Monday, August 16, 2010

KIDS POST



Hey,here are some interesting items for kids.................!



42nd Engineer's Day



In India, Engineers' Day is celebrated on 15 September every year.The day is the birthday of Sir Mokshagundam Visvesvarayya, an eminent Indian engineer.He was also called the precursor of economic planning in India. He took an interest not in engineering alone, but was capable of applying his talent to many allied matters connected with the development of the nation. His learned discourse on economic planning in India entitled 'Planned Economy for India and Reconstructing India' was the first available document on the planning effort of the country and it is still held as the parent source matter for economic planners.
To commemorate the birthday of Bharat Ratna Sir M Visvesvaraya, the Council of the Institution decided to observe September 15 as the Engineers' Day every year. This is celebrated throughout the country through all the Centres of the Institution with learned discourses on a theme specified by the Council every year.
ABOUT SIR M. VISVESVARAYA
As earlier Said, Sir Mokshagundam Visvesvarayya born on 15 September 1860, was a notable Indian engineer, scholar, and statesman born at Muddenahalli, near Kanivenarayanapura, in present-day Chikballapur District of Karnataka State. . He was a recipient of the Indian Republic's highest honour, the Bharat Ratna, in 1955. He was knighted as a Commander of the Indian Empire by King George V for his myriad contributions to the public good. He is held in high regard as the first and pre-eminent engineer of India.
Career as Engineer and Diwan of Mysore: Upon graduating as an engineer, Visvesvaraya took up a job with the Public Works Department (PWD) of Bombay.
-Later invited to join the Indian Irrigation Commission and was successful in Deccan.
-designed and patented a system of automatic weir water floodgates that were first installed in 1903 at the Khadakvasla Reservoir near Pune.
-The same system was installed at the Tigra Dam in Gwalior and the Krishnaraja Sagara (KRS) Dam in Mandya/ Mysore, Karnataka.
-In 1906-07, Government of India sent him to Eden(Africa) and was successful in water supply and drainage system Project there.
-Visvesvaraya achieved celebrity status when he designed a flood protection system for the city of Hyderabad from floods.
-He was instrumental in developing a system to protect Vishakapatnam port from sea erosion.
-He was instrumental in charting out the plan for road construction between Tirumala and Tirupati.
-During his period of service with the Government of Mysore state, he was responsible for the founding of, (under the Patronage of Mysore Government) the Mysore Soap Factory, the Parasitoide Laboratory, the Mysore Iron & Steel Works (now known as Visvesvaraya Iron and Steel Limited) in Bhadravathi, the Sri Jayachamarajendra Polytechnic Institute, the Bangalore Agricultural University, the State Bank of Mysore, The Century Club, Mysore Chambers of Commerce and numerous other industrial ventures. He encouraged private investment in industry during his tenure as Diwan of Mysore.
He was known for sincerity, time management and dedication to a cause.
Honours: In 1915, while he was the Diwan of Mysore, Visvesvaraya was made Knight Commander of the Order of the Indian Empire by the British for his myriad contributions to the public good. After India attained independence, Sir M. Visvesvaraya was given the nation's highest honour, the Bharat Ratna, in 1955.
THIS Great and Eminent Engineer Physically expired on 14 April 1962 but is still alive in all his PROJECTS which remains in OUR COUNTRY! Lets Salute the Legendary Person who inaugurated the Revolutionary Development in INDIA...

The 17 Most Dangerous Places on the Web

The scariest sites on the Net? They're not the ones you might suspect. Here's what to watch for and how to stay safe.
Those photos of Jessica Alba may be murder on your PC. That Google search result that looks as if it answers all your questions may do nothing but create a serious tech headache. The fun you had watching that hilarious video you downloaded may not be worth the misery it can cause your system.

You've been warned that the Internet is something of a security minefield--that it's easy to get in trouble. You can do everything you can think of to protect yourself and still be taken by a malware infection, a phishing scam, or an invasion of on¬¬line privacy. We'd like to provide a little help. Here are some of the hazards you may encounter, how dangerous they are, and what you can do to stay out of harm's way.
Not all Web dangers are created equal. Thankfully, our friends at the Department of Homeland Security have made our work of classifying Web threats a little easier. Will you get taken just by visiting that unfamiliar site? Or will you have to look for trouble? Let our threat level indicator be your guide.
Threat 1 >> Malicious Flash files that can infect your PC
The Place: Websites that use Flash
Adobe's Flash graphics software has become a big malware target in recent years, forcing the company to push out frequent security patches. But another danger you might not know about is associated with Flash cookies. Flash cookies are small bits of data that their creators can use to save Flash-related settings, among other things. But like regular cookies, Flash cookies can track the sites you visit, too. Worse still, when you delete your browser's cookies, Flash cookies get left behind.
If You Have to Go There: To help protect against Flash-based attacks, make sure you keep your Flash browser plug-ins up-to-date. And you can configure the Flash plug-in to ask you before it downloads any Flash cookies.
Threat 2 >> Shortened links that lead you to potentially harmful places
The Place: Twitter

Scammers love Twitter since it relies so much on URL shorteners, services that take long Internet addresses and re¬¬place them with something briefer.
And it's very simple to hide malware or scams behind shortened URLs. A shortened link that supposedly points to the latest Internet trend-du-jour may be a Trojan horse in disguise.
If You Have to Go There: Simply don't click links. Of course, that takes some of the fun out of Twitter. The other option is to use a Twitter client app. TweetDeck and Tweetie for Mac have preview features that let you see the full URL before you go to the site in question.
Some link-shortening services, such as Bit.ly, attempt to filter out malicious links, but it seems to be a manual process, not an automatic one. TinyURL has a preview service you can turn on.
Threat 3 >> E-mail scams or attachments that get you to install malware or give up personal info
The Place: Your e-mail inbox
Although phishing and infected e-mail attachments are nothing new, the lures that cybercrooks use are constantly evolving, and in some cases they're becoming more difficult to distinguish from legitimate messages. My junk mailbox has a phishing e-mail that looks like a legitimate order confirmation from Amazon. The only hint that something's amiss is the sender's e-mail address.
If You Have to Go There: Don't trust anything in your inbox. Instead of clicking on links in a retailer's e-mail, go directly to the retailer's site.
Threat 4 >> Malware hiding in video, music, or software downloads
The Place: Torrent sites

Torrent sites (such as BitTorrent) are often used for sharing pirated music, videos, or software, and are a trove of malware. No one vets the download files--they may be malware in disguise.
Ben Edelman, privacy researcher and assistant professor at Harvard Business School, thinks torrent sites are the most dangerous places to visit, since they don't have a business model or reputation to defend (by comparison, many porn sites rely on being deemed trustworthy). "The [torrent] customers, they really don't want to pay," he says.
If You Have to Go There: It's probably best to avoid torrent sites entirely, given their untrustworthy content, but if you must visit, use a secondary PC to protect your main system. Use antivirus software, and keep it up¬¬dated. Scan downloaded files and wait a couple of days be¬¬fore opening them. Brand-new malware can be tricky to catch, but the delay in opening may allow your antivirus software to get the necessary signatures.
Threat 5 >> Malware in photos or videos of scantily clad women
The Place: ‘Legitimate' porn sites

Porn sites have a reputation of being less secure than mainstream sites, but that assumption doesn't tell the whole story. "There is no doubt that visiting Websites of ill-repute is deadly dangerous. If you make a habit of it, it's a given that you'll be attacked at some point," says Roger Thompson, chief research officer with security firm AVG. "Unfortunately, staying away from those sites won't keep you safe by itself, because innocent sites get hacked all the time, and are used as lures to draw victims to the attack servers."
And as mentioned earlier, many porn sites operate as actual, legitimate businesses that want to attract and retain customers. That said, it may be hard to tell the "legit" porn sites from malware-hosting sites that use porn as a lure.
If You Have to Go There: Be suspicious of video downloads, or sites that require you to install video codecs to view videos (see the next threat, below). Using tools like AVG's LinkScanner and McAfee's SiteAdvisor (or SiteAdvisor for Firefox) can help you weed out the malicious sites.
And, again, consider visiting such sites on a secondary machine. You don't want your browser history on the family PC.
Threat 6 >> Trojan horses disguised as video codecs, infecting your PC with malware
The Place: Video download sites, peer-to-peer networks

