"Nah! I don't think that's a right criticism." He said candidly and passionately. It was nice to hear him say that. After all, he steers so many minds on the path of innovation at a staggering scale and impact.
When we asked the good-old question in a chat with Dr. Sundar Krishnamurty, Ronnie & Eugene M. Isenberg Distinguished Professor in Engineering and Department Head, Mechanical & Industrial Engineering, University of Massachusetts-Amherst, his answer was different, reassuring and fresh.
The question, of course, has stayed the same: Why does India look pale when compared to international universities- what makes them do so well and so consistently on academic research?
Dr. Krishnamurty was both quick and sure to argue that Indian institutes are not necessarily back-benchers in the area of research. "I was at IISc Bangalore for a conference some time back and the faculties I met there were quite impressive. A few institutes - 10 to 15 in India- are, in fact, exceptionally good. Like IISc, IIT Kanpur etc."
He, however, did aver that the breadth of work is missing here and the research quality is not comparable when we go down to tier-2 institutes. The A-grade research is not populated enough. "I hope we encourage Indian faculties to get access and learnings with enough resources and time for quality research."
What he suggested here is worth a lot of peer review'. It is much more than a staple citation. Especially if Indian institutes want to break free from the moth-balled cobweb of average and nonconsequential research.
THE WEAK ABSTRACT
ãã®èšäºã¯ DataQuest ã® October 2024 çã«æ²èŒãããŠããŸãã
7 æ¥éã® Magzter GOLD ç¡æãã©ã€ã¢ã«ãéå§ããŠãäœåãã®å³éžããããã¬ãã¢ã ã¹ããŒãªãŒã9,000 以äžã®éèªãæ°èã«ã¢ã¯ã»ã¹ããŠãã ããã
ãã§ã«è³Œèªè ã§ã ?  ãµã€ã³ã€ã³
ãã®èšäºã¯ DataQuest ã® October 2024 çã«æ²èŒãããŠããŸãã
7 æ¥éã® Magzter GOLD ç¡æãã©ã€ã¢ã«ãéå§ããŠãäœåãã®å³éžããããã¬ãã¢ã ã¹ããŒãªãŒã9,000 以äžã®éèªãæ°èã«ã¢ã¯ã»ã¹ããŠãã ããã
ãã§ã«è³Œèªè ã§ã? ãµã€ã³ã€ã³
Is Your Multi-Cloud Environment Zero-Trust Ready?
Tony Velleca, CEO of CyberProof, a UST company, shared his insights on the challenges of implementing zero-trust security in multi-cloud environments. As organizations navigate the complexities of managing multiple cloud providers, Velleca emphasized the importance of achieving unified visibility, policy enforcement, and continuous monitoring to protect sensitive data and prevent cyber threats.
The Toxic Cloud Trilogy
As Indian organisations increasingly migrate to the cloud, they face a complex and evolving security landscape. Ari Eitan, Director of Research at Tenable, highlights the \"Toxic Cloud Trilogy\" - a convergence of publicly exposed workloads, critical vulnerabilities, and over-privileged identities - as a critical threat to Indian organisations. In this interview, Eitan discusses the unique vulnerabilities of cloud environments, systemic issues preventing organisations from fully addressing weaknesses and practical steps Indian organisations can take to mitigate these risks.
The Cloud Back-Flip
Not everyone who walks away from the queue of a big roller-coaster is faint-hearted. Sometimes, one just knows what suits one best
Sovereign Data, Shared Responsibilities
Data sovereignty-the principle that data is subject to the laws and governance of the country where it is generated-has become a defining issue of the digital age. With globalisation driving cross-border data flows and technological advancements reshaping industries, governments and organizations alike are navigating complex regulatory landscapes.
When Network Threats Are Not Allowed to Check-in
Like elevators, networks in this hotel are segregated for guests, for service, and locked for outsiders unless they prove bona fide. Does this approach work?
Does Santa Claus watch when you pay rent on time?
If yes, what kind of diary does he use to distinguish good kids from delinquent ones? And what stockings can you hang to translate this good behaviour into rewards home loan discounts, prop-tech speed, landlord KYC or more?
The Future of Machine Identity
The biggest challenge today in the digital security sphere is securing machine identities -the digital entities such as APIs, software applications, and IoT devicesthat are constantly being targeted due to the changing nature of cyber threats.
EPAM's Bold Leap: Transforming Business with Al-Driven Salesforce Solutions.
Siba Padhy, Head of Salesforce Business, EPAM Systems highlights how Salesforce has evolved from a core sales solution to a comprehensive platform that encompasses service, marketing, and commerce, with a significant emphasis on leveraging AI technologies, particularly the newly launched Agentforce and Einstein GPT. Padhy discusses the burgeoning agent tech economy in India and EPAM's strategic focus on delivering tailored solutions that address specific market needs. With ambitious growth targets, EPAM aims to double its Salesforce expertise in the coming years, positioning itself as a key player in driving digital transformation across various industries.
Transforming Cybersecurity - Qualys' Vision for Resilient, Real-Time Security
As the digital age accelerates, so does the sophistication of threats. In an illuminating conversation, Deb Jyotiprakash, MD-India ASEAN, Qualys, shares insights on creating robust cybersecurity solutions that cater to diverse client needs, from small fintech firms to large enterprises and governmental bodies. Minu Sirsalewala, Executive Editor, Dataquest, deliberate Qualysâ unique approaches to risk management, cloud neutrality, and industry-leading compliance strategies.
Drones for Defence
The Indian government's policy reforms and regulatory framework have played a crucial role in fostering growth in the defence manufacturing sector. The \"Make in India\" initiative, coupled with the Defence Procurement Procedure (DPP) 2016, has encouraged domestic manufacturing and indigenization. The government's decision to raise the Foreign Direct Investment (FDI) cap to 74% under the automatic route has further facilitated foreign collaborations.