Message for the Day… “” Once Swami has declared, “You are Mine”, whatever wrong ways they may pursue, Swami will not abandon them.”

Swami’s Prema (Love) has no trace of self-interest in it. It is absolutely pure. Swami knows only how to give, not how to receive. Swami’s hand is held above for conferring something, not stretched for seeking anything. Moreover, once Swami has declared, “You are Mine”, whatever wrong ways they may pursue, Swami will not abandon them. It may be asked why anyone who has been accepted by Swami thus should be subject to hardships and troubles. These troubles are the consequences of their own karma (actions). They have to see that their conduct is right. If, supposing, the Lord blesses a man with a hundred years of life, he should not get puffed up with pride and start jumping from a tree in the confidence that he will live for a century. He may live for a hundred years, but may have his leg broken in the fall. So in accepting the blessing of God, one should also try to lead a righteous life.

 

Source…. http://media.radiosai.org

Natarajan

Message for the Day…. ” You must remember that your future is contained in the actions. Your present thoughts, words and deeds determine your future. Therefore make the present sacred, sublime, and purposeful.performed by you in the present. “

When we are hungry, we eat food to satisfy our hunger! It takes about two hours for the food in the mouth to go to the stomach, get digested and yield strength and nourishment to the body. Similarly, there may be a time gap between actions and their consequences. A seed does not become a tree as soon as you sow it. The seed first germinates, becomes a sapling, and then grows into a tree in due course of time. The entire tree is within a tiny seed. You only see the seed, not the entire tree hidden in it. Similarly, you must remember that your future is contained in the actions performed by you in the present. You imagine your future and wait for it. There is no need to wait for it because your future lies in your present! Your present thoughts, words and deeds determine your future. Therefore make the present sacred, sublime, and purposeful.

Source…. http://media.radiosai.org

Natarajan

மற(றை)க்கப்பட்ட உண்மைகள்! – வீட்டில் விளக்கேற்றுங்கள்!….

‘விளக்கு ஏற்றிய வீடு வீணாய் போகாது’ என்று ஒரு பழமொழி உள்ளது.
வீட்டிலும், கோவிலிலும் ஏன் விளக்கேற்றுகிறோம் தெரியுமா?


