Sushobhan Mukherjee

1 Comment

Happy New Year 2018

Year 2017 has passed and we have landed into 2018. With best wishes of the New Year, let us try for few simple resolutions collectively and make our lives more meaningful. I have listed few pointers as it came to my mind:

1. Let’s build, ratain and carry forward Human Connections. This only matters, not internet of things.

2. Enjoy the time which is present, lets not worry about Past and futures

3. Let’s accept whatever comes to us instead of being judgmental.

4. Let us keep it simple.

5. Never give up, Be patient and stick to the situations. It is just about time when everything will turnaround.

6. Lets be brave, handle situations with courage, fight to win the battles in life.

7. Let us forgive.

8. Let’s relax and respond to to the situations in life instead of reaction and having panic.

9. Be positive and enthusiastic to spread the vibes around us.

10. There needs to be secrets and mystery in life. Let us not blow the covers always.

11. Let us acknowledge and appreciate those who helped.

12. Spread the message of love and peace. Nature belives in harmony, let us not break it.

Do you have any more suggestions?

Look forward for your inputs.

Season’s greetings – wish you and your family a wonderful year 2018 ahead!


Leave a comment

Only Present Time Exists, neither Past nor Future

In about 48hours we are about to bid adieu to the ongoing year 2017. Before you are flooded with messages, wishes and carried away with celebrations in welcoming new year 2018,  I thought of spreading my lesson as I have learnt through life.

I had started writing seriously in the year 2014 through this English blog with the inspiration of one of my close friend. But the same  lost it’s track again while I have started writing in Bengali, mainly short poems (limericks) and essays. But my non Bengali friends kept on complaining as that they could not understand anything about it. Hence this year end post is dedicated to everyone , mainly for the people who could not understand any of my Bengali creations.

Anyways, let’s come to the topic !

Last week I met one of the senior fellow entrepreneurs of Bengal and got an extremely thought provoking insight. He said he learnt bathing in his old age (60+) from his grandson. I felt extremely curious. He said while concluding one day bathing session his 4 year’s old grandson told him” Relax grandpa, Bathing is not about just washing the body, but also to enjoy. Let me enjoy my bathing for few more moments”. I was speechless, how deep understanding of life from a just 4 year old kid.

The People of my generation (in mid forties) are not only in crisis, but also always in confusion. We have seen both the worlds, the world before connectivity and the aftewards. Hence even if we are addicted towards google, Facebook, Twitter, we keep on missing our older disconnected times. With the rise of connectivity we keep on getting overenthusiastic on hyped technologies like cloud, internet of things (IoT), Big Data, Blockchain and so on. People might be jumping on arguing on this , but may not disagree to the fact none of these are able bring peace to our life. Human lifes are becoming miserable day by day.We are worried about future with the knowledge of past and become too engaged in transactions. The aim is always to have greater future. But in the strive of having bright future we can not experience our present. In our life only present moment of time persists. Past is gone, future is unseen. But unfortunately none of us are able to enjoy the present. 

What ever is happening around us, we are not happy about it. We want something else and feel that will make us happy. Last day me and my family were enjoying the laser show in Lumbini Park , Hyderabad. Due course of the show of around 30minutes, my little son (6years old) poked me at least five times tos get a promise from me about playing mobile games once we are back home. We visited a family marriage ceremony few months back with my kids. Immediately after reaching venue, my daughter (10years) started persuing me for mobile games as she was getting bored. These are just some indicative samples to illustrate the facts. There are plentiful of similar examples to complement my thoughts. We keep on talking about external noises, sound polutions. However our internal noises are so vivid, it is not allowing us to live our present time happily.

In continuation of the little kid’s philosophy on bathing, please think how many of us are giving real importance on bathing. Bathing is always a hurried approach like a compliance of our daily routine life while the mind is internally talking about what all things are to be done post bathing and what all not went well or remained pending before the bathing. Same is applicable for every instances of life. Suppose I am writing something now and my mind is thinking about family activities to be done tomorrow, I have not written english blog frequently this year and next year I need to ramp up. Let’s assume we have bagged a project from a customer. Immediately during kick-off, i am thinking how fast I can finish this project, get the money and do some more businesses there. In life we keep on saving money for family, kids with a thought process while everything will get settled, then I will enjoy. By the time all settled, kids grown up, my age also travelled a long way with several physical problems like sugar, pressure, arthritis and so on. In effect I can not enjoy now as well. In life all three parameters like time, place and the entity get altered with time. Hence whatever is valid now, may not be relevant in the very next instances.

