT THAT 40 % OF OUR FOOD ( VEGIES/ FRUITS/ GRAINS ) GETS ROTTEN HAS NOT IMPRESSED ANYBODY..
NARENDRA DAMODARDAS MODI ( WHO WORE A MOSSAD SPONSORED SIKH TURBAN IN 1976 ) IS ONLY INTERESTED IN WRANGLING NOBEL PRIZE, WHICH HE WILL GET SOON--- AS ROTHSCHILDs BANKS AND INSURANCE COMPANIES ARE ON THE DRIVERS SEAT IN INDIA..
Guruji,
DeleteI don't want to be a *unt but i have reached my limit of patience. Have been facing commie headquarters of yore Nalgonda (where my father bought land through his hard sweat and blood) trying to devlop it through organic farming and also small scale industry in the area. But as you know the commie mindset has dented my work. But Ajit vadakayil flows through my veins. Come what may i will prevail. My father who is simple hard working man now has his BP high due to these cunts. However, he is also a stubborn man who is self made. One day i might just take it to the point where these commies will shit in their pants. The time will come. I want my future generations to be men not napunsaks. We will prevail. I have my swords ready. Army will come in time.
https://twitter.com/DrGPradhan/status/1203751115646361601
ReplyDeleteCONMAN HALWAI DOCTOR BELONGS TO JAIL..
HE IS UNEMPLOYED FOR PAST SEVEN YEARS ..
https://timesofindia.indiatimes.com/india/karnataka-bypoll-results-live-updates-counting-of-votes-to-begin-at-8am/liveblog/72431614.cms
ReplyDeleteSHIV SENA WILL SOON DIE LIKE JDS..
MARATHA HINDUS DID NOT VOTE FOR AN ITALIAN WAITRESS OF HARDCORE ISI SPONSORED MUSLIM LIKE AHMAD PATEL..
CRACKERS WENT OFF IN PAKISTAN WHEN AHMAD PATEL WAS ELECTED..
POOR UDDHAV THACKRAY.. STAR KID WITH ZERO VISION..
capt ajit vadakayil
..
PUT ABOVE COMMENT IN WEBSITES OF--
UDDHAV THACKRAY
ADITYA THACKRAY
SHIV SENA
RANJAY RAUT
SAAMNA
PMO
PM MODI
AMIT SHAH
RAM MADHAV
RAJ THACKRAY
Comment Sent
Deleteadityathackeray@me.com
write2us@saamana.com
s.raut@sansad.nic.in
connect@mygov.nic.in
contact@amitshah.co.in
Ram Madhav • rammadhav@gmail.com
rajthackeray@gmail.com
jscpg-mha@nic.in
PMOPG/E/2019/0703054
He has started a "mauli"thali for Rs 10 only 3 Rotis ,vegetable dal rice and a sweet...
DeleteBread and circuses time tested formula
https://timesofindia.indiatimes.com/india/over-900-scientists-scholars-demand-withdrawal-of-cab-from-parliament/articleshow/72435631.cms
ReplyDeleteWE THE PEOPLE WILL NOT ALLOW MUSLIMS IN PAKISTAN , BANGLADESH AND MYANMAN TO STLLE DOWN IN INDIA.
BUT WE WILL ALLOW PERSECUTED MUSLIMS SECTS LIKE AHMADDIYAS TO SETTLE DOWN IN INDIA..
INDIA HAS STOPPED PANDERING TO MUSLIMS ..
I ASK MY READERS TO SEND ME THE NAMES OF THESE 900 SCHOLARS-- WHOM I WILL ENTER IN HE NATIONAL DESH DROHI DATABASE..
MY NEXT POST WILL BE ON NAC WHICH MADE AN ITALIAN MAINO JEWESS WAITRESS , THE EMPRESS OF INDIA..
NAC WAS PACKED WITH RABID ANTI-HINDU MINDSET PEOPLE..
SHE TRIED HER BEST TO PASS THE ANTI-HINDU COMMUNAL VIOLENCE BILL .. SHE FELL PHUTTT ON HER MAINO JEWESS FACE..
capt ajit vadakayil
..
ye lejiye capt. ji :-
Deletehttps://t.co/ngUs85t9eh?amp=1
900 INTELLECTUALS ?
DeleteAPPIDIYAAAA?
CAPT AJIT VADAKAYIL CAN HAVE THE INTELLECT OF THESE 900 AND THEIR ANCESTORS UNDER THE FORESKIN OF HIS UNCIRCUMCISED PRICK AND HAVE SPACE FOR 99.99 % MORE..
TEE HEEEE
Following link contains names of all the 1016 scholars who are opposed to CAB.
DeleteScroll down to see the names and institutes they are affiliated with
https://docs.google.com/document/d/1dmuimPt4jESfWqqdz361N4aQu0Je0tiuoy0yp9nVp4w/edit?usp=drivesdk
Capt. Sir,
DeleteHere is the list of all 1043 'scholars' : https://pdfhost.io/v/feOGs4Ap_Statement_on_the_Proposed_Citizenship_Amendment_Billpdf.pdf
Using Data Analysis :
From IITs : 117
From IISER : 40
From TIFR : 53
From NISER : 48
From Jamia Milia islamia : 13
From Aligarh Muslim Uni : 3
From JNU : 10
Citywise :
Mumbai 94
Delhi 51
Kanpur 38
Bangalore 37
bhubaneswar 36
Chennai 48
kolkata 38
Top Names / Surnames :
das 24
banerjee 19
chandra 19
roy 19
harish 19
ghosh 16
chakraborty 15
raman 14
mukherjee 14
mondol 13
biswas 13
gupta 11
chatterjee 11
paul 11
prasad 11
sengupta 11
AS USUAL BONGS ARE NO 1 - AMONG TRAITORS..
DeleteGuruji,
DeleteNo sooner When i mentioned yazidis as Hindus and being persecuted and that india should offer refuge... BAAANG Jack Dorsey threw the axe on my multiple twitter handles.
This comment has been removed by the author.
Deletehttps://timesofindia.indiatimes.com/sports/more-sports/others/russia-banned-from-olympics-for-four-years-over-doping-scandal/articleshow/72439395.cms
ReplyDeleteAMERICAN ATHLETES ARE THE NO 1 DOPERS..
DIPA KARMAKAR WAS DEPRIVED OF AN OLYMPIC MEDAL IN GYMNASTICS BECAUSE THAT DOPED AMERICAN BITCH SIMONE BILES GOT THE GOLD ..
https://abcnews.go.com/Health/simone-biles-adhd-meds-common-drugs-banned-olympics/story?id=42081189
capt. ji i have no bank account govt./private, but on my AIRTEL number daily i get 3 to 5 messages from AXIS BANK. whats their connection?
ReplyDeletehttps://www.bgr.in/telecom/airtel-app-flaw-exposes-user-data-of-more-than-32-crore-subscribers-862602/
IT IS NOW "UDTI PUNJAB"..
ReplyDeleteFEMALE SIKH PILGRIMS ( KARTARPUR CORRIDOR ) ARE NOW HIDING CHINESE SYNTHETIC DRUGS INSIDE THE VAGINAS AND SMUGGLING IT TO INDIA..
https://en.wikipedia.org/wiki/Carfentanil
IN GOA TEENAGED SCHOOL GIRLS HAVE BEEN USED AS DROUG COURIERS FOR DECADES .. NOBODY CARES..
http://ajitvadakayil.blogspot.com/2012/07/jewish-russian-mafia-capt-ajit-vadakayil.html
NOBODY EVEN KNEW THAT GOAs CASINOS WERE USED TO LAUNDER DRUG MONEY..
NIGERIAN STREET COURIERS USE POUCHES ( CHARGERS ) INSIDE THEIR RECTUM..
TILL TODAY NOBODY KNOW HOW KACHRAWAAL WON FOUR LOK SABHA SEATS IN PUNJAB IN 2016..
IN PUNJAB POLITICIANS/ POLICE/ JUDGES / MEDIA ARE HAND IN GLOVE WITH DRUG MAFIA..
https://www.hindustantimes.com/delhi-news/breaking-bad-in-a-sleepy-g-noida-locality/story-y8bVmH7foe9wPq4eapyFPM.html
MEXICAN DRUG CARTELS ( METH ) USED PRECURSOR EPHEDRINE EXPORTED TO MANAZANILLO FROM INDIA BY SHIP..
https://www.hindustantimes.com/delhi-news/breaking-bad-in-a-sleepy-g-noida-locality/story-y8bVmH7foe9wPq4eapyFPM.html
NCW HAS BEEN SAVING AFRICAN DRUG COURIER WOMEN.. WE KNOW WHAT DEEP STATE DARLING SWATI MALIWAL IS UP TO..
http://ajitvadakayil.blogspot.com/2018/01/dubious-role-of-bilderberg-club-created.html
AJIT DOVAL KOH KUCH NAHIN PATHA.. HE IS RESTING ON HIS PAST LAURELS ( RAW ASSET INSIDE PAKISTAN ) AND HAS BEDDED DOWN FOR LUCRATIVE RETIREMENT..
WE WATCH!
capt ajit vadakayil
..