தீபத்தின் சுடருக்கு, தன்னை சுற்றி உள்ள தேவையற்ற எதிர்மறை சக்திகளை ஈர்க்கும் சக்தி உண்டு.
அவ்வாறு ஈர்க்கும்போது, தானாகவே, ‘பாசிடிவ் எனர்ஜி’ அதிகரிக்கும்.
நம் சுற்றுப்புறம் தெளிவாகவும், பலத்தோடும் காணப்படும். இரண்டு நாள் வீட்டில் விளக்கேற்றாமல் இருந்தால், வீடே மயானம் போல் தோன்றும். எல்லாருமே சோர்வாக இருப்பர்.
நம் உடலில் இருக்கும் ஏழு சக்கரங்களில் மூலாதாரமும், சுவாதிஷ்டானமும், நல்லெண்ணெய் விளக்கு ஏற்றுவதால் துாய்மையடைகிறது. அதேபோல், மணிபூரகம், அனாஹதம் இரண்டும் நெய் விளக்கு ஏற்ற, துாய்மை அடைந்து, நற்பலன்களை அடைகிறது.
நம் உடலில் இருக்கும் நாடிகளில் சூரிய நாடி, சந்திர நாடி, சுஷம்னா நாடி ஆகியவை மிக முக்கியமாக கருதப்படுகிறது.
* சூரிய நாடி, நல்ல சக்தியையும், வெப்பத்தையும் தருகிறது. சந்திர நாடி குளுமையை தருகிறது
* சுஷம்னா நாடி அந்த பரம்பொருளுடன் சம்பந்தப்பட்டு ஆன்மிக பாதையை வகுக்கிறது
* நல்லெண்ணெய் விளக்கு ஏற்ற, சூரிய நாடி சுறுசுறுப்படைகிறது
* நெய் விளக்கு, சுஷம்னா நாடியை துாண்டிவிட உதவுகிறது
* பொதுவாக நெய் தீபம், சகலவித சுகங்களையும் வீட்டிற்கு நலன்களையும் தருகிறது.
திருவிளக்கை எப்போது வேண்டுமானாலும் ஏற்றலாம்; இதற்கு தடையேதும் இல்லை.
ஆனால், பொதுவாக மாலை, 6:30 மணிக்கு ஏற்றுவதே நம் மரபு.
சூரியன் மறைந்ததும், சில விஷ சக்திகள் சுற்றுச்சூழலில் பரவி வீட்டிற்குள்ளும் வர வாய்ப்பிருக்கிறது.
ஒளியின் முன் அந்த விஷ சக்திகள் அடிபட்டு போகும். எனவே, அந்நேரத்தில் விளக்கேற்ற வேண்டும் என்கின்றனர்.
ஒரு நாளிதழில் வெளிவந்த நிகழ்வு இது: அமெரிக்காவில் இருக்கும் தன் மகனின் வீட்டுக்கு சென்றிருந்த ஒரு தாய், மாலையில், மகனும் – மருமகளும் தாமதமாக வீட்டுக்கு வருவதை பார்த்தார். இருவரும் வேலைக்கு செல்பவர்கள்.
ஒருநாள் மகன் முன்னதாகவும், ஒருநாள் மருமகள் முன்னதாகவும் வருவர்.
மகனை அழைத்து, தாமதமாக வரும் காரணம் கேட்க, ‘உனக்கு இதெல்லாம் புரியாதும்மா…
‘எங்கள் இருவருக்கும் பயங்கர, ‘ஸ்ட்ரெஸ்…’ இருவரும், ‘கவுன்சிலிங்’ போய் வருகிறோம்… ஒரு மணி நேரத்துக்கு அந்த டாக்டருக்கு கொடுக்கும் தொகை அதிகம். மிக சிறந்த டாக்டர், அவரது சிகிச்சையில் எல்லாம் சரியாகிவிடும்…’ என்று கூறினான்.
அதற்கு அந்த தாய், ‘நாளை அந்த டாக்டரை பார்க்க போக வேண்டாம்; சீக்கிரம் வீட்டுக்கு வரவேண்டும்…’ என்று கூறினார்.
அடுத்த நாள் மாலை, வீட்டுக்குள் நுழைந்த மகன் – மருமகள் மூக்கை சுகந்த மணம் துளைத்தது.
இருவரையும் கை கால் கழுவி, உடை மாற்றி, பூஜை அறைக்கு வருமாறு கூறினார், தாய்.
அவர்களும் அவ்வாறே செய்தனர். மணம் வீசும் மலர்களின் வாசம்… அழகான தீப ஒளி நிறைந்த அந்த அறையில் சற்றுநேரம் அமர்ந்து, இருவரும் தாமாகவே கண் மூடி அந்த சூழலின் இன்பத்தை அனுபவித்தனர். பின், கண் திறந்தபோது, ‘கவுன்சிலிங்கில் கிடைக்காத அமைதி கிடைத்ததாக சொல்ல…’ தாயார் மகிழ்ந்தார்.
இன்னொரு விஷயம்…
வீட்டில் பெண் குழந்தைகள் இருந்தால், அவர்களை தினமும் விளக்கேற்றும்படி சொல்ல வேண்டும்.
இப்படி செய்தால், அவர்களின் முகப்பொலிவு பன்மடங்கு கூடும். விளக்கேற்றிய வீடு, வீண் போகாது.

