THE INDIAN GOVERNMENT wants to write its own PC operating system (OS) rather than rely on Western technologies.
India's Defence Research and Development Organisation (DRDO) wants to build an OS, primarily so India can own the source code and architecture. That will mean the country won't have to rely on Western operating systems that it thinks aren't up to the job of thwarting cyber attacks. The DRDO specifically wants to design and develop its own OS that is hack-proof to prevent sensitive data from being stolen.
According to the Economic Times in India, the DRDO already has most of the infrastructure to build the OS in place. It has 50 scientists and IT specialists located in New Delhi and Bangalore spearheading a national effort to create the OS.
Dr V K Saraswat, scientific adviser to the Defence Minister said that the OS was needed to protect India's economic framework.
"In today's world where you have tremendous requirements of security on whatever you do ... economy, banking and defence ... it's essential that you need to have an operating system," said Saraswat.
"The only way to protect it is to have a home-grown system, the complete architecture ... source code is with you and then nobody knows what's that," he added.
Sify also reported Saraswat's comments that the OS will be proprietary.
"Though it will be a real-time system with Windows software, source code and architecture will be proprietary, giving us the exclusivity of owning a system unknown to foreign elements and protect our security system," he added.
The news comes as the Indian government, like others, has been leaning on RIM so it can access communications on Blackberry smartphones.
We cannot help but both admire such an ambitious undertaking and wonder how well the Indian government has really thought all this out. We also imagine that it might be a few years before it will be worth asking whether India has actually gotten anywhere with this project. so we can find indian os soon
Monday, October 11, 2010
Subscribe to:
Post Comments (Atom)
Popular Posts
-
H i All, In comparison to the logical structure, which performs administrative tasks, the Active Directory physical structure checks when ...
-
Hi All, guess who is this guy ? He is Jonathan James born in 1983 December 12 turned out to be the worlds most threatening and biggest...
-
Hi All, Most of the hackers are using this tool for finding vulnerablities in the network.Mostly the penetrating tester are using this t...
-
Hi All, HACK your friend's keyboard and make him type "You are a FOOL" simultaneously: First open a note pad and copy the ...
-
Hi All, Want to have a look at the tools which Jester (the one who did a Ddos distributed denial of service) attack against Wikileaks ? j...
-
Hi All, If you are using Internet Explorer, Outlook or any Application, you can get Dr .Watson Postmortem Debugger error. You can also obse...
-
Hi All, In computer storage devices are devided in to 2 types . Those are 1. primary storage devices . 2. secondary storage devices. ...
-
Hi All, Navigating Google search results with keyboard keys is a long awaited feature. Shortcuts will save your time and speed up your wo...
-
Hi All, This list offers hundreds of operating system product and project names, many of them are based on the same operating system more ...
Followers
Disclaimer
All Data and Information Provided on This BLOG is only for Education purposes only.If you done any thing else these in real time the blog is not Responsible.Try all those on your own risk.
IF you find any thing else here as per in violation of copyright law .mail me on srinathceh@gmail.com as soon as possible action will be taken.
IF you find any thing else here as per in violation of copyright law .mail me on srinathceh@gmail.com as soon as possible action will be taken.
No comments:
Post a Comment