CM CAPT AMARINDER SINGH
DeleteDGP PUNJAB
GOVERNOR PUNJAB
HIGH COURT CHIEF JUSTICE PUNJAB
PMO
PM MODI
LAW MINISTER/ MINISTRY
AJIT DOVAL
RAW
IB
NIA
ED
CBI
AMIT SHAH
HOME MINISTRY
DEFENCE MINISTER/ MINISTRY
ALL 3 ARMED FORCE CHIEFS
CJI BOBDE
ATTORNEY GENERAL
ALL SUPREME COURT JUDGES
ALL STATE HIGH COURT CHIEF JUSTICES
Captain,
DeleteMy twitter account has been suspended 9-10 times with in a year when I started posting ur msg
Also I had mail ur msgs to cm Yogi and Amit Shah many times but no a single reply from them
Only pmo replies frequently even if they mail ur query has been closed and sent to concern department
Punjab Governor-
Deleteadmr-chd@nic.in,
sectogov@punjab.gov.in,
adcgovpb@gmail.com,
amarinder.singh@sansad.nic.in,
dgp.punjab.police@punjab.gov.in
eam@mea.gov.in,
mos-defence@gov.in,
Rajnath Singh <38ashokroad@gmail.com>,
presidentofindia@rb.nic.in,
jscpg-mha@nic.in,
ed-del-rev@nic.in,
connect@mygov.nic.in,
information@cbi.gov.in,
info.nia@gov.in,
proiaf.dprmod@nic.in,
pronavy.dprmod@nic.in,
Ravi Shankar Prasad
nalsa-dla@nic.in,
sclc@nic.in,
apslsauthority@rediffmal.com,
apslsauthority@yahoo.com,
apslsa2013@rediffmail.com,
assamslsa@gmail.com,
bslsa_87@yahoo.in,
cgslsa.cg@nic.in,
rajnishshrivastav@gmail.com,
reg-high.goa@nic.in,
msguj.lsa@nic.in,
hslsa.haryana@gmail.com
ravis@sansad.nic.in,
secylaw-dla@nic.in,
gn.raju@nic.in,
secy-jus@gov.in,
narendramodi1234 ,
contact@amitshah.co.in
nslsa.nagaland@yahoo.in,
oslsa@nic.in,
ms@pulsa.gov.in,
rslsajp@gmail.com,
sikkim_slsa@live.com,
telenganaslsa@gmail.com,
tnslsa@dataone.in,
tnslsa@gmail.com,
salsatripura@gmail.com
nslsa.nagaland@yahoo.in,
oslsa@nic.in,
ms@pulsa.gov.in,
rslsajp@gmail.com,
sikkim_slsa@live.com,
telenganaslsa@gmail.com,
tnslsa@dataone.in,
tnslsa@gmail.com,
salsatripura@gmail.com
upslsa@up.nic.in,
slsa-uk@nic.in,
wbstatelegal@gmail.com,
andslsa2013@gmail.com,
secylaw2016@gmail.com,
slsa_utchd@yahoo.com,
reg.slsa-dnh@gov.in,
dlsathebest@gmail.com,
veebhaskr@gmail.com,
lslsa-lk@nic.in,
msutplsa@gmail.com,
supremecourt@nic.in
Some of them blocked this message. Readers may use these ids to send it again.
Sent Emails to the following IDs,contact@amitshah.co.in
Deletenarendramodi1234@gmail.com
cmo@punjab.gov.in
dgp.punjab.police@punjab.gov.in
38ashokroad@gmail.com
info.nia@gov.in
information@cbi.gov.in
alokmittal.nia@gov.in
admr-chd@nic.in
highcourtchd@indianjudiciary.gov.in
scbaec@gmail.com
ravis@sansad.nic.in
jscpg-mha@nic.in
done capt. ji send most them.
Deletepmo :- registration number PMOPG/E/2019/0703499
via twitter:-
https://twitter.com/AKJANGRA17/status/1204071835609878528?s=20
rest of them via email.
#######################
also send email to all punjab chief officers/offices like dgp/igp/ssp/sp/ig etc etc..
BELOW IS E-MAIL ADDRESS OF PUNJAB POLICE OFFICERS/OFFICES :-
dgp.punjab.police@punjab.gov.in,
dgp.staff.police@punjab.gov.in,
so.dgp.police@punjab.gov.in,
adgp.crime.police@punjab.gov.in,
adgp.ivc&hr.police@punjab.gov.in,
adgp.l&o.police@punjab.gov.in,
adgp.rlys.police@punjab.gov.in,
adgp.sec.police@punjab.gov.in,
adgp.admn.police@punjab.gov.in,
adgp.trg.police@punjab.gov.in,
adgp.rules.police@punjab.gov.in,
adgp.it.t.police@punjab.gov.in,
adgp.pap.jal.police@punjab.gov.in,
adgp.hrd&cp.police@punjab.gov.in,
dboi.police@punjab.gov.in,
adgp.it.tstaf.police@punjab.gov.in,
website.it.t.police@punjab.gov.in,
igp.hq.police@punjab.gov.in,
igp.hu.police@punjab.gov.in,
igp.it.t.police@punjab.gov.in,
igp.crime.police@punjab.gov.in,
igp.ops.police@punjab.gov.in,
igp.prov.police@punjab.gov.in,
igp.traffic.police@punjab.gov.in,
igp.trg.police@punjab.gov.in igp.sec.police@punjab.gov.in,
igp.rules.police@punjab.gov.in,
igp.asr.police@punjab.gov.in,
igp.ptl.police@punjab.gov.in,
igp.jal.police@punjab.gov.in,
igp.cp.police@punjab.gov.in,
igp.nri.police@punjab.gov.in,
igp.cmsec.police@punjab.gov.in,
igp.mod.police@punjab.gov.in,
igp.btd.police@punjab.gov.in,
igp.pap.jal.police@punjab.gov.in,
igp.cmdo.ptl.police@punjab.gov.in,
igp.irb.ptl.police@punjab.gov.in,
cp.asr.police@punjab.gov.in,
cp.jal.police@punjab.gov.in,
cp.ldh.police@punjab.gov.in,
dig.frz.police@punjab.gov.in,
dig.asr.police@punjab.gov.in,
dig.ldh.police@punjab.gov.in,
dig.frd.police@punjab.gov.in,
dig.jal.police@punjab.gov.in,
dig.admn.police@punjab.gov.in,
dig.it.t.police@punjab.gov.in,
dig.crime.police@punjab.gov.in,
dig.int1.police@punjab.gov.in
to be continued:-
continued from 1 :--
Deletedig.invcrime.police@punjab.gov.in,
dig.prov.police@punjab.gov.in,
dig.cp&tf.police@punjab.gov.in,
dig.sec.police@punjab.gov.in,
dig.trg.police@punjab.gov.in,
dig.mod.police@punjab.gov.in,
Dig.pap2&trg.police@punjab.gov.in,
dig.pap.admn.police@punjab.gov.in,
dig.irb2&trg.police@punjab.gov.in,
dig.cmdo.ptl.police@punjab.gov.in,
dig.irb.admn.police@punjab.gov.in,
dcp.asr.police@punjab.gov.in,
dcp.jal.police@punjab.gov.in,
dcp.ldh.police@punjab.gov.in,
aig.welfare.police@punjab.gov.in,
aig.mod.police@punjab.gov.in,
aig.pap.jal.police@punjab.gov.in,
aig.armament.police@punjab.gov.in,
aig.it.police@punjab.gov.in,
aig.crime.police@punjab.gov.in,
aig.ops.police@punjab.gov.in,
aig.personnel.police@punjab.gov.in,
aig.ppcr.police@punjab.gov.in,
aig.int.police@punjab.gov.in,
aig.prov.police@punjab.gov.in
aig.sec.police@punjab.gov.in,
aig.transport.police@punjab.gov.in,
ssp.asrr.police@punjab.gov.in,
ssp.brn.police@punjab.gov.in,
ssp.btl.police@punjab.gov.in,
ssp.btd.police@punjab.gov.in,
ssp.frd.police@punjab.gov.in,
ssp.ftg.police@punjab.gov.in,
ssp.frz.police@punjab.gov.in,
ssp.fzk.police@punjab.gov.in,
ssp.grd.police@punjab.gov.in,
ssp.hsr.police@punjab.gov.in,
ssp.jalr.police@punjab.gov.in,
ssp.kpr.police@punjab.gov.in,
ssp.khn.police@punjab.gov.in,
ssp.ldhr.police@punjab.gov.in,
ssp.mns.police@punjab.gov.in,
ssp.mog.police@punjab.gov.in,
ssp.mkt.police@punjab.gov.in,
ssp.nsr.police@punjab.gov.in,
ssp.ptl.police@punjab.gov.in,
ssp.rpr.police@punjab.gov.in,
ssp.sgr.police@punjab.gov.in,
ssp.moh.police@punjab.gov.in,
ssp.trn.police@punjab.gov.in
ssp.ptk.police@punjab.gov.in,
cmdt1.irb.ptl.police@punjab.gov.in,
cmdt2.irb.ldk.police@punjab.gov.in,
cmdt3.irb.ldh.police@punjab.gov.in,
cmdt4.irb.kpr.police@punjab.gov.in,
cmdt5.irb.asr.police@punjab.gov.in,
cmdt6irb.ldk.police@punjab.gov.in,
cmdt7.irb.kpr.police@punjab.gov.in,
cmdt1cdo.bgrh.police@punjab.gov.in,
cmdt2cdo.bgrh.police@punjab.gov.in,
cmdt3.cdo.moh.police@punjab.gov.in,
cmdt4.cdo.moh.police@punjab.gov.in,
cmdt5cdo.bgrh.police@punjab.gov.in,
cmdt7.pap.jal.police@punjab.gov.in,
cmdt9.pap.asr.police@punjab.gov.in,
cmdt13pap.chd.police@punjab.gov.in,
cmdt27pap.jal.police@punjab.gov.in,
cmdt36papbgrh.police@punjab.gov.in,
cmdt75pap.jal.police@punjab.gov.in,
cmdt80pap.jal.police@punjab.gov.in,
cmdt82pap.chd.police@punjab.gov.in,
cmdt.istc.kpr.police@punjab.gov.in,
cmdtprtc.jkln.police@punjab.gov.in,
cmdt.ctc.bgrh.police@punjab.gov.in,
sp.telecom.police@punjab.gov.in
continued to part 2--
continued from part 1:---
Deletesp.eow.police@punjab.gov.in,
sp.hr.police@punjab.gov.in,
sp.ivc.police@punjab.gov.in,
sp.ivc2.police@punjab.gov.in,
sp.scst.police@punjab.gov.in,
sp.crime.police@punjab.gov.in,
sp.so-dgp.police@punjab.gov.in,
sp.sec.police@punjab.gov.in,
sp.traffic.police@punjab.gov.in,
sp.it.police@punjab.gov.in,
sp.sscrime.police@punjab.gov.in,
sp.crimewcell.police@punjab.gov.in,
sp.invcrime.police@punjab.gov.in,
sp.crime.ptl.police@punjab.gov.in,
sp.crime.jal.police@punjab.gov.in,
sp.crime.asr.police@punjab.gov.in,
sp.hrc.nocomn.police@punjab.gov.in,
sp.rtc.pap.police@punjab.gov.in,
sp.sports.pap.police@punjab.gov.in,
sp.soadgp.pap.police@punjab.gov.in,
dsp.it.police@punjab.gov.in,
dsp.security.police@punjab.gov.in,
dsp.telecomhq.police@punjab.gov.in,
dsp.it.hq.police@punjab.gov.in,
dir.ppa.phlr.police@punjab.gov.in
jd.ppa.phlr.police@punjab.gov.in,