 பி.எஸ்.புஷ்பலதா in http://www.dinamalar.com

natarajan

Message for the Day… ” What is the true meaning of Equality ….? “

Let us grow together, move and learn together, develop intelligence and attain noble goals together, without any conflict and let us live in friendship. This is the true meaning of equality. This equality gives peace. Without equality, there will be only enmity, differences, and duality. Every day you say, shanti (peace) three times! Say it with a pure heart and say it softly. When there is enmity in the heart, chanting Shanti Mantra will be of no use! Chanting it harshly also nullifies the effect of the chant! Words are not important, the feelings within your heart are important. Hence, perform all spiritual practices with purity of heart. The path of love is the noblest. It may not be possible for you to do japa (chanting of God’s Name). You may not be able to make the mind steady in meditation. You may not know the path of yoga. But you can develop love in your heart. The path of love is easy and it is a shortcut.

Source…. http://media.radiosai.org/

Natarajan

WHO INVENTED COMPUTER PASSWORDS?…..

Laura S. asks: Who was the first to come up with the idea of using passwords for computers instead of other authentication?

Something akin to passwords have seemingly been used for at least as long as humans have been recording history. For example, one of the earliest references to something like a password is mentioned in the Book of Judges, which was first written down sometime around the 6th or 7th century BC. Specifically, it states in Judges 12:

And the Gileadites took the passages of Jordan before the Ephraimites: and it was so, that when those Ephraimites which were escaped said, Let me go over; that the men of Gilead said unto him, Art thou an Ephraimite? If he said, Nay;

Then said they unto him, Say now Shibboleth: and he said Sibboleth: for he could not frame to pronounce it right. Then they took him, and slew him at the passages of Jordan…

Fast-forwarding a bit in history and Roman legionaries are known to have used a simple system of passphrases to discern whether a stranger was friend or foe. Second century BC Greek historian, Polybius, even describes in detail how the password system worked in terms of making sure everyone knew what the current password was:

…from the tenth maniple of each class of infantry and cavalry, the maniple which is encamped at the lower end of the street, a man is chosen who is relieved from guard duty, and he attends every day at sunset at the tent of the tribune, and receiving from him the watchword—that is a wooden tablet with the word inscribed on it – takes his leave, and on returning to his quarters passes on the watchword and tablet before witnesses to the commander of the next maniple, who in turn passes it to the one next him. All do the same until it reaches the first maniples, those encamped near the tents of the tribunes. These latter are obliged to deliver the tablet to the tribunes before dark. So that if all those issued are returned, the tribune knows that the watchword has been given to all the maniples, and has passed through all on its way back to him. If any one of them is missing, he makes inquiry at once, as he knows by the marks from what quarter the tablet has not returned, and whoever is responsible for the stoppage meets with the punishment he merits.

Roman historian Suetonius even mentions Caesar using a simple cipher which required the recipient to know a key, in this case the correct number of times to shift the alphabet, to decipher the message.

As for more modern times, the first known instance of a password system on an electronic computer was implemented by now retired professor of computer science at the Massachusetts Institute of Technology, Fernando Corbato. In 1961, MIT had a giant time-sharing computer called the Compatible Time-Sharing System (CTSS). Corbato would state in a 2012 interview: “The key problem [with the CTSS] was that we were setting up multiple terminals, which were to be used by multiple persons but with each person having his own private set of files. Putting a password on for each individual user as a lock seemed like a very straightforward solution.”

Something we should mention before continuing is that Corbota is hesitant to take credit for being the first to implement a computer password system. He suggests that a device built in 1960 by IBM called the Semi-Automatic Business Research Environment (Sabre), which was (and still is in an upgraded form) used for making and maintaining travel reservations, probably used passwords. However, when IBM was contacted about this, they were unsure if the system originally had any such security. And as nobody seems to have any surviving record of whether it did, Corbato is seemingly universally given credit for being the first to put such a system on an electronic computer.

Of course, an issue with these early proto-passwords is that all of them were stored in plain text despite the gaping security hole this introduces.

On that note, in 1962, a PHD student called Allan Scherr managed to get the CTSS to print off all of the computer’s passwords.  Scherr notes,

There was a way to request files to be printed offline, by submitting a punched card with the account number and file name. Late one Friday night, I submitted a request to print the password files and very early Saturday morning went to the file cabinet where printouts were placed… I could then continue my larceny of machine time.

This “larceny” was simply getting more than the four hours of allotted daily computer time he’d been granted.

