Thursday, January 9, 2020

Labour reforms



Before I start, I must tell you that I am against Labor Unions. They make employees inefficient and irresponsible. But, still we should find a way where middle and lower level employees of an organization are fairly paid. Otherwise, there will be huge disparity in the society; with top few percentages of people holding much of their country’s wealth, with the disparity exponentially increasing in the near future.

              The Labor Reform, I am proposing is the salary level for the Primary Hierarchy of a Company, which is the main source of income and the core job, the Company does and for the Secondary Hierarchy of the Company, which does trivial jobs like housekeeping or security for a software Company, unrelated to the core job. Keep in mind that housekeeping is itself is a core job and in primary Hierarchy for super markets and that security is in Primary Hierarchy for Banks. The Primary and Secondary hierarchies never meet and are parallel to each other. The Company can be private or public, salary  in every level of the Hierarchy, should have a Range, whose Center, is twice, thrice or four times, the Center of the Salary Range immediately below its level. Banks may give 2 factor increase in Salary. Software Companies like Microsoft may give 4 factor increase in Salary. The Company can add as many Levels as it wishes, only that the whole Company’s Hierarchical Structure should form a Pyramid.
Example:
             


If in a Bank, Let’s say a Clerk gets a salary, whose Center of the Range is 4 Lakhs per Year. So, the next level in the hierarchy Probationary Officer will get their Center of the Range, the double ( or triple  or Four times, But should be same for the whole Organization ) of the Clerk, which is 4*2 = 8 Lakhs per Year. The Boundaries of Range in every level is calculated by taking multiplication of 2, ( triple or four times, the organization chose) and a constant 5. The Upper Range cut will be 2*5 = 10 % more and Lower Range is 10% less from the Center of the Range. Clerk’s Range of Salary is 3.6 Lakhs to 4.4 Lakhs per Year. Probationary Officers’ Salary Range is 10% less to 10% more of middle 8 Lakhs per Year, got by multiplying Clerk’s mid-Range with 2. Probationary Officers’ range is  7.2 Lakhs per Year to 8.8 Lakhs per Year. Accountant, Cash Officer and Field Officer will get between 14.4 Lakhs per Year to 17.6 Lakhs per Year.
              
Let’s study one more scenario, what if there are more than one Primary Hierarchies. As long as they are not irrelevant Secondary Hierarchies, they should meet at a point. What if , it has different number of levels. Example, There is a Manager for wrist watch in a watch company and he takes care of sales hierarchy, manufacturing hierarchy and research hierarchy. Sales hierarchy has 3 levels, Manufacturing 4 levels and research 2 levels. First, we have to take the vertical that has maximum employees. They will usually have maximum number of levels. Here Manufacturing.  It has 4 levels, replicate it across all hierarchies. Now, Research and Sales will also have 4 levels. In case, it doesn’t need that number of levels, create hypothetical levels. Like if there are Manager, Supervisor and Salesman for Sales Hierarchy. Add one more Level, Deputy Manager or Chief Salesman, wherever you want, only in theory. If you create Hypothetical Chief Salesman, Salesman will be directly promoted to Supervisor, with 4 factor ( in case the watch company chose 2 factor increase in salary in every level up ) increase in salary. You can introduce hypothetical levels anywhere. But the whole organization should form a pyramid.

              If you increase the number of Hierarchies, Mid-Level Employees will be benefitted. If you decrease the number of Hierarchies, Low Level Employees will be benefitted. Both ways, our objective is achieved. Legal system implementing this system just needs to check Income Tax Filing, if it forms a pyramid, that’s all it cares.

