In 176 BC, the Yuezhi were driven from Tarim Besin to westward by the Xiongnu, a fierce people of Magnolia.
The Yuezhi under the leadership of the Kushanas came down from Central Asia and swept away all earlier dynasties of the Northwest in a great campaign of conquest. They established an empire which extended from Central Asia right down to the eastern Gangetic basin.
In Bactria, they conquered the Scythians and the local Indo-Greek kingdoms, the last remnants of Alexander the Great's invasion force that had failed to take India.
From this central location, the Kushan Empire became a wealthy trading hub between the peoples of Han China, Sassanid Persia and the Roman Empire.
Roman gold and Chinese silk changed hands in the Kushan Empire, at a very tidy profit for the middle-men.
In 176 BC, the Yuezhi were driven from Tarim Besin to westward by the Xiongnu, a fierce people of Magnolia.
The Yuezhi under the leadership of the Kushanas came down from Central Asia and swept away all earlier dynasties of the Northwest in a great campaign of conquest. They established an empire which extended from Central Asia right down to the eastern Gangetic basin.
In Bactria, they conquered the Scythians and the local Indo-Greek kingdoms, the last remnants of Alexander the Great's invasion force that had failed to take India.
From this central location, the Kushan Empire became a wealthy trading hub between the peoples of Han China, Sassanid Persia and the Roman Empire.
Roman gold and Chinese silk changed hands in the Kushan Empire, at a very tidy profit for the middle-men.
This presentation is prepared for the Graduation students to get basic idea and general information’s regarding the topic. Overall content of presentations is not through and complete, also required further additions.
Ramayana and Mahabharata, the two great epics of India, have captivated the hearts of its people for several millenniam
Hindu tradition has always considered these two epics as itihasa (verily did it exist thus) or history.
Modern scholars have largely conceded that the core of the epics could have had a historical basis
Full & Final and the Most Conclusive Dating of the Mahabharata War in 827 BCE, as proved against the parameters of Archaeology and Astronomy (Double Eclipse Pair, Planetary Positions).
I take the Archaeological + Astronomical approach to discover the war year at 827 BCE with the archaeologically supported time range for Mahabharata war. The mystery of planetary positions given by Ved Vyasa which has kept everyone confused for many centuries has been finally solved.
The planetary positions given by Ved Vyasa are demystified the moment we abandon the Non-vedic Charts of 12-Sign Zodiac and analyze the given planetary positions on the Vedic Nakshatra Chart which is none other than the Sarvato Bhadra Chakra (SBC).
This presentation is prepared for the Graduation students to get basic idea and general information’s regarding the topic. Overall content of presentations is not through and complete, also required further additions.
Ramayana and Mahabharata, the two great epics of India, have captivated the hearts of its people for several millenniam
Hindu tradition has always considered these two epics as itihasa (verily did it exist thus) or history.
Modern scholars have largely conceded that the core of the epics could have had a historical basis
Full & Final and the Most Conclusive Dating of the Mahabharata War in 827 BCE, as proved against the parameters of Archaeology and Astronomy (Double Eclipse Pair, Planetary Positions).
I take the Archaeological + Astronomical approach to discover the war year at 827 BCE with the archaeologically supported time range for Mahabharata war. The mystery of planetary positions given by Ved Vyasa which has kept everyone confused for many centuries has been finally solved.
The planetary positions given by Ved Vyasa are demystified the moment we abandon the Non-vedic Charts of 12-Sign Zodiac and analyze the given planetary positions on the Vedic Nakshatra Chart which is none other than the Sarvato Bhadra Chakra (SBC).
History and Calculation of Time as per Ancient Indian TextsBalaji Gorantla
Every year we celebrate new year on 1st Jan. This calculation started 2013 years ago.
However, Ancient Indians had a deeper perspective and knowledge about time in relation to the entire cosmos.
As we venture to celebrate the dawn of new year 2014, let us gain an understanding of this time tested perspective about time.
A Presentation on the Book - Hinduism: The Eternal Tradition by David Frawley, explaining the aspects of Hinduism in a lucid manner, appropriate for modern and western audiences.