ddadmppa.phlr.police@punjab.gov.in,
ddgenppa.phlr.police@punjab.gov.in,
ddid.ppa.phlr.police@punjab.gov.in,
ddod.ppa.phlr.police@punjab.gov.in,
ppa.hq.phlr.police@punjab.gov.in,
dir.fpb.phlr.police@punjab.gov.in,
dir.fsl.pb.police@punjab.gov.in,
pap.hq.jal.police@punjab.gov.in,
mcr.asr.police@punjab.gov.in,
mcr.jal.police@punjab.gov.in,
mcr.ldh.police@punjab.gov.in,
mcr.moh.police@punjab.gov.in,
mcr.ptl.police@punjab.gov.in,
cctns.it&t.police@punjab.gov.in,
feedbackwsite.police@punjab.gov.in,
supdtmod.police@punjab.gov.in,
scc.pphq.police@punjab.gov.in,
iteqtstr.it&t.police@punjab.gov.in,
itcnslt.it&t.police@punjab.gov.in,
facntr.police@punjab.gov.in,
eoadmin.police@punjab.gov.in,
nwadmn.police@punjab.gov.in,
Ecell.police@punjab.gov.in
to be continued to part 3 :--
continued from part 2 --
Deleteit.twing.police@punjab.gov.in,
adminwing.police@punjab.gov.in,
crimewing.police@punjab.gov.in,
provwing.police@punjab.gov.in,
hrwing.police@punjab.gov.in,
intwing.police@punjab.gov.in,
ivcwing.police@punjab.gov.in,
opswing.police@punjab.gov.in,
secwing.police@punjab.gov.in,
tfcwing.police@punjab.gov.in,
trgwing.police@punjab.gov.in,
itcontrol.police@punjab.gov.in,
ppcr.police@punjab.gov.in,
l&owing.police@punjab.gov.in,
prvycellcrime.police@punjab.gov.in,
supdtmod.it.t.police@punjab.gov.in,
supdtest.it.t.police@punjab.gov.in,
supdtact.it&t.police@punjab.gov.in,
sysadmn.police@punjab.gov.in,
egov.it&t.police@punjab.gov.in,
trg.it&t.police@punjab.gov.in,
icnetwork.police@punjab.gov.in,
cipa.it&t.police@punjab.gov.in,
zonal.asr.police@punjab.gov.in,
zonal.jal.police@punjab.gov.in
ssp.moh.police@punjab.gov.in,
cmdt3.cdo.moh.police@punjab.gov.in,
cmdt4.cdo.moh.police@punjab.gov.in,
mcr.moh.police@punjab.gov.in,
dpo.moh.police@punjab.gov.in,
ps.nygn.moh.police@punjab.gov.in,
ps.stcrime.police@punjab.gov.in,
ps.ph11.moh.police@punjab.gov.in,
ps.mtr.moh.police@punjab.gov.in,
ps.blgi.moh.police@punjab.gov.in,
ps.mlpr.moh.police@punjab.gov.in,
ps.wmn.moh.police@punjab.gov.in,
ps.cyber.police@punjab.gov.in,
ps.ckhr.moh.police@punjab.gov.in,
ps.ph1.moh.police@punjab.gov.in,
ps.ph8.moh.police@punjab.gov.in,
ps.sohana.moh.police@punjab.gov.in,
ps.kharar.moh.police@punjab.gov.in,
ps.kurali.moh.police@punjab.gov.in,
ps.drbs.moh.police@punjab.gov.in,
ps.zrk.moh.police@punjab.gov.in,
ps.lalru.moh.police@punjab.gov.in,
ps.nri.moh.police@punjab.gov.in
These email address taken from punjab police website below link:-
http://www.punjabpolice.gov.in/officeremail.aspx
some 5 to 6 email id address are old when anyone try to send you get " Address not found
Your message wasn't delivered to this id because the address couldn't be found, or is unable to receive mail. "
Captain,
ReplyDeleteI saw ur new pic with green tees and short... U look so fit and tight muscles even in this age... U can write a blog on food diet for boys and girls irrespective to their blood group and region... New generation has poor diet, there is something call balance in food with climate or region or blood group which affect the body
Seen many people, even after good diet they look full and many people look so glossy and healthy
I have saved ur blogs offline on sugar, coconut, beer, Amla , tulsi, sesame seeds , belly fat.... Will read and edit all good points from ur food blogs and will start following from Jan with my daughter and wife
Also I will start eating limestone (Chuna) for calcium and also give it to my daughter to become strong
Directly and indirectly ur blog is an powerhouse of information....
No need to make a big bookshelf in house and spend thousands buying crap books....u have touched almost every topic like food, religion, culture, household, life, history, science, politics, life lessons
When I was searching for Subhash Chandra Bose true history on Google, that's the 1st time I read ur blog and was shocked to read about Japanese eating Indian soldiers and unheard facts
When I started reading that blog, don't know when I finished it with in 30min
One problem with ur blog is, it hurts and sadden mind when read the truth u say about world , it affect mind for several hours...but as said, Truth is always bitter and u have to accept it with bravery
Before ur blog, I was like little John who was fascinated with foreign names like Harry, marrie etc due to false history been taught in school
Even on my trip to Singapore in 2012, I said wrong about Indian people's to a taxi driver also I said wrong about Indians to my Korean friends in Mumbai but once I started reading ur blogs.. I became proud Indian who is the light of whole dark world.... Now whatever I learn from u... I teach it to my daughter.. school and college teachers have not taught me even 1% what I have learn from u
I have told many people and friends to read ur blogs but Indians are lazy and none of them have read even after convincing them many times
They are cricket, Bollywood, news debate people whose mind have been brainwashed....
Nudity and sex has been serve on cellphones through web platform like ULLU, ALTBALAJI
Thanks captain....wish next birth I will be ur junior to work under u and see ur life....
Thanks for indirectly changing me and pouring the confidence to stand for truth
U will be always my guru whom I never met but learn my best
Captain,
ReplyDeleteToday I know the value of speed writing... When u sit alone and keep writing without a break and pause, u pour ur heart.... That's how u write all ur blogs
One thing captain, Indians don't want to read good stuff but they will spent whole day watching webseries like Sacred games, TV news debate, cricket, movies, YouTube like BB ki vines, Ashish chanchlani
Whenever I see a foreigner in India travelling, they always have a book with them....either autobiography or business topic or history...they read in trains, beach, restaurant
Why foreign nations are ahead in technology and development bcoz they have adopt the habit of reading and Indians have lose that habit which have made us global super power for thousands of years
Even govt is not encouraging reading habits among people
Captain,
ReplyDeleteI have read ur blog on parenting 3 times
One thing I have seen that u had never beaten ur kids both boys but there are many kids I have seen who are so loud and mischief...they keep crying for things in shop, don't study, fighting with other kids, keep breaking things, don't listen to their parents
Seen many parents who talk nicely to divert their kids mind but last option left for them is to beat child after fail attempt to negotiate
How to control that kind of kids
Shrikant bhai,
DeleteParenting has some tough aspects. But if you notice, captain never was incharge until his sons grew up. Mother and her role forms the crux of the foundational pulpit of child's personality. Capt has mentioned about his childhood too. He was naughty and bright child. But he knows discipline through the sandhya vandanam his mother followed along with his sisters and his father who was a hard worker. I dare say that amma has a major role in family being the way it is. When woman is strong and ready to sacrifice.... Joy is the only emotion left to experience throughout. Now if you see women of present time what do you find ??? Your answer lies there. Captain also hammers home the point of that crucial role a mother/wife plays in every post and experience of his. I personally am a greater admirer of amma than captain. (Especially when she commands captain "only you can do it".) And his regular " me wife will kick me ass" quote) in saving a drowning boys life. Captain or else would have calmly gulped his beer and relaxed as if nothing happened. This blog too.... Is dedicated to her. Nothing is lost on me. I feel her warmth all through his work, his life.