If you watch or download video online, you've likely been told to download a video codec--a small piece of software that provides support for a type of video file--at least once. Usually, these bits of software are perfectly legitimate (for example, the popular DivX codec), but some less-than-reputable download services or video sites may direct you to download a piece of malware disguised as a codec. Security software company Trend Micro provides a good example of what these attacks look like.
If You Have to Go There: Your safest option is to stick with well-known video sites such as YouTube and Vimeo. And for catching up on the latest episodes of your favorite TV shows, sites and services like Hulu, TV.com, ABC.com, and iTunes are safer than peer-to-peer networks.
Threat 7 >> Geolocation--your smartphone and perhaps other parties know where you are
The Place: Your smartphone
The smartphone market is still in its infancy, really, and so are the threats. One possible concern is the use--or abuse--of geolocation. Although plenty of legitimate uses for location data exist, the potential for inappropriate uses also exists. In one case, a game listed on the Android Market was in reality a client for a spy app. In a less invidious example, a site called pleaserobme.com showed that--for a time--a stream of FourSquare check-ins indicated that a person was away from their home (the site's goal, mind you, wasn't to condone theft, but to raise awareness of the issue).
As in this example showing restaurants in a San Francisco neighborhood, some smartphone apps, such as Yelp for iPhone, use your physical location to provide you with information on nearby businesses or points of interest.Apple recently updated its privacy policy to reflect changes in how it handles location data in iOS 4. The policy now states that "to provide location-based services on Apple products, Apple and our partners and licensees may collect, use and share precise location data." You can read more on Apple's new privacy terms and what they mean for you.
If You Have to Go There: Be particular about the location-based sites, apps, and services that you use. As shown in the screenshot at right services such as Yelp provide good examples of useful location-aware apps. On the other hand, weigh the privacy implications of services like FourSquare or the new Facebook Places feature, and consider how much you feel comfortable divulging. (Read more on how to retain privacy on FourSquare and Facebook Places.)
Threat 8 >> 'Poisoned' search engine results that go to malware-carrying Websites
The Place: Search engines
Search engine poisoning is the practice of building tainted sites or pages that are designed to rank high in a search on a given topic. For example, according to a recent study by the security firm McAfee, 19 percent of search results for "Cameron Diaz and screensavers" had some sort of malicious payload. Breaking news topics and Facebook are also common search targets for attackers.
If You Have to Go There: Pick and choose which sites to go to. Don't just blindly click search results; check each URL first to make sure that it really leads to the site you want. Although any site can be hacked, visiting the Washington Post's story on a hot news topic, for example, is probably a wiser choice than following a link to a site you've never heard of before.
Threat 9 >> Malicious PDFs that try to fool you into installing malware
The Place: Hacked Websites, plus your inbox
As Microsoft has become more serious about Windows security over the past few years, would-be attackers have had to find new ways to infect PCs. Attacking flaws in Adobe Acrobat is one of these newer methods. So-called poisoned PDFs are PDF files that have been crafted in such a manner that they trigger bugs in Adobe Reader and Adobe Acrobat; posted on a hijacked Website, they may let an attacker commandeer your PC and access your files and personal info.
Feeling particularly paranoid? Uncheck 'Allow opening of non-PDF file attachments with external applications' (near the top) to head off certain PDF exploits.A newer variant takes an otherwise innocent-looking PDF document and inserts malware into it. Adobe Reader may pop up an alert asking if you want to run the malware, but hackers can edit those messages to trick you into opening the file.
How serious is this problem? In 2009, attacks using malicious PDFs made up 49 percent of Web-based attacks, according to security firm Symantec.
If You Have to Go There: First, always make sure that you're running the latest version of Adobe Reader.
You can also use a different PDF reader, such as Foxit Reader. This can protect you from attacks on holes in Adobe Reader itself, but it won't make you immune to all PDF attacks, such as the newer ones that embed malware inside the PDFs. Make sure, also, that you update to Adobe Reader 9.3.3 or later (Reader 8 users should update to version 8.3.3 or later); these updates change the way Adobe Reader handles non-PDF attachments and reduce the risk from such attacks.
You can turn off Adobe Reader's ability to open non-PDF attachments by going to Preferences, clicking Trust Manager, and unchecking Allow opening of non-PDF file attachments with external applications.
The next major release of Acrobat and Reader will provide a new "protected mode" against these attacks.
Threat 10 >> Malicious video files using flaws in player software to hijack PCs
The Place: Video download sites

Attackers have been known to exploit flaws in video players such as QuickTime Player and use them to attack PCs. The threats are often "malformed" video files that, like malicious PDFs, trigger bugs in the player software that let the attackers in to spy on you, plant other malware, and more.
If You Have to Go There: Keep your player software up-to-date. Apple and Microsoft periodically release patches for QuickTime and Windows Media Player, respectively. Avoid downloading videos at random. Stick to well-known video sites such as YouTube, or to download services like iTunes.
Threat 11 >> Drive-by downloads that install malware when you visit a site
The Place: Hacked legitimate sites
A drive-by download occurs when a file downloads and/or installs to your PC without you realizing it. Such downloads can happen just about anywhere. Some sites are built to lure people into a drive-by download; but in a common attack method, criminals will hack a Web page, often on an otherwise legitimate site, and insert code that will download malware to your computer.
If You Have to Go There: The first thing to do is to keep your security software up-to-date, and to run regular malware scans. Many security suites can flag suspicious downloads.
Threat 12 >> Fake antivirus software that extorts money--and your credit card information
The Place: Your inbox, hacked legitimate sites
Fake antivirus programs look and act like the real thing, complete with alert messages. It isn't until you realize that these alerts are often riddled with typos that you know you're in trouble.
Most fake antivirus software is best described as extortionware: The trial version will nag you until you purchase the fake antivirus software-which usually does nothing to protect your PC. Once you send the criminals your credit card information, they can reuse it for other purposes, such as buying a high-priced item under your name.
You can get infected with a fake antivirus app in any number of ways. For example, in drive-by downloads (see the previous item), a malicious payload downloads and installs without the user realizing it or having any time to react.
If You Have to Go There: If you get an alert saying you're infected with malware, but it didn't come from the antivirus software you knowingly installed, stop what you're doing. Try booting into Safe Mode and running a scan using your legitimate antivirus software.
However, such a scan may not clean up all of the malware-either the scanner doesn't have a signature for one fragment, or that piece doesn't act like traditional malware. This may render behavioral detection (which spots malware based on how it acts on your system) useless. If all else fails, you may need to call in a professional.
Threat 13 >> Fraudulent ads on sites that lead you to scams or malware
The Place: Just about any ad-supported Website

Hey--ads aren't all bad! They help sites pay the bills. But cybercriminals have taken out ads on popular sites to lure in victims. Last year, the New York Times site ran an ad from scammers, and earlier this year some less-than-scrupulous companies were gaming Google's Sponsored Links ad program and placing ads that looked like links to major companies' Websites.
"The bad guys have become very clever at exploiting online advertising networks, tricking them into distributing ads that effectively load malicious content--especially nasty, scaremongering pop-ups for rogue antispyware," says Eric Howes, director of research services for security firm GFI Software.
If You Have to Go There: Most large sites, such as PCWorld.com, have ad sales departments that work frequently with a core group of large advertisers, so it's probably safe to click a Microsoft ad on the New York Times site. But as the Google Sponsored Links incident shows, nothing is entirely fail-safe.
Threat 14 >> Questionable Facebook apps
The Place: Facebook
Facebook apps have long been an issue for security experts. You don't always know who's developing the apps, what they're doing with the data they may be collecting, or the developers' data security practices. Even though you have to approve apps before they can appear on your profile and access your personal information, from there the security of your data is in the developer's hands.


Take a few minutes to check your Facebook application settings to make sure that your app privacy settings are as you want them.If You Have to Go There: Be selective about the apps you add to your profile--don't take every quiz, for example. Check your privacy settings for Facebook apps, as well: Click the Ac¬¬count drop-down menu in the upper-right corner of Facebook's site, select Privacy Settings, and then click Edit your settings under ‘Applications and Websites'. There, you can control which apps have access to your data, and which of your friends can see what information from apps (such as quiz results); you can also turn off Facebook apps altogether.
Threat 15 >> Sites that lure you in, get you to sign up, then sell your e-mail address for spam
The Place: 'Free electronics' sites
You've no doubt seen sites around the Web blaring, Get a free iPad! Get a free notebook! A free iPod! It's easy! These sites aren't typically dangerous in the classical sense--you probably won't get infected with malware--but your personal information could be sold to other businesses, who can then use it to sell more stuff to you.
If You Have to Go There: Read the privacy policies. And then read them again. Also, beware of privacy policy loopholes--even though a site says that it won't sell your private data to third parties, depending on the language of the policy, they may still be able to give your information to "affiliates."
Threat 16 >> Phishing 2.0 on social networks that tricks you into downloading malware or giving your Facebook login information to a criminal
The Place: Social networks

