Wednesday 23 July 2014

Kindle Unlimited

The popular electronic e-commerce Major Amazon will be offering its customers an unlimited access to reading and listening for $9.99 per month, the service which would be called Kindle Unlimited is expected to increase the growth rate of Amazon by offering customers access to its more than 600,000 books and audio books  Amazon will be initially offering a 30 day free trial service for its customers and the service would be available for Kindle, i OS and Android operating phones.


The company is required to attract well-known publishers for this service to gain popularity and also has to overcome peer pressure from start up firms. Amazon has included its best sellers like the Harry Potter Series, the Lord of Rings and the Hunger Game series to this soon to launch service. Amazon which has recorded low profits in the past has been trying to launch new services and is hoping to increase its sales by attracting customers to the new Kindle Unlimited, where customers can easily access the required author or genre of books and start reading.

Tuesday 22 July 2014

Ethical Hacking

Ethical Hacking is breaking into the Computer information system to identify any loopholes and rectify the system and to report any vulnerability in the system, it is Legal and these hackers possess certain skills which are put to use as per the requirement. Ethical hacking helps an individual identify potential threats on the computer or network.

Hackers are divided based on their knowledge as

Coders: They are extremely skilled people with good programming knowledge and who know what they are doing. Good understanding of coding and the outcome of the code.
Admins: They are aware of what is expected of them, they make the work of coders easy by monitoring and guiding, they do not have knowledge of coding.
Script Kiddies: They are basically hackers with little experience and do not know the outcome of coding, sometimes could cause severe damage due to their lack of experience.

Hackers based on their Legality

White Hat Hackers: A hacker who specializes in testing and security methodologies, licensed to work with high pay scales, the good hacker.
Black Hat Hackers: Dangerous people with a wrong intent to earn money or destroy the security system, he is the bad hacker. They could be anybody from the coders, admins or script kiddies.
Grey Hat Hackers: This hacker generally involves himself in good and bad activities could be a white or black hat, and mostly could be the ‘admin’, as he has the opportunity to indulge in such activities.

Hacking with a malicious intent is ‘Cracking’, and it is used by breaking into Computer Systems for personal or commercial gains, for posting harmful or malicious content causing damage to the information and systems.

The important measures to be taken to avoid hacking with a malicious intent are adopting certain Security and counter measures, using effective Anti-Viruses, properly logging out after using mails, opening the browser manually, refraining from opening any spam files and maintaining proper password protection for all the administrator accounts. 

Tuesday 15 July 2014

OSI and TCP/IP

The OSI model is a model which explains the way computers communicate with each other over a network; it uses a seven layered approach to transmit data, the layers being physical, data link, network, transport, session, presentation and application, the data flows down the transmit layer over a physical link, and finally passes through the receiver layer. The TCP/IP is also a layered model but does not use all of the layers as in the OSI model, the network protocol model is similar to layer 3 of the OSI model, the combination of the 5th, 6th and 7th layers of the OSI model is similar to the application layer and the host-to-host layer is similar to the 4th layer of the OSI model. A fiber media convertor is a networking device used to connect two media types which are not similar like a twisted one with fiber optic cable, they are significant in connecting fiber optic cable systems with the already existing copper based systems and the structured cabling systems.
          A network address is used to identify a computer on the network, when used properly computer can find the addresses of added computers on the same network, and can be used to send messages to these computers, the most used example of a network address is the Internet Protocol (IP) Address. The network protocol is a set of rules which a computer follows when data is exchanged in a computer network, a few examples of network protocols are FTP, HTTP, SMTP, Telnet, HTTPs, Bluetooth, OSI and RTPS protocols etc,. WAN (Wide Area Network) is a network that covers a larger area which uses telecommunication lines that are leased. LAN (Local Area Network) is a network used to connect computers in a small area which maybe at home, office or a computer lab for example, an Ethernet. Network security is the steps or approaches taken by a network administrator to avoid misuse, illegal access to the network, and ability to modify a computer network. Tools that are used for network troubleshooting are very important for every administrator to troubleshoot different conditions of working some of the troubleshooting tools are Ping, IPConfig, Trace route, Netstat, NS lookup, Subnet, Netstat, Mtr and Route. All the above discussed topics are extremely important to understand the working, data exchange and networking of a computer.