I can say that shiva paravati Kumaraswamy and ganesha are here with us.... You can easily guess who those are....
Higher the soul frequency
DeleteBetter the parents
Lower soul frequency parents beat their chirldren instead of caring.
If a wife is low soul frequency women, let her husband ask her not to beat the children but try to nurture them with love....she will not pay attentiin to the advice 100%.
May be 10% parents are good. Rest are not good fathers and mothers.
Captainji please give guidance on role of Governor. New West Bengal governor is trying so hard to help state and no cooperation from Bengal CM.
ReplyDeleteWhat power does governor have?
Grievance Description
ReplyDeleteNamaskar
Kindly acknowledge the below comment taken from Captain Ajit Vadakayils blog
https://www.newyorker.com/magazine/2019/12/09/blood-and-soil-in-narendra-modis-india
MUSLIMS OF INDIA HAVE BEEN PAMPERED..
THERE ARE MORE MUSLIMS IN INDIA THAN IN PAKISTAN,, NOT A SINGLE INDIAN MUSLIM WOULD LIKE TO GO TO PAKISTAN..
NAC OF THE ITALIAN WAITRESS TRIED TO MAKE THEM PROTECTED SPECIES-- LIKE PENGUINS..
CAPT AJIT VADAKAYIL SAYS THAT DEXTER FILKINS IS A LIAR... YOU GET PULITZER PRIZE FOR LYING....
PULITZER IS A PRIZE AWARDED BY COLUMBIA UNIVERSITY USA, WHICH IS THE MENTOR OF INDIAS COMMIE UNIVERSITY JNU. COLUMBIA UNIVERSITY WAS MADE WITH OPIUM DRUG MONEY BY ROTHSCHILD.
ROTHCHILD WAS THE OWNER OF BRITISH EAST INDIA COMPANY, WHO GREW OPIUM IN INDIA AND SOLD IT IN CHINA.
http://ajitvadakayil.blogspot.com/2019/07/how-gandhi-converted-opium-to-indigo-in.html
MIND YOU THIS LYING BASTARD DEXTER FILKINS ENJOYED OUR HOSPITALITY FOR 3 YEARS IN DELHI.
QUOTE: Rana Ayyub told me over the phone that she was heading to Kashmir. Ayyub, thirty-six years old, is one of Indias best-known investigative reporters :UNQUOTE
TEE HEEEEEEEE ...THIS MAKES MY DAY
LIAR PRAISING LIAR..
CAPT AJIT VADAKAYIL ASKS PM MODI-- WE THE PEOPLE WANTS THIS LYING BASTARD DEXTER TO BE BANNED FROM INDIA..
capt ajit vadakayil
..
Thanks And Regards
Debdoot Sarkar...
Current Status Case closed
Date of Action 09/12/2019
Remarks
Your grievance has been received.
Officer Concerns To
Officer Name DR.DEEPAK MITTAL
Officer Designation Joint Secretary
Contact Address South Block Room No. 149 B
Email Address jspai@mea.gov.in
Contact Number 01123012139
Bandra slums and recurrent annual fires a message doing rounds...
ReplyDeleteEach year Bandra east slums catch fire with almost no loss of life.
Media and other people cry hoarse.
The original settlers get rehabilitated and hey presto the slums are then rebuilt to house "the new poor" East Bengal denizens...They get all necessary documents made ..Become a vote bank.
The cycle continues .
TODAY AN EVENT DISAPPOINTED ME SO MUCH, THAT I WENT TO SLEEP LIKE A DEAD MAN..
ReplyDeleteI WAS WATCHING AMAZON PRIME ABOUT GREAT BATTLE SHIPS
THE TURN CAME FOR GERMAN BATTLE SHIP BISMARK..
BEFORE THEY COULD START OFF I TOLD MY WIFE "THE BASTARD ALLIES LEFT MORE THAN 2300 GERMAN SAILORS TO DIE IN THE COLD WATERS.. DOZENS OF SHIPS DID NOT PICK UP THE GERMANS IN THE WATER"
AS SOON AS I FINISHED THE COMMENTATOR BASTARD TALKS ABOUT HONOUR ON THE SEAS, AND HOW ENEMY SAILORS WOULD BE SAVED FROM DROWNING .. AND THEN THEY SHOWED DRIPPING WET GERMANS WALKING UP THE GANGWAY
BASTARDS -- THIS LYING JEWISH ROTHSCHILD MEDIA..EVERYBODY LIES-- WIKIPEDIA/ QUORA/ HISTORY NOW TV/ HOLLYWOOD/ NETFLIX --THE WHOLE LOT
http://ajitvadakayil.blogspot.com/2011/11/no-glory-and-honour-sinking-of-bismarck.html
I SEE NOW THAT EVEN INTERNET AND BLOGGERS LIE..
JEW EISENHOWER MURDERED TEN TIMES MORE GERMAN CHRISTIANS ( POW ) AFTER --REPEAT -- AFTER THE WAR , THAT HITLER KILLED JEWS DURING WW2..
http://ajitvadakayil.blogspot.com/2011/11/general-eisenhowers-secret-holocaust-of.html
TO CAPTURE GERMAN PRIZE BATTLE SHIP GRAF SPEE, JEW CHURCHILL FORCED THE STRICKEN SHIP OUT OF MONTEVIDEO. THE IDEA WAS TO STEAL ITS TECHNOLOGY.
THE HERO GERMAN CAPTAIN SCUTTLED HIS OWN SHIP AND SHOT HIMSELF ..
http://ajitvadakayil.blogspot.com/2011/11/noble-and-honourable-captain-of-graf.html
WHAT ABOUT THE GERMAN CAPTAIN OF EMDEN ?
http://ajitvadakayil.blogspot.com/2012/09/an-officer-and-gentlemen-karl-von.html
TRUTH IS GETTING BURIED AND NOBODY CARES..
TODAY GERMANY IS RULED BY A JEWESS WITH HITLERs EYES AND CHIN..
capt ajit vadakayil
..
Dear Captain,
DeleteAs you said Kalki will come and make things straight. Till then we have to hold on.
Please don't get disappointed.
Both the world wars were forced upon the German citizens. The purpose was to bleed the enemies of the empire like Ottomans, Russians etc.
ReplyDeletehttps://orientalreview.org/2011/01/11/episode-6-leon-trotsky-father-of-german-nazism-v/
https://www.indiatoday.in/news-analysis/story/does-citizenship-amendment-bill-violate-fundamental-right-to-equality-1626641-2019-12-09
ReplyDeleteINDIAN JUDICIARY IS THE MOST USELESS JUDICARY ON THE PLANET..
JUDGES ARE SUPPOSED TO INTERPRET LAWS -- THEY CANT EVEN DO THAT.. USELESS STUPID JUDGES..
ARTICLE 14 IS FOR INDIAN CITIZENS NOT ROHINGYA MUSLIM ILLEGAL IMMIGRANTS..
https://www.thebetterindia.com/185543/animal-rights-india-court-judgement-cruelty-prevention/
CONSTITUTION IS FOR INDIAN CITIZEN HUMANS---NOT ANIMALS..
TOMORROW STUPID JUDGES WILL DECLARE RAT AND COCKROACH AS CITIZENS OF INDIA?
WHAT ABOUT CHICKEN? NO RIGHTS FOR CHICKEN?
WE NEED TO FORM MILITARY COURTS IN INDIA TO HANG TRAITOR JUDGES IN PAYROLL OF THE DEEP STATE.. THESE JUDGES ARE IN CAHOOTS WITH BENAMI MEDIA..
WHY DO WE HAVE A DEEP STARE DARLING KAYATHA LAW MINISTER --RAVI SHANKAR PRASAD.. A USELESS FELLOW WITHOUT CHARACTER?..
WE THE PEOPLE ARE ABOVE THE CONSTITUTION..
THE CONSTITUTION CAN NEVER BE USED TO STAITJACKET WE THE PEOPLE, THE WATAN OR DHARMA..
WE MUST FORM MILITARY COURTS TO HANG TRAITOR JUDGES ON DEEP STATE PAYROLL WHO CREATED THE RED NAXAL CORRIDOR, WHO ALLOWED ETHNIC CLEANING OF KASHMIRI PANDITS, WHO HAVE GIVEN PRIORITY FOR "STARE DECISIS " MADE OUT OF CONTEXT OVER THE CONSTITUTION , AND WHO HAS STRUCK DOW NJAC, DESPITE BEING PASSED UNANIMOUSLY BY BOTH LOK SABHA , RAJYA SABHA WITH SIGNATURE OF PRESIDENT...
ENOUGH IS ENOUGH....
THE SUPREME COURT IS ITSELF BOUND BY THE CONSTITUTION OF INDIA AND THE PARLIAMENT CAN AMEND THE CONSTITUTION ANY TIME THEY WANT..CONSTITUTION IS A DYNAMIC DOCUMENT..IT CANNOT BE FROZEN TO STAIT JACKET THE WATAN/ DHARMA/ WE THE PEOPLE..