Friday, January 3, 2020

Let's stop viruses

I will start with a little knowledge, i have on viruses. First, like Certificate Authorities on Websites, we will provide CAs for softwares. CAs should have a network of all possible necessary framework to validate a type of software, unattached to the internet. After that, it validates a particular version of software from a certain website. If you have got that software from an unknown source, verify it with the CA online. CAs just need to pickup random bits from the original and unknown source, and verify it. Now, we will see e-mail attachments of files and softwares. If i see a file named hello.txt, why would it run, it's purpose is to show u some text. Always open a txt file in an text editor, jpg file in a photo viewer, .mpeg in a video player. E-mails should only see the files as shown to the viewer. Don't care if it's hidden .txt.exe. If it's shown as .txt, open it in a text editor. If you see code in editor, unwanted information or gibberish,  delete the mail. If you see no picture or video, delete the mail. If it's not a clear known viewable type of file extension( .txt, .jpg,.mpeg,.docx), as viewed by the recipient, like .TxT ,. Mpeg, . txt.exe, . mpg.exe clearly tell them it maybe malicious and advice them to delete the mail. If there is standard non- viewable file format allow only to download and not run. After downloading , ask them to verify with the CA. If someone creates a software ( malign with no CA certificate, maybe even few lines of code) and sends it through mail, check with CA. All these for common man, who suffers most damage. Programmers who want to share their code can ignore the warning and execute. If virus or any malicious software is found, both CA and the software firm is accountable. CA software should be installed in the PC and connected to the internet. CA software will first quarantine and read the version and name of the software by getting into the internal bits and after verifying its validity, by the particular CA who verified it, CA software will allow the software to get installed. Of course you can bypass CA, incase you are a programmer. There can be multiple CAs with expertise in different areas, working separately or collaborating incase the software has multiple utilities,  making the probe more worthy. Search in common CA list for the software name and version, go to that CA and verify its validity.

Thursday, January 2, 2020

Access Badge

I saw a video in which kevin says, i went to a rest room and  created duplicate card, by copying it, by some means, which i don't know. If that person enters the building with the card at the entrance, second attempt with a duplicate card by kevin should have raised an alarm. Even if that person enters second, kevin is trapped inside. If you map all the building, we can stop the security breach. You can even know, if security is breached, by recording entries and all the path the intruder has taken. If the employees are given Microsoft calendars, which has the normal working hours and their holidays, Card can be used during those hours, without dynamic passwords, i wrote a blog about, just by using access badge. Other times, use both access badge and dynamic password. Atleast, mark next day's entry time in the calendar, like i will enter the premise tomorrow between 9 AM and 11AM, exit anytime, along with holidays. Standard times for lunch will be without passwords, if you go out. Otherwise, enter with passwords. Anyways, this is just a better way of security, not cent percent fool proof. If say, i don't care about ease of use and want full security. Put Smard cards + dynamic password + face recognition + no double entries, everytime.

I have another simple method to confuse card copying. Provide a two plastic dials, each with 6 to 10 points in the access badge. It will make the badge little thick. You will be assigned a number between 00 to 55, in case of 6 point dial or 00 to 99 in case of 10 point dial. Or instead of dials, lines can be used, the more the lines, the more the numbers. Every time you swipe( inserting inside card reader), it will check the magnetic code and the plastic dials. If both are correct, give access and changes the plastic dial to a random number. Every time you swipe, change the dial to ur assigned number manually and after that, let the reader itself confuse the copier by changing it to a random number. Your effort reduced. Plastic dials, first of all can't be copied. It will not emit any magnetic field. Card Reader will detect the assigned number by the raised plastic mould used. It's like a password, only that you don't waste time on quees and the one behind you, won't peek into ur password. We can use plastic number checks during entry and exit of the building, leaving the rooms inside to check only the magnetic code. Also, we will design, the dial in such a way that no finger prints can find the number. The dial will have a small flat hole. A plastic pen will be provided at the side of the card. Insert the tip of the pen in the hole and rotate it. Without the pen you can't rotate the dial. And the dial will always rotate in one direction. Dial and the card will be at same flat level. Obviously, this technology will not be used in FBI. But if a small or mid-sized company wants security, this is a very cheap, high security method with that cost. Also can be commercially mass produced.