“The secret of health for both mind and body is not to mourn for the past, worry about the future, but to live in the present moment wisely and earnestly.” – Buddha

What does it mean to live fully in the present moment? It means that your awareness is completely centered on the present. We are not worrying about the future or thinking about the past. The past and future are illusions, they don’t exist. As the saying goes “tomorrow never comes”. Tomorrow is only a concept, tomorrow is always waiting to come around the corner, but around that corner are shadows, never to have light shed upon, because time is always now.

Can we deep drive in this year end and have a resolution in the coming year 2018 to enjoy every moment of our life?

1 Comment

Market Mystery

After Reliance JIO launch on October 2016, the entire telecom market in India is under some kind of turbulence. JIO had worked silently over last 3years to lay fibers even in remotest part of the country and using the gigabyte last mile capacity, introduced voice over data (volte). Not only that , they had introduced all possible services through these high capacity backbone like on demand video, live TV and literally became India’s only full-fledged streaming platform. Being an ex-telecom practitioner, I had personally experienced visionary steps by Tata Indicom way back in 2004, as I was also the part of the journey. However, the vision of triple play services using DSL /Metro Ethernet/Wireless last mile and backbone fiber data network could not be successful due to several strategic decisions. However, that is not the discussion point today and may be elaborated through a separate blog later. The point I was trying to make that JIO had not only shaken up their competitors, but also created a market disruption. The competitions are not facing challenges in offerings, but also prices. In effect, lot of different initiatives evolved like Vodafone and Idea planning for joint movement (either merger, or JV or some other strategy), Uninor and Aircel are moving out of the market by selling spectrum. Swan Telecom, Systema Shyam Telecom were already resigned from the market way. More precisely Telecom market is going a consolidation, convergence. This in effect will influence employment. Operators will look for low budget employment and less in quantity. In effect, the jobs of several senior resources in high salaries will become vulnerable. Today or tomorrow job retrenchment is bound to happen and new requirements will gradually be evaporated. Not only for telecom, but also for the telecom ancillaries like ZTE, Huawei, Ericsson etc. will experience the similar impact due to the change in demand for their customers. Gradually, the JIO launch is bound to affect television, cable TV, dishtv market as well. In effect same telecom disease is bound to influence there as well.
My discussion today is about employment situations today and tomorrow. In effect, I was forced to explain market situation as an introduction, before we drill down further.
This kind of situations are not new in the country. Trust you remember problems at aviation industry, Kingfisher, Air Deccan, Sahara collapsed, Jet Airways did optimizations. There was huge impacts due to money market Fiasco. In West Bengal, there were more than 300 money market companies with wide presence. There were minimum 1 lakh unemployment with the sudden shut down after Sardha, MPS, Rose Valley incidents.
We keep on herring job cuts, pink slips almost every now and then from the biggies. With the tremendous rise of internet-based media, there has been a severe impact in print media as well. The turbulence there, would surely affect employment.
My concern, consideration, doubt with the outcome of these completely unstable job situations. With the illustrations, till now in the previous sections, trust it is quite eminent fact that there are lot of people got unemployed in recent past. The numbers are not at all thin. More precisely, lot of unemployment happened in the top level (people with 40+ age) in senior positions. So the market is bound to be flooded with eligible candidates. Will the emergence of many institutions, there are huge numbers of freshly passed out candidates with the pool of retrenched senior employees.
However, it seems a vapor wire. While companies search for suitable candidates for employment, they hardly get people interested for job. Mostly aspiring employees are interested to get monthly thick ATM top-ups without much of tension, hard work, and struggle. In case job life is not easy going, free flowing, more accountability required with more ownership, people prefer leaving jobs and keeping the search on for the next launch pad. They are not bothered to stay back at home with lot of liabilities before they find one more stopgap engagement.
With the so much uncertainty in the market, why there is no hungry, desperate, job seekers?
I do not know the answer. Do you?


Leave a comment

Infocon Bangladesh 2016


The civilization has always been interested on protection, let it be primitive or sophisticated present ages.  Human Life or property or business, our thoughts revolves on safeguarding the same.