Scherr then shared the password list to obfuscate his involvement in the data breech. System admins at the time simply thought there must have been a bug in the password system somewhere and Scherr was never caught. We only know that he was responsible because he sheepishly admitted almost a half century later that it was he who did it. This little data breach made him the first known person to steal computer passwords, something the computer pioneer seems quite proud of today.

Hilariously, according to Scherr, while some people used the passwords to get more time on the machine to run simulations and the like, others decided to use them to log into the accounts of people they didn’t like just to leave insulting messages. Which just goes to show that while computers may have changed a lot in the last half century, people sure haven’t.

In any event, around 5 years later, in 1966, CTSS once again experience a massive data breach when a random administrator accidentally mixed up the files that displayed a welcome message to each user and the master password file… This mistake saw every password stored on the machine being displayed to any user who attempted to log into CTSS. In a paper commemorating the fiftieth anniversary of CTSS engineer Tom Van Vleck fondly recalled the “Password Incident” and jokingly noted of it: “Naturally this happened at 5 PM on a Friday, and I had to spend several unplanned hours changing people’s passwords.”

As a way to get around the whole plain text password problem, Robert Morris created a one-way encryption system for UNIX which at least made it so in theory even if someone could access the password database, they wouldn’t be able to tell what any of the passwords were. Of course, with advancements in computing power and clever algorithms, even more clever encryption schemes have had to be developed… and the battle between white and black hat security experts has pretty much been waging back and forth ever since.

This has all led to Bill Gates famously stating in 2004, “[Passwords] just don’t meet the challenge for anything you really want to secure.”

Of course, the biggest security hole is generally not the algorithms and software used, but the users themselves. As famed creator of XKCD, Randall Munroe, once so poignantly put it, “Through 20 years of effort, we’ve successfully trained everyone to use passwords that are hard for humans to remember, but easy for computers to guess.”

On this note of training people to make bad passwords, the blame for this can be traced back to widely disseminated recommendations by the National Institute of Standards and Technology, published in the page turner that was the eight page NIST Special Publication 800-63. Appendix A, written by Bill Burr in 2003.

Among other things, Burr recommended the use of words with random characters substituted in, including requiring capital letters and numbers, and that system admins have people change their passwords regularly for maximal security…

Of these seemingly universally adopted recommendations, the now retired Burr stated in an interview with the Wall Street Journal, “Much of what I did I now regret…”

To be fair to Burr, studies concerning the human psychology aspect of passwords were largely non-existent at the time he wrote these recommendations and in theory certainly his suggestions at the least should have been very slightly more secure from a computational perspective than using regular words.

The problem with these recommendations is pointed out by the British National Cyber Security Centre (NCSC) who state, “this proliferation of password use, and increasingly complex password requirements, places an unrealistic demand on most users. Inevitably, users will devise their own coping mechanisms to cope with ‘password overload’. This includes writing down passwords, re-using the same password across different systems, or using simple and predictable password creation strategies.”

To this point, in 2013 Google performed a quick little study on people’s passwords and noted that most people use one of the following in their password scheme: The name or birthday of a pet, family member or partner; an anniversary or other significant date; birthplace; favorite holiday; something to do with a favorite sports team; and, inexplicable, the word password…

So, bottom line, most people choose passwords that are based on information that is easily accessible to hackers, who then can in turn relatively easily create a brute force algorithm to crack the password.

Thankfully, while you might not know it from the ubiquity of systems out there that still require you to do your best impression of Will Hunting to set a password, most security advisory entities have drastically changed their recommendations in the last few years.

For example, the aforementioned NCSC now recommends, among other things, system administrators stop making people change passwords unless there is a known password breach within the system as, “This imposes burdens on the user (who is likely to choose new passwords that are only minor variations of the old) and carries no real benefits…” Further noting that studies have shown that “Regular password changing harms rather than improves security…”

Or as Physicists and noted Computer Scientist Dr. Alan Woodward of the University of Surrey notes, “the more often you ask someone to change their password, the weaker the passwords they typically choose.”