Questionable Facebook apps and malicious shortened links aren't the only dangers lurking on social networks. Sites like Facebook have given rise to new forms of phishing. Scammers might hijack one person's Facebook account, then use it to lure that person's friend into clicking a malicious link, going to spam sites, or giving up their Facebook login information--thereby giving scammers one more Facebook account to hijack.
"One of the bigger dangers currently facing users is malware, adware, and spyware spread through social networks like Facebook and Twitter," says Eric Howes, director of malware research with Sunbelt Software. "Users may receive spam via these networks offering them free deals, links to interesting videos, or even widgets to enhance their Facebook profiles. In many cases what's really being pushed on users is adware, spyware, or even malicious software that can exploit users' PCs."
If You Have to Go There: Don't trust every link posted to Facebook, even if one of your friends posted it. Be especially suspicious if the post is out of the ordinary for that person. Check the person's wall or Twitter @-replies to see if anyone is concerned that the person's account has been compromised.
And if you suspect that your account has been hijacked, change your password immediately. Both Facebook and Twitter have resources to help you keep up-to-date on the latest threats on both sites. Facebook users should visit its security page; if you're on Twitter, be sure to follow @spam and @safety for Twitter security best practices.
Threat 17 >> Oversharing--exposing too much personal information on your social network profiles
The Place: Social networks

How many times have you seen friends on Facebook or Twitter publicly divulge a bit more information than is necessary? Oversharing isn't just a matter of getting a little too personal--it can leave your private information viewable to the general public. But it's avoidable.
"There is a subtle danger that few people understand with the social networking sites, and that is the idea of information leakage," says AVG's Roger Thompson. "People, particularly teens, put all sorts of information online, without realizing that many more people than just their friends can see that data."
Oversharing could very well lead to more serious privacy issues further down the road, Thompson adds. "As today's young teens reach an age to apply for a credit card, I fully expect an onslaught of fraudulent card applications on their behalf, because they un¬¬wittingly di¬¬vulged so much information. Harvesting is going on now, and we have no idea who is doing the harvesting."
If You Have to Go There: This particular threat is relatively easy to avoid, in that a little common sense can go a long way: Just be mindful of what you post. Do you really need to publish your home address and phone number to your Facebook profile?
Finally, be certain to check your privacy settings to make sure that you're not divulging your deepest, darkest secrets to all 500 million Facebook users.
Hosed!
What Happens When You Surf Unprotected?


Illustrations by Mark Todd11:45 a.m. I start the experiment with a pristine, clean PC running Windows Vista.
11:55 a.m. I need to check my e-mail. I download what appears to be a résumé file. Strange, I'm not hiring. I open it anyway. My screen flickers a little, but nothing starts. Hmm...
12:00 p.m. I start poking around on the Web, and start out easy. I run a Google search for free smilies, and sure enough, I find some. Who am I to refuse?
12:29 p.m. A couple smiley packs later, I am up to three browser toolbars. Junkware, but no malware...yet.
12:41 p.m. I download some random freebie antivirus software I've never heard of. Let's see what this does...
12:48 p.m. More random downloads, and my desktop is getting junked up. I now have icons for free games and 1000 free songs littered all over, plus more browser toolbars than I care to have.
12:55 p.m. IE is hating me right now. Still no signs of malware, but something's sure eating up system resources.
1:03 p.m. My PC locks up for a few moments.
1:25 p.m. After a restart, Windows throws up a warning about a program at C:\Users\PCW\AppData\Roaming\host32.exe. I have no idea what it is.
1:40 p.m. I think I killed IE. I can't launch it. Malware? But I uninstall a couple of toolbars, and it seems to work again.
3:00 p.m. It's unclear whether I've gotten infected by anything on the Web, but so far I haven't done anything too terribly risky. However, I've got to check my e-mail again; I'm expecting an important file from a friend.
3:05 p.m. Whoops. I think I clicked on the wrong file. I've got fake antivirus!
3:25 p.m. I now have three or four fake antivirus programs running. Malware has also planted three shortcut links to porn sites on my desktop. And whenever I open something in IE, a fake antivirus app kicks in with a fake warning.
4:13 p.m. Something just forced my PC to shut down and restart. I think I've successfully hosed this computer
Tips from the Pros:
Top 5 Ways to Stay Safe Online
Stay up-to-date, stay paranoid, stay protected. That's the message from the security experts we spoke with while developing this story. Here are a few of their top tips and suggestions for protecting your computer against malware and hackers.
1) Keep up on patches.
Be sure to run Windows Update, as well as the software update features in the other programs that you use every day.
2) Be password smart.
As tempting as it is to use the same password in multiple places, don't. And use longer passwords, too-they're harder to crack. If you have lots of accounts to manage, use a password manager. (See "GPUs Power Games, Crack Passwords," for more on this issue.)
3) Use security software.
That may seem self-evident, but it can help block malware or software that is acting suspiciously, and security software companies are hard at work devising new ways to stop infections be¬¬fore they ever reach your PC. Check our antivirus and security software page regularly for the latest on security products.
4) If it sounds too good to be true... well, you know the rest.
No, someone in a faraway land isn't really offering you millions of dollars. No, attractive women from Russia probably aren't seeking you out specifically. No, those aren't magic cure-all pills.
5) Assume that everyone's out to get you.
PC security is one area where it pays to be paranoid. Just remember that no security software is fail-safe, and that you're still the one sitting at the keyboard. Assume that no site is safe. And don't automatically trust a link or file download, even if a friend sends it to you.
And a few final thoughts:
From Eric Howes, director of research services for security firm GFI Software:
"The user is always the weak link. Even the best antimalware protection and security patches cannot protect a PC from malware if the user sitting at the keyboard is being irresponsible while surfing the Web."
From Roger Thompson, chief research officer, PC security firm AVG:

"Good software designed to detect this stuff (in our case, LinkScanner) helps, but unfortunately, these are areas where the problem is in relative infancy, and is going to get much worse."

INDEPENDENCE DAY SPECIALS

The National Flag of India is a horizontal rectangular tricolour of deep saffron, white and India green; with the Ashoka Chakra, a 24-spoke wheel, in blue at its centre. It was adopted in its present form during a meeting of the Constituent Assembly held on 22 July 1947, when it became the official flag of the Dominion of India. The flag was subsequently retained as that of the Republic of India. In India, the term "tricolour" (Hindi: तिरंगा, Tirangā) almost always refers to the Indian national flag. The flag is based on the Swaraj flag, a flag of the Indian National Congress designed by Pingali Venkayya.

India was under British rule in the 19th century. A number of flags with varying designs were used in the period preceding the Indian Independence Movement by the rulers of different princely states; the idea of a single Indian flag was first raised by the British rulers of India after the rebellion of 1857, which resulted in the establishment of direct imperial rule. The first flag, whose design was based on western heraldic standards, was similar to the flags of other British colonies, including Canada and Australia; the blue banner included the Union Flag in the upper-left quadrant and a Star of India capped by the royal crown in the middle of the right half. To address the question of how the star conveyed "Indianness", Queen Victoria created the Knight Commander of the Order of the Star of India to honour services to the empire by her Indian subjects. Subsequently, all the Indian states received flags with symbols based on the heraldic criteria of Europe.
In April 1921, Mohandas Karamchand Gandhi wrote in his journal Young India about the need for an Indian flag, proposing a flag with the charkha or spinning wheel at the centre.The idea of the spinning wheel was put forth by Lala Hansraj, and Gandhi commissioned Venkayya to design a flag with the spinning wheel on a red and green banner, the red colour signifying Hindus and the green standing for Muslims. Gandhi wanted the flag to be presented at the Congress session of 1921, but it was not delivered on time, and another flag was proposed at the session. Gandhi later wrote that the delay was fortuitous since it allowed him to realise that other religions were not represented; he then added white to the banner colours, to represent all the other religions. However, soon the Sikhs wanted the banner to include the black colour and Gandhi was forced to address these issues in his writings and speeches. Finally, owing to the religious-political sensibilities, in 1929, Gandhi moved towards a more secular interpretation of the flag colours, stating that red stood for the sacrifices of the people, white for purity, and green for hope.