ILLEGAL JUDICIAL REVIEW EMPOWERS THE ILLEGAL COLLEGIUM JUDICIARY TO DECIDE THE FATE OF LAWS PASSED BY THE ELECTED AND ACCOUNTABLE LEGISLATURE WHICH REPRESENTS THE SOVEREIGN WILL OF THE PEOPLE...
JUDGES DO NOT KNOW THAT THE CONSTITUTION EMPOWERS PRESIDENT AND STATE GOVERNORS WITH ENORMOUS SUBJECTIVE AAND DISCRETIONARY POWERS TO SUSTAIN DHARMA ( NOT BLIND JUSTICE )…
PRESIDENT AND STATE GOVERNORS ARE NOT RUBBER STAMPS AS CONTENDED BY BENAMI MEDIA AND ILLEGAL COLLEGIUM JUDICIARY..
INDIA IS NOT A DEMOCRACY.. INDIA IS A BANANA REPUBLIC CONTROLLED BY DEEP STATE WHITE JEWS FROM ABROAD….
BHARATMATA IS RACING TO BE THIS PLANETS NO 1 SUPERPOWER IN 14 YEARS --BEFORE THAT THE NEW WORLD ORDER WANTS INDIA TO IMPLODE. .. . .
WE THE PEOPLE DO NOT TRUST COLLEGIUM JUDGES ANYMORE .. INDIA IS THE ONLY NATION ON THIS PLANET , WHERE COLLEGIUM JUDICIARY ELECTS JUDGES . .THEY SCUTTLED NJAC . . .
IN THE RECENT PAST COLLEGIUM JUDICIARY SAVED SEVERAL TRAITORS WHO HAVE TRIED TO KILL BHARATMATA . .
JUDICIARY MUST LAY OFF INDIANs EXTERNAL/ INTERNAL SECURITY.. FOR THIS WE HAVE OTHER AGENCIES SWORN TO PROTECT BHARATMATA..
Read all 8 parts of the post below
http://ajitvadakayil.blogspot.com/2019/01/justice-be-damned-enforce-law-not-any.html
capt ajit vadakayil
..
PUT ABOVE COMMENT IN WEBSITES OF--
DeletePMO
PM MODI
LAW MINISTER/ MINISTRY
AJIT DOVAL
RAW
IB
NIA
ED
CBI
AMIT SHAH
HOME MINISTRY
DEFENCE MINISTER/ MINISTRY
ALL 3 ARMED FORCE CHIEFS
CJI BOBDE
ATTORNEY GENERAL
ALL SUPREME COURT JUDGES
ALL STATE HIGH COURT CHIEF JUSTICES
ENTIRE INDIAN MAIN STREAM MEDIA EDITORS
SWAMY
RAJIV MALHOTRA
I&B MINISTER/ MINISTRY
NCERT
EDUCATION MINISTER/ MINISTRY
CMs OF ALL INDIAN STATES
DGPs OF ALL STATES
GOVERNORS OF ALL STATES
PRESIDENT OF INDIA
VP OF INDIA
SPEAKER LOK SABHA
SPEAKER RAJYA SABHA
DAVID FRAWLEY
STEPHEN KNAPP
WILLIAM DALRYMPLE
KONRAED ELST
FRANCOIS GAUTIER
PIYUSH GOEL
NITI AYOG
AMITABH KANT
THE QUINT
THE SCROLL
THE WIRE
THE PRINT
MK VENU
MADHU TREHAN
RAJDEEP SARDESAI
PAAGALIKA GHOSE
NAVIKA KUMAR
ANAND NARASIMHAN
SRINIVASAN JAIN
SONAL MEHROTRA KAPOOR
VIKRAM CHANDRA
NIDHI RAZDAN
FAYE DSOUZA
ZAKKA JACOB
RAVISH KUMAR
PRANNOY JAMES ROY
AROON PURIE
VINEET JAIN
RAGHAV BAHL
SEEMA CHISTI
DILEEP PADGOANKAR
VIR SANGHVI
KARAN THAPAR
PRITISH NANDI
SHEKHAR GUPTA
SIDHARTH VARADARAJAN
ARUN SHOURIE
N RAM
ALL MPs OF INDIA
SRI SRI RAVISHANKAR
SADGURU JAGGI VASUDEV
MATA AMRITANANDA MAYI
BABA RAMDEV
RSS
AVBP
VHP
MOHAN BHAGWAT
RAM MADHAV
MUKESH AMBANI
RATA TATA
ANAND MAHINDRA
KUMARAMANGALAMBIRLA
LAXMI MNARAYAN MITTAL
AZIM PREMJI
KAANIYA MURTHY
RAHUL BAJAJ
RAJAN RAHEJA
NAVEEN JINDAL
GOPICHAND HINDUJA
DILIP SHANGHVI
GAUTAM ADANI
AMISH TRIPATHI
DEVDUTT PATTANAIK
CHETAN BHAGAT
PAVAN VARMA
RAMACHANDRA GUHA
ROMILA THAPAR
IRFAN HABIB
NIVEDITA MENON
UDDHAV THACKREY
RAJ THACKREY
SONIA GANDHI
PRIYANKA VADRA
RAHUL GANDHI
VIVEK OBEROI
GAUTAM GAMBHIR
ASHOK PANDIT
ANUPAM KHER
KANGANA RANAUT
VIVEK AGNIHOTRI
KIRON KHER
MEENAKSHI LEKHI
SMRITI IRANI
PRASOON JOSHI
MADHUR BHANDARKAR
SWAPAN DASGUPTA
SONAL MANSINGH
MADHU KISHWAR
SUDHIR CHAUDHARY
GEN GD BAKSHI
SAMBIT PATRA
RSN SINGH
GVL NARASIMHA RAO
JAVED AKHTAR
ASDDUDDIN OWAISI
FAZAL GHAFOOL ( MES)
E SREEDHARAN
MOHANLAL
SURESH GOPI
MAMMOOTTY
SOLI BABY
FALI BABY
KATJU BABY
SALVE BABY
PGURUS
PRAKASH KARAT
SITARAM YECHURY
D RAJA
RANA AYYUB
SHEHLA RASHID
FATHER CEDRIC PRAKASH
ANNA VETTICKAD
ANNIE RAJA
JOHN BRITTAS
FINANCE MINISTER OF KERALA THOMAS ISAAC
JULIO REBEIRO
AK ANTONY
OOMMEN CHANDY
PC GEORGE
JOHN ABRAHAM
WEBSITES OF DESH BHAKTS
SPREAD ON SOCIAL MEDIA EVERY WHICH WAY.
Things which are to be said by a PM is being said a ship Captain.
DeleteWhat prevents PM to say all this which a ship Captain is saying.?
What it takes to say which Captain has said but the PM never dared to say ?
Even after guiding daily if the PM cannot say all what captain says.....
There is some deep flaw.
Respected Sir,
ReplyDeleteWhat is really meant by the saying--
"Pain is inevitable but suffering is optional".
Thank you
THINGS ARE AS THEY ARE..
DeleteWE SUFFER BECAUSE WE IMAGINED DIFFERENT..
WISDOM IS REQUIRED HERE..YOU HOLD SUFFERING.. SUFFERING NEVER HOLDS YOU..
FEAR OF SUFFERING IS WORSE THAT SUFFERING ITSELF..
RICH AND POWERFUL PEOPLE THINK THEY CAN HOLD HAPPINESS. SORRY, HAPPINESS HAS TO ALIGHT ON YOU ARE HOLD YOU..
Respected Sir,
DeleteSo can one avoid suffering if one has no expectations from the person/situation.
How can one avoid suffering.
Thank you
Captain don't you think many crypto Jews will benefit from CAB.
ReplyDeleteJust now I saw on tv, a kapoor guy who was quiet rich in dry fruit business, had large farmhouses, cars had to run from afghanistan due to taliban.
Or is it that many true hindus were also in dry fruit business in Afghanistan?
More and more poor hindus and others will come to India for whom soul harvesters are waiting.
DeleteGovt should introduce prevention of sponsered religious conversion bill if they are not a deep state operators.
ReplyDeletehttps://twitter.com/mvmeet?lang=en
THAT IS HALF BREED SON OF A ITALIAN MAINO JEWESS WHO BECAME EMPRESS OF INDIA VIA NAC..
RAPES / DIVORCE/ LOSS OF VIRGINITY BEFORE MARRIAGE / SEXUAL MOLESTATIONS IN INDIA ARE THE LOWEST ON THE PLANET BY PERCENTAGE-- WE HAVE 1350 MILLION PEOPLE..
PEA BRAIN AND HALF BREED RAUL VINCI IS THE LIAR WHO TOLD US AMBASSADOR TIMOTHY ROEMER THAT RSS IS WORE THAN ISLAMIC ORG LET.( WIKILEAKS )
I WILL PUT A NEW POST ON NAC AND THE ITALIAN MAINO JEWESS ...
ITALIANS DO NOT KNOW THAT HINDUS CIVILIZED ITALY..
http://ajitvadakayil.blogspot.com/2019/08/secrets-of-roman-pantheon-inaugurated.html
capt ajit vadakayil
..