          Data communications and Network systems are used for computers to communicate with each other, computer networking systems are widely used in many fields like accounting, sales and many others, the job of a system analyst it to communicate with other computer systems for sharing information among them. Email and internet are most extensively used at homes, offices and in individual businesses, designing the hardware and software for computer usage for data exchange is a part of data communications and Network systems. The growing demand for computer analysts who have in depth knowledge in Data communications and Network systems itself is proof enough that internet and email play a major role in everyday life.

Friday 11 July 2014

Why did Brazil Lose?

Brazil losing to Germany by 7-1 goals in the Semi Finals of the ongoing FIFA world cup came as a huge shock to the numerous fans and the team themselves. The reasons for the much acclaimed team to lose can be many, but the most glaring reason could be the absence of their most coveted player Neymar out of the game with a vertebrae injury. Neymar with his great talent as a skillful scorer was the most wanted person on the team during the match against Germany, but the Brazilian team had to play without him due to his injury. And adding further insult to injury was the manner in which Thiago Silva got himself suspended by being awarded two yellow cards, his absence as a defense player was also very obvious. And even the talented players like Ramires and Willian also could not fill the gap left by Neymar, they were totally at a loss when it came to scoring goals.

What was most evident was the lack of confidence, connection and spirit in the Brazilian team during the semifinal match, the players were not up to their mark and could not stop Germany from making the goals, and the German goal keeper turned out to be an excellent show stopper. All the hopes of millions of fans and the Brazilian government who invested so much money on their players came crashing down with Brazil losing badly to Germany. What was most apparent in the Brazilian team was the total lackluster play and inability to put up any defense, which along with the absence of two of their most sought after players and a strong and confident German team, was the main reason for them to lose.

Thursday 10 July 2014

Customary/Traditional Management

The old style of management follows a very disciplined and systematic style of working, in which the employees have no say in any matters and this sort of management is mostly seen in government and some private agencies. The management is usually not concerned with the well-being of their employees which may result in heartache for them towards the management, which further leads to the employees not performing their best at work, which in turn affects the quality of the work. Traditional leaders do not encourage knowledge sharing or discuss with their employees; they tend to believe that they have the power to be authoritative and usually do not encourage suggestions from their employees. When the employee’s performance at work is excellent also, the management fails to recognize or even fail to express their pleasure towards the employee in this kind of management.
In a modern organization the working is mostly fast paced and challenging and usually decisions have to be taken on the spot, for this sort of working environment the traditional style of management would be a restriction to progress. The management of such high profile organizations should be more flexible and collaborative and employees above managerial level should be given the freedom if necessary to take decisions on their own as required which benefit the organization. This style of management is also more interactive and more sensitive to the needs of the employees, were interaction is usually on a personal basis as this helps in better understanding, quicker completion of work and succeeding. This manner of management is very important for the growth and prospects of the organization.

With the fixed rules and principles of the traditional management it would definitely be a hurdle to progress in a high tech organization, in a collaborative management both the higher ups and the workers are viewed as equals and work on a common platform were they can share their ideas and information to achieve their goals and principles. Employees who excel at work are rewarded and given enough exposure to pursue higher assignments. Any concerns at work are quickly solved as all the workers are responsible for their work and are equally involved in their commitment. Knowledge sharing of resources along with a mutual respect towards a co-worker, are the key factors in a collaborative management due to which the work would be achieved much faster and effectively and also resulting in personal satisfaction to the employees.
In today’s world of frequently changing complex business processes and technologies, organizations have to work in an innovative and strategy based manner to reach targets and milestones. For any organization to succeed on a global level it is very important to plan, strategize and work towards achieving it. All the above reasons are why traditional management would not be effective in high tech organizations, the more interactive and collaborative manner of management is much preferred for its easy and effective manner in which all the employees and the leaders mingle and work together for the prospect of the organization. The work in a collaborative setting is accomplished much faster by having discussions, knowledge sharing and brain storming sessions. People are the most important resources in a collaborative management setting thus giving more priority to employees and their needs and requirements. Thus comparing to traditional management, a collaborative manner of management would be more preferable to any high tech organizations considering the fast paced work and complexities.


Technology to the Rescue

A local media firm has four branches in nearby locations, due to the operations in different locations and lack of streamlining of the sales and purchases in a systematic manner at a centralized location, the customer base was badly affected resulting in a drop in the sales.  To overcome this problem the company is required to set up a centralized data center like WAN (Wide Area Network) from where the employees from all the four locations can access the inventory for stock updates.  Using the WAN system makes it easier to transfer data faster from one location to another, and it is also cheaper and easy to access and catalog records from a remote location.  The work flow is more flexible as you have more control on the records thus giving the required priority to cataloging the records and communication among employees of different locations.