On 13 April 1923, during a procession by local Congress volunteers in Nagpur commemorating the Jallianwala Bagh massacre , the Swaraj flag with the spinning wheel, designed by Venkayya, was hoisted. This event resulted in a confrontation between the Congressmen and the police, after which five people were imprisoned. Over a hundred other protesters continued the flag procession after a meeting. Subsequently, on the first of May, Jamnalal Bajaj, the secretary of the Nagpur Congress Committee, started the Flag Satyagraha, gaining national attention and marking a significant point in the flag movement. The satyagraha, promoted nationally by the Congress, started creating cracks within the organisation in which the Gandhians were highly enthused while the other group, the Swarajists, called it inconsequential. Finally, at the All India Congress Committee meeting in July, at the insistence of Jawaharlal Nehru and Sarojini Naidu, Congress closed ranks and the flag movement was endorsed. The flag movement was managed by Sardar Vallabhbhai Patel with the idea of public processions and flag displays by common people. By the end of the movement, over 1500 people had been arrested across all of British India.
While the flag agitation got its impetus from Gandhi's writings and discourses, the movement received political acceptance following the Nagpur incident. News reports, editorials and letters to editors published in various journals and newspapers of the time attest to the subsequent development of a bond between the flag and the nation. Soon, the concept of preserving the honour of the national flag became an integral component of the freedom struggle. While Muslims were still wary of the Swaraj flag, it gained acceptance among Muslim leaders of the Congress and the Khilafat Movement as the national flag. Detractors of the flag movement, including Motilal Nehru, soon hailed the Swaraj flag as a symbol of national unity. Thus, the flag became a significant structural component of the institution of India. In contrast to the subdued responses of the past, the British Indian government took greater cognisance of the new flag, and began to define a policy of response. The British parliament discussed public use of the flag, and based on directives from England, the British Indian government threatened to withdraw funds from municipalities and local governments that did not prevent the display of the Swaraj flag. The Swaraj flag became the official flag of Congress at the 1931 meeting. However, by then, the flag had already become the symbol of the independence movement.
Indian Flag, the first stamp of independent India, released on 21 Nov 1947, was meant for foreign correspondence.[15][16]A few days before India gained its freedom in August 1947, the Constituent Assembly was formed. To select a flag for independent India, on 23 June 1947, the assembly set up an ad hoc committee headed by Rajendra Prasad and including Maulana Abul Kalam Azad, Sarojini Naidu, C. Rajagopalachari, K. M. Munshi and B.R. Ambedkar as its members. On 14 July 1947, the committee recommended that the flag of the Indian National Congress be adopted as the National Flag of India with suitable modifications, so as to make it acceptable to all parties and communities.

The spinning wheel of the Congress flag was replaced by the Chakra (wheel) from the Lion Capital of Ashoka. According to Sarvepalli Radhakrishnan, the chakra was chosen as it was representative of dharma and law. However, Nehru explained that the change was more practical in nature, as unlike the flag with the spinning wheel, this design would appear symmetrical. Gandhi was not very pleased by the change, but eventually came around to accepting it. The flag was proposed by Nehru at the Constituent Assembly on 22 July 1947 as a horizontal tricolor of deep saffron, white and dark green in equal proportions, with the Ashoka wheel in blue in the centre of the white band. Nehru also presented two flags, one in Khadi-silk and the other in Khadi-cotton, to the assembly. The resolution was approved unanimously.
It served as the national flag of the Dominion of India between 15 August 1947 and 26 January 1950, and has served as the flag of the Republic of India since then.

Monday, July 12, 2010

From College Campus to Corporate Climate

When the last days of your college life approach and you are about to graduate, the most prominent thought that would be playing on your mind is about getting your first job. While students begin to get nostalgic about their last days at college and stat cherishing the memories of time spent at college, the pre-dominant remains about starting their career. It is the most important stage of life where a completely new beginning awaits you. The fun and carefree time of the college life would be replaced by the responsibility and worries of finding a job. The friends and the chit-chat with them would soon be replaced by colleagues and professional talk. The college canteen environment would soon be replaced by to-the-point office environment.


So, how do you cope with this transition to get settled in your first job? This is a question that every student encounters when he/she begins the career path. With a little help and advice, you can settle down well at your workplace even without any experience to boast about. You might have to restrain yourself in the beginning but that does not mean that you become a different person. Your workplace will be the place to shine your personality and hone your existent skills. If you use the opportunities presented at the workplace well, you will really succeed in making a mark on your first job.

At college, you were expecting to absorb knowledge and you spent years doing just that. Tests and exams were conducted every now and then and based on your understanding and knowledge you were judged. At your professional life, you would be expected to put that knowledge to practical use and how well you can do that will define your success at your job. Tests would not be occasional. In fact, everyday would be like a new test and your performance and conduct would be under the scanner each day by your seniors and supervisors. There may not be any formal exams but you would be working under tight deadlines most of the time and there would be little scope of error as your work would also impact the work of others if you are working in a team. Welcome to your first fresher job.

Now, to make the right first impression in your first job and to live up to that impression you would need to pump in a lot of effort initially. A little advice can help you here as you would be na've first. These small tips might sound insignificant but the fact remains that they will go a long way in cementing your position in your first job. These tips are about your general behavior and conduct at office and are not work-specific so they can apply to all fresher jobs across industries.

The first golden rule is that you remain punctual. Always arrive at the workplace on time. If you are seen as a latecomer, you might lose initial respect in the eyes of your boss and co-workers. Stick to a fixed lunch hour and do not spend too much time taking breaks. Do not be seen around wasting time on personal calls or just chatting away. Second ting that you keep in mind is to dress appropriately. If there is a particular dress code at your workplace, follow it strictly. If the dressing sense is relaxed, make sure you still dress up decently and not like you are going to a college. Don't wear too casual or holiday-mood kind of clothes.

Another important thing that you must remember is that listening is a bigger virtue than speaking. So, listen, listen and still listen more. Don't start throwing in your suggestions and comments till you have fully understood how things work at your office. Learn the rope of the game and observe as much as you can to understand how things have been working so far. If you start suggesting changes from the word go, you might come across as a threat to your fellow workers. So, be mindful of that. Avoid office gossip and mind your manners and etiquette at all times. Look around for a mentor under whose guidance you can learn and prosper in your career. Be inquisitive and ask questions to learn more. There is no harm in asking relevant questions. Following these small tips, you will get settled in the corporate culture and get a good head start for yourself. Thus, your first job will become a perfect launch pad for your career.

Lack of computer science engineers big challenge for IT

Bangalore: The IT sector has been hiring engineers from other engineering disciplines due to lack of computer science engineers in the country and this is probably one of the main hindrances to the growth of the Indian economy. NR Narayana Murthy feels the the growth of the IT sector is getting limited because of this.

Infosys hired 20,000 to 22,000 people from non-computer science backgrounds last year. "Today, by and large, majority of the engineering graduates that we take come from non-computer science backgrounds. We have electrical engineers, mechanical engineers and civil engineers. Given that this country is on high economic growth path, we have come to a stage where we should take only computer science people and we don't take away engineers who can build factories, dams and power plants," said Murthy at the tenth Annual Convocation International Institute of Information Technology, Bangalore (IIIT-B).



Murthy feels that there is a need to chalk out a plan to facilitate opportunities for state governments, the Central government and other inter state institutes to start more institutes which would focus on technical education.













Wednesday, June 16, 2010

INDIA

LANGUAGES: The northern Indian languages from the Indo-European family evolved from Old Indo-Aryan such as Sanskrit, by way of the Middle Indo-Aryan Prakrit languages and Apabhraṃśa of the Middle Ages. There is no consensus for a specific time where the modern north Indian languages such as Hindi, Bengali, Marathi, Gujarati, Saraiki, Punjabi, Assamese, Sindhi and Oriya emerged, but AD 1000 is commonly accepted. Each language had different influences, with Hindi/Urdu and closely related Hindustani languages being strongly influenced by Persian.
The Dravidian languages of South India had a history independent of Sanskrit. The major Dravidian languages are Tamil, Telugu, Kannada and Malayalam. Though Dravidian in origin, over eighty percent of words in Malayalam are pure Sanskrit words. The Austro-Asiatic and Tibeto-Burman languages of North-East India also have long independent histories.

RELIGION AND CULTURE:India is the birth place of Hinduism, Buddhism, Jainism and Sikhism, collectively known as Indian religions. Indian religions, also known as Dharmic religions are a major form of world religions along with Abrahamic ones. Today, Hinduism and Buddhism are the world's third- and fourth-largest religions respectively, with over 2 billion followers altogether, and possibly as many as 2.5 or 2.6 billion followers. India is also the birthplace for the Sikh, Jain, Lingayat, and Ahmadiyya faiths
India is one of the most religiously diverse nations in the world, with some of the most deeply religious societies and cultures. Religion still plays a central and definitive role in the life of most of its people.
The religion of 80% of the people is Hinduism. Islam is practiced by around 13% of all Indians. Sikhism, Jainism and especially Buddhism are influential not only in India but across the world. Christianity, Zoroastrianism, Judaism and the Bahá'í Faith are also influential but their numbers are smaller. Despite the strong role of religion in Indian life, atheism and agnostics also have visible influence along with a self-ascribed tolerance to other people.

