Connect with us

Published

on

Two loco pilots to run the trains till passengers grow accustomed to its operation

The Hyderabad Metro Rail (HMR) will have two drivers, one in the front cabin for the onward journey and the other in the rear cabin for the return direction. But wait! Is this not supposed to be the first metro rail system in the country to adopt the Communication-Based Train Control (CBTC) technology for all the three corridors?

The metro rail authorities have been talking about the CBTC ever since the project work commenced. Then why should there be any loco pilots at all to run the metro trains? When this was asked to HMR managing director N.V.S. Reddy, he had an interesting answer.

“The L&T Metro Rail Hyderabad (L&TMRH) has deployed the latest technology available for the metro rail system through CBTC and this can enable automatic train control operations, but for now, we will not be using the technology to the fullest,” he explained.

Pray why? Apparently, when the technology was first used in the metro rail system in Europe without any loco pilot on an experimental basis a few years ago, passengers panicked thinking it was a ‘ghost train’ and tried to jump off it!

However, Mr. Reddy said in some of the advanced nations, the CBTC system was being used to the fullest and the metro train services were being run without the loco pilots. “What the loco pilots do in our trains is to keep a close watch on the happenings in the trains and at the stations,” he said. They can also operate the opening and closing of the doors, which are generally done automatically.

The trains would be controlled and monitored from the state-of-the-art Operation Control Centre (OCC) at Uppal depot, also with a back up centre where the giant display panel would indicate the trains’ movement on all the corridors along with their current locations.

In the unlikely event of the CBTC failure, a fallback system has been put in place as a secondary train detection system. While the Automatic Train Operation (ATO) is the normal mode of operation of trains, the Automatic Train Protection (ATP) system continuously monitors the safe train operation and initiates necessary action if a train does not respond as expected, according to L&TMRH officials.

The HMR MD said over a period of time, once the passengers get used to the trains’ operations, they would likely be run without the loco pilots.

Article Source : thehindu.com

Continue Reading
Click to comment

You must be logged in to post a comment Login

Leave a Reply

Tech

Major Challenges of Setting up a Secured Cloud Computing Environment (And it’s Solutions)

Published

on

By

The twenty-first century brought with itself great advances in computing and technology. Of these, Cloud Computing has been one of the most dominant ones. By offering pooling of resources, a wide network access, on-demand self-service, measured service, and flexibility, it has emerged as a preferred alternative for storing information and utilizing assets across a network. Further, it is available to users in various models like PaaS or Platform as a Service, IaaS or Infrastructure as a Service, and SaaS or Software as a Service. Today, we will explore the major challenges of setting up a secure cloud computing environment and offer some workable solutions around them.

Security-Related Challenges while setting up a Cloud Computing Environment

  • The possibility of a data breach
  • Vulnerability to DDoS (Distributed Denial of Service) attack
  • The need to ensure that information flows across the entire network in a secured manner
  • Management of vulnerabilities or bugs in the system
  • User account getting hijacked
  • Presence of APT parasites
  • Factors leading to the loss of data
  • Risks associated with multiple tenants of the cloud
  • Interfaces or APIs getting hacked

If we were to sum it up, then ensuring a secure Cloud Computing network would involve taking all the security measures for an on-site server in addition to Cloud-related security measures. Let’s look at some ways in which you can manage the security challenges.

1. A written document about the Security Policies

Before availing the services of a Cloud provider, make sure that you ask him to share a written document which details the policies and plan pertaining to the security of the Cloud. This will help you understand the approach towards security and offer an assurance about the priority assigned by the provider to the security of his services.

2. Introduce Multi-factor authentication

While all user accounts have a password, it is usually not enough to secure their accounts. Hence, it is necessary to have multi-factor authentication set up to keep hijacking at bay. Apart from the password, the users must input an OTP as an added layer of security.

3. Encryption and Security Tools

This is a no-brainer. Use the latest available encryption technology, antivirus, and antimalware tools. You can also introduce a firewall if necessary.

4. Regular Backups

Backups are the fall-back option in case of any disaster. While most cloud providers offer a backup option as a part of their services, it is important to regularly take your own backup too. If you are making a lot of changes to the system every day, then you must back up on a daily basis too. And remember, your backups need encryption as well.

5. Choice of the Cloud model

There are many types of Cloud models available today like private clouds, public clouds, multi-cloud systems, and hybrid clouds. You must choose the model which is best suited to your activities. For example, if your cloud computing system would deal with a lot of critical and confidential information and low volumes, then a private cloud would be ideal for you. On the other hand, if the data is not so confidential and the volumes are very high, then you might want to opt for a public cloud. A hybrid cloud and multi-cloud systems offer you the flexibility to create a computing environment tailored to your needs.

Conclusion

Cloud computing is used in an array of services like Cloud storage platforms, Cloud Hosting services, Cloud communication systems, etc. In many cases, the entire organisation’s data relies on the security of the Cloud environment. Follow these tips and ensure that your cloud computing environment is secure. Do let us know about the tools that you use to keep your Cloud environment secure in the comments section below.

Continue Reading

Tech

What Are the Ways You Can Recover Files from The Recycle Bin?

Published

on

By

Recover Files from The Recycle Bin

If you have accidentally deleted your important files, then recycle bin is the only hope left to recover them.  You can locate your file when it has not been completely deleted by you. One of the most relieving things is that the file pointer even after getting deleted continues to be present on the hard drive. This happens even after emptying the Recycle Bin. To help you in the recovery process, we are providing you step by step instructions that will help you easily recover your deleted files from the system.

How does the file get restored when emptied the recycle bin?

Whenever you delete any file, it goes to the Recycle Bin. By right clicking on the deleted file, you can restore it back to its original location. However, the case complicates when you accidentally empty the entire Recycle Bin content? Now how to recover deleted file?

Recovery of the deleted file is still possible. Even on emptying the Recycle Bin, the reference of the master file gets removed but not the data. So, it is important to perform the file recovery steps from empty recycle bin. There are a few manual steps stated below that when implemented would lead to recovery of the file.  

Restore from its previous versions

  • Go to the folder from which you deleted the file. Right click on it
  • Now choose the option “Restore earlier versions”
  • Select the desired previous version and click on “Restore” option
  • In this way recover file from bin manually

Switch on “System Protection”

This is another way to recover your deleted files from earlier versions.

  • Visit Control Panel
  • Now choose system and click “System Protection” located in the right window
  • The system will provide a listing of all the available hard disk drives with protection
  • Choose the specific drive and then click on “configure”
  • Choose “Restore system settings and earlier file versions”
  • Click on OK and recover your lost file.

Restore using Windows Backup

You can even recover your file using the Backup utility of Windows OS. To restore data from your backup, you will need to perform below mentioned steps, such as

  • Click on Control Panel and then choose “System and Security
  • Click on “Restore my files”
  • There are a few easy steps that you need to follow to ultimately recover your deleted file

Use a trusted file recovery software

You can use a file recovery software to recover your data even when it is not found in the bin. Data recovery software for Windows comes with powerful abilities to reliably and efficiently recover files data from corrupted and formatted storage devices, emptied Recycle Bin, and inaccessible partitions.

Regardless of the type of data, this file recovery software lets you recover your lost valuable photos, music, video and other critical documents. By safely download and installing this software, you can get your deleted files recovered.

Conclusion

Till your file does not get overwritten or completely deleted from the system, it can be recovered. All these above steps would assist you in recovering deleted files from emptied recycle bin.

Continue Reading
Image result for gif banner

Trending

Copyright © 2018 FB-MR - Mr.Full Broadcast Team