Similarly, even a completely random set of characters at typical password requirement lengths is relatively susceptible to brute force attacks without further security measures.  As such, the National Institute of Standards and Technology has likewise updated their recommendations, now encouraging admins to have people focus on lengthy, but simple, passwords.

For example, a password like “My password is pretty easy to remember.” is generally going to be orders of magnitude more secure than “D@ught3rsN@m3!1” or even “*^sg5!J8H8*@#!^”

Of course, while using such phrases makes things easy to remember, it still doesn’t get around the problem of the seemingly weekly occurrence of some major service having their database hacked, with said systems sometimes using weak encryption or even none at all in their storing of private data and passwords, such as the recent Equifax hack that saw 145.5 million people in the U.S. have their personal data exposed, including full names, Social Security Numbers, birth dates, and addresses. (Across the pond, Equifax also noted about 15 million UK citizens had their records stolen in the breach as well.)

In shades of the first ever password hack mentioned previously which required Scherr to just request that the password file be printed, it turns out to get access to the vast amount of personal data Equifax stores on people, an anonymous computer security expert told Motherboard, “All you had to do was put in a search term and get millions of results, just instantly—in cleartext, through a web app.”

Yep…

Because of this sort of thing, the National Cyber Security Centre also now recommends admins encourage people to use password manager software in order to help increase the likelihood that people use different passwords for different systems.

In the end, no system will ever be fully secure, no matter how well designed, bringing us to the three golden rules of computer security, written by the aforementioned famed cryptographer Robert Morris: “do not own a computer; do not power it on; and do not use it.”

Bonus Fact:

  • In the age of everyone’s lives being stored online on various companies’ servers- generally all protected by passwords, the University of London noted in a recent study that about 10% of people are now putting a list of their common passwords in their wills to make sure people can access their data and accounts after they die. Interestingly, the problem of people not doing this actually is noted as having caused a major problem after the 9/11 attacks. For example, Howard Lutnick, a one time executive at Cantor Fitzgerald, noted his rather unenviable task of having to track down the passwords of almost 700 employees who’d died in the attack. Because of how critical it was for the company to have access to their files right away before the evening bond markets opened, he and his staff had to call loved ones of the dead to ask for the passwords or what the passwords might be that same day… Thankfully for the company, most of the employees’ passwords were based on the aforementioned flawed recommendations by Bill Burr- the “J3r3my!” variety. This, in combination with specific personal information from loved ones Lutnick collected, allowed a team dispatched by Microsoft to relatively easily crack the unknown passwords via brute force in short order.

Source….. http://www.today i foundout.com

Natarajan

Message for the Day…. ” God is always with you, in you, above you, and below you. He is your real friend. It is only God who will protect you in difficulties. God will always be with you. “

Modern friends come close to you as long as there is money in your pocket and your father has a high position. They will say, ‘hello, hello’ to you. When your pocket is empty or your father has retired, they will leave you immediately. God is not like that. God is always with you, in you, above you, and below you. He is your real friend. It is only God who will protect you in difficulties. God will always be with you. God is the embodiment of eternal bliss, wisdom absolute, beyond the pair of opposites, and expansive and pervasive like the sky. God will never forsake you. Have friendship with such a true Friend. Then only will your life as a human being become worthwhile. When you have such a friend, you will never fall short of anything. Troubles and difficulties can never bother you. You will always be blissful.

Source….. http://media.radiosai.org/

Natarajan

Mail Delivery By Rockets…..

The history of the postal system is inextricably tied to the history of transport. Advances in transportation technology have not only allowed people to travel farther and explore more territory, it also allowed the postal system to expand their influence over a larger area. As new inventions and discoveries shortened the time of travel, messages and letters began to reach distant recipients in lesser time, and the postal system became more efficient. By the time the first trans-pacific airmail was delivered, the postal service had tried every mode of transport available to man, including rockets.