“The stupa was one of the most characteristic remains of the Buddhist world; they are not found in Hinduism at all.
In function we may view them as a specialized type of tumulus:
They were circular in shape, with a domed top.
They were built to cover the relics of the Buddha, his earlier followers, or some other essential symbol of the Buddhist religion.
It might be recalled that the Buddha was Śākyamuni (‘Sage of the Śakyas’, i.e. the Sakas)….
To the stupas were carried offerings, often letters, while the devoted performed their rituals, walking around the shrine keeping their right shoulders (pradaksina) toward the stupa.
The stupas spread with Buddhism to China and Japan and linguistically, Sanskrit stūpa gave Prākrit thūpo which the Chinese variously treated as *tabo or *sutab/po, now simplified to tā ‘pagoda.’”
Presentation made by B R Mani at the International Seminar on Mahabharata organized by Draupadi Trust in April 2012 at New Delhi. The presentation on excavations around Rajgir in Magadha combines old and more recent data, history, and information from the Mahabharata and Puranas.
Similar to Mahabharata Historicity by Prof. B B Lal (20)
Presentation given by Vaniki Joshi of IIIT Allahabad in the final round of Symposium-the youth parliament, at IIT Roorkee in February 2006 organized by SFIH.
Presentation given by Rasaal Dwivedi of NIT Raipur in the final round of Symposium-the youth parliament, at IIT Roorkee in February 2006 organized by SFIH.
Presentation given by Rahul Gupta of IIT Kanpur in the final round of Symposium-the youth parliament, at IIT Roorkee in February 2006 organized by SFIH.
Presentation given by R Narayanan of St. Josephs College of Engineering, Chennai in the final round of Symposium-the youth parliament, at IIT Roorkee in February 2006 organized by SFIH.
Presentation given by Manvendra Davar of NIT Kurukshetra in the final round of Symposium-the youth parliament, at IIT Roorkee in February 2006 organized by SFIH.
Presentation given by Girish Singhi of Netaji Subhas Institute of Technology, Delhi in the final round of Symposium-the youth parliament, at IIT Roorkee in February 2006 organized by SFIH.
Presentation given by G R Kartikeya of Lakhmi Narain College of Technology, Bhopal in the final round of Symposium-the youth parliament, at IIT Roorkee in February 2006 organized by SFIH.
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
2. THE PROBLEM
• There are two extremely divergent views
about the historicity of the Mahabharata.
• To the faithful, everything mentioned in
the text is true to the very letter. To some
others, it is a mere figment of imagination.
The reason for such a confusion lies in the
very nature of the epic itself. Say, for
example, if Krishna was a historical figure,
he is unlikely to have been later than
Buddha who lived in 6th -5th centuries BCE.
3. THE PROBLEM (Contd.)
• On the other hand, parts of the text may
be as late as the 4th Cent. CE, since it
refers not only to the Greeks and Romans
but also to the Huns – what an yawning
gap between the event and the text!
• Secondly, the Mahabharata, as available
now, comprises over 100,000 verses, but
earlier it consisted of 24,000 verses and
called the Bharata. Still earlier, it had only
8,000 verses, called the Jaya. Thus, what
indeed is the original can’t be determined.
4. THE PROBLEM (Contd,)
• Thirdly, let it not be forgotten that the
Mahabharata was not meant to be a
history book. It is an epic (prabandha-
kavya) and the poet enjoyed absolute
liberty to let his imagination fly high. Thus,
one cannot question his use of
superlatives while describing the palaces
or the strength of the armies on the
battlefield or the supernatural weapons
used by them.
5. THE APPROACH
• As an archaeologist, I thought that a way
to ascertain the truth might be to explore
and excavate sites associated with the
Mahabharata story and find out what
these have to say in the matter.
• In this context, a very important point to
note is that all the Mahabharata sites,
luckily, continue to bear the same names
even today as they did in antiquity, e.g.
Hastinapura, Mathura, Kurukshetra, etc.
6.
7. HASTINAPURA– THE KEY
SITE
• Way back, in 1951-52, I conducted
excavations at the key site of Hastinapura,
the capital of the Kauravas, located on the
right bank of the Ganga, in Meerut Distt,
Uttar Pradesh, some 60 miles north-east
of Delhi.
