Bhopal: Such incidents bring IT-enabled industry to disrepute said Experts

Bhopal: Such incidents bring IT-enabled industry to disrepute said Experts

Staff ReporterUpdated: Thursday, May 30, 2019, 09:13 AM IST
article-image

BHOPAL: With the state Anti-Terrorism Squad (ATS) arresting 15 persons for supplying strategic information to the Pakistan’s ISI, the entire Information Technology (IT) sector seems to have come under a cloud.

Though the IT Act is in place to keep an eye on the sector vis-à-vis adherence to rules and regulations but it has many lacunae and loopholes.

There are a number of outsourcing units which are working in the country like Knowledge process outsourcing (KPO), Technical Process Outsourcing (TPO) and Business Process Outsourcing (BPO).

They get work in bulk in the form of PDF documents and they have to convert them into text form. Employees get reasonable salaries.

The main work in IT cities like Bangalore is transcription and it not restricted to only Bangalore and the metro cities. On the contrary it has spread in second and third tier cities in the country. IT students get jobs easily with BPO, KPO and TPO.

BPOs usually deal with fringe business activities such as customer care, finance and HR and at the same time, the USP of a BPO is their being cost effective. Companies usually outsource such processes to BPOs which are not directly linked to its value chain. And the motive behind such outsourcing is directly linked to cost reduction. On the other hand, highly specialised and knowledge based services are outsourced to KPOs. These activities are directly related to core offering of parent company.

As per an IT expert, work is outsourced in bulk and the staff has to convert the documents into text form. It is not possible for anyone to scan or monitor thousands of transcribed text as the work is done electronically.  Each and every PDF or picture file is converted into text form with the help of software. Those handling the job have nothing to do with what kind of text is.

Secondly, physical address and IP address of computers systems should not be changed. In case, need arises to change them, there must be proper document and other verification.

 It will help establishing their identities.

 Every network device has two types of addresses one called the logical address — in most cases this is the IP address — and the other one being the physical address — also known as the MAC address.

The IP address is an address bound to the network device, i.e. computer via software. In a Windows-powered computer, the Windows operating system allows the user to configure the IP address for the specific workstation.

This IP address is used to allow all network-aware programmes i.e. Internet Explorer, Netscape, Outlook etc. to use this address when communicating with other hosts.

The seventh layer in the OSI model has the IP addresses

With the arrest of 11 youths for their alleged ISI links, there is a need for the union government to ensure the identity of employers who get job in bulk from various countries and then “sublet” them to BP0, TPO and KPO which have been opened in second and third tier cities generating job for many IT professionals.

RECENT STORIES

MP Lok Sabha Elections 2024 Phase-1: 63.25% Turnout Till 5 pm

MP Lok Sabha Elections 2024 Phase-1: 63.25% Turnout Till 5 pm

Lok Sabha Elections 2024: Brides Cast Ballot Before Bidaai

Lok Sabha Elections 2024: Brides Cast Ballot Before Bidaai

Lok Sabha Elections 2024: Cyber Crooks Dupe 35 Bhopalites On Pretext Of Adding Name In Voters’...

Lok Sabha Elections 2024: Cyber Crooks Dupe 35 Bhopalites On Pretext Of Adding Name In Voters’...

Bhopal: IISERs Open Admissions For 2024-25

Bhopal: IISERs Open Admissions For 2024-25

Kingpin Of Flesh Trade Racket Held In Connection With Call Girl's Murder

Kingpin Of Flesh Trade Racket Held In Connection With Call Girl's Murder