The cover of a rocket mail delivered in the state of Sikkim, India, on 28 September, 1935. Photo credit:regencystamps.com 

 

 

 

 

 

 

 

 

 

 

The earliest type of missile mail was one which you’ve probably seen in historical movies where a parchment is wrapped around the shaft of an arrow and shot through the air into a castle or enemy territory. A more modern version of the idea was presented to an astonished audience by a German poet and dramatist, Heinrich von Kleist, through a newspaper article in 1810. At that time rocketry was still in its infancy. Rockets of that age were gunpowder powered and were primarily used as artillery in battlefields. Kleist amused himself by calculating that a rocket could deliver a letter from Berlin to Breslau, a distance of 180 miles, in half a day or one-tenth of the time required by a horse mounted carrier.

Kleist’s theory was put into practice on the small Polynesian island of Tonga, halfway around the world, by a British inventor, Sir William Congreve, using rockets he designed. But the rockets were so unreliable that the idea of using them in mail delivery was summarily dismissed, and no further thought was put into it until nearly a century later, when Hermann Julius Oberth, a German physicist and engineer and one of the founding fathers of rocketry, revisited the topic in 1927.

 

 

 

 

 

 

 

 

 

 

Hermann Oberth (center, in profile) demonstrates his tiny liquid-fuel rocket engine in Berlin in 1930. Photo credit: National Air and Space Museum, Smithsonian Institution

In June 1928, Professor Oberth delivered a convincing lecture on the occasion of the annual meeting of the Scientific Society of Aeronautics in Danzig, where he proposed the development of small rockets with automatic guidance that could carry urgent mail over distances of 600 to 1,200 miles. Professor Oberth’s lecture generated a great deal of interest throughout the world, and even the American ambassador to Germany took note. But it was a young Austrian engineer that became a pioneer in this field.

Living in the Austrian Alps, the young engineer Friedrich Schmiedl was well aware of the fact that mail delivery was extremely painful between mountain villages. What could be an eight hour walk between two villages could be only two miles apart as the rocket flies. Friedrich Schmiedl was already experimenting with solid-fuel rockets, and in 1928 undertook experiments with stratospheric balloons. After several unsuccessful attempts, Schmiedl launched the first rocket mail in 1931 and delivered 102 letters to a place five kilometers away. The rocket was remotely controlled and landed using a parachute. His second rocket delivered 333 letters.

Schmiedl’s rocket mails inspired several other countries such as Germany, England, the Netherlands, USA, India and Australia to conduct similar experiments with varying degree of success. In 1934, in an attempt to demonstrate to the British the viability of his rocket delivery system, a German businessman named Gerhard Zucker loaded a rocket with 4,800 pieces of mail and launched it from an island in Scotland. Government officials watched as the rocket soared into the sky and exploded, scattering scorched letters all over the beach like confetti. After his failed demonstration, Zucker was deported back to Germany where he was immediately arrested on suspicion of espionage or collaboration with Britain.

Experiments on rocket mail were largely successful in India, where a pioneering aerospace engineer named Stephen Smith perfected the techniques of delivering mail by rocket. Between 1934 and 1944, Smith made 270 launches, at least 80 of which contained mail. Smith created history when he delivered by rocket the first food package containing rice, grains, spices and locally-made cigarettes to the earthquake wracked region of Quetta, now in Pakistan, across a river. Later, Smith tied a cock and a hen together to one of his rockets and launched the frightened birds across another river. Both birds survived the trip and were donated to a private zoo in Calcutta after their ordeal. His next parcel contained a snake and an apple.

Despite his quirky nature and questionable choice of payload, Stephen Smith was wholeheartedly supported by the Maharaja of Sikkim, a British Protectorate in the eastern Himalayas, where he carried most of his rocket experiments.

 

 

 

 

 

 

 

 

A 1934 Indian Rocket Mail. Photo credit: www.stampcircuit.com

 

 

 

 

 

 

 

Another Indian Rocket Mail from 1934. Photo credit: www.stampcircuit.com

Things didn’t really took off in the US until 1959, when the Post Office Department fired a Regulus cruise missile with its nuclear warhead replaced by two mail containers, towards a Naval Station in Mayport, Florida. The 13,000-pound missile lifted off with 3,000 letters and twenty-two minutes later struck the target at Mayport, 700 miles away. The letters were retrieved, stamped and circulated as usual.

