Skip to main content

Nitish Kumar and the Miracle in Bihar


(This article borrows heavily from Harry Potter series of novels)

In a dark room of his Bombay (oops! Sorry, Mumbai) castle, Mr. Raj Thackeray was awakened from his sleep by the hooting of an owl. This owl was from his secretary who had sent him his schedule for today. He removed the scroll from the owl’s leg and looked at its contents.

10 AM – 12 PM – Give inflammatory speeches about how migrants are destroying Maharashtra to the poor and the uneducated.

12 PM – 1.30 PM – Lunch followed by attacks on hapless auto/taxi drivers.

1.30 PM – 3 PM – Encourage his dementors to attack media houses and claim it as spontaneous.

3 PM – 5 PM – Intimidate the reporter who dared question his methods in the course of an interview.

5 PM – 7 PM – Meet and threaten the director of the film who used the word Bombay in his movie.

“Another boring day”, he exclaimed. He poured himself a cup of tea and brought it to his lips when he happened to look at today’s newspaper. The ground beneath his feet shook. His hand trembled and the cup came crashing down on the floor. There it was staring him in the face - Bihar grew by 11.03%, next only to Gujarat.

He immediately summoned his fellow death-eaters and scheduled a meeting. “How could this happen?” he shouted. No one knew the answer. “If it helps sire, Bihar’s economy actually shrank by 5.15% in 2003-04. So if you take that into account, the growth rate is just around 8%”, someone tried to console him. This seemed to soften him a little. “And sire, there are economists questioning the validity of the data. They say that it is as farce as Railway’s growth under Lalu Prasad Yadav.” “OK, then find out the real data and let me know. Go!” he hissed.

Meanwhile in Bihar, Nitish Kumar twitched in his bed. The scar on his forehead was hurting again. Was Lalu Yadav close to getting the CM’s post again? Or was the data released by CSO (Central Statistical Organization) actually wrong?

We will have to just wait and watch.

Comments

  1. Well yes Nitish Kumar has done a lot of good for Bihar.and the figure you mentioned was not really surprising and it will continue to grow.guess Nitish should be given another 5 years to extend this growth.I hope Raj Thackray will learn a lesson from it!

    ReplyDelete
  2. @Ravi Nitish has really done some good work. He too is not a saint but he is definitely the lesser of the two evils. To cover up the 15 years of Lalu's rule in which we lagged behind, even at this growth rate it will take at least 10 years. Nitish should definitely be given a second term.

    ReplyDelete
  3. Sir,
    Request you to remove this asap. Otherwise we will do what we can.
    You understand what we can do correct.

    ReplyDelete
  4. @MNS Stop doing this Chandan sir. :)

    ReplyDelete
  5. Looks like Raj Thackray is not very happy with you ;) meanwhile nice you started following disclaimer in your blog.

    ReplyDelete

Post a Comment

As far as possible, please refrain from posting Anonymous comments. I would really love to know who is interested in my blog! Also check out the FAQs section for the comment policy followed on this site.

Popular posts from this blog

Pi Hole - Ad blocking (Turbocharged!)

The entire internet is now made up of ads. To easily navigate it and find the information you are looking for, most people use ad blocking software. It improves page loading times and also uses less data (sometimes by up to 10 times!)
Google Chrome is the de facto browser of choice for most people. Google's main business is advertising. So you can see how ad-blocking software collides with Google's business objectives. When Chrome was trying to be popular, it started allowing plugins like AdBlock Plus etc. Then slowly it started partnering with them for "Acceptable Ads Program" for a lot of money. Now after cementing its position as the most popular browser, Google is now coming down hard on ad blocking software. It is turning off a Chrome API (webRequest API) which most ad blocking plug-ins use to block ads.
Enter Pi Hole. This is an amazing use of Raspberry Pi which blocks ads before they enter your network. It keeps a blacklist of most popular ad serving domains …

Centralized Configuration for .NET Core using Azure Cosmos DB and Narad

We are living in a micro services world. All these services are generally hosted in Docker container which are ephemeral. Moreover these service need to start themselves up, talk to each other, etc. All this needs configuration and there are many commercially available configuration providers like Spring Cloud Config Server, Consul etc. These are excellent tools which provide a lot more functionality than just storing configuration data. However all these have a weakness - they have a single point of failure - their storage mechanism be it a file system, database etc. There are ways to work around those but if you want a really simple place to store configuration values and at the same time make it highly available, with guaranteed global availability and millisecond reads, what can be a better tool than Azure Cosmos DB!
So I set forth on this journey for ASP.NET Core projects to talk to Cosmos DB to retrieve their configuration data. For inspiration I looked at Steeltoe Configuratio…

IoT on Google Cloud Platform

Google wants people to use its Cloud Platform for connecting and managing IoT devices through IoT Core and use other GCP components like BigQuery to analyze data produced by those devices. While these products are fantastic, they also have some real world challenges.
IoT Core provides a managed service for connecting IoT devices. It talks with both HTTP and MQTT protocols and features one-click integration with Cloud PubSub easing most of the infrastructure tasks. However there are some limitations:
You cannot use any random MQTT topic to send/receive messages as you would expect on a custom MQTT bridge. There are special topic formats to send messages and also to receive commands.IoT Core uses Public-Private Key cryptography to secure devices. All IoT devices must first authenticate using the Public Key in a JWT token and then start sending and receiving messages. While these may seem like reasonable restrictions, one has to keep in mind that hardware vendors are still stuck in the 9…