With the advancement with technology, we are getting more engaged with internet and in effect data security is becoming more critical worldwide. Information security is a well-known consideration globally. We are regularly facing attacks, frauds, security breaches, confidentiality issues, information misuse, piracy, sniffing and leakage of data across the domain.

During my last visit to Bangladesh (During 14th to 18th March, 2016) , Bangladesh bank fraudulent activities came to my notice. Bangladesh got into the news for all the wrong reasons. The situation enforced the banks to take corrective actions in line of Cyber Security. We thought of spreading awareness on the domain in Bangldeash through our initiative “Infocon”.


In line with Bangladesh Bank attack, the mandates came to all Banks to cover Information Security and Cyber Security risk/threats in order to secure public money and confidential/critical information.

The Cyber Security Governance and risks assessment are to be enforced across the employees of the organization. There should be preparations for Assessment of technological difficulties and emergency management procedures. The same may be achieved through third party assessment, skill development on security for all Employees.

Information Security should be continuously monitored through Operation Centres 24×7 basis.

PCI-DSS compliance is to be adopted with two-factor authentication systems for Chip-n-Pin based cards. Logs should be collected, maintained, co-related and maintained for all critical assets in order to have proactive measures.

Besides there are needs for ISO 27001:2013, ISO 20000:2011, ISO 9001:2015 standards. Apart from these Risk Assessment Framework based on the industry de-facto standard NIST Controls and FISMA Law/Compliance/ Cobit framework.

People are looking as protecting against malware, ransomware, APT etc

In effect various providers, OEMs positioned their product/solutions to the financial sector potential clients. But different product/solutions on same domain created lots of confusions, dilemma in the customer mind before going for conclusion. Before “Infocom Bangladesh 2016” event is narrated, I will try to explain some of the burning topics on Secuirty which are not only critical for Bangladesh, but across the globe.


Now a days threats are multifold. Every day we are discovering new lines of threats. Ransomware is one of the latest in the bucket. Ransomware is turning out to be one of the most virulent and potentially heart-breaking malware infections to become a victim of. If you are unfortunate enough to accidentally download this type of malicious code — whether through phishing attacks or illegitimate downloads and compromised websites — the malware locks your screen, encrypts your files and attempts to exhort a fee before giving you the cryptographic key required to get your files back. There are many strains of ransomware including CryptoWall, CryptoLocker, CoinVault and Bitcryptor. This malware is nasty enough, however the prediction is that new generations will increase in sophistication — including stealth tactics, the silent encryption of data — on both systems and backups — and potentially the use of kernel components to encrypt files on the fly.


An advanced persistent threat (APT) is a network attack in which an unauthorized person gains access to a network and stays there undetected for a long period of time. The intention of an APT attack is to steal data rather than to cause damage to the network or organization. APT attacks target organizations in sectors with high-value information, such as national defence, manufacturing and the financial industry. An APT attacker often uses spear fishing, a type of social engineering, to gain access to the network through legitimate means. Once access has been achieved, the attacker establishes a back door.

The next step is to gather valid user credentials (especially administrative ones) and move laterally across the network, installing more back doors. The back doors allow the attacker to install bogus utilities and create a “ghost infrastructure” for distributing malware that remains hidden in plain sight.


PCI-DSS stands for Payment Card Industry Data Security Standard

PCI DSS and related security standards are administered by the PCI Security Standards Council, which was founded by American Express, Discover Financial Services, JCB International, MasterCard Worldwide and Visa Inc. Participating organizations include merchants, payment card issuing banks, processors, developers and other vendors.

There are three ongoing steps for adhering to the PCI DSS:

  • Assess — identifying cardholder data, taking an inventory of your IT assets and business processes for payment card processing, and analyzing them for vulnerabilities that could expose cardholder data.
  • Remediate — fixing vulnerabilities and not storing cardholder data unless you need it.
  • Report — compiling and submitting required remediation validation records (if applicable), and submitting compliance reports to the acquiring bank and card brands you do business with.