• The results were very startling, as we shall
see from the slides that follow.
8.
9.
10.
11. Claims of the PGW Culture
• At this point, it needs to be emphasized
that it is the Painted Grey Ware
Culture which is the lowest common
denominator at all the sites
associated with the Mahabharata
story referred to earlier and shown
on the map. In fact, even sites
associated with the story through
verbal tradition have yielded remains
of the Painted Grey Ware Culture.
12.
13.
14.
15.
16.
17.
18.
19.
20.
21.
22.
23.
24.
25.
26.
27.
28. Archaeology vis-à-vis the Texts
• In the context of the archaeological evidence of
a flood having destroyed Hastinapura, the texts
aver:
• Gangayapahrite tsmin nagare Nagasahavaye
• Tyaktva Nichaksur nagaram Kausambyam sa
nivatsyati
• i.e. ‘When the city of Nagasahvya (Hastinapura)
is carried away by the Ganga, Nichakshu (the
then ruler) will abandon it and dwell in
Kausambi.’
• And the archaeological evidence corroborates it.
29.
30. Chronological Horizon of the
Mahabharata War
• We now come to the most crucial issue,
viz. the probable date of the Mahabharata
War.
• As mentioned in the texts, it was during
the time of Nichkshu that the capital was
shifted from Hastinapura to Kausambi.
• The texts further tell us that (a) Nichakshu
was 5th ruler in succession from Parikshit
who ascended the throne after the War;
31. Chronological Horizon (contd.)
• and (b) amongst the rulers at Kausambi
Udayana was 19th from Nichakshu.
• Hence Udayana was the 24th ruler after
the War. Further, it is well known that
Udayana was contemporary of Buddha
who passed away in 487 BCE. Thus, in
broad figures, Udayana may have ruled
around 500 BCE.
• The next question is: What was the total
duration of the reigns of these 24 rulers?
32.
33. Chronological Horizon (contd.)
• If we round off the 13.55 years average
per ruler to 14 years or even extend it to,
say, 15, the date of the War would work
out as follows:
• 24 (rulers) x 15 years (average reign per
ruler) = 360 years.
• If we add this number, 360, to 500 BCE,
when Udayana was ruling, we arrive at
the date of 860 BCE for the War.
34. Chronological Horizon (contd.)
• This is not to say that the War took place
exactly in 860 BCE. It is a figure arrived at
from a combined evidence of archaeology
and literature. We may further round it off
to circa 900 BCE, but perhaps no more!
• I would be failing in my duty if I did not
mention dates (all in BCE) assigned by
other scholars to the War: 1424(K.P.
Jayaswal); 1400(A.S.Altekar); 950 (F.E.
Pargiter); 9th cent. (H.C.Raychaudhury).
35. Chronological Horizon (contd.)
• I have commented on these dates in my
various papers and would not like to
repeat the same here. But I would
certainly like to say a few words about
3102 BCE, based on a lonely inscription at
Aihole dated to Saka year 556 i.e. 634-35
CE. This date, however, seems to be
supported by astronomical data in the
Mahabharata, as interpreted by Prof.
Narhar Acharya.
36. Chronological Horizon (contd.)
• My difficulty in accepting this date is that
around 3102 BCE (nor even for another
1000 years to come) none of the sites
associated with the Mahabharata story
was in existence – be it Hastinapura or
Indraprastha or Mathura, as established
by the excavations at these sites. How
can then we enact the Mahabharata story
without these sites having been there?
Can we?
37. Chronological Horizon (contd.)
• There is yet another way of looking at the
figure 3102 BCE. As seen earlier, there
were 24 rulers from Parikshit, who
ascended the throne after the War, to
Udayana who ruled around 500 BCE. This
gives an average of 108 years per ruler:
3102 - 500 = 2602, divided by 24 = 108.
• Nowhere in the entire world has there
been such an average per ruler. Has there
to be a special case for India ?
• Let the learned audience think and decide!
38. • Thank you very much for your patient
hearing.