The culture of India has been shaped not only by its long history, unique geography and diverse demography, but also by its ancient heritages, which were formed during the Indus Valley Civilization and evolved further during the Vedic age, rise and decline of Buddhism, the Golden age, invasions from Central Asia, European colonization and the Indian independence movement.India's languages, religions, dance, music, architecture and customs differ from place to place within the country, but nevertheless possess a commonality. The culture of India is an amalgamation of these diverse sub-cultures spread all over the Indian subcontinent and traditions that are several millennia old.
Regarded by some historians as the "oldest living civilization of Earth", the Indian tradition dates back to 8,000 BC and has a continuous recorded history for over 2,500 years. Several elements of India's diverse culture — such as Indian religions, yóga and Indian cuisine — have had a profound impact across the world.

GEOGRAPHY: The country lies to the north of the equator between 8°4' and 37°6' north latitude and 68°7' and 97°25' east longitude. It is the seventh-largest country in the world, with a total land area of 3,287,263 square kilometres (1,269,219 sq mi). India measures 3,214 km (1,997 mi) from north to south and 2,993 km (1,860 mi) from east to west. It has a land frontier of 15,200 km (9,445 mi) and a coastline of 7,517 km (4,671 mi).
India is divided into seven physiographic regions. They are
The northern mountains(the Himalayas, which includes the Kuen Lun and the Karakoram ranges and the northeast mountain ranges), Indo-Gangetic plains, Thar Desert, Central Highlands and Deccan Plateau, East Coast, West Coast, Bordering seas and islands.
India has 28 States and 7 Union Territories. There are total 626 Districts as per list founded on the official webpage of districts of India maintained by Govt of India.

CLIMATE: The climate of India defies easy generalization, comprising a wide range of weather conditions across a large geographic scale and varied topography. Analyzed according to the Köppen system, India hosts six major climatic subtypes, ranging from desert in the west, to alpine tundra and glaciers in the north, to humid tropical regions supporting rain forests in the southwest and the island territories. Many regions have starkly different micro climates. The nation has four seasons: winter (January and February), summer (March to May), a monsoon (rainy) season (June to September), and a post-monsoon period (October to December).

ECONOMY: The economy of India is the eleventh largest economy in the world by nominal GDP and the fourth largest by purchasing power parity (PPP). Following strong economic reforms from the socialist inspired economy of a post-independence Indian nation, the country began to develop a fast-paced economic growth, as free market activities initiated in 1990 for international competition and foreign investment. India is an emerging economic power with a very large pool of human and natural resources, and a growing large pool of skilled professionals. Economists predict that by 2020, India will be among the leading economies of the world.
The Indian rupee (INR, Hindi:रुपया) is the official currency of India. The issuance of the currency is controlled by the Reserve Bank of India.

FOREIGN RELATIONS AND ARMED FORCES: India has a long history of collaboration with several countries and is considered a leader of the developing world. India was one of the founding members of several international organizations, most notably the United Nations, the Non-Aligned Movement, the Asian Development Bank and the G20 industrial nations. India has also played an important and influential role in other international organizations like East Asia Summit, World Trade Organization, International Monetary Fund (IMF), G8+5 and IBSA Dialogue Forum. Regional organizations India is a part of include SAARC and BIMSTEC. India has taken part in several UN peacekeeping missions and in 2007, it was the second-largest troop contributor to the United Nations. India is currently seeking a permanent seat in the UN Security Council, along with the G4 nations.

The Indian Armed Forces(भारतीय सशस्त्र सेनाएं) are the military forces of the Republic of India encompassing the Indian Army, the Indian Navy, the Indian Air Force and various other inter-service institutions.

LAW AND CONSTITUTION: Law of India refers to the system of law which presently operates in India. It is largely based on English common law because of the long period of British colonial influence during the period of the British Raj. Much of contemporary Indian law shows substantial European and American influence. Various legislations first introduced by the British are still in effect in their modified forms today. During the drafting of the Indian Constitution, laws from Ireland, the United States, Britain, and France were all synthesized to get a refined set of Indian laws, as it currently stands. Indian laws also adhere to the United Nations guidelines on human rights law and the environmental law. Certain international trade laws, such as those on intellectual property, are also enforced in India.

The Constitution of India is the longest written constitution for a country, containing 444 articles, 12 schedules, numerous amendments and 117,369 words. The date 26 January was chosen to commemorate the declaration of independence of 1930. It declares the Union of India to be a sovereign, socialist, secular, democratic republic, assuring its citizens of justice, equality, and liberty and to promote among them all fraternity; the words "socialist", "secular" and "integrity" and to promote among them all "Fraternity"; were added to the definition in 1976 by constitutional amendment. India celebrates the adoption of the constitution on 26 January each year as Republic Day. Dr B. R. Ambedkar , as chairman of the Constitution Drafting Committee, was the chief architect of the Indian Constitution.

Freshers and Job Seeker-Beware of Fraudulent Recruiters

Hello Friends! Today's post is about Fraudulent Recruiters
Many of you are exposed to fraud recruiters and some also payed a lot of money and lost it.No one is ready to go with Legal proceedings, as common man is not ready to face the consequences later,i.e,.Enquiry and Such things.I also accept with you. I kindly request you to inform about such frauds to the people in your network,Here you create some Awareness so that they can escape from such.And this chain may continue and help many more friends. Here are some steps to escape from Frauds-

1.
I kindly request you to enquire about the emails and offers which was mailed to you, if asked you to pay some amount to an Account of an individual.If you do not have any IT Employee in your network,ask your distant Friends and even their Relatives to help you.
2.The authorized mail from the company will be with the following IDs':"person/system-name@company/domain-name."
Not with"Companyname@web-MailServiceProvided."
3.If the mail is not from company site,even if you have applied for the job,check the company site about the vacancy and the recruitment details.

Some companies mentioned such frauds in their Website.Seeing that, We thought of this post. Here are two examples which we found in our search,COMPANY LOGOS THEY USED ARE OF MNC's AND WELL REPUTED ONES-





Dear Applicant, This is inform you that your Resume has been short listed from ______.com and after our hrd had been short list you in the company ,so read carefully the attachment file .
Thank you
Sonali puri
XXXXXXX Company


Here, the Recipient mentioned that-"It says that my profile got selected, without applying for the post. Looks like the so-called-recruiter is desperate to hire people."
1.The mail was present in SPAM
2.The attachment was a picture,JPEG one.
3.The email was full of grammatical mistakes.



Dear Candidate,You Resumme has been selected by Company HRD. Your interview process schedule attached with this email. Kindly see
the attached file for more detials.
Thanks
Company HRD.


Here the Recipient said that he had applied for a vacancy in the company and was waiting.He said-"There are hundreds of incoming SPAM emails everyday,but this one got my attention.I found some peculiarity in the mail."and are mentioned below.
1.The mail was present in SPAM
2.The attachment was a picture,GIF one.
3.As you notice, the email was full of grammatical mistakes.



There are some more fraud offer letters, which you can find when you browse.So,Be careful and follow the guidelines which was mentioned above.

As this is a Recession Time,Frauds are Exploiting our weakness(job-search.)BEWARE OF SUCH FRAUDS
ALL THE BEST n we hope a Betterment in your career!

Admission Tips and Entrance test sites

For engineering,management,arts,.. such Degree and Diploma Courses, before admissions, students should check whether the college is AICTE Approved one.
click- LIST of DEGREE colleges in INDIA(including engineering)
-LIST of DIPLOMA colleges in INDIA

For medical check for MCI recognition. Here-Speciality and Super-speciality Courses(P.G)
- List of all recognized colleges in INDIA(34 pages)

CATIIM: IIM home

GRE and GMAT: Gmat official site
-Gre Official site

TOEFL: Official Site

COMEDK results:UG & PG courses

AIIMS: Results portal

JIPMER: Official site
-MBBS 2010 entrance exam results

AIEEE: Results

IIT-JEE: Results

GATE: Results

EAMCET results: EAMCET-2010 results
click here for criteria for ranking
Congrates to all the students!

Friday, May 21, 2010

Speech by Chetan Bhagat at Symbiosis...


Don't just have career or academic goals. Set goals to give you a balanced, successful life. I use the word balanced before successful. Balanced means ensuring your health, relationships, mental peace are all in good order.

There is no point of getting a promotion on the day of your breakup. There is no fun in driving a car if your back hurts. Shopping is not enjoyable if your mind is full of tensions.

"Life is one of those races in nursery school where you have to run with a marble in a spoon kept in your mouth. If the marble falls, there is no point coming first. Same is with life where health and relationships are the marble. Your striving is only worth it if there is harmony in your life. Else, you may achieve the success, but this spark, this feeling of being excited and alive, will start to die.

One thing about nurturing the spark - don't take life seriously. Life is not meant to be taken seriously, as we are really temporary here. We are like a pre-paid card with limited validity. If we are lucky, we may last another 50 years. And 50 years is just 2,500 weekends. Do we really need to get so worked up?