PCI Data Security Standard – High Level Overview

Build and Maintain a Secure Network and Systems Install and maintain a firewall configuration to protect cardholder data
Do not use vendor-supplied defaults for system passwords and other security parameters
Protect Cardholder Data Protect stored cardholder data
Encrypt transmission of cardholder data across open, public network
Maintain a Vulnerability Management Program (VAPT) Protect all systems against malware and regularly update anti-virus software or programs
Develop and maintain secure systems and applications
Implement Strong Access Control Measures Restrict access to cardholder data by business need to know
Identify and authenticate access to system components
Restrict physical access to cardholder data
Regularly Monitor and Test Networks Track and monitor all access to network resources and cardholder data
Regularly test security systems and processes
Maintain an Information Security Policy Maintain a policy that addresses information security for all personnel

Sometimes, in orders to comply with PCI-DSS, some components are essential to implementation as a part of remediation:

  • Web Application Firewall,
  • Web Content Filtering,
  • Endpoint Security,
  • HIPS (Host Based Intrusion Prevention),
  • Security Information and Event Management (SIEM),
  • Vulnerability Assessment and Penetration Testing Tools (VAPT),
  • Data Leakage Protection (DLP),
  • File Integrity Monitoring,
  • End point Encryption,
  • Privilege User monitoring,
  • Identity Management (IDM) etc.


ISMS is Information Security Management System and the latest standard is ISO 27001:2013. It is essential to protect company data, not only to protect the future of your systems, but also to protect customer information, that has been entrusted to you. This requires a holistic approach covering price, IT Security, physical security and staff policy & procedures. ISO 27001 is the formal standard against which organizations seek independent certification of all their Information Security Management Systems.


IS0 27001 helps to protect against

  • Customer Information leakage
  • Virus & hacker attacks
  • Incompatible software conflicts
  • Failure to back up systems
  • Loss or theft of unencrypted backups
  • Internal security breaches
  • Loss of information resulting from staff turnover
  • System downtime


Ideal Coverage should include:

  • ISMS Scope Definitions
  • ISO 27001 ” Gap “Analysis Assessments
  • Performing an assessment of your existing ISMS
  • Information Security Policy and Procedure Development
  • Information Security Risk Assessments
  • ISMS Manual Development
  • ISO 27001 ISMS Implementation Support
  • Security Improvement Plans
  • Incident Management Plans
  • ISMS & Internal Audits
  • Management Reviews
  • Pre-certification Audits and support
  • Post Certification Audits Corrective Action Support
  • ISMS Trainings for Management & Employee
  • Integration of ISMS with COBIT, COSO, ITIL/ISO 20000 etc


Vulnerability assessments and penetration testing (pen tests for short) are processed to identify threats and Vulnerabilities in the IT landscape using valuable tools, that can benefit any information security program and they are both integral components of a Management process.

Vulnerability Assessment

A vulnerability assessment is the process of identifying and quantifying security vulnerabilities in an environment. It is an in-depth evaluation of your information security posture, indicating weaknesses as well as providing the appropriate mitigation procedures required to either eliminate those weaknesses or reduce them to an acceptable level of risk.

Vulnerability Assessments Follow These General Steps

  • Catalog assets and resources in a system
  • Assign quantifiable value and importance to the resources
  • Identify the security vulnerabilities or potential threats to each resource
  • Mitigate or eliminate the most serious vulnerabilities for the most valuable resources

Penetration Test

A penetration test simulates the actions of an external and/or internal cyber attacker that aims to breach the information security of the organization. Using many tools and techniques, the penetration tester (ethical hacker) attempts to exploit critical systems and gain access to sensitive data.

Depending on the scope, a pen test can expand beyond the network to include social engineering attacks or physical security tests. Also, there are two primary types of pen tests: “white box”, which uses vulnerability assessment and other pre-disclosed information, and “black box”, which is performed with very little knowledge of the target systems and it is left to the tester to perform their own reconnaissance.

Penetration Testing Follow These General Steps

  • Determination of scope
  • Targeted information gathering or reconnaissance
  • Exploit attempts for access and escalation
  • Sensitive data collection testing
  • Clean up and final reporting

With the increase of usage for Social, Mobile apps, Cloud, Big Data, IoT (more precisely SMAC – Social, Mobility, Analytics and Cloud), we are approaching towards a danger zone. Hope you have heard of Jeep Cherokee incident where hackers can take control of a connected car and lead you to death as well.

Event Details

Prime Infoserv LLP being a domain expert in the category, wanted to spread the awareness on Information Security and “Infocon Bangladesh 2016” took birth. The idea was to empower Enterprises with better wisdom with knowledge for doing proper diligence, understanding the actual need to cover-up the concerns.