PUT ABOVE COMMENT IN WEBSITES OF--
DeletePMO
PM MODI
LAW MINISTER/ MINISTRY
AJIT DOVAL
RAW
IB
NIA
ED
CBI
AMIT SHAH
HOME MINISTRY
DEFENCE MINISTER/ MINISTRY
ALL 3 ARMED FORCE CHIEFS
CJI BOBDE
ATTORNEY GENERAL
ALL SUPREME COURT JUDGES
ALL STATE HIGH COURT CHIEF JUSTICES
ENTIRE INDIAN MAIN STREAM MEDIA EDITORS
SWAMY
RAJIV MALHOTRA
I&B MINISTER/ MINISTRY
NCERT
EDUCATION MINISTER/ MINISTRY
CMs OF ALL INDIAN STATES
DGPs OF ALL STATES
GOVERNORS OF ALL STATES
PRESIDENT OF INDIA
VP OF INDIA
SPEAKER LOK SABHA
SPEAKER RAJYA SABHA
DAVID FRAWLEY
STEPHEN KNAPP
WILLIAM DALRYMPLE
KONRAED ELST
FRANCOIS GAUTIER
PIYUSH GOEL
NITI AYOG
AMITABH KANT
THE QUINT
THE SCROLL
THE WIRE
THE PRINT
MK VENU
MADHU TREHAN
RAJDEEP SARDESAI
PAAGALIKA GHOSE
NAVIKA KUMAR
ANAND NARASIMHAN
SRINIVASAN JAIN
SONAL MEHROTRA KAPOOR
VIKRAM CHANDRA
NIDHI RAZDAN
FAYE DSOUZA
ZAKKA JACOB
RAVISH KUMAR
PRANNOY JAMES ROY
AROON PURIE
VINEET JAIN
RAGHAV BAHL
SEEMA CHISTI
DILEEP PADGOANKAR
VIR SANGHVI
KARAN THAPAR
PRITISH NANDI
SHEKHAR GUPTA
SIDHARTH VARADARAJAN
ARUN SHOURIE
N RAM
ALL MPs OF INDIA
SRI SRI RAVISHANKAR
SADGURU JAGGI VASUDEV
MATA AMRITANANDA MAYI
BABA RAMDEV
RSS
AVBP
VHP
MOHAN BHAGWAT
RAM MADHAV
MUKESH AMBANI
RATA TATA
ANAND MAHINDRA
KUMARAMANGALAMBIRLA
LAXMI MNARAYAN MITTAL
AZIM PREMJI
KAANIYA MURTHY
RAHUL BAJAJ
RAJAN RAHEJA
NAVEEN JINDAL
GOPICHAND HINDUJA
DILIP SHANGHVI
GAUTAM ADANI
AMISH TRIPATHI
DEVDUTT PATTANAIK
CHETAN BHAGAT
PAVAN VARMA
RAMACHANDRA GUHA
ROMILA THAPAR
IRFAN HABIB
NIVEDITA MENON
UDDHAV THACKREY
RAJ THACKREY
SONIA GANDHI
PRIYANKA VADRA
RAHUL GANDHI
VIVEK OBEROI
GAUTAM GAMBHIR
ASHOK PANDIT
ANUPAM KHER
KANGANA RANAUT
VIVEK AGNIHOTRI
KIRON KHER
MEENAKSHI LEKHI
SMRITI IRANI
PRASOON JOSHI
MADHUR BHANDARKAR
SWAPAN DASGUPTA
SONAL MANSINGH
MADHU KISHWAR
SUDHIR CHAUDHARY
GEN GD BAKSHI
SAMBIT PATRA
RSN SINGH
GVL NARASIMHA RAO
JAVED AKHTAR
ASDDUDDIN OWAISI
FAZAL GHAFOOL ( MES)
E SREEDHARAN
MOHANLAL
SURESH GOPI
MAMMOOTTY
SOLI BABY
FALI BABY
KATJU BABY
SALVE BABY
PGURUS
PRAKASH KARAT
SITARAM YECHURY
D RAJA
RANA AYYUB
SHEHLA RASHID
FATHER CEDRIC PRAKASH
ANNA VETTICKAD
ANNIE RAJA
JOHN BRITTAS
FINANCE MINISTER OF KERALA THOMAS ISAAC
JULIO REBEIRO
AK ANTONY
OOMMEN CHANDY
PC GEORGE
JOHN ABRAHAM
WEBSITES OF DESH BHAKTS
SPREAD ON SOCIAL MEDIA EVERY WHICH WAY.
Respected Sir,
ReplyDeleteSir am on a spiritual journey, listening and watching inspiring things!!it has been incredible so far by God's grace and your blessings....i was living a base and crude life until i stumbled upon your blogs which opened my eyes.you are my Guru and am ever indebted to you and Ma'm.i can give up my life also for you Psst--limited period offer 😊😊.
Am trying to purge my heart of all the muck and impurities aiming for a very cherished and noble goal in my life but it's not at all easy as the vasanas are not that easily wiped out.it is requiring a great deal of patience and perseverance....
Thank you
e Congress on Monday hit back at Home Minister Amit Shah for his remarks that the party had "divided" the country on the basis of religion, alleging that it was Hindutva ideologue V D Savarkar who had propagated the idea of Partition at a Hindu Mahasabha meeting in 1935....Is this congress lying ?...https://www.indiatoday.in/india/story/congress-hits-back-at-amit-shah-says-savarkar-propagated-idea-of-partition-1626847-2019-12-09
ReplyDeletemy friend's daughter, 7 , suffering from acute leukemia . so far only one chemo has been done . is far away from me . can u pl recommend any one simple mantra for her so as she can recite it by herself, or it should be OM .....
ReplyDeletehow can i help her so as she get well soon . she is too young to understand all this . how can we help her ? if her mother recites OM lying beside her , is it ok ? pl tell . thank u so much .
Dear Captain
ReplyDeleteTear in my eyes.. with your 17th Diksha
Words are too less to express gratitude _/\_
God Bless you Captain
Om Namah Shivaya
Capt,
ReplyDeleteDid Wilhelm Reich also conrtribute to cancer research on bions & bacterias and was sidelined by R's Evil Pharma declaring him a crackpot ?
Mentioned here -
http://www.orgonics.com/whatisor.htm
https://www.bibliotecapleyades.net/ciencia/ciencia_reich10.htm
Thanks
Thanks dear Ajit ji , for the latest deeksha . Thanks alot.
ReplyDeleteGuruji,
ReplyDeleteSorry for the off topic question. I live in Sydney and sydney is suffering with sever bush fires . so much of smoke every where offices, homes and streets for almost 3 weeks. Any suggestion to protect from smoke.
Thanks in advance
Sai
https://www.youtube.com/watch?v=io8iE04QU4M
DeleteMY SHIP USED TO GO TO RABAUL ..
WHERE A LIVE VOLCANO SPEWED SOOT..
AT NIGHT WE CAN SEE SPARKS..
DAYTIME YOU CANNOT SEE SPARKS..
IN A 18 HOUR STAY AT BERTH, THE DECK USED TO HAVE TWO INCHES OF BLACK SOOT--IN AS MUCH AS WE LEFT FOOT PRINTS LIKE WALKING ON SAND..
WE PROTECTED MACHINERY SPACES AND ACCOMMODATION SPACES BY PUTTING PAD FILTERS..
YOU CAN EVEN HAVE GAUZE CLOTH AT EVERY WINDOW-- WEAR MASKS ..
THIS IS EL NINO YEARS WITH PLENTY TYPHOONS IN PACIFIC AND FEW HURRICANES IN SOUTH ATLANTIC -- THESE FEW ONES DONT HIT GULF OF MEXICO PORTS BUT DRIFT UPWARDS TO HIT THE US EAST COAST..
http://ajitvadakayil.blogspot.com/2011/02/el-nino-and-la-nina-mariners-overview.html
https://www.youtube.com/watch?v=Her8njlGtQI
RABAUL IS THE ISLAND WHERE JAPS ATE 21,000 INA SOLDIERS FOR DINNER.
http://ajitvadakayil.blogspot.com/2011/08/netaji-subhash-chandra-bose-untold.html
PEOPLE GET NAKED TRUTHS ONLY FROM THIS BLOGSITE..
Dear Captain,
ReplyDeleteThanks a lot for the Deeksha.
Always grateful to you.
Best Regards
Basavaraj
Dear Ajitji,Nithyananda opening up in this latestl video.
ReplyDeletehttps://m.youtube.com/watch?v=gYyQwNIFIlA
Thanks for the Deeksha.
https://m.youtube.com/watch?v=gYyQwNIFIlA
DeleteI HAVE SEEN THE VIDEO WHERE ACTRESS RANJITHA GAVE NITYANANDA A BLOWJOB ON HIS BED..
THESE ARE TWO CONSENTING ADULTS..
SO WHAT?
HOW DOES IT QUALIFY AS RAPE?
AND IN THE VIDEO NITYANANDA APPEARED LEAST INTERESTED IN WHAT RANJEETA WAS DOING TO HIS PRICK IN AS MUCH AS HE WAS YAWNING..
PROBABLY RANJITHA FELT SHE WAS SUCKING PRANA OFF HIS PRICK..
http://www.astroulagam.com.my/kollywood/article/99433/is-former-actress-ranjitha-a-full-time-sannyasin-now
ALL ASARAM BAPUs FOLLOWERS HAVE FALLEN PREY TO CHRISTIAN CONVERSION.. THESE ARE PEOPLE WITH ZERO LIFE SKILLS AND TOTALLY VULNERABLE..
http://ajitvadakayil.blogspot.com/2013/03/holi-celebrations-immoral-attack-on.html
THE INDIAN JUDICIARY HAS FACILITATED CONVERSION OF TRIBALS AND COASTAL FISHERMEN OF TAMIL NADU AND KERALA INTO CHRISTIANITY.. THERE ARE REWARDS FOR THIS..
https://ajitvadakayil.blogspot.com/2019/12/national-prayer-breakfast-where-jesus.html
capt ajit vadakayil
..