It's ok, bunk a few classes, scoring low in couple of papers, goof up a few interviews, take leave from work, Enjoy with your friends, fall in love, little fights with your loved Ones. We are people, not programmed devices.

"Don't be serious, be sincere."!

Friday, May 14, 2010

Programmer Help sites(Useful for you?)

JAVA,JAVA Script,HTML

James Gosling Blog
Core Java Technologies Tech Tips
Java Technology Fundamentals
Java World
Quickit
WebSource.Net
HTML Tutorials
SDN Technology Blogs

Certified Programmes: Sun Certified Java Associate (SCJA), Sun Certified Java Programmer (SCJP), Sun Certified Java Developer (SCJD), Sun Certified Web Component Developer (SCWCD), Sun Certified Business Component Developer (SCBCD), Sun Certified Developer For Java Web Services (SCDJWS), Sun Certified Mobile Application Developer (SCMAD), Sun Certified Enterprise Architect (SCEA).


C,C++

Code Pad
C Programming.com
My C-Plus
C-Plus plus


.NET

Asp.Net Official Website
Visual Basics Tutorials
VB.net Heaven:Free..
C# Station

Certified Programmes:Microsoft Certified Professional


Others

Programming Tutorials
W3 Schools

Certified Programmes: ORACLE-Data Base,MiddleWare,Applications,Server And Storage Systems.
Object Management Group-
UML,RealTime And Embeded Specialist(R+E),BPM,System Modelling Professional.
Software Testing-Certified Software Testing Professional,Certified Test Manger.

There are many more websites which are much more useful.But For CONVENIENCE, we are not able to specify them all. Hope these may help you. ALL THE BEST..!

NOTE:Please Comment our Posts for precision.THANK YOU!


Forbes list of billionaires



Details..


#1 Carlos Slim Helu
$53.5 billion
Telecom, Mexico.
Telecom tycoon who pounced on privatization of Mexico's national telephone company in the 1990s becomes world's richest person for first time after coming in third place last year. Net worth up $18.5 billion in a year. Recently received regulatory approval to merge his fixed-line assets into American Movil, Latin America's biggest mobile phone company.

#2 Bill Gates
$53 billion
Microsoft, U.S.
Software visionary is now the world's second-richest man. Net worth still up $13 billion in a year as Microsoft shares rose 50% in 12 months, value of investment vehicle Cascade swelled. More than 60% of fortune held outside Microsoft; investments include Four Seasons hotels, Televisa, Auto Nation. Stepped down from day-to-day duties at Microsoft in 2008 to focus on philanthropy.

#3 Warren Buffett
$47 billion
Investments, U.S.
America's favorite investor up $10 billion in past 12 months on surging Berkshire Hathaway shares; says U.S. has survived economic "Pearl Harbor," but warns recovery will be slow. Shrewdly invested $5 billion in Goldman Sachs and $3 billion in General Electric amid 2008 market collapse. Recently acquired railroad giant Burlington Northern Santa Fe for $26 billion.

#4 Mukesh Ambani
$29 billion
Petrochemicals, oil and gas. India.
Global ambitions: His Reliance Industries, already India's most valuable company, recently bid $2 billion for 65% stake in troubled Canadian oil sands outfit Value Creations. Firm's $14.5 billion offer to buy bankrupt petrochemicals maker LyondellBasell was rejected. Since September company has sold Treasury shares worth $2 billion to be used for acquisitions. Late father, Dhirubhai, founded Reliance and built it into a massive conglomerate.

#5 Lakshmi Mittal
$28.7 billion
Steel, India.
London's richest resident oversees ArcelorMittal, world's largest steel maker. Net profits fell 75% in 2009. Mittal took 12% pay cut but improved outlook pushed stock up one-third in past year. Looking to expand in his native India; wants to build steel mills in Jharkhad and Orissa but has not received government approval. Earned $1.1 billion for selling his interest in a Kazakh refinery in December

#6 Lawrence Ellison
$28 billion
Oracle, U.S.
Oracle founder's fortune continues to soar; shares up 70% in past 12 months. Database giant has bought 57 companies in the past five years. Completed $7.4 billion buyout of Sun Microsystems in January; acquired BEA Systems for $8.5 billion in 2008. Studied physics at U. of Chicago; didn't graduate. Started Oracle 1977; took public a day before Microsoft in 1986.

#7 Bernard Arnault
$27.5 billion
Luxury goods, France.
Bling is back, helping fashion icon grab title of richest European as shares of his luxury goods outfit LVMH--maker of Louis Vuitton, Moet & Chandon--surge 57%. LVMH is developing upscale Shanghai commercial property, L'Avenue Shanghai, with Macau billionaire Stanley Ho.

#8 Eike Batista
$27 billion
Mining, oil. Brazil.
Vowing to become world's richest man--and he may be on his way. This year's biggest gainer added $19.5 billion to his personal balance sheet. Son of Brazil's revered former mining minister who presided over mining giant Companhia Vale do Rio Doce got his start in gold trading and mining.

#9 Amancio Ortega
$25 billion
Fashion retail, Spain.
Style maven lords over Inditex; fashion firm, which operates under several brand names including Zara, Massimo Dutti and Stradivarius, has 4,500 stores in 73 countries including new spots in Mexico and Syria. Set up joint venture with Tata Group subsidiary to enter India in 2010. Betting on Florida real estate: bought Coral Gables office tower that is currently home to Bacardi USA.

#10 Karl Albrecht
$23.5 billion
Supermarkets, Germany.
Owns discount supermarket giant Aldi Sud, one of Germany's (and Europe's) dominant grocers. Has 1,000 stores in U.S. across 29 states. Estimated sales: $37 billion. Plans to open New York City store this year. With younger brother, Theo, transformed mother's corner grocery store into Aldi after World War II. Brothers split ownership in 1961; Karl took the stores in southern Germany, plus the rights to the brand in the U.K., Australia and the U.S. Theo got northern Germany and the rest of Europe.

#11 Ingvar Kamprad & family
$23 billion
Ikea, Sweden.
Ikea's reputation under fire. In Russia company fired two top managers for allowing bribes to a power supplier. In France firm is facing an extended workers' strike. A former managing director has published a book exposing questionable ethics. Even Kamprad's frugal image is being questioned, as details of a fancier life (he reportedly drives a Porsche) emerge. Still, no one can question his success.

#12 Christy Walton & family
$22.5 billion
Wal-Mart, U.S.
World's largest retailer benefited as cash-strapped shoppers looked to discount merchandise at start of economic slump. Boost may have waned; recently reported 1.6% decline in same-store sales in its U.S. Wal-Mart and Sam's Club stores, warned of soft sales in current quarter. Still, shares are up 7% in past 12 months and family fortune rose a combined $13 billion, largely recovering losses from market crash.

#13 Stefan Persson
$22.4 billion
H&M, Sweden.
"Cheap chic" mogul is chairman of Hennes & Mauritz (H&M); promoted son, Karl-Johan, 34, to chief executive in July. Retailer is known for bringing on big names like Karl Lagerfeld, Stella McCartney to design affordable collections for its 1,900 stores. Continuing its designer collaborations with new shoe line with Jimmy Choo that debuted in November and knitwear line with Sonia Rykiel.

#14 Li Ka-shing
$21 billion
Diversified, Hong Kong.
Betting on recovery, upped stakes in publicly traded conglomerates Cheung Kong and Hutchison Whampoa. Through HW, Li is world's largest operator of container terminals, world's largest health and beauty retailer by number of outlets, a major supplier of electricity to Hong Kong and a real estate developer. Has a large holding in Canadian oil firm Husky Energy, which recently announced its third discovery in South China Sea. Asia's most generous individual has given out $1.4 billion to education, medical research.

#15 Jim C. Walton
$20.7 billion
Wal-Mart, U.S.
Sam Walton started as J.C. Penney clerk. Opened Benjamin Franklin five-and-dime in 1945; lost lease five years later. Founded Bentonville, Ark., general store with brother James in 1962. Today Walmart has $405 billion in annual sales, 2 million employees, more than 8,400 stores. Jim runs family's Arvest bank.

Operating systems

An operating system is the software on a computer that manages the way different programs use its hardware, and regulates the ways that a user controls the computer.Operating systems are found on almost any device that contains a computer with multiple programs—from cellular phones and video game consoles to supercomputers and web servers.


Operating systems can be categorized by technology, ownership, licensing, working state, usage, and by many other characteristics. In practice, many of these groupings may overlap.
Here is a link to the List Of Operating systems

Wednesday, May 12, 2010

The numbers


Tuesday, May 11, 2010

Erasing Your Digital Tracks on the Web

We routinely enter personal information at various sites on the Web--and the Internet never forgets. Here are some sound ways to take your data back.