The event took place on 16-04-2016 (Saturday) with the audience from major banks. Speakers took sessions on various aspects of cyber security and risks. The knowledge sharing was OEM agnostic in order to spread more awareness so that people can be more empowered to take decision beyond OEM/System Integrator Influence. The sessions were fully interactive like Q&A, discussions with concern areas and off course encouragement with surprise gifts.

IMG_20160416_112726 DSCN3919 DSCN3994 DSCN3962

Event had kicked off with lunch, followed by discussions on the burning topics as mentioned above.

The attendees were awarded with Trend Micro endorsed certificate.

More details of the events can be fetched from below links:


Infocon is not just an event, rather a process to build eco system surrounding the topic. We intent to create forums where domain experts and attendees can exchange thoughts even after events. There will be follow-up awareness sessions. There are serious thoughts to publish a Book covering pain points and resolutions to spread the awareness.

This retrospection will bring our smile back in order to have peace and fulfilment with wisdom.

We will have follow-up event in Bangladesh. Upcoming events are being planned in Kolkata, Bhutan, London, Africa and Mauritius.

Stay tuned for our upcoming initiatives under the brand “Infocon”.

As usual with my any other visit, this trip was not completed without localization. I had visited several persons including customers and as usual hospitality was awesome. I tried fakruddin and hazi biriyani which are treated as legacy. Besides “Bakharkhani” was one more food tasted as ethic local item.

IMG_20160419_130728 IMG_20160419_131227 IMG_20160420_165943   IMG_20160421_105027

Look forward coming to Bangladesh once again soon




1 Comment

5 Different Professions, Similar Characteristics


During casual discussions with my friends, I always mention myself as a better doctor than that tribe in the present market. Why? No disrespect to the profession, rather a discomfort to the prevailing trends. Once you visit a doctor, what he/she used to do? In normal situation, your pressure is measured, your chest conditions  are verified by stethoscope and further most your throat, ear, nose or any other organs will be physically checked (based on the symptoms are being told by you). In most of the situations, outcome will be some pathological tests (different blood tests, Xray, ECG, CT scan, MRI, USG if not more). Initially some basic medicines (mostly drugs from a specific company, not generic and majorly now anti biotic) are given and post test results, more specific medicines are applied. But these are not a characteristics of a good doctor. I can search my symptoms on the Internet now and see possible causes with possible remediation/tests, even some tricks for natural healing also without even medicines.  Directly based on symptoms (if have tenacity to do little study/research), we may conduct tests and follow further medication based on test results. Only I (we) cannot read test results clinically and cannot write medicines without the help of third party (book/internet).

But a true doctor is different.  He /she is having lot of intuitive power, analytical mind based on experience.  The doctor can observe the patient and can understand /predict lot of things without even asking. Patients body language,  his posture,  talking, skin color,  facial situation,  nails, eyes, nose, hair etc. will give lot of informations to the doctor even without having a single dialogue. The moment patient starts talking symptoms, the doctor will map his initial observation and ask further relative questions to come to a conclusion on the root cause. Based on the same, he will apply medicine  (rather like a chess player the doctor will think of after effects of the medicine and give a protective  measures  also in case of any side effects). But in today’s situation, it has become mostly gadget oriented.  A good doctor will only suggest a test which will be used to justify his prediction.

Same applies for a detective, advocate, astrologer and auditor.

Hope you have read Sherlock Homes, Agatha Christie to Bengal’s very own Felu da, Byomkesh Baxi.  The major power lies in observations.  The power of seeing things which are not visible by the common man makes them different. They analyze human behaviors, writing strokes, co-relate incidents and finally concluding decisions based on their sixth sense.

Do you think a true astrologer needs anything else that three information of your life – place of birth, date of birth and time of birth (X, Y & Z axis)? Based on these three inputs, he/she creates your birth chart and through critical mathematical, statistical analysis can see images of your past and future. But this knowledge is important, other it will lead to throwing some stones to us as remediation.

What does an auditor do? Let it be financial, IT or process auditor, first and foremost criteria is to see what all evidences available. What all missing, what all needed to mediate the gaps. Accordingly a report is generated where he/she refers to some third party benchmarking/reference /law.

An advocate also relates our problems, comes out counter plans where the opponent can be pushed back legally/logically.

So below are the charasterics which make these 5 Professions different:

1) Observation

2) Co-relation of facts/incidents

3) Understanding human psychology

4) Analytics

5) Intuition

6) Prediction

7) Imagination

8) Logical Strong Mind


What do you think?