To overcome the issues of online security all the access to the enterprise network should be secured, this can be done by applying the device identity for control of access, securing the LAN and the remote VPN is very important in this sort of mechanism. In this methodology the authentication process is secured by using the Transport Layer Security to have more security between the authentication service and the device, this works in a similar fashion to web security between the browser and the web server. By using the WAN system the company can ensure zero tolerance of errors and all the transactions can be done on a customized intranet website, and web servers put up at the centralized data center can cater to the needs of the online web traffic by helping with online sales. Using Access control mechanisms by maintaining access control lists on authentication basis is also another solution to network security. The growing needs of online connectivity and usage, risks exposure to attacks from malware, an operative authentication device for network connectivity is very important to overcome the risk of probable malware attack. By using WAN, the company can have better service and improved productivity, combined savings and can easily manage and arrange traffic as per requirements.

Overcoming the Power Crisis

The solution to power crisis can be making use of alternative sources of energy like solar and wind energy. Especially in a country like India were frequent power cuts is common, the power cuts during the summer season vary from anywhere between 4-12 hours a day, the rural areas experiencing the highest power cut of around 12 hrs a day. It’s time that someone gave a serious thought to the solution for this crisis. By adopting solar energy, the rural people can benefit as they have an abundance of sunlight and space, they can install these solar panels on their rooftops or even near their fields for agricultural purpose and generate their own power. In this manner they will be fulfilling their needs and any excess power can also be sold to the grid at a fixed rate, by this they along with the government will be mutually benefited.


The only hurdle to more people adopting alternative sources of energy might be due to the lack of awareness and sufficient economic resources. The government by taking certain steps can help in creating awareness among people by conducting campaigns in different areas and at the same time they can also help the common man by providing the required solar panels and other resources at a subsidized rate or by providing loans at a cheaper interest rate. With the ever growing population in India meeting the demands of basic necessities has become a task, in such a scenario promoting alternative sources of energy should be taken up in a big way to meet the demand. In a country like Germany, one can see that all the rooftops are covered with solar panels where solar energy is hugely used; this shows the practical thinking of the Germans. It is high time that people in India think practically and put this into action.

Wednesday 9 July 2014

Exploring the Financials

Our financial decisions are totally based on money, time and worth. While making a financial valuation, we must consider the value of the project at the starting of the project which is the present value (PV), and the future value (FV), which is what you have at the ending of a project. It is imperative to calculate the Total Cost of Ownership (TCO) of a project which is a total estimate of all the costs including the purchase price in addition to all other costs to be incurred during the project time. Net present value (NPV) of the project which is the PV of the future cash flows minus the purchase price or the initial cost incurred for the Project. It is important that every firm should calculate the TCO and NPV to determine whether the firm is going to generate a negative or positive cash flow. There are instances where the managers handling the finances of a firm manipulate the costs to portray a positive cash flow to the management.


This is also true in case of stocks where some firms resort to falsely raising the stock price to the advantage of the owners, and quickly selling off the stocks to a huge profit once the price has risen, resulting in a sharp fall of the stock price. Calculating the TCO and NPV and making use of the results in a right manner should warn the firm of any future risks and taking measures to overcome them. The individuals working on the financials of a firm should also be aware of the significance of the work they are doing without blindly carrying out the analysis. As this is very important for every firm, being up to date and doing the analysis in a timely and right manner can save a firm from any sort of risk and also be largely profitable to the firm if used in a proper and efficient manner.

Bonds vs. Stocks

Stockholders own shares of a particular stock whereas Bondholders are creditors of a company; the bondholders can influence the company’s management to stay away from risky projects and can also raise the asking interest rate thereby raising the capital cost for the company.  Usually stocks are unsettled but can be sold at any time on the other hand bonds have a fixed period of maturity after which the amount is retrieved.  When stockholders take up risky projects they also have an advantage when the stock rises, bondholders are more interested on the return of their investment.  The bondholder will get interest irrespective of the bond making a profit or a loss but the stockholder will not be getting any dividend if the stock doesn’t make profits. Compared to the notion that bondholders have more advantages then stockholders, it can also be noted that a stockholders penchant for stocks which are risky can have a huge impact on the finances of a bondholder.