The Internet never forgets. Search engines crawl and index every last byte of information available on the Web; and once a piece of information goes online, some digital echo of it is virtually guaranteed to persist on a server somewhere.
We visit sites and create profiles throughout the Internet, often at sites that we don't even like and have no intention of ever visiting again. As if that's not enough, all kinds of data and details of our lives are in the public domain--cataloged, indexed, and only a quick Google search away.
User Agreements and Privacy Statements
Luckily for you, Websites and virtually every company and government agency in the world have user agreements and privacy statements that explain exactly what the business or entity may and may not do with your sensitive, private details.
Almost half a billion people are members of Facebook, and you may very well be one of them. But have you read the Facebook Privacy Policy? If you're like most people, the answer is no, in which case you may be only vaguely (or not at all) aware of what that policy's mind-numbing text says with regard to the myriad ways that Facebook may share your information with other parties.
A lot of information is simply public domain--name, address, home value, criminal record, and more. Data that lies in the public domain was available before the advent of the Internet and the Web, but these technologies have made it exponentially easier to find. An answer that would have taken hours of manual sifting through documents to find now takes a Google search only seconds to produce.
Most Websites are up-front with users regarding their privacy and data-handling policies, but most users never take the time to read those policies and accept the sites' terms and conditions without a second thought. No wonder people seem surprised when they learn that their data is out in the open for all to see.
Skeletons in Your Internet Closet
Have you ever googled yourself--that is, run a search for your own name on Google or any other search engine to see what information the Web has on the subject of you? Sites such as WhitePages.com, BeenVerified.com, and PublicRecords.com are all in the business of providing basic background checks based on the volumes of publicly available data stored online. A quick search for your name on WhitePages.com can reveal your home address, your home phone number, your age--within a certain range--and the names of other people who live in your home or are related to you.
Who Owns Your Data?
The fundamental question--according to Linda Criddle, president of the Safe Internet Alliance--is, who owns your information? "We have to get the mindset to change, to say that consumers own their information. Whatever I choose to share with a given Website is granted under stewardship, but I can rescind that access at my discretion," Criddle says.
But even if that mindset existed today, the trick would still be how to successfully rescind access to data that has been shared and transmitted around the globe to social networking contacts, partner sites, and the general public.
You can't completely erase your digital identity, but you can take steps to clean it up and to assert your right to protect your privacy. The first thing you should do is to keep track of the various sites and profiles you have created on the Internet and to remove any you are no longer using.
Your Facebook and Google Data
If you don't approve of the way Facebook manages or protects your data, you can delete your Facebook account. However, Facebook's privacy policy explains that even if you take this action, various data footprints will remain. According to Facebook's privacy policy, third-party providers with whom you have shared information are authorized to retain that information according to the terms of the agreement with Facebook.
You do have some control, though. Tools like the Google Dashboard enable you to see and edit--or remove--information about you that various Google sites and services may be storing. The Google Dashboard provides links that jump you to the right places to manage the privacy settings at different services--and your presence on each one.
Google provides links and resources that you can use to remove a page or site from Google search results, to remove specific content, or to report copyright infringement. Google also points out, however, that whatever content or Website page you want removed must also be removed from the Web or blocked from future indexing; otherwise, it will just end up back in Google's database.
Your Data at Public Records Sites
WhitePages.com provides a link that you can click to edit the information it reports about you. In order to do so, however, you must first register with WhitePages.com. You can authenticate with WhitePages.com by using your Yahoo, Google, or WindowsLive ID profiles. It makes sense on some level: WhitePages.com needs to have some way of authenticating that you are who you say you are before allowing you to modify the information.
When you remove your entry, WhitePages.com warns that the data may not disappear right away (though it should within 24 hours), and it offers this additional note similar to Google's: "We take steps to block the re-publication of listing information once it has been removed. However, we continually publish new information from publicly available sources and third-party data suppliers."
Erase Your Tweets
If you have posted tweets on Twitter that you'd rather not leave as a deathless gift to posterity on the Internet, you'll be relieved to know that the site permits you to delete offending tweets--albeit one at a time. If you have lots of unwanted tweets to deal with, you might be tempted to abandon the offending Twitter account and start fresh with a new one, but in that case the tweets would remain where you left them. Another option is to use a tool such as TwitWipe to wipe away your entire tweet history, while retaining your same Twitter account, authentication information, and third-party app connections.
Conducting a Privacy Audit
The best way to start reducing online exposure of information about you is to run a background check on yourself. See what Google or WhitePages.com or BeenVerified.com have to say about you. Once you've done that, you should begin taking steps to clean up incorrect information or lingering skeletons.
If possible, locate the original source of the information--the site or service where your personal data first appeared--and remove it there, rather hopscotching through the numerous sites that may simply be reposting it. Either correct inaccurate information associated with your name (and with the various profiles you have on the Web) or simply delete those profiles entirely.
If you run into resistance when trying to deal with these sites, you can turn to organizations such as the Electronic Frontier Foundation and Chilling Effects for assistance. To prevent your information from being exposed on the Internet in the first place, use tools like the InPrivate browsing feature of Internet Explorer 8, or resort to proxy services such as Anonymizer or Hide My Ass to shield your personal data.
Tony Bradley is co-author of Unified Communications for Dummies. He tweets as @Tony_BradleyPCW. You can follow him on his Facebook page, or contact him by e-mail at tony_bradley@pcworld.com.

Monday, May 10, 2010

Google's New Search Bar: An Unwelcome Change

Imagine my surprise last night when Google searches suddenly seemed more Bing-like, thanks to a navigation bar running along the left side of the screen.In case you haven't noticed or heard, Google is rolling out what it calls "contextually relevant, left-hand navigation," defining a new look for Google search. Inside the nav bar
are links to other services such as Maps and Book Search, related search queries and additional tools for narrowing your results.
I don't like it. Maybe I'm just resistant to change, but the new search results immediately struck me as claustrophobic. I tried to find a way to bring back the old Google, but to no avail.(click on image to enlarge)
Technically, the addition of a nav bar doesn't take anything away from the main field of results. All you're losing is a bunch of unused white space. But cluttering the interface is not only redundant -- you'll find links to some of the same services at the top of the page, where they've always been - it's decidedly un-Google.
Until now, Google's search changes have been subtle. A map here, a little indent for news results there, a suggestion at the top of the screen to correct spelling or other errors. These additions work because they're like mind readers, predicting the kind of information you want and placing it right in the search stream. By comparison, the nav bar is a distraction, drawing you away from the main search field where the good stuff is happening.
On that note, the nav bar results aren't even that helpful. The "video" button links to Google Video instead of YouTube. You're offered to search within a specific time period, such as "Latest" or "Past 24 hours," but there's no clear logic for how Google chooses its date ranges for each search. Related search queries are equally confusing: If I'm searching for "Seinfeld," what are the odds that I'm also interested in searching for "Everybody Loves Raymond" and "Frasier?" Apparently Google thinks the probability is high.
The puzzling thing about Google's new look is that it riffs on Bing's navigation bar, but even Microsoft has admitted that people often ignore this feature of Bing. That's why Bing is playing around with tabs at the top of search results, leading people to Maps, Weather and other related sections of the site.
So basically, Bing's copying a feature that works quite well for Google, while Google is copying a feature that didn't work for Bing. If Google doesn't ditch the nav bar, I hope they at least let users revert back to what wasn't broken and didn't need fixing.