All 3,000 letters were copies of the same written by the Postmaster General. Each crew member of the submarine that launched the missile received a copy of the letter, so did President Eisenhower and other US leaders as well as postmasters from around the world.

“The great progress being made in guided missilery will be utilized in every practical way in the delivery of the United States mail,” the letter read. “You can be certain that the Post Office Department will continue to cooperate with the Defense Department to achieve this objective.”

The successful delivery of the mails prompted Postmaster Summerfield to enthusiastically declare that “before man reaches the moon, mail will be delivered within hours from New York to California, to Britain, to India or Australia by guided missiles.”

But it was not to be. The cost of rocket mail was too high—that little experiment with the Regulus cruise missile cost the US government $1 million, but generated only $240 in revenue by sale of postage stamps. Neither the Post Office nor the Department of Defense could justify the cost of using missile mail, especially when airplanes were already making mail deliveries across the world in a single night at the fraction of a cost.

And that was the end of the program. No further attempts to deliver mail by rockets have been made since then.

Source….. Kaushik in http://www.amusing planet.com

Natarajan

 

Message for the Day…. ” When you offer all your actions to God, your heart becomes sacred, you can then lead a peaceful life. To keep your heart sacred, with strong determination practice three P’s – Purity, Patience, and Perseverance. “

People are bound by action (karma) and sustained by action. They can achieve anything through action. Their accomplishment lies in their skill in performing actions. The actions performed will have their appropriate consequences, and no one can escape consequences of their actions. So do good actions, develop good thoughts, and join good company to get good rewards in future. As is the seed, so is the tree and its fruits. Hence engage in good actions from an early age. What are good actions? The actions that please God. When you perform actions that please God, you will also have the reward that will please you! Hence scriptures teach us to perform all actions to please God (Sarva karma Bhagavad preethyartham). When you offer all your actions to God, your heart becomes sacred, you can then lead a peaceful life. To keep your heart sacred, with strong determination practice three P’s – Purity, Patience, and Perseverance.

Source…. http://media.radiosai.org

Natarajan

Brilliant Chennai Boy Creates History, Becomes World’s 2nd Youngest Grandmaster!….

‘Chess Prodigy’ is the only way to describe Chennai’s Rameshbabu Praggnanandhaa. Only 12 years, 10 months and 13 days old, Praggnanandhaa is the second youngest person ever, to become a Chess Grandmaster.

In fact, at the tender age of just 10 years, 10 months and 19 days, this chess wizard, had become an International Master , the youngest in history.

With this distinction, he is second to only Sergey Karjakin, of Ukraine, who became the world’s youngest Grandmaster in 1990, reports the Times of India.

The Gredine Open, in Ortisei, Italy, has seen this lad play skilful chess, defeating several worthy opponents like Iran’s Aryan Gholami, and Italian Grandmaster (GM) Luca Moroni. Playing against the latter, the Chennai boy took the upper hand in the match at its outset, and held on, playing attacking chess, eventually forcing Moroni to buckle under the pressure mid-game.

Praggnanandhaa breezed through the first eight rounds, but in order to achieve his third GM norm, he had to play an opponent above the rating of 2482 in the ninth round. Luckily for him, he was drawn with Pruijssers Roland, of the Netherlands, who had a 2514 rating, and thus, he became the second chess player, to become a GM, before he turned 13.

Now, as far as the Gredine Open goes, Praggnanandhaa, is at the second spot, behind Croatian GM Saric Ivan.

Praggnanandhaa had already achieved his first GM norm in the World Juniors 2017, and then his second GM norm, at the closed round-robin Herkalion Fischer Memorial GM Norm tournament in Greece. He has also crossed 2500 Elo rating points.

Source…. Rayomand Engineer in http://www.the betterindia.com

Natarajan