Using the tool of dividend discount model we can estimate the value of a stock basing on the future dividends being paid after discounting to reflect the current value of the stock.  Using this model investors are able to pick up and invest in stocks which are likely to give good returns due to the extensive research taken up by the company’s.  But it can only evaluate the value of a stock which pays out dividends which is the major negative point of this model, but for some stocks like telecom and technology in which the investors only look for a rise in the price of the stocks this model will not be of much help in envisaging the stock price.  And this model also requires input of accurate data, which sometimes becomes difficult in predicting the accurate stock value.

Over the Counter Stocks

Holding preferred stocks usually assures the stockholder of getting a fixed amount of dividend which is also higher when compared to the dividend paid out for common stocks, and the dividends for common stocks are not known by the stockholder until they are paid out.  The value of common stocks depends on the fluctuations of the market, but at the same time buying these stocks is better when compared to buying penny stocks.  To the common man the common stock will be more tempting because of its high growth prospective in a faster way, and also investing in a large cap company of a company stock is much preferable.  Even though preferred stocks give out higher dividends, in the long run common stocks tend to give higher profits when compared to preferred stocks, as the value of common stocks moves along with the market movement, they are mostly preferred by investors. 
            For an investor who invests in common and preferred stocks, even if a company goes bankrupt it would not make much difference as due to his continuous and daily monitoring of the common stocks he will be in a position to sell off the stocks to his advantage.  Over the counter markets are usually not traded in the stock market but are rather traded through a dealer who in turn directly deals with the sellers and the buyers.  These are mostly listed in the over the counter bulletin boards, bonds fall into the category of the over the counter markets as they are not directly traded in the market, these markets are also important as they give the investor an alternative to being invested in markets and they also help investors to concentrate on smaller stocks which have a greater potential to grow.  But investors should be very cautious and do extensive research before investing in such over the counter markets.


Technology - Information


Design ideas are the form of expressing a plan, outline or a sketch which at a later stage take a definitive shape and structure. Proper planning and estimation of the design should be done prior to putting it into form, the economic viability and the effectiveness of the design idea is a very important aspect, as the success of the idea depends on how credible and commercially viable the idea is if put into action. Therefore the commercial success of any design idea is very crucial and any ideas which might not be a success should be rejected.
A system is designed in a particular manner to achieve the purpose of its design, for example an escalator is designed to move people a short distance at a given speed, and this system is mostly useful for elder people. If the escalator is operated in a different manner say for instance due to the way of operating, it may instead of smoothly moving forward has a shaky ride while going up and coming down it is bound to topple all the people moving on an escalator, due to which the very purpose of the escalator is not served.
The use of computer controlled technological systems in our daily life has become a part and parcel of life, from the automatic locks in our car, the video games we play to the alarm system in our phones all make use of the embedded technology to keep the systems operating. In order to keep running continuously our smartphone uses embedded technology which is a computer system that is designed for specific functioning of different controls in a larger system, which is part of a total device including the hardware and other parts.

Misinformation about the working and effectiveness of any product can alter a person’s viewpoint towards the product.  For example smartphones are being widely used globally and the competition in the market of smartphone brands is immense, if a rival company of a well-known brand, spreads incorrect information about the technology used in the smartphones produced by that brand, it can affect the commercial market of phones thereby adding fuel to the viewpoint of the rival company. Hence misinformation without authentic information can make or totally ruin a company.

Tuesday 8 July 2014

Making Money Online

Top eight ways to make money online

1.       Write blogs so that they attract a lot of views, the key is to select a topic which is of interest to the viewers, think of what topic or tag words you search for frequently online, including this topic or tags in your blog helps attract many people to your blog. By placing advertisements on your blog (Google Adsense), you can earn a lot of money depending on the number of clicks.

2.      Post a How-to video on You tube, most of the learning or How-to videos get maximum views on You tube, depending on the number of views the video gets, You tube pays a certain amount by adding an advertisement in the beginning of the video we upload, and pay for the maximum number of views.

3.      Writing essays online, this is very useful for people who are very fluent in English and can put together a decent essay, by selecting any essay on our desired topic we can write these essays to be submitted within a deadline, and the pay range is usually $3-$30 per page. The only thing one should be careful about is that plagiarism is not at all tolerated, so if one is careful with this and enjoys writing, they can easily earn a lot of money sitting at home. Some of the websites which pay well are www.essaywriters.net, www.academiaresearch.com, www.academicexperts.us.

4.      Online tutoring has also become a popular choice for students, the only requirement is a good command over any particular subject and to be available online during the student’s desired time, and easily able to explain the subject to the student. The payment for this sort of service is also very good, and a good website for this is www.tutorvista.com, tutor.com.