PUT ABOVE COMMENT IN WEBSITES OF--
DeleteNITYANANDA
PMO
PM MODI
LAW MINISTER/ MINISTRY
AJIT DOVAL
RAW
IB
NIA
ED
CBI
AMIT SHAH
HOME MINISTRY
DEFENCE MINISTER/ MINISTRY
ALL 3 ARMED FORCE CHIEFS
CJI BOBDE
ATTORNEY GENERAL
ALL SUPREME COURT JUDGES
ALL STATE HIGH COURT CHIEF JUSTICES
ENTIRE INDIAN MAIN STREAM MEDIA EDITORS
SWAMY
RAJIV MALHOTRA
I&B MINISTER/ MINISTRY
NCERT
EDUCATION MINISTER/ MINISTRY
CMs OF ALL INDIAN STATES
DGPs OF ALL STATES
GOVERNORS OF ALL STATES
PRESIDENT OF INDIA
VP OF INDIA
SPEAKER LOK SABHA
SPEAKER RAJYA SABHA
DAVID FRAWLEY
STEPHEN KNAPP
WILLIAM DALRYMPLE
KONRAED ELST
FRANCOIS GAUTIER
PIYUSH GOEL
NITI AYOG
AMITABH KANT
THE QUINT
THE SCROLL
THE WIRE
THE PRINT
MK VENU
MADHU TREHAN
RAJDEEP SARDESAI
PAAGALIKA GHOSE
NAVIKA KUMAR
ANAND NARASIMHAN
SRINIVASAN JAIN
SONAL MEHROTRA KAPOOR
VIKRAM CHANDRA
NIDHI RAZDAN
FAYE DSOUZA
ZAKKA JACOB
RAVISH KUMAR
PRANNOY JAMES ROY
AROON PURIE
VINEET JAIN
RAGHAV BAHL
SEEMA CHISTI
DILEEP PADGOANKAR
VIR SANGHVI
KARAN THAPAR
PRITISH NANDI
SHEKHAR GUPTA
SIDHARTH VARADARAJAN
ARUN SHOURIE
N RAM
ALL MPs OF INDIA
SRI SRI RAVISHANKAR
SADGURU JAGGI VASUDEV
MATA AMRITANANDA MAYI
BABA RAMDEV
RSS
AVBP
VHP
MOHAN BHAGWAT
RAM MADHAV
MUKESH AMBANI
RATA TATA
ANAND MAHINDRA
KUMARAMANGALAMBIRLA
LAXMI MNARAYAN MITTAL
AZIM PREMJI
KAANIYA MURTHY
RAHUL BAJAJ
RAJAN RAHEJA
NAVEEN JINDAL
GOPICHAND HINDUJA
DILIP SHANGHVI
GAUTAM ADANI
AMISH TRIPATHI
DEVDUTT PATTANAIK
CHETAN BHAGAT
PAVAN VARMA
RAMACHANDRA GUHA
ROMILA THAPAR
IRFAN HABIB
NIVEDITA MENON
UDDHAV THACKREY
RAJ THACKREY
SONIA GANDHI
PRIYANKA VADRA
RAHUL GANDHI
VIVEK OBEROI
GAUTAM GAMBHIR
ASHOK PANDIT
ANUPAM KHER
KANGANA RANAUT
VIVEK AGNIHOTRI
KIRON KHER
MEENAKSHI LEKHI
SMRITI IRANI
PRASOON JOSHI
MADHUR BHANDARKAR
SWAPAN DASGUPTA
SONAL MANSINGH
MADHU KISHWAR
SUDHIR CHAUDHARY
GEN GD BAKSHI
SAMBIT PATRA
RSN SINGH
GVL NARASIMHA RAO
JAVED AKHTAR
ASDDUDDIN OWAISI
FAZAL GHAFOOL ( MES)
E SREEDHARAN
MOHANLAL
SURESH GOPI
MAMMOOTTY
SOLI BABY
FALI BABY
KATJU BABY
SALVE BABY
PGURUS
PRAKASH KARAT
SITARAM YECHURY
D RAJA
RANA AYYUB
SHEHLA RASHID
FATHER CEDRIC PRAKASH
ANNA VETTICKAD
ANNIE RAJA
JOHN BRITTAS
FINANCE MINISTER OF KERALA THOMAS ISAAC
JULIO REBEIRO
AK ANTONY
OOMMEN CHANDY
PC GEORGE
JOHN ABRAHAM
WEBSITES OF DESH BHAKTS
SPREAD ON SOCIAL MEDIA EVERY WHICH WAY.
see https://en.wikipedia.org/wiki/Anil_Chopra...(twitter)-Retd Air Marshal, Indian Air Force, Fighter Pilot. QFI. ETP. Former member AFT & Executive Council JNU. India First Always. Writes on #Aviation #Defence....aka a desh drohi attacking the branch that feeds him..why his pension is not stopped..desh drohi judge ngt chair adarsh kumar goel is issuing notice to defenses secretary on environment.. nont their dharma let environment and defense do their swadarma retired am can take sanyas or vanasprastha dharma..NGT summons Defence Secretary over report on compliance of environmental norms by Armed Forces
ReplyDeleteThe NGT seeTime To Go, Ram’: When An Indian Air Marshal Punched Out Of A Mirage 2000
Shiv Aroor Oct 18 2014 5 10 am
https://www.livefistdefence.com/2014/10/time-to-go-ram-when-indian-air-marsha.html
bailed out crashed a valuable asset of desh mirage 2000...
//economictimes.indiatimes.com/articleshow/72439861.cms?utm_source=contentofinterest&utm_medium=text&utm_campaign=cppst
Thanks very much for d deeksha for cancer
ReplyDeleteYours Humbly
Pat
Dear Captain,
ReplyDeleteThanks for the Deeksha. I have been passively following your blog for sometime as I my marriage broke down within 4 months of starting. I had opened my heart to you in a long comment in September which you did not publish but I’m hoping that you read it. I standing on all the gyaan you’ve given so far.
I am vocal in spreading your ideas to my close people at every opportunity.
Ever grateful,
Anish.
Pranaam Guruji
ReplyDeleteDhanyavaad For The Deeksha, It Is A Big One.
Regards
Debdoot Sarkar
THE INDIAN JUDICIARY HAS FACILITATED CONVERSION OF TRIBALS AND COASTAL FISHERMEN OF TAMIL NADU AND KERALA INTO CHRISTIANITY.. THERE ARE REWARDS FOR THIS..
ReplyDeletehttp://ajitvadakayil.blogspot.com/2012/09/bauxite-mining-naxalite-menace-joshua.html
https://ajitvadakayil.blogspot.com/2019/12/national-prayer-breakfast-where-jesus.html
HERE IS A SHOCKER-- PEOPLE CANT THINK DEEP..
WHY DID PRAYER BREAKFAST GROUP ( FAMILY/ FELLOWSHP ) SPONSOR NAC IN INDIA?
THEY WANTED TO CREATE A SITUATION AMONG HINDUS LIKE IN THE TIME OF SIKANDAR BHUTSHIKAN..
THIS WIKIPEDIA ARTICLE IS WATERED DOWN TO SHOW THIS BASTARD IN GOOD LIGHT..
https://en.wikipedia.org/wiki/Sikandar_Shah_Miri
THIS 7TH MUSLIM KING OF KASHMIR , SIKANDAR BUTSHIKAN , WAS THE MOST CRUEL OF ALL THE MUSLIM RULERS WHO INVADED INDIA.
SIKANDAR BHUTSHIKAN MADE HINDUS KAFFIRS ( LESSER HUMANS ) ..
KASHMIRIS WERE PROUD HINDUS, THE LAND OF KASHMIR HAD 100% HINDUS.
KAFFIRS ARE LESSER HUMAN BEINGS WHO ARE CRIMINALS BY DEFINITION BECAUSE THEY ARE NOT MUSLIMS.
LIFE BECASE SO TOUGH THAT HINDUS TO ISLAM CONVERTED FOR SURVIVAL.
IN KASHMIR, SIKANDAR BUTSHIKAN LEVIED BOTH JIZYA AND ZAKAT ON HINDUS.
SIKANDAR BHUTSHIKAN DESTROYED THE MARTHANDA TEMPLE. WHICH WAS MORE MAGNIFICIENT THAN TAJMAHAL.
IT TOOK HIS SOLDIERS 13 MONTHS TO DESTROY THE GLORIOUS 3100 YEAR OLD MARTHANDA SUN TEMPLE OF KASHMIR--SUCH WAS ITS AMAZING STRENGTH WITH HUGE INTERLOCKING STONES..
THIS CRUEL MUSLIM KING AUTHORISED HIS SOLDIERS TO RAPE DEAD HINDU WOMEN WHO TOOK POISON TO ESCAPE CAPTURE. HE HAD ALREADY BANNED ALL HINDUS IN KASHMIR FROM CREMATING THEIR DEAD BODIES.
FOR A HINDU CREMATION AFTER DEATH IS A MUST TO PREVENT THE SOUL BEING TRAPPED ON EARTH.
HE BANNED DANCE, DRAMA, MUSIC AND ICONOGRAPHY AS AESTHETIC ACTIVITIES OF THE HINDUS AND FIATED THEM AS HERETICAL AND UN-ISLAMIC. HE FORBADE THE HINDUS TO APPLY A TILAK MARK ON THEIR FOREHEADS.