Leave a comment

Music Has No Language

Sufi Sutra ! I had attended the musical event organized by Banglanatak dot com.

I know the organization for quite long time now and also it’s founder Mr.Amitabha Bhattacharjee. However, I am getting associated with their activities recently. I had been to akhra several times now and attended other concerts including “Bhalo Theko Nepal”.

And after attending the sixth version of Sufi Sutra (my first and last of it’s kind as next year onwards, it will be renamed as “Musiana”), I regret why I did not attend it earlier. Sufi Sutra pledges collaboration among nations, greater empathy between diverse cultural traditions, creating music transcending physical barriers and bring about a reunion of soul through the language of music.


The three days musical program once again proved that music has no language. The impatience, intolerance across the globe can only be controlled, re-directed through cultures. And music can be one of the most powerful medium towards it. As we (me and few of my fellow friends with similar mindsets) are also geared up to create a movement surrounding cultures, I could feel the pulse of cross border pollinations.

With the trend of Globalization, culture differentiates geography, cities and creates it’s sole identity. Folk artists across the globe assembled for three days in Rabindrasadn to demonstrate the message of tolerance, peace through music.

The artists from Scotland, Hungary, Portugal, Burkina Phaso, America, Brazil, Equador performed alongwith indian performers to tune people with variety of musical instruments.

We were spellbound with the violin by Cherry Grove from Scotland. First time we heard and seen an amazing instrument “Balafon” from Burkina Faso. Mamadou Diabate with his team mates from Percussion Mania took us to the heavenly world. They played other instruments also like Kiara, Talking drums, Ngoini as well which were new to almost all of us.


Hugo Osga from Kerrossel  (Portugal) played Indian banjo and I have seen first time a band performing banjo on a stage. Besides accordion, bagpiper were instrumental as well in their folk performance.

Remengo form Hungery came up with their ola gypsi folk music where they not only sang, but talked, used tones, sounds and make overall arrangement as a package.

Finally music touched all os us and took to a different word where no religion, no bullets, no bloods exist, only harmony, co-existence prevails.

Long love music.

Leave a comment

The Great Escape!

23rd January is the birthday for Netaji Subhas Chandra Bose. Today was his 120th Birthday. And fortunately or unfortunately I was present in front of Netaji Bhavan since very early morning. Netaji Bhavan was the place where he used to stay in Kolkata and he left for the last frontier from this house only.


The kind of characteristics he possessed are very rare in Bengali behaviours. Unfortunately instead of following his true spirits, positives, we keep on talking on the hidden stories / mysteries since years now.

I was there almost till afternoon today and found lot of activities on “Subhas Utsav”. Several clubs, bands, Celebrities, Politicians, TV Channels, and Procession were present. But general people got restricted to enter inside. Every channel, media, people were more interested on the mystery, de-classifications (as was scheduled to be released today by central ministry, I am still not aware of the outcome) as if in case we find his date of demise, Cause of Death, Conspiracy, all problems of India will be washed out.

This entire instances for years, celebrations, dilute his great endeavours, revolutionary thoughts, amazing leadership and off course immense patriotism and courage.

Subhas Chandra Bose, one of the few rare Bengalis who had not only guts, but had visions, missions, stitching power and exceptional execution capabilities. The way he dreamt for India’s freedom and stretched out in all possibilities across the globe, was truly instrumental. Unlike other freedom fighters in India, he did not only thrown his thoughts out of passion or patriotism, rather tried to assemble similar souls together and create a collective movement in order to have better impact.

The world is approaching towards World War III. None of the lands in any country are safe and targeted by activists. Open culture, unprejudiced thoughts are aspired to be prevented by Militants using religion, tribe, caste, politics and other means. True spirits of life through culture, literature, poetries. Painting, music are rarely been practised across the globe in real sense. We are being touched by external means, but it is not touching our souls, our emotions, our minds. World War III will be through Culture and we need to lead the same from Kolkata, Bengal. Let us be enlightened by the spirits of Netaji and identify him inside us to cross our barriers.

Instead of focussing on great escape instance, we may learn the great strategy to escape bypassing British intelligence and reach Europe. Let us get ourselves motivated to get geared up his approach for formation for Azad Hind Fauj (Indian National Army). His skills for blending different people from various geographies and tune them like an orchestra was really phenomenal.

Let’s extend our tribute to the great soul and bounce back crossing our “tolerance”.

Jai Hind!