5.       Pitching articles for any magazine or online website or any business firms, if you have the ability to write content which is effective and relevant and has a natural flow, you can earn money by writing articles on diverse topics to any magazines or online websites. Content is a must for all websites, so  please do not hesitate to write an introduction letter which is eye catching and attach a sample of your work and mail it directly to the editor or any concerned person.

6.      If one is good in technology, they can develop applications and sell them, with the latest revolution in smartphones, developing any unique app and selling has become popular with the demand for such apps were many people are downloading popular apps.

7.      Online selling of used stuff can also be considered, if you have many unused items at home in good condition one can think of selling them online on ebay, olx or any such sites. Goods which are of no use to you might be of some use to others, selling items which are in good condition can earn you a neat profit.


8.      Freelancing is also a good option if you are an expert in your field, one can register in websites like elance.com, odesk.com, freelancer.com etc. and bid for projects in the desired field. Based on the profile and the lowest bid the project can be bagged.

Washington DC Property Management

DC Property Management after seeing a fall for the past 5 to 6 years is steadily picking up with investors keen on purchasing homes due to the perception that markets are bottoming up, and investors are mostly interested in buying foreclosed properties at a bargain and mostly paying in cash.  Even though investors find the low interest rates and home prices attractive that are unable to obtain loan from banks, which prefer only investors who pay 20% down payment and those who are having high credit scores.  Investors who are first time buyers find it extremely difficult to gather the huge amount for down payment and may have to wait for years before buying their first home.  People with ordinary income can hardly accumulate the amount to buy a house in cash and totally have to depend on credit, but the huge down payment acts as a deterrent to these investors.


The DC property scene is also seeing a shortage of homes for those investors who are willing to take credit even with the down payment, these homeowners who have purchased their homes in 2006 when the markets were at their peak, and now that the prices have fallen drastically, they do not want to sell their homes for a loss.  Owing to all these problems the housing market in DC area has been dull, with real estate firms unable to sell off their houses, the shutdown and weather being some of the reasons. The housing market has seen a sharp decline in sales amongst varied perceptions of the investors.

Tennis Elbow

Notwithstanding the name Tennis elbow, it is a condition occurring to people frequently moving the arm in the same direction thereby affecting the elbow bone (lateral epicondyle) and causing tears in the tendons resulting in severe pain, the medical term used for tennis elbow is Lateral Epicondylitis. Tennis players are also frequently affected due to repeatedly hitting tennis balls in the same manner, any action which is repetitive and involves the elbow and wrist might result in this condition, even golf and racquet sport players, gardeners and people performing manual work daily are also affected by this condition. The person usually suffers extreme pain in the elbow on touching and moving, pain in the wrist, where performing even simple actions like opening a bottle cap, typing, holding something in your hand, combing your hair etc., seem very uncomfortable and painful. This is caused due to the inflammation in muscles and tendons near the elbow due to overuse were the same action is repeated daily, identifying the action and trying to change the position or reducing the use of the same action could reduce the pain to some extent.

Resting the affected arm, using hot or cold packs and taking pain killers give some relief from the pain. If the pain persists, the doctor might suggest some simple exercises or wearing a brace as a support to the elbow which will help to ease the pain and stiffness in the arm. If the above treatments also do not give any relief from the pain, the doctor might suggest giving a steroid injection in the affected area, or even go in for surgery if required for quick relief. Acupunture is also a treatment for tennis elbow, but the effectiveness of this treatment is still questionable, massaging the affected area also might give some respite from the pain, but all these treatments should be done under the supervision of a doctor to avoid any further complications.

Prevention is the best medicine, trying to take some precautions so as not to be affected by tennis elbow is very important, taking care that the actions we perform are not repetitive in nature, and taking small breaks from the routine work like twisting and turning the wrist, and using a strap when playing or doing manual work are recommended, as the strap helps the pressure on the muscles to be spread throughout the arm to avoid being affected by tennis elbow. When it is necessary that a person do certain activities as a part of his daily life which may put him at a risk in being affected by tennis elbow, it is important that he practices certain techniques so that he will be putting the least strain on the muscles and tendons of his elbow and wrist. Taking the necessary precautions, slightly altering your routine activities and practicing new techniques will help in preventing tennis elbow, and taking sufficient rest, hot and cold compress and doing certain exercises recommended by the doctor will help when one is affected by tennis elbow.