HE DID NOT PERMIT HINDUS TO PRAY AND WORSHIP, BLOW A CONCH SHELL OR TOLL A BELL. A HEAVY JIZYA (TAX) EQUAL TO 4 TOLAS OF SILVER WAS IMPOSED ON THE HINDUS.
IF A HINDU WAS CAUGHT IN A MUSLIM DRESS TO ESCAPE CAPTURE, HE WOULD BE TORTURED MOST SEVERELY.
HIS POLICY TOWARDS HINDUS WAS -- CONVERT OR DIE.
THE HINDUS WILL NOT REPAIR TEMPLES
THEY WILL NOT RIDE A HORSE WITH SADDLE AND BRIDLE.
THEY WILL NOT CARRY SWORDS OR BOWS AND ARROWS.
THEY WILL NOT PREVENT MUSLIM TRAVELERS FROM STAYING IN THEIR TEMPLES & SHRINES.
THEY WILL NOT MOURN THEIR DEAD LOUDLY.
THEY WILL NOT BUILD HOUSES IN NEIGHBOURHOOD OF MUSLIMS.
THEY WILL NOT CARRY THEIR DEAD NEAR THE GRAVE-YARDS OF MUSLIMS.
THEY WILL NOT GIVE UP THEIR TRADITIONAL DRESS SO THAT THEY CAN BE DISTINGUISHED FROM MUSLIMS.
THEIR SACRED HINDU BOOKS WERE THROWN INTO THE DAL LAKE BY SIKANDAR BUTSHIKAN . THE PANDITS NUMBERING OVER ONE LAKH ( 100 000 ) WERE DROWNED IN THE DAL LAKE BY HOLDING THEIR HEADS UNDERWATER AND THEN THEY WERE BURNED IN A HEAP AT A SPOT IN THE VICINITY OF RAINAWARI IN SRINAGAR CITY KNOWN AS BHATTA MAZAR BEYOND PRESENT DAY JOGILANKER.
THE WATERS OF THE PLACID DAL LAKE HOLDS ALL THESE MORBID MEMORIES.
HISTORICALLY HINDUS HAVE NEVER ENGAGED PRO-ACTIVELY I VIOLENCE AND DRAWN FIRST BLOOD.. HINDUS HAVE ALWAYS BEEN REACTIVE – TOTALLY EXASPERATED , AND TO AVOID BEING BRANDED AS COWARDS.
GODHRA RIOTS WAS A REACTION, NOT A PROACTIVE ACTION.
CONTINUED TO 2-
CONTINUED FROM 1--
Deletehttp://ajitvadakayil.blogspot.com/2012/11/babri-masjid-demolition-mughal-emperor.html
CAPT AJIT VADAKAYIL WILL WRITE THE LEGACY OF UDDHAV THACKREY, A DROHI..
MARATHA HINDUS DID NOT VOTE FOR THE ITALIAN WAITRESS OF AHMED PATEL ( PAKISTANI, ISI SPONSORED )
http://ajitvadakayil.blogspot.com/2017/11/hindu-holocaust-continues-capt-ajit.html
NAC TRIED TO MAKE HINDUS CONVERT TO CHRISTIANITY/ ISLAM.. YOU CANT EVEN SAY, WE DON’T WANT ILLEGAL BANGLADESI MUSLIM IMMIGRANTS INTO INDIA.
TODAY DESH DROHI COLLEGIUM JUDGES IN DEEP STATE PAYROLL ARE QUOTING ARTICLE 14 TO ALLOW ROHINGYA MUSLIMS INTO INDIA , AND GIVEN INDIAN CITIZENSHIP. SORRY, OUR CONSTITUTION APPLIES ONLY TO LAW ABIDING INDIAN CITIZENS..
I WILL PUT A FULL BLOGPOST ON NAC AND COMMUNAL VIOLENCE BILL.
THE ITALIAN WAITRESS PACKED NAC WITH ANTI-HINDU PEOPLE.. MIND YOU, NAC WAS NOT APPLICABLE IN KASHMIR BECAUSE HINDUS WERE MINORITY THERE..
THE ILLEGAL COLLEGIUM JUDICIARY PLAYED ALL..
WE WILL FORM MILITARY COURTS TO HANG DESH DROHIS WHO SPONOSRED NAC..
Capt ajit vadakayil
..
PUT ABOVE COMMENT IN WEBSITES OF--
DeleteUDDHAV THACKREY
ADITYA THACKREY
SAAMNA
SANJAY RAUT
SHIV SENA
PMO
PM MODI
LAW MINISTER/ MINISTRY
AJIT DOVAL
RAW
IB
NIA
ED
CBI
AMIT SHAH
HOME MINISTRY
DEFENCE MINISTER/ MINISTRY
ALL 3 ARMED FORCE CHIEFS
CJI BOBDE
ATTORNEY GENERAL
ALL SUPREME COURT JUDGES
ALL STATE HIGH COURT CHIEF JUSTICES
ENTIRE INDIAN MAIN STREAM MEDIA EDITORS
SWAMY
RAJIV MALHOTRA
I&B MINISTER/ MINISTRY
NCERT
EDUCATION MINISTER/ MINISTRY
CMs OF ALL INDIAN STATES
DGPs OF ALL STATES
GOVERNORS OF ALL STATES
PRESIDENT OF INDIA
VP OF INDIA
SPEAKER LOK SABHA
SPEAKER RAJYA SABHA
DAVID FRAWLEY
STEPHEN KNAPP
WILLIAM DALRYMPLE
KONRAED ELST
FRANCOIS GAUTIER
PIYUSH GOEL
NITI AYOG
AMITABH KANT
THE QUINT
THE SCROLL
THE WIRE
THE PRINT
MK VENU
MADHU TREHAN
RAJDEEP SARDESAI
PAAGALIKA GHOSE
NAVIKA KUMAR
ANAND NARASIMHAN
SRINIVASAN JAIN
SONAL MEHROTRA KAPOOR
VIKRAM CHANDRA
NIDHI RAZDAN
FAYE DSOUZA
ZAKKA JACOB
RAVISH KUMAR
PRANNOY JAMES ROY
AROON PURIE
VINEET JAIN
RAGHAV BAHL
SEEMA CHISTI
DILEEP PADGOANKAR
VIR SANGHVI
KARAN THAPAR
PRITISH NANDI
SHEKHAR GUPTA
SIDHARTH VARADARAJAN
ARUN SHOURIE
N RAM
ALL MPs OF INDIA
SRI SRI RAVISHANKAR
SADGURU JAGGI VASUDEV
MATA AMRITANANDA MAYI
BABA RAMDEV
RSS
AVBP
VHP
MOHAN BHAGWAT
RAM MADHAV
MUKESH AMBANI
RATA TATA
ANAND MAHINDRA
KUMARAMANGALAMBIRLA
LAXMI MNARAYAN MITTAL
AZIM PREMJI
KAANIYA MURTHY
RAHUL BAJAJ
RAJAN RAHEJA
NAVEEN JINDAL
GOPICHAND HINDUJA
DILIP SHANGHVI
GAUTAM ADANI
AMISH TRIPATHI
DEVDUTT PATTANAIK
CHETAN BHAGAT
PAVAN VARMA
RAMACHANDRA GUHA
ROMILA THAPAR
IRFAN HABIB
NIVEDITA MENON
UDDHAV THACKREY
RAJ THACKREY
SONIA GANDHI
PRIYANKA VADRA
RAHUL GANDHI
VIVEK OBEROI
GAUTAM GAMBHIR
ASHOK PANDIT
ANUPAM KHER
KANGANA RANAUT
VIVEK AGNIHOTRI
KIRON KHER
MEENAKSHI LEKHI
SMRITI IRANI
PRASOON JOSHI
MADHUR BHANDARKAR
SWAPAN DASGUPTA
SONAL MANSINGH
MADHU KISHWAR
SUDHIR CHAUDHARY
GEN GD BAKSHI
SAMBIT PATRA
RSN SINGH
GVL NARASIMHA RAO
JAVED AKHTAR
ASDDUDDIN OWAISI
FAZAL GHAFOOL ( MES)
E SREEDHARAN
MOHANLAL
SURESH GOPI
MAMMOOTTY
SOLI BABY
FALI BABY
KATJU BABY
SALVE BABY
PGURUS
PRAKASH KARAT
SITARAM YECHURY
D RAJA
RANA AYYUB
SHEHLA RASHID
FATHER CEDRIC PRAKASH
ANNA VETTICKAD
ANNIE RAJA
JOHN BRITTAS
FINANCE MINISTER OF KERALA THOMAS ISAAC
JULIO REBEIRO
AK ANTONY
OOMMEN CHANDY
PC GEORGE
JOHN ABRAHAM
WEBSITES OF DESH BHAKTS
SPREAD ON SOCIAL MEDIA EVERY WHICH WAY.
ALL READERS MUST PARTICIPATE
Dear captain, Emailed to several ID's in the list.
DeleteThanks for the deeksha,captain.how to use it?
ReplyDeletePEOPLE WHO NEED IT CAN WRITE IT DOWN ON THEIR HAND -- READ THREE TIMES A DAY..
Deletehttps://www.indiatoday.in/india/story/supreme-court-to-hear-petition-against-hyderabad-encounter-1626563-2019-12-09
ReplyDeleteTo decide upon legality of the encounter.
CAB is likely to go the same way as NJAc unless Shah Modi and company take timely action.
Article 14 is for all and not only citizens of India is the refrain on media esp Toilet paper