List of programming languages

A programming language is an artificial language designed to express computations that can be performed by a machine, particularly a computer. Programming languages can be used to create programs that control the behavior of a machine, to express algorithms precisely, or as a mode of human communication.
The aim of this list of programming languages is to include all notable programming languages in existence, both those in current use and historical ones, in alphabetical order.
Click on the links to know about the particular programming languages
0-9
4D
A
A+
A++
A# .NET
A# (Axiom)
A-0 System
ABAP
ABC
ABC ALGOL
Abel
ABLE
ABSET
ABSYS
Abundance
ACC
Accent
ActForex
Action!
ActionScript
Ace DASL
ACT-III
Ada
Adenine
Afnix
Agora
AIS Balise
Aikido
Alef
Alef++
ALF
ALGOL 58
ALGOL 60
ALGOL 68
Alice
Alma-0
Ambi
Amiga E
AMOS
AMPLE
AngelScript
APL
AppleScript
Arc
Arduino
ARexx
Argus
ARLA
Asp
Assembly (65x02)
Assembly (65816)
Assembly (68000)
Assembly (ARM)
Assembly (PowerPC)
Assembly (SPARC)
Assembly (System 360)
Assembly (Vax 11/785)
Assembly (x86/x64)
ATS
AutoHotkey
AutoIt
Averest
AWK
Axum
B
B
Bash
BASIC
bc
BCPL
BeanShell
Batch (Windows/Dos)
Bertrand
BETA
Bigwig
Bistro
BitC
BLISS
Blue
Bon
Boo
Boomerang
BPEL
BUGSYS
BuildProfessional
C
C
C--
C++ - ISO/IEC 14882
C# - ISO/IEC 23270
C/AL
Caché ObjectScript
Caml
Cat
Cayenne
Cecil
Cel
Cesil
CFML
Cg
Ch interpreter (C/C++ interpreter)
Chapel
CHAIN
Charity
Chef
CHILL
CHIP-8
chomski
CHR
Chrome
ChucK
CICS
CIL
Cilk
CL (Honeywell)
CL (IBM)
Claire
Clarion
Clean
Clipper
CLIST
Clojure
CLU
CMS-2
COBOL - ISO/IEC 1989
CobolScript
Cobra
CODE
Col
Cola
ColdC
ColdFusion
Cool
COMAL
Common Lisp (also known as CL)
COMPASS
Component Pascal
COMIT
Converge
Coral 66
Corn
CorVision
Coq
COWSEL
CPL
csh
CSP
CSKA
Csound
Curl
Curry
Cyclone
D
D
D#
Dao
DASL - Distributed Application Specification Language
DASL - Datapoint's Advanced Systems Language
DataFlex
Datalog
DATATRIEVE
dBase
dc
DCL
Deesel (formerly G)
Delphi
Dialect
DinkC
Dialog Manager
DIBOL
DL/I
DM
DotLisp
Dylan
dylan.NET
Dynace
DYNAMO
E
E
Ease
EASY
Easy PL/I
Easycoder
EASYTRIEVE PLUS
eC (Ecere C)
ECMAScript
Ecol
eDeveloper
Edinburgh IMP
EGL
Eiffel
Einstein
ELAN
elastiC
Elf
Emacs Lisp
Emerald (programming language)
Englesi
Epigram
Erlang
Escapade
Escher
ESPOL
Esterel
Etoys
Euclid
Euler
Euphoria
CMS EXEC
EXEC 2
F
F
F#
Factor
Falcon
Fantom
Felix
Ferite
FFP
FILETAB
Fjölnir
FL
Flavors
Flex
FLOW-MATIC
Fly
FOCAL
FOCUS
FOIL
FORMAC
FormWare
@Formula
Forth
Fortran - ISO/IEC 1539
Fortress
FoxPro 2
FP
Franz Lisp
Frink
F-Script
Fuxi
G
Gambas
GAMS
GAP
G-code
GDL
Gibiane
GJ
GLSL
GM
GML
Go
Go!
GOAL
Gödel
Godiva
Goo
GOTRAN
GPSS
GraphTalk
GRASS
Green
Groovy
H
HAL/S
Handel-C, Celoxica
Harbour
IBM HAScript
Haskell
HaXe
High Level Assembly
HLSL
Hop
Hope
Hugo
Hume
HyperTalk
Template:Html
I
IBAL
IBM Basic assembly language
IBM Informix-4GL
IBM RPG
ICI
Icon
Id
IDL
IMP
Inform
Io
Ioke
IPL
IPTSCRAE
IronPython
ISPF
ISWIM
J
J
J#
J++
JADE
JAGEX
Jako
JAL
Janus
JASS
Java
JavaScript
JCL
JEAN
Join Java
JOSS
Joule
JOVIAL
Joy
JScript
Jython
JSP
JavaFX Script
K
K
Kaleidoscope
Karel
Karel++
Kaya
KEE
Kiev
KIF
Kite
Kogut
KRC
KRYPTON
ksh
KUKA
L
L
L# .NET
L++.NET (no longer developed)
LabVIEW
Ladder
Lagoona
LANSA
Lasso
Lava
Leadwerks Script
Leda
Legoscript
Limbo
Limnor
LINC
Lingo
Linoleum
LIS
LISA
Lisaac
Lisp - ISO/IEC 13816
Lite Clink title
Lithe
Little b
Logix
Logo
Logtalk
LOTUS
LPC
LSE
LSL
Lua
Lucid
Lush
Lustre
LYaPAS
Lynx
M
M
M2001
M4
MAD
Magik
Magma
MapBasic
Maple
MAPPER (Unisys/Sperry) now part of BIS
MARK-IV (Sterling/Informatics) now VISION:BUILDER of CA
Mary
MASM Microsoft Assembly x86
Mathematica
MATLAB
Maxima (see also Macsyma)
MaxScript internal language 3D Studio Max
Maya (MEL)
MDL
MelloCOMPLEX
Mercury
Mesa
Mesham
Metafont
MetaL
Microcode
MicroScript
MIIS
MillScript
MIMIC
min
Mindscript
Miranda
MIVA Script
ML
Moby
Model 204
Modula
Modula-2
Modula-3
Mohol
MOLSF
Mondrian
MOO
Mortran
Moto
Mouse
MPD
MSIL - deprecated name for CIL
MSL
MSX BASIC
MUMPS
Murphy Language
Mythryl
N
Napier88
NATURAL
NEAT chipset
Neko
Nemerle
NESL
Net.Data
NetLogo
NewLISP
NEWP
NewtonScript
NGL
Nial
Nice
Nickle
Nimrod
Nomad2
Nosica
NPL
NQC
NSIS
Nu
Nusa
NXC
O
o:XML
Oak
Oberon
Object Lisp
ObjectLOGO
Object Open Rexx
Object Pascal
Objective-C
Objective Caml
Objective-J
Obliq
Obol
occam
occam-π
Octave
OmniMark
Onyx
Opal
OpenEdge ABL
OPL
OpenOffice Basic
OPS5
Orc
ORCA/Modula-2
Orwell
Oxygene
Oz
P
PARI/GP
Pascal - ISO 7185
Pawn
PCASTL
PCF
PEARL
Perl
PDL
PHP
Phrogram
Pico
Pict
Piet
Pike
PIKT
PILOT
Pizza
PL-11
PL/0
PL/B
PL/C
PL/I - ISO 6160
PL/M
PL/P
PL/SQL
PL360
PLANC
Plankalkül
PLEX
PLEXIL
Pliant
POP-11
Poplog
PostScript
PortablE
Powerhouse
PowerBuilder - 4GL GUI appl. generator from Sybase
PowerScript
PPL
Processing
Prograph
PROIV
Prolog
Visual Prolog
Promela
PROTEL
Proteus
ProvideX
Pure
Python
Q
Q
Qi
QtScript
QuakeC
QPL
R
R
R++
RAPID
Rapira
Ratfiv
Ratfor
RBScript
rbx.Lua
rc
REBOL
Redcode
REFAL
Reia
Revolution
rex
REXX
Rlab
ROOP
RPG
RPL
RSL
Ruby
RapidBATCH
S
S
S2
S3
S-Lang
S-PLUS
SA-C
SAC
SAIL
SALSA
SAM76
SAS
SASL
Sather
Sawzall
SBL
Scala
Scheme
Scilab
Scratch
Script.NET
Sculptor 4GL
Sed
Seed7
Self
SenseTalk
SETL
Shakespeare
Shift Script
SiMPLE
SIMPOL
Simscape
SIMSCRIPT
Simula
Simulink
SISAL
Slate
SLEEP
SLIP
SMALL
Smalltalk
SML
SNOBOL(SPITBOL)
Snow
Snowball
SNUSP
SOAP
SOL
Span
SPARK
Spice
SPIN
SP/k
SPS
Squeak
Squirrel
SR
SSL
Strand
Stateflow
Subtext
Suneido
SuperCollider
SuperTalk
SYMPL
SyncCharts
SystemVerilog
T
T
TACL
TACPOL
TADS
TAL
Tcl
Tea
TELON - Mainframe Online IMS/COBOL Generator
TECO
TELCOMP
gt-Telon
TenCORE
TeX
TEX
TIE
thinBasic programming language
Timber
Tom
TOM
Topspeed
TPU
Trac
T-SQL
TTCN
Turing
TUTOR
TXL
U
Ubercode
Unicon
Uniface
uniPaaS
UNITY
Unix shell
Unlambda
UnrealScript
USE (Regency Systems)
V
Vala
Genie
VBA
VBScript
Verilog
VHDL
Visual Basic
Visual Basic .NET
Visual C++
Visual C++ .Net
Visual DataFlex
Visual DialogScript
Visual FoxPro
Visual J++
Visual Objects
Vvvv
W
Water
WATFIV, WATFOR
WebQL
Whitespace
Winbatch
X
X++
X10
XBL
xHarbour
XL
XOTcl
XPL
XPL0
XQuery
XSLT - See XPath
XCODE
Y
Y
Yorick
YAL
YQL
Yoix
Z
Z
Z notation
Zeno
Zonnon
ZOPL
ZPL
ZZT-oop