People with Special Needs

People with special needs like ADHD, Dyslexia and Autism certainly have special requirements to consider while planning to improve the facilities and opportunities for people with special needs.  
Dyslexia is a reading and learning disorder in which the effected person has difficulty in reading, pronouncing, spelling and identifying words, which is a hindrance to his writing and reading skills. Planning ahead by making their surroundings friendly for people with dyslexia like giving training, providing with assistive technologies like text to speech software, speech recognition software’s and personal organizers can  help the person perform his job more effectively and easily.  Reaching out and helping people with special needs and disabilities by helping them to be independent and actively engaging them in community development is very important to raise their self-esteem.
Autism is a neural disorder which affects a person’s brain cells and reduces a person’s ability to communicate and interact with others, to help plan for the betterment of people with autism the initial model would be to help them in acquiring community based jobs for which the support of the person, his family members, specialists and selective members of the community is very much required.  To successfully achieve such a model, a lot of hard work, commitment and support from the community is very important, which in turn would be very helpful in raising the morale and confidence of the autistic person by helping him lead an independent life.

ADHD (Attention Deficit Hyperactivity Disorder) is a type of disorder in which the person experiences extreme forgetfulness, lack of concentration, procrastination, hypersensitivity and restlessness. Establishing a set of guidelines to improve the process and the results for clinicians and person’s with ADHD is very important in meeting the requirements, these guidelines should consist of all the recommendations for this disorder by health care specialists, which should be used as a benchmark, used to train the health care specialists, ease the interaction between a patient and his health carer and help the patient take important decisions about his treatment. Following these guidelines will definitely make life easier for a person with ADHD.

The Mystery of Flight MH-370

The Beijing bound Malaysian Airlines flight MH-370 from Kaula Lumpur was on schedule when it took off as usual at 00.41 MYT on March 8th, 2014 form the Kaula Lumpur International Airport and was scheduled to land at the Beijing Capital International Airport at 6.30 local time, Pilot Zaharie Ahmad Shah and Co-pilot Fariq Abdul Hamid were on board along with 237 crew and passengers, the flight was flying at an altitude of 35,000 feet and with a  speed of 471 knots when it suddenly disappeared at around 1.20 MYT and all signals were lost. The mystery was that there were no distress calls made from the Flight and everything seemed right and going on schedule and all of a sudden the plane disappears; the flight was last seen flying over the Gulf of Thailand flying towards the Strait of Malacca.  After the flight was announced missing by the Malaysian Airlines widespread search operations were taken up by the Malaysian Government but to no avail, there were varied reports of the flight being spotted by the Vietnamese turning back westwards, and the Chinese, Thailand, Indian, Pakistan and the Kazakhstan government claiming that had the aircraft flown into their airspace their military radars would have picked up the signals.
After receiving few pings on the satellite the flight was also expected to be flying closer to Perth in Western Australia, and also reports of debris being spotted by a Satellite close to the Indian ocean made the Malaysian government widen the search involving the countries of Unites States, Australia, New Zealand, France Japan, China, Korea, Brunei, Malaysia, Taiwan, Indonesia, India, Myanmar and Thailand also in the search operations. Even after widespread and thoroughly searching the area using 40 ships and 30 aircrafts the debris of the Flight MH-370 was not found. On 24th March the Prime Minister of Malaysia also issued a statement that the plane MH-370 went down in the India Ocean. The best bet to find the missing aircraft was detecting the pings picked up by satellites from the black box of the missing flight, but with the batteries of the black box expected to be in working condition for only 30 days, and with no sign of the missing flight till April 7th 2014 the day the batteries of the black box expired, the Malaysian authorities drew a blank with the extensive search operations.
There were mixed reports and even sabotage of the plane was also considered as two passengers on the missing flight were travelling on stolen passports, the homes of the Pilot and the Co-Pilot were also searched and after stumbling upon a flight stimulator in the home of the Pilot Zaharie, the involvement of the Pilot in a sabotage was also doing rounds, but with no evidence and no trace of any debris of the aircraft being found all reports were baseless. Adding further fuel to all the conflicting reports about the missing plane was the release of a book on 19th May, 2014 that the Malaysian plane was shot down into the Chinese sea during a military practice drill between the US and Thailand forces and that they were trying to cover up the facts regarding the missing plane. The latest search operation on the missing plane was to send a Chinese ship to map the sea bed in the Western coast of Australia in a bid to find the missing plane. Will the mystery of the Missing MH-370 plane ever unravel, only time can tell and all we can do is keep our fingers crossed and wait and watch?


Popular Posts